咨询与建议

限定检索结果

文献类型

  • 109 篇 会议
  • 84 篇 期刊文献

馆藏范围

  • 193 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 134 篇 工学
    • 85 篇 计算机科学与技术...
    • 67 篇 软件工程
    • 45 篇 信息与通信工程
    • 20 篇 电气工程
    • 19 篇 电子科学与技术(可...
    • 16 篇 控制科学与工程
    • 15 篇 仪器科学与技术
    • 12 篇 船舶与海洋工程
    • 10 篇 网络空间安全
    • 9 篇 机械工程
    • 7 篇 生物工程
    • 4 篇 动力工程及工程热...
    • 4 篇 安全科学与工程
    • 3 篇 光学工程
    • 3 篇 材料科学与工程(可...
    • 3 篇 交通运输工程
    • 3 篇 环境科学与工程(可...
    • 3 篇 生物医学工程(可授...
  • 59 篇 理学
    • 32 篇 数学
    • 30 篇 物理学
    • 12 篇 统计学(可授理学、...
    • 8 篇 生物学
    • 7 篇 系统科学
    • 4 篇 海洋科学
  • 33 篇 管理学
    • 26 篇 管理科学与工程(可...
    • 11 篇 图书情报与档案管...
    • 7 篇 工商管理
  • 9 篇 法学
    • 5 篇 社会学
    • 4 篇 法学
  • 3 篇 文学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 医学
  • 1 篇 哲学
  • 1 篇 艺术学

主题

  • 7 篇 data privacy
  • 7 篇 costs
  • 7 篇 blockchain
  • 6 篇 oceans
  • 6 篇 signal to noise ...
  • 6 篇 time-frequency a...
  • 6 篇 semantics
  • 6 篇 feature extracti...
  • 6 篇 security
  • 6 篇 federated learni...
  • 6 篇 accuracy
  • 6 篇 privacy
  • 5 篇 underwater acous...
  • 5 篇 protocols
  • 5 篇 cryptography
  • 4 篇 simulation
  • 4 篇 target tracking
  • 4 篇 wireless sensor ...
  • 4 篇 computational mo...
  • 4 篇 estimation

机构

  • 48 篇 college of under...
  • 23 篇 acoustic science...
  • 19 篇 the state key la...
  • 19 篇 key laboratory o...
  • 18 篇 national key lab...
  • 8 篇 state key labora...
  • 8 篇 key laboratory o...
  • 8 篇 key laboratory o...
  • 7 篇 institute of blo...
  • 7 篇 state key labora...
  • 6 篇 guilin universit...
  • 6 篇 harbin engineeri...
  • 6 篇 guizhou universi...
  • 5 篇 school of comput...
  • 5 篇 weifang universi...
  • 5 篇 college of compu...
  • 5 篇 harbin engineeri...
  • 5 篇 state key labora...
  • 4 篇 school of comput...
  • 4 篇 beijing key labo...

作者

  • 11 篇 chen yuling
  • 9 篇 qiao gang
  • 5 篇 liu zhenguang
  • 5 篇 wu yongtang
  • 5 篇 jiao yingying
  • 4 篇 yin yifang
  • 4 篇 liu songzuo
  • 4 篇 wu sifan
  • 4 篇 chen haipeng
  • 4 篇 yao yanqing
  • 3 篇 yin jingwei
  • 3 篇 yang ziqi
  • 3 篇 liu xin
  • 3 篇 li yong
  • 3 篇 xiao han
  • 3 篇 xie jinhuai
  • 3 篇 xia xin
  • 3 篇 shang zhigang
  • 3 篇 zhang haigang
  • 3 篇 qin zhan

语言

  • 183 篇 英文
  • 8 篇 其他
  • 2 篇 中文
检索条件"机构=Key Laboratory in Blockchain and Data Security by Ministry of Industry and Information Technology"
193 条 记 录,以下是111-120 订阅
排序:
Using evolutionary process for cross-version software defect prediction
收藏 引用
International Journal of Performability Engineering 2019年 第9期15卷 2484-2493页
作者: Li, Yong Liu, Zhandong Zhang, Haijun College of Computer Science and Technology Xinjiang Normal University Urumqi830054 China Data Security Key Laboratory Xinjiang Normal University Urumqi830054 China Key Laboratory of Safety-Critical Software Ministry of Industry and Information Technology Nanjing211106 China
Cross-version defect prediction can effectively reduce the construction cost of a model, which is of great significance for understanding the causes of defects in subsequent software versions and improving the quality... 详细信息
来源: 评论
A CPK-Based Identity Authentication Scheme for IoT
收藏 引用
Computer Systems Science & Engineering 2022年 第3期40卷 1217-1231页
作者: Mingming Zhang Jiaming Mao Yuanyuan Ma Liangjie Xu Chuanjun Wang Ran Zhao Zhihao Li Lu Chen Wenbing Zhao State Grid Jiangsu Electric Power Co. Ltd.Information&Telecommunication BranchNanjing210008China State Grid Key Laboratory of Information&Network Security Institute of Information and CommunicationGlobal Energy Interconnection Research InstituteNanjing210003China Anhui Jiyuan Software Co.Ltd SGITGHefei230088China Engineering Research Center of Post Big Data Technology and Application of Jiangsu Province Research and Development Center of Post Industry Technology of the State Posts Bureau(Internet of Things Technology)Engineering Research Center of Broadband Wireless Communication Technology of the Ministry of EducationNanjing University of Posts and TelecommunicationsNanjing210003China Department of Electrical Engineering and Computer Science Cleveland State UniversityCleveland44115USA
As the power Internet of Things(IoT)enters the security construction stage,the massive use of perception layer devices urgently requires an identity authentication scheme that considers both security and *** existing ... 详细信息
来源: 评论
CDEdit: A Highly Applicable Redactable blockchain with Controllable Editing Privilege and Diversified Editing Types
arXiv
收藏 引用
arXiv 2022年
作者: Chen, Xiaofeng Gao, Ying School of Cyber Science and Technology Beihang University China Key Laboratory of Aerospace Network Security Ministry of Industry and Information Technology China
Redactable blockchains allow modifiers or voting committees with modification privileges to edit the data on the chain. Trapdoor holders in chameleon-based hash redactable blockchains can quickly compute hash collisio... 详细信息
来源: 评论
SQLStateGuard: Statement-Level SQL Injection Defense Based on Learning-Driven Middleware  15
SQLStateGuard: Statement-Level SQL Injection Defense Based o...
收藏 引用
15th Annual ACM Symposium on Cloud Computing, SoCC 2024
作者: Liu, Xin Huang, Yuanyuan Wang, Tianyi Li, Song Niu, Weina Shen, Jun Zhou, Qingguo Zhou, Xiaokang School of Information Science and Engineering Lanzhou University Gansu Lanzhou China The State Key Laboratory of Blockchain and Data Security Zhejiang University Zhejiang Hangzhou China School of Computer Science and Engineering University of Electronic Science and Technology of China Sichuan Chengdu China School of Computing and Information Technology University of Wollongong WollongongNSW Australia Kansai University Osaka Suita Japan
SQL injection is a significant and persistent threat to web services. Most existing protections against SQL injections rely on traffic-level anomaly detection, which often results in high false-positive rates and can ... 详细信息
来源: 评论
CDEdit: Redactable blockchain with Cross-audit and Diversity Editing
CDEdit: Redactable Blockchain with Cross-audit and Diversity...
收藏 引用
IEEE International Conference on Trust, security and Privacy in Computing and Communications (TrustCom)
作者: Xiaofeng Chen Ying Gao School of Cyber Science and Technology Beihang University China Key Laboratory of Aerospace Network Security Ministry of Industry and Information Technology China
Redactable blockchain allows modifiers or voting committees with modification privileges to edit the data on the chain. Among them, trapdoor holders in chameleon-based hash redactable blockchains can quickly compute h... 详细信息
来源: 评论
Unbiased multi-label learning from crowdsourced annotations  24
Unbiased multi-label learning from crowdsourced annotations
收藏 引用
Proceedings of the 41st International Conference on Machine Learning
作者: Mingxuan Xia Zenan Huang Runze Wu Gengyu Lyu Junbo Zhao Gang Chen Haobo Wang School of Software Technology Zhejiang University Ningbo China and State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China Fuxi AI Lab NetEase Inc. Hangzhou China Faculty of Information Technology Beijing University of Technology Beijing China
This work studies the novel Crowdsourced Multi-Label Learning (CMLL) problem, where each instance is related to multiple true labels but the model only receives unreliable labels from different annotators. Although a ...
来源: 评论
A Novel Lexicon Enhanced Named Entity Recognition Model for Network security Domain
A Novel Lexicon Enhanced Named Entity Recognition Model for ...
收藏 引用
2024 China Automation Congress, CAC 2024
作者: Jin, Zhiyang Fu, Yusun Huan, Yuehui Xue, Jinliang Wang, Chengguang Chen, Yuanfang Ningbo Artificial Intelligence Institute Shanghai Jiao Tong University Ningbo China School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University Shanghai China Zhejiang Guoli Security Technology Co. Ltd Ningbo China Ningbo Industrial Internet Institute Ningbo China State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China
Named Entity Recognition (NER) technology serves as the foundation for solving many Natural Language Processing(NLP) problems, particularly in the domain of building knowledge graphs, where an effective NER model is c... 详细信息
来源: 评论
Research on the Cross-Correlation Characteristics of Signals from Ocean Bottom Seismometer
Research on the Cross-Correlation Characteristics of Signals...
收藏 引用
IEEE/OES China Ocean Acoustics (COA)
作者: Dejin Cao Haigang Zhang Jinhuai Xie Xiao Gao National Key Laboratory of Underwater Acoustic Technology Key Laboratory of Marine Information Acquisition and Security of Ministry of Industry and Information Technology College of Underwater Acoustic Engineering Harbin Engineering University Harbin China
In this study, considerable differences in waveform between vector signals and acoustic pressure signals were received from the seabed interface. The cross-correlation characteristics between the acoustic pressure and... 详细信息
来源: 评论
Research on YOLOv7-tiny Improved Algorithm for Compli-ance Detection of Production Personnel Wearing
Research on YOLOv7-tiny Improved Algorithm for Compli-ance D...
收藏 引用
2023 International Conference on Communication Network and Machine Learning, CNML 2023
作者: Shen, Qiao Huang, Hanming Wang, Pengfei Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guangxi Normal University Guangxi Guilin541004 China Guangxi Key Lab of Multi-Source Information Mining and Security Guangxi Normal University Guangxi Guilin541004 China School of Computer Science and Engineering Guangxi Normal University Guangxi Guilin541004 China Hunan Aerospace Industry General Corp Aircraft Technology Branch Hunan Changsha410006 China
Proposed is an improved production personnel wearing target detection algorithm based on YOLOv7, aiming to address the issues of false positives and false negatives caused by occlusion and detection of small to medium... 详细信息
来源: 评论
A New Method of Construction of Permutation Trinomials with Coefficients 1
A New Method of Construction of Permutation Trinomials with ...
收藏 引用
IEEE International Conference on Big data security on Cloud (Bigdatasecurity), High Performance and Smart Computing (HPSC) and Intelligent data and security (IDS)
作者: Hua Guo Shuo Wang Hutao Song Yiran Han Xiyong Zhang Jianwei Liu Key Laboratory of Aerospace Network Security Ministry of Industry and Information Technology Beihang University State Key Laboratory of Software Development Environment Beihang University Beijing China School of Electronic and Information Engineering Beihang University Beijing China Key Laboratory of Aerospace Network Security Ministry of Industry and Information Technology Beihang University Beijing China Beijing Institute of Satellite Information Engineering Beijing China
While big data technology is developing rapidly, it also brings numerous security and privacy issues, such as the security of communication between devices in Internet of Things and the confidentiality of stored data.... 详细信息
来源: 评论