咨询与建议

限定检索结果

文献类型

  • 109 篇 会议
  • 80 篇 期刊文献

馆藏范围

  • 189 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 130 篇 工学
    • 81 篇 计算机科学与技术...
    • 64 篇 软件工程
    • 43 篇 信息与通信工程
    • 18 篇 电子科学与技术(可...
    • 16 篇 电气工程
    • 15 篇 仪器科学与技术
    • 14 篇 控制科学与工程
    • 12 篇 船舶与海洋工程
    • 9 篇 机械工程
    • 8 篇 网络空间安全
    • 7 篇 生物工程
    • 4 篇 动力工程及工程热...
    • 4 篇 安全科学与工程
    • 3 篇 光学工程
    • 3 篇 材料科学与工程(可...
    • 3 篇 环境科学与工程(可...
    • 3 篇 生物医学工程(可授...
  • 57 篇 理学
    • 31 篇 数学
    • 29 篇 物理学
    • 12 篇 统计学(可授理学、...
    • 8 篇 生物学
    • 7 篇 系统科学
    • 4 篇 海洋科学
  • 31 篇 管理学
    • 25 篇 管理科学与工程(可...
    • 10 篇 图书情报与档案管...
    • 6 篇 工商管理
  • 8 篇 法学
    • 4 篇 法学
    • 4 篇 社会学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 文学
    • 2 篇 新闻传播学
  • 1 篇 医学

主题

  • 7 篇 costs
  • 6 篇 data privacy
  • 6 篇 oceans
  • 6 篇 signal to noise ...
  • 6 篇 time-frequency a...
  • 6 篇 semantics
  • 6 篇 feature extracti...
  • 6 篇 security
  • 6 篇 blockchain
  • 6 篇 federated learni...
  • 6 篇 accuracy
  • 6 篇 privacy
  • 5 篇 underwater acous...
  • 5 篇 protocols
  • 5 篇 cryptography
  • 4 篇 simulation
  • 4 篇 target tracking
  • 4 篇 wireless sensor ...
  • 4 篇 computational mo...
  • 4 篇 estimation

机构

  • 49 篇 college of under...
  • 24 篇 acoustic science...
  • 20 篇 key laboratory o...
  • 19 篇 the state key la...
  • 18 篇 national key lab...
  • 9 篇 key laboratory o...
  • 8 篇 state key labora...
  • 7 篇 state key labora...
  • 7 篇 key laboratory o...
  • 6 篇 guilin universit...
  • 6 篇 institute of blo...
  • 6 篇 harbin engineeri...
  • 6 篇 guizhou universi...
  • 5 篇 school of comput...
  • 5 篇 weifang universi...
  • 5 篇 college of compu...
  • 5 篇 harbin engineeri...
  • 5 篇 state key labora...
  • 4 篇 school of comput...
  • 4 篇 beijing key labo...

作者

  • 11 篇 chen yuling
  • 9 篇 qiao gang
  • 5 篇 liu zhenguang
  • 5 篇 wu yongtang
  • 5 篇 jiao yingying
  • 4 篇 yin yifang
  • 4 篇 wu sifan
  • 4 篇 chen haipeng
  • 4 篇 gang qiao
  • 4 篇 yao yanqing
  • 3 篇 yin jingwei
  • 3 篇 liu xin
  • 3 篇 li yong
  • 3 篇 liu songzuo
  • 3 篇 xiao han
  • 3 篇 xie jinhuai
  • 3 篇 xia xin
  • 3 篇 zhang haigang
  • 3 篇 lo david
  • 3 篇 qian xiaobin

语言

  • 179 篇 英文
  • 8 篇 其他
  • 2 篇 中文
检索条件"机构=Key Laboratory in Blockchain and Data Security by Ministry of Industry and Information Technology"
189 条 记 录,以下是151-160 订阅
排序:
Research on the Distribution Characteristics of Standardized Big data Resources Based on data Visualization——Taking Standardization Practice in Shandong Province as an Example
Research on the Distribution Characteristics of Standardized...
收藏 引用
IEEE International Conference on data Science in Cyberspace (DSC)
作者: Jinyang Sun Dongdong Peng Zhe Lu Mengran Zhai Ning Qi Yuanhua Qi SHANDONG SCICOM Information and Economy Research Institute Co. Ltd Jinan China Jinan Municipal Bureau of Big Data Jinan China Shandong Institute of Economy and Informatization Development Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology Shandong Academy of Sciences Jinan China
Standardized big data, as a product of the combination of big data and standardization work, objectively reflects the status quo and trends of standardization work. An in-depth study of the distribution characteristic... 详细信息
来源: 评论
Robust Secure Aggregation with Lightweight Verification for Federated Learning
Robust Secure Aggregation with Lightweight Verification for ...
收藏 引用
IEEE International Conference on Trust, security and Privacy in Computing and Communications (TrustCom)
作者: Chao Huang Yanqing Yao Xiaojun Zhang Da Teng Yingdong Wang Lei Zhou State Key Laboratory of Software Development Environment Beihang University Beijing China State Key Laboratory of Cryptology Beijing China Key Laboratory of Aerospace Network Security Ministry of Industry and Information Technology School of Cyber Science and Technology Beihang University Beijing China Beijing Key Laboratory of Network Technology Beihang University Beijing China School of Computer Science Southwest Petroleum University Chengdu China
Verifiable secure aggregation (VSA) is a critical procedure in federated learning (FL), where secure aggregation achieves local gradients aggregation while data confidentiality is preserved, and verifiability enables ... 详细信息
来源: 评论
Graph-Based Terminal Ranking for Sparsification of Interference Coordination Parameters in Ultra-Dense Networks  10th
Graph-Based Terminal Ranking for Sparsification of Interfere...
收藏 引用
10th EAI International Conference on Mobile Networks and Management, MONAMI 2020
作者: Gou, Junxiang Wang, Lusheng Lin, Hai Peng, Min Ministry of Education School of Computer Science and Information Engineering Key Laboratory of Knowledge Engineering with Big Data Hefei University of Technology Hefei230601 China Ministry of Education School of Cyber Science and Engineering Key Laboratory of Aerospace Information Security and Trusted Computing Wuhan University Wuhan430072 China Anhui Province Key Laboratory of Industry Safety and Emergency Technology Hefei230601 China
In the future mobile communication system, inter-cell interference becomes a serious problem due to the intensive deployment of cells and terminals. Traditional interference coordination schemes take long time for opt... 详细信息
来源: 评论
MIMO Underwater Acoustic Communication in Shallow Water with Ice Cover
收藏 引用
China Ocean Engineering 2019年 第2期33卷 237-244页
作者: HAN Xiao YIN Jing-wei LIU Bing GUO Long-xiang Acoustic Science and Technology Laboratory Harbin Engineering University Key Laboratory of Marine Information Acquisition and Security (Harbin Engineering University) Ministry of Industry and Information Technology College of Underwater Acoustic Engineering Harbin Engineering University
Although multiple-input multiple-output(MIMO) underwater acoustic(UWA) communication has been intensively investigated in the past years, existing works mainly focus on open-water environment. There is no work reporti... 详细信息
来源: 评论
Measurement-based analysis of characteristics of fast moving underwater acoustic communication channel
Measurement-based analysis of characteristics of fast moving...
收藏 引用
Frontiers of information technology (FIT)
作者: Yang Wang Honglu Yan Chenyu Pan Songzuo Liu State Key Laboratory of Acoustics Chinese Academy of Sciences Beijing China Maritime Environment Construction Office Beijing China Acoustic Science and Technology Laboratory Harbin Engineering University Harbin China Key Laboratory of Marine Information Acquisition and Security (Harbin Engineering University) Ministry of Industry and Information Technology Harbin China College of Underwater Acoustic Engineering Harbin Engineering University Harbin China
In the fast moving scene, the underwater acoustic communication (UWAC) channel has extremely complex time-varying characteristics. The lack of standardized channel model severely limits the development of mobile UWAC ... 详细信息
来源: 评论
blockchain-Based Efficient Public Integrity Auditing for Cloud Storage Against Malicious Auditors  16th
Blockchain-Based Efficient Public Integrity Auditing for Clo...
收藏 引用
16th International Conference on information security and Cryptology, Inscrypt 2020
作者: Li, Shanshan Xu, Chunxiang Zhang, Yuan Yang, Anjia Wen, Xinsheng Chen, Kefei School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China College of Cyber Security Jinan University Guangzhou China Department of Mathematics Hangzhou Normal University Hangzhou China Key Laboratory of Dynamic Cognitive System of Electromagnetic Spectrum Space Ministry of Industry and Information Technology Nanjing University of Aeronautics and Astronautics Nanjing China
Public integrity auditing enables a user to delegate a third-party auditor (TPA) to periodically audit the integrity of the outsourced data. Whereas, the security of public auditing schemes relies on the trustworthine... 详细信息
来源: 评论
The Sensitive Properties of Hydrate Reservoirs Based on Seismic Stereoscopic Detection technology
收藏 引用
Acta Geologica Sinica(English Edition) 2020年 第2期94卷 530-544页
作者: LIU Xueqin XING Lei QIN Zhiliang LIU Huaishan Acoustic Science and Technology Laboratory Harbin Engineering UniversityHarbin 150001China Key Laboratory of Marine Information Acquisition and Security(Harbin Engineering University) Ministry of Industry and Information TechnologyHarbin 150001China College of Underwater Acoustic Engineering.Harbin Engineering University Harbin 150001China Key Lab of Submarine Geosciences and Prospecting Techniques MOE and College of Marine GeosciencesOcean University of ChinaQingdao 266100China Evaluation and Detection Technology Laboratory of Marine Mineral Resources Qingdao 266100China National Laboratory for Marine Science and Technology Qingdao 266061China
Higher-precision determinations of hydrate reservoirs, hydrate saturation levels and storage estimations are important for guaranteeing the ability to continuously research, develop and utilize natural gas hydrate res... 详细信息
来源: 评论
Deep Learning Algorithms Design and Implementation Based on Differential Privacy  3rd
Deep Learning Algorithms Design and Implementation Based on ...
收藏 引用
3rd International Conference on Machine Learning for Cyber security, ML4CS 2020
作者: Xu, Xuefeng Yao, Yanqing Cheng, Lei Key Laboratory of Aerospace Network Security Ministry of industry and information technology School of Cyberspace Science and Technology Beihang University Beijing100191 China State Key Laboratory of Software Development Environment Beihang University Beijing100191 China Beijing Key Laboratory of Network Technology Beihang University Beijing China Shenzhen Research Institute of Big Data Shenzhen518000 China
Deep learning models bear the risks of privacy leakage. Attackers can obtain sensitive information contained in training data with some techniques. However, existing differentially private methods such as Differential... 详细信息
来源: 评论
Zero-Knowledge Proof-based Practical Federated Learning on blockchain
arXiv
收藏 引用
arXiv 2023年
作者: Xing, Zhibo Zhang, Zijian Li, Meng Liu, Jiamou Zhu, Liehuang Russello, Giovanni Asghar, Muhammad Rizwan The School of Computer Science The University of Auckland Auckland New Zealand The School of Cyberspace Science and Technology Beijing Institute of Technology Beijing100081 China Southeast Institute of Information Technology Beijing Institute of Technology Fujian351100 China Key Laboratory of Knowledge Engineering with Big Data Hefei University of Technology Ministry of Education School of Computer Science and Information Engineering Hefei University of Technology Anhui Hefei230601 China Anhui Province Key Laboratory of Industry Safety and Emergency Technology Intelligent Interconnected Systems Laboratory of Anhui Province Hefei University of Technology China The Department of Computer Science University of Surrey The School of Computer Science The University of Auckland Auckland New Zealand
Since the concern of privacy leakage extremely discourages user participation in sharing data, federated learning has gradually become a promising technique for both academia and industry for achieving collaborative l... 详细信息
来源: 评论
Recommender Systems with Condensed Local Differential Privacy  3rd
Recommender Systems with Condensed Local Differential Privac...
收藏 引用
3rd International Conference on Machine Learning for Cyber security, ML4CS 2020
作者: Liu, Ao Yao, Yanqing Cheng, Xianfu State Key Laboratory of Software Development Environment Beihang University Beijing100191 China Key Laboratory of Aerospace Network Security Ministry of Industry and Information Technology School of Cyberspace Science and Technology Beihang University Beijing100191 China Beijing Key Laboratory of Network Technology Beihang University Beijing100191 China
Recommender systems aim at predicting users’ future behaviors by learning the users’ personal information and historical behaviors. Unfortunately, training by the user’s raw data will inevitably cause the user’s p... 详细信息
来源: 评论