咨询与建议

限定检索结果

文献类型

  • 69 篇 会议
  • 61 篇 期刊文献

馆藏范围

  • 130 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 96 篇 工学
    • 79 篇 计算机科学与技术...
    • 65 篇 软件工程
    • 22 篇 信息与通信工程
    • 17 篇 电气工程
    • 15 篇 控制科学与工程
    • 8 篇 电子科学与技术(可...
    • 7 篇 生物工程
    • 5 篇 光学工程
    • 5 篇 建筑学
    • 5 篇 生物医学工程(可授...
    • 4 篇 土木工程
    • 4 篇 安全科学与工程
    • 4 篇 网络空间安全
    • 3 篇 机械工程
    • 3 篇 化学工程与技术
    • 3 篇 交通运输工程
  • 32 篇 理学
    • 19 篇 数学
    • 9 篇 统计学(可授理学、...
    • 8 篇 生物学
    • 7 篇 物理学
    • 3 篇 系统科学
  • 24 篇 管理学
    • 17 篇 管理科学与工程(可...
    • 8 篇 图书情报与档案管...
    • 4 篇 工商管理
  • 8 篇 法学
    • 6 篇 法学
    • 2 篇 社会学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 4 篇 医学
    • 4 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 公共卫生与预防医...
  • 1 篇 军事学

主题

  • 7 篇 federated learni...
  • 6 篇 optimization
  • 5 篇 data privacy
  • 5 篇 speech processin...
  • 5 篇 blockchain
  • 5 篇 sensors
  • 5 篇 privacy
  • 4 篇 compressed sensi...
  • 4 篇 deep learning
  • 4 篇 magnetic resonan...
  • 4 篇 anomaly detectio...
  • 4 篇 signal processin...
  • 4 篇 contrastive lear...
  • 4 篇 smart contract
  • 4 篇 differential pri...
  • 4 篇 granular computi...
  • 4 篇 data models
  • 4 篇 deep reinforceme...
  • 3 篇 simulation
  • 3 篇 wireless communi...

机构

  • 13 篇 key laboratory o...
  • 11 篇 school of cybers...
  • 9 篇 state key labora...
  • 8 篇 key laboratory o...
  • 8 篇 chongqing key la...
  • 6 篇 school of data s...
  • 6 篇 school of cybers...
  • 6 篇 chongqing key la...
  • 5 篇 state key labora...
  • 5 篇 inner mongolia k...
  • 4 篇 school of comput...
  • 4 篇 institute for ne...
  • 4 篇 key laboratory o...
  • 4 篇 chongqing key la...
  • 4 篇 college of compu...
  • 4 篇 college of compu...
  • 4 篇 school of cyber ...
  • 4 篇 college of compu...
  • 3 篇 zhejiang univers...
  • 3 篇 key laboratory o...

作者

  • 15 篇 wang guoyin
  • 8 篇 xia shuyin
  • 8 篇 xiao bin
  • 6 篇 yuling chen
  • 6 篇 yixian yang
  • 6 篇 li weisheng
  • 6 篇 chen yuling
  • 6 篇 tao li
  • 5 篇 li leixiao
  • 5 篇 qiao xiaoyu
  • 5 篇 weisheng li
  • 5 篇 wan jianxiong
  • 5 篇 huang yuping
  • 4 篇 guoyin wang
  • 4 篇 yang lijian
  • 4 篇 xiaobin qian
  • 4 篇 bin xiao
  • 4 篇 zhang qinghua
  • 4 篇 liu chuyi
  • 3 篇 yuping huang

语言

  • 117 篇 英文
  • 12 篇 其他
  • 1 篇 中文
检索条件"机构=Key Laboratory of Cyberspace and Data Security"
130 条 记 录,以下是1-10 订阅
排序:
Block-gram:Mining knowledgeable features for efficiently smart contract vulnerability detection
收藏 引用
Digital Communications and Networks 2025年 第1期11卷 1-12页
作者: Xueshuo Xie Haolong Wang Zhaolong Jian Yaozheng Fang Zichun Wang Tao Li Tianjin Key Laboratory of Network and Data Security Technology TianjinChina College of Computer Science Nankai UniversityTianjinChina Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province China State Key Laboratory of Computer Architecture Institute of Computing TechnologyChinese Academy of SciencesChina
Smart contracts are widely used on the blockchain to implement complex transactions,such as decentralized applications on *** vulnerability detection of large-scale smart contracts is critical,as attacks on smart cont... 详细信息
来源: 评论
Enhancing Adversarial Example Transferability via Regularized Constrained Feature Layer
收藏 引用
Computers, Materials & Continua 2025年 第4期83卷 157-175页
作者: Xiaoyin Yi Long Chen Jiacheng Huang Ning Yu Qian Huang School of Computer Science and Technology Chongqing University of Posts and TelecommunicationsChongqing400065China Chongqing Key Laboratory of Public Big Data Security Technology Chongqing401420China School of Cyber Security and Information Law Chongqing University of Posts and TelecommunicationsChongqing400065China Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of EducationChongqing400065China Artificial Intelligence and Big Data College Chongqing Polytechnic University of Electronic TechnologyChongqing401331China
Transfer-based Adversarial Attacks(TAAs)can deceive a victim model even without prior *** is achieved by leveraging the property of adversarial *** is,when generated from a surrogate model,they retain their features i... 详细信息
来源: 评论
DPIC: Decoupling Prompt and Intrinsic Characteristics for LLM Generated Text Detection  38
DPIC: Decoupling Prompt and Intrinsic Characteristics for LL...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Yu, Xiao Qi, Yuang Chen, Kejiang Chen, Guoqiang Yang, Xi Zhu, Pengyuan Shang, Xiuwei Zhang, Weiming Yu, Nenghai University of Science and Technology of China China Key Laboratory of Cyberspace Security Ministry of Education China Hefei High-dimensional Data Technology China
Large language models (LLMs) have the potential to generate texts that pose risks of misuse, such as plagiarism, planting fake reviews on e-commerce platforms, or creating inflammatory false tweets. Consequently, dete...
来源: 评论
Aggregation-based dual heterogeneous task allocation in spatial crowdsourcing
收藏 引用
Frontiers of Computer Science 2024年 第6期18卷 215-227页
作者: Xiaochuan LIN Kaimin WEI Zhetao LI Jinpeng CHEN Tingrui PEI College of Information Science and Technology&Cyberspace Security Jinan UniversityGuangzhou 510632China National&Local Joint Engineering Research Center of Network Security Detection and Protection Technology Guangzhou 510632China Guangdong Provincial Key Laboratory of Data Security and Privacy Protection Guangzhou 510632China School of Computer Science Beijing University of Posts and TelecommunicationsBeijing 100876China
Spatial crowdsourcing(SC)is a popular data collection paradigm for numerous *** the increment of tasks and workers in SC,heterogeneity becomes an unavoidable difficulty in task *** researches only focus on the single-... 详细信息
来源: 评论
Subsampling Decomposition based k-Space Refinement for Accelerated MRI Reconstruction
Subsampling Decomposition based k-Space Refinement for Accel...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Qiao, Xiaoyu Li, Weisheng Xiao, Bin Huang, Yuping Yang, Lijian Chongqing Key Laboratory of Image Cognition Chongqing University of Posts and Telecommunications Chongqing China Key Laboratory of Cyberspace Big Data Intelligent Security Chongqing University of Posts and Telecommunications Ministry of Education Chongqing China
In accelerated MRI reconstruction problem, directly recovering all the missing k-space data from undersampled measurements is highly ill-posed and often leads to suboptimal performance. To address the problem, we prop... 详细信息
来源: 评论
Learning Preconditioners in Gates-controlled Deep Unfolding Networks based on Quasi-Newton Methods For Accelerated MRI Reconstruction
Learning Preconditioners in Gates-controlled Deep Unfolding ...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Qiao, Xiaoyu Li, Weisheng Xiao, Bin Huang, Yuping Yang, Lijian Chongqing Key Laboratory of Image Cognition Chongqing University of Posts and Telecommunications Chongqing China Key Laboratory of Cyberspace Big Data Intelligent Security Chongqing University of Posts and Telecommunications Ministry of Education Chongqing China
Deep unfolding networks (DUNs) have made significant progress in MRI reconstruction, successfully tackling the problem of prolonged imaging time. However, the ill-conditioned nature of MRI reconstruction often causes ... 详细信息
来源: 评论
Stacking U-Nets in U-shape: Redesigning the Information Flow in Model-based Networks for MRI Reconstruction
Stacking U-Nets in U-shape: Redesigning the Information Flow...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Qiao, Xiaoyu Li, Weisheng Xiao, Bin Huang, Yuping Yang, Lijian Chongqing Key Laboratory of Image Cognition Chongqing University of Posts and Telecommunications Chongqing China Key Laboratory of Cyberspace Big Data Intelligent Security Chongqing University of Posts and Telecommunications Ministry of Education Chongqing China
Model-based networks have shown convincing performance in MRI reconstruction. However, the unrolled cascades within the networks are constrained to solely obtain information from the preceding counterpart, resulting i... 详细信息
来源: 评论
Research on the Parallel SM4-OFB Acceleration Based on Multiple Rounds of Iteration  3
Research on the Parallel SM4-OFB Acceleration Based on Multi...
收藏 引用
3rd International Conference on Artificial Intelligence and Computer Information Technology, AICIT 2024
作者: Han, Ya Wang, Mingsheng Li, Yongqiang Ren, Lifeng Institute of Information Engineering CAS Key Laboratory of Cyberspace Security Defense Beijing China Chongqing Research Institute of Big Data Peking University Chongqing China
In OFB mode, the output of the cryptographic algorithm is fed back to the input of the cryptographic algorithm. The OFB mode does not directly encrypt plaintext through cryptographic algorithms, but generates cipherte... 详细信息
来源: 评论
Enhancing graph representation learning via type-aware decoupling and node influence allocation
收藏 引用
Applied Intelligence 2025年 第6期55卷 1-14页
作者: Zhu, Guochang Hu, Jun Liu, Li Zhang, Qinghua Wang, Guoyin School of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongwen Road Chongqing Chongqing400065 China Chongqing Key Laboratory of Computational Intelligence Chongqing University of Posts and Telecommunications Chongwen Road Chongqing Chongqing400065 China Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education Chongqing400065 China
The traditional graph representation methods can fit the information of graph with low-dimensional vectors, but they cannot interpret their composition, resulting in insufficient security. Graph decoupling, as a metho... 详细信息
来源: 评论
Decode the Dark Side of the Language: Applications of LLMs in the Dark Web  9
Decode the Dark Side of the Language: Applications of LLMs i...
收藏 引用
9th IEEE International Conference on data Science in cyberspace, DSC 2024
作者: Chen, Hongfan Diao, Yigang Xiang, Hui Huo, Yixuan Xie, Xiaqing Zhao, Jiapeng Wang, Xuebin Sun, Yanwei Shi, Jinqiao Beijing University of Posts and Telecommunications School of Cyberspace Security Beijing China Zhejiang University The State Key Laboratory of Blockchain and Data Security Hangzhou China Beijing China Data and Technology Support Center Cyberspace Administration of China Beijing China Chinese Academy of Sciences Institute of Information Engineering Beijing China
Previous studies have discovered that Transformers pre-trained on large scale datasets have a great advantage over traditional methods and can achieve human-level performance in many NLP tasks. Various encoder-only mo... 详细信息
来源: 评论