咨询与建议

限定检索结果

文献类型

  • 69 篇 会议
  • 61 篇 期刊文献

馆藏范围

  • 130 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 96 篇 工学
    • 79 篇 计算机科学与技术...
    • 65 篇 软件工程
    • 22 篇 信息与通信工程
    • 17 篇 电气工程
    • 15 篇 控制科学与工程
    • 8 篇 电子科学与技术(可...
    • 7 篇 生物工程
    • 5 篇 光学工程
    • 5 篇 建筑学
    • 5 篇 生物医学工程(可授...
    • 4 篇 土木工程
    • 4 篇 安全科学与工程
    • 4 篇 网络空间安全
    • 3 篇 机械工程
    • 3 篇 化学工程与技术
    • 3 篇 交通运输工程
  • 32 篇 理学
    • 19 篇 数学
    • 9 篇 统计学(可授理学、...
    • 8 篇 生物学
    • 7 篇 物理学
    • 3 篇 系统科学
  • 24 篇 管理学
    • 17 篇 管理科学与工程(可...
    • 8 篇 图书情报与档案管...
    • 4 篇 工商管理
  • 8 篇 法学
    • 6 篇 法学
    • 2 篇 社会学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 4 篇 医学
    • 4 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 公共卫生与预防医...
  • 1 篇 军事学

主题

  • 7 篇 federated learni...
  • 6 篇 optimization
  • 5 篇 data privacy
  • 5 篇 speech processin...
  • 5 篇 blockchain
  • 5 篇 sensors
  • 5 篇 privacy
  • 4 篇 compressed sensi...
  • 4 篇 deep learning
  • 4 篇 magnetic resonan...
  • 4 篇 anomaly detectio...
  • 4 篇 signal processin...
  • 4 篇 contrastive lear...
  • 4 篇 smart contract
  • 4 篇 differential pri...
  • 4 篇 granular computi...
  • 4 篇 data models
  • 4 篇 deep reinforceme...
  • 3 篇 simulation
  • 3 篇 wireless communi...

机构

  • 13 篇 key laboratory o...
  • 11 篇 school of cybers...
  • 9 篇 state key labora...
  • 8 篇 key laboratory o...
  • 8 篇 chongqing key la...
  • 6 篇 school of data s...
  • 6 篇 school of cybers...
  • 6 篇 chongqing key la...
  • 5 篇 state key labora...
  • 5 篇 inner mongolia k...
  • 4 篇 school of comput...
  • 4 篇 institute for ne...
  • 4 篇 key laboratory o...
  • 4 篇 chongqing key la...
  • 4 篇 college of compu...
  • 4 篇 college of compu...
  • 4 篇 school of cyber ...
  • 4 篇 college of compu...
  • 3 篇 zhejiang univers...
  • 3 篇 key laboratory o...

作者

  • 15 篇 wang guoyin
  • 8 篇 xia shuyin
  • 8 篇 xiao bin
  • 6 篇 yuling chen
  • 6 篇 yixian yang
  • 6 篇 li weisheng
  • 6 篇 chen yuling
  • 6 篇 tao li
  • 5 篇 li leixiao
  • 5 篇 qiao xiaoyu
  • 5 篇 weisheng li
  • 5 篇 wan jianxiong
  • 5 篇 huang yuping
  • 4 篇 guoyin wang
  • 4 篇 yang lijian
  • 4 篇 xiaobin qian
  • 4 篇 bin xiao
  • 4 篇 zhang qinghua
  • 4 篇 liu chuyi
  • 3 篇 yuping huang

语言

  • 117 篇 英文
  • 12 篇 其他
  • 1 篇 中文
检索条件"机构=Key Laboratory of Cyberspace and Data Security"
130 条 记 录,以下是91-100 订阅
排序:
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities  24
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
44th ACM/IEEE International Conference on Software Engineering, ICSE 2024
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hong Kong Jin YinHu Laboratory Wuhan China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China University of Colorado Colorado Springs Department of Computer Science Colorado Springs Colorado United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
A robust three-way classifier with shadowed granular-balls based on justifiable granularity
arXiv
收藏 引用
arXiv 2024年
作者: Yang, Jie Xiaodiao, Lingyun Wang, Guoyin Pedrycz, Witold Xia, Shuyin Zhang, Qinghua Wu, Di The Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education Chongqing University of Posts and Telecommunications Chongqing400065 China The School of Physics and Electronic Science Zunyi Normal University Zunyi563002 China The Key Laboratory of Cyberspace Big Data Intelligent Security Chongqing University of Posts and Telecommunications Chongqing400065 China The Department of Electrical and Computer Engineering University of Alberta EdmontonAB Canada College of Computer and Information Science Southwest University Chongqing400715 China
The granular-ball (GB)-based classifier introduced by Xia, exhibits adaptability in creating coarse-grained information granules for input, thereby enhancing its generality and flexibility. Nevertheless, the current G... 详细信息
来源: 评论
PRAD: Unsupervised KPI Anomaly Detection by Joint Prediction and Reconstruction of Multivariate Time Series  19
PRAD: Unsupervised KPI Anomaly Detection by Joint Prediction...
收藏 引用
2022 IEEE SmartWorld, 19th IEEE International Conference on Ubiquitous Intelligence and Computing, 2022 IEEE International Conference on Autonomous and Trusted Vehicles Conference, 22nd IEEE International Conference on Scalable Computing and Communications, 2022 IEEE International Conference on Digital Twin, 8th IEEE International Conference on Privacy Computing and 2022 IEEE International Conference on Metaverse, SmartWorld/UIC/ATC/ScalCom/DigitalTwin/PriComp/Metaverse 2022
作者: Xiong, Zhiying Fan, Qilin Wang, Kai Li, Xiuhua Zhang, Xu Xiong, Qingyu Chongqing University School of Big Data and Software Engineering Chongqing China Chongqing University Chongqing Key Laboratory of Digital Cinema Art Theory and Technology Chongqing China Harbin Institute of Technology School of Computer Science and Technology Weihai China Harbin Institute of Technology Research Institute of Cyberspace Security Weihai China Haihe Laboratory of Information Technology Application Innovation Tianjin China University of Exeter Department of Computer Science Exeter United Kingdom
Detecting anomalies for key performance indicator (KPI) data is of paramount importance to ensure the quality and reliability of network services. However, building the anomaly detection system for KPI is challenging ... 详细信息
来源: 评论
PP-LDG: A Medical Privacy-Preserving Labeled data Generation Framework
PP-LDG: A Medical Privacy-Preserving Labeled Data Generation...
收藏 引用
Medical Artificial Intelligence (MedAI), IEEE International Conference on
作者: Haoxiang Yuan Xiaochen Yuan Xiuli Bi Weisheng Li Guoyin Wang Bin Xiao Chongqing Key Laboratory of Image Cognition School of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing China Faculty of Applied Sciences Macao Polytechnic University Macao China Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education Chongqing China
The rapid development of deep learning has led to an increasing demand for data. However, such data are scarce in many fields and often contain private and sensitive information, such as medical images. The fact that ... 详细信息
来源: 评论
Identifying data Breaches in Dark Web through Prompt Active Learning
Identifying Data Breaches in Dark Web through Prompt Active ...
收藏 引用
IEEE International Conference on data Science in cyberspace (DSC)
作者: Hui Xiang Yifan Wu Xuebin Wang Jinqiao Shi Can Zhao Jiapeng Zhao School of Cyberspace Security Beijing University of Posts and Telecommunications Beijing China The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Institute of Information Engineering Chinese Academy of Sciences Beijing China
Frequent data breaches have attracted people’s attention. The dark web forums have become the crucial platform for data breach transactions. While some forums are well-organized with distinct sections, such as a dedi... 详细信息
来源: 评论
MCU-Net: A Multi-prior Collaborative Deep Unfolding Network with Gates-controlled Spatial Attention for Accelerated MR Image Reconstruction
arXiv
收藏 引用
arXiv 2024年
作者: Qiao, Xiaoyu Li, Weisheng Wang, Guofen Huang, Yuping Chongqing Key Laboratory of Image Cognition Chongqing University of Posts and Telecommunications Chongqing China Key Laboratory of Cyberspace Big Data Intelligent Security Chongqing University of Posts and Telecommunications Ministry of Education Chongqing China College of Computer and Information Science Chongqing Normal University Chongqing China
Deep unfolding networks (DUNs) have demonstrated significant potential in accelerating magnetic resonance imaging (MRI). However, they often encounter high computational costs and slow convergence rates. Besides, they... 详细信息
来源: 评论
A Synchronous Parallel Method with Parameters Communication Prediction for Distributed Machine Learning  19th
A Synchronous Parallel Method with Parameters Communication...
收藏 引用
19th EAI International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2023
作者: Zeng, Yanguo Xue, Meiting Xu, Peiran Shi, Yukun Zeng, Kaisheng Zhang, Jilin Yue, Lupeng School of Computer Science and Technology Hangzhou Dianzi University Hangzhou310018 China Key Laboratory for Modeling and Simulation of Complex Systems Ministry of Education Hangzhou310018 China Data Security Governance Zhejiang Engineering Research Center Hangzhou310018 China National University of Defense Technology Changsha China School of Cyberspace HangZhou Dianzi University Hangzhou China Department of Computer Science and Technology Tsinghua University Beijing China
With the development of machine learning technology in various fields, such as medical care, smart manufacturing, etc., the data has exploded. It is a challenge to train a deep learning model for different application... 详细信息
来源: 评论
PSSPR: A Source Location Privacy Protection Scheme Based on Sector Phantom Routing in WSNs
PSSPR: A Source Location Privacy Protection Scheme Based on ...
收藏 引用
IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC)
作者: Jing Sun Yuling Chen Tao Li Jia Liu Yixian Yang State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang China Air Force Engineering University Xi'an China School of Cyberspace Security Beijing University of Posts and Telecommnuications Beijing China
Source location privacy, occupying an unshakable status in wireless sensor networks, has a profound influence on the widespread application of wireless sensor networks (WSNs). Most privacy policies that introduce phan... 详细信息
来源: 评论
Locally Private Estimator for Degree Distribution with Laplacian Mechanism
Locally Private Estimator for Degree Distribution with Lapla...
收藏 引用
Smart World Congress (SWC), IEEE
作者: Jiayu Li Yuke Hu Xiaoguang Li Shiqi Zhou Yuxiang Wang Fenghua Li Ben Niu Chinese Academy of Sciences Institute of Information Engineering P.R. China School of Cyber Security University of Chinese Academy of Sciences P.R. China Key Laboratory of Cyberspace Security Defense P.R. China The State Key Laboratory of Blockchain and Data Security Zhejiang University P.R. China School of Cyber Engineering Xidian University P.R. China
Local differential privacy (LDP) provides a solution such that an untrusted server can achieve privacy-preserving data analysis. Node degree is one of the most fundamental metrics in graph data analysis. Existing LDP-... 详细信息
来源: 评论
Cloud-assisted Road Condition Monitoring with Privacy Protection in VANETs
Cloud-assisted Road Condition Monitoring with Privacy Protec...
收藏 引用
International Conference on Mobile Ad-hoc and Sensor Networks, MSN
作者: Lemei Da Yujue Wang Yong Ding Bo Qin Xiaochun Zhou Hai Liang Huiyong Wang Guangxi Key Laboratory of Cryptography and Information Security School of Computer Science and Information Security Guilin University of Electronic Technology Guilin China Pengcheng Laboratory Cyberspace Security Research Center Shenzhen China Key Laboratory of Data Engineering and Knowledge Engineering Ministry of Education School of Information Renmin University of China Beijing China Shenzhen Olym Information Security Technology Co. Ltd. Shenzhen China School of Mathematics and Computing Science Guilin University of Electronic Technology Guilin China
Vehicular ad hoc network (VANET) is one of the fastest developing technologies in intelligent transportation systems (ITS), which has made great contributions to improving traffic congestion and reducing traffic accid... 详细信息
来源: 评论