咨询与建议

限定检索结果

文献类型

  • 69 篇 会议
  • 61 篇 期刊文献

馆藏范围

  • 130 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 96 篇 工学
    • 79 篇 计算机科学与技术...
    • 65 篇 软件工程
    • 22 篇 信息与通信工程
    • 17 篇 电气工程
    • 15 篇 控制科学与工程
    • 8 篇 电子科学与技术(可...
    • 7 篇 生物工程
    • 5 篇 光学工程
    • 5 篇 建筑学
    • 5 篇 生物医学工程(可授...
    • 4 篇 土木工程
    • 4 篇 安全科学与工程
    • 4 篇 网络空间安全
    • 3 篇 机械工程
    • 3 篇 化学工程与技术
    • 3 篇 交通运输工程
  • 32 篇 理学
    • 19 篇 数学
    • 9 篇 统计学(可授理学、...
    • 8 篇 生物学
    • 7 篇 物理学
    • 3 篇 系统科学
  • 24 篇 管理学
    • 17 篇 管理科学与工程(可...
    • 8 篇 图书情报与档案管...
    • 4 篇 工商管理
  • 8 篇 法学
    • 6 篇 法学
    • 2 篇 社会学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 4 篇 医学
    • 4 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 公共卫生与预防医...
  • 1 篇 军事学

主题

  • 7 篇 federated learni...
  • 6 篇 optimization
  • 5 篇 data privacy
  • 5 篇 speech processin...
  • 5 篇 blockchain
  • 5 篇 sensors
  • 5 篇 privacy
  • 4 篇 compressed sensi...
  • 4 篇 deep learning
  • 4 篇 magnetic resonan...
  • 4 篇 anomaly detectio...
  • 4 篇 signal processin...
  • 4 篇 contrastive lear...
  • 4 篇 smart contract
  • 4 篇 differential pri...
  • 4 篇 granular computi...
  • 4 篇 data models
  • 4 篇 deep reinforceme...
  • 3 篇 simulation
  • 3 篇 wireless communi...

机构

  • 13 篇 key laboratory o...
  • 11 篇 school of cybers...
  • 9 篇 state key labora...
  • 8 篇 key laboratory o...
  • 8 篇 chongqing key la...
  • 6 篇 school of data s...
  • 6 篇 school of cybers...
  • 6 篇 chongqing key la...
  • 5 篇 state key labora...
  • 5 篇 inner mongolia k...
  • 4 篇 school of comput...
  • 4 篇 institute for ne...
  • 4 篇 key laboratory o...
  • 4 篇 chongqing key la...
  • 4 篇 college of compu...
  • 4 篇 college of compu...
  • 4 篇 school of cyber ...
  • 4 篇 college of compu...
  • 3 篇 zhejiang univers...
  • 3 篇 key laboratory o...

作者

  • 15 篇 wang guoyin
  • 8 篇 xia shuyin
  • 8 篇 xiao bin
  • 6 篇 yuling chen
  • 6 篇 yixian yang
  • 6 篇 li weisheng
  • 6 篇 chen yuling
  • 6 篇 tao li
  • 5 篇 li leixiao
  • 5 篇 qiao xiaoyu
  • 5 篇 weisheng li
  • 5 篇 wan jianxiong
  • 5 篇 huang yuping
  • 4 篇 guoyin wang
  • 4 篇 yang lijian
  • 4 篇 xiaobin qian
  • 4 篇 bin xiao
  • 4 篇 zhang qinghua
  • 4 篇 liu chuyi
  • 3 篇 yuping huang

语言

  • 117 篇 英文
  • 12 篇 其他
  • 1 篇 中文
检索条件"机构=Key Laboratory of Cyberspace and Data Security"
130 条 记 录,以下是101-110 订阅
排序:
A Fast Two-Stage Black-Box Deep Learning Network Attacking Method Based on Cross-Correlation
收藏 引用
Computers, Materials & Continua 2020年 第7期64卷 623-635页
作者: Deyin Li Mingzhi Cheng Yu Yang Min Lei Linfeng Shen State Key Laboratory of Public Big Data Guizhou UniversityGuiyang550025China School of Cyberspace Security Beijing University of Posts and TelecommunicationsBeijing100876China College of New Media Beijing Institute of Graphic CommunicationBeijing102600China School of Computing Science Simon Fraser UniversityBurnabyCanada
Deep learning networks are widely used in various systems that require ***,deep learning networks are vulnerable to adversarial *** study on adversarial attacks plays an important role in ***-box attacks require less ... 详细信息
来源: 评论
Privacy Protection Algorithm for the Internet of Vehicles Based on Local Differential Privacy and Game Model
收藏 引用
Computers, Materials & Continua 2020年 第8期64卷 1025-1038页
作者: Wenxi Han Mingzhi Cheng Min Lei Hanwen Xu Yu Yang Lei Qian Guizhou Provincial Key Laboratory of Public Big Data Guizhou UniversityGuiyang550025China School of Cyberspace Security Beijing University of Posts and TelecommunicationsBeijing100876China College of New Media Beijing Institute of Graphic CommunicationBeijing102600China School of Computer Science The University of AucklandAucklandNew Zealand
In recent years,with the continuous advancement of the intelligent process of the Internet of Vehicles(IoV),the problem of privacy leakage in IoV has become increasingly *** research on the privacy protection of the I... 详细信息
来源: 评论
Ads-Cnn: Adaptive dataflow Scheduling for Lightweight Cnn Accelerator on Fpgas
SSRN
收藏 引用
SSRN 2023年
作者: Wan, Yi Xie, Xianzhong Chen, Junfan Xie, Kunpeng Yi, Dezhi Lu, Ye Gai, Keke The College of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing400065 China Chongqing Haiyunjiexun Technology Co. Ltd Chongqing China The College of Computer Science Nankai University Tianjin300350 China The College of Cyber Science Nankai University Tianjin300350 China Tianjin Key Laboratory of Network and Data Security Technology Tianjin China State Key Laboratory of Processors ICT CAS Beijing China School of Cyberspace Science and Technology BIT Beijing China
Lightweight convolutional neural networks (CNNs) enable lower inference latency and data traffic, which are suitable for deployment on resource-constrained edge devices such as field-programmable gate arrays (FPGAs). ... 详细信息
来源: 评论
PSSPR: A source location privacy protection scheme based on sector phantom routing in WSNs
arXiv
收藏 引用
arXiv 2021年
作者: Chen, Yuling Sun, Jing Yang, Yixian Li, Tao Niu, Xinxin Zhou, Huiyu State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang China School of Cyberspace Security Beijing University of Posts and Telecommnuications Beijing China School of Informatics University of Leicester England United Kingdom Guangxi Key Laboratory of Cryptography and Information Security
Source location privacy (SLP) protection is an emerging research topic in wireless sensor networks(WSNs). Because the source location represents the valuable information of the target being monitored and tracked, it i... 详细信息
来源: 评论
Vulnerability Detection With Graph Attention Network And Metric Learning
TechRxiv
收藏 引用
TechRxiv 2022年
作者: Zhang, Chunyong Liu, Bin Fan, Qi Xin, Yang Zhu, Hongliang School of Cyberspace Security Beijing University of Posts and Telecommunications Beijing100876 China College of Information and Network Engineering Anhui Science and Technology University Bengbu233030 China State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang550025 China
Static code vulnerability detection is a critical topic in software security. Existing software analysis methods have a high rate of false positives and false negatives. Researchers are interested in employing deep le... 详细信息
来源: 评论
Inductive Subgraph Embedding for Link Prediction
arXiv
收藏 引用
arXiv 2021年
作者: Miao, Chunyu Xie, Chenxuan Zhou, Jiajun Yu, Shanqing Chen, Lina Xuan, Qi The College of Mathematics Physics and Information Engineering Zhejiang Normal University Zhejiang Jinhua310023 China The Key Laboratory of Peace-building Big Data of Zhejiang Province Hangzhou310051 China The Institute of Cyberspace Security Zhejiang University of Technology Hangzhou310023 China The Binjiang Cyberspace Security Institute of ZJUT Hangzhou310023 China
Link prediction, which aims to infer missing edges or predict future edges based on currently observed graph connections, has emerged as a powerful technique for diverse applications such as recommendation, relation c... 详细信息
来源: 评论
Preface
收藏 引用
Science China Technological Sciences 2024年
作者: Gong YiHong Wang GuoYin College of Artificial Intelligence Xi'an Jiaotong University Chongqing Key Laboratory of Computational Intelligence Chongqing University of Posts and Telecommunications Key Laboratory of Cyberspace Big Data Intelligent Security Chongqing University of Posts and Telecommunications College of Computer and Information Science Chongqing Normal University
Large AGI(artificial general intelligence) models, represented by OpenAI's GPT-4, DALL-E, Sora, etc., have amazed the world by exhibiting superior capabilities on a variety of NLP and text-to-image/video generatio...
来源: 评论
Link prediction for attribute and structure learning based on attention mechanism
收藏 引用
Applied Soft Computing 2025年 179卷
作者: Renjuan Nie Guoyin Wang Qun Liu Chengxin Peng Chongqing Key Laboratory of Computational Intelligence Chongqing University of Posts and Telecommunications Chongqing 400065 China Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education Chongqing 400065 China National Center for Applied Mathematics in Chongqing Chongqing Normal University Chongqing 401331 China
The link prediction problem within complex network analysis focus on accurately inferring future relationships between unconnected node pairs in networks. In real-world scenarios, many relationships can find effective...
来源: 评论
Deep Learning Algorithms Design and Implementation Based on Differential Privacy  3rd
Deep Learning Algorithms Design and Implementation Based on ...
收藏 引用
3rd International Conference on Machine Learning for Cyber security, ML4CS 2020
作者: Xu, Xuefeng Yao, Yanqing Cheng, Lei Key Laboratory of Aerospace Network Security Ministry of industry and information technology School of Cyberspace Science and Technology Beihang University Beijing100191 China State Key Laboratory of Software Development Environment Beihang University Beijing100191 China Beijing Key Laboratory of Network Technology Beihang University Beijing China Shenzhen Research Institute of Big Data Shenzhen518000 China
Deep learning models bear the risks of privacy leakage. Attackers can obtain sensitive information contained in training data with some techniques. However, existing differentially private methods such as Differential... 详细信息
来源: 评论
PSSPR: A Source Location Privacy Protection Scheme Based on Sector Phantom Routing in WSNs
PSSPR: A Source Location Privacy Protection Scheme Based on ...
收藏 引用
IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC)
作者: Jing Sun Yuling Chen Tao Li Jia Liu Yixian Yang State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang China Air Force Engineering University Xi'an China School of Cyberspace Security Beijing University of Posts and Telecommnuications Beijing China
Source location privacy, occupying an unshakable status in wireless sensor networks, has a profound influence on the widespread application of wireless sensor networks (WSNs). Most privacy policies that introduce phan... 详细信息
来源: 评论