咨询与建议

限定检索结果

文献类型

  • 69 篇 会议
  • 61 篇 期刊文献

馆藏范围

  • 130 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 96 篇 工学
    • 79 篇 计算机科学与技术...
    • 65 篇 软件工程
    • 22 篇 信息与通信工程
    • 17 篇 电气工程
    • 15 篇 控制科学与工程
    • 8 篇 电子科学与技术(可...
    • 7 篇 生物工程
    • 5 篇 光学工程
    • 5 篇 建筑学
    • 5 篇 生物医学工程(可授...
    • 4 篇 土木工程
    • 4 篇 安全科学与工程
    • 4 篇 网络空间安全
    • 3 篇 机械工程
    • 3 篇 化学工程与技术
    • 3 篇 交通运输工程
  • 32 篇 理学
    • 19 篇 数学
    • 9 篇 统计学(可授理学、...
    • 8 篇 生物学
    • 7 篇 物理学
    • 3 篇 系统科学
  • 24 篇 管理学
    • 17 篇 管理科学与工程(可...
    • 8 篇 图书情报与档案管...
    • 4 篇 工商管理
  • 8 篇 法学
    • 6 篇 法学
    • 2 篇 社会学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 4 篇 医学
    • 4 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 公共卫生与预防医...
  • 1 篇 军事学

主题

  • 7 篇 federated learni...
  • 6 篇 optimization
  • 5 篇 data privacy
  • 5 篇 speech processin...
  • 5 篇 blockchain
  • 5 篇 sensors
  • 5 篇 privacy
  • 4 篇 compressed sensi...
  • 4 篇 deep learning
  • 4 篇 magnetic resonan...
  • 4 篇 anomaly detectio...
  • 4 篇 signal processin...
  • 4 篇 contrastive lear...
  • 4 篇 smart contract
  • 4 篇 differential pri...
  • 4 篇 granular computi...
  • 4 篇 data models
  • 4 篇 deep reinforceme...
  • 3 篇 simulation
  • 3 篇 wireless communi...

机构

  • 13 篇 key laboratory o...
  • 11 篇 school of cybers...
  • 9 篇 state key labora...
  • 8 篇 key laboratory o...
  • 8 篇 chongqing key la...
  • 6 篇 school of data s...
  • 6 篇 school of cybers...
  • 6 篇 chongqing key la...
  • 5 篇 state key labora...
  • 5 篇 inner mongolia k...
  • 4 篇 school of comput...
  • 4 篇 institute for ne...
  • 4 篇 key laboratory o...
  • 4 篇 chongqing key la...
  • 4 篇 college of compu...
  • 4 篇 college of compu...
  • 4 篇 school of cyber ...
  • 4 篇 college of compu...
  • 3 篇 zhejiang univers...
  • 3 篇 key laboratory o...

作者

  • 15 篇 wang guoyin
  • 8 篇 xia shuyin
  • 8 篇 xiao bin
  • 6 篇 yuling chen
  • 6 篇 yixian yang
  • 6 篇 li weisheng
  • 6 篇 chen yuling
  • 6 篇 tao li
  • 5 篇 li leixiao
  • 5 篇 qiao xiaoyu
  • 5 篇 weisheng li
  • 5 篇 wan jianxiong
  • 5 篇 huang yuping
  • 4 篇 guoyin wang
  • 4 篇 yang lijian
  • 4 篇 xiaobin qian
  • 4 篇 bin xiao
  • 4 篇 zhang qinghua
  • 4 篇 liu chuyi
  • 3 篇 yuping huang

语言

  • 117 篇 英文
  • 12 篇 其他
  • 1 篇 中文
检索条件"机构=Key Laboratory of Cyberspace and Data Security"
130 条 记 录,以下是101-110 订阅
排序:
Enabling Efficient and Secure Health data Sharing for Healthcare Iot Systems
SSRN
收藏 引用
SSRN 2023年
作者: Zhu, Liehuang Xie, Yumeng Zhou, Yuao Fan, Qing Zhang, Chuan Liu, Ximeng School of Cyberspace Science and Technology Beijing Institute of Technology Beijing100081 China College of Computer and Data Science Fuzhou University Fuzhou350108 China Fujian Provincial Key Laboratory of Information Security of Network Systems Fuzhou350108 China
The Healthcare Internet of Things (HIoT) system enables remote monitor patient health state and feedback on medical treatments timely. The success of HIoT relies on how to share health data securely and efficiently. E... 详细信息
来源: 评论
Using information entropy to analyze secure multi-party computation protocol
Using information entropy to analyze secure multi-party comp...
收藏 引用
IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC)
作者: Yun Luo Yuling Chen Tao Li Yilei Wang Yixian Yang State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang China School of Computer Science Qufu Normal University Rizhao China School of Cyberspace Security Beijing University of Posts and Telecommunications Beijing China
Secure multi-party computation(SMPC) is an important research field in cryptography, secure multi-party computation has a wide range of applications in practice. Accordingly, information security issues have arisen. A... 详细信息
来源: 评论
A Comprehensive System for 3d Display: From Image Capture to Autostereoscopic Playback-Recommended by Chinamm
SSRN
收藏 引用
SSRN 2023年
作者: Wen, Chen Di, Zhang Ma, JingJing Wu, GuoWen School of Data Science and Media Intelligence Communication University of China Beijing100024 China National Key Laboratory of Media Convergence and Communication School of Data Science and Media Intelligence Communication University of China Beijing100024 China School of Computer and Cyberspace Security Communication University of China Beijing100024 China
The production and playback processes involved in rendering 3D content exhibit a notable degree of intricacy and inefficiency. This article presents a comprehensive array of remedies aimed at addressing challenges per... 详细信息
来源: 评论
Model-Based Throughput Optimization for Blockchain Sharding System
Model-Based Throughput Optimization for Blockchain Sharding ...
收藏 引用
International Symposium on Parallel and Distributed Processing with Applications, ISPA
作者: Yifan Li Jianxiong Wan Chuyi Liu Leixiao Li School of Data Science and Application Inner Mongolia University of Technology Hohhot China Inner Mongolia Key Laboratory of Beijiang Cyberspace Security Hohhot China Research Center of Large-Scale Energy Storage Technologies Ministry of Education of the People’s Republic of China
The throughput issue has become an urgent problem for large-scale application of blockchain technology. Sharding technology can improve system throughput and scalability. Current research on the optimal blockchain sha... 详细信息
来源: 评论
Effect of heterogeneous risk perception on information diffusion, behavior change, and disease transmission
收藏 引用
Physical Review E 2020年 第4期102卷 042314-042314页
作者: Yang Ye Qingpeng Zhang Zhongyuan Ruan Zhidong Cao Qi Xuan Daniel Dajun Zeng School of Data Science City University of Hong Kong Hong Kong SAR China Institute of Cyberspace Security Zhejiang University of Technology Hangzhou Zhejiang China State Key Laboratory of Management and Control for Complex Systems Institute of Automation Chinese Academy of Sciences Beijing China School of Artificial Intelligence University of Chinese Academy of Sciences Beijing China Shenzhen Artificial Intelligence and Data Science Institute Shenzhen Guangdong China
Motivated by the importance of individual differences in risk perception and behavior change in people's responses to infectious disease outbreaks (particularly the ongoing COVID-19 pandemic), we propose a heterog... 详细信息
来源: 评论
Collaborative Resource Allocation for Blockchain-Enabled Internet of Things with Multi-Agent Deep Reinforcement Learning
Collaborative Resource Allocation for Blockchain-Enabled Int...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Xinyu Lu Jianxiong Wan Leixiao Li Chuyi Liu Xiaowei Si School of Data Science and Application Inner Mongolia University of Technology Hohhot China Inner Mongolia Key Laboratory of Beijiang Cyberspace Security Ho-hhot China Research Center of Large-Scale Energy Storage Technologies Ministry of Education of the People's Republic of China
Mobile Edge Computing (MEC) reduces service latency and enhances Quality of Service (QoS) by offloading tasks to the wireless network edge. However, the rapid growth of task offloading and the associated data transmis... 详细信息
来源: 评论
Quantum adversarial metric learning model based on triplet loss function
arXiv
收藏 引用
arXiv 2023年
作者: Hou, Yan-Yan Li, Jian Chen, Xiu-Bo Ye, Chong-Qiang School of Artificial Intelligence Beijing University of Posts and Telecommunications Beijing100876 China College of Information Science and Engineering ZaoZhuang University ZaoZhuang Shandong277160 China School of Cyberspace Security Security Beijing University of Posts Telecommunications Beijing100876 China Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Post and Telecommunications Beijing100876 China GuiZhou University Guizhou Provincial Key Laboratory of Public Big Data Guizhou Guiyang 550025 China
Metric learning plays an essential role in image analysis and classification, and it has attracted more and more attention. In this paper, we propose a quantum adversarial metric learning (QAML) model based on the tri... 详细信息
来源: 评论
A hybrid quantum-classical classifier based on branching multi-scale entanglement renormalization ansatz
arXiv
收藏 引用
arXiv 2023年
作者: Hou, Yan-Yan Li, Jian Chen, Xiu-Bo Ye, Chong-Qiang School of Artificial Intelligence Beijing University of Posts and Telecommunications Beijing100876 China College of Information Science and Engineering ZaoZhuang University Shandong Zaozhuang277160 China School of Cyberspace Security Security Beijing University of Posts Telecommunications Beijing100876 China Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Post and Telecommunications Beijing100876 China GuiZhou University Guizhou Provincial Key Laboratory of Public Big Data Guizhou Guiyang550025 China
Metric learning plays an essential role in image analysis and classification, and it has attracted more and more attention. In this paper, we propose a quantum adversarial metric learning (QAML) model based on the tri... 详细信息
来源: 评论
Gnn-Mgrpool: Enhanced Graph Neural Networks with Multi-Granularity Pooling for Graph Classification
SSRN
收藏 引用
SSRN 2023年
作者: Sun, Haichao Wang, Guoyin Liu, Qun Guo, Yike Chongqing Key Laboratory of Computational Intelligence Chongqing University of Posts and Telecommunications Chongqing400065 China Key Laboratory of Big Data Intelligent Computing Chongqing University of Posts and Telecommunications Chongqing400065 China Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education Chongqing University of Posts and Telecommunications Chongqing400065 China Department of Computer Science and Engineering The Hong Kong University of Science and Technology 999077 Hong Kong School of Computer Engineering and Science Shanghai University Shanghai200444 China
Graph neural networks (GNNs) have gained significant attention and have been applied in various domain tasks. Currently, numerous pooling approaches have been proposed to aggregate node features and obtain node embedd... 详细信息
来源: 评论
A New Multi-Receiver Authentication Scheme for General Access Structure
A New Multi-Receiver Authentication Scheme for General Acces...
收藏 引用
IEEE International Symposium on Information Theory
作者: Jing Yang Shu-Tao Xia Xianfang Wang Can Xiang Fang-Wei Fu Tsinghua Shenzhen International Graduate School Tsinghua University Shenzhen Guangdong China CETC Cyberspace Security Technology Co. Ltd. Beijing China College of Mathematics and Informatics South China Agricultural University Guangzhou Guangdong China Tianjin Key Laboratory of Network and Data Security Technology Chern Institute of Mathematics and LPMC Nankai University Tianjin China
At present, existing multi-receiver authentication (MRA) schemes can only handle situations where the capabilities of all receivers are the same. However, in reality, different receivers may need to have different sto... 详细信息
来源: 评论