咨询与建议

限定检索结果

文献类型

  • 69 篇 会议
  • 61 篇 期刊文献

馆藏范围

  • 130 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 96 篇 工学
    • 79 篇 计算机科学与技术...
    • 65 篇 软件工程
    • 22 篇 信息与通信工程
    • 17 篇 电气工程
    • 15 篇 控制科学与工程
    • 8 篇 电子科学与技术(可...
    • 7 篇 生物工程
    • 5 篇 光学工程
    • 5 篇 建筑学
    • 5 篇 生物医学工程(可授...
    • 4 篇 土木工程
    • 4 篇 安全科学与工程
    • 4 篇 网络空间安全
    • 3 篇 机械工程
    • 3 篇 化学工程与技术
    • 3 篇 交通运输工程
  • 32 篇 理学
    • 19 篇 数学
    • 9 篇 统计学(可授理学、...
    • 8 篇 生物学
    • 7 篇 物理学
    • 3 篇 系统科学
  • 24 篇 管理学
    • 17 篇 管理科学与工程(可...
    • 8 篇 图书情报与档案管...
    • 4 篇 工商管理
  • 8 篇 法学
    • 6 篇 法学
    • 2 篇 社会学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 4 篇 医学
    • 4 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 公共卫生与预防医...
  • 1 篇 军事学

主题

  • 7 篇 federated learni...
  • 6 篇 optimization
  • 5 篇 data privacy
  • 5 篇 speech processin...
  • 5 篇 blockchain
  • 5 篇 sensors
  • 5 篇 privacy
  • 4 篇 compressed sensi...
  • 4 篇 deep learning
  • 4 篇 magnetic resonan...
  • 4 篇 anomaly detectio...
  • 4 篇 signal processin...
  • 4 篇 contrastive lear...
  • 4 篇 smart contract
  • 4 篇 differential pri...
  • 4 篇 granular computi...
  • 4 篇 data models
  • 4 篇 deep reinforceme...
  • 3 篇 simulation
  • 3 篇 wireless communi...

机构

  • 13 篇 key laboratory o...
  • 11 篇 school of cybers...
  • 9 篇 state key labora...
  • 8 篇 key laboratory o...
  • 8 篇 chongqing key la...
  • 6 篇 school of data s...
  • 6 篇 school of cybers...
  • 6 篇 chongqing key la...
  • 5 篇 state key labora...
  • 5 篇 inner mongolia k...
  • 4 篇 school of comput...
  • 4 篇 institute for ne...
  • 4 篇 key laboratory o...
  • 4 篇 chongqing key la...
  • 4 篇 college of compu...
  • 4 篇 college of compu...
  • 4 篇 school of cyber ...
  • 4 篇 college of compu...
  • 3 篇 zhejiang univers...
  • 3 篇 key laboratory o...

作者

  • 15 篇 wang guoyin
  • 8 篇 xia shuyin
  • 8 篇 xiao bin
  • 6 篇 yuling chen
  • 6 篇 yixian yang
  • 6 篇 li weisheng
  • 6 篇 chen yuling
  • 6 篇 tao li
  • 5 篇 li leixiao
  • 5 篇 qiao xiaoyu
  • 5 篇 weisheng li
  • 5 篇 wan jianxiong
  • 5 篇 huang yuping
  • 4 篇 guoyin wang
  • 4 篇 yang lijian
  • 4 篇 xiaobin qian
  • 4 篇 bin xiao
  • 4 篇 zhang qinghua
  • 4 篇 liu chuyi
  • 3 篇 yuping huang

语言

  • 117 篇 英文
  • 12 篇 其他
  • 1 篇 中文
检索条件"机构=Key Laboratory of Cyberspace and Data Security"
130 条 记 录,以下是111-120 订阅
排序:
Using information entropy to analyze secure multi-party computation protocol
Using information entropy to analyze secure multi-party comp...
收藏 引用
IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC)
作者: Yun Luo Yuling Chen Tao Li Yilei Wang Yixian Yang State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang China School of Computer Science Qufu Normal University Rizhao China School of Cyberspace Security Beijing University of Posts and Telecommunications Beijing China
Secure multi-party computation(SMPC) is an important research field in cryptography, secure multi-party computation has a wide range of applications in practice. Accordingly, information security issues have arisen. A... 详细信息
来源: 评论
PRAD: Unsupervised KPI Anomaly Detection by Joint Prediction and Reconstruction of Multivariate Time Series
PRAD: Unsupervised KPI Anomaly Detection by Joint Prediction...
收藏 引用
Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, UIC-ATC
作者: Zhiying Xiong Qilin Fan Kai Wang Xiuhua Li Xu Zhang Qingyu Xiong School of Big Data and Software Engineering Chongqing University Chongqing China Chongqing Key Laboratory of Digital Cinema Art Theory and Technology Chongqing University Chongqing China School of Computer Science and Technology Harbin Institute of Technology Weihai China Research Institute of Cyberspace Security Harbin Institute of Technology Weihai China Haihe Laboratory of Information Technology Application Innovation Tianjin China Department of Computer Science University of Exeter Exeter UK
Detecting anomalies for key performance indicator (KPI) data is of paramount importance to ensure the quality and reliability of network services. However, building the anomaly detection system for KPI is challenging ...
来源: 评论
JPEGCNN: A Transform Domain Steganalysis Model Based on Convolutional Neural Network  5th
JPEGCNN: A Transform Domain Steganalysis Model Based on Conv...
收藏 引用
5th International Conference on Artificial Intelligence and security, ICAIS 2019
作者: Gan, Lin Chen, Jingjie Chen, Yuling Jin, Zhujun Han, Wenxi School of Cyberspace Security Beijing University of Posts and Telecommunications Beijing China State Key Laboratory of Public Big Data GuiZhou University Guizhou China
Convolutional Neural Network (CNN) has gained an overwhelming advantage in many fields of pattern recognition. Both excellent data learning ability and automatic feature extraction ability of CNN are urgently needed i... 详细信息
来源: 评论
A Method of Network Topology Discovery Based on Knowledge Reasoning : Based on more than heterogeneous data sources
A Method of Network Topology Discovery Based on Knowledge Re...
收藏 引用
Computer Science and Management Technology (ICCSMT), International Conference on
作者: Jun Xu Yang Xin Runcheng Liu Cyberspace Security Institute School of Beijing University of Posts and Telecommunications Beijing China Cyberspace Security Institute Beijing University of Posts and Telecommunications Beijing China Guizhou Provincial Key Laboratory of Public Big Data Guizhou University Guizhou China
At present, the network has gradually become the foundation of information construction. People have more demands for network topology management. The increasing scale of network topology and the heterogeneity between... 详细信息
来源: 评论
MSpace: Multi security namespace management for containers
Journal of Engineering Research (Kuwait)
收藏 引用
Journal of Engineering Research (Kuwait) 2025年
作者: Liang, Hao He, Gongshan Jiang, Jinhu National Digital Switching System Engineering & Technological Research Center Zhengzhou 450002 China Key Laboratory of Cyberspace Security Ministry of Education Zhengzhou 450002 China School of Computer Science Fudan University Shanghai 200438 China Institute of Big Data Fudan University Shanghai 200433 China
Existing system security frameworks like LSM are primarily designed for the operating system kernel and are not applicable to user-level container methods. This is primarily because the system security framework is de... 详细信息
来源: 评论
Dual Consistent Constraint via Disentangled Consistency and Complementarity for Multi-view Clustering
arXiv
收藏 引用
arXiv 2025年
作者: Li, Bo Yun, Jing College of Data Science and Application Inner Mongolia University of Technology Inner Mongolia Huhhot010080 China Inner Mongolia Autonomous Region Engineering and Technology Research Center of Big Data-Based Software Service Inner Mongolia Huhhot010080 China Inner Mongolia Key Laboratory of Beijiang Cyberspace Security Inner Mongolia Huhhot010080 China
Multi-view clustering can explore common semantics from multiple views and has received increasing attention in recent years. However, current methods focus on learning consistency in representation, neglecting the co... 详细信息
来源: 评论
VSRQ: Quantitative Assessment Method for Safety Risk of Vehicle Intelligent Connected System
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Tian Guan, Wenshan Miao, Hao Huang, Xiujie Liu, Zhiquan Wang, Chaonan Guan, Quanlong Fang, Liangda Duan, Zhifei Department of Cyberspace Security College of Information Science and Technology Jinan University Guangzhou511486 China Department of Computer Science College of Information Science and Technology Jinan University Guangzhou510632 China College of Information Science and Technology Jinan University Guangdong Institution of Smart Education Jinan University Guangzhou510632 China College of Cyber Security Jinan University Guangzhou510632 China Guangdong Gene Data Processing and Analysis Engineering Research Center China Pazhou Laboratory Guangzhou510330 China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin541004 China Guangzhou XPeng Motors Technology Co. Ltd No.8 Songgang Road Changxing Street Cencun Tianhe District Guangzhou China
The field of intelligent connected in modern vehicles continues to expand, and the functions of vehicles become more and more complex with the development of the times. This has also led to an increasing number of veh... 详细信息
来源: 评论
Blockchain Private key Storage Algorithm Based on Image Information Hiding  5th
Blockchain Private Key Storage Algorithm Based on Image Info...
收藏 引用
5th International Conference on Artificial Intelligence and security, ICAIS 2019
作者: Wang, Ning Chen, Yuling Yang, Yu Fang, Zigang Sun, Yizhe School of Cyberspace Security Beijing University of Posts and Telecommunications Beijing China State Key Laboratory of Public Big Data GuiZhou University GuiyangGuizhou China
The private key is the unique credential of the blockchain asset and can be used to sign and authenticate transactions. Losing the private key also loses the control of the account, so the leakage of the private key i... 详细信息
来源: 评论
PPCSB: A Privacy-Preserving Electricity Consumption Statistics and Billing Scheme in Smart Grid  5th
PPCSB: A Privacy-Preserving Electricity Consumption Statisti...
收藏 引用
5th International Conference on Artificial Intelligence and security, ICAIS 2019
作者: Li, Chenyang Chen, Yuling Yang, Yu Li, Chaochao Zeng, Yang School of Cyberspace Security Beijing University of Posts and Telecommunications Beijing China State Key Laboratory of Public Big Data GuiZhou University GuiyangGuizhou China
Research on the privacy protection of smart grids mostly stays in fixed electricity prices or electricity aggregation. Aiming at the problem of real-time pricing and privacy data protection of smart grid, this paper p... 详细信息
来源: 评论
Heuristic-Q: A Privacy data Pricing Method Based on Heuristic Reinforcement Learning  5th
Heuristic-Q: A Privacy Data Pricing Method Based on Heuristi...
收藏 引用
5th International Conference on Artificial Intelligence and security, ICAIS 2019
作者: Chen, Xi Chen, Jingjie Chen, Yuling Yang, Jinglan Li, Deyin School of Cyberspace Security Beijing University of Posts and Telecommunications Beijing China State Key Laboratory of Public Big Data Guizhou University GuiyangGuizhou China
With the development of big data applications in recent years, the value of personal data has received more and more attention. How to balance the conflict between data value development and personal privacy protectio... 详细信息
来源: 评论