咨询与建议

限定检索结果

文献类型

  • 69 篇 会议
  • 61 篇 期刊文献

馆藏范围

  • 130 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 96 篇 工学
    • 79 篇 计算机科学与技术...
    • 65 篇 软件工程
    • 22 篇 信息与通信工程
    • 17 篇 电气工程
    • 15 篇 控制科学与工程
    • 8 篇 电子科学与技术(可...
    • 7 篇 生物工程
    • 5 篇 光学工程
    • 5 篇 建筑学
    • 5 篇 生物医学工程(可授...
    • 4 篇 土木工程
    • 4 篇 安全科学与工程
    • 4 篇 网络空间安全
    • 3 篇 机械工程
    • 3 篇 化学工程与技术
    • 3 篇 交通运输工程
  • 32 篇 理学
    • 19 篇 数学
    • 9 篇 统计学(可授理学、...
    • 8 篇 生物学
    • 7 篇 物理学
    • 3 篇 系统科学
  • 24 篇 管理学
    • 17 篇 管理科学与工程(可...
    • 8 篇 图书情报与档案管...
    • 4 篇 工商管理
  • 8 篇 法学
    • 6 篇 法学
    • 2 篇 社会学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 4 篇 医学
    • 4 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 公共卫生与预防医...
  • 1 篇 军事学

主题

  • 7 篇 federated learni...
  • 6 篇 optimization
  • 5 篇 data privacy
  • 5 篇 speech processin...
  • 5 篇 blockchain
  • 5 篇 sensors
  • 5 篇 privacy
  • 4 篇 compressed sensi...
  • 4 篇 deep learning
  • 4 篇 magnetic resonan...
  • 4 篇 anomaly detectio...
  • 4 篇 signal processin...
  • 4 篇 contrastive lear...
  • 4 篇 smart contract
  • 4 篇 differential pri...
  • 4 篇 granular computi...
  • 4 篇 data models
  • 4 篇 deep reinforceme...
  • 3 篇 simulation
  • 3 篇 wireless communi...

机构

  • 13 篇 key laboratory o...
  • 11 篇 school of cybers...
  • 9 篇 state key labora...
  • 8 篇 key laboratory o...
  • 8 篇 chongqing key la...
  • 6 篇 school of data s...
  • 6 篇 school of cybers...
  • 6 篇 chongqing key la...
  • 5 篇 state key labora...
  • 5 篇 inner mongolia k...
  • 4 篇 school of comput...
  • 4 篇 institute for ne...
  • 4 篇 key laboratory o...
  • 4 篇 chongqing key la...
  • 4 篇 college of compu...
  • 4 篇 college of compu...
  • 4 篇 school of cyber ...
  • 4 篇 college of compu...
  • 3 篇 zhejiang univers...
  • 3 篇 key laboratory o...

作者

  • 15 篇 wang guoyin
  • 8 篇 xia shuyin
  • 8 篇 xiao bin
  • 6 篇 yuling chen
  • 6 篇 yixian yang
  • 6 篇 li weisheng
  • 6 篇 chen yuling
  • 6 篇 tao li
  • 5 篇 li leixiao
  • 5 篇 qiao xiaoyu
  • 5 篇 weisheng li
  • 5 篇 wan jianxiong
  • 5 篇 huang yuping
  • 4 篇 guoyin wang
  • 4 篇 yang lijian
  • 4 篇 xiaobin qian
  • 4 篇 bin xiao
  • 4 篇 zhang qinghua
  • 4 篇 liu chuyi
  • 3 篇 yuping huang

语言

  • 117 篇 英文
  • 12 篇 其他
  • 1 篇 中文
检索条件"机构=Key Laboratory of Cyberspace and Data Security"
130 条 记 录,以下是11-20 订阅
排序:
Locally Private Estimator for Degree Distribution with Laplacian Mechanism  10
Locally Private Estimator for Degree Distribution with Lapla...
收藏 引用
10th IEEE Smart World Congress, SWC 2024
作者: Li, Jiayu Hu, Yuke Li, Xiaoguang Zhou, Shiqi Wang, Yuxiang Li, Fenghua Niu, Ben Institute of Information Engineering Chinese Academy of Sciences China University of Chinese Academy of Sciences School of Cyber Security China Key Laboratory of Cyberspace Security Defense China Zhejiang University The State Key Laboratory of Blockchain and Data Security China Xidian University School of Cyber Engineering China
Local differential privacy (LDP) provides a solution such that an untrusted server can achieve privacy-preserving data analysis. Node degree is one of the most fundamental metrics in graph data analysis. Existing LDP-... 详细信息
来源: 评论
Virtual Petrochemical FireFighting Training System Design and Implementation  14th
Virtual Petrochemical FireFighting Training System Design an...
收藏 引用
14th International Conference on Frontier Computing, FC 2024
作者: Li, Hengdong Ye, Jun Zhang, Dian Trusted and Intelligent Data Analytic Research Group School of Cyberspace Security Hainan University Haikou China Key Laboratory of Internet Information Retrieval of Hainan Province Hainan University Haikou China
Due to the special and dangerous nature of flammable and explosive petrochemical substances, petrochemical storage and transportation involves great risks and is highly prone to fire and explosion and other accidents,... 详细信息
来源: 评论
sSecure Net: A Hybrid CNN-LSTM-based Intrusion Detection System for Securing IoT Networks  25
sSecure Net: A Hybrid CNN-LSTM-based Intrusion Detection Sys...
收藏 引用
Proceedings of the 4th International Conference on Computer, Artificial Intelligence and Control Engineering
作者: Ovi Abul Hussain Zigang Chen Haihua Zhu Chongqing Key Laboratory of Cyberspace Security Monitoring and Governance & Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education Chongqing University of Posts and Telecommunications Chongqing China
The widespread deployment of IoT devices has seen the emergence of a huge security threat, and IoT networks are the favorite targets for numerous cyberattacks. Due to the scarce resources in most IoT devices, the conv... 详细信息
来源: 评论
Anatomical Prior Guided Spatial Contrastive Learning for Few-Shot Medical Image Segmentation  24
Anatomical Prior Guided Spatial Contrastive Learning for Few...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Huang, Wendong Hu, Jinwu Bi, Xiuli Xiao, Bin Chongqing Key Laboratory of Image Cognition Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education Chongqing University of Post and Telecommunications Chongqing China Pazhou Lab School of Software Engineering South China University of Technology Guangzhou China
Few-shot semantic segmentation has considerable potential for low-data scenarios, especially for medical images that require expert-level dense annotations. Existing few-shot medical image segmentation methods strive ... 详细信息
来源: 评论
PriFU: Capturing Task-Relevant Information Without Adversarial Learning  24
PriFU: Capturing Task-Relevant Information Without Adversari...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Bi, Xiuli Hu, Yang Liu, Bo Li, Weisheng Cosman, Pamela Xiao, Bin Chongqing Key Laboratory of Image Cognition Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education Chongqing University of Posts and Telecommunications Chongqing China Department of Electrical and Computer Engineering University of California San Diego San Diego United States
As machine learning advances, machine learning as a service (MLaaS) in the cloud brings convenience to human lives but also privacy risks, as powerful neural networks used for generation, classification or other tasks... 详细信息
来源: 评论
Federated Hybrid-Supervised Learning for Universal Medical Image Segmentation
Federated Hybrid-Supervised Learning for Universal Medical I...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Zheng, Shenhai Wen, Sian Li, Congyu Chen, Qing Li, Laquan College of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing China Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education Chongqing China School of Science Chongqing University of Posts and Telecommunications Chongqing China
Federated Learning (FL) is an advanced technology that tackles the challenge of blocked data arising from privacy concerns, enabling the training of deep learning models without the need for data sharing. However, FL ... 详细信息
来源: 评论
Identifying data Breaches in Dark Web through Prompt Active Learning  9
Identifying Data Breaches in Dark Web through Prompt Active ...
收藏 引用
9th IEEE International Conference on data Science in cyberspace, DSC 2024
作者: Xiang, Hui Wu, Yifan Wang, Xuebin Shi, Jinqiao Zhao, Can Zhao, Jiapeng Beijing University of Posts and Telecommunications School of Cyberspace Security Beijing China Zhejiang University The State Key Laboratory of Blockchain and Data Security Hangzhou China Beijing China University of Chinese Academy of Sciences School of Cyber Security Beijing China Chinese Academy of Sciences Institute of Information Engineering Beijing China
Frequent data breaches have attracted people's attention. The dark web forums have become the crucial platform for data breach transactions. While some forums are well-organized with distinct sections, such as a d... 详细信息
来源: 评论
A Feature Fusion Network with Multiscale Adaptively Attentional for Object Detection in Complex Traffic Scenes
IEEE Transactions on Intelligent Vehicles
收藏 引用
IEEE Transactions on Intelligent Vehicles 2024年
作者: Cai, Fei Qu, Zhong Yin, Xuehui Chongqing Key Laboratory of Computational Intelligence The Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education The Key Laboratory of Big Data Intelligent Computing Chongqing University of Posts and Telecommunications Chongqing400065 China
Currently, small object detection in complex traffic scenarios remains a major challenge due to variations in object shape, scales, and external environment, as well as a high inter-class similarity. Although the late... 详细信息
来源: 评论
CoGAP: A Personalized Federated Learning Method Using Collaborative Optimization for Medical Image Classification
CoGAP: A Personalized Federated Learning Method Using Collab...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Zheng, Shenhai Li, Congyu Wen, Sian Gao, Xi Yu, Lei College of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing China Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education Chongqing China Emergency Department The Second Affiliated Hospital of Chongqing Medical University Chongqing China
Federated learning (FL) has been widely used in medical image processing to protect data privacy, but it has issues with data heterogeneity. Personalized federated learning have emerged to tackle these issues but ofte... 详细信息
来源: 评论
Block-gram: Mining Knowledgeable Features for Smart Contract Vulnerability Detection  7th
Block-gram: Mining Knowledgeable Features for Smart Contrac...
收藏 引用
7th International Conference on Smart Computing and Communication, SmartCom 2022
作者: Li, Tao Wang, Haolong Fang, Yaozheng Jian, Zhaolong Wang, Zichun Xie, Xueshuo Tianjin Key Laboratory of Network and Data Security Technology Tianjin China College of Computer Science Nankai University Tianjin China Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province Hangzhou China State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing China
Effective vulnerability detection of large-scale smart contracts is critical because smart contract attacks frequently bring about tremendous economic loss. However, code analysis requiring traversal paths and learnin... 详细信息
来源: 评论