咨询与建议

限定检索结果

文献类型

  • 69 篇 会议
  • 61 篇 期刊文献

馆藏范围

  • 130 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 96 篇 工学
    • 79 篇 计算机科学与技术...
    • 65 篇 软件工程
    • 22 篇 信息与通信工程
    • 17 篇 电气工程
    • 15 篇 控制科学与工程
    • 8 篇 电子科学与技术(可...
    • 7 篇 生物工程
    • 5 篇 光学工程
    • 5 篇 建筑学
    • 5 篇 生物医学工程(可授...
    • 4 篇 土木工程
    • 4 篇 安全科学与工程
    • 4 篇 网络空间安全
    • 3 篇 机械工程
    • 3 篇 化学工程与技术
    • 3 篇 交通运输工程
  • 32 篇 理学
    • 19 篇 数学
    • 9 篇 统计学(可授理学、...
    • 8 篇 生物学
    • 7 篇 物理学
    • 3 篇 系统科学
  • 24 篇 管理学
    • 17 篇 管理科学与工程(可...
    • 8 篇 图书情报与档案管...
    • 4 篇 工商管理
  • 8 篇 法学
    • 6 篇 法学
    • 2 篇 社会学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 4 篇 医学
    • 4 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 公共卫生与预防医...
  • 1 篇 军事学

主题

  • 7 篇 federated learni...
  • 6 篇 optimization
  • 5 篇 data privacy
  • 5 篇 speech processin...
  • 5 篇 blockchain
  • 5 篇 sensors
  • 5 篇 privacy
  • 4 篇 compressed sensi...
  • 4 篇 deep learning
  • 4 篇 magnetic resonan...
  • 4 篇 anomaly detectio...
  • 4 篇 signal processin...
  • 4 篇 contrastive lear...
  • 4 篇 smart contract
  • 4 篇 differential pri...
  • 4 篇 granular computi...
  • 4 篇 data models
  • 4 篇 deep reinforceme...
  • 3 篇 simulation
  • 3 篇 wireless communi...

机构

  • 13 篇 key laboratory o...
  • 11 篇 school of cybers...
  • 9 篇 state key labora...
  • 8 篇 key laboratory o...
  • 8 篇 chongqing key la...
  • 6 篇 school of data s...
  • 6 篇 school of cybers...
  • 6 篇 chongqing key la...
  • 5 篇 state key labora...
  • 5 篇 inner mongolia k...
  • 4 篇 school of comput...
  • 4 篇 institute for ne...
  • 4 篇 key laboratory o...
  • 4 篇 chongqing key la...
  • 4 篇 college of compu...
  • 4 篇 college of compu...
  • 4 篇 school of cyber ...
  • 4 篇 college of compu...
  • 3 篇 zhejiang univers...
  • 3 篇 key laboratory o...

作者

  • 15 篇 wang guoyin
  • 8 篇 xia shuyin
  • 8 篇 xiao bin
  • 6 篇 yuling chen
  • 6 篇 yixian yang
  • 6 篇 li weisheng
  • 6 篇 chen yuling
  • 6 篇 tao li
  • 5 篇 li leixiao
  • 5 篇 qiao xiaoyu
  • 5 篇 weisheng li
  • 5 篇 wan jianxiong
  • 5 篇 huang yuping
  • 4 篇 guoyin wang
  • 4 篇 yang lijian
  • 4 篇 xiaobin qian
  • 4 篇 bin xiao
  • 4 篇 zhang qinghua
  • 4 篇 liu chuyi
  • 3 篇 yuping huang

语言

  • 117 篇 英文
  • 12 篇 其他
  • 1 篇 中文
检索条件"机构=Key Laboratory of Cyberspace and Data Security"
130 条 记 录,以下是41-50 订阅
排序:
Research on the Parallel SM4-OFB Acceleration Based on Multiple Rounds of Iteration  3
Research on the Parallel SM4-OFB Acceleration Based on Multi...
收藏 引用
3rd International Conference on Artificial Intelligence and Computer Information Technology, AICIT 2024
作者: Han, Ya Wang, Mingsheng Li, Yongqiang Ren, Lifeng Institute of Information Engineering CAS Key Laboratory of Cyberspace Security Defense Beijing China Chongqing Research Institute of Big Data Peking University Chongqing China
In OFB mode, the output of the cryptographic algorithm is fed back to the input of the cryptographic algorithm. The OFB mode does not directly encrypt plaintext through cryptographic algorithms, but generates cipherte... 详细信息
来源: 评论
Blockchain Private key Storage Algorithm Based on Image Information Hiding  5th
Blockchain Private Key Storage Algorithm Based on Image Info...
收藏 引用
5th International Conference on Artificial Intelligence and security, ICAIS 2019
作者: Wang, Ning Chen, Yuling Yang, Yu Fang, Zigang Sun, Yizhe School of Cyberspace Security Beijing University of Posts and Telecommunications Beijing China State Key Laboratory of Public Big Data GuiZhou University GuiyangGuizhou China
The private key is the unique credential of the blockchain asset and can be used to sign and authenticate transactions. Losing the private key also loses the control of the account, so the leakage of the private key i... 详细信息
来源: 评论
PPCSB: A Privacy-Preserving Electricity Consumption Statistics and Billing Scheme in Smart Grid  5th
PPCSB: A Privacy-Preserving Electricity Consumption Statisti...
收藏 引用
5th International Conference on Artificial Intelligence and security, ICAIS 2019
作者: Li, Chenyang Chen, Yuling Yang, Yu Li, Chaochao Zeng, Yang School of Cyberspace Security Beijing University of Posts and Telecommunications Beijing China State Key Laboratory of Public Big Data GuiZhou University GuiyangGuizhou China
Research on the privacy protection of smart grids mostly stays in fixed electricity prices or electricity aggregation. Aiming at the problem of real-time pricing and privacy data protection of smart grid, this paper p... 详细信息
来源: 评论
Heuristic-Q: A Privacy data Pricing Method Based on Heuristic Reinforcement Learning  5th
Heuristic-Q: A Privacy Data Pricing Method Based on Heuristi...
收藏 引用
5th International Conference on Artificial Intelligence and security, ICAIS 2019
作者: Chen, Xi Chen, Jingjie Chen, Yuling Yang, Jinglan Li, Deyin School of Cyberspace Security Beijing University of Posts and Telecommunications Beijing China State Key Laboratory of Public Big Data Guizhou University GuiyangGuizhou China
With the development of big data applications in recent years, the value of personal data has received more and more attention. How to balance the conflict between data value development and personal privacy protectio... 详细信息
来源: 评论
Decode the Dark Side of the Language: Applications of LLMs in the Dark Web  9
Decode the Dark Side of the Language: Applications of LLMs i...
收藏 引用
9th IEEE International Conference on data Science in cyberspace, DSC 2024
作者: Chen, Hongfan Diao, Yigang Xiang, Hui Huo, Yixuan Xie, Xiaqing Zhao, Jiapeng Wang, Xuebin Sun, Yanwei Shi, Jinqiao Beijing University of Posts and Telecommunications School of Cyberspace Security Beijing China Zhejiang University The State Key Laboratory of Blockchain and Data Security Hangzhou China Beijing China Data and Technology Support Center Cyberspace Administration of China Beijing China Chinese Academy of Sciences Institute of Information Engineering Beijing China
Previous studies have discovered that Transformers pre-trained on large scale datasets have a great advantage over traditional methods and can achieve human-level performance in many NLP tasks. Various encoder-only mo... 详细信息
来源: 评论
Locally Private Estimator for Degree Distribution with Laplacian Mechanism  10
Locally Private Estimator for Degree Distribution with Lapla...
收藏 引用
10th IEEE Smart World Congress, SWC 2024
作者: Li, Jiayu Hu, Yuke Li, Xiaoguang Zhou, Shiqi Wang, Yuxiang Li, Fenghua Niu, Ben Institute of Information Engineering Chinese Academy of Sciences China University of Chinese Academy of Sciences School of Cyber Security China Key Laboratory of Cyberspace Security Defense China Zhejiang University The State Key Laboratory of Blockchain and Data Security China Xidian University School of Cyber Engineering China
Local differential privacy (LDP) provides a solution such that an untrusted server can achieve privacy-preserving data analysis. Node degree is one of the most fundamental metrics in graph data analysis. Existing LDP-... 详细信息
来源: 评论
A MIML-LSTM neural network for integrated fine-grained event forecasting  18
A MIML-LSTM neural network for integrated fine-grained event...
收藏 引用
2018 International Conference on Big data Technologies, ICBDT 2018 and its Workshop, 2018 2nd International Conference on Business Information Systems, ICBIS 2018
作者: Xue, Cong Zeng, Zehua He, Yuanye Wang, Lei Gao, Neng State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences China Data Assurance and Communication Security Research Center Chinese Academy of Sciences China School of Cyberspace Security University of Chinese Academy of Sciences China
Societal event forecasting plays a significant role in crisis warning and emergency management. Most traditional prediction methods focus on predicting whether specific events would happen or not. However, the results... 详细信息
来源: 评论
Secure YOLOv3-SPP: Edge-Cooperative Privacy-preserving Object Detection for Connected Autonomous Vehicles
Secure YOLOv3-SPP: Edge-Cooperative Privacy-preserving Objec...
收藏 引用
2022 International Conference on Networking and Network Applications, NaNA 2022
作者: Zhou, Yongjie Xiong, Jinbo Bi, Renwan Tian, Youliang State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang550025 China Fujian Provincial Key Laboratory of Network System Information Security College of Computer and Cyberspace Security Fujian Normal University FJ Fuzhou350117 China
The connected autonomous vehicles (CAVs) are a key component of intelligent transportation systems (ITS) where vehicles communicate with each other to exchange sensing data from on-board sensors (e.g., high-definition... 详细信息
来源: 评论
Which DGA family does a malicious domain name belong to  5
Which DGA family does a malicious domain name belong to
收藏 引用
5th IEEE International Conference on data Science in cyberspace, DSC 2020
作者: Zhang, Yunyi Wu, Yuelong Jin, Shuyuan Yat-sen University School of Data and Computer Science Sun Guangzhou China Cyberspace Security Research Center Peng Cheng Laboratory Shenzhen China GuangDong Key Laboratory of Information Security Technology Sun Yat-set University Guangzhou China
The Domain Generation Algorithm (DGA) is a technology that generates a large amount of domains in a short time, commonly applied to malware by malicious attackers to circumvent the security mechanisms, such as domain ... 详细信息
来源: 评论
Anomaly detection mechanism based on hierarchical weights through large-scale log data
Anomaly detection mechanism based on hierarchical weights th...
收藏 引用
2021 International Conference on Computer Communication and Artificial Intelligence, CCAI 2021
作者: Xi, Lanlan Xin, Yang Luo, Shoushan Shang, Yanlei Tang, Qifeng University of Posts and Telecommunications School of Beijing Institute of Cyberspace Security Beijing China University of Postsand Telecommunications School of Beijing Institute of Cyberspace Security Beijing China Guizhou Provincial Key Laboratory of Public Big Data Guizhou University Beijing China National Engineering Laboratory for Big Data Distribution and Exchange Technologies Shanghai China China-Europe Digital Economy Expert Group Shanghai China
In order to realize Intelligent Disaster Recovery and break the traditional reactive backup mode, it is necessary to forecast the potential system anomalies, and proactively backup the real-time datas and configuratio... 详细信息
来源: 评论