咨询与建议

限定检索结果

文献类型

  • 644 篇 会议
  • 575 篇 期刊文献

馆藏范围

  • 1,219 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 776 篇 工学
    • 588 篇 计算机科学与技术...
    • 461 篇 软件工程
    • 171 篇 信息与通信工程
    • 111 篇 电气工程
    • 94 篇 控制科学与工程
    • 91 篇 生物工程
    • 55 篇 电子科学与技术(可...
    • 49 篇 光学工程
    • 45 篇 网络空间安全
    • 38 篇 生物医学工程(可授...
    • 37 篇 化学工程与技术
    • 35 篇 机械工程
    • 35 篇 安全科学与工程
    • 26 篇 建筑学
    • 26 篇 交通运输工程
    • 23 篇 动力工程及工程热...
    • 22 篇 仪器科学与技术
    • 22 篇 土木工程
  • 364 篇 理学
    • 179 篇 数学
    • 109 篇 生物学
    • 86 篇 物理学
    • 61 篇 统计学(可授理学、...
    • 39 篇 化学
    • 22 篇 系统科学
  • 174 篇 管理学
    • 103 篇 管理科学与工程(可...
    • 75 篇 图书情报与档案管...
    • 40 篇 工商管理
  • 60 篇 法学
    • 45 篇 社会学
  • 47 篇 医学
    • 42 篇 临床医学
    • 24 篇 基础医学(可授医学...
  • 20 篇 经济学
  • 20 篇 农学
  • 4 篇 教育学
  • 4 篇 军事学
  • 3 篇 艺术学
  • 2 篇 文学

主题

  • 47 篇 feature extracti...
  • 44 篇 semantics
  • 32 篇 deep learning
  • 32 篇 computational mo...
  • 30 篇 accuracy
  • 29 篇 machine learning
  • 29 篇 training
  • 26 篇 privacy
  • 25 篇 federated learni...
  • 24 篇 blockchain
  • 23 篇 security
  • 22 篇 neural networks
  • 21 篇 data privacy
  • 20 篇 internet of thin...
  • 19 篇 cloud computing
  • 19 篇 data models
  • 17 篇 graph neural net...
  • 16 篇 object detection
  • 16 篇 convolution
  • 16 篇 contrastive lear...

机构

  • 128 篇 state key labora...
  • 95 篇 state key labora...
  • 60 篇 hubei key labora...
  • 56 篇 shandong provinc...
  • 53 篇 school of cyber ...
  • 52 篇 key laboratory o...
  • 45 篇 shandong enginee...
  • 40 篇 school of comput...
  • 38 篇 college of compu...
  • 32 篇 guizhou provinci...
  • 30 篇 national enginee...
  • 29 篇 hubei key labora...
  • 29 篇 hubei engineerin...
  • 27 篇 services computi...
  • 26 篇 cluster and grid...
  • 23 篇 school of softwa...
  • 20 篇 school of inform...
  • 20 篇 guizhou universi...
  • 19 篇 school of cyber ...
  • 19 篇 college of compu...

作者

  • 38 篇 tian youliang
  • 37 篇 chen yuling
  • 31 篇 yuling chen
  • 31 篇 youliang tian
  • 28 篇 jin hai
  • 22 篇 hu shengshan
  • 21 篇 zhou pan
  • 19 篇 hai jin
  • 18 篇 peng changgen
  • 17 篇 zhang leo yu
  • 17 篇 li shaobo
  • 16 篇 qin yongbin
  • 16 篇 huang qingming
  • 16 篇 xu qianqian
  • 16 篇 li minghui
  • 15 篇 zhou ziqi
  • 15 篇 xiong jinbo
  • 14 篇 shaobo li
  • 13 篇 tan weijie
  • 13 篇 tao li

语言

  • 1,090 篇 英文
  • 114 篇 其他
  • 16 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Public Big Data Security Technology"
1219 条 记 录,以下是21-30 订阅
排序:
Federated learning privacy incentives:Reverse auctions and negotiations
收藏 引用
CAAI Transactions on Intelligence technology 2023年 第4期8卷 1538-1557页
作者: Hongqin Lyu Yongxiong Zhang Chao Wang Shigong Long Shengnan Guo Guizhou Provincial Key Laboratory of Public Big Data Guizhou UniversityGuiyangChina College of Computer Science and Technology Guizhou UniversityGuiyangChina
The incentive mechanism of federated learning has been a hot topic,but little research has been done on the compensation of privacy *** this end,this study uses the Local SGD federal learning framework and gives a the... 详细信息
来源: 评论
Federated Learning Model for Auto Insurance Rate Setting Based on Tweedie Distribution
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第1期138卷 827-843页
作者: Tao Yin Changgen Peng Weijie Tan Dequan Xu Hanlin Tang State Key Laboratory of Public Big Data Guizhou UniversityGuiyang550025China Guizhou Big Data Academy Guizhou UniversityGuiyang550025China Key Laboratory of Advanced Manufacturing Technology Ministry of EducationGuizhou UniversityGuiyang550025China College of Computer Science and Technology Guizhou UniversityGuiyang550025China ChinaDataPay Company Guiyang550025China
In the assessment of car insurance claims,the claim rate for car insurance presents a highly skewed probability distribution,which is typically modeled using Tweedie *** traditional approach to obtaining the Tweedie r... 详细信息
来源: 评论
An alert-situation text data augmentation method based on MLM
收藏 引用
High technology Letters 2024年 第4期30卷 389-396页
作者: DING Weijie MAO Tingyun CHEN Lili ZHOU Mingwei YUAN Ying HU Wentao Department of Computer and Information Security Zhejiang Police CollegeHangzhou 310053P.R.China Key Laboratory of Public Security Information Application Based on Big-Data Architecture Ministry of Public SecurityHangzhou 310053P.R.China Zhejiang Dahua Technology Co. LtdHangzhou 310053P.R.China
The performance of deep learning models is heavily reliant on the quality and quantity of train-ing *** training data will lead to ***,in the task of alert-situation text classification,it is usually difficult to obta... 详细信息
来源: 评论
A blockchain-empowered authentication scheme for worm detection in wireless sensor network
收藏 引用
Digital Communications and Networks 2024年 第2期10卷 265-272页
作者: Yuling Chen Xiong Yang Tao Li Yi Ren Yangyang Long State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang550025China School of Computing Science University of East AngliaNorwichNR57TJUK
Wireless Sensor Network(WSN)is a distributed sensor network composed a large number of nodes with low cost,low performance and *** special structure of WSN brings both convenience and *** example,a malicious participa... 详细信息
来源: 评论
MMH-FE:AMulti-Precision and Multi-Sourced Heterogeneous Privacy-Preserving Neural Network Training Based on Functional Encryption
收藏 引用
Computers, Materials & Continua 2025年 第3期82卷 5387-5405页
作者: Hao Li Kuan Shao Xin Wang Mufeng Wang Zhenyong Zhang The State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang550025China Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science CenterQilu University of Technology(Shandong Academy of Sciences)Jinan250014China China Industrial Control Systems Cyber Emergency Response Team Beijing100040China
Due to the development of cloud computing and machine learning,users can upload their data to the cloud for machine learning model ***,dishonest clouds may infer user data,resulting in user data *** schemes have achie... 详细信息
来源: 评论
Targeted Universal Adversarial Attack Based on Fourier Transform  2nd
Targeted Universal Adversarial Attack Based on Fourier Tran...
收藏 引用
2nd International Conference on data security and Privacy Protection, DSPP 2024
作者: Sun, Yancheng Chen, Yuling Liu, Ziyang Dou, Hui Tan, Chaoyue The State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang550025 China
The existence of adversarial example reveals the fragility in neural networks, and the exploration of their theoretical origins increases the interpretability of deep learning, enhances researchers’ understanding of ... 详细信息
来源: 评论
Regularization Mixup Adversarial Training: A Defense Strategy for Membership Privacy with Model Availability Assurance  2
Regularization Mixup Adversarial Training: A Defense Strateg...
收藏 引用
2nd International Conference on big data and Privacy Computing, BDPC 2024
作者: Ding, Zehua Tian, Youliang Wang, Guorong Xiong, Jinbo College of Computer Science and Technology Guizhou University State Key Laboratory of Public Big Data Guiyang China College of Computer and Cyber Security Fujian Normal University Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou China
Neural network models face two highly destructive threats in real-world applications: membership inference attacks (MIAs) and adversarial attacks (AAs). One compromises the model's confidentiality, leading to memb... 详细信息
来源: 评论
DBKEM-AACS: a distributed key escrow model in blockchain with anonymous authentication and committee selection
收藏 引用
Science China(Information Sciences) 2023年 第3期66卷 289-290页
作者: Axin XIANG Hongfeng GAO Youliang TIAN Liang WAN College of Computer Science and Technology Guizhou University Institute of Cryptography and Data Security Guizhou University Network and Information Management Center Guizhou University State Key Laboratory of Public Big Data Guizhou University Institute of Computer Software and Theory Guizhou University
Dear editor, key security is of great practical significance and demand to guarantee the security of digital assets in the blockchain system. At present, users prefer to escrow their assets on centralized institutions...
来源: 评论
Range Proof-Based Noise Filtering Mechanism for loT Differential Privacy
Range Proof-Based Noise Filtering Mechanism for loT Differen...
收藏 引用
2024 IEEE Cyber Science and technology Congress, CyberSciTech 2024
作者: Wei, Jianqi Chen, Yuling Luo, Yun Li, Zaidong State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang China
With the rapid development of Internet of Things (loT) technology, the vast amount of data generated by its devices has raised widespread concern for user privacy pro-tection. Differential Privacy, as a stringent priv... 详细信息
来源: 评论
Impact Analysis of MTD on the Frequency Stability in Smart Grid
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2023年 第1期10卷 275-277页
作者: Zhenyong Zhang Ruilong Deng the State Key Laboratory of Public Big Data and the College of Computer Science and Technology Guizhou UniversityGuiyang 550025China IEEE the State Key Laboratory of Industrial Control Technology Zhejiang UniversityHangzhou 310027China
Dear Editor, In order to accommodate the effects of false data injection attacks(FDIAs), the moving target defense(MTD) strategy is recently proposed to enhance the security of the smart grid by perturbing branch susc... 详细信息
来源: 评论