咨询与建议

限定检索结果

文献类型

  • 560 篇 期刊文献
  • 532 篇 会议
  • 1 册 图书

馆藏范围

  • 1,093 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 768 篇 工学
    • 608 篇 计算机科学与技术...
    • 467 篇 软件工程
    • 145 篇 信息与通信工程
    • 112 篇 控制科学与工程
    • 86 篇 网络空间安全
    • 66 篇 生物工程
    • 64 篇 电气工程
    • 54 篇 电子科学与技术(可...
    • 43 篇 光学工程
    • 33 篇 机械工程
    • 33 篇 安全科学与工程
    • 27 篇 化学工程与技术
    • 26 篇 建筑学
    • 26 篇 土木工程
    • 21 篇 仪器科学与技术
    • 19 篇 生物医学工程(可授...
    • 15 篇 动力工程及工程热...
    • 15 篇 交通运输工程
  • 287 篇 理学
    • 137 篇 数学
    • 75 篇 物理学
    • 74 篇 生物学
    • 37 篇 统计学(可授理学、...
    • 30 篇 化学
    • 17 篇 系统科学
  • 205 篇 管理学
    • 110 篇 图书情报与档案管...
    • 108 篇 管理科学与工程(可...
    • 30 篇 工商管理
  • 22 篇 法学
    • 20 篇 社会学
  • 18 篇 军事学
    • 18 篇 军队指挥学
  • 16 篇 医学
    • 16 篇 临床医学
  • 12 篇 经济学
  • 6 篇 农学
  • 3 篇 教育学
  • 2 篇 艺术学

主题

  • 37 篇 semantics
  • 24 篇 training
  • 19 篇 feature extracti...
  • 19 篇 cryptography
  • 18 篇 contrastive lear...
  • 18 篇 trusted computin...
  • 17 篇 security
  • 15 篇 speech processin...
  • 15 篇 information secu...
  • 14 篇 image segmentati...
  • 14 篇 machine learning
  • 13 篇 object detection
  • 13 篇 reinforcement le...
  • 12 篇 deep learning
  • 12 篇 deep neural netw...
  • 11 篇 semantic segment...
  • 11 篇 computational mo...
  • 11 篇 cloud computing
  • 11 篇 privacy
  • 10 篇 access control

机构

  • 240 篇 key laboratory o...
  • 195 篇 key laboratory o...
  • 69 篇 institute of art...
  • 53 篇 key laboratory o...
  • 48 篇 beijing key labo...
  • 42 篇 school of inform...
  • 42 篇 key laboratory o...
  • 38 篇 faculty of infor...
  • 38 篇 tencent youtu la...
  • 38 篇 school of comput...
  • 37 篇 school of cyber ...
  • 34 篇 peng cheng labor...
  • 27 篇 fujian key labor...
  • 27 篇 trusted computin...
  • 25 篇 key laboratory o...
  • 24 篇 school of comput...
  • 21 篇 key laboratory o...
  • 20 篇 fujian key labor...
  • 19 篇 guangxi key labo...
  • 19 篇 national univers...

作者

  • 153 篇 ji rongrong
  • 69 篇 sun xiaoshuai
  • 55 篇 ji donghong
  • 49 篇 rongrong ji
  • 42 篇 fei hao
  • 40 篇 cao liujuan
  • 38 篇 ji jiayi
  • 38 篇 li fei
  • 34 篇 wang cheng
  • 33 篇 zhang shengchuan
  • 32 篇 zhou yiyi
  • 30 篇 zhang huanguo
  • 26 篇 teng chong
  • 26 篇 zheng xiawu
  • 26 篇 ma yiwei
  • 25 篇 zhang yuxin
  • 24 篇 wang lina
  • 23 篇 chao fei
  • 22 篇 li bobo
  • 21 篇 zhang yan

语言

  • 910 篇 英文
  • 172 篇 其他
  • 11 篇 中文
检索条件"机构=Key Laboratory of Trusted Computing"
1093 条 记 录,以下是1-10 订阅
排序:
Fairness is essential for robustness:fair adversarial training by identifying and augmenting hard examples
收藏 引用
Frontiers of Computer Science 2025年 第3期19卷 1-13页
作者: Ningping MOU Xinli YUE Lingchen ZHAO Qian WANG Key Laboratory of Aerospace Information Security and Trusted Computing(Ministry of Education) School of Cyber Science and EngineeringWuhan UniversityWuhan 430072China
Adversarial training has been widely considered the most effective defense against adversarial ***,recent studies have demonstrated that a large discrepancy exists in the class-wise robustness of adversarial training,... 详细信息
来源: 评论
Committed-programming reductions: formalizations,implications and relations
收藏 引用
Science China(Information Sciences) 2024年 第10期67卷 151-171页
作者: Jiang ZHANG Yu YU Dengguo FENG Shuqin FAN Zhenfeng ZHANG State Key Laboratory of Cryptology Department of Computer Science and Engineering Shanghai Jiao Tong University Trusted Computing and Information Assurance Laboratory Institute of SoftwareChinese Academy of Sciences
In this work, we introduce a class of black-box(BB) reductions called committed-programming reduction(CPRed) in the random oracle model(ROM) and obtain the following interesting results:(1) we demonstrate that some we... 详细信息
来源: 评论
HGNN-ETC: Higher-Order Graph Neural Network Based on Chronological Relationships for Encrypted Traffic Classification
收藏 引用
Computers, Materials & Continua 2024年 第11期81卷 2643-2664页
作者: Rongwei Yu Xiya Guo Peihao Zhang Kaijuan Zhang Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of EducationSchool of Cyber Science and EngineeringWuhan UniversityWuhan430072China
Encrypted traffic plays a crucial role in safeguarding network security and user ***,encrypting malicious traffic can lead to numerous security issues,making the effective classification of encrypted traffic *** metho... 详细信息
来源: 评论
SPIDER:Speeding up Side-Channel Vulnerability Detection via Test Suite Reduction
收藏 引用
Tsinghua Science and Technology 2023年 第1期28卷 47-58页
作者: Fei Yan Rushan Wu Liqiang Zhang Yue Cao Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of EducationSchool of Cyber Science and EngineeringWuhan UniversityWuhan 430072China
Side-channel attacks allow adversaries to infer sensitive information,such as cryptographic keys or private user data,by monitoring unintentional information leaks of running *** side-channel detection methods can ide... 详细信息
来源: 评论
Edge Guided Network with Motion Enhancement for Few-Shot Action Recognition
收藏 引用
IEEE Transactions on Circuits and Systems for Video Technology 2025年 第6期35卷 5331-5342页
作者: Du, Kaiwen Ye, Weirong Guo, Hanyu Yan, Yan Wang, Hanzi Huawei Technologies Hangzhou310051 China Ministry of Education of China Xiamen University Fujian Key Laboratory of Sensing and Computing for Smart City School of Informatics Key Laboratory of Multimedia Trusted Perception and Efficient Computing Xiamen361005 China Shanghai Artificial Intelligence Laboratory Shanghai200232 China
Existing state-of-the-art methods for few-shot action recognition (FSAR) achieve promising performance by spatial and temporal modeling. However, most current methods ignore the importance of edge information and moti... 详细信息
来源: 评论
Distribution-flexible subset quantization for post-quantizing super-resolution networks
收藏 引用
Science China(Information Sciences) 2025年 第3期68卷 163-180页
作者: Yunshan ZHONG Mingbao LIN Jingjing XIE Yuxin ZHANG Fei CHAO Rongrong JI Institute of Artificial Intelligence Xiamen University Key Laboratory of Multimedia Trusted Perception and Efficient Computing Ministry of Education of ChinaXiamen University Tencent Youtu Lab Department of Artificial Intelligence School of Informatics Xiamen University Peng Cheng Laboratory
This paper introduces distribution-flexible subset quantization(DFSQ), a post-training quantization method for super-resolution networks. Our motivation for developing DFSQ is based on the distinctive activation distr... 详细信息
来源: 评论
Omni-Detection of Adversarial Examples with Diverse Magnitudes
收藏 引用
China Communications 2024年 第12期21卷 139-151页
作者: Ke Jianpeng Wang Wenqi Yang Kang Wang Lina Ye Aoshuang Wang Run Key Laboratory of Aerospace Information Security and Trusted Computing(Wuhan University) Ministry of EducationWuhan 430072China School of Cyber Science and Engineering Wuhan UniversityWuhan 430072China
Deep neural networks(DNNs)are poten-tially susceptible to adversarial examples that are ma-liciously manipulated by adding imperceptible pertur-bations to legitimate inputs,leading to abnormal be-havior of *** of meth... 详细信息
来源: 评论
DiagnoCare: A Diagnostic Analysis System for Electronic Medical Records Combining Medical Knowledge Graph and Large Language Model  10
DiagnoCare: A Diagnostic Analysis System for Electronic Medi...
收藏 引用
10th IEEE Smart World Congress, SWC 2024
作者: Huang, Shiwang Luo, Guofeng Wang, Jiaru Chen, Longbiao Xiamen University Fujian Key Laboratory of Sensing and Computing for Smart Cities China Xiamen University Key Laboratory of Multimedia Trusted Perception and Efficient Computing Xiamen China
With the rapid development of healthcare technologies and the increasing demand for intelligent diagnostic systems, we present a novel approach that combines medical knowledge graphs and Large Language Models (LLMs) f... 详细信息
来源: 评论
Code Membership Inference for Detecting Unauthorized Data Use in Code Pre-trained Language Models
Code Membership Inference for Detecting Unauthorized Data Us...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Zhang, Sheng Li, Hui Ji, Rongrong Key Laboratory of Multimedia Trusted Perception and Efficient Computing Ministry of Education of China Xiamen University China
Code pre-trained language models (CPLMs) have received great attention since they can benefit various tasks that facilitate software development and maintenance. However, CPLMs are trained on massive open-source code,... 详细信息
来源: 评论
Quantum Attacks on Type-3 Generalized Feistel Scheme and Unbalanced Feistel Scheme with Expanding Functions
收藏 引用
Chinese Journal of Electronics 2023年 第2期32卷 209-216页
作者: ZHANG Zhongya WU Wenling SUI Han WANG Bolin Trusted Computing and Information Assurance Laboratory Institute of Software Chinese Academy of Sciences University of Chinese Academy of Sciences Luoyang Normal University State Key Laboratory of Cryptology
Quantum algorithms are raising concerns in the field of cryptography all over the world. A growing number of symmetric cryptography algorithms have been attacked in the quantum setting. Type-3 generalized Feistel sche... 详细信息
来源: 评论