咨询与建议

限定检索结果

文献类型

  • 68 篇 会议
  • 36 篇 期刊文献

馆藏范围

  • 104 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 58 篇 工学
    • 39 篇 计算机科学与技术...
    • 33 篇 软件工程
    • 11 篇 信息与通信工程
    • 8 篇 电子科学与技术(可...
    • 7 篇 生物工程
    • 6 篇 电气工程
    • 5 篇 光学工程
    • 4 篇 网络空间安全
    • 3 篇 机械工程
    • 3 篇 控制科学与工程
    • 1 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
    • 1 篇 建筑学
    • 1 篇 土木工程
    • 1 篇 交通运输工程
    • 1 篇 安全科学与工程
    • 1 篇 公安技术
  • 26 篇 理学
    • 14 篇 数学
    • 9 篇 物理学
    • 7 篇 生物学
    • 5 篇 系统科学
    • 4 篇 统计学(可授理学、...
    • 1 篇 天文学
  • 11 篇 管理学
    • 6 篇 管理科学与工程(可...
    • 6 篇 图书情报与档案管...
    • 2 篇 工商管理
  • 3 篇 法学
    • 3 篇 社会学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 军事学
  • 1 篇 文学
    • 1 篇 新闻传播学

主题

  • 7 篇 cryptography
  • 6 篇 laboratories
  • 6 篇 servers
  • 6 篇 computational mo...
  • 6 篇 blockchain
  • 6 篇 protocols
  • 6 篇 hardware
  • 6 篇 privacy
  • 5 篇 access control
  • 5 篇 throughput
  • 5 篇 cloud computing
  • 5 篇 training
  • 4 篇 authentication
  • 4 篇 differential pri...
  • 4 篇 encryption
  • 3 篇 tools
  • 3 篇 security
  • 3 篇 performance eval...
  • 3 篇 federated learni...
  • 3 篇 protection

机构

  • 6 篇 shaanxi key labo...
  • 6 篇 state key labora...
  • 6 篇 secure computing...
  • 6 篇 shaanxi key labo...
  • 6 篇 shaanxi key labo...
  • 4 篇 pcl research cen...
  • 4 篇 shaanxi key labo...
  • 4 篇 tsinghua shenzhe...
  • 4 篇 state key labora...
  • 4 篇 school of data s...
  • 3 篇 temple universit...
  • 3 篇 guangzhou instit...
  • 3 篇 nec-aist quantum...
  • 3 篇 sandia national ...
  • 3 篇 secure computing...
  • 3 篇 ntt secure platf...
  • 3 篇 department of ma...
  • 3 篇 adaptive and sec...
  • 3 篇 adaptive and sec...
  • 3 篇 tencent ai lab

作者

  • 10 篇 michel a. kinsy
  • 9 篇 kinsy michel a.
  • 8 篇 jingwei liu
  • 8 篇 qingqi pei
  • 8 篇 shin dongwan
  • 7 篇 xiaojiang du
  • 7 篇 mohsen guizani
  • 6 篇 bu lake
  • 6 篇 wu baoyuan
  • 6 篇 pei qingqi
  • 6 篇 rong sun
  • 6 篇 shen yulong
  • 6 篇 dong xuewen
  • 5 篇 eliakin del rosa...
  • 5 篇 mihailo isakov
  • 5 篇 dongwan shin
  • 4 篇 isakov mihailo
  • 4 篇 claycomb william
  • 4 篇 ma lichuan
  • 3 篇 claycomb william...

语言

  • 100 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"机构=Secure Computing Laboratory"
104 条 记 录,以下是1-10 订阅
排序:
Privacy-Preserving Logistic Regression Model Training Scheme by Homomorphic Encryption  26th
Privacy-Preserving Logistic Regression Model Training Scheme...
收藏 引用
26th International Conference on Information and Communications Security, ICICS 2024
作者: Miao, Weijie Wu, Wenyuan Chongqing Key Laboratory of Secure Computing for Biology Chongqing Institute of Green and Intelligent Technology Chongqing China Chongqing School University of Chinese Academy of Sciences Chongqing China
In the field of big data, logistic regression for binary and multi-class classification is widely used. Nowadays, there is growing concern about data privacy protection issues. This paper focuses on scenarios involvin... 详细信息
来源: 评论
Membership Data Privacy Protection and Poisoning Detection Scheme for Federated Learning  1st
Membership Data Privacy Protection and Poisoning Detection ...
收藏 引用
1st Conference on Blockchain and Web3.0 Technology Innovation and Application, BWTAC 2024
作者: Li, Yafeng Sun, Zhijun Ma, Lichuan China CETC Key Laboratory of Technology on Data Link Xi’an710068 China State Key Laboratory of Integrated Services Networks Xidian University Xi’an710071 China Shaanxi Key Laboratory of Blockchain and Secure Computing Xi’an710071 China
In the era of big data, data privacy and security are highly valued, leading to the phenomenon of "data islands", which hinders the effective utilization of data. Federated learning, as a privacy-preserving ... 详细信息
来源: 评论
Multi-Level Queue Security in Switches: Adversarial Inference and Differential Privacy Protection in SDN
收藏 引用
Chinese Journal of Electronics 2025年 第2期34卷 533-547页
作者: Dong, Xuewen Xue, Lingtao Zhang, Tao You, Zhichao Li, Guangxia Shen, Yulong School of Computer Science & Technology Xidian University Xi'an710071 China Engineering Research Center of Blockchain Technology Application and Evaluation Ministry of Education Xi'an710126 China Shaanxi Key Laboratory of Blockchain and Secure Computing Xi'an710126 China
Network switches are critical elements in any network infrastructure for traffic forwarding and packet priority scheduling, which naturally become a target of network adversaries. Most attacks on switches focus on pur... 详细信息
来源: 评论
HiCoCS: High Concurrency Cross-Sharding on Permissioned Blockchains
收藏 引用
IEEE Transactions on Computers 2025年
作者: Yang, Lingxiao Dong, Xuewen Wan, Zhiguo Lu, Di Zhang, Yushu Shen, Yulong Xidian University School of Computer Science and Technology China Ministry of Education Engineering Research Center of Blockchain Technology Application and Evaluation China Shaanxi Key Laboratory of Blockchain and Secure Computing Xi’an710071 China Zhejiang Lab Zhejiang Hangzhou311121 China Shaanxi Key Laboratory of Network and System Security Xi’an710071 China Jiangxi University of Finance and Economics School of Computing Nanchang330013 China Jiangxi University of Finance and Economics Nanchang330013 China
As the foundation of the Web3 trust system, blockchain technology faces increasing demands for scalability. Sharding emerges as a promising solution, but it struggles to handle highly concurrent cross-shard transactio... 详细信息
来源: 评论
Differential Fault Attack on GIFT
收藏 引用
Chinese Journal of Electronics 2021年 第4期30卷 669-675页
作者: XIE Min TIAN Feng LI Jiaqi State Key Laboratory of Integrated Services Networks Xidian University Shaanxi Key Laboratory of Blockchain and Secure Computing
GIFT, a lightweight block cipher proposed at CHES2017, has been widely cryptanalyzed this *** paper studies the differential diffusion characteristics of round function of GIFT at first, and proposes a random nibble-b... 详细信息
来源: 评论
Privacy Preserving Algorithm for Spectrum Sensing in Cognitive Vehicle Networks
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 30-42页
作者: Hongning LI Tonghui HU Jiexiong CHEN Xiuqiang WU Qingqi PEI Guangzhou Institute of Technology Xidian University Guangzhou CEPREI Shaanxi Key Laboratory of Blockchain and Secure Computing
The scarcity of spectrum resources fails to meet the increasing throughput demands of vehicular networks. There is an urgent need to maximize the utilization of spectrum bands in mobile networks. To ascertain the avai... 详细信息
来源: 评论
Adaptive Backdoor Attacks with Reasonable Constraints on Graph Neural Networks
收藏 引用
IEEE Transactions on Dependable and secure computing 2025年
作者: Dong, Xuewen Li, Jiachen Li, Shujun You, Zhichao Qu, Qiang Kholodov, Yaroslav Shen, Yulong The School of Computer Science and Technology Xidian University The Engineering Research Center of Blockchain Technology Application and Evaluation Ministry of Education China The Shaanxi Key Laboratory of Blockchain and Secure Computing Xi’an710071 China The School of Computing Kent Interdisciplinary Research Centre in Cyber Security University of Kent CanterburyCT2 7NF United Kingdom Shenzhen Institute of Advanced Technology Chinese Academy of Sciences China The Intelligent Transportation Systems Lab Innopolis University Innopolis Russia The School of Computer Science and Technology Xidian University China
Recent studies show that graph neural networks (GNNs) are vulnerable to backdoor attacks. Existing backdoor attacks against GNNs use fixed-pattern triggers and lack reasonable trigger constraints, overlooking individu... 详细信息
来源: 评论
Efficient and Privacy-Enhancing Non-Interactive Periocular Authentication for Access Control Services
收藏 引用
IEEE Transactions on Network and Service Management 2025年
作者: Li, Yating Wang, Le Xue, Liang Liu, Jingwei Lin, Xiaodong Ministry of Education Engineering Research Center of Blockchain Technology Application and Evaluation China Xidian University Shaanxi Key Laboratory of Blockchain and Secure Computing Xi’an710071 China University of Guelph School of Computer Science GuelphN1G 2W1 Canada York University School of Information Technology North YorkM3J 1P3 Canada
Periocular authentication has emerged as an increasingly prominent approach in access control services, especially in situations of face occlusion. However, its limited feature area and low information complexity make... 详细信息
来源: 评论
HiCoCS: High Concurrency Cross-Sharding on Permissioned Blockchains
arXiv
收藏 引用
arXiv 2025年
作者: Yang, Lingxiao Dong, Xuewen Wan, Zhiguo Lu, Di Zhang, Yushu Shen, Yulong School of Computer Science and Technology Xidian University The Engineering Research Center of Blockchain Technology Application and Evaluation Ministry of Education China Shaanxi Key Laboratory of Blockchain and Secure Computing Xi’an710071 China Zhejiang Lab Zhejiang Hangzhou311121 China School of Computer Science and Technology Xidian University China Shaanxi Key Laboratory of Network and System Security Xi’an710071 China College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Jiangsu Nanjing210016 China
As the foundation of the Web3 trust system, blockchain technology faces increasing demands for scalability. Sharding emerges as a promising solution, but it struggles to handle highly concurrent cross-shard transactio... 详细信息
来源: 评论
Adaptive Backdoor Attacks with Reasonable Constraints on Graph Neural Networks
arXiv
收藏 引用
arXiv 2025年
作者: Dong, Xuewen Li, Jiachen Li, Shujun You, Zhichao Qu, Qiang Kholodov, Yaroslav Shen, Yulong School of Computer Science and Technology Xidian University The Engineering Research Center of Blockchain Technology Application and Evaluation Ministry of Education China The Shaanxi Key Laboratory of Blockchain and Secure Computing Xi’an710071 China University of Kent CanterburyCT2 7NP United Kingdom Shenzhen Institutes of Advanced Technology Chinese Academy of Sciences China Intelligent Transportation Systems Lab Innopolis University Innopolis Russia School of Computer Science and Technology Xidian University China The Shaanxi Key Laboratory of Network and System Security Xi’an710071 China
Recent studies show that graph neural networks (GNNs) are vulnerable to backdoor attacks. Existing backdoor attacks against GNNs use fixed-pattern triggers and lack reasonable trigger constraints, overlooking individu... 详细信息
来源: 评论