咨询与建议

限定检索结果

文献类型

  • 64 篇 会议
  • 32 篇 期刊文献

馆藏范围

  • 96 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 57 篇 工学
    • 49 篇 计算机科学与技术...
    • 44 篇 软件工程
    • 11 篇 信息与通信工程
    • 10 篇 控制科学与工程
    • 7 篇 电气工程
    • 6 篇 安全科学与工程
    • 5 篇 电子科学与技术(可...
    • 3 篇 光学工程
    • 3 篇 交通运输工程
    • 2 篇 生物工程
    • 2 篇 网络空间安全
    • 1 篇 机械工程
    • 1 篇 仪器科学与技术
    • 1 篇 动力工程及工程热...
    • 1 篇 建筑学
    • 1 篇 土木工程
    • 1 篇 化学工程与技术
  • 32 篇 理学
    • 19 篇 物理学
    • 14 篇 数学
    • 5 篇 统计学(可授理学、...
    • 4 篇 系统科学
    • 2 篇 生物学
    • 1 篇 化学
  • 17 篇 管理学
    • 11 篇 管理科学与工程(可...
    • 10 篇 图书情报与档案管...
  • 6 篇 法学
    • 4 篇 社会学
    • 2 篇 法学
  • 2 篇 军事学
    • 1 篇 军队指挥学
  • 1 篇 经济学
    • 1 篇 应用经济学

主题

  • 6 篇 media
  • 6 篇 information proc...
  • 4 篇 feature extracti...
  • 4 篇 blockchain
  • 4 篇 accuracy
  • 3 篇 object detection
  • 3 篇 knowledge discov...
  • 3 篇 clustering algor...
  • 2 篇 image enhancemen...
  • 2 篇 access control
  • 2 篇 deep learning
  • 2 篇 graph convolutio...
  • 2 篇 indexes
  • 2 篇 generative adver...
  • 2 篇 transformers
  • 2 篇 big data
  • 2 篇 anomaly detectio...
  • 2 篇 voting
  • 2 篇 convolution
  • 2 篇 contrastive lear...

机构

  • 71 篇 advanced cryptog...
  • 34 篇 school of cybers...
  • 14 篇 sugon industrial...
  • 10 篇 chengdu universi...
  • 9 篇 school of cybers...
  • 5 篇 advanced cryptog...
  • 5 篇 school of cybers...
  • 4 篇 dazhou key labor...
  • 4 篇 school of foreig...
  • 4 篇 information secu...
  • 4 篇 school of inform...
  • 4 篇 sichuan key labo...
  • 3 篇 chengdu universi...
  • 3 篇 armonk ny 14201 ...
  • 3 篇 co. ltd.
  • 3 篇 metax integrated...
  • 2 篇 school of comput...
  • 2 篇 ny 10041 united ...
  • 2 篇 school of inform...
  • 2 篇 southeast univer...

作者

  • 14 篇 zhang shibin
  • 12 篇 huang yuanyuan
  • 11 篇 yuanyuan huang
  • 11 篇 shibin zhang
  • 10 篇 lu jiazhong
  • 8 篇 jiazhong lu
  • 6 篇 wang juan
  • 6 篇 qin zhi
  • 6 篇 xia jinyue
  • 5 篇 zhi qin
  • 5 篇 yan chang
  • 5 篇 ding chen
  • 5 篇 chang yan
  • 5 篇 lei shi
  • 4 篇 yang guo-wu
  • 4 篇 chen ding
  • 4 篇 yan lili
  • 4 篇 shi lei
  • 4 篇 zhang jinquan
  • 4 篇 li xiao-yu

语言

  • 92 篇 英文
  • 4 篇 其他
检索条件"机构=Sichuan Key Laboratory of Advanced Cryptography and System Security"
96 条 记 录,以下是1-10 订阅
排序:
A new method of constructing adversarial examplesfor quantum variational circuits
收藏 引用
Chinese Physics B 2023年 第7期32卷 268-272页
作者: 颜金歌 闫丽丽 张仕斌 School of Cybersecurity Chengdu University of Information TechnologySichuan 610000China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Sichuan 610000China
A quantum variational circuit is a quantum machine learning model similar to a neural network.A crafted adversarial example can lead to incorrect results for the *** adversarial examples to train the model will greatl... 详细信息
来源: 评论
A backdoor attack against quantum neural networks with limited information
收藏 引用
Chinese Physics B 2023年 第10期32卷 219-228页
作者: 黄晨猗 张仕斌 College of Cyberspace Security Chengdu University of Information TechnologyChengdu 610225China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu 610225China
Backdoor attacks are emerging security threats to deep neural *** these attacks,adversaries manipulate the network by constructing training samples embedded with backdoor *** backdoored model performs as expected on c... 详细信息
来源: 评论
Enhanced Privacy-Preserving WiFi Fingerprint Localization from CL Encryption
收藏 引用
Chinese Journal of Electronics 2024年 第6期33卷 1435-1446页
作者: Zhiwei WANG Qiuchi ZHU Zhenqi ZHANG School of Computer Nanjing University of Posts and Telecommunications State Key Laboratory of Public Big Data Guizhou University Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu University of Information Engineering Key Laboratory of Computational Science and Application of Hainan Province Hainan Normal University
The WiFi fingerprint-based localization method is considered one of the most popular techniques for indoor localization. In INFOCOM'14, Li et al. proposed a wireless fidelity(WiFi) fingerprint localization system ... 详细信息
来源: 评论
Variational Quantum Isometric Feature Mapping  4
Variational Quantum Isometric Feature Mapping
收藏 引用
4th International Symposium on Computer Technology and Information Science, ISCTIS 2024
作者: Gong, Guoqing Chengdu University of Information Technology Advanced Cryptography and System Security Key Laboratory of Sichuan Province School of Cybersecurity Sichuan China
Currently, big data often encounters "curse of dimensionality"problems. Using classic nonlinear dimensionality reduction algorithm, the complexity increases sharply with the increase of data dimension and qu... 详细信息
来源: 评论
A Cross-Multi-Domain Trust Assessment Authority Delegation Method Based on Automotive Industry Chain
收藏 引用
Computers, Materials & Continua 2025年 第1期82卷 407-426页
作者: Binyong Li Liangming Deng Jie Zhang Xianhui Deng School of Cybersecurity(Xin Gu Industrial College) Chengdu University of Information TechnologyChengdu610225China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610225China SUGON Industrial Control and Security Center Chengdu610225China
To solve the challenges of connecting and coordinating multiple platforms in the automotive industry and to enhance collaboration among different participants,this research focuses on addressing the complex supply rel... 详细信息
来源: 评论
Quantum private comparison of arbitrary single qubit states based on swap test
收藏 引用
Chinese Physics B 2022年 第4期31卷 123-132页
作者: Xi Huang Yan Chang Wen Cheng Min Hou Shi-Bin Zhang School of Cybersecurity Chengdu University of Information TechnologyChengdu 610225China Sichuan Key Laboratory of Advanced Cryptography and System Security Chengdu 610225China
By using swap test,a quantum private comparison(QPC) protocol of arbitrary single qubit states with a semi-honest third party is *** semi-honest third party(TP) is required to help two participants perform the *** can... 详细信息
来源: 评论
Point cloud classification method based on local dynamic edge graph convolution and global information fusion  4
Point cloud classification method based on local dynamic edg...
收藏 引用
4th International Conference on Computer Vision, Application, and Algorithm, CVAA 2024
作者: Du, Jie Sheng, Zhiwei Jin, Xingyu Huang, Yuanyuan Tian, Junbiao Chengdu University of Information Technology Chengdu610225 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610225 China
The development of automatic driving, unmanned aerial vehicle detection and virtual reality cannot be separated from the research of 3D point cloud. Existing studies either lack of local shape capture and local spatia... 详细信息
来源: 评论
Quantum Fuzzy Regression Model for Uncertain Environment
收藏 引用
Computers, Materials & Continua 2023年 第5期75卷 2759-2773页
作者: Tiansu Chen Shi bin Zhang Qirun Wang Yan Chang School of Cybersecurity Chengdu University of Information TechnologyChengdu610225China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610255China School of Engineering and Technology University of HertfordshireHertfordUK
In the era of big data,traditional regression models cannot deal with uncertain big data efficiently and *** order to make up for this deficiency,this paper proposes a quantum fuzzy regression model,which uses fuzzy t... 详细信息
来源: 评论
Summarizing Videos using the Uniqueness of Video Frames that Mask Adjacent Frame Information  19
Summarizing Videos using the Uniqueness of Video Frames that...
收藏 引用
19th International Conference on Natural Computation, Fuzzy systems and Knowledge Discovery, ICNC-FSKD 2023
作者: Huang, Yongxin Zhou, Yimin Wang, Zuli Chen, Ding Shi, Lei Chengdu University of Information Technology Chengdu610225 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province China
Video summarization can help people retrieve videos quickly. Existing unsupervised video summarization models make insufficient use of video frame uniqueness in the self-attention mechanism and have redundancy in the ... 详细信息
来源: 评论
Study on the Adversarial Sample Generation Algorithm Based on Adversarial Quantum Generation Adversarial Network  3
Study on the Adversarial Sample Generation Algorithm Based o...
收藏 引用
3rd International Symposium on Computer Technology and Information Science, ISCTIS 2023
作者: Cheng, Wen Zhang, ShiBin Lin, Yusheng School of Cybersecurity Sichuan Key Laboratory of Advanced Cryptography and System Security Chengdu University of Information Technology Chengdu610225 China
In response to the inefficiency of the existing advGAN method, which requires calculating the differences between the adversarial samples and the normal samples one by one when generating adversarial perturbations, th... 详细信息
来源: 评论