咨询与建议

限定检索结果

文献类型

  • 64 篇 会议
  • 35 篇 期刊文献

馆藏范围

  • 99 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 59 篇 工学
    • 50 篇 计算机科学与技术...
    • 44 篇 软件工程
    • 11 篇 信息与通信工程
    • 11 篇 控制科学与工程
    • 7 篇 电气工程
    • 6 篇 安全科学与工程
    • 5 篇 电子科学与技术(可...
    • 3 篇 光学工程
    • 3 篇 交通运输工程
    • 2 篇 生物工程
    • 2 篇 网络空间安全
    • 1 篇 机械工程
    • 1 篇 仪器科学与技术
    • 1 篇 动力工程及工程热...
    • 1 篇 建筑学
    • 1 篇 土木工程
    • 1 篇 化学工程与技术
  • 32 篇 理学
    • 19 篇 物理学
    • 14 篇 数学
    • 5 篇 统计学(可授理学、...
    • 4 篇 系统科学
    • 2 篇 生物学
    • 1 篇 化学
  • 17 篇 管理学
    • 11 篇 管理科学与工程(可...
    • 10 篇 图书情报与档案管...
  • 6 篇 法学
    • 4 篇 社会学
    • 2 篇 法学
  • 2 篇 军事学
    • 1 篇 军队指挥学
  • 1 篇 经济学
    • 1 篇 应用经济学

主题

  • 6 篇 media
  • 6 篇 information proc...
  • 4 篇 feature extracti...
  • 4 篇 blockchain
  • 4 篇 accuracy
  • 3 篇 object detection
  • 3 篇 knowledge discov...
  • 3 篇 clustering algor...
  • 2 篇 image enhancemen...
  • 2 篇 access control
  • 2 篇 deep learning
  • 2 篇 graph convolutio...
  • 2 篇 indexes
  • 2 篇 generative adver...
  • 2 篇 transformers
  • 2 篇 big data
  • 2 篇 anomaly detectio...
  • 2 篇 voting
  • 2 篇 convolution
  • 2 篇 contrastive lear...

机构

  • 72 篇 advanced cryptog...
  • 34 篇 school of cybers...
  • 14 篇 sugon industrial...
  • 10 篇 chengdu universi...
  • 9 篇 school of cybers...
  • 5 篇 advanced cryptog...
  • 5 篇 school of cybers...
  • 4 篇 dazhou key labor...
  • 4 篇 school of foreig...
  • 4 篇 information secu...
  • 4 篇 school of inform...
  • 4 篇 sichuan key labo...
  • 3 篇 chengdu universi...
  • 3 篇 school of comput...
  • 3 篇 armonk ny 14201 ...
  • 3 篇 co. ltd.
  • 3 篇 metax integrated...
  • 2 篇 school of comput...
  • 2 篇 ny 10041 united ...
  • 2 篇 school of inform...

作者

  • 14 篇 zhang shibin
  • 12 篇 huang yuanyuan
  • 12 篇 shibin zhang
  • 11 篇 yuanyuan huang
  • 10 篇 lu jiazhong
  • 8 篇 jiazhong lu
  • 6 篇 wang juan
  • 6 篇 yan chang
  • 6 篇 qin zhi
  • 6 篇 xia jinyue
  • 5 篇 zhi qin
  • 5 篇 ding chen
  • 5 篇 chang yan
  • 5 篇 lei shi
  • 4 篇 lili yan
  • 4 篇 yang guo-wu
  • 4 篇 chen ding
  • 4 篇 yan lili
  • 4 篇 shi lei
  • 4 篇 zhang jinquan

语言

  • 91 篇 英文
  • 8 篇 其他
检索条件"机构=Sichuan Key Laboratory of Advanced Cryptography and System Security"
99 条 记 录,以下是11-20 订阅
排序:
MS-UCON: A Usage Control Model for Meteorological Operational systems  19
MS-UCON: A Usage Control Model for Meteorological Operationa...
收藏 引用
19th International Conference on Natural Computation, Fuzzy systems and Knowledge Discovery, ICNC-FSKD 2023
作者: Long, Dan Wang, Juan Han, Bin Chen, Ding Shi, Lei Chengdu University of Information Technology Chengdu610225 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province China
With the national Belt and Road strategy in place, meteorological operational systems will face domestic and international dangers, and it is very urgent and important to protect the safety of meteorological equipment... 详细信息
来源: 评论
Side-Channel Analysis and Countermeasures of Domestic Block Cipher uBlock  11
Side-Channel Analysis and Countermeasures of Domestic Block ...
收藏 引用
2023 IEEE 11th International Conference on Information, Communication and Networks, ICICN 2023
作者: Shang, Xinyan Liang, Kaifeng Wei, Congming Ding, Yaoling Sun, Shaofei Wang, An Beijing Institute of Technology School of Cyberspace Science and Technology Beijing China Hangzhou Normal University Key Laboratory of Cryptography of Zhejiang Province Hangzhou China Key Laboratory of Sichuan Province Advanced Cryptography and System Security Sichuan China
Nowadays, IoT devices are ubiquitous. Addressing data security issues in resource-limited devices is a key focus of IoT security. Therefore, lightweight cryptographic algorithms and their security research have receiv... 详细信息
来源: 评论
An Industrial Control system Risk Assessment Method  20
An Industrial Control System Risk Assessment Method
收藏 引用
20th International Computer Conference on Wavelet Active Media Technology and Information Processing, ICCWAMTIP 2023
作者: Jian, Shu Qiuxia, Xie Bo, Xian Chenli, Wang Jiazhong, Lu Yuanyuan, Huang School of Cybersecurity Chengdu University of Information Technology Sichuan Chengdu610225 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Sichuan Chengdu610225 China
With the rapid development of information technology, the combination of industrial control system and network communication technology is widely used in energy, manufacturing, military, aerospace and transportation. ... 详细信息
来源: 评论
Hybrid Classical Quantum Neural Network with High Adversarial Robustness
Hybrid Classical Quantum Neural Network with High Adversaria...
收藏 引用
2024 International Conference on Machine Learning and Intelligent Computing, MLIC 2024
作者: Yang, Yongxi Zhang, Shibin Yan, Lili Chang, Yan Chengdu University of Information Technology Chendu610225 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chendu610225 China SUGON Industrial Control and Security Center Chendu610225 China
As the realms of quantum computing and machine learning converge, a novel domain, termed quantum machine learning, is progressively forming within the sphere of artificial intelligence studies. Nonetheless, akin to it... 详细信息
来源: 评论
Quantum Fuzzy Support Vector Machine for Binary Classification
收藏 引用
Computer systems Science & Engineering 2023年 第6期45卷 2783-2794页
作者: Xi Huang Shibin Zhang Chen Lin Jinyue Xia School of Cybersecurity Chengdu University of Information TechnologyChengdu610225China Sichuan Key Laboratory of Advanced Cryptography and System Security Chengdu610225China International Business Machines Corporation(IBM) New York14201USA
In the objective world,how to deal with the complexity and uncertainty of big data efficiently and accurately has become the premise and key to machine *** support vector machine(FSVM)not only deals with the classifi-... 详细信息
来源: 评论
Differential Privacy Face Image Publishing Method Based on Neighboring Pixels Merging  21
Differential Privacy Face Image Publishing Method Based on N...
收藏 引用
21st International Computer Conference on Wavelet Active Media Technology and Information Processing, ICCWAMTIP 2024
作者: Lang, Ming Yongli, Wang Yuanyuan, Huang Junyu, Chen School of Cybersecurity Xin Gu Industrial College Chengdu University of Information Technology Chengdu610225 China Dazhou Key Laboratory of Government Data Security Dazhou635000 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610225 China
Face images contain rich and sensitive personal information. Direct release of facial images on the Internet may lead to the disclosure of personal information. In order to protect the privacy information in facial im... 详细信息
来源: 评论
An Embedding-Based Multi-Modal Few-Shot Learning Method for Network Intrusion Detection  21
An Embedding-Based Multi-Modal Few-Shot Learning Method for ...
收藏 引用
21st International Computer Conference on Wavelet Active Media Technology and Information Processing, ICCWAMTIP 2024
作者: Qiulin, He Jinquan, Zhang Yuanyuan, Huang School of Cybersecurity Xin Gu Industrial College Chengdu University of Information Technology Chengdu610225 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610225 China Dazhou Key Laboratory Government Data Security Dazhou635000 China
In this paper, we introduce an embedding-based few-shot learning framework, aiming to achieve classification by calculating the similarity measure between unknown samples and known samples in the embedding space. This... 详细信息
来源: 评论
Low-overhead fault-tolerant error correction scheme based on quantum stabilizer codes
收藏 引用
Chinese Physics B 2022年 第4期31卷 143-150页
作者: Xiu-Bo Chen Li-Yun Zhao Gang Xu Xing-Bo Pan Si-Yi Chen Zhen-Wen Cheng Yi-Xian Yang Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijing 100876China School of Information Science and Technology North China University of TechnologyBeijing 100144China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu 610025China
Fault-tolerant error-correction(FTEC)circuit is the foundation for achieving reliable quantum computation and remote ***,designing a fault-tolerant error correction scheme with a solid error-correction ability and low... 详细信息
来源: 评论
An Enhanced Fusion Model for Android Malware Detection Leveraging Multi-Code Fragment Features and Fuzzy Hashing  20
An Enhanced Fusion Model for Android Malware Detection Lever...
收藏 引用
20th International Computer Conference on Wavelet Active Media Technology and Information Processing, ICCWAMTIP 2023
作者: Lingrong, Han Shibin, Zhang Jiazhong, Lu Yuanyuan, Huang Zhi, Qin School of Cybersecurity Chengdu University of Information Technology Chengdu610225 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610225 China
Traditional methods for detecting Android malware require large-scale datasets and complex feature engineering, which are unable to adapt to complex malicious features. Additionally, feature engineering based on fuzzy... 详细信息
来源: 评论
Spiderweb Protector: Biomimetic Defense Against Targeted Attacks on Graph Neural Networks  21
Spiderweb Protector: Biomimetic Defense Against Targeted Att...
收藏 引用
21st International Computer Conference on Wavelet Active Media Technology and Information Processing, ICCWAMTIP 2024
作者: Zhou, Zeyu Huang, Yuanyuan Wang, Yongli Li, Siyu Lu, Jiazhong He, Peilin Chengdu University of Information Technology Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610225 China Dazhou Key Laboratory Government Data Security Dazhou635000 China University of Pittsburgh Department of Informatics and Networked Systems Pittsburgh15260 United States
Graph Neural Networks (GNNs) have emerged as powerful tools across diverse applications, including social networks, bioinformatics, and recommendation systems. However, their susceptibility to adversarial attacks, par... 详细信息
来源: 评论