咨询与建议

限定检索结果

文献类型

  • 64 篇 会议
  • 32 篇 期刊文献

馆藏范围

  • 96 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 57 篇 工学
    • 49 篇 计算机科学与技术...
    • 44 篇 软件工程
    • 11 篇 信息与通信工程
    • 10 篇 控制科学与工程
    • 7 篇 电气工程
    • 6 篇 安全科学与工程
    • 5 篇 电子科学与技术(可...
    • 3 篇 光学工程
    • 3 篇 交通运输工程
    • 2 篇 生物工程
    • 2 篇 网络空间安全
    • 1 篇 机械工程
    • 1 篇 仪器科学与技术
    • 1 篇 动力工程及工程热...
    • 1 篇 建筑学
    • 1 篇 土木工程
    • 1 篇 化学工程与技术
  • 32 篇 理学
    • 19 篇 物理学
    • 14 篇 数学
    • 5 篇 统计学(可授理学、...
    • 4 篇 系统科学
    • 2 篇 生物学
    • 1 篇 化学
  • 17 篇 管理学
    • 11 篇 管理科学与工程(可...
    • 10 篇 图书情报与档案管...
  • 6 篇 法学
    • 4 篇 社会学
    • 2 篇 法学
  • 2 篇 军事学
    • 1 篇 军队指挥学
  • 1 篇 经济学
    • 1 篇 应用经济学

主题

  • 6 篇 media
  • 6 篇 information proc...
  • 4 篇 feature extracti...
  • 4 篇 blockchain
  • 4 篇 accuracy
  • 3 篇 object detection
  • 3 篇 knowledge discov...
  • 3 篇 clustering algor...
  • 2 篇 image enhancemen...
  • 2 篇 access control
  • 2 篇 deep learning
  • 2 篇 graph convolutio...
  • 2 篇 indexes
  • 2 篇 generative adver...
  • 2 篇 transformers
  • 2 篇 big data
  • 2 篇 anomaly detectio...
  • 2 篇 voting
  • 2 篇 convolution
  • 2 篇 contrastive lear...

机构

  • 71 篇 advanced cryptog...
  • 34 篇 school of cybers...
  • 14 篇 sugon industrial...
  • 10 篇 chengdu universi...
  • 9 篇 school of cybers...
  • 5 篇 advanced cryptog...
  • 5 篇 school of cybers...
  • 4 篇 dazhou key labor...
  • 4 篇 school of foreig...
  • 4 篇 information secu...
  • 4 篇 school of inform...
  • 4 篇 sichuan key labo...
  • 3 篇 chengdu universi...
  • 3 篇 armonk ny 14201 ...
  • 3 篇 co. ltd.
  • 3 篇 metax integrated...
  • 2 篇 school of comput...
  • 2 篇 ny 10041 united ...
  • 2 篇 school of inform...
  • 2 篇 southeast univer...

作者

  • 14 篇 zhang shibin
  • 12 篇 huang yuanyuan
  • 11 篇 yuanyuan huang
  • 11 篇 shibin zhang
  • 10 篇 lu jiazhong
  • 8 篇 jiazhong lu
  • 6 篇 wang juan
  • 6 篇 qin zhi
  • 6 篇 xia jinyue
  • 5 篇 zhi qin
  • 5 篇 yan chang
  • 5 篇 ding chen
  • 5 篇 chang yan
  • 5 篇 lei shi
  • 4 篇 yang guo-wu
  • 4 篇 chen ding
  • 4 篇 yan lili
  • 4 篇 shi lei
  • 4 篇 zhang jinquan
  • 4 篇 li xiao-yu

语言

  • 92 篇 英文
  • 4 篇 其他
检索条件"机构=Sichuan Key Laboratory of Advanced Cryptography and System Security"
96 条 记 录,以下是31-40 订阅
排序:
Attention Standard Deviation Based Token Sparsification  7
Attention Standard Deviation Based Token Sparsification
收藏 引用
7th International Conference on advanced Algorithms and Control Engineering, ICAACE 2024
作者: Gao, En We, Jinzhao Yang, Guowu University Of Electronic Science And Technology Of China Chengdu611731 China Guilin University Of Aerospace Technology Guilin541004 China University Of Electronic Science And Technology Of China China Advanced Cryptography And System Security Key Laboratory Of Sichuan Province Chengdu611731 China
Recently, model acceleration techniques have been applied to Vision Transformers (ViTs) to address their high computation costs, particularly in latency-sensitive domains. advanced techniques primarily focus on token ... 详细信息
来源: 评论
A Botnet Data Collection Method for Industrial Internet  20
A Botnet Data Collection Method for Industrial Internet
收藏 引用
20th International Computer Conference on Wavelet Active Media Technology and Information Processing, ICCWAMTIP 2023
作者: Jian, Shu Bo, Xian Chenli, Wang Jiazhong, Lu Yuanyuan, Huang Shuo, Han School of Cybersecurity Chengdu University of Information Technology Sichuan Chengdu610225 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Sichuan Chengdu610225 China Northwestern University Department of Statistics and Data Sciences EvanstonIL60202 United States
Industrial internet security is related to industrial production operations and national economic security. Network intrusion detection dataset in industrial control environment can effectively train detection models ... 详细信息
来源: 评论
MC-GAN: An Adversarial Sample Defense Algorithm  20
MC-GAN: An Adversarial Sample Defense Algorithm
收藏 引用
20th International Computer Conference on Wavelet Active Media Technology and Information Processing, ICCWAMTIP 2023
作者: Chenli, Wang Juyang, W.U. Xing, Yang Junfei, Wang Jian, S.H.U. Jiazhong, L.U. Yuanyuan, Huang Shuo, H.A.N. School of Cybersecurity Chengdu University of Information Technology Sichuan Chengdu610225 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Sichuan Chengdu610225 China Northwestern University Department of Statistics and Data Sciences EvanstonIL60202 United States
The current adversarial sample defense algorithms are plagued by issues such as poor defense effectiveness and high training costs. In order to enhance sample classification accuracy while reducing training costs, we ... 详细信息
来源: 评论
Fake News Detection Across Multiple Domains Using Fuzzy Association Rules  24th
Fake News Detection Across Multiple Domains Using Fuzzy Asso...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Xu, Xiaofeng Zhang, Weisha Huang, Yuanyuan Lu, Hongyu Lu, Jiazhong School of Cybersecurity Xin Gu Industrial College Chengdu University of Information Technology Chengdu610225 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610225 China SUGON Industrial Control and Security Center Chengdu610225 China School of Foreign Languages University of Electronic Science and Technology of China Chengdu611731 China
The detection of fake news is not confined to a single domain, and due to domain transfer, the reliance on detection methods specific to a single domain becomes inadequate when dealing with multi-domain issues. When a... 详细信息
来源: 评论
MS-UCON: A Usage Control Model for Meteorological Operational systems
MS-UCON: A Usage Control Model for Meteorological Operationa...
收藏 引用
International Conference on Fuzzy systems and Knowledge Discovery (FSKD)
作者: Dan Long Juan Wang Bin Han Ding Chen Lei Shi Chengdu University of Information Technology Chengdu China Advanced Cryptography and System Security Key Laboratory of Sichuan Province
With the national Belt and Road strategy in place, meteorological operational systems will face domestic and international dangers, and it is very urgent and important to protect the safety of meteorological equipment...
来源: 评论
Summarizing Videos using the Uniqueness of Video Frames that Mask Adjacent Frame Information
Summarizing Videos using the Uniqueness of Video Frames that...
收藏 引用
International Conference on Fuzzy systems and Knowledge Discovery (FSKD)
作者: Yongxin Huang Yimin Zhou Zuli Wang Ding Chen Lei Shi Chengdu University of Information Technology Chengdu China Advanced Cryptography and System Security Key Laboratory of Sichuan Province
Video summarization can help people retrieve videos quickly. Existing unsupervised video summarization models make insufficient use of video frame uniqueness in the self-attention mechanism and have redundancy in the ...
来源: 评论
Dynamic Semantic-Constrained Adversarial Training and Defensing: A Reinforcement Learning Framework for LLM-Generated Fake Information Detection  25
Dynamic Semantic-Constrained Adversarial Training and Defens...
收藏 引用
Proceedings of the 2025 2nd International Conference on Generative Artificial Intelligence and Information security
作者: Yuze Ding Shibin Zhang School of Cybersecurity (Xin Gu Industrial College) Chengdu University of Information Technology Chengdu Sichuan China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu Sichuan China
With the development of Large Language Models (LLMs) such as DeepSeek and GPT-4, the cost of generating false information has decreased dramatically, making detection more difficult to recognize. Traditional approache... 详细信息
来源: 评论
Petri net-based illegal information flow detection method for node-chain access control model
Petri net-based illegal information flow detection method fo...
收藏 引用
2023 International Conference on Communication Network and Machine Learning, CNML 2023
作者: Li, Binyong Fang, Jie Deng, Xianhui Sheng, Yuhan Chengdu University of Information Technology Chengdu China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu University of Information Technology Chengdu610225 China Sichuan Institute of Computer Sciences Chengdu China School of Cybersecurity Chengdu University of Information Technology Chengdu China
To address the problem of illegal information flow in the node chain access control model constructed by the existing attribute-based access control (ABAC) model when applied to a large-scale node chain scenario with ... 详细信息
来源: 评论
RRCNN: Request Response-Based Convolutional Neural Network for ICS Network Traffic Anomaly Detection
收藏 引用
Computers, Materials & Continua 2023年 第6期75卷 5743-5759页
作者: Yan Du Shibin Zhang Guogen Wan Daohua Zhou Jiazhong Lu Yuanyuan Huang Xiaoman Cheng Yi Zhang Peilin He Country School of Cybersecurity Chengdu University of Information TechnologyChengdu610225China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610225China DAQSOFT CO. LTDChengdu610213China Communication and Information Technology Center Petro China Southwest Oil and Gas CompanyChengdu610057China School of Computing and Information University of PittsburghPittsburgh152607PAUSA
Nowadays,industrial control system(ICS)has begun to integrate with the *** the Internet has brought convenience to ICS,it has also brought severe security *** ICS network traffic anomaly detection methods rely on stat... 详细信息
来源: 评论
Study on the Adversarial Sample Generation Algorithm Based on Adversarial Quantum Generation Adversarial Network
Study on the Adversarial Sample Generation Algorithm Based o...
收藏 引用
Computer Technology and Information Science (ISCTIS), International Symposium on
作者: Wen Cheng ShiBin Zhang Yusheng Lin School of Cybersecurity Sichuan Key Laboratory of advanced cryptography and system security Chengdu University of Information Technology Chengdu China
In response to the inefficiency of the existing advGAN method, which requires calculating the differences between the adversarial samples and the normal samples one by one when generating adversarial perturbations, th...
来源: 评论