咨询与建议

限定检索结果

文献类型

  • 64 篇 会议
  • 35 篇 期刊文献

馆藏范围

  • 99 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 59 篇 工学
    • 50 篇 计算机科学与技术...
    • 44 篇 软件工程
    • 11 篇 信息与通信工程
    • 11 篇 控制科学与工程
    • 7 篇 电气工程
    • 6 篇 安全科学与工程
    • 5 篇 电子科学与技术(可...
    • 3 篇 光学工程
    • 3 篇 交通运输工程
    • 2 篇 生物工程
    • 2 篇 网络空间安全
    • 1 篇 机械工程
    • 1 篇 仪器科学与技术
    • 1 篇 动力工程及工程热...
    • 1 篇 建筑学
    • 1 篇 土木工程
    • 1 篇 化学工程与技术
  • 32 篇 理学
    • 19 篇 物理学
    • 14 篇 数学
    • 5 篇 统计学(可授理学、...
    • 4 篇 系统科学
    • 2 篇 生物学
    • 1 篇 化学
  • 17 篇 管理学
    • 11 篇 管理科学与工程(可...
    • 10 篇 图书情报与档案管...
  • 6 篇 法学
    • 4 篇 社会学
    • 2 篇 法学
  • 2 篇 军事学
    • 1 篇 军队指挥学
  • 1 篇 经济学
    • 1 篇 应用经济学

主题

  • 6 篇 media
  • 6 篇 information proc...
  • 4 篇 feature extracti...
  • 4 篇 blockchain
  • 4 篇 accuracy
  • 3 篇 object detection
  • 3 篇 knowledge discov...
  • 3 篇 clustering algor...
  • 2 篇 image enhancemen...
  • 2 篇 access control
  • 2 篇 deep learning
  • 2 篇 graph convolutio...
  • 2 篇 indexes
  • 2 篇 generative adver...
  • 2 篇 transformers
  • 2 篇 big data
  • 2 篇 anomaly detectio...
  • 2 篇 voting
  • 2 篇 convolution
  • 2 篇 contrastive lear...

机构

  • 72 篇 advanced cryptog...
  • 34 篇 school of cybers...
  • 14 篇 sugon industrial...
  • 10 篇 chengdu universi...
  • 9 篇 school of cybers...
  • 5 篇 advanced cryptog...
  • 5 篇 school of cybers...
  • 4 篇 dazhou key labor...
  • 4 篇 school of foreig...
  • 4 篇 information secu...
  • 4 篇 school of inform...
  • 4 篇 sichuan key labo...
  • 3 篇 chengdu universi...
  • 3 篇 school of comput...
  • 3 篇 armonk ny 14201 ...
  • 3 篇 co. ltd.
  • 3 篇 metax integrated...
  • 2 篇 school of comput...
  • 2 篇 ny 10041 united ...
  • 2 篇 school of inform...

作者

  • 14 篇 zhang shibin
  • 12 篇 huang yuanyuan
  • 12 篇 shibin zhang
  • 11 篇 yuanyuan huang
  • 10 篇 lu jiazhong
  • 8 篇 jiazhong lu
  • 6 篇 wang juan
  • 6 篇 yan chang
  • 6 篇 qin zhi
  • 6 篇 xia jinyue
  • 5 篇 zhi qin
  • 5 篇 ding chen
  • 5 篇 chang yan
  • 5 篇 lei shi
  • 4 篇 lili yan
  • 4 篇 yang guo-wu
  • 4 篇 chen ding
  • 4 篇 yan lili
  • 4 篇 shi lei
  • 4 篇 zhang jinquan

语言

  • 91 篇 英文
  • 8 篇 其他
检索条件"机构=Sichuan Key Laboratory of Advanced Cryptography and System Security"
99 条 记 录,以下是41-50 订阅
排序:
Study on the Adversarial Sample Generation Algorithm Based on Adversarial Quantum Generation Adversarial Network
Study on the Adversarial Sample Generation Algorithm Based o...
收藏 引用
Computer Technology and Information Science (ISCTIS), International Symposium on
作者: Wen Cheng ShiBin Zhang Yusheng Lin School of Cybersecurity Sichuan Key Laboratory of advanced cryptography and system security Chengdu University of Information Technology Chengdu China
In response to the inefficiency of the existing advGAN method, which requires calculating the differences between the adversarial samples and the normal samples one by one when generating adversarial perturbations, th...
来源: 评论
Quantum Fuzzy Principal Component Analysis  8th
Quantum Fuzzy Principal Component Analysis
收藏 引用
8th International Conference on Artificial Intelligence and security , ICAIS 2022
作者: Wang, Cheng Zhang, Shibin Xia, Jinyue School of Cybersecurity Chengdu University of Information Technology Chengdu610225 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610255 China ArmonkNY14201 United States
At present, principal component analysis is widely used in the dimensionality reduction processing of high-dimensional data. On the premise of ensuring that the information loss in the construction process is as littl... 详细信息
来源: 评论
Quantum Gate-Based Quantum Private Comparison Protocol Using Four-Particle GHZ States  8th
Quantum Gate-Based Quantum Private Comparison Protocol Using...
收藏 引用
8th International Conference on Artificial Intelligence and security , ICAIS 2022
作者: Hou, Min Zhang, Shibin Xia, Jinyue School of Cybersecurity Chengdu University of Information Technology Chengdu610225 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610255 China ArmonkNY14201 United States
The previous quantum private comparison (QPC) protocols often utilize quantum technology to provide security and the classic computing to perform exclusive-OR operation. In this paper, a secure quantum gate-based quan... 详细信息
来源: 评论
Efficient Quantum Private Comparison Using Locally Indistinguishable Orthogonal Product States  8th
Efficient Quantum Private Comparison Using Locally Indisting...
收藏 引用
8th International Conference on Artificial Intelligence and security , ICAIS 2022
作者: Huang, Xi Zhang, Shibin Xia, Jinyue School of Cybersecurity Chengdu University of Information Technology Chengdu610225 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610255 China ArmonkNY14201 United States
In this paper, an efficient quantum private comparison (QPC) for equality comparison using locally indistinguishable orthogonal product states is proposed. In the proposed protocol, two participants can compare the eq... 详细信息
来源: 评论
Attribute-Based Data Sharing Scheme with Flexible Search Functionality for Cloud-Assisted Autonomous Transportation system
收藏 引用
IEEE Transactions on Industrial Informatics 2023年 第11期19卷 10977-10986页
作者: Xiong, Hu Wang, Hanxiao Meng, Weizhi Yeh, Kuo-Hui University of Electronic Science and Technology of China School of Information and Software Engineering Network and Data Security Key Laboratory of Sichuan Province Chengdu610054 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610025 China Technical University of Denmark Department of Applied Mathematics and Computer Science Kongens Lyngby2800 Denmark National Dong Hwa University Department of Information Management Hualien97401 Taiwan National Sun Yat-sen University Department of Computer Science and Engineering Kaohsiung804201 Taiwan
The existing group public key encryption with equality test schemes could only support one-to-one data sharing and are not suitable for cloud-assisted autonomous transportation systems, which demand one-to-many data s... 详细信息
来源: 评论
An Industrial Control system Risk Assessment Method
An Industrial Control System Risk Assessment Method
收藏 引用
International Conference on Wavelet Active Media Technology and Information Processing (ICWAMTIP)
作者: Shu Jian Xie Qiuxia Xian Bo Wang Chenli Lu Jiazhong Huang Yuanyuan School of Cybersecurity Chengdu University of Information Technology Chengdu Sichuan China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu Sichuan China
With the rapid development of information technology, the combination of industrial control system and network communication technology is widely used in energy, manufacturing, military, aerospace and transportation. ...
来源: 评论
BPTTD: Block-Parallel Singular Value Decomposition(SVD) Based Tensor Train Decomposition  26
BPTTD: Block-Parallel Singular Value Decomposition(SVD) Base...
收藏 引用
26th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2023
作者: Meng, Fanshuo Li, Peng Fan, Weibei Zhang, Hongjun Xue, Zhuangzhuang Cheng, Haitao Nanjing University of Posts and Telecommunications School of Computer Science Nanjing210023 China Institute of Network Security and Trusted Computing Nanjing210023 China Nanjing University of Posts and Telecommunications School of Internet of Things Nanjing210023 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610054 China
Tensors are naturally suitable for representing high-dimensional data. Tensor train decomposition is an effective data processing method to cope with high-dimensional tensors. It is widely used in many fields, such as... 详细信息
来源: 评论
Twitter Bot Detection with Multi-Head Attention and Supervised Contrastive Learning  21
Twitter Bot Detection with Multi-Head Attention and Supervis...
收藏 引用
21st International Computer Conference on Wavelet Active Media Technology and Information Processing, ICCWAMTIP 2024
作者: Qiang, Liu Jiazhong, Lu Yuanyuan, Huang Weisha, Zhang Jun, Lv School of Cybersecurity Xin Gu Industrial College Chengdu University of Information Technology Chengdu610225 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610225 China SUGON Industrial Control and Security Center Chengdu610225 China School of Foreign Languages University of Electronic Science and Technology of China Chengdu611731 China Co. Ltd. China
The task of detecting bots on Twitter is an indispensable task for combating social network disinformation, curbing rumors, and managing online public opinion. However, today's social bots often disguise themselve... 详细信息
来源: 评论
An Improved Certificateless Partial Blind Signature Scheme Based on Homomorphic Encryption  8th
An Improved Certificateless Partial Blind Signature Scheme B...
收藏 引用
8th International Conference on Artificial Intelligence and security , ICAIS 2022
作者: Tan, Pengfei Qin, Zhi Wan, Wunan Zhang, Shibin Zhang, Jinquan Xia, Jinyue School of Cybersecurity Chengdu University of Information Technology Chengdu610225 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610225 China New YorkNY10041 United States
A modified Paillier homomorphic cryptography-based partial blind signature scheme is proposed to address the problems of centralized key generation in traditional blind signature schemes and the fact that the current ... 详细信息
来源: 评论
A High-Efficiency Blockchain Sharded Storage Expansion Model  8th
A High-Efficiency Blockchain Sharded Storage Expansion Model
收藏 引用
8th International Conference on Artificial Intelligence and security , ICAIS 2022
作者: Guo, Jinliang Zhang, Jinquan Wan, Wunan Qin, Zhi Pu, Huailin Zhang, Shibin Xia, Jinyue School of Cybersecurity Chengdu University of Information Technology Chengdu610225 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610225 China New YorkNY10041 United States
Blockchain is a new decentralized storage system that combines cryptography, consensus algorithms, distributed storage and other technologies. The full node redundant storage of data on the blockchain provides extreme... 详细信息
来源: 评论