咨询与建议

限定检索结果

文献类型

  • 64 篇 会议
  • 32 篇 期刊文献

馆藏范围

  • 96 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 57 篇 工学
    • 49 篇 计算机科学与技术...
    • 44 篇 软件工程
    • 11 篇 信息与通信工程
    • 10 篇 控制科学与工程
    • 7 篇 电气工程
    • 6 篇 安全科学与工程
    • 5 篇 电子科学与技术(可...
    • 3 篇 光学工程
    • 3 篇 交通运输工程
    • 2 篇 生物工程
    • 2 篇 网络空间安全
    • 1 篇 机械工程
    • 1 篇 仪器科学与技术
    • 1 篇 动力工程及工程热...
    • 1 篇 建筑学
    • 1 篇 土木工程
    • 1 篇 化学工程与技术
  • 32 篇 理学
    • 19 篇 物理学
    • 14 篇 数学
    • 5 篇 统计学(可授理学、...
    • 4 篇 系统科学
    • 2 篇 生物学
    • 1 篇 化学
  • 17 篇 管理学
    • 11 篇 管理科学与工程(可...
    • 10 篇 图书情报与档案管...
  • 6 篇 法学
    • 4 篇 社会学
    • 2 篇 法学
  • 2 篇 军事学
    • 1 篇 军队指挥学
  • 1 篇 经济学
    • 1 篇 应用经济学

主题

  • 6 篇 media
  • 6 篇 information proc...
  • 4 篇 feature extracti...
  • 4 篇 blockchain
  • 4 篇 accuracy
  • 3 篇 object detection
  • 3 篇 knowledge discov...
  • 3 篇 clustering algor...
  • 2 篇 image enhancemen...
  • 2 篇 access control
  • 2 篇 deep learning
  • 2 篇 graph convolutio...
  • 2 篇 indexes
  • 2 篇 generative adver...
  • 2 篇 transformers
  • 2 篇 big data
  • 2 篇 anomaly detectio...
  • 2 篇 voting
  • 2 篇 convolution
  • 2 篇 contrastive lear...

机构

  • 71 篇 advanced cryptog...
  • 34 篇 school of cybers...
  • 14 篇 sugon industrial...
  • 10 篇 chengdu universi...
  • 9 篇 school of cybers...
  • 5 篇 advanced cryptog...
  • 5 篇 school of cybers...
  • 4 篇 dazhou key labor...
  • 4 篇 school of foreig...
  • 4 篇 information secu...
  • 4 篇 school of inform...
  • 4 篇 sichuan key labo...
  • 3 篇 chengdu universi...
  • 3 篇 armonk ny 14201 ...
  • 3 篇 co. ltd.
  • 3 篇 metax integrated...
  • 2 篇 school of comput...
  • 2 篇 ny 10041 united ...
  • 2 篇 school of inform...
  • 2 篇 southeast univer...

作者

  • 14 篇 zhang shibin
  • 12 篇 huang yuanyuan
  • 11 篇 yuanyuan huang
  • 11 篇 shibin zhang
  • 10 篇 lu jiazhong
  • 8 篇 jiazhong lu
  • 6 篇 wang juan
  • 6 篇 qin zhi
  • 6 篇 xia jinyue
  • 5 篇 zhi qin
  • 5 篇 yan chang
  • 5 篇 ding chen
  • 5 篇 chang yan
  • 5 篇 lei shi
  • 4 篇 yang guo-wu
  • 4 篇 chen ding
  • 4 篇 yan lili
  • 4 篇 shi lei
  • 4 篇 zhang jinquan
  • 4 篇 li xiao-yu

语言

  • 92 篇 英文
  • 4 篇 其他
检索条件"机构=Sichuan Key Laboratory of Advanced Cryptography and System Security"
96 条 记 录,以下是51-60 订阅
排序:
Differential Privacy Face Image Publishing Method Based on Neighboring Pixels Merging
Differential Privacy Face Image Publishing Method Based on N...
收藏 引用
International Conference on Wavelet Active Media Technology and Information Processing (ICWAMTIP)
作者: Ming Lang Wang Yongli Huang Yuanyuan Chen Junyu School of Cybersecurity (Xin Gu Industrial College) Chengdu University of Information Technology Chengdu China Dazhou key Laboratory of Government data security Dazhou China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu China
Face images contain rich and sensitive personal information. Direct release of facial images on the Internet may lead to the disclosure of personal information. In order to protect the privacy information in facial im... 详细信息
来源: 评论
A Blockchain-Based Risk Assessment Model for Heterogeneous Identity Alliance  8th
A Blockchain-Based Risk Assessment Model for Heterogeneous I...
收藏 引用
8th International Conference on Artificial Intelligence and security , ICAIS 2022
作者: Yang, Yanbo Wan, Wunan Zhang, Shibin Zhang, Jinquan Qin, Zhi Xia, Jinyue School of Cybersecurity Chengdu University of Information Technology Chengdu610225 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610255 China New York10041 NY 212 United States
Heterogeneous identity alliance technology solves the identity management problem under heterogeneous networks by building a unified and trusted identity management system, while the risk assessment system of heteroge... 详细信息
来源: 评论
An Embedding-Based Multi-Modal Few-Shot Learning Method for Network Intrusion Detection
An Embedding-Based Multi-Modal Few-Shot Learning Method for ...
收藏 引用
International Conference on Wavelet Active Media Technology and Information Processing (ICWAMTIP)
作者: He Qiulin Zhang Jinquan Huang Yuanyuan School of Cybersecurity (Xin Gu Industrial College) Chengdu University of Information Technology Chengdu China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu China Dazhou key Laboratory of Government data security Dazhou China
In this paper, we introduce an embedding-based few-shot learning framework, aiming to achieve classification by calculating the similarity measure between unknown samples and known samples in the embedding space. This... 详细信息
来源: 评论
An Enhanced Fusion Model for Android Malware Detection Leveraging Multi-Code Fragment Features and Fuzzy Hashing
An Enhanced Fusion Model for Android Malware Detection Lever...
收藏 引用
International Conference on Wavelet Active Media Technology and Information Processing (ICWAMTIP)
作者: Han Lingrong Zhang Shibin Lu Jiazhong Huang Yuanyuan Qin Zhi School of Cybersecurity Chengdu University of Information Technology Chengdu China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu China
Traditional methods for detecting Android malware require large-scale datasets and complex feature engineering, which are unable to adapt to complex malicious features. Additionally, feature engineering based on fuzzy...
来源: 评论
Side-Channel Analysis and Countermeasures of Domestic Block Cipher uBlock
Side-Channel Analysis and Countermeasures of Domestic Block ...
收藏 引用
International Conference on Information, Communication and Networks (ICICN)
作者: Xinyan Shang Kaifeng Liang Congming Wei Yaoling Ding Shaofei Sun An Wang School of Cyberspace Science and Technology Beijing Institute of Technology Beijing China Key Laboratory of Cryptography of Zhejiang Province Hangzhou Normal University Hangzhou China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Sichuan China
Nowadays, IoT devices are ubiquitous. Addressing data security issues in resource-limited devices is a key focus of IoT security. Therefore, lightweight cryptographic algorithms and their security research have receiv...
来源: 评论
Quantum Fuzzy Least Squares Algorithm for Uncertain Environment  8th
Quantum Fuzzy Least Squares Algorithm for Uncertain Environm...
收藏 引用
8th International Conference on Artificial Intelligence and security , ICAIS 2022
作者: Yu, Shipeng Chang, Yan Zhang, Shibin Wang, Qirun School of Cybersecurity Chengdu University of Information Technology Chengdu610225 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610255 China School of Engineering and Technology University of Hertfordshire Hertford United Kingdom
With the development of information technology, modern society has entered the era of big data. Big data means a huge amount of data, as well as the complexity and uncertainty of data. In order to find valuable data e... 详细信息
来源: 评论
Spiderweb Protector: Biomimetic Defense Against Targeted Attacks on Graph Neural Networks
Spiderweb Protector: Biomimetic Defense Against Targeted Att...
收藏 引用
International Conference on Wavelet Active Media Technology and Information Processing (ICWAMTIP)
作者: Zeyu Zhou Yuanyuan Huang Yongli Wang Siyu Li Jiazhong Lu Peilin He Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu University of Information Technology Chengdu China Dazhou key Laboratory of Government data security Dazhou China Department of Informatics and Networked Systems University of Pittsburgh Pittsburgh United States
Graph Neural Networks (GNNs) have emerged as powerful tools across diverse applications, including social networks, bioinformatics, and recommendation systems. However, their susceptibility to adversarial attacks, par... 详细信息
来源: 评论
Enhanced Lightweight Network with CNN and Improved Transformer for Image Super-Resolution
Enhanced Lightweight Network with CNN and Improved Transform...
收藏 引用
International Conference on Fuzzy systems and Knowledge Discovery (FSKD)
作者: Hengyu Li Juan Wang Jie Liu Ding Chen Lei Shi Chengdu University of Information Technology Chengdu China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu University of Information Technology Chengdu China
In recent years, there have been significant advancements in deep learning-based lightweight image super-resolution (SR) reconstruction techniques. However, in practical applications, there are still challenges to be ...
来源: 评论
Research on Effective Segment Extraction of Ship Surveillance Videos
Research on Effective Segment Extraction of Ship Surveillanc...
收藏 引用
International Conference on Fuzzy systems and Knowledge Discovery (FSKD)
作者: Jie Liu Juan Wang Hengyu Li Ding Chen Lei Shi Chengdu University of Information Technology Chengdu China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu University of Information Technology Chengdu China
Effective segment extraction has broad application prospects in the field of video surveillance. In action recognition or object recognition, a large number of repetitive background segments will reduce the efficiency...
来源: 评论
Quantum Remote State Preparation Based on Quantum Network Coding
收藏 引用
Computers, Materials & Continua 2022年 第10期73卷 119-132页
作者: Zhen-Zhen Li Zi-Chen Li Yi-Ru Sun Haseeb Ahmad Gang Xu Xiu-Bo Chen School of Information Engineering Beijing Institute of Graphic CommunicationBeijing102600China School of Computer Science and Information Engineering Zhejiang Gongshang UniversityHangzhou310018China Information Security Center State key Laboratory of Networking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijing100876China Department of Computer Science National Textile UniversityFaisalabad37610Pakistan School of Information Science and Technology North China University of TechnologyBeijing100144China Advanced Cryptography and System Security Key Laboratory of Sichuan Province China
As an innovative theory and technology,quantum network coding has become the research hotspot in quantum network *** this paper,a quantum remote state preparation scheme based on quantum network coding is *** with the... 详细信息
来源: 评论