咨询与建议

限定检索结果

文献类型

  • 64 篇 会议
  • 32 篇 期刊文献

馆藏范围

  • 96 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 57 篇 工学
    • 49 篇 计算机科学与技术...
    • 44 篇 软件工程
    • 11 篇 信息与通信工程
    • 10 篇 控制科学与工程
    • 7 篇 电气工程
    • 6 篇 安全科学与工程
    • 5 篇 电子科学与技术(可...
    • 3 篇 光学工程
    • 3 篇 交通运输工程
    • 2 篇 生物工程
    • 2 篇 网络空间安全
    • 1 篇 机械工程
    • 1 篇 仪器科学与技术
    • 1 篇 动力工程及工程热...
    • 1 篇 建筑学
    • 1 篇 土木工程
    • 1 篇 化学工程与技术
  • 32 篇 理学
    • 19 篇 物理学
    • 14 篇 数学
    • 5 篇 统计学(可授理学、...
    • 4 篇 系统科学
    • 2 篇 生物学
    • 1 篇 化学
  • 17 篇 管理学
    • 11 篇 管理科学与工程(可...
    • 10 篇 图书情报与档案管...
  • 6 篇 法学
    • 4 篇 社会学
    • 2 篇 法学
  • 2 篇 军事学
    • 1 篇 军队指挥学
  • 1 篇 经济学
    • 1 篇 应用经济学

主题

  • 6 篇 media
  • 6 篇 information proc...
  • 4 篇 feature extracti...
  • 4 篇 blockchain
  • 4 篇 accuracy
  • 3 篇 object detection
  • 3 篇 knowledge discov...
  • 3 篇 clustering algor...
  • 2 篇 image enhancemen...
  • 2 篇 access control
  • 2 篇 deep learning
  • 2 篇 graph convolutio...
  • 2 篇 indexes
  • 2 篇 generative adver...
  • 2 篇 transformers
  • 2 篇 big data
  • 2 篇 anomaly detectio...
  • 2 篇 voting
  • 2 篇 convolution
  • 2 篇 contrastive lear...

机构

  • 71 篇 advanced cryptog...
  • 34 篇 school of cybers...
  • 14 篇 sugon industrial...
  • 10 篇 chengdu universi...
  • 9 篇 school of cybers...
  • 5 篇 advanced cryptog...
  • 5 篇 school of cybers...
  • 4 篇 dazhou key labor...
  • 4 篇 school of foreig...
  • 4 篇 information secu...
  • 4 篇 school of inform...
  • 4 篇 sichuan key labo...
  • 3 篇 chengdu universi...
  • 3 篇 armonk ny 14201 ...
  • 3 篇 co. ltd.
  • 3 篇 metax integrated...
  • 2 篇 school of comput...
  • 2 篇 ny 10041 united ...
  • 2 篇 school of inform...
  • 2 篇 southeast univer...

作者

  • 14 篇 zhang shibin
  • 12 篇 huang yuanyuan
  • 11 篇 yuanyuan huang
  • 11 篇 shibin zhang
  • 10 篇 lu jiazhong
  • 8 篇 jiazhong lu
  • 6 篇 wang juan
  • 6 篇 qin zhi
  • 6 篇 xia jinyue
  • 5 篇 zhi qin
  • 5 篇 yan chang
  • 5 篇 ding chen
  • 5 篇 chang yan
  • 5 篇 lei shi
  • 4 篇 yang guo-wu
  • 4 篇 chen ding
  • 4 篇 yan lili
  • 4 篇 shi lei
  • 4 篇 zhang jinquan
  • 4 篇 li xiao-yu

语言

  • 92 篇 英文
  • 4 篇 其他
检索条件"机构=Sichuan Key Laboratory of Advanced Cryptography and System Security"
96 条 记 录,以下是61-70 订阅
排序:
A Fast Sampling-Based Parallel Dbscan Algorithm for Massive Datasets
A Fast Sampling-Based Parallel Dbscan Algorithm for Massive ...
收藏 引用
International Conference on Wavelet Active Media Technology and Information Processing (ICWAMTIP)
作者: Wang Gefeng Zhang Shibin Yan Lili Lv Zhiying Chang Yan Qin Zhi School of Cybersecurity (Xin Gu Industrial College) Chengdu University of Information Technology Chengdu China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu China SUGON Industrial Control and Security Center Chengdu China
Clustering is a type of data mining algorithm aimed at discovering hidden patterns in the data, and spatial clustering is an important type of it. Density-based spatial clustering of applications with noise (DBSCAN) i... 详细信息
来源: 评论
A Method for Compressed Storage and Retrieval of Triplet Data Based on Cuckoo Hashing
A Method for Compressed Storage and Retrieval of Triplet Dat...
收藏 引用
International Conference on Wavelet Active Media Technology and Information Processing (ICWAMTIP)
作者: Liu Pengcheng Qinzhi Zhang Shibin Chang Yan Yan Lili School of Cybersecurity (Xin Gu Industrial College) Chengdu University of Information Technology Chengdu China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu China SUGON Industrial Control and Security Center Chengdu China
This paper proposes a method for compressing and retrieving triple data based on optimized cuckoo hash. Firstly, the optimized cuckoo hash algorithm is utilized to quickly establish node indexes. Then, the relationshi... 详细信息
来源: 评论
Research of Drawing Data Asset Graph Based on Force-Oriented Algorithm
Research of Drawing Data Asset Graph Based on Force-Oriented...
收藏 引用
International Conference on Wavelet Active Media Technology and Information Processing (ICWAMTIP)
作者: Huang Sihan Qin Zhi Zhang Shibin Chang Yan Yan Lili School of Cybersecurity (Xin Gu Industrial College) Chengdu University of Information Technology Chengdu China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu China SUGON Industrial Control and Security Center Chengdu China
With the rapid development of the new energy vehicle industry, the data volume in the industry is growing explosively. How to effectively visualize and analyze these data has become a focus of attention in the industr... 详细信息
来源: 评论
A Secure Multiparty Quantum Homomorphic Encryption Scheme
收藏 引用
Computers, Materials & Continua 2022年 第11期73卷 2835-2848页
作者: Jing-Wen Zhang Xiu-Bo Chen Gang Xu Heng-Ji Li Ya-Lan Wang Li-Hua Miao Yi-Xian Yang Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijing100876China School of Information Science and Technology North China University of TechnologyBeijing100144China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Sichuan610025China Quantum Technology Lab&Applied Mechanics Group University of MilanMilan20133Italy Department of Computer Science Faculty of Engineering and Physical SciencesUniversity of SurreyGuildfordSurreyGU27XHUnited Kingdom Huawei Technologies Co.Ltd Shenzhen518129China
The significant advantage of the quantum homomorphic encryption scheme is to ensure the perfect security of quantum private *** this paper,a novel secure multiparty quantum homomorphic encryption scheme is proposed,wh... 详细信息
来源: 评论
Petri net-based illegal information flow detection method for node-chain access control model  23
Petri net-based illegal information flow detection method fo...
收藏 引用
Proceedings of the 2023 International Conference on Communication Network and Machine Learning
作者: Binyong Li Jie Fang Xianhui Deng Yuhan Sheng School of Cybersecurity (Xin Gu Industrial College) Chengdu University of Information Technology China and Advanced Cryptography and System Security Key Laboratory of Sichuan Province China Sichuan Institute of Computer Sciences China School of Cybersecurity Chengdu University of Information Technology China
To address the problem of illegal information flow in the node chain access control model constructed by the existing attribute-based access control (ABAC) model when applied to a large-scale node chain scenario with ...
来源: 评论
MC-GAN: An Adversarial Sample Defense Algorithm
MC-GAN: An Adversarial Sample Defense Algorithm
收藏 引用
International Conference on Wavelet Active Media Technology and Information Processing (ICWAMTIP)
作者: WANG CHENLI WU JUYANG YANG XING WANG JUNFEI SHU JIAN LU JIAZHONG HUANG YUANYUAN HAN SHUO School of Cybersecurity Chengdu University of Information Technology Chengdu Sichuan China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu Sichuan China Department of Statistics and Data Sciences Northwestern University Evanston IL USA
The current adversarial sample defense algorithms are plagued by issues such as poor defense effectiveness and high training costs. In order to enhance sample classification accuracy while reducing training costs, we ...
来源: 评论
Attention Standard Deviation Based Token Sparsification
Attention Standard Deviation Based Token Sparsification
收藏 引用
advanced Algorithms and Control Engineering (ICAACE), International Conference on
作者: En Gao Jinzhao We Guowu Yang University of Electronic Science and Technology of China Chengdu China Guilin University of Aerospace Technology Guilin China University of Electronic Science and Technology of China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu China
Recently, model acceleration techniques have been applied to Vision Transformers (ViTs) to address their high computation costs, particularly in latency-sensitive domains. advanced techniques primarily focus on token ... 详细信息
来源: 评论
Dangerous Action Recognition for Ship Sailing to Limited Resource Environment
Dangerous Action Recognition for Ship Sailing to Limited Res...
收藏 引用
International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC
作者: Shengchao Yuan Yimin Zhou Lei Shi Yongxin Huang School of Cyberspace Security Chengdu University of Information Technology Chengdu China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu China
Action recognition is a comprehensive application prospect in the surveillance video source but most of the well-known models have significant computational cost feature. Take a bottom-up algorithm named OpenPose as a... 详细信息
来源: 评论
Twitter Bots in Cyber-Physical-Social systems: Detection and Estimation Based on the SEIR Model
收藏 引用
security and Communication Networks 2023年 第1期2023卷
作者: Zhang, Weisha Lu, Jiazhong Liu, Yulin Liu, Xiaojun School of Foreign Languages University of Electronic Science and Technology of China Chengdu611731 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province School of Cybersecurity Chengdu University of Information Technology Chengdu610225 China
Bots are now part of the social media landscape, and thus, a threat to cyber-physical-social systems (CPSSs). A better understanding of their characteristic behaviors and estimation of their impact on public opinion c... 详细信息
来源: 评论
A Botnet Data Collection Method for Industrial Internet
A Botnet Data Collection Method for Industrial Internet
收藏 引用
International Conference on Wavelet Active Media Technology and Information Processing (ICWAMTIP)
作者: Shu Jian Xian Bo Wang Chenli Lu Jiazhong Huang Yuanyuan Han Shuo School of Cybersecurity Chengdu University of Information Technology Chengdu Sichuan China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu Sichuan China Department of Statistics and Data Sciences Northwestern University Evanston IL USA
Industrial internet security is related to industrial production operations and national economic security. Network intrusion detection dataset in industrial control environment can effectively train detection models ...
来源: 评论