咨询与建议

限定检索结果

文献类型

  • 64 篇 会议
  • 32 篇 期刊文献

馆藏范围

  • 96 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 57 篇 工学
    • 49 篇 计算机科学与技术...
    • 44 篇 软件工程
    • 11 篇 信息与通信工程
    • 10 篇 控制科学与工程
    • 7 篇 电气工程
    • 6 篇 安全科学与工程
    • 5 篇 电子科学与技术(可...
    • 3 篇 光学工程
    • 3 篇 交通运输工程
    • 2 篇 生物工程
    • 2 篇 网络空间安全
    • 1 篇 机械工程
    • 1 篇 仪器科学与技术
    • 1 篇 动力工程及工程热...
    • 1 篇 建筑学
    • 1 篇 土木工程
    • 1 篇 化学工程与技术
  • 32 篇 理学
    • 19 篇 物理学
    • 14 篇 数学
    • 5 篇 统计学(可授理学、...
    • 4 篇 系统科学
    • 2 篇 生物学
    • 1 篇 化学
  • 17 篇 管理学
    • 11 篇 管理科学与工程(可...
    • 10 篇 图书情报与档案管...
  • 6 篇 法学
    • 4 篇 社会学
    • 2 篇 法学
  • 2 篇 军事学
    • 1 篇 军队指挥学
  • 1 篇 经济学
    • 1 篇 应用经济学

主题

  • 6 篇 media
  • 6 篇 information proc...
  • 4 篇 feature extracti...
  • 4 篇 blockchain
  • 4 篇 accuracy
  • 3 篇 object detection
  • 3 篇 knowledge discov...
  • 3 篇 clustering algor...
  • 2 篇 image enhancemen...
  • 2 篇 access control
  • 2 篇 deep learning
  • 2 篇 graph convolutio...
  • 2 篇 indexes
  • 2 篇 generative adver...
  • 2 篇 transformers
  • 2 篇 big data
  • 2 篇 anomaly detectio...
  • 2 篇 voting
  • 2 篇 convolution
  • 2 篇 contrastive lear...

机构

  • 71 篇 advanced cryptog...
  • 34 篇 school of cybers...
  • 14 篇 sugon industrial...
  • 10 篇 chengdu universi...
  • 9 篇 school of cybers...
  • 5 篇 advanced cryptog...
  • 5 篇 school of cybers...
  • 4 篇 dazhou key labor...
  • 4 篇 school of foreig...
  • 4 篇 information secu...
  • 4 篇 school of inform...
  • 4 篇 sichuan key labo...
  • 3 篇 chengdu universi...
  • 3 篇 armonk ny 14201 ...
  • 3 篇 co. ltd.
  • 3 篇 metax integrated...
  • 2 篇 school of comput...
  • 2 篇 ny 10041 united ...
  • 2 篇 school of inform...
  • 2 篇 southeast univer...

作者

  • 14 篇 zhang shibin
  • 12 篇 huang yuanyuan
  • 11 篇 yuanyuan huang
  • 11 篇 shibin zhang
  • 10 篇 lu jiazhong
  • 8 篇 jiazhong lu
  • 6 篇 wang juan
  • 6 篇 qin zhi
  • 6 篇 xia jinyue
  • 5 篇 zhi qin
  • 5 篇 yan chang
  • 5 篇 ding chen
  • 5 篇 chang yan
  • 5 篇 lei shi
  • 4 篇 yang guo-wu
  • 4 篇 chen ding
  • 4 篇 yan lili
  • 4 篇 shi lei
  • 4 篇 zhang jinquan
  • 4 篇 li xiao-yu

语言

  • 92 篇 英文
  • 4 篇 其他
检索条件"机构=Sichuan Key Laboratory of Advanced Cryptography and System Security"
96 条 记 录,以下是71-80 订阅
排序:
Research on Multiple Targets Pedestrian Reidentification with Night Scene Image Enhancement
Research on Multiple Targets Pedestrian Reidentification wit...
收藏 引用
International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC
作者: Minkang Zhang Ding Chen Yongxin Huang School of Cyberspace Security Chengdu University of Information Technology(CUIT) Chengdu China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu China
Pedestrian reidentification is a popular research topic in the field of computer vision in recent years, and is a technique that uses computer vision techniques to determine whether a specific pedestrian is present in... 详细信息
来源: 评论
Quantum K-Means Model based on Optimization Framework
Quantum K-Means Model based on Optimization Framework
收藏 引用
Image Processing, Electronics and Computers (IPEC), Asia-Pacific Conference on
作者: Zexiang Shao Shibin Zhang Sachin Kumar School of Cyberspace Security Chengdu University of Information Technology Chengdu China Sichuan Key Laboratory of Advanced Cryptography and System Security Chengdu China Department of Computer Science and Engineering Ajay Kumar Garg Engineering College India
The Quantum K-means clustering algorithm offers the advantage of quantum parallel computing, but suffers from issues related to cluster center initialization and sensitivity to noisy data due to its similarity with th...
来源: 评论
Improved YOLOv5s algorithm for small item detection of wheelhouse
Improved YOLOv5s algorithm for small item detection of wheel...
收藏 引用
International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC
作者: Jin Hu Wang Juan Wang Zuli Long Dan School of Cyberspace Security Chengdu University of Information Technology(CUIT) Chengdu China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu China
With the development of deep learning, object detection has achieved rapid development in recent years, and is widely used in real-life scenarios such as face detection and automatic driving. In the field of ship navi... 详细信息
来源: 评论
An Image Semantic Communication system Based on GAN and Relative Position-Encoding
收藏 引用
IEEE Communications Letters 2025年
作者: Zhang, Ziqi Tan, Weijie Li, Chunguo Guizhou University College of Big Data and Information Engineering Guiyang550025 China Guizhou University State Key Laboratory of Public Big Data College of Computer Science and Technology Guiyang550025 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610025 China Ministry of Industry and Information Technology Laboratory of Cryptography Application Technology Innovation and Testing Verification Beijing100015 China Southeast University School of Information Science and Engineering Nanjing210096 China
In image semantic communication, the complex wireless channel environment leads to the loss of image details and performance degradation during transmission. To address this issue, we propose an image semantic communi... 详细信息
来源: 评论
A Blockchain Based system for Multi-level Log Storage  7
A Blockchain Based System for Multi-level Log Storage
收藏 引用
7th International Symposium on Advances in Electrical, Electronics, and Computer Engineering
作者: Xu, Gang Yun, Fan Liu, Xin Chen, Xiu-Bo School of Information Science and Technology North China University of Technology Beijing100144 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610025 China School of Information Engineering Inner Mongolia University of Science and Technology Baotou014010 China Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing100876 China
With the development of the Internet, many log data are generated in the server. How to ensure the security of log data in the server is a problem that needs to be solved. At present, log data storage in most servers ... 详细信息
来源: 评论
TL-KDNET: A Malicious Traffic Detection Model Integrating Transfer Learning and Knowledge Distillation
TL-KDNET: A Malicious Traffic Detection Model Integrating Tr...
收藏 引用
International Conference on Wavelet Active Media Technology and Information Processing (ICWAMTIP)
作者: Kun Yu YuanYuan Huang Linshan Zhang Jun Lv Jiazhong Lu School of Cybersecurity (Xin Gu Industrial College Chengdu University of Information Technology Chengdu China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu China SUGON Industrial Control and Security Center Chengdu China MetaX Integrated Circuits (Shanghai) Co. Ltd
With the evolution of cyberattacks, traditional methods for malicious traffic detection face increasingly complex threats. To address this challenge, we propose a novel model, TL-KDNet, which integrates transfer learn... 详细信息
来源: 评论
LOGNET: A Knowledge Distillation-Based Model for Log Anomaly Detection
LOGNET: A Knowledge Distillation-Based Model for Log Anomaly...
收藏 引用
International Conference on Wavelet Active Media Technology and Information Processing (ICWAMTIP)
作者: Kun Yu Yuanyuan Huang Linshan Zhang Jun Lv Jiazhong Lu School of Cybersecurity (Xin Gu Industrial College) Chengdu University of Information Technology Chengdu China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu China SUGON Industrial Control and Security Center Chengdu China MetaX Integrated Circuits (Shanghai) Co. Ltd
Due to the diverse nature of attack forms, supervised log anomaly detection models require a large volume of labeled data, making the annotation process time-consuming and labor-intensive. Conversely, unsupervised log... 详细信息
来源: 评论
GLADformer: A Mixed Perspective for Graph-level Anomaly Detection
arXiv
收藏 引用
arXiv 2024年
作者: Xu, Fan Wang, Nan Wu, Hao Wen, Xuezhi Zhang, Dalin Lu, Siyang Li, Binyong Gong, Wei Wan, Hai Zhao, Xibin School of Software Engineering Beijing Jiaotong University Beijing China University of Science and Technology of China Hefei China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu China BNRist KLISS School of Software Tsinghua University Beijing China
Graph-Level Anomaly Detection (GLAD) aims to distinguish anomalous graphs within a graph data set. However, current methods are constrained by their receptive fields, struggling to learn global features within the gra... 详细信息
来源: 评论
Analysis and Improvement of a Conditional Privacy-Preserving Authentication Scheme with Double-Insurance in Vanets
SSRN
收藏 引用
SSRN 2023年
作者: Wen, Jiaming Bai, Lu Liu, Jinhui Zhang, Huanguo Wang, Houzhen Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Wuhan430072 China School of Cyber Security Northwestern Polytechnical University Xi’an710072 China State Key Laboratory of Cryptology Beijing100878 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610025 China
As the intelligent transportation system develops by leaps and bounds, there is an increasing interest in the potential of Vehicular Ad-hoc Networks (VANETs) to enhance traffic efficiency and safety. The Conditional P... 详细信息
来源: 评论
Several new classes of optimal ternary cyclic codes with two or three zeros
arXiv
收藏 引用
arXiv 2024年
作者: Wu, Gaofei You, Zhuohui Zha, Zhengbang Zhang, Yuqing The State Key Laboratory of Integrated Service Networks School of Cyber Engineering Xidian University Xi’an710071 China The Advanced Cryptography System Security Key Laboratory of Sichuan Province China The College of Mathematics and System Sciences Xinjiang University Urumqi830046 China The National Computer Network Intrusion Protection Center University of Chinese Academy of Sciences Beijing101408 China
Cyclic codes are a subclass of linear codes and have wide applications in data storage systems, communication systems and consumer electronics due to their efficient encoding and decoding algorithms. Let α be a gener... 详细信息
来源: 评论