咨询与建议

限定检索结果

文献类型

  • 12 篇 期刊文献
  • 5 篇 会议

馆藏范围

  • 17 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 12 篇 工学
    • 10 篇 计算机科学与技术...
    • 8 篇 软件工程
    • 3 篇 电子科学与技术(可...
    • 2 篇 电气工程
    • 2 篇 控制科学与工程
    • 2 篇 生物工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 冶金工程
    • 1 篇 信息与通信工程
    • 1 篇 网络空间安全
  • 4 篇 理学
    • 2 篇 数学
    • 2 篇 生物学
    • 1 篇 系统科学
    • 1 篇 统计学(可授理学、...
  • 3 篇 管理学
    • 2 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 2 篇 prevention and m...
  • 2 篇 cryptography
  • 1 篇 complex networks
  • 1 篇 scalability
  • 1 篇 convolutional ne...
  • 1 篇 cryptographic de...
  • 1 篇 fabrication
  • 1 篇 programmable log...
  • 1 篇 computational ef...
  • 1 篇 reduced instruct...
  • 1 篇 manuals
  • 1 篇 logic gates
  • 1 篇 des hardware imp...
  • 1 篇 defects
  • 1 篇 recurrent neural...
  • 1 篇 data mining
  • 1 篇 monitoring
  • 1 篇 graph neural net...
  • 1 篇 deep learning (a...
  • 1 篇 data obfuscation

机构

  • 2 篇 idaho national l...
  • 2 篇 state key labora...
  • 2 篇 software enginee...
  • 2 篇 school of cybers...
  • 2 篇 school of cybers...
  • 2 篇 school of softwa...
  • 2 篇 pacific northwes...
  • 1 篇 laboratory for n...
  • 1 篇 college of compu...
  • 1 篇 school of cybers...
  • 1 篇 university of sh...
  • 1 篇 department of el...
  • 1 篇 the school of so...
  • 1 篇 state key labora...
  • 1 篇 state key labora...
  • 1 篇 chongqing engine...
  • 1 篇 feng chia univer...
  • 1 篇 department of cy...
  • 1 篇 shanghai artific...
  • 1 篇 school of cybers...

作者

  • 2 篇 jinzhuo liu
  • 2 篇 clemente izuriet...
  • 2 篇 pilato christian
  • 2 篇 ann marie reinho...
  • 2 篇 shuyue hu
  • 2 篇 guangchen jiang
  • 2 篇 tang xifan
  • 2 篇 bhandari jitendr...
  • 2 篇 wu tao
  • 2 篇 temple scott
  • 2 篇 zhen wang
  • 2 篇 karri ramesh
  • 2 篇 chen chu
  • 2 篇 yong li
  • 2 篇 xian xingping
  • 2 篇 bradley m. whita...
  • 2 篇 gao lipeng
  • 2 篇 liu yanbing
  • 2 篇 gaillardon pierr...
  • 2 篇 qiao shaojie

语言

  • 13 篇 英文
  • 4 篇 其他
检索条件"机构=Software Engineering and Cybersecurity Laboratory"
17 条 记 录,以下是1-10 订阅
排序:
Enhancing Architectural Information Extraction Using DHAM-based Segmentation Network  9
Enhancing Architectural Information Extraction Using DHAM-ba...
收藏 引用
9th International Conference on Computer and Communications, ICCC 2023
作者: Cai, Wenjing Wang, Fei Gao, Lipeng Northwestern Polytechnical University School of Cybersecurity Xi'an China State Key Laboratory of Geo-Information Engineering Xi'an China Northwestern Polytechnical University School of Software Xi'an China
In response to the challenges faced in acquiring datasets for building defect segmentation algorithms, and the narrow, elongated nature of defect areas that can contain a variety of composite defects, rendering existi... 详细信息
来源: 评论
A formal model for multiagent Q-learning on graphs
收藏 引用
Science China(Information Sciences) 2025年
作者: Jinzhuo LIU Guangchen JIANG Chen CHU Yong LI Zhen WANG Shuyue HU School of Software Yunnan University School of Artificial Intelligence Optics and Electronics (iO PEN)Northwestern Polytechnical University Department of Statistics School of Statistics and MathematicsYunnan University of Finance and Economics Yunnan Key Laboratory of Service Computing Yunnan University of Finance and Economics School of Information Science&Engineering Yunnan University School of Cybersecurity Northwestern Polytechnical University Shanghai Artificial Intelligence Laboratory
Understanding the dynamics of multi-agent learning has long been an important research topic. Existing research has focused mostly on 2-agent games or well-mixed populations. However, in real-world multi-agent systems...
来源: 评论
Not All Fabrics Are Created Equal: Exploring eFPGA Parameters for IP Redaction
收藏 引用
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 2023年 第10期31卷 1459-1471页
作者: Bhandari, Jitendra Moosa, Abdul Khader Thalakkattu Tan, Benjamin Pilato, Christian Gore, Ganesh Tang, Xifan Temple, Scott Gaillardon, Pierre-Emmanuel Karri, Ramesh New York University Center for Cybersecurity New YorkNY11201 United States University of Calgary Department of Electrical and Software Engineering CalgaryT2N 1N4 Canada Politecnico di Milano Informazione e Bioingegneria Dipartimento di Elettronica Milan20133 Italy The University of Utah Laboratory for NanoIntegrated Systems Electrical and Computer Engineering Department Salt Lake CityUT84112 United States
Semiconductor design houses rely on third-party foundries to manufacture their integrated circuits (ICs). While this trend allows them to tackle fabrication costs, it introduces security concerns as external (and pote... 详细信息
来源: 评论
Reversible Data Hiding With Secret Encrypted Image Sharing and Adaptive Coding
收藏 引用
IEEE Internet of Things Journal 2025年 第13期12卷 23933-23945页
作者: Fang, Guangtian Wang, Feng Zhao, Chenbin Qin, Chuan Chang, Ching-Chun Chang, Chin-Chen Fujian University of Technology College of Computer Science and Mathematics Fuzhou350118 China Fujian University of Technology College of Computer Science and Mathematics Key Laboratory of Big Data Mining and Applications Fuzhou350118 China Monash University Faculty of IT Department of Software Systems and Cybersecurity VIC3800 Australia Ministry of Education School of Cyber Science and Engineering Key Laboratory of Aerospace Information Security and Trusted Computing Wuhan430072 China University of Shanghai for Science and Technology School of Optical-Electrical and Computer Engineering Shanghai200093 China Feng Chia University Information and Communication Security Research Center Taichuang 40724 Taiwan Feng Chia University Department of Information Engineering and Computer Science Taichung40724 Taiwan
To ensure the security of image information and facilitate efficient management in the cloud, the utilization of reversible data hiding in encrypted images (RDHEI) has emerged as pivotal. However, most existing RDHEI ... 详细信息
来源: 评论
Verification Tool for Securing RISC-V FPGA-Based Process Control System
Verification Tool for Securing RISC-V FPGA-Based Process Con...
收藏 引用
Intermountain engineering, Technology and Computing (IETC)
作者: Christine Johnson Ann Marie Reinhold Clemente Izurieta Bradley M. Whitaker Brock LaMeres Software Engineering and Cybersecurity Laboratory Montana State University Bozeman MT USA Pacific Northwest National Laboratory Richland WA USA Idaho National Laboratory Idaho Falls ID USA Electrical & Computer Engineering Department Montana State University Bozeman MT USA
Industrial Control Systems (ICSs) are a crucial component of critical infrastructure and a popular target for cyberattacks. While most research focuses on the defense of large-scale networks of ICSs, it is critical to... 详细信息
来源: 评论
Unsupervised Mapping of Quantitative Measures to Qualitative Characteristics in Hierarchical software Quality Assurance
Unsupervised Mapping of Quantitative Measures to Qualitative...
收藏 引用
Intermountain engineering, Technology and Computing (IETC)
作者: Kaveen Liyanage Ethan L. Gerard Derek Reimanis Ann Marie Reinhold Clemente Izurieta Brock J. LaMeres Bradley M. Whitaker Department of Electrical and Computer Engineering Montana State University Bozeman MT USA Software Engineering and Cybersecurity Laboratory Montana State University Bozeman MT USA Pacific Northwest National Laboratory Richland WA USA Idaho National Laboratory Idaho Falls ID USA
Ensuring software quality is essential to the software development and deployment process. Evaluating software for known vulnerabilities and weaknesses is a method of assessing the quality of software. However, the ex... 详细信息
来源: 评论
Enhancing Architectural Information Extraction Using DHAM-based Segmentation Network
Enhancing Architectural Information Extraction Using DHAM-ba...
收藏 引用
International Conference on Computer and Communications (ICCC)
作者: Wenjing Cai Fei Wang Lipeng Gao School of Cybersecurity Northwestern Polytechnical University Xi'an China State Key Laboratory of Geo-Information Engineering Xi'an China School of Software Northwestern Polytechnical University Xi'an China
In response to the challenges faced in acquiring datasets for building defect segmentation algorithms, and the narrow, elongated nature of defect areas that can contain a variety of composite defects, rendering existi...
来源: 评论
GraphMU: Repairing Robustness of Graph Neural Networks via Machine Unlearning
arXiv
收藏 引用
arXiv 2024年
作者: Wu, Tao Cao, Xinwen Wang, Chao Qiao, Shaojie Xian, Xingping Yuan, Lin Cui, Canyixing Liu, Yanbing The School of Cybersecurity and Information Law Chongqing University of Posts and Telecommunications Chongqing400065 China The School of Software Engineering Chengdu University of Information Technology Chengdu610225 China The School of Computer and Information Science Chongqing Normal University Chongqing401331 China Yunnan Key Laboratory of Software Engineering Yunnan650504 China
Graph Neural Networks (GNNs) have demonstrated significant application potential in various fields. However, GNNs are still vulnerable to adversarial attacks. Numerous adversarial defense methods on GNNs are proposed ... 详细信息
来源: 评论
Non-profiled Deep-Learning-Based Power Analysis of the SM4 and DES Algorithms
收藏 引用
Chinese Journal of Electronics 2021年 第3期30卷 500-507页
作者: MA Xiangliang LI Bing WANG Hong WU Di ZHANG Lizhen HUANG Kezhen DUAN Xiaoyi School of Integrated Circuits Tsinghua University National Research Center for Information Technology Security China Cybersecurity Review Technology and Certification Center Trusted Computing and Information Assurance Laboratory Institute of Software Chinese Academy of Sciences University of Chinese Academy of Sciences Department of Electronics and Information Engineering Beijing Electronic Science and Technology Institute
Power analysis methods are commonly used for evaluating the security of cryptographic *** are characteristically low-cost and display a high success rate and the ability to obtain important device information, e.g., k... 详细信息
来源: 评论
The Role of Far-Sighted Agents on the Evolution of Cooperation in Social Dilemma
SSRN
收藏 引用
SSRN 2023年
作者: Shi, Juan Liu, Xucheng Li, Jiqin Shu, Youqi Wang, Zhen Liu, Jinzhuo School of Automation Northwestern Polytechnical University Shaanxi Xi’an710072 China School of Software Yunnan University Yunnan Kunming650504 China The Key Laboratory for Software Engineering of Yunnan Province Yunnan Kunming650504 China School of Cybersecurity Northwestern Polytechnical University Shaanxi Xi’an710072 China
Why would natural selection facilitate the prevailing cooperation in selfish groups of individuals? A common framework for studying this problem is evolutionary game theory. Here, we propose a new strategy update rule... 详细信息
来源: 评论