全文获取类型
收费全文 | 153篇 |
免费 | 5篇 |
国内免费 | 3篇 |
专业分类
电工技术 | 6篇 |
综合类 | 17篇 |
化学工业 | 32篇 |
金属工艺 | 8篇 |
机械仪表 | 16篇 |
建筑科学 | 6篇 |
矿业工程 | 9篇 |
能源动力 | 1篇 |
轻工业 | 16篇 |
水利工程 | 4篇 |
石油天然气 | 2篇 |
无线电 | 8篇 |
一般工业技术 | 18篇 |
冶金工业 | 2篇 |
自动化技术 | 16篇 |
出版年
2023年 | 2篇 |
2021年 | 4篇 |
2020年 | 1篇 |
2019年 | 2篇 |
2018年 | 2篇 |
2017年 | 2篇 |
2016年 | 2篇 |
2015年 | 4篇 |
2014年 | 12篇 |
2013年 | 17篇 |
2012年 | 10篇 |
2011年 | 11篇 |
2010年 | 15篇 |
2009年 | 11篇 |
2008年 | 10篇 |
2007年 | 11篇 |
2006年 | 10篇 |
2005年 | 16篇 |
2004年 | 9篇 |
2003年 | 2篇 |
2002年 | 1篇 |
2001年 | 2篇 |
2000年 | 1篇 |
1999年 | 3篇 |
1981年 | 1篇 |
排序方式: 共有161条查询结果,搜索用时 0 毫秒
161.
Wenjun Song Mengqi Liu Thar Baker Qikun Zhang Yu-an Tan 《International Journal of Network Management》2023,33(5):e2225
Federated learning (FL) is widely used in internet of things (IoT) scenarios such as health research, automotive autopilot, and smart home systems. In the process of model training of FL, each round of model training requires rigorous decryption training and encryption uploading steps. The efficiency of FL is seriously affected by frequent encryption and decryption operations. A scheme of key computation and key management with high efficiency is urgently needed. Therefore, we propose a group key agreement technique to keep private information and confidential data from being leaked, which is used to encrypt and decrypt the transmitted data among IoT terminals. The key agreement scheme includes hidden attribute authentication, multipolicy access, and ciphertext storage. Key agreement is designed with edge-cloud collaborative network architecture. Firstly, the terminal generates its own public and private keys through the key algorithm then confirms the authenticity and mapping relationship of its private and public keys to the cloud server. Secondly, IoT terminals can confirm their cryptographic attributes to the cloud and obtain the permissions corresponding to each attribute by encrypting the attributes. The terminal uses these permissions to encrypt the FL model parameters and uploads the secret parameters to the edge server. Through the storage of the edge server, these ciphertext decryption parameters are shared with the other terminal models of FL. Finally, other terminal models are trained by downloading and decrypting the shared model parameters for the purpose of FL. The performance analysis shows that this model has a better performance in computational complexity and computational time compared with the cited literature. 相似文献