咨询与建议

限定检索结果

文献类型

  • 343 篇 会议
  • 274 篇 期刊文献

馆藏范围

  • 617 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 418 篇 工学
    • 329 篇 计算机科学与技术...
    • 250 篇 软件工程
    • 89 篇 信息与通信工程
    • 69 篇 电气工程
    • 50 篇 生物工程
    • 44 篇 控制科学与工程
    • 44 篇 网络空间安全
    • 38 篇 电子科学与技术(可...
    • 26 篇 安全科学与工程
    • 24 篇 生物医学工程(可授...
    • 18 篇 机械工程
    • 17 篇 仪器科学与技术
    • 16 篇 光学工程
    • 13 篇 交通运输工程
    • 12 篇 动力工程及工程热...
    • 11 篇 化学工程与技术
  • 190 篇 理学
    • 105 篇 数学
    • 53 篇 生物学
    • 35 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 15 篇 化学
    • 12 篇 系统科学
  • 110 篇 管理学
    • 78 篇 管理科学与工程(可...
    • 39 篇 图书情报与档案管...
    • 23 篇 工商管理
  • 28 篇 法学
    • 14 篇 法学
    • 14 篇 社会学
  • 26 篇 医学
    • 23 篇 临床医学
    • 22 篇 基础医学(可授医学...
    • 16 篇 公共卫生与预防医...
  • 10 篇 经济学
  • 9 篇 军事学
  • 6 篇 农学
  • 5 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 24 篇 privacy
  • 21 篇 cloud computing
  • 18 篇 feature extracti...
  • 16 篇 data privacy
  • 16 篇 deep learning
  • 15 篇 computational mo...
  • 15 篇 protocols
  • 15 篇 cryptography
  • 14 篇 blockchain
  • 14 篇 encryption
  • 12 篇 internet of thin...
  • 12 篇 authentication
  • 12 篇 security
  • 12 篇 training
  • 11 篇 network security
  • 11 篇 federated learni...
  • 11 篇 accuracy
  • 11 篇 data models
  • 10 篇 object detection
  • 10 篇 servers

机构

  • 50 篇 college of compu...
  • 42 篇 tianjin key labo...
  • 25 篇 college of compu...
  • 21 篇 college of cyber...
  • 20 篇 fujian provincia...
  • 19 篇 institute of net...
  • 17 篇 college of infor...
  • 17 篇 state key labora...
  • 17 篇 key laboratory o...
  • 15 篇 college of compu...
  • 14 篇 college of mathe...
  • 14 篇 college of compu...
  • 13 篇 purple mountain ...
  • 11 篇 school of cyber ...
  • 11 篇 shandong provinc...
  • 10 篇 tianjin key labo...
  • 10 篇 faculty of data ...
  • 10 篇 school of comput...
  • 9 篇 fujian provincia...
  • 9 篇 state key labora...

作者

  • 22 篇 liu ximeng
  • 15 篇 xu li
  • 14 篇 yu jia
  • 13 篇 xiong jinbo
  • 12 篇 li tao
  • 12 篇 hao rong
  • 12 篇 kong fanyu
  • 11 篇 jinbo xiong
  • 11 篇 tian youliang
  • 10 篇 ximeng liu
  • 10 篇 youliang tian
  • 9 篇 lin limei
  • 8 篇 huang shenwei
  • 8 篇 huang yanze
  • 8 篇 chen lanxiang
  • 7 篇 jingdong xu
  • 7 篇 yuwei xu
  • 7 篇 li guowen
  • 7 篇 guo wenzhong
  • 6 篇 ma jianfeng

语言

  • 566 篇 英文
  • 40 篇 其他
  • 13 篇 中文
检索条件"机构=College of Computer Science and Network Security"
617 条 记 录,以下是1-10 订阅
排序:
Blockchain and signcryption enabled asynchronous federated learning framework in fog computing
收藏 引用
Digital Communications and networks 2025年 第2期11卷 442-454页
作者: Zhou Zhou Youliang Tian Jinbo Xiong Changgen Peng Jing Li Nan Yang State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang 550025China Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber SecurityFujian Normal UniversityFuzhou 350117China Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic TechnologyGuilin 541004China
Federated learning combines with fog computing to transform data sharing into model sharing,which solves the issues of data isolation and privacy disclosure in fog ***,existing studies focus on centralized single-laye... 详细信息
来源: 评论
Remote Data Auditing for Cloud-Assisted WBANs with Pay-as-You-Go Business Model
收藏 引用
Chinese Journal of Electronics 2023年 第2期32卷 248-261页
作者: LI Yumei ZHANG Futai School of Computer Science Hubei University of Technology Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber SecurityFujian Normal University
As an emerging technology, cloud-assisted wireless body area networks(WBANs) provide more convenient services to users. Recently, many remote data auditing protocols have been proposed to ensure the data integrity and... 详细信息
来源: 评论
Endogenous security of FQn networks: Adaptive System-Level Fault Self-Diagnosis
收藏 引用
IEEE Transactions on Reliability 2024年 第3期73卷 1659-1668页
作者: Lin, Yuhang Lin, Limei Huang, Yanze Xu, Li Hsieh, Sun-Yuan Fujian Normal University College of Computer and Cyber Security Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou350117 China Fujian University of Technology School of Computer Science and Mathematics Fuzhou350118 China National Cheng Kung University Department of Computer Science and Information Engineering Tainan701 Taiwan
Endogenous security has the ability to discover, eliminate, and solve internal security problems and hidden dangers within the network, and is a superior technology to ensure future network security. The t/k-diagnosis... 详细信息
来源: 评论
Achieving dynamic privacy measurement and protection based on reinforcement learning for mobile edge crowdsensing of IoT
收藏 引用
Digital Communications and networks 2024年 第2期10卷 380-388页
作者: Renwan Bi Mingfeng Zhao Zuobin Ying Youliang Tian Jinbo Xiong Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber SecurityFujian Normal UniversityFuzhou350117China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic TechnologyGuilin541004China Faculty of Data Science City University of Macao999078MacaoChina State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang550025China
With the maturity and development of 5G field,Mobile Edge CrowdSensing(MECS),as an intelligent data collection paradigm,provides a broad prospect for various applications in ***,sensing users as data uploaders lack a ... 详细信息
来源: 评论
Block-gram:Mining knowledgeable features for efficiently smart contract vulnerability detection
收藏 引用
Digital Communications and networks 2025年 第1期11卷 1-12页
作者: Xueshuo Xie Haolong Wang Zhaolong Jian Yaozheng Fang Zichun Wang Tao Li Tianjin Key Laboratory of Network and Data Security Technology TianjinChina College of Computer Science Nankai UniversityTianjinChina Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province China State Key Laboratory of Computer Architecture Institute of Computing TechnologyChinese Academy of SciencesChina
Smart contracts are widely used on the blockchain to implement complex transactions,such as decentralized applications on *** vulnerability detection of large-scale smart contracts is critical,as attacks on smart cont... 详细信息
来源: 评论
Feature Augmented Meta-Learning on Domain Generalization for Evolving Malware Classification  24th
Feature Augmented Meta-Learning on Domain Generalization fo...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Wang, Fangwei Chen, Yinhe Song, Ruixin Li, Qingru Wang, Changguang Key Laboratory of Network and Information Security of Hebei Province College of Computer and Cyber Security Hebei Normal University Shijiazhuang050024 China College of Computer Science and Technology Guizhou University Guiyang550025 China
The proliferation of malware has resulted in substantial harm to various sectors and economies. Various deep learning-based malware classification methods have been suggested as a means of mitigating malware threats. ... 详细信息
来源: 评论
Aggregation-based dual heterogeneous task allocation in spatial crowdsourcing
收藏 引用
Frontiers of computer science 2024年 第6期18卷 215-227页
作者: Xiaochuan LIN Kaimin WEI Zhetao LI Jinpeng CHEN Tingrui PEI College of Information Science and Technology&Cyberspace Security Jinan UniversityGuangzhou 510632China National&Local Joint Engineering Research Center of Network Security Detection and Protection Technology Guangzhou 510632China Guangdong Provincial Key Laboratory of Data Security and Privacy Protection Guangzhou 510632China School of Computer Science Beijing University of Posts and TelecommunicationsBeijing 100876China
Spatial crowdsourcing(SC)is a popular data collection paradigm for numerous *** the increment of tasks and workers in SC,heterogeneity becomes an unavoidable difficulty in task *** researches only focus on the single-... 详细信息
来源: 评论
Probabilistic Reliability via Subsystem Structures of Arrangement Graph networks
收藏 引用
IEEE Transactions on Reliability 2024年 第1期73卷 279-289页
作者: Huang, Yanze Lin, Limei Xu, Li Hsieh, Sun-Yuan Fujian University of Technology Fujian Provincial Key Laboratory of Big Data Mining and Applications School of Computer Science and Mathematics Fuzhou350118 China Fujian Normal University College of Computer and Cyber Security Key Laboratory of Network Security and Cryptology Fuzhou350117 China National Cheng Kung University Department of Computer Science and Information Engineering Tainan701 Taiwan
With the rapid growth of the number of processors in a multiprocessor system, faulty processors occur in it with a probability that rises quickly. The probability of a subsystem with an appropriate size being fault-fr... 详细信息
来源: 评论
A Traceable Privacy-Preserving Transaction Protocol With Evolutionary Threshold Authentication
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 20787-20799页
作者: Xie, Ninghai Li, Jiguo Lin, Chao Zhang, Yichen Shen, Jian Fujian Normal University College of Computer and Cyber Security Fuzhou350117 China School of Mathematics and Statistics Key Laboratory of Analytical Mathematics and Applications Ministry of Education Fujian Fuzhou350117 China Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou350117 China Fujian Normal University Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fuzhou350117 China Guangzhou University Guangdong Key Laboratory of Blockchain Security Guangzhou510006 China Zhejiang Sci-Tech University School of Information Science and Engineering Hangzhou310018 China
Decentralized payment systems, such as Bitcoin, enable immutable and transparent payments in a distributed manner. To address the issue of user privacy leakage due to transaction transparency, some efforts have enhanc... 详细信息
来源: 评论
Forward Legal Anonymous Group Pairing-Onion Routing for Mobile Opportunistic networks
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第07期24卷 6595-6612页
作者: Zhu, Xiuzhen Lin, Limei Huang, Yanze Wang, Xiaoding Hsieh, Sun-Yuan Wu, Jie Fujian Normal University College of Computer and Cyber Security Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Fuzhou350117 China Fujian University of Technology School of Computer Science and Mathematics Fujian Fuzhou350118 China National Cheng Kung University Department of Computer Science and Information Engineering Tainan701 Taiwan Temple University Department of Computer and Information Science 1925 N. 12th St PhiladelphiaPA19122 United States
Mobile Opportunistic networks (MONs) often experience frequent interruptions in end-to-end connections, which increases the likelihood of message loss during delivery and makes users more susceptible to various cyber ... 详细信息
来源: 评论