咨询与建议

限定检索结果

文献类型

  • 1,932 篇 期刊文献
  • 1,766 篇 会议
  • 1 册 图书

馆藏范围

  • 3,699 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,617 篇 工学
    • 1,795 篇 计算机科学与技术...
    • 1,391 篇 软件工程
    • 620 篇 信息与通信工程
    • 375 篇 电气工程
    • 361 篇 控制科学与工程
    • 309 篇 电子科学与技术(可...
    • 225 篇 生物工程
    • 193 篇 机械工程
    • 152 篇 网络空间安全
    • 147 篇 光学工程
    • 135 篇 生物医学工程(可授...
    • 123 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 98 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,279 篇 理学
    • 688 篇 数学
    • 342 篇 物理学
    • 251 篇 生物学
    • 221 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 68 篇 化学
  • 646 篇 管理学
    • 414 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 151 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 135 篇 医学
    • 119 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 31 篇 农学
  • 25 篇 教育学
  • 14 篇 文学
  • 4 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 75 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 security
  • 59 篇 cryptography
  • 57 篇 training
  • 56 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 53 篇 optimization
  • 52 篇 computational mo...
  • 49 篇 federated learni...
  • 47 篇 privacy
  • 45 篇 authentication
  • 39 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 computer archite...
  • 33 篇 data models

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 48 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 38 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 34 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang
  • 13 篇 wang jianmin

语言

  • 3,342 篇 英文
  • 257 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3699 条 记 录,以下是211-220 订阅
排序:
A Secure Multiparty Quantum Homomorphic Encryption Scheme
收藏 引用
computers, Materials & Continua 2022年 第11期73卷 2835-2848页
作者: Jing-Wen Zhang Xiu-Bo Chen Gang Xu Heng-Ji Li Ya-Lan Wang Li-Hua Miao Yi-Xian Yang Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijing100876China School of Information Science and Technology North China University of TechnologyBeijing100144China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Sichuan610025China Quantum Technology Lab&Applied Mechanics Group University of MilanMilan20133Italy Department of Computer Science Faculty of Engineering and Physical SciencesUniversity of SurreyGuildfordSurreyGU27XHUnited Kingdom Huawei Technologies Co.Ltd Shenzhen518129China
The significant advantage of the quantum homomorphic encryption scheme is to ensure the perfect security of quantum private *** this paper,a novel secure multiparty quantum homomorphic encryption scheme is proposed,wh... 详细信息
来源: 评论
FTGraph: A Flexible Tree-Based Graph Store on Persistent Memory for Large-Scale Dynamic Graphs
FTGraph: A Flexible Tree-Based Graph Store on Persistent Mem...
收藏 引用
2024 IEEE International Conference on Cluster Computing, CLUSTER 2024
作者: Sun, Gan Zhou, Jiang Li, Bo Gu, Xiaoyan Wang, Weiping He, Shuibing Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Key Laboratory of Cyberspace Security Defense Beijing China College of Computer Science and Technology Zhejiang University Hangzhou China
Traditional in-memory graph systems often suffer from scalability due to the limited capacity and volatility of DRAM. Emerging non-volatile memory (NVM) provides an opportunity to achieve highly scalable and high-perf... 详细信息
来源: 评论
Contrastive Learning for Robust Android Malware Familial Classification
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2022年 1-14页
作者: Wu, Yueming Dou, Shihan Zou, Deqing Yang, Wei Qiang, Weizhong Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Shanghai Key Laboratory of Intelligent Information Processing School of Computer Science Fudan University Shanghai China University of Texas at Dallas Dallas USA National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Due to its open-source nature, Android operating system has been the main target of attackers to exploit. Malware creators always perform different code obfuscations on their apps to hide malicious activities. Feature... 详细信息
来源: 评论
Optimal Method Combining Blockchain and Multi-Agent system to Ensure Data Integrity and Deduplication in the Cloud Environment
International Journal of Interactive Mobile Technologies
收藏 引用
International Journal of Interactive Mobile Technologies 2024年 第10期18卷 90-105页
作者: El Ghazouani, Mohamed Ikidid, Abdelouafi Zaouiat, Charafeddine Ait Aziz, Layla Ichahane, Moulay Youssef Er-Rajy, Latifa ESIM Polydisciplinary Faculty of Sidi Bennour Chouaîb Doukkali University El Jadida Morocco Laboratory of System Analysis Information Processing and Industrial Management EST Salé Mohammed V University Salé Morocco Information Technology Laboratory National School of Applied Sciences Chouaîb Doukkali University El Jadida Morocco Computer Science Department Laboratory of Information Systems Engineering Cadi Ayyad University Marrakesh Morocco
Cloud computing (CC) refers to the transmission, storage, and processing of any type of information at a location that is not owned or controlled by the information owner. This information can be stored and accessed a... 详细信息
来源: 评论
Trust-Based Identity Privacy for Edge Computing  24
Trust-Based Identity Privacy for Edge Computing
收藏 引用
14th International Conference on Communication and Network security, ICCNS 2024
作者: Dong, Jie Wen Kang, Xi Nai Peng, Jin Jiang, Xuan Ming Zhu, Tao Jun Information Technology Department National Key Laboratory of Seience and Technology on Aerospace Intelligence Control Beijing Aerospace Automatic Control Institute BeiJing China School of Computer Science Beijing University of Technology BeiJing China
College of computer science Beijing University of technology, Beijing 100124, China, 1374622525@*** This paper proposes a trust collaboration technology for edge computing, addressing trust isolation and security issu... 详细信息
来源: 评论
Petri net-based illegal information flow detection method for node-chain access control model
Petri net-based illegal information flow detection method fo...
收藏 引用
2023 International Conference on Communication Network and Machine Learning, CNML 2023
作者: Li, Binyong Fang, Jie Deng, Xianhui Sheng, Yuhan Chengdu University of Information Technology Chengdu China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu University of Information Technology Chengdu610225 China Sichuan Institute of Computer Sciences Chengdu China School of Cybersecurity Chengdu University of Information Technology Chengdu China
To address the problem of illegal information flow in the node chain access control model constructed by the existing attribute-based access control (ABAC) model when applied to a large-scale node chain scenario with ... 详细信息
来源: 评论
Trust Collaboration for Edge Computing  24
Trust Collaboration for Edge Computing
收藏 引用
14th International Conference on Communication and Network security, ICCNS 2024
作者: Dong, Jie Wen Kang, Xi Nai Peng, Jin Jiang, Xuan Ming Zhu, Tao Jun Information Technology Department National Key Laboratory of Seience and Technology on Aerospace Intelligence Control Beijing Aerospace Automatic Control Institute BeiJing China School of Computer Science Beijing University of Technology BeiJing China
As edge computing becomes an increasingly important computing model, trust management and security issues are becoming more severe. Problems such as malicious node attacks and trust isolation pose threats to the secur... 详细信息
来源: 评论
Neural Network-Based Safety Optimization Control for Constrained Discrete-Time systems  49
Neural Network-Based Safety Optimization Control for Constra...
收藏 引用
49th Annual Conference of the IEEE Industrial Electronics Society, IECON 2023
作者: Wang, Xueli Zhao, Shangwei Yang, Ming Wu, Xiaoming Wang, Xin Xu, Shuo Hu, Xu Qilu University of Technology Key Laboratory of Computing Power Network and Information Security Shandong Computer Science Center Jinan China Shanghai Jiao Tong University Department of Automation Shanghai China Public Security Bureau of Jinan Jinan China
This paper proposes a constraint-aware safety control approach via adaptive dynamic programming (ADP) to address the control optimization issues for discrete-time systems subjected to state constraints. First, the con... 详细信息
来源: 评论
A Fast recognition method for DVS perimeter security intrusion signals based on transfer learning
收藏 引用
Optical Fiber technology 2025年 93卷
作者: Shen, Yongxu Wang, Chang Sun, Zhihui Zhang, Faxiang Jiang, Shaodong Liu, Xu Gao, Fengxia Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
In the perimeter security intrusion signal monitoring based on the Distributed Optical Fiber Vibration Sensing (DVS) system, the common approach for identifying intrusion signals in new scenarios is to collect large a... 详细信息
来源: 评论
Secure YOLOv3-SPP: Edge-Cooperative Privacy-preserving Object Detection for Connected Autonomous Vehicles
Secure YOLOv3-SPP: Edge-Cooperative Privacy-preserving Objec...
收藏 引用
2022 International Conference on Networking and Network Applications, NaNA 2022
作者: Zhou, Yongjie Xiong, Jinbo Bi, Renwan Tian, Youliang State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang550025 China Fujian Provincial Key Laboratory of Network System Information Security College of Computer and Cyberspace Security Fujian Normal University FJ Fuzhou350117 China
The connected autonomous vehicles (CAVs) are a key component of intelligent transportation systems (ITS) where vehicles communicate with each other to exchange sensing data from on-board sensors (e.g., high-definition... 详细信息
来源: 评论