咨询与建议

限定检索结果

文献类型

  • 1,911 篇 期刊文献
  • 1,799 篇 会议
  • 1 册 图书

馆藏范围

  • 3,711 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,600 篇 工学
    • 1,779 篇 计算机科学与技术...
    • 1,389 篇 软件工程
    • 616 篇 信息与通信工程
    • 374 篇 电气工程
    • 346 篇 控制科学与工程
    • 304 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 192 篇 机械工程
    • 151 篇 网络空间安全
    • 137 篇 光学工程
    • 133 篇 生物医学工程(可授...
    • 126 篇 仪器科学与技术
    • 107 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 69 篇 建筑学
    • 64 篇 土木工程
    • 64 篇 化学工程与技术
  • 1,267 篇 理学
    • 686 篇 数学
    • 342 篇 物理学
    • 248 篇 生物学
    • 223 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 646 篇 管理学
    • 415 篇 管理科学与工程(可...
    • 256 篇 图书情报与档案管...
    • 156 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 132 篇 医学
    • 117 篇 临床医学
    • 97 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 29 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 88 篇 feature extracti...
  • 69 篇 federated learni...
  • 68 篇 semantics
  • 64 篇 security
  • 62 篇 computational mo...
  • 62 篇 cryptography
  • 59 篇 optimization
  • 58 篇 training
  • 57 篇 deep learning
  • 57 篇 accuracy
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 50 篇 privacy
  • 47 篇 authentication
  • 40 篇 data models
  • 38 篇 servers
  • 38 篇 robustness
  • 37 篇 data mining
  • 37 篇 protocols

机构

  • 146 篇 department of co...
  • 75 篇 national key lab...
  • 73 篇 key laboratory o...
  • 67 篇 school of softwa...
  • 60 篇 shandong provinc...
  • 56 篇 tsinghua nationa...
  • 51 篇 state key labora...
  • 49 篇 department of co...
  • 43 篇 school of comput...
  • 42 篇 hubei province k...
  • 39 篇 state key labora...
  • 36 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 peng cheng labor...
  • 33 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 school of cyber ...
  • 31 篇 key laboratory f...
  • 30 篇 state key labora...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 19 篇 ai bo
  • 19 篇 cao xiaochun
  • 18 篇 zhao jinjing
  • 18 篇 kuang xiaohui
  • 18 篇 jin hai
  • 17 篇 yang yang
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 15 篇 ding yong
  • 15 篇 xiaoming wu
  • 15 篇 hai jin
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,211 篇 英文
  • 407 篇 其他
  • 102 篇 中文
  • 2 篇 德文
  • 2 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3711 条 记 录,以下是971-980 订阅
排序:
Incentive Scheme for Shared Parking Space based on NFT  2
Incentive Scheme for Shared Parking Space based on NFT
收藏 引用
2nd International Conference on computer science and Blockchain, CCSB 2022
作者: Cai, Fugang Pan, Heng Si, Xueming Wu, Zhili Qian, Haiyang Henan International Joint Laboratory of Blockchain and Data Sharing Zhengzhou Henan China Henan Key Laboratory of Network Cryptography Technology Zhengzhou Henan China Zhongyuan University of Technology The Frontier Information Technology Research Institute China Shanghai Jiao Tong University Department of Computer Science and Engineer Shanghai China
The lack of centralized management causes problems in the system of distributed parking spaces, such as unsecured revenues, poor service quality and malicious valuation. Therefore, this paper proposes a parking sharin... 详细信息
来源: 评论
LSMM: A Life-cycle security Management Mechanism for Secure Image Sharing  2
LSMM: A Life-cycle Security Management Mechanism for Secure ...
收藏 引用
2nd International Conference on computer science and Blockchain, CCSB 2022
作者: Zhang, Yaoyao Yao, Zhongyuan Pan, Heng Si, Xueming Henan International Joint Laboratory of Blockchain and Data Sharing Zhengzhou Henan China Henan Key Laboratory of Network Cryptography Technology Zhengzhou Henan China The Frontier Information Technology Research Institute Zhongyuan University of Technology China Shanghai Jiao Tong University Department of Computer Science and Engineer Shanghai China
During the storing, transferring, processing, and exchanging phases of the full life-cycle of secure image sharing, there may exist security issues such as information leakage, infringement and abuse. To address those... 详细信息
来源: 评论
FSFuzzer: A High-Performance Greybox Fuzzer for Stateful Network Protocol  1
收藏 引用
4th International Conference on Ubiquitous security, UbiSec 2024
作者: Liu, Qian Zhou, Lei Zhou, Xu Wei, Yuan Liu, Danjun Wu, Zhendong National University of Defense Technology Changsha410000 China National Key Laboratory of Science and Technology on Information System Security Beijing100000 China
Bugs in network protocol programs exhibit statefulness, making it challenging for fuzzers to generate effective testcases without knowledge of the protocol. Additionally, features such as network transmission and comm... 详细信息
来源: 评论
OpenDrift: Online Evolving Fraud Detection for Open-Category and Concept-Drift Transactions
OpenDrift: Online Evolving Fraud Detection for Open-Category...
收藏 引用
IEEE International Conference on Web Services (ICWS)
作者: Cheng Wang Songyao Chai Hangyu Zhu Department of Computer Science and Technology Tongji University Shanghai China Key Laboratory of Embedded System and Service Computing Ministry of Education China Shanghai Artificial Intelligence Laboratory Shanghai China
The rapid growth of electronic commerce brings convenience to modern life but comes with security risks by various cybercrimes in online payment services. Most existing security methods for fraud detection depend on t...
来源: 评论
Unleashing the Potential of Decentralized Federated Learning in Healthcare: A Comprehensive Survey on Insights and Challenges
Unleashing the Potential of Decentralized Federated Learning...
收藏 引用
IEEE International Conference on Data science in Cyberspace (DSC)
作者: Haibo Cheng Wenjian Liu Youyang Qu Kexue Fu Qinyuan Wang Faculty of Data Science City University of Macau Macau China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China
Federated learning (FL) is a distributed learning method that reduces data transmission and privacy risks. However, the existence of a central server may become a target of attackers, resulting in an increased risk of... 详细信息
来源: 评论
Multi-chain Storage Scheme Based on Hash Calendar and Recursive Zero-knowledge Proof  2
Multi-chain Storage Scheme Based on Hash Calendar and Recurs...
收藏 引用
2nd International Conference on computer science and Blockchain, CCSB 2022
作者: Wang, Chao Yao, Zhongyuan Zhang, Yong Guo, Shangkun Zhao, Lindong Si, Xueming Henan International Joint Laboratory of Blockchain and Data Sharing Zhengzhou Henan China Henan Key Laboratory of Network Cryptography Technology Zhengzhou Henan China Zhongyuan University of Technology The Frontier Information Technology Research Institute China Shanghai Jiao Tong University Department of Computer Science and Engineer Shanghai China
Blockchain technology is currently a research hotspot in the computer field. However, with the rapid development of blockchain technology, poor storage scalability limits its further application. In response to this p... 详细信息
来源: 评论
Interference Coordination technology of Ultra Dense Deployment Based on Clustering Algorithm
Interference Coordination Technology of Ultra Dense Deployme...
收藏 引用
IEEE International Conference on Power, Intelligent Computing and systems (ICPICS)
作者: Haoyuan Wang Yue Tian Wenda Li Fujian Key Laboratory of Communication Network and Information Processing Xiamen University of Technology Xiamen China Department of Security and Crime Science University College London London United Kingdom
A clustering algorithm based Ultra Dense Deployment is proposed to address the problem of establishing a reasonable interference model and allocating ABS reasonably to minimize interference and maximize throughput in ...
来源: 评论
Robust Beamforming for Downlink Multi-Cell systems: A Bilevel Optimization Perspective
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Xingdi Xiong, Yu Yang, Kai Department of Computer Science and Technology Tongji University China Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University China Shanghai Research Institute for Intelligent Autonomous Systems China
Utilization of inter-base station cooperation for information processing has shown great potential in enhancing the overall quality of communication services (QoS) in wireless communication networks. Nevertheless, suc... 详细信息
来源: 评论
Generative AI-driven Cross-layer Covert Communication: Fundamentals, Framework and Case Study
arXiv
收藏 引用
arXiv 2025年
作者: Liu, Tianhao Liu, Jiqiang Zhang, Tao Wang, Jian Wang, Jiacheng Kang, Jiawen Niyato, Dusit Mao, Shiwen School of Cyberspace Science and Technology Beijing Jiaotong University Beijing100044 China Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing Jiaotong University Beijing100045 China School of Computer Science and Engineering Nanyang Technological University Singapore639798 Singapore School of Automation Guangdong University of Technology Key Laboratory of Intelligent Information Processing and System Integration of IoT Ministry of Education Guangzhou510006 China Guangdong-HongKong-Macao Joint Laboratory for Smart Discrete Manufacturing Guangzhou510006 China Department of Electrical and Computer Engineering Auburn University AuburnAL36849-5201 United States
Ensuring end-to-end cross-layer communication security in military networks by selecting covert schemes between nodes is a key solution for military communication security. With the development of communication techno... 详细信息
来源: 评论
IVSign: Interpretable Vulnerability Signature via Code Embedding and Static Analysis
IVSign: Interpretable Vulnerability Signature via Code Embed...
收藏 引用
International Conference on Dependable systems and Networks Workshops (DSN-W)
作者: Ao Ding Gaolei Li Xiaoyu Yi Yuchen Liu School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University China Shanghai Key Laboratory of Integrated Administration Technologies for Information Security China Department of Computer Science North Carolina State University USA
Software vulnerability detection is evolving from pattern-driven methods to data-driven methods to be more automatic and intelligent due to the emergence of deep learning. However, false positives and coarse-grained d...
来源: 评论