咨询与建议

限定检索结果

文献类型

  • 2,359 篇 会议
  • 1,167 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 3,533 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,193 篇 工学
    • 1,742 篇 计算机科学与技术...
    • 1,395 篇 软件工程
    • 548 篇 信息与通信工程
    • 277 篇 电气工程
    • 252 篇 控制科学与工程
    • 189 篇 电子科学与技术(可...
    • 187 篇 网络空间安全
    • 166 篇 生物工程
    • 111 篇 机械工程
    • 111 篇 安全科学与工程
    • 89 篇 仪器科学与技术
    • 81 篇 生物医学工程(可授...
    • 79 篇 光学工程
    • 63 篇 化学工程与技术
    • 58 篇 交通运输工程
    • 54 篇 动力工程及工程热...
  • 903 篇 理学
    • 556 篇 数学
    • 180 篇 生物学
    • 177 篇 物理学
    • 152 篇 统计学(可授理学、...
    • 83 篇 系统科学
    • 66 篇 化学
  • 563 篇 管理学
    • 349 篇 管理科学与工程(可...
    • 246 篇 图书情报与档案管...
    • 127 篇 工商管理
  • 118 篇 法学
    • 63 篇 法学
    • 57 篇 社会学
  • 67 篇 医学
    • 60 篇 临床医学
    • 54 篇 基础医学(可授医学...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 33 篇 军事学
  • 19 篇 农学
  • 17 篇 教育学
  • 12 篇 文学
  • 4 篇 艺术学

主题

  • 147 篇 feature extracti...
  • 118 篇 accuracy
  • 108 篇 cryptography
  • 98 篇 protocols
  • 96 篇 computational mo...
  • 95 篇 semantics
  • 94 篇 security
  • 91 篇 authentication
  • 91 篇 information secu...
  • 88 篇 training
  • 86 篇 privacy
  • 77 篇 computer network...
  • 75 篇 deep learning
  • 75 篇 computer securit...
  • 75 篇 data models
  • 74 篇 cloud computing
  • 68 篇 network security
  • 68 篇 federated learni...
  • 58 篇 internet
  • 57 篇 servers

机构

  • 229 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 145 篇 school of cyber ...
  • 132 篇 institute of inf...
  • 91 篇 national compute...
  • 88 篇 research center ...
  • 69 篇 national compute...
  • 52 篇 shandong fundame...
  • 50 篇 college of compu...
  • 45 篇 shandong enginee...
  • 45 篇 school of comput...
  • 45 篇 tianjin key labo...
  • 39 篇 shandong provinc...
  • 39 篇 school of comput...
  • 38 篇 shaanxi key labo...
  • 31 篇 shaanxi key labo...
  • 30 篇 school of comput...
  • 30 篇 school of comput...
  • 29 篇 college of compu...
  • 28 篇 qilu university ...

作者

  • 46 篇 xu li
  • 33 篇 zhang yuqing
  • 31 篇 mohammad syuhaim...
  • 28 篇 yichuan wang
  • 28 篇 poovendran radha
  • 27 篇 kasmiran jumari
  • 26 篇 xinhong hei
  • 25 篇 zhang hongli
  • 25 篇 meng deyu
  • 24 篇 jianfeng ma
  • 24 篇 qingyun liu
  • 23 篇 ma jianfeng
  • 22 篇 yuqing zhang
  • 21 篇 liu ximeng
  • 20 篇 wang wei
  • 19 篇 fang binxing
  • 19 篇 cao xiangyong
  • 19 篇 xiaoming wu
  • 19 篇 li qi
  • 19 篇 li xu

语言

  • 3,222 篇 英文
  • 192 篇 其他
  • 127 篇 中文
检索条件"机构=Computer and Network Security"
3533 条 记 录,以下是1-10 订阅
排序:
A New Edge Perturbation Mechanism for Privacy-Preserving Data Collection in IOT
收藏 引用
Chinese Journal of Electronics 2023年 第3期32卷 603-612页
作者: CHEN Qiuling YE Ayong ZHANG Qiang HUANG Chuan College of Computer and Cyber Security Fujian Normal University Fujian Provincial Key Laboratory of Network Security and Cryptology
A growing amount of data containing the sensitive information of users is being collected by emerging smart connected devices to the center server in Internet of things(IoT) era, which raises serious privacy concerns ... 详细信息
来源: 评论
Method and Practice of Trusted Embedded Computing and Data Transmission Protection Architecture Based on Android
收藏 引用
Chinese Journal of Electronics 2024年 第3期33卷 623-634页
作者: Yichuan WANG Wen GAO Xinhong HEI Yanning DU School of Computer Science and Engineering Xi'an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology
In recent years,the rapid development of Internet technology has constantly enriched people's daily life and gradually changed from the traditional computer terminal to the mobile *** with it comes the security pr... 详细信息
来源: 评论
Remote Data Auditing for Cloud-Assisted WBANs with Pay-as-You-Go Business Model
收藏 引用
Chinese Journal of Electronics 2023年 第2期32卷 248-261页
作者: LI Yumei ZHANG Futai School of Computer Science Hubei University of Technology Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber SecurityFujian Normal University
As an emerging technology, cloud-assisted wireless body area networks(WBANs) provide more convenient services to users. Recently, many remote data auditing protocols have been proposed to ensure the data integrity and... 详细信息
来源: 评论
Blockchain and signcryption enabled asynchronous federated learning framework in fog computing
收藏 引用
Digital Communications and networks 2025年 第2期11卷 442-454页
作者: Zhou Zhou Youliang Tian Jinbo Xiong Changgen Peng Jing Li Nan Yang State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang 550025China Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber SecurityFujian Normal UniversityFuzhou 350117China Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic TechnologyGuilin 541004China
Federated learning combines with fog computing to transform data sharing into model sharing,which solves the issues of data isolation and privacy disclosure in fog ***,existing studies focus on centralized single-laye... 详细信息
来源: 评论
Experimental realization of quantum controlled teleportation of arbitrary two-qubit state via a five-qubit entangled state
收藏 引用
Chinese Physics B 2022年 第5期31卷 101-106页
作者: Xiao-Fang Liu Dong-Fen Li Yun-Dan Zheng Xiao-Long Yang Jie Zhou Yu-Qiao Tan Ming-Zhe Liu School of Computer and Network Security Chengdu University of TechnologyChengdu 610059China
Quantum controlled teleportation is the transmission of the quantum state under the supervision of a third *** paper presents the theoretical and experimental results of an arbitrary two-qubit quantum controlled telep... 详细信息
来源: 评论
A new quantum key distribution resource allocation and routing optimization scheme
收藏 引用
Chinese Physics B 2024年 第3期33卷 244-259页
作者: 毕琳 袁晓同 吴炜杰 林升熙 School of Computer Science and Technology Changchun University of Science and TechnologyChangchun 130012China Key Laboratory of Network and Information Security in Jilin Province Changchun 130012China
Quantum key distribution(QKD)is a technology that can resist the threat of quantum computers to existing conventional cryptographic ***,due to the stringent requirements of the quantum key generation environment,the g... 详细信息
来源: 评论
DE-DFKD: diversity enhancing data-free knowledge distillation
收藏 引用
Multimedia Tools and Applications 2024年 1-28页
作者: Liu, Yanni Ye, Ayong Chen, Qiulin Zhang, Yuexin Chen, Jianwei College of Computer and Cyber Security Fujian Normal University Fuzhou350117 China Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou350117 China
Data-Free Knowledge Distillation (DFKD) can be used to train students using synthetic data, when the original dataset of the teacher network is not accessible. However, existing studies mainly focus on how to use the ... 详细信息
来源: 评论
Blockchain-Based Framework for Secure Sharing of Cross-Border Trade Data
收藏 引用
computers, Materials & Continua 2025年 第5期83卷 2351-2373页
作者: Shenjian Xiao Xiaoli Qin Yanzhao Tian Zhongkai Dang School of Cyberspace Security Hainan UniversityHaikou570208China National Computer Network Emergency Response Technical Team Coordination Center of ChinaBeijing100029China
The advent of the digital age has consistently provided impetus for facilitating global trade,as evidenced by the numerous customs clearance documents and participants involved in the international trade process,inclu... 详细信息
来源: 评论
Weighted Attribute Based Conditional Proxy Re-Encryption in the Cloud
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 1399-1414页
作者: Xixi Yan Jing Zhang Pengyu Cheng Henan Key Laboratory of Network Cryptography Technology Network Information Security and Cryptography LaboratorySchool of SoftwareHenan Polytechnic UniversityJiaozuo454003China School of Computer Science and Technology Henan Polytechnic UniversityJiaozuo454000China
Conditional proxy re-encryption(CPRE)is an effective cryptographic primitive language that enhances the access control mechanism and makes the delegation of decryption permissions more granular,but most of the attribu... 详细信息
来源: 评论
Greenhouse management system based on multi-node data fusion and visual recognition  4
Greenhouse management system based on multi-node data fusion...
收藏 引用
4th International Conference on Electronic Information Engineering and computer Communication, EIECC 2024
作者: Lai, Xinmiao Ren, Xinyi Liu, Yangsen Jiang, Sirui Zhang, Xinyue Fei, Junshu Chengdu University of Technology School of Computer and Network Security Sichuan Chengdu China
With the rapid development of smart agriculture, especially in managing greenhouse greenhouses with large areas, the current popular monitoring methods have limitations in their measurements. To make the system monito... 详细信息
来源: 评论