咨询与建议

限定检索结果

文献类型

  • 1,242 篇 会议
  • 706 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 1,951 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,174 篇 工学
    • 918 篇 计算机科学与技术...
    • 719 篇 软件工程
    • 304 篇 信息与通信工程
    • 191 篇 电气工程
    • 130 篇 控制科学与工程
    • 124 篇 网络空间安全
    • 103 篇 电子科学与技术(可...
    • 88 篇 生物工程
    • 54 篇 机械工程
    • 49 篇 安全科学与工程
    • 42 篇 仪器科学与技术
    • 42 篇 生物医学工程(可授...
    • 39 篇 光学工程
    • 38 篇 交通运输工程
    • 32 篇 化学工程与技术
    • 26 篇 建筑学
    • 24 篇 动力工程及工程热...
  • 492 篇 理学
    • 313 篇 数学
    • 95 篇 生物学
    • 85 篇 物理学
    • 83 篇 统计学(可授理学、...
    • 45 篇 系统科学
    • 38 篇 化学
  • 296 篇 管理学
    • 176 篇 管理科学与工程(可...
    • 144 篇 图书情报与档案管...
    • 55 篇 工商管理
  • 72 篇 法学
    • 43 篇 法学
    • 31 篇 社会学
  • 37 篇 医学
    • 33 篇 临床医学
    • 31 篇 基础医学(可授医学...
  • 23 篇 军事学
  • 22 篇 经济学
  • 7 篇 教育学
  • 7 篇 农学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 104 篇 feature extracti...
  • 83 篇 accuracy
  • 77 篇 semantics
  • 73 篇 computational mo...
  • 65 篇 cryptography
  • 58 篇 privacy
  • 57 篇 federated learni...
  • 55 篇 protocols
  • 55 篇 data models
  • 52 篇 cloud computing
  • 51 篇 training
  • 48 篇 security
  • 47 篇 deep learning
  • 45 篇 authentication
  • 42 篇 information secu...
  • 41 篇 neural networks
  • 38 篇 data privacy
  • 38 篇 network security
  • 37 篇 servers
  • 36 篇 encryption

机构

  • 229 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 52 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 45 篇 tianjin key labo...
  • 43 篇 college of compu...
  • 41 篇 school of comput...
  • 39 篇 shandong provinc...
  • 38 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 32 篇 school of cyber ...
  • 31 篇 shaanxi key labo...
  • 29 篇 institute of inf...
  • 29 篇 school of comput...
  • 28 篇 qilu university ...
  • 28 篇 key laboratory o...
  • 27 篇 college of compu...
  • 27 篇 shandong provinc...
  • 27 篇 fujian provincia...
  • 25 篇 college of compu...

作者

  • 32 篇 xu li
  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 21 篇 ma jianfeng
  • 21 篇 jianfeng ma
  • 21 篇 liu ximeng
  • 21 篇 wang yichuan
  • 19 篇 xiaoming wu
  • 19 篇 baojiang cui
  • 18 篇 hei xinhong
  • 17 篇 shen yulong
  • 17 篇 li xu
  • 17 篇 xiong jinbo
  • 16 篇 di xiaoqiang
  • 15 篇 xiangzhi liu
  • 14 篇 li qi
  • 14 篇 li wei
  • 13 篇 lu wenpeng
  • 13 篇 wu xiaoming
  • 13 篇 jinbo xiong

语言

  • 1,743 篇 英文
  • 150 篇 其他
  • 64 篇 中文
检索条件"机构=Computer and Network Security Laboratory"
1951 条 记 录,以下是11-20 订阅
排序:
A New Encrypted Traffic Identification Model Based on VAE-LSTM-DRN
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 569-588页
作者: Haizhen Wang Jinying Yan Na Jia College of Computer and Control Engineering Qiqihar UniversityQiqihar161006China Heilongjiang Key Laboratory of Big Data Network Security Detection and Analysis Qiqihar UniversityQiqiharChina
Encrypted traffic identification pertains to the precise acquisition and categorization of data from traffic datasets containing imbalanced and obscured *** extraction of encrypted traffic attributes and their subsequ... 详细信息
来源: 评论
FPIM: Fair and Privacy-Preserving Incentive Mechanism in Mobile Crowdsensing  24th
FPIM: Fair and Privacy-Preserving Incentive Mechanism in M...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Lin, Ruonan Zhang, Yuanyuan Bi, Renwan Huang, Ruihong Xiong, Jinbo Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fujian Normal University Fuzhou350117 China
Mobile crowdsensing (MCS) enables a group of mobile participants to use their intelligent sensing devices to complete the sensing tasks proposed by the task requester. The sensing data users submit is an important fac... 详细信息
来源: 评论
Efficient Identity-Based Dynamic Cloud Storage Data Integrity Auditing with Incremental Updates for Handheld Mobile Devices  2nd
Efficient Identity-Based Dynamic Cloud Storage Data Integrit...
收藏 引用
2nd International Conference on Data security and Privacy Protection, DSPP 2024
作者: Huang, Yichi Zhang, Futai Yang, Wenjie Yang, Shaojun Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fujian Normal University Fuzhou350117 China
With rapid advancements in handheld mobile devices (HMDs), striking a balance between storage and data security is crucial. Cloud storage has attracted great attention of users for its convenience and availa... 详细信息
来源: 评论
A DDoS Identification Method for Unbalanced Data CVWGG
收藏 引用
computers, Materials & Continua 2024年 第12期81卷 3825-3851页
作者: Haizhen Wang Na Jia Yang He Pan Tan College of Computer and Control Engineering Qiqihar UniversityQiqihar161006China Heilongjiang Key Laboratory of Big Data Network Security Detection and Analysis Qiqihar UniversityQiqihar161006China
As the popularity and dependence on the Internet increase,DDoS(distributed denial of service)attacks seriously threaten network *** accurately distinguishing between different types of DDoS attacks,targeted defense st... 详细信息
来源: 评论
Recommendation System Based on Perceptron and Graph Convolution network
收藏 引用
computers, Materials & Continua 2024年 第6期79卷 3939-3954页
作者: Zuozheng Lian Yongchao Yin Haizhen Wang College of Computer and Control Engineering Qiqihar UniversityQiqihar161006China Heilongjiang Key Laboratory of Big Data Network Security Detection and Analysis Qiqihar UniversityQiqihar161006China
The relationship between users and items,which cannot be recovered by traditional techniques,can be extracted by the recommendation algorithm based on the graph convolution *** current simple linear combination of the... 详细信息
来源: 评论
Achieving dynamic privacy measurement and protection based on reinforcement learning for mobile edge crowdsensing of IoT
收藏 引用
Digital Communications and networks 2024年 第2期10卷 380-388页
作者: Renwan Bi Mingfeng Zhao Zuobin Ying Youliang Tian Jinbo Xiong Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber SecurityFujian Normal UniversityFuzhou350117China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic TechnologyGuilin541004China Faculty of Data Science City University of Macao999078MacaoChina State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang550025China
With the maturity and development of 5G field,Mobile Edge CrowdSensing(MECS),as an intelligent data collection paradigm,provides a broad prospect for various applications in ***,sensing users as data uploaders lack a ... 详细信息
来源: 评论
THL: Fast Targeted High Utility Itemset Mining within Length Consideration
Journal of Network Intelligence
收藏 引用
Journal of network Intelligence 2025年 第1期10卷 541-558页
作者: Xu, Peiming Jiang, Yixin Kuang, Xiaoyun Luo, Yu Chen, Jiahui Guangdong Provincial Key Laboratory of Power System Network Security CSG Guangzhou510000 China School of Computer Science and Technology Guangdong University of Technology Guangzhou510006 China
High utility itemset mining is a research topic of the pattern mining domain, which has been widely applied in reality during the past decade. Although most high utility itemset mining algorithms show significant exec... 详细信息
来源: 评论
Fusion of Time-Frequency Features in Contrastive Learning for Shipboard Wind Speed Correction
收藏 引用
Journal of Ocean University of China 2025年 第2期24卷 377-386页
作者: SONG Jian HUANG Meng LI Xiang ZHANG Zhenqiang WANG Chunxiao ZHAO Zhigang Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science Center(National Supercomputer Center in Jinan)Qilu University of Technology(Shandong Academy of Sciences)Jinan 250000China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer ScienceJinan 250000China
Accurate wind speed measurements on maritime vessels are crucial for weather forecasting,sea state prediction,and safe ***,vessel motion and challenging environmental conditions often affect measurement *** address th... 详细信息
来源: 评论
High-Capacity Image Hiding via Compressible Invertible Neural network  24th
High-Capacity Image Hiding via Compressible Invertible Neur...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Wang, Changguang Shi, Haoyi Li, Qingru Zhao, Dongmei Wang, Fangwei College of Computer and Cyber Security Hebei Normal University Shijiazhuang050024 China Hebei Key Laboratory of Network and Information Security Shijiazhuang050024 China
Image steganography involves the concealment of confidential information within images, rendering it undetectable to unauthorized observers, and subsequently retrieving the hidden information following secure transmis... 详细信息
来源: 评论
Probabilistic Reliability via Subsystem Structures of Arrangement Graph networks
收藏 引用
IEEE Transactions on Reliability 2024年 第1期73卷 279-289页
作者: Huang, Yanze Lin, Limei Xu, Li Hsieh, Sun-Yuan Fujian University of Technology Fujian Provincial Key Laboratory of Big Data Mining and Applications School of Computer Science and Mathematics Fuzhou350118 China Fujian Normal University College of Computer and Cyber Security Key Laboratory of Network Security and Cryptology Fuzhou350117 China National Cheng Kung University Department of Computer Science and Information Engineering Tainan701 Taiwan
With the rapid growth of the number of processors in a multiprocessor system, faulty processors occur in it with a probability that rises quickly. The probability of a subsystem with an appropriate size being fault-fr... 详细信息
来源: 评论