咨询与建议

限定检索结果

文献类型

  • 1,240 篇 会议
  • 696 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 1,939 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,162 篇 工学
    • 907 篇 计算机科学与技术...
    • 716 篇 软件工程
    • 298 篇 信息与通信工程
    • 189 篇 电气工程
    • 123 篇 网络空间安全
    • 122 篇 控制科学与工程
    • 99 篇 电子科学与技术(可...
    • 88 篇 生物工程
    • 54 篇 机械工程
    • 50 篇 安全科学与工程
    • 42 篇 生物医学工程(可授...
    • 41 篇 光学工程
    • 41 篇 仪器科学与技术
    • 39 篇 交通运输工程
    • 32 篇 化学工程与技术
    • 25 篇 建筑学
    • 24 篇 动力工程及工程热...
  • 488 篇 理学
    • 311 篇 数学
    • 94 篇 生物学
    • 85 篇 物理学
    • 82 篇 统计学(可授理学、...
    • 44 篇 系统科学
    • 36 篇 化学
  • 295 篇 管理学
    • 176 篇 管理科学与工程(可...
    • 143 篇 图书情报与档案管...
    • 56 篇 工商管理
  • 72 篇 法学
    • 43 篇 法学
    • 31 篇 社会学
  • 36 篇 医学
    • 32 篇 临床医学
    • 31 篇 基础医学(可授医学...
  • 23 篇 军事学
  • 22 篇 经济学
  • 8 篇 教育学
  • 7 篇 农学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 105 篇 feature extracti...
  • 83 篇 accuracy
  • 77 篇 semantics
  • 73 篇 computational mo...
  • 65 篇 cryptography
  • 58 篇 privacy
  • 55 篇 protocols
  • 55 篇 data models
  • 54 篇 federated learni...
  • 51 篇 cloud computing
  • 51 篇 training
  • 48 篇 security
  • 46 篇 deep learning
  • 45 篇 authentication
  • 42 篇 information secu...
  • 41 篇 neural networks
  • 38 篇 data privacy
  • 38 篇 network security
  • 37 篇 servers
  • 36 篇 encryption

机构

  • 226 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 52 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 45 篇 tianjin key labo...
  • 43 篇 college of compu...
  • 41 篇 school of comput...
  • 38 篇 shaanxi key labo...
  • 38 篇 shandong provinc...
  • 37 篇 school of comput...
  • 32 篇 school of cyber ...
  • 30 篇 shaanxi key labo...
  • 29 篇 institute of inf...
  • 29 篇 school of comput...
  • 28 篇 qilu university ...
  • 28 篇 key laboratory o...
  • 27 篇 college of compu...
  • 27 篇 fujian provincia...
  • 25 篇 college of compu...
  • 24 篇 shandong provinc...

作者

  • 32 篇 xu li
  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 21 篇 ma jianfeng
  • 21 篇 jianfeng ma
  • 21 篇 liu ximeng
  • 21 篇 wang yichuan
  • 19 篇 xiaoming wu
  • 19 篇 baojiang cui
  • 18 篇 hei xinhong
  • 17 篇 shen yulong
  • 17 篇 li xu
  • 17 篇 xiong jinbo
  • 16 篇 di xiaoqiang
  • 15 篇 xiangzhi liu
  • 14 篇 li qi
  • 14 篇 li wei
  • 13 篇 wu xiaoming
  • 13 篇 jinbo xiong
  • 13 篇 guohua lv

语言

  • 1,739 篇 英文
  • 142 篇 其他
  • 64 篇 中文
检索条件"机构=Computer and Network Security Laboratory"
1939 条 记 录,以下是21-30 订阅
排序:
Probabilistic Reliability via Subsystem Structures of Arrangement Graph networks
收藏 引用
IEEE Transactions on Reliability 2024年 第1期73卷 279-289页
作者: Huang, Yanze Lin, Limei Xu, Li Hsieh, Sun-Yuan Fujian University of Technology Fujian Provincial Key Laboratory of Big Data Mining and Applications School of Computer Science and Mathematics Fuzhou350118 China Fujian Normal University College of Computer and Cyber Security Key Laboratory of Network Security and Cryptology Fuzhou350117 China National Cheng Kung University Department of Computer Science and Information Engineering Tainan701 Taiwan
With the rapid growth of the number of processors in a multiprocessor system, faulty processors occur in it with a probability that rises quickly. The probability of a subsystem with an appropriate size being fault-fr... 详细信息
来源: 评论
Endogenous security of FQn networks: Adaptive System-Level Fault Self-Diagnosis
收藏 引用
IEEE Transactions on Reliability 2024年 第3期73卷 1659-1668页
作者: Lin, Yuhang Lin, Limei Huang, Yanze Xu, Li Hsieh, Sun-Yuan Fujian Normal University College of Computer and Cyber Security Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou350117 China Fujian University of Technology School of Computer Science and Mathematics Fuzhou350118 China National Cheng Kung University Department of Computer Science and Information Engineering Tainan701 Taiwan
Endogenous security has the ability to discover, eliminate, and solve internal security problems and hidden dangers within the network, and is a superior technology to ensure future network security. The t/k-diagnosis... 详细信息
来源: 评论
Quasi-Linearly Homomorphic Signature for Data Integrity Auditing in Cloud Storage  20th
Quasi-Linearly Homomorphic Signature for Data Integrity Aud...
收藏 引用
20th International Conference on Information security and Cryptology, Inscrypt 2024
作者: Zhang, Futai Huang, Yichi Yang, Wenjie Tian, Jinmei Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fujian Normal University Fuzhou350117 China
As the popularity of cloud storage increases, data security issues have attracted significant attention from both academia and business sectors. Among these issues, data integrity auditing is of particular i... 详细信息
来源: 评论
Malicious Client Detection with Differential Privacy Constraints Based on Model Update Slicing and K-Means Clustering  6
Malicious Client Detection with Differential Privacy Constra...
收藏 引用
6th International Conference on Frontier Technologies of Information and computer, ICFTIC 2024
作者: Qi, Mengshi Wang, Xin He, Yunpeng Yang, Ming Wu, Xiaoming Key Laboratory of Computing Power Network and Information Security Jinan250014 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250014 China
Federated learning (FL) is a decentralized machine learning technique that protects data privacy by trainng models locally on devices and sharing only model updates instead of raw data. However, FL also faces multiple... 详细信息
来源: 评论
The Study of Multi-type Computing Power Trading Mechanism in Computing Power network Based on Blockchain and Combinatorial Double Auction  24
The Study of Multi-type Computing Power Trading Mechanism in...
收藏 引用
4th International Conference on Artificial Intelligence, Big Data and Algorithms, CAIBDA 2024
作者: Zhao, Yue Wang, Jizhi Kong, Lingrui Sui, Tongtong Shandong Computer Science Center National Supercomputer Center in Jinan Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Provincial Key Laboratory of Industrial Network and Information System Security Qilu University of Technology Shandong Academy of Sciences Jinan Shandong China Quancheng Laboratory Jinan Key Laboratory of Digital Security Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan Shandong China
The advancement of 5G and mobile internet technologies has propelled the development of emerging businesses and applications, demanding higher requirements for network bandwidth and computational resources. To address... 详细信息
来源: 评论
Feature Augmented Meta-Learning on Domain Generalization for Evolving Malware Classification  24th
Feature Augmented Meta-Learning on Domain Generalization fo...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Wang, Fangwei Chen, Yinhe Song, Ruixin Li, Qingru Wang, Changguang Key Laboratory of Network and Information Security of Hebei Province College of Computer and Cyber Security Hebei Normal University Shijiazhuang050024 China College of Computer Science and Technology Guizhou University Guiyang550025 China
The proliferation of malware has resulted in substantial harm to various sectors and economies. Various deep learning-based malware classification methods have been suggested as a means of mitigating malware threats. ... 详细信息
来源: 评论
Aggregation-based dual heterogeneous task allocation in spatial crowdsourcing
收藏 引用
Frontiers of computer Science 2024年 第6期18卷 215-227页
作者: Xiaochuan LIN Kaimin WEI Zhetao LI Jinpeng CHEN Tingrui PEI College of Information Science and Technology&Cyberspace Security Jinan UniversityGuangzhou 510632China National&Local Joint Engineering Research Center of Network Security Detection and Protection Technology Guangzhou 510632China Guangdong Provincial Key Laboratory of Data Security and Privacy Protection Guangzhou 510632China School of Computer Science Beijing University of Posts and TelecommunicationsBeijing 100876China
Spatial crowdsourcing(SC)is a popular data collection paradigm for numerous *** the increment of tasks and workers in SC,heterogeneity becomes an unavoidable difficulty in task *** researches only focus on the single-... 详细信息
来源: 评论
Cross-chain Transaction Tracking Protocol based on Multi-dimensional Digital Watermarking Fingerprints  6
Cross-chain Transaction Tracking Protocol based on Multi-dim...
收藏 引用
6th International Conference on Frontier Technologies of Information and computer, ICFTIC 2024
作者: Li, Duanzhen Xu, Shujiang He, Haochen Xue, Hongrui Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan250014 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250014 China
Cross-chain technology plays a critical role in the process of interconnecting blockchains. However, all attention has been focused on how to achieve efficient cross-chain interoperability protocols, thus neglecting t... 详细信息
来源: 评论
A Novel Construction of Updatable Identity-Based Hash Proof System and Its Applications
收藏 引用
Chinese Journal of Electronics 2023年 第3期32卷 564-576页
作者: QIAO Zirui ZHOU Yanwei YANG Bo ZHANG Wenzheng ZHANG Mingwu School of Computer Science Shaanxi Normal University State Key Laboratory of Cryptology Science and Technology on Communication Security Laboratory Henan Key Laboratory of Network Cryptography Technology School of Computere Hubei University of Technology
In the previous works, to further provide the continuous leakage resilience for the identity-based encryption scheme, a new cryptography primitive, called updatable identity-based hash proof system(U-IB-HPS),was propo... 详细信息
来源: 评论
The dummy-based trajectory privacy protection method to resist correlation attacks in Internet of Vehicles
The dummy-based trajectory privacy protection method to resi...
收藏 引用
作者: Chen, Qiuling Ye, Ayong Zhao, Ziwen Xiong, Jinbo Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fujian Normal University Fuzhou China
Existing dummy-based trajectory privacy protection schemes do not take into account the correlation of multiple locations and whether the generated trajectory based on dummies matches the user's movement mode, whi... 详细信息
来源: 评论