咨询与建议

限定检索结果

文献类型

  • 1,240 篇 会议
  • 696 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 1,939 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,162 篇 工学
    • 907 篇 计算机科学与技术...
    • 716 篇 软件工程
    • 298 篇 信息与通信工程
    • 189 篇 电气工程
    • 123 篇 网络空间安全
    • 122 篇 控制科学与工程
    • 99 篇 电子科学与技术(可...
    • 88 篇 生物工程
    • 54 篇 机械工程
    • 50 篇 安全科学与工程
    • 42 篇 生物医学工程(可授...
    • 41 篇 光学工程
    • 41 篇 仪器科学与技术
    • 39 篇 交通运输工程
    • 32 篇 化学工程与技术
    • 25 篇 建筑学
    • 24 篇 动力工程及工程热...
  • 488 篇 理学
    • 311 篇 数学
    • 94 篇 生物学
    • 85 篇 物理学
    • 82 篇 统计学(可授理学、...
    • 44 篇 系统科学
    • 36 篇 化学
  • 295 篇 管理学
    • 176 篇 管理科学与工程(可...
    • 143 篇 图书情报与档案管...
    • 56 篇 工商管理
  • 72 篇 法学
    • 43 篇 法学
    • 31 篇 社会学
  • 36 篇 医学
    • 32 篇 临床医学
    • 31 篇 基础医学(可授医学...
  • 23 篇 军事学
  • 22 篇 经济学
  • 8 篇 教育学
  • 7 篇 农学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 105 篇 feature extracti...
  • 83 篇 accuracy
  • 77 篇 semantics
  • 73 篇 computational mo...
  • 65 篇 cryptography
  • 58 篇 privacy
  • 55 篇 protocols
  • 55 篇 data models
  • 54 篇 federated learni...
  • 51 篇 cloud computing
  • 51 篇 training
  • 48 篇 security
  • 46 篇 deep learning
  • 45 篇 authentication
  • 42 篇 information secu...
  • 41 篇 neural networks
  • 38 篇 data privacy
  • 38 篇 network security
  • 37 篇 servers
  • 36 篇 encryption

机构

  • 226 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 52 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 45 篇 tianjin key labo...
  • 43 篇 college of compu...
  • 41 篇 school of comput...
  • 38 篇 shaanxi key labo...
  • 38 篇 shandong provinc...
  • 37 篇 school of comput...
  • 32 篇 school of cyber ...
  • 30 篇 shaanxi key labo...
  • 29 篇 institute of inf...
  • 29 篇 school of comput...
  • 28 篇 qilu university ...
  • 28 篇 key laboratory o...
  • 27 篇 college of compu...
  • 27 篇 fujian provincia...
  • 25 篇 college of compu...
  • 24 篇 shandong provinc...

作者

  • 32 篇 xu li
  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 21 篇 ma jianfeng
  • 21 篇 jianfeng ma
  • 21 篇 liu ximeng
  • 21 篇 wang yichuan
  • 19 篇 xiaoming wu
  • 19 篇 baojiang cui
  • 18 篇 hei xinhong
  • 17 篇 shen yulong
  • 17 篇 li xu
  • 17 篇 xiong jinbo
  • 16 篇 di xiaoqiang
  • 15 篇 xiangzhi liu
  • 14 篇 li qi
  • 14 篇 li wei
  • 13 篇 wu xiaoming
  • 13 篇 jinbo xiong
  • 13 篇 guohua lv

语言

  • 1,739 篇 英文
  • 142 篇 其他
  • 64 篇 中文
检索条件"机构=Computer and Network Security Laboratory"
1939 条 记 录,以下是31-40 订阅
排序:
Multi-class Bitcoin mixing service identification based on graph classification
收藏 引用
Digital Communications and networks 2024年 第6期10卷 1881-1893页
作者: Xiaoyan Hu Meiqun Gui Guang Cheng Ruidong Li Hua Wu School of Cyber Science&Engineering Southeast UniversityNanjing 211189China Purple Mountain Laboratories for Network and Communication Security Nanjing 211111China Jiangsu Provincial Engineering Research Center of Security for Ubiquitous Network Nanjing 211189China Key Laboratory of Computer Network and Information Integration Southeast UniversityMinistry of EducationChina Research Base of International Cyberspace Governance Southeast UniversityNanjing 211189China Institute of Science and Engineering Kanazawa UniversityKakumaKanazawa920-1192Japan
Due to its anonymity and decentralization,Bitcoin has long been a haven for various illegal *** generally legalize illicit funds by Bitcoin mixing ***,it is critical to investigate the mixing services in cryptocurrenc... 详细信息
来源: 评论
SteDM: Efficient Image Steganography with Diffusion Models  24th
SteDM: Efficient Image Steganography with Diffusion Models
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Wang, Changguang Shi, Haoyi Li, Qingru Zhao, Dongmei Wang, Fangwei Key Laboratory of Network and Information Security of Hebei Province Hebei Normal University Shijiazhuang050024 China College of Computer and Cyber Security Hebei Normal University Shijiazhuang050024 China
Existing deep learning-based image steganography schemes mostly neglect the latent space of images. These schemes merely adopt simple concatenation of image feature vectors, resulting in a low utilization rate of feat... 详细信息
来源: 评论
Reverse-Nearest-Neighbor-Based Clustering by Fast Search and Find of Density Peaks
收藏 引用
Chinese Journal of Electronics 2023年 第6期32卷 1341-1354页
作者: ZHANG Chunhao XIE Bin ZHANG Yiran College of Computer and Cyber Security Hebei Normal University Hebei Provincial Engineering Research Center for Supply Chain Big Data Analytics and Data Security Hebei Normal University Hebei Provincial Key Laboratory of Network and Information Security Hebei Normal University
Clustering by fast search and find of density peaks(CFSFDP) has the advantages of a novel idea, easy implementation, and efficient clustering. It has been widely recognized in various fields since it was proposed in S... 详细信息
来源: 评论
An Adaptive Residual Coordinate Attention-Based network for Hat and Mask Wearing Detection in Kitchen Environments
An Adaptive Residual Coordinate Attention-Based Network for ...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Zhao, Ying Wu, Xiaoming Liu, Xiangzhi Chen, Hao Qi, Bei Dong, Huomin Key Laboratory of Computing Power Network and Information Security Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
In order to ensure food safety, it is required for personnel to wear hats and masks during food handling processes. To accurately detect the wearing status of kitchen staff, the ARP-YOLO model is proposed. Firstly, im... 详细信息
来源: 评论
Regularization Mixup Adversarial Training: A Defense Strategy for Membership Privacy with Model Availability Assurance  2
Regularization Mixup Adversarial Training: A Defense Strateg...
收藏 引用
2nd International Conference on Big Data and Privacy Computing, BDPC 2024
作者: Ding, Zehua Tian, Youliang Wang, Guorong Xiong, Jinbo College of Computer Science and Technology Guizhou University State Key Laboratory of Public Big Data Guiyang China College of Computer and Cyber Security Fujian Normal University Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou China
Neural network models face two highly destructive threats in real-world applications: membership inference attacks (MIAs) and adversarial attacks (AAs). One compromises the model's confidentiality, leading to memb... 详细信息
来源: 评论
A Hypothesis Testing-based Cyber Deception Framework under Sequential Reconnaissance  59
A Hypothesis Testing-based Cyber Deception Framework under S...
收藏 引用
59th Annual Conference on Information Sciences and Systems, CISS 2025
作者: Kumar, Abhinav Brahma, Swastik Kamhoua, Charles A. University of Cincinnati Department of Computer Science OH United States Devcom Army Research Laboratory Network Security Branch MD United States
In this paper, we present a novel sequential hypothesis testing framework to model an attacker's process of gathering and processing information sequentially during the reconnaissance phase. The attacker's opt... 详细信息
来源: 评论
Textual Data De-Privatization Scheme Based on Generative Adversarial networks  24th
Textual Data De-Privatization Scheme Based on Generative Adv...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Du, Yanning Xu, Jinnan Zhang, Yaling Wang, Yichuan Wang, Zhoukai School of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China
In many fields, such as healthcare, finance, and scientific research, data sharing and collaboration are critical to achieving better outcomes. However, the sharing of personal data often involves privacy risks, so pr... 详细信息
来源: 评论
A Sharding Scheme Based on Graph Partitioning Algorithm for Public Blockchain
收藏 引用
computer Modeling in Engineering & Sciences 2024年 第6期139卷 3311-3327页
作者: Shujiang Xu Ziye Wang Lianhai Wang Miodrag J.Mihaljevi′c Shuhui Zhang Wei Shao Qizheng Wang Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science CenterQilu University of Technology(Shandong Academy of Sciences)Jinan250014China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer ScienceJinan250014China Mathematical Institute The Serbian Academy of Sciences and ArtsBelgrade11000Serbia
Blockchain technology,with its attributes of decentralization,immutability,and traceability,has emerged as a powerful catalyst for enhancing traditional industries in terms of optimizing business ***,transaction perfo... 详细信息
来源: 评论
Neural network-Based State Estimation for Nonlinear Systems With Denial-of-Service Attack Under Try-Once-Discard Protocol
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第10期11卷 2182-2184页
作者: Xueli Wang Shangwei Zhao Ming Yang Xin Wang Xiaoming Wu the Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science CenterQilu University of Technology(Shandong Academy of Sciences)Jinan 250014 Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer ScienceJinan 250014China Department of Automation Shanghai Jiao Tong UniversityShanghai 200240China
Dear Editor,This letter deals with state estimation issues of discrete-time nonlinear systems subject to denial-of-service(DoS)attacks under the try-once-discard(TOD)*** specifically,to reduce the communication burden... 详细信息
来源: 评论
A bitcoin service community classification method based on Random Forest and improved KNN algorithm
IET Blockchain
收藏 引用
IET Blockchain 2024年 第3期4卷 276-286页
作者: Gao, Muyun Lin, Shenwen Tian, Xin He, Xi He, Ketai Chen, Shifeng School of Mechanical Engineering University of Science and Technology Beijing Beijing China Internet Financial Security Technology Key Laboratory National Computer Network Emergency Response Technical Team/Coordination Center of China Beijing China
There are service communities with different functions in the Bitcoin transactions system. Identifying community categories helps to further understand the Bitcoin transactions system and facilitates targeted regulati... 详细信息
来源: 评论