咨询与建议

限定检索结果

文献类型

  • 1,242 篇 会议
  • 706 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 1,951 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,174 篇 工学
    • 918 篇 计算机科学与技术...
    • 719 篇 软件工程
    • 304 篇 信息与通信工程
    • 191 篇 电气工程
    • 130 篇 控制科学与工程
    • 124 篇 网络空间安全
    • 103 篇 电子科学与技术(可...
    • 88 篇 生物工程
    • 54 篇 机械工程
    • 49 篇 安全科学与工程
    • 42 篇 仪器科学与技术
    • 42 篇 生物医学工程(可授...
    • 39 篇 光学工程
    • 38 篇 交通运输工程
    • 32 篇 化学工程与技术
    • 26 篇 建筑学
    • 24 篇 动力工程及工程热...
  • 492 篇 理学
    • 313 篇 数学
    • 95 篇 生物学
    • 85 篇 物理学
    • 83 篇 统计学(可授理学、...
    • 45 篇 系统科学
    • 38 篇 化学
  • 296 篇 管理学
    • 176 篇 管理科学与工程(可...
    • 144 篇 图书情报与档案管...
    • 55 篇 工商管理
  • 72 篇 法学
    • 43 篇 法学
    • 31 篇 社会学
  • 37 篇 医学
    • 33 篇 临床医学
    • 31 篇 基础医学(可授医学...
  • 23 篇 军事学
  • 22 篇 经济学
  • 7 篇 教育学
  • 7 篇 农学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 104 篇 feature extracti...
  • 83 篇 accuracy
  • 77 篇 semantics
  • 73 篇 computational mo...
  • 65 篇 cryptography
  • 58 篇 privacy
  • 57 篇 federated learni...
  • 55 篇 protocols
  • 55 篇 data models
  • 52 篇 cloud computing
  • 51 篇 training
  • 48 篇 security
  • 47 篇 deep learning
  • 45 篇 authentication
  • 42 篇 information secu...
  • 41 篇 neural networks
  • 38 篇 data privacy
  • 38 篇 network security
  • 37 篇 servers
  • 36 篇 encryption

机构

  • 229 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 52 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 45 篇 tianjin key labo...
  • 43 篇 college of compu...
  • 41 篇 school of comput...
  • 39 篇 shandong provinc...
  • 38 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 32 篇 school of cyber ...
  • 31 篇 shaanxi key labo...
  • 29 篇 institute of inf...
  • 29 篇 school of comput...
  • 28 篇 qilu university ...
  • 28 篇 key laboratory o...
  • 27 篇 college of compu...
  • 27 篇 shandong provinc...
  • 27 篇 fujian provincia...
  • 25 篇 college of compu...

作者

  • 32 篇 xu li
  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 21 篇 ma jianfeng
  • 21 篇 jianfeng ma
  • 21 篇 liu ximeng
  • 21 篇 wang yichuan
  • 19 篇 xiaoming wu
  • 19 篇 baojiang cui
  • 18 篇 hei xinhong
  • 17 篇 shen yulong
  • 17 篇 li xu
  • 17 篇 xiong jinbo
  • 16 篇 di xiaoqiang
  • 15 篇 xiangzhi liu
  • 14 篇 li qi
  • 14 篇 li wei
  • 13 篇 lu wenpeng
  • 13 篇 wu xiaoming
  • 13 篇 jinbo xiong

语言

  • 1,743 篇 英文
  • 150 篇 其他
  • 64 篇 中文
检索条件"机构=Computer and Network Security Laboratory"
1951 条 记 录,以下是41-50 订阅
排序:
Privacy Preserving Adjacency Query Supporting Homoionym Search over Medical Graph Data in Cloud Computing  17th
Privacy Preserving Adjacency Query Supporting Homoionym Sear...
收藏 引用
17th International Conference on Cloud Computing, CLOUD 2024, Held as Part of the Services Conference Federation, SCF 2024
作者: Li, Hourong Tian, Yun Wu, Bin Shi, Jiaoli School of Computer and Big Data Science Jiujiang University Jiujiang332005 China Jiujiang Key Laboratory of Network and Information Security Jiujiang332005 China
Cloud computing is widely used in all walks of life today. Massive amounts of medical graph data are being outsourced to cloud servers to reduce overhead. The untrustworthiness of cloud servers puts the sensitive info... 详细信息
来源: 评论
A generalized reliability analysis of 3-ary n-cubes  16
A generalized reliability analysis of 3-ary n-cubes
收藏 引用
16th International Conference on Communication Software and networks, ICCSN 2024
作者: Bai, Zefang Wang, Guijuan Ma, Meijie School of Mathematics and Statistics Jinan250353 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250353 China
Evaluating the reliability of interconnection networks is crucial. The edge-connectivity is a parameter used to assess reliability. In this paper, we discuss a conditional edge-connectivity called the h-extra g-compon... 详细信息
来源: 评论
RFSD-YOLO: An Enhanced X-Ray Object Detection Model for Prohibited Items
RFSD-YOLO: An Enhanced X-Ray Object Detection Model for Proh...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Kong, Xiaotong Li, Aimin Li, Wenqiang Li, Zhiyao Zhang, Yuechen Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
X-ray image detection is essential for ensuring public safety, but traditional methods rely heavily on human analysis and are relatively inefficient. To address this issue, this paper proposes a new object detection m... 详细信息
来源: 评论
CB-YOLO: A Small Object Detection Algorithm for Industrial Scenarios
CB-YOLO: A Small Object Detection Algorithm for Industrial S...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Chen, Hao Wu, Xiaoming Su, Zhanzhi Zhao, Ying Dong, Yunfeng Liu, Xiangzhi Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
In certain specific industrial scenarios, smoking and cellphone usage are strictly prohibited behaviors. In these scenarios, it is crucial to rapidly and accurately detect smoking and cell phone usage, and promptly is... 详细信息
来源: 评论
BTP-CAResNet: An Encrypted Traffic Classification Method Based on Byte Transfer Probability and Coordinate Attention Mechanism
BTP-CAResNet: An Encrypted Traffic Classification Method Bas...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Li, Junhao Shi, Huiling Zhang, Wei Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
With the extensive application of network traffic encryption technology, the accurate and efficient classification of encrypted traffic has become a critical need for network management. Deep learning has become the p... 详细信息
来源: 评论
Privacy-Preserving Access Control Model for E-Medical Systems  2
Privacy-Preserving Access Control Model for E-Medical System...
收藏 引用
2nd International Conference on Big Data and Privacy Computing, BDPC 2024
作者: Cai, Rongsheng Chen, Lanxiang Zhu, Yizhao City University of Macau Faculty of Data Science 999078 China College of Computer and Cyber Security Fujian Normal University Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou China
With the high speed development of information technology, the healthcare system increasingly relies on cloud servers for data storage and complex computation, patient data privacy issues stem from healthcare systems&... 详细信息
来源: 评论
A Technique for Ensured Cross Chain IBC Transactions Using TPM  2
A Technique for Ensured Cross Chain IBC Transactions Using T...
收藏 引用
2nd International Conference on Big Data and Privacy Computing, BDPC 2024
作者: Wang, YiChuan Yan, YiLiang Liu, XiaoXue Gao, Wen Wang, ZiYan School of Computer Science and Engineering Xi'an University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China
Cross chain contact across several blockchains becomes increasingly significant in importance with the increased use of blockchain technology. However, security cannot be assured when producing equivalent outputs thro... 详细信息
来源: 评论
Malware Detection Method Based on TPE Optimized Stacking  3
Malware Detection Method Based on TPE Optimized Stacking
收藏 引用
3rd International Conference on High Performance Computing and Communication Engineering, HPCCE 2023
作者: Zhao, Dongbo Yuan, Zesong Xie, Nannan Jilin Province Key Laboratory of Network and Information Security School of Computer Science and Technology Changchun University of Science and Technology Changchun130022 China
Fast detection and categorization of malware are increasingly important for securing hosts and networks. Although many Machine Learning models have been utilized to detect malware, single-model detection may not remai... 详细信息
来源: 评论
Conditional selection with CNN augmented transformer for multimodal affective analysis
收藏 引用
CAAI Transactions on Intelligence Technology 2024年 第4期9卷 917-931页
作者: Jianwen Wang Shiping Wang Shunxin Xiao Renjie Lin Mianxiong Dong Wenzhong Guo College of Computer and Data Science Fuzhou UniversityFuzhouChina College of Computer and Cyber Security Fujian Normal UniversityFuzhouChina Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou UniversityFuzhouChina Digital Fujian Institute of Big Data Security Technology Fujian Normal UniversityFuzhouChina Department of Sciences and Informatics Muroran Institute of TechnologyMuroranJapan
Attention mechanism has been a successful method for multimodal affective analysis in recent years. Despite the advances, several significant challenges remain in fusing language and its nonverbal context information.... 详细信息
来源: 评论
Privacy-Preserving Responsible Gaming Systems  2
Privacy-Preserving Responsible Gaming Systems
收藏 引用
2nd International Conference on Big Data and Privacy Computing, BDPC 2024
作者: Zhu, Yizhao Chen, Lanxiang City University of Macau Faculty of Data Science 999078 China College of Computer and Cyber Security Fujian Normal University Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou China
Responsible gaming aims at maintaining the integrity and sustainability of the gaming industry. However, The exchange of sensitive data, such as player and gaming related information, among different parties raises si... 详细信息
来源: 评论