咨询与建议

限定检索结果

文献类型

  • 1,240 篇 会议
  • 696 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 1,939 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,162 篇 工学
    • 907 篇 计算机科学与技术...
    • 716 篇 软件工程
    • 298 篇 信息与通信工程
    • 189 篇 电气工程
    • 123 篇 网络空间安全
    • 122 篇 控制科学与工程
    • 99 篇 电子科学与技术(可...
    • 88 篇 生物工程
    • 54 篇 机械工程
    • 50 篇 安全科学与工程
    • 42 篇 生物医学工程(可授...
    • 41 篇 光学工程
    • 41 篇 仪器科学与技术
    • 39 篇 交通运输工程
    • 32 篇 化学工程与技术
    • 25 篇 建筑学
    • 24 篇 动力工程及工程热...
  • 488 篇 理学
    • 311 篇 数学
    • 94 篇 生物学
    • 85 篇 物理学
    • 82 篇 统计学(可授理学、...
    • 44 篇 系统科学
    • 36 篇 化学
  • 295 篇 管理学
    • 176 篇 管理科学与工程(可...
    • 143 篇 图书情报与档案管...
    • 56 篇 工商管理
  • 72 篇 法学
    • 43 篇 法学
    • 31 篇 社会学
  • 36 篇 医学
    • 32 篇 临床医学
    • 31 篇 基础医学(可授医学...
  • 23 篇 军事学
  • 22 篇 经济学
  • 8 篇 教育学
  • 7 篇 农学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 105 篇 feature extracti...
  • 83 篇 accuracy
  • 77 篇 semantics
  • 73 篇 computational mo...
  • 65 篇 cryptography
  • 58 篇 privacy
  • 55 篇 protocols
  • 55 篇 data models
  • 54 篇 federated learni...
  • 51 篇 cloud computing
  • 51 篇 training
  • 48 篇 security
  • 46 篇 deep learning
  • 45 篇 authentication
  • 42 篇 information secu...
  • 41 篇 neural networks
  • 38 篇 data privacy
  • 38 篇 network security
  • 37 篇 servers
  • 36 篇 encryption

机构

  • 226 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 52 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 45 篇 tianjin key labo...
  • 43 篇 college of compu...
  • 41 篇 school of comput...
  • 38 篇 shaanxi key labo...
  • 38 篇 shandong provinc...
  • 37 篇 school of comput...
  • 32 篇 school of cyber ...
  • 30 篇 shaanxi key labo...
  • 29 篇 institute of inf...
  • 29 篇 school of comput...
  • 28 篇 qilu university ...
  • 28 篇 key laboratory o...
  • 27 篇 college of compu...
  • 27 篇 fujian provincia...
  • 25 篇 college of compu...
  • 24 篇 shandong provinc...

作者

  • 32 篇 xu li
  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 21 篇 ma jianfeng
  • 21 篇 jianfeng ma
  • 21 篇 liu ximeng
  • 21 篇 wang yichuan
  • 19 篇 xiaoming wu
  • 19 篇 baojiang cui
  • 18 篇 hei xinhong
  • 17 篇 shen yulong
  • 17 篇 li xu
  • 17 篇 xiong jinbo
  • 16 篇 di xiaoqiang
  • 15 篇 xiangzhi liu
  • 14 篇 li qi
  • 14 篇 li wei
  • 13 篇 wu xiaoming
  • 13 篇 jinbo xiong
  • 13 篇 guohua lv

语言

  • 1,739 篇 英文
  • 142 篇 其他
  • 64 篇 中文
检索条件"机构=Computer and Network Security Laboratory"
1939 条 记 录,以下是81-90 订阅
排序:
DBKEM-AACS: a distributed key escrow model in blockchain with anonymous authentication and committee selection
收藏 引用
Science China(Information Sciences) 2023年 第3期66卷 289-290页
作者: Axin XIANG Hongfeng GAO Youliang TIAN Liang WAN College of Computer Science and Technology Guizhou University Institute of Cryptography and Data Security Guizhou University Network and Information Management Center Guizhou University State Key Laboratory of Public Big Data Guizhou University Institute of Computer Software and Theory Guizhou University
Dear editor, Key security is of great practical significance and demand to guarantee the security of digital assets in the blockchain system. At present, users prefer to escrow their assets on centralized institutions...
来源: 评论
A Linked List Encryption Scheme for Image Steganography without Embedding
收藏 引用
computer Modeling in Engineering & Sciences 2024年 第10期141卷 331-352页
作者: Pengbiao Zhao Qi Zhong Jingxue Chen Xiaopei Wang Zhen Qin Erqiang Zhou Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of ChinaChengdu610054China Faculty of Data Science City University of MacaoMacao999078China Department of Computer Science and Engineering University of CaliforniaRiversideCA 92521USA
Information steganography has received more and more attention from scholars nowadays,especially in the area of image steganography,which uses image content to transmit information and makes the existence of secret in... 详细信息
来源: 评论
Optimization Strategy for Remote Differential Upgrade of IoT Firmware  11
Optimization Strategy for Remote Differential Upgrade of IoT...
收藏 引用
11th Joint International Information Technology and Artificial Intelligence Conference, ITAIC 2023
作者: Ding, Wenkang Sun, Ruirui Meng, Qinglong Wan, Zhong Cheng, Guanghe Hao, Huijuan Bai, Jinqiang Key Laboratory of Computing Power Network and Information Security Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
With the continuous increase of IoT devices, the management and optimization of devices become particularly important. The update cycle of device functions is short, and in order to facilitate management and optimize ... 详细信息
来源: 评论
Weighted Adversarial Transfer network-Based Fault Diagnosis Method for Gearboxes  11
Weighted Adversarial Transfer Network-Based Fault Diagnosis ...
收藏 引用
11th Joint International Information Technology and Artificial Intelligence Conference, ITAIC 2023
作者: Wang, Dan Meng, Qinglong Hao, Huijuan Cheng, Guanghe Tang, Yongwei Bai, Jinqiang Key Laboratory of Computing Power Network and Information Security Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
In this paper, we address the issue of gearbox fault diagnosis under changing working conditions and the limitations of migration learning algorithms that are only applicable to scenarios with identical labels in both... 详细信息
来源: 评论
Job2Vec: A Self-Supervised Contrastive Learning Based HPC Job Power Consumption Prediction Framework  29
Job2Vec: A Self-Supervised Contrastive Learning Based HPC Jo...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Zhang, Jie Song, Jian Li, Xiang Tian, Xuesen Zhao, Zhigang Wu, Lu Wang, Chunxiao Key Laboratory of Computing Power Network and Information Security Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
In the context of the rapid development of big data and artificial intelligence, the field of HPC is facing significant challenges in energy consumption. To address this challenge, this paper proposes a power consumpt... 详细信息
来源: 评论
Intermittent Fault Diagnosis of Split-Star networks and its Applications
收藏 引用
IEEE Transactions on Parallel and Distributed Systems 2023年 第4期34卷 1253-1264页
作者: Song, Jiankang Lin, Limei Huang, Yanze Hsieh, Sun-Yuan Fujian Normal University College of Computer and Cyber Security Key Laboratory of Network Security and Cryptology Fuzhou Fujian350117 China Fujian University of Technology School of Computer Science and Mathematics Fuzhou Fujian350118 China National Cheng Kung University Department of Computer Science and Information Engineering Tainan701 Taiwan
With the rapid increase of the number of processors in multiprocessor systems and the fast expansion of interconnection networks, the reliability of interconnection network is facing severe challenges, where the fast ... 详细信息
来源: 评论
Semantic Relation-Based Cross Attention network for Image-Text Retrieval
Semantic Relation-Based Cross Attention Network for Image-Te...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Zhou, Huanxiao Geng, Yushui Zhao, Jing Ma, Xishan Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan China Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China Jinan China
Image-text retrieval refers to querying the text or image of another modality given an image or text, and its key lies in the ability to accurately measure the similarity between text and image. Most of the existing r...
来源: 评论
TAKAP: A Lightweight Three-Party Authenticated Key Agreement Protocol with User Anonymity
收藏 引用
Chinese Journal of Electronics 2021年 第4期30卷 686-696页
作者: QIAO Hui DONG Xuewen SHEN Yulong LIU Haozhe YANG Lingxiao School of Computer Science and Technology Xidian University Shaanxi Key Laboratory of Network and System Security Xidian University
The three-party authenticated key agreement protocol is a significant cryptographic mechanism for secure communication, which encourages two entities to authenticate each other and generate a shared session key with t... 详细信息
来源: 评论
Enhanced Public-Key Searchable Encryption Scheme for Cloud-Based EHR Systems
Enhanced Public-Key Searchable Encryption Scheme for Cloud-B...
收藏 引用
2023 IEEE International Conference on E-Health networking, Application and Services, Healthcom 2023
作者: Kong, Xiangqian Chen, Lanxiang City University of Macau Macau999078 China College of Computer and Cyber Security Fujian Normal University Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou China
Due to the swift development of cloud computing technology, an increasing number of healthcare organizations tend to store electronic health records (EHR) on cloud storage servers. To ensure patient privacy, sensitive... 详细信息
来源: 评论
Key Management and Authentication Scheme Forward Trusted Pervasive Container Computing  2
Key Management and Authentication Scheme Forward Trusted Per...
收藏 引用
2nd International Conference on Big Data and Privacy Computing, BDPC 2024
作者: Hei, XinHong Xue, YuZhan Wang, YiChuan Liu, YiFan Peng, Chen Sun, Xiang School of Computer Science and Engineering Xi'an University of Technology Xi'an China School of Computer Science and Engineering Xi'an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China
Cloud computing technology is an internet-based computing model that provides high reliability and security measures, including data backup, secure access control, etc. As Docker containers play a increasingly importa... 详细信息
来源: 评论