咨询与建议

限定检索结果

文献类型

  • 1,284 篇 会议
  • 1,030 篇 期刊文献
  • 3 册 图书
  • 1 篇 专利

馆藏范围

  • 2,318 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,459 篇 工学
    • 1,149 篇 计算机科学与技术...
    • 951 篇 软件工程
    • 350 篇 信息与通信工程
    • 186 篇 生物工程
    • 179 篇 电气工程
    • 158 篇 控制科学与工程
    • 106 篇 网络空间安全
    • 97 篇 电子科学与技术(可...
    • 81 篇 安全科学与工程
    • 80 篇 机械工程
    • 77 篇 生物医学工程(可授...
    • 70 篇 光学工程
    • 52 篇 化学工程与技术
    • 51 篇 交通运输工程
    • 42 篇 仪器科学与技术
    • 39 篇 动力工程及工程热...
  • 646 篇 理学
    • 331 篇 数学
    • 209 篇 生物学
    • 132 篇 物理学
    • 116 篇 统计学(可授理学、...
    • 66 篇 化学
    • 42 篇 系统科学
  • 392 篇 管理学
    • 226 篇 管理科学与工程(可...
    • 187 篇 图书情报与档案管...
    • 93 篇 工商管理
  • 101 篇 法学
    • 64 篇 社会学
  • 71 篇 医学
    • 60 篇 临床医学
    • 53 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 49 篇 经济学
    • 48 篇 应用经济学
  • 28 篇 农学
  • 18 篇 军事学
  • 13 篇 教育学
  • 5 篇 文学
  • 3 篇 艺术学

主题

  • 94 篇 feature extracti...
  • 94 篇 accuracy
  • 77 篇 deep learning
  • 76 篇 semantics
  • 76 篇 privacy
  • 69 篇 training
  • 61 篇 computational mo...
  • 61 篇 machine learning
  • 53 篇 federated learni...
  • 47 篇 data privacy
  • 45 篇 security
  • 39 篇 blockchain
  • 39 篇 cloud computing
  • 37 篇 optimization
  • 37 篇 data models
  • 33 篇 anomaly detectio...
  • 32 篇 internet of thin...
  • 32 篇 real-time system...
  • 31 篇 authentication
  • 30 篇 neural networks

机构

  • 69 篇 shandong provinc...
  • 66 篇 the state key la...
  • 65 篇 key laboratory o...
  • 59 篇 school of cyber ...
  • 58 篇 hubei key labora...
  • 53 篇 school of data a...
  • 51 篇 tianjin key labo...
  • 48 篇 network and data...
  • 45 篇 shandong enginee...
  • 45 篇 institute of blo...
  • 45 篇 school of comput...
  • 43 篇 college of compu...
  • 42 篇 state key labora...
  • 40 篇 state key labora...
  • 40 篇 school of cyber ...
  • 37 篇 college of compu...
  • 34 篇 college of cyber...
  • 33 篇 hubei engineerin...
  • 32 篇 national enginee...
  • 29 篇 services computi...

作者

  • 45 篇 zhou pan
  • 36 篇 jin hai
  • 31 篇 hai jin
  • 23 篇 hu shengshan
  • 20 篇 song mingli
  • 20 篇 li tao
  • 20 篇 liu daizong
  • 19 篇 youliang tian
  • 18 篇 tian youliang
  • 17 篇 qin zhen
  • 17 篇 mahmood khalid
  • 17 篇 zhang leo yu
  • 16 篇 das ashok kumar
  • 16 篇 zou deqing
  • 16 篇 huang qingming
  • 16 篇 deqing zou
  • 16 篇 xu qianqian
  • 15 篇 cao xiaochun
  • 14 篇 ren kui
  • 14 篇 chen yuling

语言

  • 2,136 篇 英文
  • 172 篇 其他
  • 14 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Data Security Technology"
2318 条 记 录,以下是1-10 订阅
排序:
The Role of Blockchain technology in Supply chain Management for data security  3
The Role of Blockchain Technology in Supply chain Management...
收藏 引用
3rd IEEE International Conference on Blockchain and Distributed Systems security, ICBDS 2024
作者: Birari, Dipika R. Rathod, Vijay U. Dandavate, Aarti Shelke, Nilesh Kumar, Ranjit Kulkarni, Masira M. S Army Institute of Technology Department of Information Technology Pune India G H Raisoni College of Engineering and Management Department of Artificial Intelligent and Machine Learning Wagholi Pune India Dhole Patil College of Engineering Department of Computer Engineering Pune India Symbiosis International Deemed University Symbiosis Institute of Technology Department of Computer Science and Engineering Nagpur Campus Pune India Ajeenkya D Y Patil University Department of Computer Engineering Pune India G H Raisoni College of Engineering and Management Department of Cyber Security and Data Science Wagholi Pune India
In a traditional supply chain system, the process of producing raw materials so that a product may be delivered to a customer is a manual operation with insufficient data and transaction security. The entire process i... 详细信息
来源: 评论
E-PRedictor: an approach for early prediction of pull request acceptance
收藏 引用
Science China(Information Sciences) 2025年 第5期68卷 380-395页
作者: Kexing CHEN Lingfeng BAO Xing HU Xin XIA Xiaohu YANG State Key Laboratory of Blockchain and Data Security Zhejiang University Software Engineering Application Technology Lab
A pull request(PR) is an event in Git where a contributor asks project maintainers to review code he/she wants to merge into a project. The PR mechanism greatly improves the efficiency of distributed software developm... 详细信息
来源: 评论
A verifiable essential secret image sharing scheme based on HLRs(VESIS-(t,s,k,n))
收藏 引用
CAAI Transactions on Intelligence technology 2024年 第2期9卷 388-410页
作者: Massoud Hadian Dehkordi Seyed Taghi Farahi Samaneh Mashhadi Cryptography and Data Security Laboratory School of MathematicsIran University of Science and TechnologyNarmakTehranIran
In traditional secret image sharing schemes,a secret image is shared among shareholders who have the same *** if the shareholders have two different positions,essential and non‐essential,it is necessary to use essent... 详细信息
来源: 评论
An Enhanced Clustering-Based (k, t)-Anonymity Algorithm for Graphs
收藏 引用
Chinese Journal of Electronics 2025年 第1期34卷 365-372页
作者: Yuanyuan Wang Xing Zhang Zhiguang Chu Wei Shi Xiang Li School of Electronics and Information Engineering Liaoning University of Technology Key Laboratory of Security for Network and Data in Industrial Internet of Liaoning Province Faculty of Information Technology Beijing University of Technology
As people become increasingly reliant on the Internet, securely storing and publishing private data has become an important issue. In real life, the release of graph data can lead to privacy breaches, which is a highl... 详细信息
来源: 评论
Review of data security within energy blockchain:A comprehensive analysis of storage,management,and utilization
收藏 引用
High-Confidence Computing 2024年 第3期4卷 82-102页
作者: Yunhua He Zhihao Zhou Yan Pan Fahui Chong Bin Wu Ke Xiao Hong Li School of Information Science and Technology North China University of TechnologyBeijing 100144China China Industrial Control Systems Cyber Emergency Response Team Beijing 100040China Key Laboratory in Blockchain and Data Security by Ministry of Industry and Information Technology Beijing 100040China Institute of Information Engineering Chinese Academy of Sciences Beijing 100195China
Energy systems are currently undergoing a transformation towards new paradigms characterized by decarbonization,decentralization,democratization,and *** this evolving context,energy blockchain,aiming to enhance effici... 详细信息
来源: 评论
Enhancing Adversarial Example Transferability via Regularized Constrained Feature Layer
收藏 引用
Computers, Materials & Continua 2025年 第4期83卷 157-175页
作者: Xiaoyin Yi Long Chen Jiacheng Huang Ning Yu Qian Huang School of Computer Science and Technology Chongqing University of Posts and TelecommunicationsChongqing400065China Chongqing Key Laboratory of Public Big Data Security Technology Chongqing401420China School of Cyber Security and Information Law Chongqing University of Posts and TelecommunicationsChongqing400065China Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of EducationChongqing400065China Artificial Intelligence and Big Data College Chongqing Polytechnic University of Electronic TechnologyChongqing401331China
Transfer-based Adversarial Attacks(TAAs)can deceive a victim model even without prior *** is achieved by leveraging the property of adversarial *** is,when generated from a surrogate model,they retain their features i... 详细信息
来源: 评论
Vehicle data security based on Underground Garage Location - Dead Reckoning Method  3
Vehicle Data Security based on Underground Garage Location -...
收藏 引用
3rd IEEE International Conference on Information technology, Big data and Artificial Intelligence, ICIBA 2023
作者: Zhang, Xi Li, Fangwei Guo, Shuang Pei, Yadong Zhang, Yanlin Chongqing College of Mobile Communication 401520 China Chongqing Key Laboratory of Public Big Data Security Technology 401420 Chongqing401520 China
With the widespread popularity of the Internet of Things and the rapid development of vehicle communication technology, it has gradually become normal to realize vehicle evaluation, selection, and large-scale data dis... 详细信息
来源: 评论
Indoor Location and data security of Traffic Flow based on Fingerprint database Filtering  3
Indoor Location and Data Security of Traffic Flow based on F...
收藏 引用
3rd IEEE International Conference on Information technology, Big data and Artificial Intelligence, ICIBA 2023
作者: Zhang, Xi Li, Fangwei Guo, Shuang Pei, Yadong Zhang, Yanlin Chongqing College of Mobile Communication 401520 China Chongqing Key Laboratory of Public Big Data Security Technology 401420 Chongqing401520 China
With the development of urbanization, the number of vehicles is gradually increasing, and the vehicle is gradually developing toward the direction of intelligence. Internet of vehicles technology is gradually entering... 详细信息
来源: 评论
Integer wavelet transform-based secret image sharing using rook polynomial and hamming code with authentication
收藏 引用
CAAI Transactions on Intelligence technology 2024年 第6期9卷 1435-1450页
作者: Sara Charoghchi Zahra Saeidi Samaneh Mashhadi Cryptography and Data Security Laboratory School of Mathematics and Computer ScienceIran University of Science&TechnologyTehranIran
As an effective way to securely transfer secret images,secret image sharing(SIS)has been a noteworthy area of *** in a SIS scheme,a secret image is shared via shadows and could be reconstructed by having the required ... 详细信息
来源: 评论
The Role of Blockchain technology in Supply chain Management for data security
The Role of Blockchain Technology in Supply chain Management...
收藏 引用
Blockchain and Distributed Systems security (ICBDS), IEEE International Conference on
作者: Dipika R. Birari Vijay U. Rathod Aarti Dandavate Nilesh Shelke Ranjit Kumar Masira M. S Kulkarni Department of Information Technology Army Institute of Technology Pune Department of Artificial Intelligent and Machine Learning G H Raisoni College of Engineering and Management Wagholi Pune Department of Computer Engineering Dhole Patil College of Engineering Pune Department of Computer Science and Engineering Symbiosis Institute of Technology Nagpur Campus Symbiosis International Deemed University Pune India Department of Computer Engineering Ajeenkya D Y Patil University Pune Department of Cyber Security and Data Science G H Raisoni College of Engineering and Management Wagholi Pune
In a traditional supply chain system, the process of producing raw materials so that a product may be delivered to a customer is a manual operation with insufficient data and transaction security. The entire process i... 详细信息
来源: 评论