咨询与建议

限定检索结果

文献类型

  • 558 篇 期刊文献
  • 76 篇 会议

馆藏范围

  • 634 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 609 篇 工学
    • 535 篇 计算机科学与技术...
    • 341 篇 电气工程
    • 195 篇 信息与通信工程
    • 115 篇 软件工程
    • 33 篇 电子科学与技术(可...
    • 18 篇 控制科学与工程
    • 11 篇 交通运输工程
    • 8 篇 仪器科学与技术
    • 8 篇 环境科学与工程(可...
    • 5 篇 测绘科学与技术
    • 2 篇 材料科学与工程(可...
    • 2 篇 土木工程
    • 2 篇 生物工程
    • 1 篇 力学(可授工学、理...
    • 1 篇 机械工程
    • 1 篇 水利工程
    • 1 篇 石油与天然气工程
  • 62 篇 管理学
    • 61 篇 管理科学与工程(可...
    • 2 篇 图书情报与档案管...
  • 55 篇 理学
    • 25 篇 数学
    • 15 篇 物理学
    • 10 篇 生物学
    • 5 篇 化学
    • 4 篇 地球物理学
    • 1 篇 系统科学
    • 1 篇 生态学
    • 1 篇 统计学(可授理学、...
  • 14 篇 医学
    • 12 篇 临床医学
    • 3 篇 基础医学(可授医学...
  • 4 篇 农学
  • 1 篇 文学
    • 1 篇 外国语言文学

主题

  • 69 篇 security
  • 65 篇 cloud computing
  • 55 篇 privacy
  • 53 篇 servers
  • 47 篇 encryption
  • 43 篇 authentication
  • 41 篇 blockchain
  • 39 篇 cryptography
  • 38 篇 privacy-preservi...
  • 33 篇 access control
  • 28 篇 internet of thin...
  • 27 篇 data privacy
  • 25 篇 deep learning
  • 22 篇 protocols
  • 21 篇 privacy protecti...
  • 20 篇 data models
  • 20 篇 training
  • 19 篇 cloud storage
  • 19 篇 attribute-based ...
  • 18 篇 privacy preservi...

机构

  • 89 篇 fujian normal un...
  • 86 篇 fujian normal un...
  • 75 篇 fuzhou univ coll...
  • 62 篇 fujian normal un...
  • 61 篇 fujian normal un...
  • 42 篇 singapore manage...
  • 40 篇 univ texas san a...
  • 38 篇 fujian normal un...
  • 38 篇 xidian univ sch ...
  • 34 篇 chinese acad sci...
  • 31 篇 fujian prov key ...
  • 30 篇 fuzhou univ key ...
  • 26 篇 fuzhou univ coll...
  • 25 篇 wuhan univ sch c...
  • 22 篇 xidian univ stat...
  • 22 篇 state key lab cr...
  • 22 篇 fujian normal un...
  • 20 篇 fuzhou univ fuji...
  • 19 篇 state key lab cr...
  • 17 篇 shandong fundame...

作者

  • 107 篇 huang xinyi
  • 102 篇 liu ximeng
  • 57 篇 ning jianting
  • 54 篇 mu yi
  • 48 篇 xu li
  • 44 篇 choo kim-kwang r...
  • 39 篇 deng robert h.
  • 32 篇 xiong jinbo
  • 31 篇 he debiao
  • 31 篇 li jiguo
  • 29 篇 wu wei
  • 26 篇 miao yinbin
  • 24 篇 yang yang
  • 22 篇 xu shengmin
  • 21 篇 ma jianfeng
  • 21 篇 xiang yang
  • 20 篇 guo wenzhong
  • 19 篇 zhou shuming
  • 19 篇 chen lanxiang
  • 18 篇 tian youliang

语言

  • 625 篇 英文
  • 9 篇 其他
  • 1 篇 中文
检索条件"机构=Fujian Prov Key Lab Informat Secur Network Syst"
634 条 记 录,以下是1-10 订阅
排序:
Efficient Verifiable Dynamic Searchable Symmetric Encryption With Forward and Backward security
收藏 引用
IEEE INTERNET OF THINGS JOURNAL 2025年 第3期12卷 2633-2645页
作者: Zhao, Chenbin Du, Ruiying He, Kun Chen, Jing Li, Jiguo Liu, Ximeng Ning, Jianting Wuhan Univ Sch Cyber Sci & Engn Key Lab Aerosp Informat Secur & Trusted Comp Minist Educ Wuhan 430072 Peoples R China Fujian Normal Univ Coll Comp & Cyber Secur Fuzhou 350117 Peoples R China Fujian Normal Univ Fujian Prov Key Lab Network Secur & Cryptol Fuzhou 350117 Peoples R China Fuzhou Univ Coll Math & Comp Sci Fuzhou 350108 Fujian Peoples R China Fujian Normal Univ Coll Math & Comp Sci Fujian Prov Key Lab Network Secur & Cryptol Fuzhou Peoples R China
In the realm of secure data outsourcing, verifiable dynamic searchable symmetric encryption (VDSSE) enables a client to verify search results obtained from an untrusted server while protecting the data privacy. Nevert... 详细信息
来源: 评论
Private Reachability Queries on Structured Encrypted Temporal Bipartite Graphs
收藏 引用
IEEE TRANSACTIONS ON DEPENDABLE AND securE COMPUTING 2025年 第2期22卷 1810-1826页
作者: Wu, Yulin Chen, Lanxiang Chen, Gaolin Mu, Yi Deng, Robert H. Fujian Normal Univ Coll Comp & Cyber Secur Fujian Prov Key Lab Network Secur & Cryptol Fuzhou 350117 Peoples R China City Univ Macau Fac Data Sci Taipa 314100 Macao Peoples R China Singapore Management Univ Sch Comp & Informat Syst Singapore 188065 Singapore
A temporal bipartite graph is a graph model that incorporates time-related information into its edges, making it suitable for modeling real-world phenomena like disease outbreaks. However, this temporal information is... 详细信息
来源: 评论
Bi-directional temporal graph attention networks for rumor detection in online social networks
收藏 引用
COMPUTING 2025年 第1期107卷 1-17页
作者: Zhou, Qiao Lin, Xingpeng Xu, Li Sun, Yan Fujian Normal Univ Coll Comp & Cyber Secur Fuzhou 350117 Fujian Peoples R China Fujian Normal Univ Fujian Prov Key Lab Network Secur & Cryptol Fuzhou 350117 Fujian Peoples R China China Ind Control Syst Cyber Emergency Response Te Beijing 100043 Peoples R China
Online Social networks (OSNs) have become the main platform for individuals to share information, but the rapid dissemination of information has also resulted in an increase in the spread of rumors. Some structure-bas... 详细信息
来源: 评论
Local Fault Diagnosis Analysis Based on Block Pattern of Regular Diagnosable networks
收藏 引用
IEEE TRANSACTIONS ON networkING 2025年 第2期33卷 849-864页
作者: Lin, Limei Guan, Kaineng Huang, Yanze Hsieh, Sun-Yuan Chen, Gaolin Fujian Normal Univ Coll Comp & Cyber Secur Fujian Prov Key Lab Network Secur & Cryptol Fuzhou 350117 Fujian Peoples R China Fujian Univ Technol Sch Comp Sci & Math Fuzhou 350118 Fujian Peoples R China Natl Cheng Kung Univ Dept Comp Sci & Informat Engn Tainan 701 Taiwan
Fault diagnosability can reflect the actual self diagnosing capability of a multiprocessor system better. However, people usually focus on the overall information and neglect the important local information. In order ... 详细信息
来源: 评论
Achieving Efficient Privacy-Preserving Mixed Data Quality Assessment in Mobile Crowdsensing
收藏 引用
IEEE INTERNET OF THINGS JOURNAL 2025年 第4期12卷 3785-3799页
作者: Huang, Chunpu Zhang, Yuanyuan Xiong, Jinbo Bi, Renwan Tian, Youliang Fujian Normal Univ Coll Comp & Cyber Secur Fuzhou 350117 Peoples R China Fujian Normal Univ Fujian Prov Key Lab Network Secur & Cryptol Fuzhou 350117 Peoples R China Xidian Univ State Key Lab Integrated Serv Networks Xian 710071 Peoples R China Guizhou Univ Coll Big Data & Informat Engn State Key Lab Publ Big Data Guiyang 550025 Peoples R China
In mobile crowdsensing (MCS) applications, the single type data is inadequate to reflect the complexities of the real world and meet precise task requirements. Currently, there are few works that focus on mixed data i... 详细信息
来源: 评论
Video capturing device identification through block-based PRNU matching
收藏 引用
FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION 2025年 52卷
作者: Li, Jian Wang, Fei Ma, Bin Wang, Chunpeng Wu, Xiaoming Shandong Acad Sci Key Lab Comp Power Network & Informat Secur Minist Educ Natl Supercomp Ctr JinanQilu Univ TechnolShandon Jinan Peoples R China Shandong Fundamental Res Ctr Comp Sci Shandong Prov Key Lab Ind Network & Informat Syst Jinan Peoples R China
This paper addresses the performance of a PRNU-based (photo response non-uniformity) scheme to identify the capturing device of a video. A common concern is PRNU in each frame being misaligned due to the video stabili... 详细信息
来源: 评论
Efficient and secure Content-Based Image Retrieval in Cloud-Assisted Internet of Things
收藏 引用
IEEE INTERNET OF THINGS JOURNAL 2025年 第5期12卷 6001-6013页
作者: Chen, Lin Yang, Yiwei Yang, Li Xu, Chao Miao, Yinbin Liu, Zhiquan Liu, Ximeng Choo, Kim-Kwang Raymond Liang, Zhihong Hong, Chao Guangdong Prov Key Lab Power Syst Network Secur Guangzhou 510080 Peoples R China China Southern Power Grid Co Ltd Elect Power Res Inst Guangzhou 510080 Peoples R China Xidian Univ Sch Cyber Engn Xian 710071 Peoples R China Jinan Univ Coll Cyber Secur Guangzhou 510632 Peoples R China Fuzhou Univ Coll Math & Comp Sci Fuzhou 350117 Peoples R China Fuzhou Univ Fujian Prov Key Lab Informat Secur Network Syst Fuzhou 350117 Peoples R China Univ Texas San Antonio Dept Informat Syst & Cyber Secur San Antonio TX 78249 USA
With the rapid growth of encrypted image data outsourced to cloud servers, achieving data confidentiality and searchability in cloud-assisted Internet of Things (IoT) environments has become increasingly feasible. How... 详细信息
来源: 评论
Fair-and-Exculpable-Attribute-Based Searchable Encryption With Revocation and Verifiable Outsourced Decryption Using Smart Contract
收藏 引用
IEEE INTERNET OF THINGS JOURNAL 2025年 第4期12卷 4302-4317页
作者: Chen, Liqing Xu, Shiguo Zhang, Hao Weng, Jian Huaiyin Inst Technol Fac Comp & Software Engn Huaian 223003 Jiangsu Peoples R China Fujian Prov Key Lab Network Secur & Cryptol Fuzhou 350117 Fujian Peoples R China Jinan Univ Coll Informat Sci & Technol Guangzhou 510632 Guangdong Peoples R China
Users are inclined to outsource their data to the cloud due to the rapid growth of data in response to the growing use of cloud computing and the Internet of Things (IoT). One of the primary issues for users is the se... 详细信息
来源: 评论
Dynamic malware detection based on supervised contrastive learning
收藏 引用
COMPUTERS & ELECTRICAL ENGINEERING 2025年 123卷
作者: Yang, Shumian Yang, Yongqi Zhao, Dawei Xu, Lijuan Li, Xin Yu, Fuqiang Hu, Jiarui Qilu Univ Technol Key Lab Comp Power Network & Informat Secur Shandong Acad Sci Minist EducShandong Comp Sci CtrNatl Supercomp C Jinan 250014 Peoples R China Shandong Fundamental Res Ctr Comp Sci Shandong Prov Key Lab Ind Network & Informat Syst Jinan 250014 Peoples R China
Application Programming Interface (API) calls record interactions between a program and the operating system or other programs during runtime. Due to this precise tracking capability, API call information is extensive... 详细信息
来源: 评论
PH-MG-ABE: A Flexible Policy-Hidden Multigroup Attribute-Based Encryption Scheme for secure Cloud Storage
收藏 引用
IEEE INTERNET OF THINGS JOURNAL 2025年 第2期12卷 2146-2157页
作者: Li, Jiguo Zhang, Enfan Han, Jinguang Zhang, Yichen Shen, Jian Fujian Normal Univ Coll Comp & Cyber Secur Sch Math & Stat Key Lab Analyt Math & ApplicatMinist Educ Fuzhou 350117 Peoples R China Fujian Normal Univ Fujian Prov Key Lab Network Secur & Cryptol Fuzhou 350117 Peoples R China Fujian Normal Univ Coll Comp & Cyber Secur Fuzhou 350117 Peoples R China Southeast Univ Sch Cyber Sci & Engn Nanjing 210096 Peoples R China Zhejiang Sci Tech Univ Sch Informat Sci & Engn Hangzhou 310018 Peoples R China
Ciphertext-policy attribute-based encryption (CP-ABE) has attracted significant attention due to its fine-grained access control capabilities, which are highly compatible with cloud computing. Most enterprises utilizi... 详细信息
来源: 评论