咨询与建议

限定检索结果

文献类型

  • 1,737 篇 会议
  • 1,156 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,897 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,893 篇 工学
    • 1,437 篇 计算机科学与技术...
    • 1,153 篇 软件工程
    • 516 篇 信息与通信工程
    • 238 篇 电气工程
    • 216 篇 控制科学与工程
    • 171 篇 生物工程
    • 168 篇 电子科学与技术(可...
    • 160 篇 网络空间安全
    • 130 篇 机械工程
    • 74 篇 光学工程
    • 73 篇 仪器科学与技术
    • 70 篇 生物医学工程(可授...
    • 65 篇 安全科学与工程
    • 60 篇 交通运输工程
    • 45 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 818 篇 理学
    • 514 篇 数学
    • 182 篇 生物学
    • 164 篇 物理学
    • 149 篇 统计学(可授理学、...
    • 93 篇 系统科学
    • 48 篇 化学
  • 470 篇 管理学
    • 292 篇 管理科学与工程(可...
    • 202 篇 图书情报与档案管...
    • 93 篇 工商管理
  • 100 篇 法学
    • 60 篇 社会学
    • 42 篇 法学
  • 67 篇 医学
    • 57 篇 临床医学
    • 48 篇 基础医学(可授医学...
  • 36 篇 经济学
    • 36 篇 应用经济学
  • 30 篇 军事学
  • 18 篇 农学
  • 15 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 138 篇 feature extracti...
  • 116 篇 accuracy
  • 110 篇 semantics
  • 97 篇 training
  • 94 篇 federated learni...
  • 89 篇 computational mo...
  • 77 篇 cryptography
  • 71 篇 privacy
  • 69 篇 authentication
  • 68 篇 security
  • 63 篇 data models
  • 62 篇 deep learning
  • 52 篇 robustness
  • 50 篇 object detection
  • 49 篇 protocols
  • 46 篇 optimization
  • 45 篇 information secu...
  • 44 篇 neural networks
  • 42 篇 adaptation model...
  • 41 篇 transformers

机构

  • 272 篇 key laboratory o...
  • 204 篇 shandong provinc...
  • 68 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 57 篇 guangxi key lab ...
  • 56 篇 key lab of infor...
  • 51 篇 shandong enginee...
  • 50 篇 shandong fundame...
  • 42 篇 school of comput...
  • 40 篇 shandong provinc...
  • 38 篇 school of cyber ...
  • 31 篇 college of compu...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 27 篇 college of compu...
  • 27 篇 qilu university ...
  • 26 篇 pca lab key lab ...
  • 24 篇 shandong fundame...
  • 22 篇 beijing electron...

作者

  • 72 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 24 篇 xiaoming wu
  • 23 篇 xie jin
  • 22 篇 ma jianfeng
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 liu ximeng
  • 21 篇 li xianxian
  • 20 篇 zhixin li
  • 20 篇 li hui
  • 19 篇 xianxian li
  • 18 篇 xiangzhi liu
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 di xiaoqiang
  • 16 篇 zhang yuqing

语言

  • 2,420 篇 英文
  • 397 篇 其他
  • 87 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2897 条 记 录,以下是1271-1280 订阅
排序:
Ponzi Scheme Detection in Smart Contracts Using Heterogeneous Semantic Graph  6th
Ponzi Scheme Detection in Smart Contracts Using Heterogeneo...
收藏 引用
6th International Conference on Blockchain and Trustworthy Systems, BlockSys 2024
作者: Chen, Wei Jiang, Xinjun Lan, Tian Liu, Leyuan Li, Chengyu Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Chengdu610000 China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu610000 China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu610000 China Shenzhen Institute for Advanced Study University of Electronic Science and Technology of China Shenzhen518000 China
Behind the booming decentralized finance (DeFi) ecosystem driven by blockchain technology, various financial risks lurking, including money laundering, gambling, Ponzi schemes, and phishing. Due to the decentralizatio... 详细信息
来源: 评论
The Power of Bamboo: On the Post-Compromise security for Searchable Symmetric Encryption
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Tianyang Xu, Peng Picek, Stjepan Luo, Bo Susilo, Willy Jin, Hai Liang, Kaitai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China Cluster and Grid Computing Lab School of Computer Science and Technology China Huazhong University of Science and Technology Wuhan430074 China Digital Security Group Radboud University Nijmegen Netherlands Department of EECS Institute of Information Sciences The University of Kansas LawrenceKS United States Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong WollongongNSW2522 Australia Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft2628 CD Netherlands
Dynamic searchable symmetric encryption (DSSE) enables users to delegate the keyword search over dynamically updated encrypted databases to an honest-but-curious server without losing keyword privacy. This paper studi... 详细信息
来源: 评论
A Cross-Domain Secure Deduplication Scheme Based on Threshold Blind Signature  9th
A Cross-Domain Secure Deduplication Scheme Based on Threshol...
收藏 引用
9th International Conference on Mobile Wireless Middleware, Operating Systems and Applications, MOBILWARE 2020
作者: Du, Jinlei Deng, Jide Qi, Hui Di, Xiaoqiang Jiang, Zhengang Jilin Key Laboratory of Network and Information Security Changchun University of Science and Technology Changchun China School of Computer Science and Technology Changchun University of Science and Technology Changchun China
In the cloud storage environment, client-side deduplication can perform file repetitive detection locally. However, client-side deduplication still faces many security challenges. First, if the file hash value is used... 详细信息
来源: 评论
FedPHE: A Secure and Efficient Federated Learning via Packed Homomorphic Encryption
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Li, Yuqing Yan, Nan Chen, Jing Wang, Xiong Hong, Jianan He, Kun Wang, Wei Li, Bo Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan430072 China Wuhan University RiZhao Information Technology Institute Rizhao276800 China Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan430074 China Shanghai Jiao Tong University School of Cyber Science and Engineering Shanghai200240 China Hong Kong University of Science and Technology Department of Computer Science and Engineering Hong Kong
Cross-silo federated learning (FL) enables multiple institutions (clients) to collaboratively build a global model without sharing private data. To prevent privacy leakage during aggregation, homomorphic encryption (H... 详细信息
来源: 评论
Mask Approximation Net: A Novel Diffusion Model Approach for Remote Sensing Change Captioning
arXiv
收藏 引用
arXiv 2024年
作者: Sun, Dongwei Yao, Jing Zhou, Changsheng Cao, Xiangyong Ghamisi, Pedram School of Computer Science and Technology the Ministry of Education Key Lab for Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an710049 China Aerospace Information Research Institute Chinese Academy of Sciences Beijing100094 China School of Mathematics and Statistics Guangdong University of Technology Guangzhou China Helmholtz-Zentrum Dresden-Rossendorf Freiberg09599 Germany Lancaster Environment Centre Lancaster University LancasterLA1 4YR United Kingdom
Remote sensing image change description represents an innovative multimodal task within the realm of remote sensing processing. This task not only facilitates the detection of alterations in surface conditions, but al... 详细信息
来源: 评论
A Hybrid Blockchain-Based Identity Authentication Scheme for Mobile Crowd Sensing
SSRN
收藏 引用
SSRN 2022年
作者: Taochun, Wang Huimin, Shen Jian, Chen Fulong, Chen Qingshan, Wu Dong, Xie School of Computer and Information Anhui Normal University Wuhu241002 China Anhui Engineering Research Centers of Medical Big Data Intelligent System Anhui Normal University Wuhu241002 China Anhui Key Laboratory of Network and Information Security Anhui Normal University Wuhu241002 China
With the continuous innovation and popularization of mobile smart devices, the application of Mobile Crowd Sensing (MCS) has been widely studied. However, the existing centralized MCS applications that use servers for... 详细信息
来源: 评论
Not All Diffusion Model Activations Have Been Evaluated as Discriminative Features
arXiv
收藏 引用
arXiv 2024年
作者: Meng, Benyuan Xu, Qianqian Wang, Zitai Cao, Xiaochun Huang, Qingming Institute of Information Engineering CAS China School of Cyber Security University of Chinese Academy of Sciences China Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS China Peng Cheng Laboratory China School of Cyber Science and Tech. Shenzhen Campus of Sun Yat-sen University China School of Computer Science and Tech. University of Chinese Academy of Sciences China Key Laboratory of Big Data Mining and Knowledge Management CAS China
Diffusion models are initially designed for image generation. Recent research shows that the internal signals within their backbones, named activations, can also serve as dense features for various discriminative task... 详细信息
来源: 评论
Mind the Gap: Towards Generalizable Autonomous Penetration Testing via Domain Randomization and Meta-Reinforcement Learning
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Shicheng Liu, Jingju Lu, Yuliang Yang, Jiahai Zhang, Yue Chen, Jie College of Electronic Engineering National University of Defense Technology Hefei230037 China Key Laboratory of Cyberspace Security Situation Awareness and Evaluation Anhui Province Hefei230037 China Institute for Network Sciences and Cyberspace The Beijing National Research Center for Information Science and Technology Tsinghua University Beijing10084 China College of Computer Science and Technology National University of Defense Technology Changsha410073 China
With increasing numbers of vulnerabilities exposed on the internet, autonomous penetration testing (pentesting) has emerged as a promising research area. Reinforcement learning (RL) is a natural fit for studying this ... 详细信息
来源: 评论
Safety Guaranteed Power-Delivered-to-Load Maximization for Magnetic Wireless Power Transfer
Safety Guaranteed Power-Delivered-to-Load Maximization for M...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: Wangqiu Zhou Xinyu Wang Hao Zhou Shenyao Jiang Zhi Liu Yusheng Ji LINKE Lab School of Computer Science and Technology University of Science and Technology of China CAS Key Laboratory of Wireless-Optical Communications University of Science and Technology of China Deqing Alpha Innovation Institute Huzhou China Department of Computer and Network Engineering The University of Electro-Communications Tokyo Japan Information Systems Architecture Science Research Division National Institute of Informatics Tokyo Japan
Electromagnetic radiation (EMR) safety has always been a critical reason for hindering the development of magneticenabled wireless power transfer technology. People focus on the actual received energy at charging devi... 详细信息
来源: 评论
Collaborative Authentication for 6G networks: An Edge Intelligence based Autonomous Approach
arXiv
收藏 引用
arXiv 2023年
作者: Fang, He Xiao, Zhenlong Wang, Xianbin Xu, Li Hanzo, Lajos The School of Electronic and Information Engineering Soochow University Soochow215301 China The Department of Informatics and Communication Engineering School of Informatics Xiamen University Xiamen361005 China The Department of Electrical and Computer Engineering Western University LondonONN6A 5B9 Canada The College of Computer and Cyber Security The Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Normal University Fuzhou350117 China School of Electronics and Computer Science University of Southampton SO17 1BJ United Kingdom
The conventional device authentication of wireless networks usually relies on a security server and centralized process, leading to long latency and risk of single-point of failure. While these challenges might be mit... 详细信息
来源: 评论