咨询与建议

限定检索结果

文献类型

  • 1,677 篇 会议
  • 1,155 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,836 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,891 篇 工学
    • 1,442 篇 计算机科学与技术...
    • 1,155 篇 软件工程
    • 516 篇 信息与通信工程
    • 215 篇 控制科学与工程
    • 214 篇 电气工程
    • 171 篇 生物工程
    • 164 篇 电子科学与技术(可...
    • 154 篇 网络空间安全
    • 126 篇 机械工程
    • 72 篇 光学工程
    • 72 篇 仪器科学与技术
    • 71 篇 生物医学工程(可授...
    • 58 篇 安全科学与工程
    • 54 篇 交通运输工程
    • 42 篇 化学工程与技术
    • 41 篇 动力工程及工程热...
  • 807 篇 理学
    • 511 篇 数学
    • 181 篇 生物学
    • 153 篇 物理学
    • 148 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 44 篇 化学
  • 467 篇 管理学
    • 281 篇 管理科学与工程(可...
    • 210 篇 图书情报与档案管...
    • 90 篇 工商管理
  • 102 篇 法学
    • 60 篇 社会学
    • 44 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 31 篇 军事学
  • 18 篇 农学
  • 12 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 126 篇 feature extracti...
  • 104 篇 semantics
  • 88 篇 accuracy
  • 85 篇 training
  • 77 篇 cryptography
  • 75 篇 computational mo...
  • 68 篇 authentication
  • 66 篇 security
  • 65 篇 federated learni...
  • 62 篇 privacy
  • 61 篇 deep learning
  • 55 篇 data models
  • 48 篇 object detection
  • 47 篇 protocols
  • 45 篇 information secu...
  • 42 篇 neural networks
  • 38 篇 robustness
  • 37 篇 visualization
  • 36 篇 convolution
  • 36 篇 optimization

机构

  • 228 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 56 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 52 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 38 篇 shandong provinc...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 28 篇 college of compu...
  • 28 篇 qilu university ...
  • 28 篇 college of compu...
  • 27 篇 shandong provinc...
  • 26 篇 pca lab key lab ...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 72 篇 yang jian
  • 31 篇 jian yang
  • 30 篇 meng deyu
  • 27 篇 xu li
  • 25 篇 jianfeng ma
  • 23 篇 ma jianfeng
  • 23 篇 xie jin
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 li xianxian
  • 20 篇 xiaoming wu
  • 20 篇 li hui
  • 20 篇 liu ximeng
  • 19 篇 zhixin li
  • 18 篇 xianxian li
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 17 篇 li zhixin
  • 16 篇 zhang yuqing

语言

  • 2,567 篇 英文
  • 176 篇 其他
  • 97 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2836 条 记 录,以下是151-160 订阅
排序:
MTRNet: An Efficient Hybrid network Model for Surface Defect Detection of Sheet Metal  36
MTRNet: An Efficient Hybrid Network Model for Surface Defect...
收藏 引用
36th International Conference on Software Engineering and Knowledge Engineering, SEKE 2024
作者: Hao, Huijuan Zhu, Sijian Chen, Yu Yi, Changle Zhao, Hongge Feng, Yue Yang, Rong Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Addressing the challenges posed by the insufficient computational power of low-spec devices to achieve the inference efficiency of prevailing deep learning models, alongside the variability in type and shape within in... 详细信息
来源: 评论
LESaET: Low-Dimensional Embedding Method for Link Prediction Combining Self-Attention and Enhanced-TuckER
LESaET: Low-Dimensional Embedding Method for Link Prediction...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Ding, Lichao Zhao, Jing Lu, Kai Hao, Zenghao Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Knowledge graphs (KGs) provide a structured representation of the real world through entity-relation triples. However, current KGs are often incomplete, typically containing only a small fraction of all possible facts... 详细信息
来源: 评论
A Lightweight IoT Malware Detection and Family Classification Method
收藏 引用
Journal of computer and Communications 2024年 第4期12卷 201-227页
作者: Changguang Wang Ziqi Ma Qingru Li Dongmei Zhao Fangwei Wang College of Computer and Cyber Security Hebei Normal University Shijiazhuang China Key Laboratory of Network and Information Security of Hebei Province Hebei Normal University Shijiazhuang China
A lightweight malware detection and family classification system for the Internet of Things (IoT) was designed to solve the difficulty of deploying defense models caused by the limited computing and storage resources ... 详细信息
来源: 评论
Research on the Application of Digital Signature in University Electronic Government System  6
Research on the Application of Digital Signature in Universi...
收藏 引用
6th International Conference on computer network, Electronic and Automation, ICCNEA 2023
作者: Wang, Tianma Zhao, Dongmei Qi, Jianjun North China Electric Power University International Education Institute Beijing China Hebei Normal University College of Computer and Cyber Security Shijiazhuang China Key Laboratory of Network and Information Security in Hebei Province Shijiazhuang China
This article analyzes the principles and processes of digital signature technology, as well as its application methods in the university e-government system. On the one hand, it meets the business management needs of ... 详细信息
来源: 评论
Feature Aggregation network for Memory-Based Industrial Anomaly Detection  9
Feature Aggregation Network for Memory-Based Industrial Anom...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Li, Min Han, Delong Shao, Rui He, Jinghui City University of Macau Faculty of Data Science China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
In the process of large-scale industrial production, complex defects of different shapes and sizes can occur in industrial products and their components, and these defects seriously affect the performance of industria... 详细信息
来源: 评论
High-Level security Dimension Evaluation of Blockchain BaaS System and key Technology
收藏 引用
China Communications 2024年 第6期21卷 176-191页
作者: Chen Wanfa Zheng Qing’an Chen Shuzhen Fu Hongyi Chen Liang Fujian Police College Fuzhou 350007China Computer Science and Information Security Management Department Fujian Police CollegeFuzhou 350007China Fujian Province Key Laboratory for Digital Network Crime Supervision and Prevention Fuzhou 350007China Beijing University of Posts and Telecommunications Beijing 100876China Fujian Provincial Prison Administration Fuzhou 350002China
In recent years,blockchain technology integration and application has gradually become an important driving force for new technological innovation and industrial *** blockchain technology and applications are developi... 详细信息
来源: 评论
network Intrusion Detection in Internet of Blended Environment Using Ensemble of Heterogeneous Autoencoders(E-HAE)
收藏 引用
computer Systems Science & Engineering 2023年 第9期46卷 3261-3284页
作者: Lelisa Adeba Jilcha Deuk-Hun Kim Julian Jang-Jaccard Jin Kwak ISAA Lab. Department of AI Convergence NetworkAjou UniversitySuwon16499Korea ISAA Lab. Institute for Information and CommunicationAjou UniversitySuwon16499Korea Department of Computer Science and Information Technology Massey UniversityAuckland0745New Zealand Department of Cyber Security Ajou UniversitySuwon16499Korea
Contemporary attackers,mainly motivated by financial gain,consistently devise sophisticated penetration techniques to access important information or *** growing use of Internet of Things(IoT)technology in the contemp... 详细信息
来源: 评论
BAV-DSS: Blockchain Assisted Verifiable Data Sharing Scheme with Fast Encryption and Outsourced Decryption for IoT  24th
BAV-DSS: Blockchain Assisted Verifiable Data Sharing Scheme ...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Huang, Yao Yu, Zhongyuan Wang, Guijuan Chai, Baobao Zhang, Hongliang Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan250353 China School of Information Science and Engineering Lanzhou University Lanzhou730000 China School of Computer Science and Engineering Shandong University of Science and Technology Qingdao266590 China
Many sophisticated cloud platforms are available to provide services such as storage and computation for Internet of Things (IoT) applications. However, with the concerns about the semi-trusted nature of cloud platfor... 详细信息
来源: 评论
A firmware upgrade solution based on hardware unique ID and SM4 cryptographic algorithm
A firmware upgrade solution based on hardware unique ID and ...
收藏 引用
2023 International Conference on computer Graphics, Artificial Intelligence, and Data Processing, ICCAID 2023
作者: Gao, Shaofeng Wang, Kun Chen, Xinze Fu, Yong Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan250000 China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan250000 China
This article presents and implements a firmware upgrade solution for embedded systems, which aims to address the vulnerability of using the same file that can be easily copied or stolen. When upgrading firmware, a txt... 详细信息
来源: 评论
Violence Video Detection Based on Multi-modal Fusion and Dual Channel Contrastive Learning
Violence Video Detection Based on Multi-modal Fusion and Dua...
收藏 引用
2023 Human-Centered Cognitive Systems, HCCS 2023
作者: Li, Huan Bai, Zhijian Li, Yue Qin, Tao Xi'an Jiaotong University Faculty of Electronic and Information Engineering Xi'an China Xi'an Jiaotong University Moe Key Lab for Intelligent Networks and Network Security Xi'an China
There are more and more violence videos propagated on the Internet, it is important to detect them to provide support for online social network management. In the traditional detection methods, the utilization of diff... 详细信息
来源: 评论