咨询与建议

限定检索结果

文献类型

  • 1,677 篇 会议
  • 1,155 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,836 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,891 篇 工学
    • 1,442 篇 计算机科学与技术...
    • 1,155 篇 软件工程
    • 516 篇 信息与通信工程
    • 215 篇 控制科学与工程
    • 214 篇 电气工程
    • 171 篇 生物工程
    • 164 篇 电子科学与技术(可...
    • 154 篇 网络空间安全
    • 126 篇 机械工程
    • 72 篇 光学工程
    • 72 篇 仪器科学与技术
    • 71 篇 生物医学工程(可授...
    • 58 篇 安全科学与工程
    • 54 篇 交通运输工程
    • 42 篇 化学工程与技术
    • 41 篇 动力工程及工程热...
  • 807 篇 理学
    • 511 篇 数学
    • 181 篇 生物学
    • 153 篇 物理学
    • 148 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 44 篇 化学
  • 467 篇 管理学
    • 281 篇 管理科学与工程(可...
    • 210 篇 图书情报与档案管...
    • 90 篇 工商管理
  • 102 篇 法学
    • 60 篇 社会学
    • 44 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 31 篇 军事学
  • 18 篇 农学
  • 12 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 126 篇 feature extracti...
  • 104 篇 semantics
  • 88 篇 accuracy
  • 85 篇 training
  • 77 篇 cryptography
  • 75 篇 computational mo...
  • 68 篇 authentication
  • 66 篇 security
  • 65 篇 federated learni...
  • 62 篇 privacy
  • 61 篇 deep learning
  • 55 篇 data models
  • 48 篇 object detection
  • 47 篇 protocols
  • 45 篇 information secu...
  • 42 篇 neural networks
  • 38 篇 robustness
  • 37 篇 visualization
  • 36 篇 convolution
  • 36 篇 optimization

机构

  • 228 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 56 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 52 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 38 篇 shandong provinc...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 28 篇 college of compu...
  • 28 篇 qilu university ...
  • 28 篇 college of compu...
  • 27 篇 shandong provinc...
  • 26 篇 pca lab key lab ...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 72 篇 yang jian
  • 31 篇 jian yang
  • 30 篇 meng deyu
  • 27 篇 xu li
  • 25 篇 jianfeng ma
  • 23 篇 ma jianfeng
  • 23 篇 xie jin
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 li xianxian
  • 20 篇 xiaoming wu
  • 20 篇 li hui
  • 20 篇 liu ximeng
  • 19 篇 zhixin li
  • 18 篇 xianxian li
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 17 篇 li zhixin
  • 16 篇 zhang yuqing

语言

  • 2,567 篇 英文
  • 176 篇 其他
  • 97 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2836 条 记 录,以下是181-190 订阅
排序:
Design and Implementation of security Vulnerability Sharing Platform Based on Web Crawler  11th
Design and Implementation of Security Vulnerability Sharing ...
收藏 引用
11th International Conference on computer Engineering and networks, CENet2021
作者: Wang, Zhiqiang Wang, Ziyi Wang, Zhuoyue Zhang, Zhirui Yang, Tao Beijing Electronic Science and Technology Institute Beijing100070 China State Information Center Beijing100045 China Key Lab of Information Network Security Ministry of Public Security Shanghai China
network attacks affect the security of basic network facilities and critical information systems and cause serious damage to the national security. It is vital and important to establish a platform of software and har... 详细信息
来源: 评论
Automatic Classification and Recognition of Seismic Waveforms Based on Convolutional Neural networks  2
Automatic Classification and Recognition of Seismic Waveform...
收藏 引用
2nd IEEE International Conference on networks, Multimedia and information Technology, NMITCON 2024
作者: Shan, Juhao Huang, Hanming Ministry of Education Guangxi Normal University Key Lab of Education Blockchain and Intelligent Technology China Guangxi Normal University Guangxi Key Lab of Multi-Source Information Mining and Security China Guangxi Normal University School of Computer Science and Engineering Guilin China
The development of efficient, high-precision, and universally applicable automatic waveform picking algorithms is becoming increasingly important in the era of seismic big data. The main challenge of waveform automati... 详细信息
来源: 评论
LGDB-Net: Dual-Branch Path for Building Extraction from Remote Sensing Image  30
LGDB-Net: Dual-Branch Path for Building Extraction from Remo...
收藏 引用
30th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2024
作者: Zhang, Ronghuan Zhao, Jing Li, Ming Zou, Qingzhi Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China Shandong University of Traditional Chinese Medicine School of Intelligence and Information Engineering Jinan China
Extracting buildings from remote sensing images using deep learning techniques is a widely applied and crucial task. Convolutional Neural networks (CNNs) adopt hierarchical feature representation, showcasing powerful ... 详细信息
来源: 评论
Community search over heterogeneous information networks via weighting strategy and query replacement
收藏 引用
Frontiers of computer Science 2022年 第4期16卷 231-233页
作者: Fanyi Yang Huifang Ma Weiwei Gao Zhixin Li College of Computer Science and Engineering Northwest Normal UniversityLanzhou730070China Guangxi Key Lab of Multi-source Information Mining and Security Guangxi Normal UniversityGuilin541004China
1Introduction and main contributions Recently,community search over Heterogeneous information networks(HINs)has attracted much attention in graph analysis,which aims to search for local communities containing query **... 详细信息
来源: 评论
Maximizing Area Coverage in Privacy-Preserving Worker Recruitment: A Prior Knowledge-Enhanced Geo-Indistinguishable Approach
收藏 引用
IEEE Transactions on information Forensics and security 2025年 20卷 5138-5151页
作者: Zhang, Pengfei Cheng, Xiang Zhang, Zhikun Zhu, Youwen Zhang, Ji Yunnan University of Finance and Economics Yunnan Key Laboratory of Service Computing Yunnan Kunming650221 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan250316 China Ministry of Education Key Laboratory of Equipment Data Security and Guarantee Technology Guilin541004 China Beijing University of Posts and Telecommunications Beijing100876 China Zhejiang University School of Computer Science and Technology Hangzhou310027 China Nanjing University of Aeronautics and Astronautics School of Computer Science and Technology Nanjing210016 China University of Southern Queensland School of Mathematics Physics and Computing ToowoombaQLD4350 Australia
Worker recruitment for area coverage maximization, typically requires participants to upload location information, which can deter potential participation without proper protection. While existing studies resort to ge... 详细信息
来源: 评论
Visual malware classification and detection method based on convolutional neural network  9
Visual malware classification and detection method based on ...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Huang, Hua Sheng, Hua Han, Xingwang Zhang, Wenbin Zhao, Zilin State Grid Shandong Electric Power Company Information and Telecommunications Company Jinan China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China
With the rapid development of Internet technology, leading to the evolution of malware variants, and malicious threats are also increasing. Therefore, rapid and accurate classification of malware becomes crucial. In r... 详细信息
来源: 评论
Convertible certificateless proxy re-signcryption for data access control in cloud computing
Convertible certificateless proxy re-signcryption for data a...
收藏 引用
2023 International Conference on computer Application and information security, ICCAIS 2023
作者: Wu, Chenhuang Yang, Linghui Yuan, Beibei Li, Huimin Huang, Hui Fujian Key Laboratory of Financial Information Processing Putian University Fujian Putian351100 China Fujian Zhongxin Network Security Information Technology Co. Ltd. Fujian Fuzhou350011 China School of Computer Science Minnan Normal University Fujian Zhangzhou363000 China
Cloud storage service enables users not only to save their local data storage costs but also to access their outsourced data at any time and anywhere. Traditionally, a data owner outsources the encrypted data to the c... 详细信息
来源: 评论
A two-path fiber-optic AE demodulation algorithm based on Numerically Stable Direct Least Squares Fitting of Ellipses
收藏 引用
Journal of Lightwave Technology 2025年
作者: Li, Xinhao Zhang, Faxiang Sun, Zhihui Jiang, Shaodong Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
The 3 × 3 coupler demodulation algorithm commonly employs ellipse fitting algorithms (EFAs) to eliminate coupler asymmetry. In the detection scenario of fiber-optic acoustic emission (AE) sensor arrays, the amoun... 详细信息
来源: 评论
A Fast recognition method for DVS perimeter security intrusion signals based on transfer learning
收藏 引用
Optical Fiber Technology 2025年 93卷
作者: Shen, Yongxu Wang, Chang Sun, Zhihui Zhang, Faxiang Jiang, Shaodong Liu, Xu Gao, Fengxia Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
In the perimeter security intrusion signal monitoring based on the Distributed Optical Fiber Vibration Sensing (DVS) system, the common approach for identifying intrusion signals in new scenarios is to collect large a... 详细信息
来源: 评论
Fault-tolerant identity-based encryption from SM9
收藏 引用
Science China(information Sciences) 2024年 第2期67卷 104-117页
作者: Xiaohong LIU Xinyi HUANG Zhaohui CHENG Wei WU Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber SecurityFujian Normal University Artificial Intelligence Thrust Information HubThe Hong Kong University of Science and Technology (Guangzhou) Olym Information Security Technology Ltd. Center for Applied Mathematics of Fujian Province School of Mathematics and StatisticsFujian Normal University
This paper initiates the formal study of attribute-based encryption within the framework of SM9,the Chinese National Cryptography Standard for Identity-Based Cryptography, by presenting two new faulttolerant identity-... 详细信息
来源: 评论