咨询与建议

限定检索结果

文献类型

  • 1,719 篇 会议
  • 1,134 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,857 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,864 篇 工学
    • 1,414 篇 计算机科学与技术...
    • 1,137 篇 软件工程
    • 502 篇 信息与通信工程
    • 214 篇 电气工程
    • 204 篇 控制科学与工程
    • 171 篇 生物工程
    • 161 篇 电子科学与技术(可...
    • 150 篇 网络空间安全
    • 127 篇 机械工程
    • 72 篇 仪器科学与技术
    • 71 篇 光学工程
    • 70 篇 生物医学工程(可授...
    • 59 篇 安全科学与工程
    • 54 篇 交通运输工程
    • 44 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 809 篇 理学
    • 509 篇 数学
    • 181 篇 生物学
    • 157 篇 物理学
    • 148 篇 统计学(可授理学、...
    • 93 篇 系统科学
    • 46 篇 化学
  • 461 篇 管理学
    • 282 篇 管理科学与工程(可...
    • 202 篇 图书情报与档案管...
    • 92 篇 工商管理
  • 100 篇 法学
    • 60 篇 社会学
    • 42 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 36 篇 经济学
    • 36 篇 应用经济学
  • 30 篇 军事学
  • 18 篇 农学
  • 14 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 137 篇 feature extracti...
  • 114 篇 accuracy
  • 109 篇 semantics
  • 94 篇 training
  • 89 篇 federated learni...
  • 88 篇 computational mo...
  • 77 篇 cryptography
  • 70 篇 privacy
  • 69 篇 authentication
  • 68 篇 security
  • 61 篇 data models
  • 60 篇 deep learning
  • 50 篇 object detection
  • 49 篇 robustness
  • 48 篇 protocols
  • 45 篇 information secu...
  • 44 篇 neural networks
  • 44 篇 optimization
  • 41 篇 transformers
  • 41 篇 adaptation model...

机构

  • 263 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 65 篇 guangxi key lab ...
  • 65 篇 shandong provinc...
  • 57 篇 guangxi key lab ...
  • 54 篇 key lab of infor...
  • 51 篇 shandong enginee...
  • 49 篇 shandong fundame...
  • 42 篇 school of comput...
  • 39 篇 school of cyber ...
  • 32 篇 shandong provinc...
  • 30 篇 college of compu...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 27 篇 college of compu...
  • 27 篇 qilu university ...
  • 27 篇 pca lab key lab ...
  • 22 篇 peng cheng labor...
  • 22 篇 shandong fundame...

作者

  • 72 篇 yang jian
  • 31 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 24 篇 xiaoming wu
  • 24 篇 xie jin
  • 22 篇 ma jianfeng
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 liu ximeng
  • 21 篇 li xianxian
  • 20 篇 zhixin li
  • 20 篇 li hui
  • 19 篇 xianxian li
  • 18 篇 xiangzhi liu
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 16 篇 zhang yuqing

语言

  • 2,479 篇 英文
  • 298 篇 其他
  • 85 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2857 条 记 录,以下是341-350 订阅
排序:
BLDTS: Blockchain-based Lightweight Data Trusted Sharing Scheme for Internet of Vehicles
BLDTS: Blockchain-based Lightweight Data Trusted Sharing Sch...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Haoran Lin Zhongyuan Yu Guijuan Wang Anming Dong Xiang Tian School of Computer Science Qufu Normal University Rizhao China School of Information Science and Engineering Lanzhou University Lanzhou China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
Ensuring safe and reliable data sharing is crucial for the development of Internet of Vehicles (IoV) technology. To provide a trusted data environment for IoV and enable traditional consensus algorithms to meet the hi... 详细信息
来源: 评论
Precise sensitivity recognizing,privacy preserving,knowledge graph-based method for trajectory data publication
收藏 引用
Frontiers of computer Science 2022年 第4期16卷 219-221页
作者: Xianxian Li Bing Cai Li-e Wang Lei Lei Guangxi Key Lab of Multi-source Information Mining and Security Guangxi Normal UniversityGuilin541004China College of Computer Science and Information Engineering Guangxi Normal UniversityGuilin541004China Nanning Tiancheng Zhiyuan Intellectual Property Service Co.Ltd. Nanning530000China
1Introduction The existing privacy protection methods of trajectory data publication have two ***,existing methods[1-3]cannot resist attribute link attacks *** practical scenarios,it is necessary to integrate data fro... 详细信息
来源: 评论
Medical Entity Disambiguation with Medical Mention Relation and Fine-grained Entity Knowledge  30
Medical Entity Disambiguation with Medical Mention Relation ...
收藏 引用
Joint 30th International Conference on Computational Linguistics and 14th International Conference on Language Resources and Evaluation, LREC-COLING 2024
作者: Lu, Wenpeng Zhang, Guobiao Peng, Xueping Guan, Hongjiao Wang, Shoujin Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan China Australian Artificial Intelligence Institute University of Technology Sydney Sydney Australia Data Science Institute University of Technology Sydney Sydney Australia Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Medical entity disambiguation (MED) plays a crucial role in natural language processing and biomedical domains, which is the task of mapping ambiguous medical mentions to structured candidate medical entities from kno... 详细信息
来源: 评论
Multi-Relational Variational Contrastive Learning for Next POI Recommendation
Multi-Relational Variational Contrastive Learning for Next P...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Lin Chen Peipei Wang Xiaohui Han Lijuan Xu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China Quan Cheng Laboratory Jinan China
Next point-of-interest (POI) recommendation aims to predict the next interested POI to the user based on their historical check-in data in location-based social services. Most existing studies have attempted to model ... 详细信息
来源: 评论
A Multi-Channel Composite Recommendation Method in Federated Learning
A Multi-Channel Composite Recommendation Method in Federated...
收藏 引用
2023 IEEE International Conference on Dependable, Autonomic and Secure Computing, 2023 International Conference on Pervasive Intelligence and Computing, 2023 International Conference on Cloud and Big Data Computing, 2023 International Conference on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2023
作者: Chen, Shi Li, Qianmu Wang, Qi Zhao, Xinjian Ge, Hao Li, Nianzhe State Grid Jiangsu Information & Telecommunication Company Nanjing China School of Computer Science Ana Engineering Nanjing University of Science and Technology Nanjing China State Grid Smart Grid Research Institute Co. Ltd. State Grid Key Laboratory of Information & Network Security Nanjing China
There are various data security risks in power grid systems, and recommendation systems are a good solution to the selection of security strategies. Federated learning is a machine learning framework that can protect ... 详细信息
来源: 评论
FPPNet: Fast Privacy-Preserving Neural network via Three-Party Arithmetic Secret Sharing  15th
FPPNet: Fast Privacy-Preserving Neural Network via Three-Pa...
收藏 引用
15th EAI International Conference on Mobile Multimedia Communications, MobiMedia 2022
作者: Bi, Renwan Xiong, Jinbo Li, Qi Liu, Ximeng Tian, Youliang Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fujian Normal University Fuzhou350117 China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210023 China Key Laboratory of Cryptography of Zhejiang Province Hangzhou Normal University Hangzhou311121 China Key Laboratory of Information Security of Network Systems College of Mathematics and Computer Science Fuzhou University Fuzhou350108 China State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang550025 China
Jointing multi-source data for model training can improve the accuracy of neural network. To solve the raising privacy concerns caused by data sharing, data are generally encrypted and outsourced to a group of cloud s... 详细信息
来源: 评论
CRCC: Collaborative Relation Context Consistency on the Knowledge Graph for Recommender Systems  35
CRCC: Collaborative Relation Context Consistency on the Know...
收藏 引用
35th International Conference on Software Engineering and Knowledge Engineering, SEKE 2023
作者: Wang, Li-E Zeng, Huachang Li, Shenghan Li, Xianxian Zhuo, Shengda Xie, Jiahua Qu, Bin Sun, Zhigang Liu, Tianran School of Computer Science and Engineering Guangxi Normal University Guilin China Guangxi Key Lab of Multi-source Information Mining Security Guangxi Normal University Guilin China Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guangxi Normal University Guilin China College of Cyber Security of Jinan University Jinan University Guangzhou China School of Information Science and Engineering Yunnan University Kunming China
Knowledge graph (KG) as auxiliary information can solve the cold-start and data sparsity problems of recommender systems. However, most existing KG-based recommendation methods focus on how to effectively encode items... 详细信息
来源: 评论
Integration of MPC into Besu through an extended private transaction model
Integration of MPC into Besu through an extended private tra...
收藏 引用
Metaverse Computing, networking and Applications (MetaCom), IEEE International Conference on
作者: Daniel Morales Isaac Agudo Javier Lopez Department of Computer Science Network Information and Computer Security Lab ITIS Software Universidad de Málaga Málaga Spain
In the last few years we have seen many different approaches to incorporate privacy features to blockchains. In the area of cryptocurrencies that would normally mean protecting the identity of the owner of some funds,...
来源: 评论
CustomFair: A Customized Fairness Method for Federated Recommender Systems in Social Internet of Things
收藏 引用
IEEE Internet of Things Journal 2024年
作者: Chen, Guorong Li, Chao Du, Fei Yuan, Xiaohan Chi, Cheng Yin, Zihang Wang, Bin Li, Tao Bao, Xuhua Wang, Wei Beijing Jiaotong University Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing100044 China China Academy of Information and Communications Technology Beijing China Network and Data Security Hangzhou310053 China Nankai University College of Computer Science Tianjin300350 China LTD Sangfor Technologies Co Beijing China Xi'an Jiaotong University Ministry of Education Key Lab for Intelligent Networks and Network Security Xi'an China
In the Social Internet of Things (SIoT), edge computing integrates artificial intelligence to learn intricate relationships. The scale and complexity of SIoT cause a data explosion from diverse objects, hindering tail... 详细信息
来源: 评论
Civil Engineering Design in IoT: Leveraging Improved Swarm Intelligence Optimization  17
Civil Engineering Design in IoT: Leveraging Improved Swarm I...
收藏 引用
IEEE Congress on Cybermatics: 17th IEEE International Conference on Internet of Things, iThings 2024, 20th IEEE International Conference on Green Computing and Communications, GreenCom 2024, 17th IEEE International Conference on Cyber, Physical and Social Computing, CPSCom 2024, 10th IEEE International Conference on Smart Data, SmartData 2024
作者: Fu, Weiheng Chen, Rongzhong Chen, Kaiwen Xie, Xiaojun Fuzhou University College of Computer and Data Science Fuzhou China Xiamen Meteorological Bureau Xiamen Key Laboratory of Straits Meteorology Xiamen China Florida Transportarion Engineeeing Inc Roadway Design Department Punta Gorda United States Fuzhou University Zhicheng College Office of Network Security and Information Fuzhou China
Nowadays, swarm intelligence algorithms are used to solve various problem in IoT environments because of their excellent performance, and the particle swarm algorithm(PSO) is a superior algorithm in swarm intelligence... 详细信息
来源: 评论