咨询与建议

限定检索结果

文献类型

  • 1,677 篇 会议
  • 1,155 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,836 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,891 篇 工学
    • 1,442 篇 计算机科学与技术...
    • 1,155 篇 软件工程
    • 516 篇 信息与通信工程
    • 215 篇 控制科学与工程
    • 214 篇 电气工程
    • 171 篇 生物工程
    • 164 篇 电子科学与技术(可...
    • 154 篇 网络空间安全
    • 126 篇 机械工程
    • 72 篇 光学工程
    • 72 篇 仪器科学与技术
    • 71 篇 生物医学工程(可授...
    • 58 篇 安全科学与工程
    • 54 篇 交通运输工程
    • 42 篇 化学工程与技术
    • 41 篇 动力工程及工程热...
  • 807 篇 理学
    • 511 篇 数学
    • 181 篇 生物学
    • 153 篇 物理学
    • 148 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 44 篇 化学
  • 467 篇 管理学
    • 281 篇 管理科学与工程(可...
    • 210 篇 图书情报与档案管...
    • 90 篇 工商管理
  • 102 篇 法学
    • 60 篇 社会学
    • 44 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 31 篇 军事学
  • 18 篇 农学
  • 12 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 126 篇 feature extracti...
  • 104 篇 semantics
  • 88 篇 accuracy
  • 85 篇 training
  • 77 篇 cryptography
  • 75 篇 computational mo...
  • 68 篇 authentication
  • 66 篇 security
  • 65 篇 federated learni...
  • 62 篇 privacy
  • 61 篇 deep learning
  • 55 篇 data models
  • 48 篇 object detection
  • 47 篇 protocols
  • 45 篇 information secu...
  • 42 篇 neural networks
  • 38 篇 robustness
  • 37 篇 visualization
  • 36 篇 convolution
  • 36 篇 optimization

机构

  • 228 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 56 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 52 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 38 篇 shandong provinc...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 28 篇 college of compu...
  • 28 篇 qilu university ...
  • 28 篇 college of compu...
  • 27 篇 shandong provinc...
  • 26 篇 pca lab key lab ...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 72 篇 yang jian
  • 31 篇 jian yang
  • 30 篇 meng deyu
  • 27 篇 xu li
  • 25 篇 jianfeng ma
  • 23 篇 ma jianfeng
  • 23 篇 xie jin
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 li xianxian
  • 20 篇 xiaoming wu
  • 20 篇 li hui
  • 20 篇 liu ximeng
  • 19 篇 zhixin li
  • 18 篇 xianxian li
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 17 篇 li zhixin
  • 16 篇 zhang yuqing

语言

  • 2,567 篇 英文
  • 176 篇 其他
  • 97 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2836 条 记 录,以下是361-370 订阅
排序:
Dynamic detection technology of encryption algorithm based on Pin
Dynamic detection technology of encryption algorithm based o...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Junpeng Qu Gaolei Du Yunge Sun Yong Fu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Quan Cheng Laboratory Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
Aiming at the problem that malicious software uses encryption algorithm to hide its own malicious code and avoid detection, a dynamic detection technology based on Pin encryption algorithm is proposed. Use Pin to get ... 详细信息
来源: 评论
An Encryption Algorithm Cycle Identification Method Based on Bit Execution
An Encryption Algorithm Cycle Identification Method Based on...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Yunge Sun Gaolei Du Junpeng Qu Yong Fu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology(Shandong Academy of Sciences) Jinan China Quan Cheng Laboratory Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
Ransomware uses symmetric encryption algorithms to lock user files to extort money. This paper proposes a cryptographic algorithm loop identification method based on bit-precise execution, aiming to solve the problem ... 详细信息
来源: 评论
An Interactive Attention Mechanism Fusion network for Aspect-Based Multimodal Sentiment Analysis
An Interactive Attention Mechanism Fusion Network for Aspect...
收藏 引用
2023 International Conference on Machine Learning and Cybernetics, ICMLC 2023
作者: Wang, Jinghong Gao, Yuan Li, Haokang College of Computer and Cyber Security Hebei Normal University Shijiazhuang050024 China Hebei Normal University Hebei Key Laboratory of Network and Information Security Shijiazhuang050024 China Hebei Normal University Hebei Provincial Engineering Research Center for Supply Chain Big Data Analytics & Data Security Shijiazhuang050024 China Hebei Polytechnic Institute College of Artificial Intelligence and Big Data Shijiazhuang050000 China
The goal of aspect-based multimodal sentiment analysis (ABMSA) is to classify the sentiment associated with aspect words in a given context. Most current ABMSA models focus only on general inter-modal information inte... 详细信息
来源: 评论
Data-Driven Active Power Dispatch for Wind Farms  13
Data-Driven Active Power Dispatch for Wind Farms
收藏 引用
13th IEEE Data Driven Control and Learning Systems Conference, DDCLS 2024
作者: Jiao, Xuguo Zhang, Daoyuan Wang, Xin Ma, Zhaoxing Zhang, Zhenyong Liu, Wenfeng School of Information and Control Engineering Qingdao University of Technology Qingdao266520 China College of Control Science and Engineering Zhejiang University State Key Laboratory of Industrial Control Technology Hangzhou310027 China Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Jinan250014 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan250014 China College of Computer Science and Technology Guizhou University State Key Laboratory of Public Big Data Guiyang550025 China School of Civil Engineering Qingdao University of Technology Qingdao266520 China
Active power dispatch of wind farms plays an important role in power grid scheduling. In this paper, a data-driven active power dispatch strategy for wind farms is proposed, which uses the key point of minimizing the ... 详细信息
来源: 评论
An automated construction method for symmetric encryption round function models based on dynamic analysis
An automated construction method for symmetric encryption ro...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Gaolei Du Yunge Sun Junpeng Qu Yong Fu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Quan Cheng Laboratory Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
With the deepening of informatization, the incidence of cybercrimes utilizing malicious software for attacks is on the rise. This paper addresses the detection issue of symmetric encryption in malicious software from ... 详细信息
来源: 评论
Electric Energy Trading Mechanism of Distributed Electric Vehicles in Smart Grid  38
Electric Energy Trading Mechanism of Distributed Electric Ve...
收藏 引用
38th Youth Academic Annual Conference of Chinese Association of Automation, YAC 2023
作者: Hu, Chunlin An, Dou Xi'an Jiaotong University Faculty of Electronic and Information Engineering Xian710049 China Xi'an Jiaotong University Fac. of Electron. and Info. Eng. and the Moe Key Lab. for Intelligent Networks and Network Security Xian710049 China
With the continuous development of the smart grid and the increasing number of electric vehicles (EVs), the power transaction in the smart grid has become increasingly important in our daily life. This paper studies t... 详细信息
来源: 评论
$k$k-TEVS: A $ k$k-Times E-Voting Scheme on Blockchain With Supervision
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2024年 第3期22卷 2326-2337页
作者: Yang Liu Debiao He Min Luo Lianhai Wang Cong Peng School of Cyber Science and Engineering Wuhan University Wuhan China Institute of Information Technology Shenzhen Institute of Information Technology Shenzhen China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shanghai Technology Innovation Centre of Distributed Privacy-Preserving Artificial Intelligence Matrix Elements Technologies Shanghai China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
The e-vote is regarded as a way to express the opinion that the voters ask for. Actually, the e-vote could be applied wildly like questionnaire, survey and feedback. Moreover, the coexistences of efficiency and securi... 详细信息
来源: 评论
LDVNet: Lightweight and Detail-Aware Vision network for Image Recognition Tasks in Resource-Constrained Environments  29
LDVNet: Lightweight and Detail-Aware Vision Network for Imag...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Liu, Yuchen Liang, Hu Qiu, Ran Zhao, Shengrong Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Qilu University of Technology Shandong Academy of Sciences Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
In many underwater application scenarios, recognition tasks need to be executed promptly on computationally limited platforms. However, models designed for this field often exhibit spatial locality, and existing works... 详细信息
来源: 评论
Benchmarking Temporal Reasoning and Alignment Across Chinese Dynasties
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Zhenglin Wu, Jialong Li, Pengfei Jiang, Yong Zhou, Deyu School of Computer Science and Engineering Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University China Tongyi Lab Alibaba Group China
Temporal reasoning is fundamental to human cognition and is crucial for various real-world applications. While recent advances in Large Language Models have demonstrated promising capabilities in temporal reasoning, e... 详细信息
来源: 评论
Responding to News Sensitively in Stock Attention networks via Prompt-Adaptive Trimodal Model
收藏 引用
IEEE Transactions on Neural networks and Learning Systems 2025年 第6期36卷 10099-10113页
作者: Haotian Liu Bowen Hu Yadong Zhou Yuxun Zhou Ministry of Education Key Laboratory for Intelligent Networks and Network Security Faculty of Electronic and Information Engineering Xi’an Jiaotong University Xi’an Shaanxi China Department of Electrical Engineering and Computer Sciences University of California at Berkeley Berkeley CA USA
Modern quantitative finance and portfolio-based investment hinge on multimedia news and historical price trends for stock movement prediction. However, prior studies overlook the long tail effect in the feature distri... 详细信息
来源: 评论