咨询与建议

限定检索结果

文献类型

  • 543 篇 会议
  • 343 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 888 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 595 篇 工学
    • 404 篇 计算机科学与技术...
    • 324 篇 软件工程
    • 191 篇 信息与通信工程
    • 95 篇 电子科学与技术(可...
    • 83 篇 控制科学与工程
    • 80 篇 电气工程
    • 52 篇 生物工程
    • 48 篇 网络空间安全
    • 40 篇 机械工程
    • 37 篇 仪器科学与技术
    • 25 篇 生物医学工程(可授...
    • 24 篇 交通运输工程
    • 21 篇 安全科学与工程
    • 17 篇 光学工程
    • 13 篇 建筑学
    • 12 篇 材料科学与工程(可...
  • 258 篇 理学
    • 147 篇 数学
    • 53 篇 生物学
    • 48 篇 物理学
    • 47 篇 统计学(可授理学、...
    • 43 篇 系统科学
    • 13 篇 化学
  • 126 篇 管理学
    • 79 篇 管理科学与工程(可...
    • 51 篇 图书情报与档案管...
    • 24 篇 工商管理
  • 29 篇 医学
    • 25 篇 临床医学
    • 19 篇 基础医学(可授医学...
  • 28 篇 法学
    • 16 篇 社会学
    • 12 篇 法学
  • 14 篇 经济学
    • 14 篇 应用经济学
  • 8 篇 军事学
  • 3 篇 农学
  • 2 篇 教育学
  • 2 篇 文学

主题

  • 41 篇 feature extracti...
  • 36 篇 federated learni...
  • 32 篇 security
  • 32 篇 accuracy
  • 31 篇 authentication
  • 27 篇 training
  • 25 篇 protocols
  • 23 篇 optimization
  • 23 篇 privacy
  • 22 篇 semantics
  • 21 篇 cryptography
  • 18 篇 computational mo...
  • 17 篇 data models
  • 17 篇 robustness
  • 17 篇 adaptation model...
  • 16 篇 deep learning
  • 15 篇 data mining
  • 14 篇 cloud computing
  • 13 篇 data privacy
  • 13 篇 wireless sensor ...

机构

  • 68 篇 shandong provinc...
  • 57 篇 key laboratory o...
  • 56 篇 key lab of infor...
  • 24 篇 shandong fundame...
  • 20 篇 beijing electron...
  • 20 篇 school of cyber ...
  • 18 篇 school of comput...
  • 18 篇 state informatio...
  • 17 篇 hubei key labora...
  • 16 篇 national enginee...
  • 16 篇 hubei engineerin...
  • 16 篇 national key lab...
  • 16 篇 school of inform...
  • 15 篇 moe key lab for ...
  • 15 篇 services computi...
  • 14 篇 cluster and grid...
  • 11 篇 key lab of infor...
  • 11 篇 ministry of publ...
  • 11 篇 school of softwa...
  • 11 篇 quan cheng labor...

作者

  • 20 篇 wang hui-ming
  • 18 篇 meng deyu
  • 16 篇 jin hai
  • 15 篇 shen yulong
  • 14 篇 hui-ming wang
  • 13 篇 tao yang
  • 13 篇 hu shengshan
  • 13 篇 zhang leo yu
  • 13 篇 wang zhiqiang
  • 11 篇 yang tao
  • 10 篇 bei pei
  • 10 篇 jun wu
  • 10 篇 zhou ziqi
  • 9 篇 zhiqiang wang
  • 9 篇 ma jianfeng
  • 9 篇 xiaoming wu
  • 9 篇 tan zuowen
  • 9 篇 li hui
  • 8 篇 cao xiangyong
  • 8 篇 jianfeng ma

语言

  • 747 篇 英文
  • 115 篇 其他
  • 29 篇 中文
  • 3 篇 斯洛文尼亚文
检索条件"机构=Key Lab of Information Security of Network System"
888 条 记 录,以下是1-10 订阅
排序:
Malicious Client Detection with Differential Privacy Constraints Based on Model Update Slicing and K-Means Clustering  6
Malicious Client Detection with Differential Privacy Constra...
收藏 引用
6th International Conference on Frontier Technologies of information and Computer, ICFTIC 2024
作者: Qi, Mengshi Wang, Xin He, Yunpeng Yang, Ming Wu, Xiaoming Key Laboratory of Computing Power Network and Information Security Jinan250014 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250014 China
Federated learning (FL) is a decentralized machine learning technique that protects data privacy by trainng models locally on devices and sharing only model updates instead of raw data. However, FL also faces multiple... 详细信息
来源: 评论
Cross-chain Transaction Tracking Protocol based on Multi-dimensional Digital Watermarking Fingerprints  6
Cross-chain Transaction Tracking Protocol based on Multi-dim...
收藏 引用
6th International Conference on Frontier Technologies of information and Computer, ICFTIC 2024
作者: Li, Duanzhen Xu, Shujiang He, Haochen Xue, Hongrui Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan250014 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250014 China
Cross-chain technology plays a critical role in the process of interconnecting blockchains. However, all attention has been focused on how to achieve efficient cross-chain interoperability protocols, thus neglecting t... 详细信息
来源: 评论
MEEG and AT-DGNN: Improving EEG Emotion Recognition with Music Introducing and Graph-based Learning
MEEG and AT-DGNN: Improving EEG Emotion Recognition with Mus...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Xiao, Minghao Zhu, Zhengxi Xie, Kang Jiang, Bin Shenzhen Research Institute Shandong University Shenzhen China Ministry of Public Security Key Lab of Information Network Security Shanghai China
We present the MEEG dataset, a multi-modal collection of music-induced electroencephalogram (EEG) recordings designed to capture emotional responses to various musical stimuli across different valence and arousal leve... 详细信息
来源: 评论
MSCACodec: A Low-Rate Neural Speech Codec With Multi-scale Residual Channel Attention  21st
MSCACodec: A Low-Rate Neural Speech Codec With Multi-scale R...
收藏 引用
21st Pacific Rim International Conference on Artificial Intelligence, PRICAI 2024
作者: Yu, Xingye Li, Ye Zhang, Peng Lin, Lingxia Cai, Tianyu Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
In the development of modern communication technology, although wideband speech coding provides high-fidelity speech transmission, its high bandwidth requirement limits its application in resource-constrained environm... 详细信息
来源: 评论
The Study of Multi-type Computing Power Trading Mechanism in Computing Power network Based on Blockchain and Combinatorial Double Auction  24
The Study of Multi-type Computing Power Trading Mechanism in...
收藏 引用
4th International Conference on Artificial Intelligence, Big Data and Algorithms, CAIBDA 2024
作者: Zhao, Yue Wang, Jizhi Kong, Lingrui Sui, Tongtong Shandong Computer Science Center National Supercomputer Center in Jinan Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Provincial Key Laboratory of Industrial Network and Information System Security Qilu University of Technology Shandong Academy of Sciences Jinan Shandong China Quancheng Laboratory Jinan Key Laboratory of Digital Security Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan Shandong China
The advancement of 5G and mobile internet technologies has propelled the development of emerging businesses and applications, demanding higher requirements for network bandwidth and computational resources. To address... 详细信息
来源: 评论
ML-SLD:A message-level stateless design for cloud-native 5G core network
收藏 引用
Digital Communications and networks 2023年 第3期9卷 743-756页
作者: Keliang Du Luhan Wang Xiangming Wen Yu Liu Haiwen Niu Shaoxin Huang Beijing Laboratory of Advanced Information Networks China Beijing Key Lab of Network System Architecture and Convergence China School of Information and Communication Engineering Beijing Univ.of Posts&TelecomBeijing100876China
The Internet of Things(IoTs)has become an essential component of the 5th Generation(5G)network and beyond,accelerating the transition to digital *** increasing signaling traffic generated by billions of IoT devices ha... 详细信息
来源: 评论
security analysis and secured access design for networks of image remote sensing
收藏 引用
Digital Communications and networks 2025年 第1期11卷 136-144页
作者: Juan Zhao Haibo Dai Xiaolong Xu Hao Yan Zheng Zhang Chunguo Li School of Network Security Jinling Institute of TechnologyNanjing 211169China School of IoT Nanjing University of Posts and Telecommunications(NJUPT)Nanjing 210003China Jiangsu Key Lab.of Big Data Security and Intelligent Processing NJUPTNanJing 210003China School of Information Science and Engineering Southeast UniversityNanjing 210096China
The secured access is studied in this paper for the network of the image remote *** sensor in this network encounters the information security when uploading information of the images wirelessly from the sensor to the... 详细信息
来源: 评论
SGNet: A Multi-Scale Method for Steel Surface Defect Detection  10
SGNet: A Multi-Scale Method for Steel Surface Defect Detecti...
收藏 引用
10th IEEE Smart World Congress, SWC 2024
作者: Liu, Shanshan Liu, Xiangzhi Man, Jiazheng Cao, Bingyang Dong, Yunfeng Wu, Xiaoming Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
The large variation in target scales within steel surface defect images often results in low detection accuracy. To address this issue, we have developed a multi-scale defect detection method named SGNet. Initially, w... 详细信息
来源: 评论
ID-YOLOv7: A Method for Steel Surface Defect Detection Combining Residual Attention and Dynamic Upsampling  10
ID-YOLOv7: A Method for Steel Surface Defect Detection Combi...
收藏 引用
10th IEEE Smart World Congress, SWC 2024
作者: Liu, Shanshan Liu, Xiangzhi Man, Jiazheng Cao, Bingyang Dong, Yunfeng Wu, Xiaoming Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
Industrial defect detection is a crucial challenge in computer vision. The accuracy of detecting defects on steel surfaces is hindered by spatially varying noise. To address this challenge, we propose an efficient met... 详细信息
来源: 评论
A Blockchain-Based Hierarchical Dynamic Collaborative Storage Model  10
A Blockchain-Based Hierarchical Dynamic Collaborative Storag...
收藏 引用
10th IEEE Smart World Congress, SWC 2024
作者: Yuan, Qile Liu, Xiangzhi Wang, Yu Dong, Yunfeng Jia, Haoyu Wu, Xiaoming Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
The pervasive application of blockchain technology has led to a significant increase in data volume, presenting significant challenges to existing storage architectures in environments characterized by large volumes o... 详细信息
来源: 评论