咨询与建议

限定检索结果

文献类型

  • 4,432 篇 会议
  • 3,329 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,769 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,212 篇 工学
    • 3,916 篇 计算机科学与技术...
    • 3,130 篇 软件工程
    • 1,329 篇 信息与通信工程
    • 645 篇 电气工程
    • 541 篇 控制科学与工程
    • 523 篇 电子科学与技术(可...
    • 442 篇 网络空间安全
    • 439 篇 生物工程
    • 298 篇 机械工程
    • 230 篇 光学工程
    • 224 篇 仪器科学与技术
    • 188 篇 生物医学工程(可授...
    • 162 篇 安全科学与工程
    • 148 篇 动力工程及工程热...
    • 144 篇 化学工程与技术
    • 126 篇 建筑学
    • 124 篇 交通运输工程
  • 2,279 篇 理学
    • 1,360 篇 数学
    • 498 篇 物理学
    • 475 篇 生物学
    • 420 篇 统计学(可授理学、...
    • 208 篇 系统科学
    • 165 篇 化学
  • 1,326 篇 管理学
    • 809 篇 管理科学与工程(可...
    • 573 篇 图书情报与档案管...
    • 289 篇 工商管理
  • 287 篇 法学
    • 167 篇 社会学
    • 118 篇 法学
  • 153 篇 医学
    • 126 篇 临床医学
  • 116 篇 经济学
    • 116 篇 应用经济学
  • 98 篇 军事学
  • 53 篇 农学
  • 42 篇 教育学
  • 24 篇 文学
  • 22 篇 艺术学

主题

  • 237 篇 feature extracti...
  • 227 篇 semantics
  • 216 篇 cryptography
  • 182 篇 authentication
  • 181 篇 information secu...
  • 161 篇 computational mo...
  • 157 篇 security
  • 150 篇 protocols
  • 142 篇 accuracy
  • 141 篇 privacy
  • 139 篇 deep learning
  • 125 篇 training
  • 122 篇 laboratories
  • 105 篇 data models
  • 99 篇 federated learni...
  • 99 篇 cloud computing
  • 94 篇 servers
  • 93 篇 blockchain
  • 92 篇 public key crypt...
  • 88 篇 data privacy

机构

  • 202 篇 shandong provinc...
  • 173 篇 key laboratory o...
  • 158 篇 school of comput...
  • 156 篇 state key labora...
  • 113 篇 school of comput...
  • 106 篇 department of co...
  • 106 篇 school of cyber ...
  • 97 篇 information secu...
  • 80 篇 key laboratory o...
  • 78 篇 institute of inf...
  • 69 篇 guangdong provin...
  • 65 篇 college of mathe...
  • 65 篇 state grid key l...
  • 64 篇 computer network...
  • 64 篇 university of ch...
  • 60 篇 key laboratory o...
  • 60 篇 peng cheng labor...
  • 59 篇 school of softwa...
  • 59 篇 school of comput...
  • 54 篇 key laboratory o...

作者

  • 55 篇 jianfeng ma
  • 53 篇 yang yang
  • 48 篇 ma jianfeng
  • 45 篇 yixian yang
  • 42 篇 ding yong
  • 41 篇 zheng wei-shi
  • 38 篇 huang qingming
  • 31 篇 cong runmin
  • 31 篇 zhang huanguo
  • 31 篇 xu an wang
  • 31 篇 hu yupu
  • 31 篇 yang yixian
  • 30 篇 wang wei
  • 28 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 26 篇 xu li
  • 26 篇 xie xiaohua
  • 24 篇 xinhong hei
  • 23 篇 liu xin

语言

  • 7,157 篇 英文
  • 349 篇 其他
  • 278 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory Computer Network and Information Security"
7769 条 记 录,以下是111-120 订阅
排序:
IoV Edge Data Integrity Audit Method Based on Blockchain  3
IoV Edge Data Integrity Audit Method Based on Blockchain
收藏 引用
3rd International Conference on Blockchain Technology and information security, ICBCTIS 2023
作者: Qi, Hui Li, Hang Yu, Wangdong Wang, Chunbo Jilin Key Laboratory of Network and Information Security Changchun University of Science and Technology Changchun China Jilin Key Laboratory of Network and Information Security Changchun University of Science and Technology School of Information Technology Changchun Automobile Industry Institute Changchun China
With the quick development of Internet of Vehicles (IoV) technology, a lot of private data of vehicle users has been generated. An increasing amount of vehicle data is being collected in the cloud storage providers (C... 详细信息
来源: 评论
A HEVC Video Steganalysis Method Using the Optimality of Motion Vector Prediction
收藏 引用
computers, Materials & Continua 2024年 第5期79卷 2085-2103页
作者: Jun Li Minqing Zhang Ke Niu Yingnan Zhang Xiaoyuan Yang College of Cryptography Engineering Engineering University of the Chinese People’s Armed Police ForceXi’an710086China Key Laboratory of Network and Information Security of the Chinese People’s Armed Police Force Xi’an710086China
Among steganalysis techniques,detection against MV(motion vector)domain-based video steganography in the HEVC(High Efficiency Video Coding)standard remains a challenging *** the purpose of improving the detection perf... 详细信息
来源: 评论
An Adaptive Image Compression Algorithm Based on Deep Learning  6
An Adaptive Image Compression Algorithm Based on Deep Learni...
收藏 引用
6th International Conference on Artificial Intelligence and Pattern Recognition, AIPR 2023
作者: Liang, Yanxia Zhao, Meng Lu, Guangyue Jiang, Jing He, Hua Jia, Tong Shaanxi Key Laboratory of Information Communication Network and Security Xi'an University of Posts and Telecommunications China
In recent years, deep artificial neural networks have received wide attention because it surpasses the effect of traditional methods by parameter fitting under the condition of data convergence. On the other hand, lim... 详细信息
来源: 评论
Reversible Data Hiding Algorithm in Encrypted Domain Based on Matrix Secret Sharing  5
Reversible Data Hiding Algorithm in Encrypted Domain Based o...
收藏 引用
5th International Conference on Electronics and Communication, network and computer Technology, ECNCT 2023
作者: Jiang, Zongbao Zhang, Minqing Ke, Yan Jiang, Chao University of PAP Key Laboratory of Network and Information Security of PAP Engineering Xi'an710086 China
Focused on the problems of user privacy disclosure and ciphertext data management in cloud service environment, this paper proposes a reversible data hiding algorithm in encrypted domain based on matrix secret sharing... 详细信息
来源: 评论
Privacy Preserving Demand Side Management Method via Multi-Agent Reinforcement Learning
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2023年 第10期10卷 1984-1999页
作者: Feiye Zhang Qingyu Yang Dou An Faculty of Electronic and Information Engineering Xi’an Jiaotong UniversityXi’an 710049China Key Laboratory for Manufacturing Systems Engineering(SKLMSE) Xi’an Jiaotong UniversityXi’an 710049 MOE Key Laboratory for Intelligent Networks and Network Security Xi’an Jiaotong UniversityXi’an 710049China
The smart grid utilizes the demand side management technology to motivate energy users towards cutting demand during peak power consumption periods, which greatly improves the operation efficiency of the power grid. H... 详细信息
来源: 评论
A Throughput and Priority Optimization Strategy for High Density Healthcare IoT
收藏 引用
Intelligent and Converged networks 2025年 第1期6卷 41-52页
作者: Su, Zhenlang Ren, Junyu Huang, Yeheng Liao, Yang Qin, Tuanfa School of Computer Electronic and Information Guangxi University Nanning530004 China School of Physics and Electronic Information Guangxi Minzu University Nanning530006 China School of Computer Electronic and Information Guangxi University Guangxi Key Laboratory of Multimedia Communications and Network Technology Nanning530004 China
In the field of wireless body area networks (WBANs), for solving the complex interference problem of inter-WBANs, a density-based adaptive optimization strategy (DAOS) is proposed in this paper. Firstly, the complex i... 详细信息
来源: 评论
PosFuzz:augmenting greybox fuzzing with effective position distribution
收藏 引用
Cybersecurity 2023年 第4期6卷 123-143页
作者: Yanyan Zou Wei Zou JiaCheng Zhao Nanyu Zhong Yu Zhang Ji Shi Wei Huo Institute of Information Engineering Chinese Academy of SciencesBeijingChina School of Cyber Security University of Chinese Academy of SciencesBeijingChina State Key Lab of Processors Institute of Computing TechnologyChinese Academy of SciencesBeijingChina Key Laboratory of Network Assessment Technology Chinese Academy of SciencesBeijingChina Beijing Key Laboratory of Network Security and Protection Technology BeijingChina Zhongguancun Laboratory BeijingChina
Mutation-based greybox fuzzing has been one of the most prevalent techniques for security vulnerability discovery and a great deal of research work has been proposed to improve both its efficiency and ***-based greybo... 详细信息
来源: 评论
Securing STAR-FC-RIS empowered integrated sensing and multiuser communications against target eavesdropping
收藏 引用
Science China(information Sciences) 2024年 第11期67卷 335-346页
作者: Shuying LIN Yulong ZOU Fu XIAO Bin LI School of Telecommunications and Information Engineering Nanjing University of Posts and Telecommunications School of Computer Science Nanjing University of Posts and Telecommunications Key Laboratory of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications
This paper investigates a simultaneous-transmitting-and-reflecting fully-connected reconfigurable intelligent surface(STAR-FC-RIS) empowered integrated sensing and multiuser communications(ISAMC) network, where a dual... 详细信息
来源: 评论
Efficient and fine-grained access control with fully-hidden policies for cloud-enabled IoT
收藏 引用
Digital Communications and networks 2025年 第2期11卷 473-481页
作者: Qi Li Gaozhan Liu Qianqian Zhang Lidong Han Wei Chen Rui Li Jinbo Xiong School of Computer Science Nanjing University of Posts and Telecommunications Key Laboratory of Cryptography of Zhejiang Province Hangzhou Normal University Tongda College of Nanjing University of Posts and Telecommunications Henan Key Laboratory of Network Cryptography Technology School of Computer Science and Technology Xidian University State Key Laboratory of Tibetan Intelligent Information Processing and Application Qinghai Normal University Faculty of Software Fujian Normal University
Ciphertext-Policy Attribute-Based Encryption(CP-ABE) enables fine-grained access control on ciphertexts, making it a promising approach for managing data stored in the cloud-enabled Internet of Things. But existing sc... 详细信息
来源: 评论
Regularization Mixup Adversarial Training: A Defense Strategy for Membership Privacy with Model Availability Assurance  2
Regularization Mixup Adversarial Training: A Defense Strateg...
收藏 引用
2nd International Conference on Big Data and Privacy Computing, BDPC 2024
作者: Ding, Zehua Tian, Youliang Wang, Guorong Xiong, Jinbo College of Computer Science and Technology Guizhou University State Key Laboratory of Public Big Data Guiyang China College of Computer and Cyber Security Fujian Normal University Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou China
Neural network models face two highly destructive threats in real-world applications: membership inference attacks (MIAs) and adversarial attacks (AAs). One compromises the model's confidentiality, leading to memb... 详细信息
来源: 评论