咨询与建议

限定检索结果

文献类型

  • 4,446 篇 会议
  • 3,330 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,784 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,204 篇 工学
    • 3,909 篇 计算机科学与技术...
    • 3,119 篇 软件工程
    • 1,328 篇 信息与通信工程
    • 638 篇 电气工程
    • 539 篇 控制科学与工程
    • 520 篇 电子科学与技术(可...
    • 441 篇 网络空间安全
    • 439 篇 生物工程
    • 298 篇 机械工程
    • 230 篇 光学工程
    • 223 篇 仪器科学与技术
    • 188 篇 生物医学工程(可授...
    • 162 篇 安全科学与工程
    • 149 篇 动力工程及工程热...
    • 145 篇 化学工程与技术
    • 125 篇 建筑学
    • 124 篇 交通运输工程
  • 2,278 篇 理学
    • 1,357 篇 数学
    • 498 篇 物理学
    • 476 篇 生物学
    • 419 篇 统计学(可授理学、...
    • 207 篇 系统科学
    • 164 篇 化学
  • 1,324 篇 管理学
    • 807 篇 管理科学与工程(可...
    • 573 篇 图书情报与档案管...
    • 289 篇 工商管理
  • 286 篇 法学
    • 167 篇 社会学
    • 117 篇 法学
  • 153 篇 医学
    • 126 篇 临床医学
  • 116 篇 经济学
    • 116 篇 应用经济学
  • 98 篇 军事学
  • 54 篇 农学
  • 42 篇 教育学
  • 24 篇 文学
  • 22 篇 艺术学

主题

  • 237 篇 feature extracti...
  • 229 篇 semantics
  • 216 篇 cryptography
  • 182 篇 authentication
  • 181 篇 information secu...
  • 163 篇 computational mo...
  • 158 篇 security
  • 151 篇 protocols
  • 143 篇 accuracy
  • 140 篇 privacy
  • 138 篇 deep learning
  • 123 篇 training
  • 122 篇 laboratories
  • 104 篇 data models
  • 99 篇 cloud computing
  • 98 篇 federated learni...
  • 94 篇 servers
  • 92 篇 public key crypt...
  • 92 篇 blockchain
  • 88 篇 data privacy

机构

  • 203 篇 shandong provinc...
  • 175 篇 key laboratory o...
  • 158 篇 school of comput...
  • 155 篇 state key labora...
  • 111 篇 school of comput...
  • 107 篇 school of cyber ...
  • 106 篇 department of co...
  • 97 篇 information secu...
  • 80 篇 key laboratory o...
  • 78 篇 institute of inf...
  • 66 篇 guangdong provin...
  • 65 篇 computer network...
  • 65 篇 university of ch...
  • 65 篇 state grid key l...
  • 64 篇 college of mathe...
  • 61 篇 peng cheng labor...
  • 60 篇 key laboratory o...
  • 59 篇 school of softwa...
  • 55 篇 school of comput...
  • 54 篇 key laboratory o...

作者

  • 55 篇 jianfeng ma
  • 53 篇 yang yang
  • 48 篇 ma jianfeng
  • 45 篇 yixian yang
  • 42 篇 ding yong
  • 41 篇 zheng wei-shi
  • 38 篇 huang qingming
  • 31 篇 cong runmin
  • 31 篇 zhang huanguo
  • 31 篇 xu an wang
  • 31 篇 hu yupu
  • 30 篇 wang wei
  • 30 篇 yang yixian
  • 28 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 26 篇 min-ling zhang
  • 24 篇 xinhong hei
  • 24 篇 xu li
  • 24 篇 xie xiaohua

语言

  • 7,179 篇 英文
  • 343 篇 其他
  • 277 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory Computer Network and Information Security"
7784 条 记 录,以下是111-120 订阅
排序:
CRP2-VCS: Contrast-Oriented Region-based Progressive Probabilistic Visual Cryptography Schemes
收藏 引用
IEEE Transactions on Circuits and Systems for Video Technology 2025年 第6期35卷 5501-5517页
作者: Wu, Xiaotian Song, Bofan Fang, Jia Yan, WeiQi Peng, Qing-Yu Jinan University Guangdong Key Laboratory of Data Security and Privacy Preserving College of Cyber Security College of Information Science and Technology Guangzhou China Auckland University of Technology Department of Computer and Information Systems Auckland New Zealand Jinan University Sino-French Joint Laboratory for Astrometry Dynamics and Space Science Guangzhou China
Most visual cryptography schemes (VCSs) are condition-oriented which implies their designs focus on satisfying the contrast and security conditions in VCS. In this paper, we explore a new architecture of VCS: contrast... 详细信息
来源: 评论
Lip-Audio Modality Fusion for Deep Forgery Video Detection
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 3499-3515页
作者: Yong Liu Zhiyu Wang Shouling Ji Daofu Gong Lanxin Cheng Ruosi Cheng College of Cyberspace Security Information Engineering UniversityZhengzhou450001China Research Institute of Intelligent Networks Zhejiang LabHangzhou311121China College of Computer Science and Technology Zhejiang UniversityHangzhou310027China Henan Key Laboratory of Cyberspace Situation Awareness Zhengzhou450001China Key Laboratory of Cyberspace Security Ministry of EducationZhengzhou450001China
In response to the problem of traditional methods ignoring audio modality tampering, this study aims to explore an effective deep forgery video detection technique that improves detection precision and reliability by ... 详细信息
来源: 评论
IoV Edge Data Integrity Audit Method Based on Blockchain  3
IoV Edge Data Integrity Audit Method Based on Blockchain
收藏 引用
3rd International Conference on Blockchain Technology and information security, ICBCTIS 2023
作者: Qi, Hui Li, Hang Yu, Wangdong Wang, Chunbo Jilin Key Laboratory of Network and Information Security Changchun University of Science and Technology Changchun China Jilin Key Laboratory of Network and Information Security Changchun University of Science and Technology School of Information Technology Changchun Automobile Industry Institute Changchun China
With the quick development of Internet of Vehicles (IoV) technology, a lot of private data of vehicle users has been generated. An increasing amount of vehicle data is being collected in the cloud storage providers (C... 详细信息
来源: 评论
A HEVC Video Steganalysis Method Using the Optimality of Motion Vector Prediction
收藏 引用
computers, Materials & Continua 2024年 第5期79卷 2085-2103页
作者: Jun Li Minqing Zhang Ke Niu Yingnan Zhang Xiaoyuan Yang College of Cryptography Engineering Engineering University of the Chinese People’s Armed Police ForceXi’an710086China Key Laboratory of Network and Information Security of the Chinese People’s Armed Police Force Xi’an710086China
Among steganalysis techniques,detection against MV(motion vector)domain-based video steganography in the HEVC(High Efficiency Video Coding)standard remains a challenging *** the purpose of improving the detection perf... 详细信息
来源: 评论
An Adaptive Image Compression Algorithm Based on Deep Learning  6
An Adaptive Image Compression Algorithm Based on Deep Learni...
收藏 引用
6th International Conference on Artificial Intelligence and Pattern Recognition, AIPR 2023
作者: Liang, Yanxia Zhao, Meng Lu, Guangyue Jiang, Jing He, Hua Jia, Tong Shaanxi Key Laboratory of Information Communication Network and Security Xi'an University of Posts and Telecommunications China
In recent years, deep artificial neural networks have received wide attention because it surpasses the effect of traditional methods by parameter fitting under the condition of data convergence. On the other hand, lim... 详细信息
来源: 评论
Reversible Data Hiding Algorithm in Encrypted Domain Based on Matrix Secret Sharing  5
Reversible Data Hiding Algorithm in Encrypted Domain Based o...
收藏 引用
5th International Conference on Electronics and Communication, network and computer Technology, ECNCT 2023
作者: Jiang, Zongbao Zhang, Minqing Ke, Yan Jiang, Chao University of PAP Key Laboratory of Network and Information Security of PAP Engineering Xi'an710086 China
Focused on the problems of user privacy disclosure and ciphertext data management in cloud service environment, this paper proposes a reversible data hiding algorithm in encrypted domain based on matrix secret sharing... 详细信息
来源: 评论
Privacy Preserving Demand Side Management Method via Multi-Agent Reinforcement Learning
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2023年 第10期10卷 1984-1999页
作者: Feiye Zhang Qingyu Yang Dou An Faculty of Electronic and Information Engineering Xi’an Jiaotong UniversityXi’an 710049China Key Laboratory for Manufacturing Systems Engineering(SKLMSE) Xi’an Jiaotong UniversityXi’an 710049 MOE Key Laboratory for Intelligent Networks and Network Security Xi’an Jiaotong UniversityXi’an 710049China
The smart grid utilizes the demand side management technology to motivate energy users towards cutting demand during peak power consumption periods, which greatly improves the operation efficiency of the power grid. H... 详细信息
来源: 评论
A throughput and priority optimization strategy for high density healthcare IoT
收藏 引用
Intelligent and Converged networks 2025年 第1期6卷 41-52页
作者: Zhenlang Su Junyu Ren Yeheng Huang Yang Liao Tuanfa Qin School of Computer Electronic and InformationGuangxi UniversityNanning 530004China School of Physics and Electronic Information Guangxi Minzu UniversityNanning 530006China School of Computer Electronic and Information and the Guangxi Key Laboratory of Multimedia Communications and Network TechnologyGuangxi UniversityNanning 530004China
In the field of wireless body area networks(WBANs),for solving the complex interference problem of inter-WBANs,a density-based adaptive optimization strategy(DAOS)is proposed in this ***,the complex interference probl... 详细信息
来源: 评论
PosFuzz:augmenting greybox fuzzing with effective position distribution
收藏 引用
Cybersecurity 2023年 第4期6卷 123-143页
作者: Yanyan Zou Wei Zou JiaCheng Zhao Nanyu Zhong Yu Zhang Ji Shi Wei Huo Institute of Information Engineering Chinese Academy of SciencesBeijingChina School of Cyber Security University of Chinese Academy of SciencesBeijingChina State Key Lab of Processors Institute of Computing TechnologyChinese Academy of SciencesBeijingChina Key Laboratory of Network Assessment Technology Chinese Academy of SciencesBeijingChina Beijing Key Laboratory of Network Security and Protection Technology BeijingChina Zhongguancun Laboratory BeijingChina
Mutation-based greybox fuzzing has been one of the most prevalent techniques for security vulnerability discovery and a great deal of research work has been proposed to improve both its efficiency and ***-based greybo... 详细信息
来源: 评论
Securing STAR-FC-RIS empowered integrated sensing and multiuser communications against target eavesdropping
收藏 引用
Science China(information Sciences) 2024年 第11期67卷 335-346页
作者: Shuying LIN Yulong ZOU Fu XIAO Bin LI School of Telecommunications and Information Engineering Nanjing University of Posts and Telecommunications School of Computer Science Nanjing University of Posts and Telecommunications Key Laboratory of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications
This paper investigates a simultaneous-transmitting-and-reflecting fully-connected reconfigurable intelligent surface(STAR-FC-RIS) empowered integrated sensing and multiuser communications(ISAMC) network, where a dual... 详细信息
来源: 评论