咨询与建议

限定检索结果

文献类型

  • 4,432 篇 会议
  • 3,318 篇 期刊文献

馆藏范围

  • 7,750 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,202 篇 工学
    • 3,908 篇 计算机科学与技术...
    • 3,130 篇 软件工程
    • 1,329 篇 信息与通信工程
    • 645 篇 电气工程
    • 541 篇 控制科学与工程
    • 521 篇 电子科学与技术(可...
    • 442 篇 网络空间安全
    • 439 篇 生物工程
    • 298 篇 机械工程
    • 230 篇 光学工程
    • 224 篇 仪器科学与技术
    • 188 篇 生物医学工程(可授...
    • 162 篇 安全科学与工程
    • 148 篇 动力工程及工程热...
    • 144 篇 化学工程与技术
    • 126 篇 建筑学
    • 124 篇 交通运输工程
  • 2,279 篇 理学
    • 1,360 篇 数学
    • 498 篇 物理学
    • 475 篇 生物学
    • 420 篇 统计学(可授理学、...
    • 208 篇 系统科学
    • 165 篇 化学
  • 1,326 篇 管理学
    • 809 篇 管理科学与工程(可...
    • 573 篇 图书情报与档案管...
    • 289 篇 工商管理
  • 287 篇 法学
    • 167 篇 社会学
    • 118 篇 法学
  • 153 篇 医学
    • 126 篇 临床医学
  • 116 篇 经济学
    • 116 篇 应用经济学
  • 98 篇 军事学
  • 53 篇 农学
  • 42 篇 教育学
  • 24 篇 文学
  • 22 篇 艺术学

主题

  • 238 篇 feature extracti...
  • 227 篇 semantics
  • 216 篇 cryptography
  • 182 篇 authentication
  • 181 篇 information secu...
  • 161 篇 computational mo...
  • 157 篇 security
  • 150 篇 protocols
  • 142 篇 accuracy
  • 141 篇 privacy
  • 138 篇 deep learning
  • 125 篇 training
  • 122 篇 laboratories
  • 105 篇 data models
  • 99 篇 cloud computing
  • 96 篇 federated learni...
  • 94 篇 servers
  • 92 篇 public key crypt...
  • 92 篇 blockchain
  • 88 篇 data privacy

机构

  • 202 篇 shandong provinc...
  • 173 篇 key laboratory o...
  • 158 篇 school of comput...
  • 156 篇 state key labora...
  • 113 篇 school of comput...
  • 106 篇 department of co...
  • 106 篇 school of cyber ...
  • 97 篇 information secu...
  • 80 篇 key laboratory o...
  • 78 篇 institute of inf...
  • 70 篇 guangdong provin...
  • 65 篇 college of mathe...
  • 65 篇 state grid key l...
  • 63 篇 computer network...
  • 63 篇 university of ch...
  • 60 篇 peng cheng labor...
  • 59 篇 key laboratory o...
  • 59 篇 school of softwa...
  • 59 篇 school of comput...
  • 54 篇 key laboratory o...

作者

  • 54 篇 jianfeng ma
  • 53 篇 yang yang
  • 48 篇 ma jianfeng
  • 45 篇 yixian yang
  • 42 篇 ding yong
  • 41 篇 zheng wei-shi
  • 38 篇 huang qingming
  • 31 篇 cong runmin
  • 31 篇 zhang huanguo
  • 31 篇 xu an wang
  • 31 篇 hu yupu
  • 31 篇 yang yixian
  • 30 篇 wang wei
  • 28 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 27 篇 xu li
  • 26 篇 xie xiaohua
  • 24 篇 xinhong hei
  • 23 篇 liu xin

语言

  • 7,138 篇 英文
  • 349 篇 其他
  • 278 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory Computer Network and Information Security"
7750 条 记 录,以下是131-140 订阅
排序:
FedIERF: Federated Incremental Extremely Random Forest for Wearable Health Monitoring
收藏 引用
Journal of computer Science & Technology 2023年 第5期38卷 970-984页
作者: 胡春雨 忽丽莎 袁林 陆佃杰 吕蕾 陈益强 Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science Center(National Supercomputer Center in Jinan)Qilu University of Technology(Shandong Academy of Sciences)Jinan 250353China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer ScienceJinan 250000China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan 25000China Institute of Information Technology Hebei University of Economics and BusinessShijiazhuang 050061China School of Information Science and Engineering Shandong Normal UniversityJinan 250358China Institute of Computing Technology Chinese Academy of SciencesBeijing 100190China
Wearable health monitoring is a crucial technical tool that offers early warning for chronic diseases due to its superior portability and low power ***,most wearable health data is distributed across dfferent organiza... 详细信息
来源: 评论
DM-FedMF: A Recommendation Model of Federated Matrix Factorization with Detection Mechanism
收藏 引用
IEEE Transactions on network Science and Engineering 2025年
作者: Zheng, Xiaoyao Jia, Xianmin Cheng, Xiongchao He, Wenxuan Sun, Liping Guo, Liangmin Yu, Qingying Luo, Yonglong Anhui Normal University Anhui Provincial Key Laboratory of Network and Information Security School of Computer and Information Wuhu China
Items are recommended to users by the federated recommendation system while protecting user privacy, but there is a risk of the performance of the global model being seriously affected by malicious clients through the... 详细信息
来源: 评论
A New High-Capacity Robust Image Steganography Method via Adversarial network  5
A New High-Capacity Robust Image Steganography Method via Ad...
收藏 引用
5th International Academic Exchange Conference on Science and Technology Innovation, IAECST 2023
作者: Dong, Weina Jiang, Zongbao Chen, Lifeng Sun, Wenquan University of PAP Key Laboratory of Network and Information Security of PAP Engineering Shaanxi Xi'an710086 China
Aiming at the problem that the high-capacity steganography model based on encoding-decoding network had weak robustness and could not resist noise attack and channel compression, an improved high-capacity robust image... 详细信息
来源: 评论
Reversible Data Hiding in Encrypted Images based on Classic McEliece Cryptosystem  2
Reversible Data Hiding in Encrypted Images based on Classic ...
收藏 引用
2nd International Conference on Image Processing, computer Vision and Machine Learning, ICICML 2023
作者: Jiang, Zongbao Zhang, Minqing Di, Fuqiang Dong, Weina University of PAP Key Laboratory of Network and Information Security of PAP Engineering Shaanxi Xi'an710086 China
Aiming at the problems that the security of traditional data hiding algorithms is difficult to be guaranteed and the existing algorithms' embedded volume is restricted under quantum operation attacks, a reversible... 详细信息
来源: 评论
Joint Entity and Relation Extraction Based on Prompt Learning and Multi-channel Heterogeneous Graph Enhancement  22
Joint Entity and Relation Extraction Based on Prompt Learnin...
收藏 引用
22nd IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2024
作者: Lv, Haiqing Han, Xiaohui Wang, Peipei Zuo, Wenbo Guo, Jing Xu, Lijuan Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China Quan Cheng Laboratory Jinan China Jinan China
Joint extraction of entity and relation is crucial in information extraction, aiming to extract all relation triples from unstructured text. However, current joint extraction methods face two main issues. Firstly, the... 详细信息
来源: 评论
New results on quantum boomerang attacks
收藏 引用
Quantum information Processing 2023年 第4期22卷 1-27页
作者: Zou, Hongkai Zou, Jian Luo, Yiyuan College of Computer and Data Science Fuzhou University Fuzhou China Key Lab of Information Security of Network Systems Fuzhou University Fuzhou China School of Information Sciences and Technology Huizhou University Huizhou China
At SAC 2021, Frixons et al. proposed quantum boomerang attacks that can effectively recover the keys of block ciphers in the quantum setting. Based on their work, we further consider how to quantize the generic boomer... 详细信息
来源: 评论
A Label Flipping Attack on Machine Learning Model and Its Defense Mechanism  22nd
A Label Flipping Attack on Machine Learning Model and Its De...
收藏 引用
22nd International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2022
作者: Li, Qingru Wang, Xinru Wang, Fangwei Wang, Changguang Key Laboratory of Network and Information Security of Hebei Province Hebei Normal University Shijiazhuang050024 China College of Computer and Cyberspace Security Hebei Normal University Shijiazhuang050024 China
Recently, the robustness of machine learning against data poisoning attacks is widely concerned. As a subclass of poisoning attack, the label flipping attack can poison training data resulting in reducing the cla... 详细信息
来源: 评论
An Efficient and Secure Data Audit Scheme for Cloud-Based EHRs with Recoverable and Batch Auditing
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 1533-1553页
作者: Yuanhang Zhang Xu An Wang Weiwei Jiang Mingyu Zhou Xiaoxuan Xu Hao Liu College of Cryptography Engineering Engineering University of People’s Armed PoliceXi’an710086China Key Laboratory of Network and Information Security Engineering University of People’s Armed PoliceXi’an710086China School of Information and Communication Engineering Beijing University of Posts and TelecommunicationsBeijing100876China
Cloud storage,a core component of cloud computing,plays a vital role in the storage and management of *** Health Records(EHRs),which document users’health information,are typically stored on cloud ***,users’sensitiv... 详细信息
来源: 评论
Privacy-Preserving Searchable Encryption Scheme Based on Public and Private Blockchains
收藏 引用
Tsinghua Science and Technology 2023年 第1期28卷 13-26页
作者: Ruizhong Du Caixia Ma Mingyue Li School of Cyberspace Security and Computer and Hebei Province Key Laboratory of High Confidence Information SystemHebei UniversityBaoding 071002China College of Cyber Science Nankai UniversityTianjin 300350China
While users enjoy the convenience of data outsourcing in the cloud,they also face the risks of data modification and private information *** encryption technology can perform keyword searches over encrypted data while... 详细信息
来源: 评论
Textual Data De-Privatization Scheme Based on Generative Adversarial networks  24th
Textual Data De-Privatization Scheme Based on Generative Adv...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Du, Yanning Xu, Jinnan Zhang, Yaling Wang, Yichuan Wang, Zhoukai School of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China
In many fields, such as healthcare, finance, and scientific research, data sharing and collaboration are critical to achieving better outcomes. However, the sharing of personal data often involves privacy risks, so pr... 详细信息
来源: 评论