咨询与建议

限定检索结果

文献类型

  • 4,432 篇 会议
  • 3,318 篇 期刊文献

馆藏范围

  • 7,750 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,202 篇 工学
    • 3,908 篇 计算机科学与技术...
    • 3,130 篇 软件工程
    • 1,329 篇 信息与通信工程
    • 645 篇 电气工程
    • 541 篇 控制科学与工程
    • 521 篇 电子科学与技术(可...
    • 442 篇 网络空间安全
    • 439 篇 生物工程
    • 298 篇 机械工程
    • 230 篇 光学工程
    • 224 篇 仪器科学与技术
    • 188 篇 生物医学工程(可授...
    • 162 篇 安全科学与工程
    • 148 篇 动力工程及工程热...
    • 144 篇 化学工程与技术
    • 126 篇 建筑学
    • 124 篇 交通运输工程
  • 2,279 篇 理学
    • 1,360 篇 数学
    • 498 篇 物理学
    • 475 篇 生物学
    • 420 篇 统计学(可授理学、...
    • 208 篇 系统科学
    • 165 篇 化学
  • 1,326 篇 管理学
    • 809 篇 管理科学与工程(可...
    • 573 篇 图书情报与档案管...
    • 289 篇 工商管理
  • 287 篇 法学
    • 167 篇 社会学
    • 118 篇 法学
  • 153 篇 医学
    • 126 篇 临床医学
  • 116 篇 经济学
    • 116 篇 应用经济学
  • 98 篇 军事学
  • 53 篇 农学
  • 42 篇 教育学
  • 24 篇 文学
  • 22 篇 艺术学

主题

  • 238 篇 feature extracti...
  • 227 篇 semantics
  • 216 篇 cryptography
  • 182 篇 authentication
  • 181 篇 information secu...
  • 161 篇 computational mo...
  • 157 篇 security
  • 150 篇 protocols
  • 142 篇 accuracy
  • 141 篇 privacy
  • 138 篇 deep learning
  • 125 篇 training
  • 122 篇 laboratories
  • 105 篇 data models
  • 99 篇 cloud computing
  • 96 篇 federated learni...
  • 94 篇 servers
  • 92 篇 public key crypt...
  • 92 篇 blockchain
  • 88 篇 data privacy

机构

  • 202 篇 shandong provinc...
  • 173 篇 key laboratory o...
  • 158 篇 school of comput...
  • 156 篇 state key labora...
  • 113 篇 school of comput...
  • 106 篇 department of co...
  • 106 篇 school of cyber ...
  • 97 篇 information secu...
  • 80 篇 key laboratory o...
  • 78 篇 institute of inf...
  • 70 篇 guangdong provin...
  • 65 篇 college of mathe...
  • 65 篇 state grid key l...
  • 63 篇 computer network...
  • 63 篇 university of ch...
  • 60 篇 peng cheng labor...
  • 59 篇 key laboratory o...
  • 59 篇 school of softwa...
  • 59 篇 school of comput...
  • 54 篇 key laboratory o...

作者

  • 54 篇 jianfeng ma
  • 53 篇 yang yang
  • 48 篇 ma jianfeng
  • 45 篇 yixian yang
  • 42 篇 ding yong
  • 41 篇 zheng wei-shi
  • 38 篇 huang qingming
  • 31 篇 cong runmin
  • 31 篇 zhang huanguo
  • 31 篇 xu an wang
  • 31 篇 hu yupu
  • 31 篇 yang yixian
  • 30 篇 wang wei
  • 28 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 27 篇 xu li
  • 26 篇 xie xiaohua
  • 24 篇 xinhong hei
  • 23 篇 liu xin

语言

  • 7,138 篇 英文
  • 349 篇 其他
  • 278 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory Computer Network and Information Security"
7750 条 记 录,以下是221-230 订阅
排序:
Privacy-Preserving Responsible Gaming Systems  2
Privacy-Preserving Responsible Gaming Systems
收藏 引用
2nd International Conference on Big Data and Privacy Computing, BDPC 2024
作者: Zhu, Yizhao Chen, Lanxiang City University of Macau Faculty of Data Science 999078 China College of Computer and Cyber Security Fujian Normal University Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou China
Responsible gaming aims at maintaining the integrity and sustainability of the gaming industry. However, The exchange of sensitive data, such as player and gaming related information, among different parties raises si... 详细信息
来源: 评论
Evaluation Method of Object Control Capability for Children Based on Nonlinear Dynamics  23
Evaluation Method of Object Control Capability for Children ...
收藏 引用
3rd International Conference on Bioinformatics and Intelligent Computing, BIC 2023
作者: Wang, Huaijun Li, Chao Zhang, Dongsheng Li, Junhuai Key Laboratory of Network Computing and Security Technology School of Computer Science and Engineering Xi an University of Technology Xi'an China
DCD (Developmental Coordination Disorder) has become a global problem, and several studies have shown that early detection and intervention are important for the prevention and treatment of DCD in children. To address... 详细信息
来源: 评论
Light Up Fireflies: Towards Understanding the Design of Interpersonal Bodily Intertwinement in Bodily Play  24
Light Up Fireflies: Towards Understanding the Design of Inte...
收藏 引用
11th ACM SIGCHI Annual Symposium on computer-Human Interaction in Play, CHI-PLAY Companion 2024
作者: Lu, Yingtong Li, Zhuying Ding, Ding Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Nanjing China
In this paper, we explore the design of interpersonal bodily intertwinement through a VR social game, "Light Up Fireflies". Inspired by works of virtual co-embodiment, our game lets two players embody a sing... 详细信息
来源: 评论
EPI-Mamba: State Space Model for Semantic Segmentation from Light Fields
EPI-Mamba: State Space Model for Semantic Segmentation from ...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Li, Yan Chen, Jianan Wang, Qiong Xu, Jinshan College of Computer Science & Technology Zhejiang University of Technology Hangzhou China Guangdong Provincial Key Laboratory of Intelligent Information Processing Shenzhen Key Laboratory of Media Security Shenzhen University Shenzhen China
Global contextual dependency is of significance for semantic segmentation from light fields. However, previous works mostly exploit attention mechanisms to model spatial context dependency and angular context dependen... 详细信息
来源: 评论
A k-nearest neighbor query method based on trust and location privacy protection
A k-nearest neighbor query method based on trust and locatio...
收藏 引用
作者: Guo, Liangmin Zhu, Ying Yang, Hao Luo, Yonglong Sun, Liping Zheng, Xiaoyao School of Computer and Information Anhui Normal University Wuhu China Anhui Provincial Key Laboratory of Network and Information Security Wuhu China
Spatial query is an important supporting technology in the Internet of Things (IoT) and location-based services (LBS). The k-nearest neighbor query is widely used for spatial queries. However, user location privacy ma... 详细信息
来源: 评论
QoS-Aware Offloading Based on Communication-Computation Resource Coordination for 6G Edge Intelligence
收藏 引用
China Communications 2023年 第3期20卷 236-251页
作者: Chaowei Wang Xiaofei Yu Lexi Xu Fan Jiang Weidong Wang Xinzhou Cheng School of Electronic Engineering Beijing University of Posts and TelecommunicationsBeijing 100876China Shaanxi Key Laboratory of Information Communication Network and Security Xi’an University of Posts and TelecommunicationsXi’an 710121China Research Institute China United Network Communications CorporationBeijing 100048China
Driven by the demands of diverse artificial intelligence(AI)-enabled application,Mobile Edge Computing(MEC)is considered one of the key technologies for 6G edge *** this paper,we consider a serial task model and desig... 详细信息
来源: 评论
A Code-Based ISE to Protect Boolean Masking in Software
IACR Transactions on Cryptographic Hardware and Embedded Sys...
收藏 引用
IACR Transactions on Cryptographic Hardware and Embedded Systems 2025年 第2期2025卷 293-332页
作者: Tian, Qi Cheng, Hao Guo, Chun Page, Daniel Wang, Meiqin Wang, Weijia School of Cyber Science and Technology Shandong University Qingdao China Quan Cheng Laboratory Jinan China Key Laboratory of Cryptologic Technology and Information Security Ministry of Education Shandong University Qingdao China School of Computer Science University of Bristol Bristol United Kingdom
Side-Channel Attacks (SCAs) pose a significant threat to data security in embedded environments. To counteract the power-based SCAs, masking is a widely used defense technique, that introduces randomness to obscure th... 详细信息
来源: 评论
Research on Satellite network Traffic Prediction Algorithm Based on Gray Wolf Algorithm Optimizing GRU and Spatiotemporal Analysis  15
Research on Satellite Network Traffic Prediction Algorithm B...
收藏 引用
15th International Conference on Communication Software and networks, ICCSN 2023
作者: Cong, Ligang Shi, Baoyu Di, Xiaoqiang Ding, Huiying Chen, Chuanhui School of Computer Science and Technology Changchun University of Science and Technology Changchun China Changchun University of Science and Technology Jilin Key Laboratory of Network and Information Security Changchun China
Accurate traffic prediction is crucial for the performance improvement of satellite networks, which can help balance network load, optimize routing, and effectively improve network performance. To better plan traffic ... 详细信息
来源: 评论
Feature Aggregation network for Memory-Based Industrial Anomaly Detection  9
Feature Aggregation Network for Memory-Based Industrial Anom...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Li, Min Han, Delong Shao, Rui He, Jinghui City University of Macau Faculty of Data Science China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
In the process of large-scale industrial production, complex defects of different shapes and sizes can occur in industrial products and their components, and these defects seriously affect the performance of industria... 详细信息
来源: 评论
Joint User Activity Detection and Channel Estimation for Grant-Free Temporal-Correlated Random Access in LEO Satellite Based IoT  7
Joint User Activity Detection and Channel Estimation for Gra...
收藏 引用
7th IEEE International Conference on Electronic information and Communication Technology, ICEICT 2024
作者: Zhong, Sheng Zhen, Li Li, Shuchang Dong, Ping Qin, Hao Xi'an University of Posts and Telecommunications Shaanxi Key Laboratory of Information Communication Network and Security Xi'an China Xidian University School of Telecommunication Engineering Xi'an China
Low-earth-orbit (LEO) satellite communication has been regarded as a promising solution for providing ubiquitous Internet of Things (IoT) services, due to its capability of global seamless coverage. In this paper, we ... 详细信息
来源: 评论