咨询与建议

限定检索结果

文献类型

  • 4,432 篇 会议
  • 3,329 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,769 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,212 篇 工学
    • 3,916 篇 计算机科学与技术...
    • 3,130 篇 软件工程
    • 1,329 篇 信息与通信工程
    • 645 篇 电气工程
    • 541 篇 控制科学与工程
    • 523 篇 电子科学与技术(可...
    • 442 篇 网络空间安全
    • 439 篇 生物工程
    • 298 篇 机械工程
    • 230 篇 光学工程
    • 224 篇 仪器科学与技术
    • 188 篇 生物医学工程(可授...
    • 162 篇 安全科学与工程
    • 148 篇 动力工程及工程热...
    • 144 篇 化学工程与技术
    • 126 篇 建筑学
    • 124 篇 交通运输工程
  • 2,279 篇 理学
    • 1,360 篇 数学
    • 498 篇 物理学
    • 475 篇 生物学
    • 420 篇 统计学(可授理学、...
    • 208 篇 系统科学
    • 165 篇 化学
  • 1,326 篇 管理学
    • 809 篇 管理科学与工程(可...
    • 573 篇 图书情报与档案管...
    • 289 篇 工商管理
  • 287 篇 法学
    • 167 篇 社会学
    • 118 篇 法学
  • 153 篇 医学
    • 126 篇 临床医学
  • 116 篇 经济学
    • 116 篇 应用经济学
  • 98 篇 军事学
  • 53 篇 农学
  • 42 篇 教育学
  • 24 篇 文学
  • 22 篇 艺术学

主题

  • 237 篇 feature extracti...
  • 227 篇 semantics
  • 216 篇 cryptography
  • 182 篇 authentication
  • 181 篇 information secu...
  • 161 篇 computational mo...
  • 157 篇 security
  • 150 篇 protocols
  • 142 篇 accuracy
  • 141 篇 privacy
  • 139 篇 deep learning
  • 125 篇 training
  • 122 篇 laboratories
  • 105 篇 data models
  • 99 篇 federated learni...
  • 99 篇 cloud computing
  • 94 篇 servers
  • 93 篇 blockchain
  • 92 篇 public key crypt...
  • 88 篇 data privacy

机构

  • 202 篇 shandong provinc...
  • 173 篇 key laboratory o...
  • 158 篇 school of comput...
  • 156 篇 state key labora...
  • 113 篇 school of comput...
  • 106 篇 department of co...
  • 106 篇 school of cyber ...
  • 97 篇 information secu...
  • 80 篇 key laboratory o...
  • 78 篇 institute of inf...
  • 69 篇 guangdong provin...
  • 65 篇 college of mathe...
  • 65 篇 state grid key l...
  • 64 篇 computer network...
  • 64 篇 university of ch...
  • 60 篇 key laboratory o...
  • 60 篇 peng cheng labor...
  • 59 篇 school of softwa...
  • 59 篇 school of comput...
  • 54 篇 key laboratory o...

作者

  • 55 篇 jianfeng ma
  • 53 篇 yang yang
  • 48 篇 ma jianfeng
  • 45 篇 yixian yang
  • 42 篇 ding yong
  • 41 篇 zheng wei-shi
  • 38 篇 huang qingming
  • 31 篇 cong runmin
  • 31 篇 zhang huanguo
  • 31 篇 xu an wang
  • 31 篇 hu yupu
  • 31 篇 yang yixian
  • 30 篇 wang wei
  • 28 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 26 篇 xu li
  • 26 篇 xie xiaohua
  • 24 篇 xinhong hei
  • 23 篇 liu xin

语言

  • 7,157 篇 英文
  • 349 篇 其他
  • 278 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory Computer Network and Information Security"
7769 条 记 录,以下是251-260 订阅
排序:
An Improved YOLOv5s-Based Smoke Detection System for Outdoor Parking Lots
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 3333-3349页
作者: Ruobing Zuo Xiaohan Huang Xuguo Jiao Zhenyong Zhang State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang550025China School of Information and Control Engineering Qingdao University of TechnologyQingdao266520China State Key Laboratory of Industrial Control Technology College of Control Science and EngineeringZhejiang UniversityHangzhou310027China Key Laboratory of Computing Power Network and Information Security Ministry of EducationQilu University of Technology(Shandong Academy of Sciences)Jinan250353China Text Computing&Cognitive Intelligence Engineering Research Center of National Education Ministry Guizhou UniversityGuiyang550025China
In the rapidly evolving urban landscape,outdoor parking lots have become an indispensable part of the city’s transportation *** growth of parking lots has raised the likelihood of spontaneous vehicle combus-tion,a si... 详细信息
来源: 评论
An Improved Multi-objective Particle Swarm Optimization Algorithm with Reduced Initial Search Space  21st
An Improved Multi-objective Particle Swarm Optimization Algo...
收藏 引用
21st Pacific Rim International Conference on Artificial Intelligence, PRICAI 2024
作者: Zhiguang, Chu Yingchen, Fan Xiaolei, Zhang Ruyan, Zhang Xing, Zhang School of Electronics and Information Engineering Liaoning University of Technology Jinzhou121000 China Key Laboratory of Security for Network and Data in Industrial Internet of Liaoning Province Jinzhou121000 China
As data dimensions continue to increase, the challenges of data storage become more severe. While feature selection can reduce the complexity of high-dimensional data, existing methods are prone to local optima and hi... 详细信息
来源: 评论
License Plate Recognition via Attention Mechanism
收藏 引用
computers, Materials & Continua 2023年 第4期75卷 1801-1814页
作者: Longjuan Wang Chunjie Cao Binghui Zou Jun Ye Jin Zhang School of Computer Science and Cyberspace Security Hainan University Haikou570228China Key Laboratory of Internet Information Retrieval of Hainan Province Haikou570228China Hilbert College HamburgNY14075USA
License plate recognition technology use widely in intelligent trafficmanagement and control. Researchers have been committed to improving thespeed and accuracy of license plate recognition for nearly 30 years. This p... 详细信息
来源: 评论
Towards Public Integrity Audition for Cloud-IoT Data Based on Blockchain
收藏 引用
computer Systems Science & Engineering 2022年 第6期41卷 1129-1142页
作者: Hao Yan Yanan Liu Shuo Qiu Shengzhou Hu Weijian Zhang Jinyue Xia School of Network Security Jinling Institute of TechnologyNanjing211169China Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Normal UniversityFuzhou350007China Department of Mathematics and Computer Science Gannan Normal UniversityGanzhou341000China Network Security and Information Office Hohai UniversityNanjing210098China International Business Machines Corporation(IBM) New YorkNYUSA
With the rapidly developing of Internet of Things (IoT), the volume ofdata generated by IoT systems is increasing quickly. To release the pressure ofdata management and storage, more and more enterprises and individua... 详细信息
来源: 评论
High-Level security Dimension Evaluation of Blockchain BaaS System and key Technology
收藏 引用
China Communications 2024年 第6期21卷 176-191页
作者: Chen Wanfa Zheng Qing’an Chen Shuzhen Fu Hongyi Chen Liang Fujian Police College Fuzhou 350007China Computer Science and Information Security Management Department Fujian Police CollegeFuzhou 350007China Fujian Province Key Laboratory for Digital Network Crime Supervision and Prevention Fuzhou 350007China Beijing University of Posts and Telecommunications Beijing 100876China Fujian Provincial Prison Administration Fuzhou 350002China
In recent years,blockchain technology integration and application has gradually become an important driving force for new technological innovation and industrial *** blockchain technology and applications are developi... 详细信息
来源: 评论
A Semi-supervised Protein Complex Identification Algorithm Based on Sparseness Constraint
A Semi-supervised Protein Complex Identification Algorithm B...
收藏 引用
2024 International Conference on Applied Mathematics, Modelling and Statistics Application, AMMSA 2024
作者: Liu, Guangming Dang, Fengqing Wang, Bin Peng, Yonghong Wang, Xiaofan Tan, Li School of Computer Science and Engineering Shaanxi Key Laboratory for Network Computing and Security Technology Xi'An University of Technology Shaanxi Xi'an China Faculty of Science and Engineering Computing and Information Science Cambridge United Kingdom School of Computer and Information Engineering Beijing Technology and Business University Beijing China
Recognising protein complexes in protein interaction networks is crucial, but poses a major challenge due to the frequency of noisy interactions. These networks typically involve numerous protein complexes, with each ... 详细信息
来源: 评论
BEW-YOLO: An Improved Method for PCB Defect Detection Based on YOLOv7  29
BEW-YOLO: An Improved Method for PCB Defect Detection Based ...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Li, Zhiyao Li, Aimin Zhang, Yuechen Kong, Xiaotong Li, Wenqiang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
The PCB defect object size is small and the detection process is susceptible to background interference, usually have the problem of missed and false detection. In order to solve the above problems, an improved method... 详细信息
来源: 评论
Contract-Based Incentive Mechanisms for UAV networks in Covert Communications
收藏 引用
IEEE Transactions on Vehicular Technology 2025年 第5期74卷 7378-7391页
作者: Tian, Wen Fan, Hao Liu, Guangjie Du, Miao Liu, Yinqiu Niyato, Dusit Han, Zhu Nanjing University of Information Science and Technology School of Electronic and Information Engineering Nanjing University of Information Science and Technology Key Laboratory of Intelligent Support Technology In Complex Environment Ministry of Education Nanjing210044 China Southeat University School of Computer Science and Engineering China Southeast University Key Laboratory of Computer Network and Information Integration Ministry of Education Nanjing China Nanyang Technological University School of Computer Science and Engineering 639798 Singapore University of Houston Department of Electrical and Computer Engineering HoustonTX77004 United States Kyung Hee University Department of Computer Science and Engineering Seoul446-701 Korea Republic of
Covert communication is considered a promising technology for hiding transmission processes and activities from malicious eavesdropping. With the development of detection technology, the traditional point-to-point cov... 详细信息
来源: 评论
Don’t Abandon the Primary key: A High-Synchronization and Robust Virtual Primary key Scheme for Watermarking Relational Databases  26th
Don’t Abandon the Primary Key: A High-Synchronization and...
收藏 引用
26th International Conference on information and Communications security, ICICS 2024
作者: Yang, Ke Yuan, Shuguang Yu, Jing Wang, Yuyang Yang, Tengfei Chen, Chi Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Key Laboratory of Cyberspace Security Defense Beijing China National Computer Network Emergency Response Technical Team/Coordination Center of China Beijing China
A relational database is an infrastructure that manages and shares structured data. To safeguard the copyrights of data within such databases, database watermarking is an effective technique. Most watermarking schemes... 详细信息
来源: 评论
A Linked List Encryption Scheme for Image Steganography without Embedding
收藏 引用
computer Modeling in Engineering & Sciences 2024年 第10期141卷 331-352页
作者: Pengbiao Zhao Qi Zhong Jingxue Chen Xiaopei Wang Zhen Qin Erqiang Zhou Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of ChinaChengdu610054China Faculty of Data Science City University of MacaoMacao999078China Department of Computer Science and Engineering University of CaliforniaRiversideCA 92521USA
information steganography has received more and more attention from scholars nowadays,especially in the area of image steganography,which uses image content to transmit information and makes the existence of secret in... 详细信息
来源: 评论