咨询与建议

限定检索结果

文献类型

  • 4,511 篇 会议
  • 3,407 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,926 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,322 篇 工学
    • 4,005 篇 计算机科学与技术...
    • 3,158 篇 软件工程
    • 1,357 篇 信息与通信工程
    • 658 篇 电气工程
    • 588 篇 控制科学与工程
    • 531 篇 电子科学与技术(可...
    • 452 篇 网络空间安全
    • 440 篇 生物工程
    • 301 篇 机械工程
    • 233 篇 光学工程
    • 224 篇 仪器科学与技术
    • 188 篇 生物医学工程(可授...
    • 165 篇 安全科学与工程
    • 153 篇 动力工程及工程热...
    • 147 篇 化学工程与技术
    • 129 篇 建筑学
    • 127 篇 交通运输工程
  • 2,306 篇 理学
    • 1,374 篇 数学
    • 504 篇 物理学
    • 478 篇 生物学
    • 425 篇 统计学(可授理学、...
    • 207 篇 系统科学
    • 167 篇 化学
  • 1,340 篇 管理学
    • 818 篇 管理科学与工程(可...
    • 579 篇 图书情报与档案管...
    • 295 篇 工商管理
  • 287 篇 法学
    • 167 篇 社会学
    • 118 篇 法学
  • 156 篇 医学
    • 128 篇 临床医学
  • 116 篇 经济学
    • 116 篇 应用经济学
  • 99 篇 军事学
  • 54 篇 农学
  • 44 篇 教育学
  • 24 篇 文学
  • 23 篇 艺术学

主题

  • 238 篇 feature extracti...
  • 229 篇 semantics
  • 214 篇 cryptography
  • 184 篇 authentication
  • 181 篇 information secu...
  • 163 篇 computational mo...
  • 160 篇 security
  • 151 篇 protocols
  • 144 篇 deep learning
  • 144 篇 accuracy
  • 139 篇 privacy
  • 122 篇 laboratories
  • 122 篇 training
  • 103 篇 data models
  • 102 篇 federated learni...
  • 99 篇 cloud computing
  • 94 篇 servers
  • 92 篇 public key crypt...
  • 92 篇 blockchain
  • 89 篇 data privacy

机构

  • 204 篇 shandong provinc...
  • 179 篇 key laboratory o...
  • 166 篇 school of comput...
  • 151 篇 state key labora...
  • 112 篇 school of comput...
  • 111 篇 school of cyber ...
  • 106 篇 department of co...
  • 98 篇 information secu...
  • 84 篇 key laboratory o...
  • 81 篇 institute of inf...
  • 67 篇 computer network...
  • 67 篇 guangdong provin...
  • 66 篇 university of ch...
  • 64 篇 college of mathe...
  • 64 篇 state grid key l...
  • 63 篇 peng cheng labor...
  • 60 篇 key laboratory o...
  • 59 篇 school of softwa...
  • 57 篇 school of comput...
  • 56 篇 key laboratory o...

作者

  • 55 篇 jianfeng ma
  • 53 篇 yang yang
  • 49 篇 ma jianfeng
  • 45 篇 yixian yang
  • 43 篇 ding yong
  • 41 篇 zheng wei-shi
  • 38 篇 huang qingming
  • 31 篇 cong runmin
  • 31 篇 wang wei
  • 31 篇 zhang huanguo
  • 31 篇 hu yupu
  • 30 篇 xu an wang
  • 30 篇 yang yixian
  • 29 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 27 篇 min-ling zhang
  • 25 篇 xie xiaohua
  • 24 篇 liu xin
  • 23 篇 wang yujue

语言

  • 7,128 篇 英文
  • 536 篇 其他
  • 282 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory Computer Network and Information Security"
7926 条 记 录,以下是281-290 订阅
排序:
Electronic band structures of topological kagome materials
收藏 引用
Chinese Physics B 2025年 第1期34卷 29-44页
作者: Man Li Huan Ma Rui Lou Shancai Wang School of Information Network Security People’s Public Security University of ChinaBeijing 100038China Department of Physics Key Laboratory of Quantum State Construction and Manipulation(Ministry of Education)and Beijing Key Laboratory of Opto-electronic Functional Materials&Micronano DevicesRenmin University of ChinaBeijing 100872China Leibniz Institute for Solid State and Materials Research IFW Dresden01069 DresdenGermany Helmholtz-Zentrum Berlin fur Materialien und Energie Albert-Einstein-Strabe 1512489 BerlinGermany Joint Laboratory“Functional Quantum Materials”at BESSY II 12489 BerlinGermany
The kagome lattice has garnered significant attention due to its ability to host quantum spin Fermi liquid ***,the combination of unique lattice geometry,electron–electron correlations,and adjustable magnetism in sol... 详细信息
来源: 评论
Vertical Federated Learning Based on Consortium Blockchain for Data Sharing in Mobile Edge Computing
收藏 引用
computer Modeling in Engineering & Sciences 2023年 第10期137卷 345-361页
作者: Yonghao Zhang Yongtang Wu Tao Li Hui Zhou Yuling Chen State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang550025China Blockchain Laboratory of Agricultural Vegetables Weifang University of Science and TechnologyWeifang262700China Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic TechnologyGuilin541004China
The data in Mobile Edge Computing(MEC)contains tremendousmarket value,and data sharing canmaximize the usefulness of the ***,certain data is quite sensitive,and sharing it directly may violate *** Federated Learning(V... 详细信息
来源: 评论
Short Text Similarity Model Using Semantic and Word Order Features  4
Short Text Similarity Model Using Semantic and Word Order Fe...
收藏 引用
4th International Conference on computer Science and Blockchain, CCSB 2024
作者: Huang, Guimin Shi, Canjun School of Computer Science and Information Security Guilin University of Electronic Technology Guangxi Key Laboratory of Image and Graphic Intelligent Processing Guilin541004 China
Short textual similarity has been more and more widely used in the field of natural language processing. However, people tend to pay more attention to the semantic similarity of sentences and ignore the word order sim... 详细信息
来源: 评论
E2E-MFERC:AMulti-Face Expression Recognition Model for Group Emotion Assessment
收藏 引用
computers, Materials & Continua 2024年 第4期79卷 1105-1135页
作者: Lin Wang Juan Zhao Hu Song Xiaolong Xu Jiangsu Key Laboratory of Big Data Security&Intelligent Processing Nanjing University of Posts and TelecommunicationsNanjing210042China School of Network Security Jinling Institute of TechnologyNanjing211169China State Grid Jiangsu Electric Power Company Limited Nanjing210000China School of Computer Science Nanjing University of Posts and TelecommunicationsNanjing210042China
In smart classrooms, conducting multi-face expression recognition based on existing hardware devices to assessstudents’ group emotions can provide educators with more comprehensive and intuitive classroom effect anal... 详细信息
来源: 评论
Intelligent Test Paper Generation Algorithm Integrating Normal Distribution and Parallel Genetic Algorithm  5
Intelligent Test Paper Generation Algorithm Integrating Norm...
收藏 引用
5th International Conference on Intelligent Computing and Human-computer Interaction, ICHCI 2024
作者: Liu, Chuangye Huang, Guimin School of Computer Science and Information Security Guilin University of Electronic Technology Guangxi Key Laboratory of Image and Graphic Intelligent Processing Guilin541004 China
Genetic algorithms have been widely used in intelligent test paper generation systems. However, traditional genetic algorithms cannot ensure that the difficulty of test questions is normally distributed, and are prone... 详细信息
来源: 评论
A Convolutional Knowledge Tracking Model with Forgetting Behavior and Graph Embedding  3
A Convolutional Knowledge Tracking Model with Forgetting Beh...
收藏 引用
3rd International Conference on Electronics and information Technology, EIT 2024
作者: Huang, Guimin Huang, Zhiqing Guilin University of Electronic Technology School of Computer Science and Information Security Guangxi Key Laboratory of Image and Graphic Intelligent Processing Guilin541004 China
With the prevalence of various intelligent educational systems, it is imperative to uncover learners' proficiency in mastering knowledge points through their prior practice circumstances. Knowledge tracking is an ... 详细信息
来源: 评论
Hyper-Tuned Convolutional Neural networks for Authorship Verification in Digital Forensic Investigations
收藏 引用
computers, Materials & Continua 2023年 第8期76卷 1947-1976页
作者: Asif Rahim Yanru Zhong Tariq Ahmad Sadique Ahmad Mohammed A.ElAffendi School of Computer and Information Security Guilin University of Electronic TechnologyGuilin541004China Guangxi Key Laboratory of Intelligent Processing of Computer Images and Graphics Guilin University of Electronic TechnologyGuilin541004China School of Information and Communication Guilin University of Electronic TechnologyGuilin541004China EIAS:Data Science and Blockchain Laboratory College of Computer and Information SciencesPrince Sultan UniversityRiyadh11586Saudi Arabia
Authorship verification is a crucial task in digital forensic investigations,where it is often necessary to determine whether a specific individual wrote a particular piece of *** Neural networks(CNNs)have shown promi... 详细信息
来源: 评论
Anomaly Detection in network Access-Using LSTM and Encoder-Enhanced Generative Adversarial networks
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2025年 第7期49卷 175-186页
作者: Hu, Jian He, Yingjun Xu, Wenqian Jiang, Yixin Liang, Zhihong Yang, Yiwei Yunnan Power Grid Information Center China Southern Power Grid Kunming650217 China Electric Power Research Institute China Southern Power Grid Guangzhou510663 China Guangdong Provincial Key Laboratory of Power System Network Security Guangzhou510663 China
Along with the continuous development of information technology, the database has become an important module for enterprises and individuals to apply computers, and some important data are stored in the database, whic... 详细信息
来源: 评论
Enhanced YOLOv7-Based Construction Site Environmental Detection Method  4
Enhanced YOLOv7-Based Construction Site Environmental Detect...
收藏 引用
4th International Conference on Big Data, Artificial Intelligence and Internet of Things Engineering, ICBAIE 2023
作者: Liang, Siheng Huang, Wenming Xiao, Yannan Guilin University of Electronic Technology School of Computer and Information Security Guangxi Key Laboratory of Image and Graphic Intelligent Processing Guilin China Guilin University of Electronic Technology School of Computer and Information Security Guilin China
This paper proposes an enhanced approach utilizing the YOLOv7 model for automated construction site environment detection and management. The method leverages high-resolution surveillance cameras and computer vision t... 详细信息
来源: 评论
Efficient and fine-grained access control with fully-hidden policies for cloud-enabled IoT
收藏 引用
Digital Communications and networks 2025年 第2期11卷 473-481页
作者: Qi Li Gaozhan Liu Qianqian Zhang Lidong Han Wei Chen Rui Li Jinbo Xiong School of Computer Science Nanjing University of Posts and TelecommunicationsNanjing 210023China Key Laboratory of Cryptography of Zhejiang Province Hangzhou Normal UniversityHangzhou 311121China Tongda College of Nanjing University of Posts and Telecommunications Yangzhou 225127China Henan Key Laboratory of Network Cryptography Technology Zhengzhou 450001China School of Computer Science and Technology Xidian UniversityXi'an 710071China State Key Laboratory of Tibetan Intelligent Information Processing and Application Qinghai Normal UniversityXining 810008China Faculty of Software Fujian Normal UniversityFuzhou 350108China
Ciphertext-Policy Attribute-Based Encryption(CP-ABE)enables fine-grained access control on ciphertexts,making it a promising approach for managing data stored in the cloud-enabled Internet of *** existing schemes ofte... 详细信息
来源: 评论