咨询与建议

限定检索结果

文献类型

  • 4,511 篇 会议
  • 3,407 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,926 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,322 篇 工学
    • 4,005 篇 计算机科学与技术...
    • 3,158 篇 软件工程
    • 1,357 篇 信息与通信工程
    • 658 篇 电气工程
    • 588 篇 控制科学与工程
    • 531 篇 电子科学与技术(可...
    • 452 篇 网络空间安全
    • 440 篇 生物工程
    • 301 篇 机械工程
    • 233 篇 光学工程
    • 224 篇 仪器科学与技术
    • 188 篇 生物医学工程(可授...
    • 165 篇 安全科学与工程
    • 153 篇 动力工程及工程热...
    • 147 篇 化学工程与技术
    • 129 篇 建筑学
    • 127 篇 交通运输工程
  • 2,306 篇 理学
    • 1,374 篇 数学
    • 504 篇 物理学
    • 478 篇 生物学
    • 425 篇 统计学(可授理学、...
    • 207 篇 系统科学
    • 167 篇 化学
  • 1,340 篇 管理学
    • 818 篇 管理科学与工程(可...
    • 579 篇 图书情报与档案管...
    • 295 篇 工商管理
  • 287 篇 法学
    • 167 篇 社会学
    • 118 篇 法学
  • 156 篇 医学
    • 128 篇 临床医学
  • 116 篇 经济学
    • 116 篇 应用经济学
  • 99 篇 军事学
  • 54 篇 农学
  • 44 篇 教育学
  • 24 篇 文学
  • 23 篇 艺术学

主题

  • 238 篇 feature extracti...
  • 229 篇 semantics
  • 214 篇 cryptography
  • 184 篇 authentication
  • 181 篇 information secu...
  • 163 篇 computational mo...
  • 160 篇 security
  • 151 篇 protocols
  • 144 篇 deep learning
  • 144 篇 accuracy
  • 139 篇 privacy
  • 122 篇 laboratories
  • 122 篇 training
  • 103 篇 data models
  • 102 篇 federated learni...
  • 99 篇 cloud computing
  • 94 篇 servers
  • 92 篇 public key crypt...
  • 92 篇 blockchain
  • 89 篇 data privacy

机构

  • 204 篇 shandong provinc...
  • 179 篇 key laboratory o...
  • 166 篇 school of comput...
  • 151 篇 state key labora...
  • 112 篇 school of comput...
  • 111 篇 school of cyber ...
  • 106 篇 department of co...
  • 98 篇 information secu...
  • 84 篇 key laboratory o...
  • 81 篇 institute of inf...
  • 67 篇 computer network...
  • 67 篇 guangdong provin...
  • 66 篇 university of ch...
  • 64 篇 college of mathe...
  • 64 篇 state grid key l...
  • 63 篇 peng cheng labor...
  • 60 篇 key laboratory o...
  • 59 篇 school of softwa...
  • 57 篇 school of comput...
  • 56 篇 key laboratory o...

作者

  • 55 篇 jianfeng ma
  • 53 篇 yang yang
  • 49 篇 ma jianfeng
  • 45 篇 yixian yang
  • 43 篇 ding yong
  • 41 篇 zheng wei-shi
  • 38 篇 huang qingming
  • 31 篇 cong runmin
  • 31 篇 wang wei
  • 31 篇 zhang huanguo
  • 31 篇 hu yupu
  • 30 篇 xu an wang
  • 30 篇 yang yixian
  • 29 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 27 篇 min-ling zhang
  • 25 篇 xie xiaohua
  • 24 篇 liu xin
  • 23 篇 wang yujue

语言

  • 7,128 篇 英文
  • 536 篇 其他
  • 282 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory Computer Network and Information Security"
7926 条 记 录,以下是461-470 订阅
排序:
Secure YOLOv3-SPP: Edge-Cooperative Privacy-preserving Object Detection for Connected Autonomous Vehicles
Secure YOLOv3-SPP: Edge-Cooperative Privacy-preserving Objec...
收藏 引用
2022 International Conference on networking and network Applications, NaNA 2022
作者: Zhou, Yongjie Xiong, Jinbo Bi, Renwan Tian, Youliang State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang550025 China Fujian Provincial Key Laboratory of Network System Information Security College of Computer and Cyberspace Security Fujian Normal University FJ Fuzhou350117 China
The connected autonomous vehicles (CAVs) are a key component of intelligent transportation systems (ITS) where vehicles communicate with each other to exchange sensing data from on-board sensors (e.g., high-definition... 详细信息
来源: 评论
Sequence-to-Sequence Knowledge Graph Completion Based on Gated Attention Unit  29
Sequence-to-Sequence Knowledge Graph Completion Based on Gat...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Yi, Fengge Wei, Xiumei Liu, Xiaojing Jiang, Xuesong Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China State Key Laboratory of High-end Server & Storage Technology Jinan China
We present GauKGT5, a sequence-to-sequence model proposed for knowledge graph completion (KGC). Our research extends the KGT5 model, a recent sequence-to-sequence link prediction (LP) model. GauKGT5 takes advantage of... 详细信息
来源: 评论
Enhancing Scalability: A Complete Tree Sharding Architecture Towards IoT  18th
Enhancing Scalability: A Complete Tree Sharding Architecture...
收藏 引用
18th International Conference on Wireless Artificial Intelligent Computing Systems and Applications, WASA 2024
作者: Zhang, Luyi Wang, Yujue Ding, Yong Liang, Hai Yang, Changsong Zheng, Haibin Guangxi Key Laboratory of Cryptography and Information Security School of Computer Science and Information Security Guilin University of Electronic Technology Guilin541004 China Hangzhou Innovation Institute of Beihang University Hangzhou310052 China Institute of Cyberspace Technology HKCT Institute for Higher Education Hong Kong Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies Shenzhen518055 China Guangxi Engineering Research Center of Industrial Internet Security and Blockchain Guilin University of Electronic Technology Guilin541004 China
With the rapid proliferation of integration of blockchain and IoT, traditional centralized architectures and single-node processing have been effectively solved, but scalability of blockchain have become inadequate to... 详细信息
来源: 评论
Multi-party privacy-preserving decision tree training with a privileged party
收藏 引用
Science China(information Sciences) 2024年 第8期67卷 253-268页
作者: Yiwen TONG Qi FENG Min LUO Debiao HE Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Shanghai Technology Innovation Centre of Distributed Privacy-Preserving Artificial Intelligence Matrix Elements Technologies Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science Center Qilu University of Technology(Shandong Academy of Sciences)
Currently, a decision tree is the most commonly used data mining algorithm for classification tasks. While a significant number of studies have investigated privacy-preserving decision trees, the methods proposed in t... 详细信息
来源: 评论
A timestamp-based covert data transmission method in Industrial Control System  7
A timestamp-based covert data transmission method in Industr...
收藏 引用
7th IEEE International Conference on Data Science in Cyberspace, DSC 2022
作者: Lu, Jie Ding, Yong Li, Zhenyu Wang, Chunhui Guilin University of Electronic Technology Guangxi Key Laboratory of Cryptography and Information Security School of Computer Science and Information Security Guilin China Cyberspace Security Research Center Pengcheng Laboratory Shenzhen China
Covert channels are data transmission methods that bypass the detection of security mechanisms and pose a serious threat to critical infrastructure. Meanwhile, it is also an effective way to ensure the secure transmis... 详细信息
来源: 评论
Node Importance Recognition Algorithm Based on the Correlation Degree Transmission Contribution Matrix  2
Node Importance Recognition Algorithm Based on the Correlati...
收藏 引用
2022 2nd International Conference on Mechanical Automation and Electronic information Engineering, MAEIE 2022
作者: Lin, Shengnan Li, Shuai Su, Yang College of Cryptographic Engineering Engineering University of PAP Xi'an710086 China Key Laboratory of Network and Information Security under the Armed Police Force Xi'an710086 China
Based on the importance identification of nodes in a directed weighted network, a node importance recognition algorithm based on the correlation transmission contribution matrix is proposed. The proposed algorithm com... 详细信息
来源: 评论
Privacy-Preserving Electricity Theft Detection Based on Blockchain
收藏 引用
IEEE Transactions on Smart Grid 2023年 第5期14卷 4047-4059页
作者: Zhao, Zhiqiang Liu, Yining Zeng, Zhixin Chen, Zhixiong Zhou, Huiyu Guilin University of Electronic Technology School of Computer Science and Information Security Guilin541004 China Fujian Key Laboratory of Financial Information Processing The Key Laboratory of Applied Mathematics of Fujian Province University Putian University Putian351100 China University of Leicester School of Computing and Mathematical Sciences LeicesterLE1 7RH United Kingdom
In most electricity theft detection schemes, consumers' power consumption data is directly input into the detection center. Although it is valid in detecting the theft of consumers, the privacy of all consumers is... 详细信息
来源: 评论
T³Planner: Multi-Phase Planning Across Structure-Constrained Optical, IP, and Routing Topologies
收藏 引用
IEEE Journal on Selected Areas in Communications 2025年 第5期43卷 1823-1839页
作者: Hao, Yijun Yang, Shusen Li, Fang Zhang, Yifan Zhao, Cong Ren, Xuebin Zhao, Peng Xu, Chenren Wang, Shibo Xi’an Jiaotong University National Engineering Laboratory for Big Data Analytics Xi’an710049 China Xi’an Jiaotong University National Engineering Laboratory for Big Data Analytics Ministry of Education Key Laboratory for Intelligent Networks and Network Security Xi’an710049 China Peking University School of Computer Science Beijing100871 China The Chinese University of Hong Kong Department of Computer Science and Engineering Hong Kong National Engineering Laboratory for Big Data Analytics Xi'an Jiaotong University Xi'an710049 China
network topology planning is an essential multi-phase process to build and jointly optimize the multi-layer network topologies in wide-area networks (WANs). Most existing practices target single-phase/layer planning, ... 详细信息
来源: 评论
iGrasp: An Interactive 2D-3D Framework for 6-DoF Grasp Detection  27th
iGrasp: An Interactive 2D-3D Framework for 6-DoF Grasp Detec...
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Jiang, Jian-Jian Wu, Xiao-Ming Chen, Zibo Wei, Yi-Lin Zheng, Wei-Shi School of Computer Science and Engineering Sun Yat-sen University Guangzhou China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education Guangzhou China Guangdong Province Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou China
For 6-DoF grasp detection, we aim at introducing a new interactive 2D-3D framework which filters out irrelevant information and makes both modalities collaborate effectively to generate robust grasps and accelerate in... 详细信息
来源: 评论
A Novel Identification Method for Frequently Switched Encrypted Video Streaming in Complex network Environment  22
A Novel Identification Method for Frequently Switched Encryp...
收藏 引用
2022 Asia Conference on Electrical, Power and computer Engineering, EPCE 2022
作者: Zhang, Y.U. Ma, Xiaowei Leng, Dongpeng Yu, Peiran College of Cyber Science Nankai University Tianjin Key Laboratory of Network and Data Security Technology Tianjin China College of Computer Science Nankai University Tianjin Key Laboratory of Network and Data Security Technology Tianjin China
Nowadays, to provide stable video streaming and smooth user experience among different scenarios, more and more online video sharing and social media platforms adopt the Dynamic Adaptive Streaming over HTTP (DASH), wh... 详细信息
来源: 评论