咨询与建议

限定检索结果

文献类型

  • 4,435 篇 会议
  • 3,397 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,840 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,280 篇 工学
    • 3,971 篇 计算机科学与技术...
    • 3,151 篇 软件工程
    • 1,357 篇 信息与通信工程
    • 695 篇 电气工程
    • 557 篇 控制科学与工程
    • 542 篇 电子科学与技术(可...
    • 455 篇 网络空间安全
    • 439 篇 生物工程
    • 303 篇 机械工程
    • 233 篇 光学工程
    • 224 篇 仪器科学与技术
    • 189 篇 生物医学工程(可授...
    • 168 篇 安全科学与工程
    • 148 篇 动力工程及工程热...
    • 145 篇 化学工程与技术
    • 133 篇 交通运输工程
    • 127 篇 建筑学
  • 2,305 篇 理学
    • 1,382 篇 数学
    • 506 篇 物理学
    • 475 篇 生物学
    • 430 篇 统计学(可授理学、...
    • 208 篇 系统科学
    • 165 篇 化学
  • 1,340 篇 管理学
    • 816 篇 管理科学与工程(可...
    • 584 篇 图书情报与档案管...
    • 290 篇 工商管理
  • 288 篇 法学
    • 167 篇 社会学
    • 119 篇 法学
  • 160 篇 医学
    • 130 篇 临床医学
    • 118 篇 基础医学(可授医学...
  • 117 篇 经济学
  • 98 篇 军事学
  • 54 篇 农学
  • 46 篇 教育学
  • 24 篇 文学
  • 22 篇 艺术学

主题

  • 239 篇 feature extracti...
  • 230 篇 semantics
  • 214 篇 cryptography
  • 182 篇 authentication
  • 181 篇 information secu...
  • 162 篇 computational mo...
  • 158 篇 security
  • 150 篇 protocols
  • 142 篇 accuracy
  • 140 篇 privacy
  • 139 篇 deep learning
  • 126 篇 training
  • 122 篇 laboratories
  • 106 篇 data models
  • 100 篇 federated learni...
  • 100 篇 cloud computing
  • 95 篇 servers
  • 93 篇 blockchain
  • 91 篇 public key crypt...
  • 88 篇 data privacy

机构

  • 203 篇 shandong provinc...
  • 174 篇 key laboratory o...
  • 158 篇 school of comput...
  • 155 篇 state key labora...
  • 114 篇 school of comput...
  • 106 篇 department of co...
  • 106 篇 school of cyber ...
  • 97 篇 information secu...
  • 80 篇 key laboratory o...
  • 79 篇 institute of inf...
  • 68 篇 guangdong provin...
  • 66 篇 computer network...
  • 65 篇 college of mathe...
  • 64 篇 university of ch...
  • 63 篇 state grid key l...
  • 62 篇 peng cheng labor...
  • 60 篇 key laboratory o...
  • 59 篇 school of softwa...
  • 59 篇 school of comput...
  • 55 篇 key laboratory o...

作者

  • 55 篇 jianfeng ma
  • 54 篇 yang yang
  • 50 篇 ma jianfeng
  • 45 篇 yixian yang
  • 41 篇 zheng wei-shi
  • 41 篇 ding yong
  • 38 篇 huang qingming
  • 33 篇 zhang huanguo
  • 32 篇 wang wei
  • 32 篇 hu yupu
  • 31 篇 cong runmin
  • 31 篇 xu an wang
  • 30 篇 yang yixian
  • 29 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 25 篇 xu li
  • 25 篇 xie xiaohua
  • 24 篇 xinhong hei
  • 23 篇 liu xin

语言

  • 7,214 篇 英文
  • 362 篇 其他
  • 277 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory Computer Network and Information Security"
7840 条 记 录,以下是4991-5000 订阅
排序:
Intrusion detection based on system call finite-state automation machine
Intrusion detection based on system call finite-state automa...
收藏 引用
IEEE International Conference on Industrial Technology (ICIT)
作者: Fei Yu Cheng Xu Yue Shen Ji-yao An Lin-feng Zhang State Key Laboratory of Information Security Graduate School of Chinese Academy of Sciences Beijing China School of Computer &Information Engineering Hunan Agricultural University Changsha China College of Computer & Communication Hunan University Changsha China
With our human beings entering the information age, information security has already become the new problem as the development of human society. This paper first review the application of system call for intrusion det... 详细信息
来源: 评论
Type-aware Enhanced Cylinder Embedding for Multi-hop Reasoning over Knowledge Graphs
Type-aware Enhanced Cylinder Embedding for Multi-hop Reasoni...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Yong Shang Xiaoding Zhou Yan Ming Yuyan Zheng Huiting Li Weiyu Zhang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Shcool of Business Shandong Normal University Jinan China
Query embedding (QE) is designed to embed entities and first-order logic (FOL) queries in low-dimensional spaces, it has demonstrated considerable effectiveness in multi-hop reasoning over knowledge graphs. Recently, ... 详细信息
来源: 评论
Algebraic geometry codes with complementary duals exceed the asymptotic Gilbert-Varshamov bound
arXiv
收藏 引用
arXiv 2017年
作者: Jin, Lingfei Xing, Chaoping School of Computer Science Shanghai Key Laboratory of Intelligent Information Processing Fudan University Shanghai200433 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China School of Physical and Mathematical Sciences Nanyang Technological University
It was shown by Massey that linear complementary dual (LCD for short) codes are asymptotically good. In 2004, Sendrier proved that LCD codes meet the asymptotic Gilbert-Varshamov (GV for short) bound. Until now, the G... 详细信息
来源: 评论
Self-Evaluation of Large Language Model based on Glass-box Features
arXiv
收藏 引用
arXiv 2024年
作者: Huang, Hui Qu, Yingqi Liu, Jing Yang, Muyun Xu, Bing Zhao, Tiejun Lu, Wenpeng Faculty of Computing Harbin Institute of Technology Harbin China Baidu Inc. Beijing China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Jinan China
The proliferation of open-source Large Language Models (LLMs) underscores the pressing need for evaluation methods. Existing works primarily rely on external evaluators, focusing on training and prompting strategies. ... 详细信息
来源: 评论
Scalable and Extensible Static Memory Safety Analysis with Summary over Access Path
Scalable and Extensible Static Memory Safety Analysis with S...
收藏 引用
Asia-Pacific Conference on Software Engineering
作者: Guang Chen Min Zhou Jiaguang Sun Xiaoyu Song Key Laboratory for Information System Security Beijing National Research Center for Information Science and Technology Beijing China Electrical and Computer Engineering Portland State University Portland U.S.
Static analysis is an effective way of checking memory safety issues in program. Usually, multiple analysis algorithms usually run together to achieve a precise analysis result. In this paper, a novel analysis frame w... 详细信息
来源: 评论
A Median Filtering Forensics CNN Approach Based on Local Binary Pattern
A Median Filtering Forensics CNN Approach Based on Local Bin...
收藏 引用
作者: Tao Zhu Haiyan Gu Zenan Chen Department of Computer Information and Cyber Security Jiangsu Police Institute Jiangsu Province Electronic Data Forensics and Analysis Engineering Research Center Key Laboratory of Digital Forensics of Jiangsu Provincial Public Security Department
Median filtering forensics has gradually become a research hotspot because of the wide application of the traditional median filtering(MF) in image tampering and anti-forensics. The difficulty of traditional median fi... 详细信息
来源: 评论
Multi-scale Motion Feature Integration for Action Recognition
Multi-scale Motion Feature Integration for Action Recognitio...
收藏 引用
International Conference on computer and Communications (ICCC)
作者: Jinming Lai Huicheng Zheng Jisheng Dang School of Computer Science and Engineering Sun Yat-sen University Guangzhou China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China Guangdong Province Key Laboratory of Information Security Technology China
Analyzing video data with intricate temporal structures and extracting comprehensive motion information remains a significant challenge. In this work, we introduce the multi-scale motion feature integration (MMFI) net...
来源: 评论
Face hallucination by deep traversal network
Face hallucination by deep traversal network
收藏 引用
International Conference on Pattern Recognition
作者: Zhanxiang Feng Jianhuang Lai Xiaohua Xie Dakun Yang Ling Mei School of Electronics and Information Technology Sun Yat-sen University China Guandong Key Laboratory of Information Security Technology School of Data and Computer Science Sun Yat-Sen University China
In this paper, we propose a novel patch-based face hallucination method that consists of two patch-based sparse autoencoder (SAE) networks and a deep fully connected network (namely traversal network). The SAE network... 详细信息
来源: 评论
Anomaly-Free Prior Guided Knowledge Distillation for Industrial Anomaly Detection
Anomaly-Free Prior Guided Knowledge Distillation for Industr...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Gang Li Tianjiao Chen Min Li Delong Han MingLe Zhou Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Faculty of Data Science City University of Macau Macau China
In industrial manufacturing, visual anomaly detection is critical for maintaining product quality by detecting and preventing production anomalies. Anomaly detection methods based on knowledge distillation demonstrate... 详细信息
来源: 评论
DeepkeyGen: A deep learning-based stream cipher generator for medical image encryption and decryption
arXiv
收藏 引用
arXiv 2020年
作者: Ding, Yi Tan, Fuyuan Qin, Zhen Cao, Mingsheng Choo, Kim-Kwang Raymond Qin, Zhiguang Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China ChengduSichuan610054 China Institute of Electronic and Information Engineering of UESTC in Guangdong Guangdong523808 China Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China ChengduSichuan610054 China Department of Information Systems and Cyber Security University of Texas at San Antonio San AntonioTX78249-0631 United States
The need for medical image encryption is increasingly pronounced, for example to safeguard the privacy of the patients’ medical imaging data. In this paper, a novel deep learning-based key generation network (Deepkey... 详细信息
来源: 评论