咨询与建议

限定检索结果

文献类型

  • 4,432 篇 会议
  • 3,329 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,769 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,212 篇 工学
    • 3,916 篇 计算机科学与技术...
    • 3,130 篇 软件工程
    • 1,329 篇 信息与通信工程
    • 645 篇 电气工程
    • 541 篇 控制科学与工程
    • 523 篇 电子科学与技术(可...
    • 442 篇 网络空间安全
    • 439 篇 生物工程
    • 298 篇 机械工程
    • 230 篇 光学工程
    • 224 篇 仪器科学与技术
    • 188 篇 生物医学工程(可授...
    • 162 篇 安全科学与工程
    • 148 篇 动力工程及工程热...
    • 144 篇 化学工程与技术
    • 126 篇 建筑学
    • 124 篇 交通运输工程
  • 2,279 篇 理学
    • 1,360 篇 数学
    • 498 篇 物理学
    • 475 篇 生物学
    • 420 篇 统计学(可授理学、...
    • 208 篇 系统科学
    • 165 篇 化学
  • 1,326 篇 管理学
    • 809 篇 管理科学与工程(可...
    • 573 篇 图书情报与档案管...
    • 289 篇 工商管理
  • 287 篇 法学
    • 167 篇 社会学
    • 118 篇 法学
  • 153 篇 医学
    • 126 篇 临床医学
  • 116 篇 经济学
    • 116 篇 应用经济学
  • 98 篇 军事学
  • 53 篇 农学
  • 42 篇 教育学
  • 24 篇 文学
  • 22 篇 艺术学

主题

  • 237 篇 feature extracti...
  • 227 篇 semantics
  • 216 篇 cryptography
  • 182 篇 authentication
  • 181 篇 information secu...
  • 161 篇 computational mo...
  • 157 篇 security
  • 150 篇 protocols
  • 142 篇 accuracy
  • 141 篇 privacy
  • 139 篇 deep learning
  • 125 篇 training
  • 122 篇 laboratories
  • 105 篇 data models
  • 99 篇 federated learni...
  • 99 篇 cloud computing
  • 94 篇 servers
  • 93 篇 blockchain
  • 92 篇 public key crypt...
  • 88 篇 data privacy

机构

  • 202 篇 shandong provinc...
  • 173 篇 key laboratory o...
  • 158 篇 school of comput...
  • 156 篇 state key labora...
  • 113 篇 school of comput...
  • 106 篇 department of co...
  • 106 篇 school of cyber ...
  • 97 篇 information secu...
  • 80 篇 key laboratory o...
  • 78 篇 institute of inf...
  • 69 篇 guangdong provin...
  • 65 篇 college of mathe...
  • 65 篇 state grid key l...
  • 64 篇 computer network...
  • 64 篇 university of ch...
  • 60 篇 key laboratory o...
  • 60 篇 peng cheng labor...
  • 59 篇 school of softwa...
  • 59 篇 school of comput...
  • 54 篇 key laboratory o...

作者

  • 55 篇 jianfeng ma
  • 53 篇 yang yang
  • 48 篇 ma jianfeng
  • 45 篇 yixian yang
  • 42 篇 ding yong
  • 41 篇 zheng wei-shi
  • 38 篇 huang qingming
  • 31 篇 cong runmin
  • 31 篇 zhang huanguo
  • 31 篇 xu an wang
  • 31 篇 hu yupu
  • 31 篇 yang yixian
  • 30 篇 wang wei
  • 28 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 26 篇 xu li
  • 26 篇 xie xiaohua
  • 24 篇 xinhong hei
  • 23 篇 liu xin

语言

  • 7,157 篇 英文
  • 349 篇 其他
  • 278 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory Computer Network and Information Security"
7769 条 记 录,以下是61-70 订阅
排序:
New Construction of Code-Based Signature Schemes  26th
New Construction of Code-Based Signature Schemes
收藏 引用
26th International Conference on information and Communications security, ICICS 2024
作者: Yang, Yang Zhang, Fangguo School of Computer Science and Engineering Sun Yat-sen University Guangzhou510006 China Guangdong Key Laboratory of Information Security Technology Guangzhou510006 China
In this paper, we present a novel approach to construct code-based digital signature schemes. Our focus is on addressing the efficiency issues stemming from the low proportion of decodable syndromes in classical CFS s... 详细信息
来源: 评论
Electronic band structures of topological kagome materials
收藏 引用
Chinese Physics B 2025年 第1期34卷 29-44页
作者: Man Li Huan Ma Rui Lou Shancai Wang School of Information Network Security People’s Public Security University of ChinaBeijing 100038China Department of Physics Key Laboratory of Quantum State Construction and Manipulation(Ministry of Education)and Beijing Key Laboratory of Opto-electronic Functional Materials&Micronano DevicesRenmin University of ChinaBeijing 100872China Leibniz Institute for Solid State and Materials Research IFW Dresden01069 DresdenGermany Helmholtz-Zentrum Berlin fur Materialien und Energie Albert-Einstein-Strabe 1512489 BerlinGermany Joint Laboratory“Functional Quantum Materials”at BESSY II 12489 BerlinGermany
The kagome lattice has garnered significant attention due to its ability to host quantum spin Fermi liquid ***,the combination of unique lattice geometry,electron–electron correlations,and adjustable magnetism in sol... 详细信息
来源: 评论
Anomaly Detection in network Access-Using LSTM and Encoder-Enhanced Generative Adversarial networks
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2025年 第7期49卷 175-186页
作者: Hu, Jian He, Yingjun Xu, Wenqian Jiang, Yixin Liang, Zhihong Yang, Yiwei Yunnan Power Grid Information Center China Southern Power Grid Kunming650217 China Electric Power Research Institute China Southern Power Grid Guangzhou510663 China Guangdong Provincial Key Laboratory of Power System Network Security Guangzhou510663 China
Along with the continuous development of information technology, the database has become an important module for enterprises and individuals to apply computers, and some important data are stored in the database, whic... 详细信息
来源: 评论
BAV-DSS: Blockchain Assisted Verifiable Data Sharing Scheme with Fast Encryption and Outsourced Decryption for IoT  24th
BAV-DSS: Blockchain Assisted Verifiable Data Sharing Scheme ...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Huang, Yao Yu, Zhongyuan Wang, Guijuan Chai, Baobao Zhang, Hongliang Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan250353 China School of Information Science and Engineering Lanzhou University Lanzhou730000 China School of Computer Science and Engineering Shandong University of Science and Technology Qingdao266590 China
Many sophisticated cloud platforms are available to provide services such as storage and computation for Internet of Things (IoT) applications. However, with the concerns about the semi-trusted nature of cloud platfor... 详细信息
来源: 评论
Resource Allocation for MEC in Ultra-dense networks
收藏 引用
Journal of computers (Taiwan) 2025年 第1期36卷 143-162页
作者: Ma, Huan Li, Shuyun Wang, Zhihui Dou, Xubing Zhang, Xinchang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China Shandong Normal University Jinan China
In the complex context of 5G ultra-dense networks, the unprecedented growth in traffic and computing demand has made the interaction between edge devices and edge servers extremely intricate due to the time-varying na... 详细信息
来源: 评论
Enhanced PIR Scheme Combining SimplePIR and Spiral: Achieving Higher Throughput Without Client Hints  6th
Enhanced PIR Scheme Combining SimplePIR and Spiral: Achievi...
收藏 引用
6th International Conference on Machine Learning for Cyber security, ML4CS 2024
作者: Xu, Haoyao Li, Yitong Tian, Haibo School of Computer Science and Engineering Sun Yat-sen University Guangzhou510006 China Guangdong Province Key Laboratory of Information Security Technology Guangzhou510006 China
In recent years, Private information Retrieval (PIR) schemes capable of rapid response have gotten significant attention, with SimplePIR, for instance, achieving a throughput of approximately 10 GB/s in a single-threa... 详细信息
来源: 评论
Uncertainty-aware coarse-to-fine alignment for text-image person retrieval
收藏 引用
Visual Intelligence 2025年 第1期3卷 1-14页
作者: Deng, Yifei Chen, Zhengyu Li, Chenglong Tang, Jin Information Materials and Intelligent Sensing Laboratory of Anhui Province Anhui Provincial Key Laboratory of Multimodal Cognitive Computation School of Computer Science and Technology Anhui University Hefei 230601 China Information Materials and Intelligent Sensing Laboratory of Anhui Province Anhui Provincial Key Laboratory of Security Artificial Intelligence School of Artificial Intelligence Anhui University Hefei 230601 China
Text-to-image person retrieval, a fine-grained cross-modal retrieval problem, aims to search for person images from an image library that match a given textual caption. Existing text-to-image person retrieval methods ... 详细信息
来源: 评论
Multi-modal Self-perception Enhanced Large Language Model for 3D Region-of-Interest Captioning with Limited Data
收藏 引用
IEEE Transactions on Multimedia 2025年 27卷 2935-2948页
作者: Shi, Lu Kan, Shichao Jin, Yi Zhang, Linna Cen, Yigang Bejing Jiaotong University and the Beijing Key Laboratory of Advanced Information Science and Network Technology Institute of Information Science Beijing100044 China Central South University School of Computer Science and Engineering Hunan Changsha0410083 China Beijing Jiaotong University Key Laboratory of Big Data and Artificial Intelligence in Transportation Ministry of Education and the School of Computer and lnformation Technology Beijing100044 China Guizhou University School of Mechanical Engineering Guiyang550025 China
3D Region-of-Interest (RoI) Captioning involves translating a model's understanding of specific objects within a complex 3D scene into descriptive captions. Recent advancements in Large Language Models (LLMs) have... 详细信息
来源: 评论
Deep anomaly detection on attributed networks by graph update
收藏 引用
Computing 2025年 第6期107卷 1-25页
作者: Li, Yifan Li, Jiayin Liu, Ximeng Xu, Li College of Computer and Cyber Security Fujian Normal University Fujian Fuzhou China Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Normal University Fujian Fuzhou China College of Mathematics and Computer Science Fuzhou University Fujian Fuzhou China University Key Laboratory of Information Security of Network Systems Fuzhou University Fujian Fuzhou China
Anomaly detection on attributed networks has become extremely important as attributed networks are modeled in various real-world scenarios such as financial, communication, and social networks. Traditional anomaly det... 详细信息
来源: 评论
LayerCFL:an efcient federated learning with layer-wised clustering
收藏 引用
Cybersecurity 2025年 第1期8卷 72-85页
作者: Jie Yuan Rui Qian Tingting Yuan Mingliang Sun Jirui Li Xiaoyong Li School of Cyberspace Security Beijing University of Posts and TelecommunicationsBeijingChina Key Laboratory of Trustworthy Distributed Computing and Service(BUPT) Ministry of EducationBeijingChina Institute of Computer Science Faculty of Mathematics and Computer ScienceUniversity of GoettingenGöettingenGermany School of Information Technology Henan University of Chinese MedicineZhengzhouHenanChina
Federated Learning(FL)sufers from the Non-IID problem in practice,which poses a challenge for efcient and accurate model *** address this challenge,prior research has introduced clustered FL(CFL),which involves cluste... 详细信息
来源: 评论