咨询与建议

限定检索结果

文献类型

  • 4,435 篇 会议
  • 3,397 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,840 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,280 篇 工学
    • 3,971 篇 计算机科学与技术...
    • 3,151 篇 软件工程
    • 1,357 篇 信息与通信工程
    • 695 篇 电气工程
    • 557 篇 控制科学与工程
    • 542 篇 电子科学与技术(可...
    • 455 篇 网络空间安全
    • 439 篇 生物工程
    • 303 篇 机械工程
    • 233 篇 光学工程
    • 224 篇 仪器科学与技术
    • 189 篇 生物医学工程(可授...
    • 168 篇 安全科学与工程
    • 148 篇 动力工程及工程热...
    • 145 篇 化学工程与技术
    • 133 篇 交通运输工程
    • 127 篇 建筑学
  • 2,305 篇 理学
    • 1,382 篇 数学
    • 506 篇 物理学
    • 475 篇 生物学
    • 430 篇 统计学(可授理学、...
    • 208 篇 系统科学
    • 165 篇 化学
  • 1,340 篇 管理学
    • 816 篇 管理科学与工程(可...
    • 584 篇 图书情报与档案管...
    • 290 篇 工商管理
  • 288 篇 法学
    • 167 篇 社会学
    • 119 篇 法学
  • 160 篇 医学
    • 130 篇 临床医学
    • 118 篇 基础医学(可授医学...
  • 117 篇 经济学
  • 98 篇 军事学
  • 54 篇 农学
  • 46 篇 教育学
  • 24 篇 文学
  • 22 篇 艺术学

主题

  • 239 篇 feature extracti...
  • 230 篇 semantics
  • 214 篇 cryptography
  • 182 篇 authentication
  • 181 篇 information secu...
  • 162 篇 computational mo...
  • 158 篇 security
  • 150 篇 protocols
  • 142 篇 accuracy
  • 140 篇 privacy
  • 139 篇 deep learning
  • 126 篇 training
  • 122 篇 laboratories
  • 106 篇 data models
  • 100 篇 federated learni...
  • 100 篇 cloud computing
  • 95 篇 servers
  • 93 篇 blockchain
  • 91 篇 public key crypt...
  • 88 篇 data privacy

机构

  • 203 篇 shandong provinc...
  • 174 篇 key laboratory o...
  • 158 篇 school of comput...
  • 155 篇 state key labora...
  • 114 篇 school of comput...
  • 106 篇 department of co...
  • 106 篇 school of cyber ...
  • 97 篇 information secu...
  • 80 篇 key laboratory o...
  • 79 篇 institute of inf...
  • 68 篇 guangdong provin...
  • 66 篇 computer network...
  • 65 篇 college of mathe...
  • 64 篇 university of ch...
  • 63 篇 state grid key l...
  • 62 篇 peng cheng labor...
  • 60 篇 key laboratory o...
  • 59 篇 school of softwa...
  • 59 篇 school of comput...
  • 55 篇 key laboratory o...

作者

  • 55 篇 jianfeng ma
  • 54 篇 yang yang
  • 50 篇 ma jianfeng
  • 45 篇 yixian yang
  • 41 篇 zheng wei-shi
  • 41 篇 ding yong
  • 38 篇 huang qingming
  • 33 篇 zhang huanguo
  • 32 篇 wang wei
  • 32 篇 hu yupu
  • 31 篇 cong runmin
  • 31 篇 xu an wang
  • 30 篇 yang yixian
  • 29 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 25 篇 xu li
  • 25 篇 xie xiaohua
  • 24 篇 xinhong hei
  • 23 篇 liu xin

语言

  • 7,214 篇 英文
  • 362 篇 其他
  • 277 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory Computer Network and Information Security"
7840 条 记 录,以下是81-90 订阅
排序:
Resource Allocation for MEC in Ultra-dense networks
收藏 引用
Journal of computers (Taiwan) 2025年 第1期36卷 143-162页
作者: Ma, Huan Li, Shuyun Wang, Zhihui Dou, Xubing Zhang, Xinchang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China Shandong Normal University Jinan China
In the complex context of 5G ultra-dense networks, the unprecedented growth in traffic and computing demand has made the interaction between edge devices and edge servers extremely intricate due to the time-varying na... 详细信息
来源: 评论
Enhanced PIR Scheme Combining SimplePIR and Spiral: Achieving Higher Throughput Without Client Hints  6th
Enhanced PIR Scheme Combining SimplePIR and Spiral: Achievi...
收藏 引用
6th International Conference on Machine Learning for Cyber security, ML4CS 2024
作者: Xu, Haoyao Li, Yitong Tian, Haibo School of Computer Science and Engineering Sun Yat-sen University Guangzhou510006 China Guangdong Province Key Laboratory of Information Security Technology Guangzhou510006 China
In recent years, Private information Retrieval (PIR) schemes capable of rapid response have gotten significant attention, with SimplePIR, for instance, achieving a throughput of approximately 10 GB/s in a single-threa... 详细信息
来源: 评论
Uncertainty-aware coarse-to-fine alignment for text-image person retrieval
收藏 引用
Visual Intelligence 2025年 第1期3卷 1-14页
作者: Deng, Yifei Chen, Zhengyu Li, Chenglong Tang, Jin Information Materials and Intelligent Sensing Laboratory of Anhui Province Anhui Provincial Key Laboratory of Multimodal Cognitive Computation School of Computer Science and Technology Anhui University Hefei 230601 China Information Materials and Intelligent Sensing Laboratory of Anhui Province Anhui Provincial Key Laboratory of Security Artificial Intelligence School of Artificial Intelligence Anhui University Hefei 230601 China
Text-to-image person retrieval, a fine-grained cross-modal retrieval problem, aims to search for person images from an image library that match a given textual caption. Existing text-to-image person retrieval methods ... 详细信息
来源: 评论
Assessment of Multilevel Intransitive Noninterference by Nonblocking Analysis
收藏 引用
IEEE Transactions on Automatic Control 2025年 第5期70卷 2902-2917页
作者: Zhong, Wenjing Zhao, Jinjing Hu, Hesuan Xidian University School of Electro-Mechanical Engineering Xi'an710071 China National Key Laboratory of Science and Technology on Information System Security Beijing100101 China Nanyang Technological University School of Computer Science and Engineering College of Engineering 639798 Singapore Xi'an Jiaotong University State Key Laboratory for Manufacturing Systems Engineering Xi'an710054 China
security of system behavior is a kind of information flow security, which is achieved by confusing the intruders via the indistinguishability of system behaviors. Noninterference is a typical notion to describe inform... 详细信息
来源: 评论
LayerCFL:an efcient federated learning with layer-wised clustering
收藏 引用
Cybersecurity 2025年 第1期8卷 72-85页
作者: Jie Yuan Rui Qian Tingting Yuan Mingliang Sun Jirui Li Xiaoyong Li School of Cyberspace Security Beijing University of Posts and TelecommunicationsBeijingChina Key Laboratory of Trustworthy Distributed Computing and Service(BUPT) Ministry of EducationBeijingChina Institute of Computer Science Faculty of Mathematics and Computer ScienceUniversity of GoettingenGöettingenGermany School of Information Technology Henan University of Chinese MedicineZhengzhouHenanChina
Federated Learning(FL)sufers from the Non-IID problem in practice,which poses a challenge for efcient and accurate model *** address this challenge,prior research has introduced clustered FL(CFL),which involves cluste... 详细信息
来源: 评论
Chain-of-Specificity: Enhancing Task-Specific Constraint Adherence in Large Language Models  31
Chain-of-Specificity: Enhancing Task-Specific Constraint Adh...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Wei, Kaiwen Zhong, Jiang Zhang, Hongzhi Zhang, Di Jin, Li Yu, Yue Zhang, Jingyuan College of Computer Science Chongqing University China Kuaishou Inc. China Key Laboratory of Network Information System Technology Aerospace Information Research Institute Chinese Academy of Sciences China
Large Language Models (LLMs) exhibit remarkable generative capabilities, enabling the generation of valuable information. Despite these advancements, previous research found that LLMs sometimes struggle with adhering ... 详细信息
来源: 评论
A Chain-of-Task Framework for Instruction Tuning of LLMs Based on Chinese Grammatical Error Correction  31
A Chain-of-Task Framework for Instruction Tuning of LLMs Bas...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Liu, Xinpeng Xu, Bing Yang, Muyun Cao, Hailong Zhu, Conghui Zhao, Tiejun Lu, Wenpeng Faculty of Computing Harbin Institute of Technology Harbin China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology Shandong Academy of Sciences Jinan China
Over-correction is a critical issue for large language models (LLMs) to address Grammatical Error Correction (GEC) task, esp. for Chinese. This paper proposes a Chain-of-Task (CoTask) framework to reduce over-correcti... 详细信息
来源: 评论
A Verifiable Decentralized Data Modification Mechanism Supporting Accountability for Securing Industrial IoT  24th
A Verifiable Decentralized Data Modification Mechanism Suppo...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Yang, Changsong Wu, Junfu Liang, Hai Ding, Yong Wang, Yujue Guangxi Key Laboratory of Cryptography and Information Security School of Computer Science and Information Security Guilin University of Electronic Technology Guilin China Guangxi Key Laboratory of Digital Infrastructure Guangxi Zhuang Autonomous Region Information Center Nanning China Institute of Cyberspace Technology HKCT Institute for Higher Education Hong Kong Hangzhou Innovation Institute of Beihang University Hangzhou China
The widespread application of Industrial Internet of Things (IIoT) has profoundly transformed modern industrial production methods. However, the large scale of industrial data, the diversity of data sources, and the h... 详细信息
来源: 评论
A Fine-Grained Ownership Transfer Protocol for Cloud EMRs Auditing  24th
A Fine-Grained Ownership Transfer Protocol for Cloud EMRs A...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Wang, Yamei Zhang, Yuexin You, Weijing Ma, Yunru Wang, Derui Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fujian Normal University Fuzhou China School of Health Fujian Medical University Fuzhou China CSIRO’s Data61 Melbourne Australia
In cloud Electronic Medical Records (EMRs), a user’s medical records typically comprise various types of health-related sensitive data. When data ownership needs to be transferred, it is preferred to transfer the req... 详细信息
来源: 评论
Confidence-Guided Feature Alignment for Cloth-Changing Person Re-identification  27th
Confidence-Guided Feature Alignment for Cloth-Changing Pers...
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Huang, Sirong Zheng, Huicheng School of Computer Science and Engineering Sun Yat-Sen University Guangzhou China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education Guangzhou China Guangdong Province Key Laboratory of Information Security Technology Guangzhou China
Much progress has been made in the field of person re-identification, but changes in clothing have hindered the practical application of long-term person re-identification. Cloth-changing person re-identification (CC-... 详细信息
来源: 评论