咨询与建议

限定检索结果

文献类型

  • 4,432 篇 会议
  • 3,329 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,769 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,212 篇 工学
    • 3,916 篇 计算机科学与技术...
    • 3,130 篇 软件工程
    • 1,329 篇 信息与通信工程
    • 645 篇 电气工程
    • 541 篇 控制科学与工程
    • 523 篇 电子科学与技术(可...
    • 442 篇 网络空间安全
    • 439 篇 生物工程
    • 298 篇 机械工程
    • 230 篇 光学工程
    • 224 篇 仪器科学与技术
    • 188 篇 生物医学工程(可授...
    • 162 篇 安全科学与工程
    • 148 篇 动力工程及工程热...
    • 144 篇 化学工程与技术
    • 126 篇 建筑学
    • 124 篇 交通运输工程
  • 2,279 篇 理学
    • 1,360 篇 数学
    • 498 篇 物理学
    • 475 篇 生物学
    • 420 篇 统计学(可授理学、...
    • 208 篇 系统科学
    • 165 篇 化学
  • 1,326 篇 管理学
    • 809 篇 管理科学与工程(可...
    • 573 篇 图书情报与档案管...
    • 289 篇 工商管理
  • 287 篇 法学
    • 167 篇 社会学
    • 118 篇 法学
  • 153 篇 医学
    • 126 篇 临床医学
  • 116 篇 经济学
    • 116 篇 应用经济学
  • 98 篇 军事学
  • 53 篇 农学
  • 42 篇 教育学
  • 24 篇 文学
  • 22 篇 艺术学

主题

  • 237 篇 feature extracti...
  • 227 篇 semantics
  • 216 篇 cryptography
  • 182 篇 authentication
  • 181 篇 information secu...
  • 161 篇 computational mo...
  • 157 篇 security
  • 150 篇 protocols
  • 142 篇 accuracy
  • 141 篇 privacy
  • 139 篇 deep learning
  • 125 篇 training
  • 122 篇 laboratories
  • 105 篇 data models
  • 99 篇 federated learni...
  • 99 篇 cloud computing
  • 94 篇 servers
  • 93 篇 blockchain
  • 92 篇 public key crypt...
  • 88 篇 data privacy

机构

  • 202 篇 shandong provinc...
  • 173 篇 key laboratory o...
  • 158 篇 school of comput...
  • 156 篇 state key labora...
  • 113 篇 school of comput...
  • 106 篇 department of co...
  • 106 篇 school of cyber ...
  • 97 篇 information secu...
  • 80 篇 key laboratory o...
  • 78 篇 institute of inf...
  • 69 篇 guangdong provin...
  • 65 篇 college of mathe...
  • 65 篇 state grid key l...
  • 64 篇 computer network...
  • 64 篇 university of ch...
  • 60 篇 key laboratory o...
  • 60 篇 peng cheng labor...
  • 59 篇 school of softwa...
  • 59 篇 school of comput...
  • 54 篇 key laboratory o...

作者

  • 55 篇 jianfeng ma
  • 53 篇 yang yang
  • 48 篇 ma jianfeng
  • 45 篇 yixian yang
  • 42 篇 ding yong
  • 41 篇 zheng wei-shi
  • 38 篇 huang qingming
  • 31 篇 cong runmin
  • 31 篇 zhang huanguo
  • 31 篇 xu an wang
  • 31 篇 hu yupu
  • 31 篇 yang yixian
  • 30 篇 wang wei
  • 28 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 26 篇 xu li
  • 26 篇 xie xiaohua
  • 24 篇 xinhong hei
  • 23 篇 liu xin

语言

  • 7,157 篇 英文
  • 349 篇 其他
  • 278 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory Computer Network and Information Security"
7769 条 记 录,以下是81-90 订阅
排序:
PyionNet: Pyramid Progressive Cross-Fusion network for Joint Classification of Hyperspectral and LiDAR Data
收藏 引用
IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing 2025年 18卷 12042-12058页
作者: Pan, Haizhu Zhang, Quanxiu Ge, Haimiao Liu, Moqi Shi, Cuiping Qiqihar University College of Computer and Control Engineering Qiqihar161000 China Qiqihar University Heilongjiang Key Laboratory of Big Data Network Security Detection and Analysis Qiqihar161000 China Xi'an Jiaotong University School of Information and Communications Engineering Shanxi Xi'an710049 China Huzhou University College of Information Engineering Huzhou313000 China
Joint hyperspectral (HS) and Light Detection and Ranging (LiDAR) data for land cover classification have received widespread attention. Nevertheless, existing methods often struggle with multi-scale feature extraction... 详细信息
来源: 评论
A two-path fiber-optic AE demodulation algorithm based on Numerically Stable Direct Least Squares Fitting of Ellipses
收藏 引用
Journal of Lightwave Technology 2025年
作者: Li, Xinhao Zhang, Faxiang Sun, Zhihui Jiang, Shaodong Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
The 3 × 3 coupler demodulation algorithm commonly employs ellipse fitting algorithms (EFAs) to eliminate coupler asymmetry. In the detection scenario of fiber-optic acoustic emission (AE) sensor arrays, the amoun... 详细信息
来源: 评论
A Fast recognition method for DVS perimeter security intrusion signals based on transfer learning
收藏 引用
Optical Fiber Technology 2025年 93卷
作者: Shen, Yongxu Wang, Chang Sun, Zhihui Zhang, Faxiang Jiang, Shaodong Liu, Xu Gao, Fengxia Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
In the perimeter security intrusion signal monitoring based on the Distributed Optical Fiber Vibration Sensing (DVS) system, the common approach for identifying intrusion signals in new scenarios is to collect large a... 详细信息
来源: 评论
Non-Deterministic Symmetric Encryption Communication System Based on Generative Adversarial networks
收藏 引用
China Communications 2025年 第5期22卷 273-284页
作者: Wu Xuguang Han Yiliang Zhang Minqing Zhu Shuaishuai Li Yu College of Cryptography Engineering Engineering University of People’s Armed PoliceXi’an 710086China Key Laboratory of Network and Information Security Under the People’s Armed Police Xi’an 710086China
Symmetric encryption algorithms learned by the previous proposed end-to-end adversarial network encryption communication systems are *** the same key and same plaintext,the deterministic algorithm will lead to the sam... 详细信息
来源: 评论
A New CP-Based Non-Overlapping FBMC-QAM System for Future Wireless Communications
收藏 引用
China Communications 2025年 第5期22卷 108-127页
作者: Ren Defeng Li Jing Sun Chuiqiang Zhang Guohua Shaanxi Key Laboratory of Information Communication Network and Security Xi’an University of Posts and TelecommunicationsXi’an 710121China State Key Laboratory of Integrated Services Networks Xidian UniversityXi’an 710071China China Academy of Space Technology(Xi’an) Xi’an 710000China
A new cyclic prefix(CP)-based nonoverlapping FBMC-QAM(CP-NO-FBMC-QAM)system with two prototype filters is proposed in this paper,which satisfies complex orthogonality conditions and good frequency energy confinement a... 详细信息
来源: 评论
Maximizing Area Coverage in Privacy-Preserving Worker Recruitment: A Prior Knowledge-Enhanced Geo-indistinguishable Approach
收藏 引用
IEEE Transactions on information Forensics and security 2025年 20卷 5138-5151页
作者: Zhang, Pengfei Cheng, Xiang Zhang, Zhikun Zhu, Youwen Zhang, Ji Anhui University of Science and Technology State Key Laboratory of Digital Intelligent Technology for Unmanned Coal Mining the School of Computer Science and Engineering Anhui University of Science and Technology Huainan232001 China Yunnan University of Finance and Economics Yunnan Key Laboratory of Service Computing Yunnan 650221 China Key Laboratory of Equipment Data Security and Guarantee Technology Ministry of Education Key Laboratory of Computing Power Network and Information Security Ministry of Education China Beijing University of Posts and Telecommunications China Zhejiang University China Nanjing University of Aeronautics and Astronautics China University of Southern Queensland China
Worker recruitment for area coverage maximization, typically requires participants to upload location information, which can deter potential participation without proper protection. While existing studies resort to ge... 详细信息
来源: 评论
Optimizing Indoor network Element Layout for Enhanced Signal Coverage and security in Location-Based Services  7th
Optimizing Indoor Network Element Layout for Enhanced Signa...
收藏 引用
7th International Conference on Attacks and Defenses for Internet-of-Things, ADIoT 2024
作者: Yu, Xiaomin Yu, Xiaokun College of Computer and Control Engineering Qiqihar University Qiqihar China Heilongjiang Key Laboratory of Big Data Network Security Detection and Analysis Qiqihar University Qiqihar China Heilongjiang Jiaotong Polytechnic Qiqihar China
Recently, with the rapid development of communication technology, location-based services (LBS) in indoor environments have penetrated into various aspects of people’s daily lives. Wireless local area networks (WLAN)... 详细信息
来源: 评论
Enhancing Federated Learning Generalization through Momentum Alignment in 6G networks
收藏 引用
IEEE network 2025年
作者: Jiang, Lei Wang, Xiaoding Lin, Hui Fujian Normal University Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fujian Fuzhou350117 China
As artificial intelligence (AI) technology continues to advance and the demand for AI applications grows, the development of sixth-generation (6G) wireless networks has become increasingly targeted. These networks are... 详细信息
来源: 评论
An overview on IRS-enabled sensing and communications for 6G: architectures, fundamental limits, and joint beamforming designs
收藏 引用
Science China(information Sciences) 2025年 第5期68卷 170-193页
作者: Xianxin SONG Yuan FANG Feng WANG Zixiang REN Xianghao YU Ye ZHANG Fan LIU Jie XU Derrick Wing Kwan NG Rui ZHANG Shuguang CUI School of Science and Engineering (SSE) Shenzhen Future Network of Intelligence Institute (FNii-Shenzhen)and Guangdong Provincial Key Laboratory of Future Networks of Intelligence The Chinese University of Hong Kong Department of Electrical Engineering City University of Hong Kong School of Information Engineering Guangdong University of Technology Key Laboratory of Wireless-Optical Communications Chinese Academy of Sciences School of Information Science and Technology University of Science and Technology of China Computer School Beijing Information Science and Technology University National Mobile Communications Research Laboratory School of Information Science and Engineering Southeast University School of Electrical Engineering and Telecommunications University of New South Wales School of Science and Engineering Shenzhen Research Institute of Big Data The Chinese University of Hong Kong Department of Electrical and Computer Engineering National University of Singapore
This study presents an overview on intelligent reflecting surface(IRS)-enabled sensing and communication for the forthcoming sixth-generation(6G) wireless networks, in which IRSs are strategically deployed to proactiv... 详细信息
来源: 评论
Research on Collaborative Filtering Algorithm of E-commerce Based on Flink  13
Research on Collaborative Filtering Algorithm of E-commerce ...
收藏 引用
13th International Conference on Intelligent Control and information Processing, ICICIP 2025
作者: Zheng, Haohao Luo, Xiaonan Zhu, Xiaoshu School of Computer Science and Information Security Guilin University of Electronic Technology Guilin China Guangxi Key Laboratory of Image and Graphic Intelligent Processing Guilin University of Electronic Technology Guilin China
In online shopping, a person's interest in a product is closely related to whether they will purchase it Analyzing people's interest in various products on time, along with product recommendations, can increas... 详细信息
来源: 评论