咨询与建议

限定检索结果

文献类型

  • 3,825 篇 会议
  • 1,883 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 5,709 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,660 篇 工学
    • 2,571 篇 计算机科学与技术...
    • 2,061 篇 软件工程
    • 982 篇 信息与通信工程
    • 529 篇 电气工程
    • 428 篇 控制科学与工程
    • 408 篇 电子科学与技术(可...
    • 338 篇 生物工程
    • 257 篇 机械工程
    • 250 篇 网络空间安全
    • 181 篇 仪器科学与技术
    • 157 篇 光学工程
    • 154 篇 生物医学工程(可授...
    • 139 篇 安全科学与工程
    • 134 篇 动力工程及工程热...
    • 127 篇 化学工程与技术
    • 118 篇 交通运输工程
    • 107 篇 建筑学
    • 105 篇 材料科学与工程(可...
    • 93 篇 土木工程
  • 1,631 篇 理学
    • 969 篇 数学
    • 365 篇 生物学
    • 336 篇 物理学
    • 321 篇 统计学(可授理学、...
    • 170 篇 系统科学
    • 141 篇 化学
  • 894 篇 管理学
    • 569 篇 管理科学与工程(可...
    • 368 篇 图书情报与档案管...
    • 195 篇 工商管理
  • 195 篇 法学
    • 125 篇 社会学
  • 124 篇 医学
    • 101 篇 临床医学
  • 78 篇 经济学
  • 53 篇 军事学
  • 43 篇 农学
  • 22 篇 教育学
  • 11 篇 文学
  • 9 篇 艺术学

主题

  • 240 篇 feature extracti...
  • 140 篇 semantics
  • 138 篇 security
  • 137 篇 computational mo...
  • 127 篇 accuracy
  • 126 篇 cryptography
  • 117 篇 deep learning
  • 116 篇 authentication
  • 116 篇 training
  • 111 篇 data models
  • 108 篇 protocols
  • 96 篇 privacy
  • 87 篇 simulation
  • 85 篇 information secu...
  • 81 篇 laboratories
  • 78 篇 neural networks
  • 78 篇 network security
  • 75 篇 federated learni...
  • 73 篇 data mining
  • 69 篇 wireless communi...

机构

  • 277 篇 shandong provinc...
  • 225 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 190 篇 school of inform...
  • 93 篇 shandong provinc...
  • 82 篇 key laboratory o...
  • 70 篇 college of compu...
  • 68 篇 state grid key l...
  • 59 篇 information secu...
  • 56 篇 college of mathe...
  • 54 篇 ministry of educ...
  • 53 篇 school of comput...
  • 52 篇 tianjin key labo...
  • 51 篇 shandong fundame...
  • 50 篇 chongqing key la...
  • 49 篇 network and data...
  • 49 篇 school of commun...
  • 45 篇 shandong enginee...
  • 45 篇 fujian provincia...
  • 45 篇 state grid key l...

作者

  • 62 篇 yang bo
  • 55 篇 bo yang
  • 55 篇 meng deyu
  • 41 篇 guan xiaohong
  • 41 篇 yang xiaoyuan
  • 38 篇 ruyan wang
  • 37 篇 feng zhiquan
  • 37 篇 xiaohong guan
  • 37 篇 xu li
  • 35 篇 xu an wang
  • 35 篇 lin wang
  • 33 篇 ma kun
  • 33 篇 dapeng wu
  • 33 篇 wang lin
  • 32 篇 wenjie wang
  • 32 篇 yixian yang
  • 31 篇 xiaoyuan yang
  • 30 篇 hui-ming wang
  • 30 篇 chen yuehui
  • 30 篇 wang hui-ming

语言

  • 5,294 篇 英文
  • 264 篇 其他
  • 162 篇 中文
  • 2 篇 斯洛文尼亚文
检索条件"机构=Key Laboratory for Intelligent Network and Network Security"
5709 条 记 录,以下是11-20 订阅
排序:
Blockchain and signcryption enabled asynchronous federated learning framework in fog computing
收藏 引用
Digital Communications and networks 2025年 第2期11卷 442-454页
作者: Zhou Zhou Youliang Tian Jinbo Xiong Changgen Peng Jing Li Nan Yang State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang 550025China Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber SecurityFujian Normal UniversityFuzhou 350117China Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic TechnologyGuilin 541004China
Federated learning combines with fog computing to transform data sharing into model sharing,which solves the issues of data isolation and privacy disclosure in fog ***,existing studies focus on centralized single-laye... 详细信息
来源: 评论
A New Edge Perturbation Mechanism for Privacy-Preserving Data Collection in IOT
收藏 引用
Chinese Journal of Electronics 2023年 第3期32卷 603-612页
作者: CHEN Qiuling YE Ayong ZHANG Qiang HUANG Chuan College of Computer and Cyber Security Fujian Normal University Fujian Provincial Key Laboratory of Network Security and Cryptology
A growing amount of data containing the sensitive information of users is being collected by emerging smart connected devices to the center server in Internet of things(IoT) era, which raises serious privacy concerns ... 详细信息
来源: 评论
Pilot Backdoor Attack against Deep Reinforcement Learning Empowered intelligent Reflection Surface for Smart Radio
收藏 引用
IEEE Transactions on Wireless Communications 2025年 第6期24卷 4891-4903页
作者: Huang, Yunsong Wang, Hui-Ming Wang, Zhaowei Liu, Weicheng Xi’an Jiaotong University School of Information and Communications Engineering Xi’an710049 China Xi’an Jiaotong University Ministry of Education Key Laboratory for Intelligent Networks and Network Security Xi’an710049 China
intelligent reflection surface (IRS) has been used to assist communication by reflection and beamforming where a direct path is not available. Thus, IRS adjusts the wireless channel to enhance the data transmission ef... 详细信息
来源: 评论
An Enhanced Clustering-Based (k, t)-Anonymity Algorithm for Graphs
收藏 引用
Chinese Journal of Electronics 2025年 第1期34卷 365-372页
作者: Yuanyuan Wang Xing Zhang Zhiguang Chu Wei Shi Xiang Li School of Electronics and Information Engineering Liaoning University of Technology Key Laboratory of Security for Network and Data in Industrial Internet of Liaoning Province Faculty of Information Technology Beijing University of Technology
As people become increasingly reliant on the Internet, securely storing and publishing private data has become an important issue. In real life, the release of graph data can lead to privacy breaches, which is a highl... 详细信息
来源: 评论
A new quantum key distribution resource allocation and routing optimization scheme
收藏 引用
Chinese Physics B 2024年 第3期33卷 244-259页
作者: 毕琳 袁晓同 吴炜杰 林升熙 School of Computer Science and Technology Changchun University of Science and TechnologyChangchun 130012China Key Laboratory of Network and Information Security in Jilin Province Changchun 130012China
Quantum key distribution(QKD)is a technology that can resist the threat of quantum computers to existing conventional cryptographic ***,due to the stringent requirements of the quantum key generation environment,the g... 详细信息
来源: 评论
TMC-GCN: Encrypted Traffic Mapping Classification Method Based on Graph Convolutional networks
收藏 引用
Computers, Materials & Continua 2025年 第2期82卷 3179-3201页
作者: Baoquan Liu Xi Chen Qingjun Yuan Degang Li Chunxiang Gu School of Cyberspace Security Zhengzhou UniversityZhengzhou450002China School of Cyberspace Security Information Engineering UniversityZhengzhou450001China Henan Key Laboratory of Network Cryptography Technology Zhengzhou450001China
With the emphasis on user privacy and communication security, encrypted traffic has increased dramatically, which brings great challenges to traffic classification. The classification method of encrypted traffic based... 详细信息
来源: 评论
Block-gram:Mining knowledgeable features for efficiently smart contract vulnerability detection
收藏 引用
Digital Communications and networks 2025年 第1期11卷 1-12页
作者: Xueshuo Xie Haolong Wang Zhaolong Jian Yaozheng Fang Zichun Wang Tao Li Tianjin Key Laboratory of Network and Data Security Technology TianjinChina College of Computer Science Nankai UniversityTianjinChina Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province China State Key Laboratory of Computer Architecture Institute of Computing TechnologyChinese Academy of SciencesChina
Smart contracts are widely used on the blockchain to implement complex transactions,such as decentralized applications on *** vulnerability detection of large-scale smart contracts is critical,as attacks on smart cont... 详细信息
来源: 评论
High capacity reversible data hiding in encrypted images based on adaptive quadtree partitioning and MSB prediction
收藏 引用
Frontiers of Information Technology & Electronic Engineering 2023年 第8期24卷 1156-1168页
作者: Kaili QI Minqing ZHANG Fuqiang DI Yongjun KONG Key Laboratory of Network&Information Security under Chinese People Armed Police Force Engineering University of PAPXi’an710086China
To improve the embedding capacity of reversible data hiding in encrypted images(RDH-EI),a new RDH-EI scheme is proposed based on adaptive quadtree partitioning and most significant bit(MSB)***,according to the smoothn... 详细信息
来源: 评论
Threat Model and Defense Scheme for Side-Channel Attacks in Client-Side Deduplication
收藏 引用
Tsinghua Science and Technology 2023年 第1期28卷 1-12页
作者: Guanxiong Ha Hang Chen Chunfu Jia Mingyue Li College of Cyber Science Nankai UniversityTianjin 300350China Tianjin Key Laboratory of Network and Data Security Technology Tianjin 300350China
In cloud storage,client-side deduplication is widely used to reduce storage and communication *** client-side deduplication,if the cloud server detects that the user’s outsourced data have been stored,then clients wi... 详细信息
来源: 评论
Reversible Data Hiding Algorithm in Encrypted Images Based on Adaptive Median Edge Detection and Ciphertext-Policy Attribute-Based Encryption
收藏 引用
Computers, Materials & Continua 2024年 第10期81卷 1123-1155页
作者: Zongbao Jiang Minqing Zhang Weina Dong Chao Jiang Fuqiang Di Key Laboratory of Network and Information Security of People’s Armed Police Chinese People’s Armed Police Force Engineering UniversityXi’an710086China
With the rapid advancement of cloud computing technology,reversible data hiding algorithms in encrypted images(RDH-EI)have developed into an important field of study concentrated on safeguarding privacy in distributed... 详细信息
来源: 评论