咨询与建议

限定检索结果

文献类型

  • 1,808 篇 会议
  • 1,605 篇 期刊文献

馆藏范围

  • 3,413 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,235 篇 工学
    • 1,581 篇 计算机科学与技术...
    • 1,259 篇 软件工程
    • 589 篇 信息与通信工程
    • 315 篇 电气工程
    • 242 篇 电子科学与技术(可...
    • 239 篇 控制科学与工程
    • 194 篇 生物工程
    • 161 篇 机械工程
    • 139 篇 网络空间安全
    • 111 篇 仪器科学与技术
    • 107 篇 光学工程
    • 98 篇 生物医学工程(可授...
    • 77 篇 化学工程与技术
    • 76 篇 核科学与技术
    • 71 篇 交通运输工程
    • 70 篇 动力工程及工程热...
    • 69 篇 安全科学与工程
    • 48 篇 材料科学与工程(可...
  • 1,125 篇 理学
    • 546 篇 数学
    • 381 篇 物理学
    • 214 篇 生物学
    • 171 篇 统计学(可授理学、...
    • 106 篇 系统科学
    • 82 篇 化学
  • 590 篇 管理学
    • 366 篇 管理科学与工程(可...
    • 258 篇 图书情报与档案管...
    • 114 篇 工商管理
  • 90 篇 法学
  • 81 篇 医学
    • 64 篇 临床医学
    • 53 篇 基础医学(可授医学...
  • 52 篇 经济学
    • 52 篇 应用经济学
  • 27 篇 军事学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 文学
  • 9 篇 艺术学

主题

  • 142 篇 feature extracti...
  • 123 篇 semantics
  • 106 篇 hadron colliders
  • 103 篇 accuracy
  • 96 篇 computational mo...
  • 91 篇 training
  • 84 篇 deep learning
  • 71 篇 data models
  • 63 篇 federated learni...
  • 52 篇 neural networks
  • 51 篇 security
  • 49 篇 privacy
  • 45 篇 predictive model...
  • 45 篇 adaptation model...
  • 43 篇 optimization
  • 42 篇 blockchain
  • 42 篇 robustness
  • 41 篇 protocols
  • 41 篇 cloud computing
  • 40 篇 cryptography

机构

  • 192 篇 shandong provinc...
  • 176 篇 key laboratory o...
  • 153 篇 centro brasileir...
  • 153 篇 yerevan physics ...
  • 152 篇 national and kap...
  • 152 篇 istanbul technic...
  • 151 篇 university of sp...
  • 151 篇 academy of scien...
  • 150 篇 universidad iber...
  • 150 篇 indian institute...
  • 149 篇 charles universi...
  • 149 篇 department of ph...
  • 148 篇 brunel universit...
  • 148 篇 university of de...
  • 146 篇 rwth aachen univ...
  • 144 篇 imperial college...
  • 141 篇 università di to...
  • 141 篇 zhejiang univers...
  • 141 篇 indian institute...
  • 138 篇 infn sezione di ...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 110 篇 e. migliore
  • 110 篇 p. avery
  • 110 篇 l. silvestris

语言

  • 3,151 篇 英文
  • 167 篇 其他
  • 102 篇 中文
检索条件"机构=Key Laboratory of Computer Network Technology"
3413 条 记 录,以下是1-10 订阅
排序:
Block-gram:Mining knowledgeable features for efficiently smart contract vulnerability detection
收藏 引用
Digital Communications and networks 2025年 第1期11卷 1-12页
作者: Xueshuo Xie Haolong Wang Zhaolong Jian Yaozheng Fang Zichun Wang Tao Li Tianjin Key Laboratory of Network and Data Security Technology TianjinChina College of Computer Science Nankai UniversityTianjinChina Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province China State Key Laboratory of Computer Architecture Institute of Computing TechnologyChinese Academy of SciencesChina
Smart contracts are widely used on the blockchain to implement complex transactions,such as decentralized applications on *** vulnerability detection of large-scale smart contracts is critical,as attacks on smart cont... 详细信息
来源: 评论
Blockchain and signcryption enabled asynchronous federated learning framework in fog computing
收藏 引用
Digital Communications and networks 2025年 第2期11卷 442-454页
作者: Zhou Zhou Youliang Tian Jinbo Xiong Changgen Peng Jing Li Nan Yang State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fujian Normal University Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology
Federated learning combines with fog computing to transform data sharing into model sharing, which solves the issues of data isolation and privacy disclosure in fog computing. However, existing studies focus on centra... 详细信息
来源: 评论
Weighted Attribute Based Conditional Proxy Re-Encryption in the Cloud
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 1399-1414页
作者: Xixi Yan Jing Zhang Pengyu Cheng Henan Key Laboratory of Network Cryptography Technology Network Information Security and Cryptography LaboratorySchool of SoftwareHenan Polytechnic UniversityJiaozuo454003China School of Computer Science and Technology Henan Polytechnic UniversityJiaozuo454000China
Conditional proxy re-encryption(CPRE)is an effective cryptographic primitive language that enhances the access control mechanism and makes the delegation of decryption permissions more granular,but most of the attribu... 详细信息
来源: 评论
TRBFT: An Efficient Blockchain Consensus for Edge Computing-Enabled IoT Systems
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 15853-15868页
作者: Zheng, Jiali Zhang, Yuxi Guangxi University Guangxi Key Laboratory of Multimedia Communications and Network Technology School of Computer Electronics and Information Guangxi Nanning530004 China
With the continuous expansion of the Internet of Things (IoT), and despite reductions in communication latency enabled by edge computing, the decentralized nature of node structures poses significant security challeng... 详细信息
来源: 评论
DMF: A Deep Multimodal Fusion-Based network Traffic Classification Model
收藏 引用
computers, Materials & Continua 2025年 第5期83卷 2267-2285页
作者: Xiangbin Wang Qingjun Yuan Weina Niu Qianwei Meng Yongjuan Wang Chunxiang Gu Henan Key Laboratory of Network Cryptography Technology Information Engineering UniversityZhengzhou450001China School of Computer Science and Engineering University of Electronic Science and Technology of ChinaChengdu611731China
With the rise of encrypted traffic,traditional network analysis methods have become less effective,leading to a shift towards deep learning-based *** these,multimodal learning-based classification methods have gained ... 详细信息
来源: 评论
THL: Fast Targeted High Utility Itemset Mining within Length Consideration
Journal of Network Intelligence
收藏 引用
Journal of network Intelligence 2025年 第1期10卷 541-558页
作者: Xu, Peiming Jiang, Yixin Kuang, Xiaoyun Luo, Yu Chen, Jiahui Guangdong Provincial Key Laboratory of Power System Network Security CSG Guangzhou510000 China School of Computer Science and Technology Guangdong University of Technology Guangzhou510006 China
High utility itemset mining is a research topic of the pattern mining domain, which has been widely applied in reality during the past decade. Although most high utility itemset mining algorithms show significant exec... 详细信息
来源: 评论
Efficient and fine-grained access control with fully-hidden policies for cloud-enabled IoT
收藏 引用
Digital Communications and networks 2025年 第2期11卷 473-481页
作者: Qi Li Gaozhan Liu Qianqian Zhang Lidong Han Wei Chen Rui Li Jinbo Xiong School of Computer Science Nanjing University of Posts and Telecommunications Key Laboratory of Cryptography of Zhejiang Province Hangzhou Normal University Tongda College of Nanjing University of Posts and Telecommunications Henan Key Laboratory of Network Cryptography Technology School of Computer Science and Technology Xidian University State Key Laboratory of Tibetan Intelligent Information Processing and Application Qinghai Normal University Faculty of Software Fujian Normal University
Ciphertext-Policy Attribute-Based Encryption(CP-ABE) enables fine-grained access control on ciphertexts, making it a promising approach for managing data stored in the cloud-enabled Internet of Things. But existing sc... 详细信息
来源: 评论
Fusion of Time-Frequency Features in Contrastive Learning for Shipboard Wind Speed Correction
收藏 引用
Journal of Ocean University of China 2025年 第2期24卷 377-386页
作者: SONG Jian HUANG Meng LI Xiang ZHANG Zhenqiang WANG Chunxiao ZHAO Zhigang Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science Center(National Supercomputer Center in Jinan)Qilu University of Technology(Shandong Academy of Sciences)Jinan 250000China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer ScienceJinan 250000China
Accurate wind speed measurements on maritime vessels are crucial for weather forecasting,sea state prediction,and safe ***,vessel motion and challenging environmental conditions often affect measurement *** address th... 详细信息
来源: 评论
Adaptive VDI Session Placement via User Logoff Prediction
收藏 引用
Machine Intelligence Research 2025年 第1期22卷 189-200页
作者: Wenping Fan Puhui Meng Yu Tian Min-Ling Zhang Yao Zhang School of Computer Science and Engineering Southeast UniversityNanjing210096China VMware Information Technology(China)Limited Beijing100190China Key Laboratory of Computer Network and Information Integration(Southeast University) Ministry of EducationNanjing210096China
After the global pandemic,DaaS(desktop as a service)has become the first choice of many companies’remote working *** the desktops are usually deployed in the public cloud when using DaaS,customers are more cost-sensi... 详细信息
来源: 评论
Edge-Cloud Cooperation-Driven Intelligent Sustainability Evaluation Strategy Based on IoT and CPS for Energy-Intensive Manufacturing Industries
收藏 引用
IEEE Internet of Things Journal 2025年 第9期12卷 12287-12297页
作者: Ma, Shuaiyin Huang, Yuming Chen, Yanping Xiao, Qinge Xu, Jun Leng, Jiewu Xi’an University of Posts and Telecommunications Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi’an Key Laboratory of Big Data and Intelligent Computing School of Computer Science and Technology Xi’an710121 China Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Shenzhen518055 China Xidian University Advanced Manufacturing Technology Innovation Center Guangzhou Institute of Technology Guangzhou510555 China Guangdong University of Technology Guangdong Provincial Key Laboratory of Computer Integrated Manufacturing System State Key Laboratory of Precision Electronic Manufacturing Technology and Equipment Guangzhou510006 China
The advancement of the Industry 5.0 in information technology has led to increased interest in integrating edge-cloud cooperation with Internet of Things (IoT) and cyber-physical system (CPS) designs. This integration... 详细信息
来源: 评论