咨询与建议

限定检索结果

文献类型

  • 1,806 篇 会议
  • 1,563 篇 期刊文献

馆藏范围

  • 3,369 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,193 篇 工学
    • 1,549 篇 计算机科学与技术...
    • 1,250 篇 软件工程
    • 573 篇 信息与通信工程
    • 290 篇 电气工程
    • 233 篇 电子科学与技术(可...
    • 232 篇 控制科学与工程
    • 193 篇 生物工程
    • 159 篇 机械工程
    • 133 篇 网络空间安全
    • 111 篇 仪器科学与技术
    • 104 篇 光学工程
    • 98 篇 生物医学工程(可授...
    • 76 篇 化学工程与技术
    • 76 篇 核科学与技术
    • 70 篇 动力工程及工程热...
    • 67 篇 交通运输工程
    • 65 篇 安全科学与工程
  • 1,108 篇 理学
    • 533 篇 数学
    • 376 篇 物理学
    • 212 篇 生物学
    • 165 篇 统计学(可授理学、...
    • 106 篇 系统科学
    • 81 篇 化学
  • 582 篇 管理学
    • 361 篇 管理科学与工程(可...
    • 252 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 91 篇 法学
    • 48 篇 法学
  • 76 篇 医学
    • 61 篇 临床医学
    • 50 篇 基础医学(可授医学...
  • 50 篇 经济学
    • 50 篇 应用经济学
  • 27 篇 军事学
  • 25 篇 农学
  • 15 篇 教育学
  • 13 篇 文学
  • 9 篇 艺术学

主题

  • 141 篇 feature extracti...
  • 122 篇 semantics
  • 106 篇 hadron colliders
  • 103 篇 accuracy
  • 95 篇 computational mo...
  • 88 篇 training
  • 82 篇 deep learning
  • 70 篇 data models
  • 61 篇 federated learni...
  • 52 篇 neural networks
  • 51 篇 security
  • 49 篇 privacy
  • 45 篇 adaptation model...
  • 43 篇 optimization
  • 43 篇 predictive model...
  • 41 篇 protocols
  • 41 篇 cloud computing
  • 41 篇 robustness
  • 40 篇 blockchain
  • 40 篇 cryptography

机构

  • 192 篇 shandong provinc...
  • 174 篇 key laboratory o...
  • 151 篇 centro brasileir...
  • 151 篇 yerevan physics ...
  • 150 篇 national and kap...
  • 150 篇 istanbul technic...
  • 149 篇 university of sp...
  • 149 篇 academy of scien...
  • 148 篇 universidad iber...
  • 148 篇 indian institute...
  • 147 篇 charles universi...
  • 147 篇 department of ph...
  • 146 篇 brunel universit...
  • 146 篇 university of de...
  • 144 篇 rwth aachen univ...
  • 142 篇 imperial college...
  • 139 篇 università di to...
  • 139 篇 zhejiang univers...
  • 139 篇 indian institute...
  • 136 篇 infn sezione di ...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 111 篇 e. migliore
  • 111 篇 p. avery
  • 111 篇 l. silvestris

语言

  • 3,116 篇 英文
  • 158 篇 其他
  • 103 篇 中文
检索条件"机构=Key Laboratory of Computer Network Technology"
3369 条 记 录,以下是121-130 订阅
排序:
Infringement Detection and Traceability Scheme Based on Ciphertext Feature Extraction  9
Infringement Detection and Traceability Scheme Based on Ciph...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Wang, Lianhai Wang, Xinlei Liu, Tianrui Wang, Yingxiaochun Li, Qi Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
The rapid growth of healthcare data transactions has fostered win-win developments in healthcare technology innovation and economic benefits. However, the issue of secondary transactions makes data ownership vulnerabl... 详细信息
来源: 评论
Differentially Private and Heterogeneity-Robust Federated Learning With Theoretical Guarantee
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第12期5卷 6369-6384页
作者: Wang, Xiuhua Wang, Shuai Li, Yiwei Fan, Fengrui Li, Shikang Lin, Xiaodong Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China University of Electronic Science and Technology of China National Key Laboratory of Wireless Communications Chengdu611731 China Xiamen University of Technology Fujian Key Laboratory of Communication Network and Information Processing Xiamen361024 China University of Guelph School of Computer Science GuelphONN1G 2W1 Canada
Federated learning (FL) is a popular distributed paradigm where enormous clients collaboratively train a machine learning (ML) model under the orchestration of a central server without knowing the clients' private... 详细信息
来源: 评论
Block-gram: Mining Knowledgeable Features for Smart Contract Vulnerability Detection  7th
Block-gram: Mining Knowledgeable Features for Smart Contrac...
收藏 引用
7th International Conference on Smart Computing and Communication, SmartCom 2022
作者: Li, Tao Wang, Haolong Fang, Yaozheng Jian, Zhaolong Wang, Zichun Xie, Xueshuo Tianjin Key Laboratory of Network and Data Security Technology Tianjin China College of Computer Science Nankai University Tianjin China Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province Hangzhou China State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing China
Effective vulnerability detection of large-scale smart contracts is critical because smart contract attacks frequently bring about tremendous economic loss. However, code analysis requiring traversal paths and learnin... 详细信息
来源: 评论
Minimum Path Cost Multi-path Routing Algorithm with No Intersecting Links in Quantum key Distribution networks  6
Minimum Path Cost Multi-path Routing Algorithm with No Inter...
收藏 引用
2023 IEEE 6th International Conference on Information Systems and computer Aided Education, ICISCAE 2023
作者: Miao, Minghui Fang, Shuo Wu, Weijie Yuan, Xiaotong Bi, Lin Key Laboratory of Network and Information Security in Jilin Province Changchun China Changchun University of Science and Technology School of Computer Science and Technology Jilin Changchun China
Quantum key distribution (QKD) provides information-theoretic security based on quantum mechanics, and as quantum key distribution becomes increasingly practical, questions of how to employ it effectively over largesc... 详细信息
来源: 评论
MSPL: Multi-modal Statistical Prompt Learning for New Energy Equipment Defect Recognition
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 16438-16450页
作者: Wang, Zhenwei Wang, Pengfei Han, Guangjie Zhou, Chengjie Lin, Qing Zhang, Jianxin Fan, Guangjie Zhang, Qiang Dalian University of Technology School of Computer Science and Technology Dalian116024 China Dalian116024 China Shenyang Huayan Electric Technology Co Ltd Shenyang110180 China Hohai University Key Laboratory of Maritime Intelligent Network Information Technology Ministry of Education China Deputy Director of the Yantai Big Data Center and Senior Engineer Yantai264003 China Dalian Minzu University School of Computer Science and Engineering Dalian116600 China
Monitoring renewable energy devices is crucial for the timely detection of faults and the improvement of system stability, making it a key component of the Internet of Things (IoT) ecosystem. However, existing intelli... 详细信息
来源: 评论
Rail Transit Event Extraction based on the Fusion of Semantic and Local Dependency Features  15
Rail Transit Event Extraction based on the Fusion of Semanti...
收藏 引用
15th IEEE International Conference on Knowledge Graph, ICKG 2024
作者: Chen, Qiang Meng, Haining Bao, Yihao Yang, Mingsong Tong, Xinyu Zhao, Qin Khan, Muhammad Bilal Hei, Xinhong Xi'an University of Technology School of Computer Science and Engineering Xi'an China Xi'an University of Technology School of Computer Science and Engineering Shaanxi Key Laboratory of Network Computing and Security Technology Xi'an China Xi'an University of Technology School of Civil Engineering and Architecture Xi'an China
Event extraction in rail transit plays a vital role in all stages of design, construction, and final acceptance. Event extraction is a key part of building event logic graph (ELG). However, the difficulty in obtaining... 详细信息
来源: 评论
Achieving reliable and anti-collusive outsourcing computation and verification based on blockchain in 5G-enabled IoT
收藏 引用
Digital Communications and networks 2022年 第5期8卷 644-653页
作者: Linjie Wang Youliang Tian Jinbo Xiong School of Data Science Tongren UniversityTongren554300China State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou UniversityGuiyang550025China Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber SecurityFujian Normal UniversityFuzhou350117China
Widespread applications of 5G technology have prompted the outsourcing of computation dominated by the Internet of Things(IoT)cloud to improve transmission efficiency,which has created a novel paradigm for improving t... 详细信息
来源: 评论
A novel firmware secure transmission scheme based on SM2 threshold key agreement algorithm
A novel firmware secure transmission scheme based on SM2 thr...
收藏 引用
2023 International Conference on computer Graphics, Artificial Intelligence, and Data Processing, ICCAID 2023
作者: Wang, Kun Gao, Shaofeng Chen, Xinze Fu, Yong Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
During the process of embedded firmware upgrade, to protect the security of the firmware during transmission, this paper proposes an improved firmware transmission scheme based on the combination of the SM2 threshold ... 详细信息
来源: 评论
Distributed acoustic sensing signal event recognition and localization based on improved YOLOv7
Distributed acoustic sensing signal event recognition and lo...
收藏 引用
2023 International Congress on Ultrasonics, ICU Beijing 2023
作者: Zhang, Hongyu Wang, Chang Zhang, Faxiang Jiang, Shaodong Sun, Zhihui Wang, Xiaodong Duan, Zhenhui Gao, Fengxia Liu, Zhaoying Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
The distributed acoustic sensing (DAS) system based on phase-sensitive optical time domain reflection (Φ -OTDR) technology is widely used in pipeline safety monitoring, perimeter security, structure monitoring, etc. ... 详细信息
来源: 评论
Lightweight Malicious Encrypted Traffic Detection Method Based on KL Image Compression  9
Lightweight Malicious Encrypted Traffic Detection Method Bas...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Wen, Yuecheng Li, Xiaotong Lv, Haiqing Wang, Menglu Zuo, Wenbo Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
Timely and accurate detection of and response to potentially malicious encrypted traffic is crucial in cybersecurity strategies. Convolutional neural network-based approaches that convert traffic loads into images for... 详细信息
来源: 评论