咨询与建议

限定检索结果

文献类型

  • 1,687 篇 会议
  • 1,331 篇 期刊文献

馆藏范围

  • 3,018 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,994 篇 工学
    • 1,476 篇 计算机科学与技术...
    • 1,159 篇 软件工程
    • 542 篇 信息与通信工程
    • 278 篇 电气工程
    • 215 篇 电子科学与技术(可...
    • 203 篇 控制科学与工程
    • 200 篇 生物工程
    • 136 篇 机械工程
    • 125 篇 网络空间安全
    • 98 篇 仪器科学与技术
    • 95 篇 光学工程
    • 89 篇 生物医学工程(可授...
    • 66 篇 交通运输工程
    • 64 篇 动力工程及工程热...
    • 64 篇 化学工程与技术
    • 52 篇 安全科学与工程
    • 42 篇 建筑学
  • 910 篇 理学
    • 529 篇 数学
    • 218 篇 生物学
    • 196 篇 物理学
    • 165 篇 统计学(可授理学、...
    • 83 篇 系统科学
    • 74 篇 化学
  • 561 篇 管理学
    • 342 篇 管理科学与工程(可...
    • 243 篇 图书情报与档案管...
    • 122 篇 工商管理
  • 94 篇 法学
    • 59 篇 社会学
  • 71 篇 医学
    • 58 篇 临床医学
    • 51 篇 基础医学(可授医学...
  • 51 篇 经济学
    • 51 篇 应用经济学
  • 30 篇 农学
  • 21 篇 军事学
  • 10 篇 教育学
  • 10 篇 文学
  • 9 篇 艺术学

主题

  • 136 篇 feature extracti...
  • 118 篇 semantics
  • 93 篇 accuracy
  • 76 篇 computational mo...
  • 76 篇 training
  • 64 篇 data models
  • 60 篇 deep learning
  • 60 篇 federated learni...
  • 45 篇 protocols
  • 45 篇 cryptography
  • 44 篇 privacy
  • 43 篇 neural networks
  • 42 篇 security
  • 42 篇 robustness
  • 41 篇 visualization
  • 40 篇 adaptation model...
  • 39 篇 data mining
  • 39 篇 predictive model...
  • 38 篇 optimization
  • 37 篇 authentication

机构

  • 221 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 156 篇 school of comput...
  • 80 篇 key laboratory o...
  • 65 篇 college of compu...
  • 63 篇 computer network...
  • 58 篇 key laboratory o...
  • 56 篇 college of mathe...
  • 50 篇 shandong fundame...
  • 47 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 43 篇 institute of inf...
  • 40 篇 school of comput...
  • 37 篇 school of cyber ...
  • 37 篇 shandong provinc...
  • 36 篇 key laboratory o...
  • 36 篇 fujian provincia...
  • 35 篇 university of ch...
  • 33 篇 fujian key labor...

作者

  • 46 篇 zhao yao
  • 36 篇 zhou deyu
  • 26 篇 cong runmin
  • 26 篇 yang yang
  • 26 篇 min-ling zhang
  • 25 篇 zhang min-ling
  • 24 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 21 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 du bo
  • 19 篇 liu ximeng
  • 17 篇 geng xin
  • 17 篇 xiaoping li
  • 16 篇 di xiaoqiang
  • 16 篇 he yulan
  • 16 篇 xia chunhe
  • 16 篇 wang jin
  • 15 篇 zhenrong zhang

语言

  • 2,733 篇 英文
  • 176 篇 其他
  • 121 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Intergration"
3018 条 记 录,以下是171-180 订阅
排序:
New Cryptographic Bent Functions from Permutations and Linear Translator in Cyber Security
New Cryptographic Bent Functions from Permutations and Linea...
收藏 引用
2023 IEEE International Conference on Dependable, Autonomic and Secure Computing, 2023 International Conference on Pervasive Intelligence and Computing, 2023 International Conference on Cloud and Big Data Computing, 2023 International Conference on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2023
作者: Liu, Qian Chen, Yan Chen, Zhixiong Liu, Ximeng Lin, Hui College of Computer and Data Science Fuzhou University Fuzhou China Putian University Fujian Key Laboratory of Financial Information Processing Putian China College of Computer and Data Science Fuzhou University Key Laboratory of Information Security of Network Systems Fuzhou China College of Computer and Cyber Security Fujian Normal University Fuzhou China
Cryptographic bent functions are maximally nonlinear Boolean functions with an even number of variables. They are not only closely related to some interesting combinatorial objects, but also have important application... 详细信息
来源: 评论
Some Classes of Cryptographic Power Functions and Permutation Polynomials with Low (-1)-Differential Uniformity in Cyber Security
Some Classes of Cryptographic Power Functions and Permutatio...
收藏 引用
2023 IEEE International Conference on Dependable, Autonomic and Secure Computing, 2023 International Conference on Pervasive Intelligence and Computing, 2023 International Conference on Cloud and Big Data Computing, 2023 International Conference on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2023
作者: Liu, Qian Dong, Xiaobei Chen, Zhixiong Liu, Ximeng Xu, Li College of Computer and Data Science Fuzhou University Fuzhou China Putian University Fujian Key Laboratory of Financial Information Processing Putian China College of Computer and Data Science Fuzhou University Key Laboratory of Information Security of Network Systems Fuzhou China College of Computer and Cyber Security Fujian Normal University Fuzhou China
Cryptographic functions with low differential uniformity have wide applications in cryptography and cyber security. In this paper, we further investigate c-differential uniformity proposed by Ellingsen et al. (IEEE Tr... 详细信息
来源: 评论
A circuit area optimization of MK-3 S-box
收藏 引用
Cybersecurity 2025年 第1期8卷 61-71页
作者: Yanjun Li Weiguo Zhang Yiping Lin Jian Zou Jian Liu Information Industry Information Security Evaluation Center The 15th Research Institute of China Electronic Technology Group CorporationBeijing 100083China Henan Key Laboratory of Network Cryptography Technology Zhengzhou 450001China Beijing Electronic Science and Technology Institute No.7 Fufeng RoadFengtai DistricBeijing 100083China College of Computer and Data Science Fuzhou UniversityFuzhou 350108China
In MILCOM 2015,Kelly et *** the authentication encryption algorithm MK-3,which applied the 16-bit *** paper aims to implement the 16-bit S-box with less circuit ***,we classifed the irreducible polynomials over F_(2n)... 详细信息
来源: 评论
Joint Optimization of Latency and Energy Consumption for Mobile Edge Computing Based Proximity Detection in Road networks
收藏 引用
China Communications 2022年 第4期19卷 274-290页
作者: Tongyu Zhao Yaqiong Liu Guochu Shou Xinwei Yao School of Information and Communication Engineering Beijing University of Posts and TelecommunicationsBeijing 100876China Beijing Laboratory of Advanced Information Networks Beijing Key Laboratory of Network System Architecture and ConvergenceBeijing 100876China School of Computer Science and Technology Zhejiang University of TechnologyChina
In recent years, artificial intelligence and automotive industry have developed rapidly, and autonomous driving has gradually become the focus of the industry. In road networks, the problem of proximity detection refe... 详细信息
来源: 评论
A Reversible Data Hiding in Encryption Domain for JPEG Image Based on Controllable Ciphertext Range of Paillier Homomorphic Encryption Algorithm  21st
A Reversible Data Hiding in Encryption Domain for JPEG Ima...
收藏 引用
21st Pacific Rim International Conference on Artificial Intelligence, PRICAI 2024
作者: Ma, Bin Zhao, Chunxin Ma, Ruihe Xian, Yongjin Wang, Chunpeng Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China School of Economics Jilin University Changchun130015 China
With the rapid advancement of cloud computing, significant security concerns regarding data storage have been continuously raised. When the encrypted images are stored in the cloud, reversible data hiding in encrypted... 详细信息
来源: 评论
Feature Aggregation network for Memory-Based Industrial Anomaly Detection  9
Feature Aggregation Network for Memory-Based Industrial Anom...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Li, Min Han, Delong Shao, Rui He, Jinghui City University of Macau Faculty of Data Science China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
In the process of large-scale industrial production, complex defects of different shapes and sizes can occur in industrial products and their components, and these defects seriously affect the performance of industria... 详细信息
来源: 评论
Generalization Analysis for Label-Specific Representation Learning  38
Generalization Analysis for Label-Specific Representation Le...
收藏 引用
38th Conference on Neural information Processing Systems, NeurIPS 2024
作者: Zhang, Yi-Fan Zhang, Min-Ling School of Cyber Science and Engineering Southeast University Nanjing210096 China School of Computer Science and Engineering Southeast University Nanjing210096 China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education China
Label-specific representation learning (LSRL), i.e., constructing the representation with specific discriminative properties for each class label, is an effective strategy to improve the performance of multi-label lea...
来源: 评论
A Privacy-friendly sequential progressive framework for segmented decision making
A Privacy-friendly sequential progressive framework for segm...
收藏 引用
2023 International Conference on Artificial Intelligence of Things and Systems, AIoTSys 2023
作者: Liu, Peng Yu, Zhiyong Huang, Fangwan Fuzhou University College of Computer and Data Science Fuzhou China Fuzhou University Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou China
To achieve progressive and accurate decision-making for long-term time series data while meeting the needs of privacy-friendly and early, this paper proposes a universal framework for sequential progressive decision-m... 详细信息
来源: 评论
Large Model-Based Data Augmentation for Imbalanced Text Classification  5
Large Model-Based Data Augmentation for Imbalanced Text Clas...
收藏 引用
5th International Seminar on Artificial Intelligence, networking and information Technology, AINIT 2024
作者: Zhang, Dawei Mi, Rongxin Zhou, Peiyao Jin, Dawei Zhang, Manman Song, Tianhang School of Computer Science Jiangsu University of Science and Technology Jiangsu Zhenjiang China National Computer Network Emergency Response Technical Team Coordination Center of China Beijing China Key Laboratory of Intelligent Information Processing Beijing China
This study focuses on the application of large models to deal with imbalanced data problems in text classification. In view of the central position of text in web data and the negative impact of class imbalance on cla... 详细信息
来源: 评论
Minimum Path Cost Multi-path Routing Algorithm with No Intersecting Links in Quantum key Distribution networks  6
Minimum Path Cost Multi-path Routing Algorithm with No Inter...
收藏 引用
2023 IEEE 6th International Conference on information Systems and computer Aided Education, ICISCAE 2023
作者: Miao, Minghui Fang, Shuo Wu, Weijie Yuan, Xiaotong Bi, Lin Key Laboratory of Network and Information Security in Jilin Province Changchun China Changchun University of Science and Technology School of Computer Science and Technology Jilin Changchun China
Quantum key distribution (QKD) provides information-theoretic security based on quantum mechanics, and as quantum key distribution becomes increasingly practical, questions of how to employ it effectively over largesc... 详细信息
来源: 评论