咨询与建议

限定检索结果

文献类型

  • 4,421 篇 会议
  • 3,336 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,765 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,197 篇 工学
    • 3,911 篇 计算机科学与技术...
    • 3,131 篇 软件工程
    • 1,310 篇 信息与通信工程
    • 650 篇 电气工程
    • 529 篇 控制科学与工程
    • 512 篇 电子科学与技术(可...
    • 440 篇 生物工程
    • 438 篇 网络空间安全
    • 301 篇 机械工程
    • 232 篇 光学工程
    • 223 篇 仪器科学与技术
    • 193 篇 生物医学工程(可授...
    • 162 篇 安全科学与工程
    • 149 篇 动力工程及工程热...
    • 143 篇 化学工程与技术
    • 127 篇 交通运输工程
    • 125 篇 建筑学
  • 2,278 篇 理学
    • 1,358 篇 数学
    • 499 篇 物理学
    • 474 篇 生物学
    • 421 篇 统计学(可授理学、...
    • 208 篇 系统科学
    • 163 篇 化学
  • 1,326 篇 管理学
    • 807 篇 管理科学与工程(可...
    • 573 篇 图书情报与档案管...
    • 287 篇 工商管理
  • 284 篇 法学
    • 167 篇 社会学
  • 160 篇 医学
    • 132 篇 临床医学
    • 117 篇 基础医学(可授医学...
  • 117 篇 经济学
    • 117 篇 应用经济学
  • 98 篇 军事学
  • 54 篇 农学
  • 44 篇 教育学
  • 23 篇 文学
  • 22 篇 艺术学

主题

  • 235 篇 feature extracti...
  • 229 篇 semantics
  • 217 篇 cryptography
  • 182 篇 authentication
  • 181 篇 information secu...
  • 162 篇 computational mo...
  • 156 篇 security
  • 151 篇 protocols
  • 140 篇 accuracy
  • 139 篇 privacy
  • 134 篇 deep learning
  • 127 篇 training
  • 122 篇 laboratories
  • 107 篇 data models
  • 99 篇 cloud computing
  • 95 篇 servers
  • 93 篇 federated learni...
  • 91 篇 public key crypt...
  • 90 篇 blockchain
  • 88 篇 network security

机构

  • 203 篇 shandong provinc...
  • 174 篇 key laboratory o...
  • 158 篇 state key labora...
  • 157 篇 school of comput...
  • 118 篇 school of comput...
  • 106 篇 department of co...
  • 104 篇 school of cyber ...
  • 98 篇 information secu...
  • 80 篇 key laboratory o...
  • 77 篇 institute of inf...
  • 69 篇 guangdong provin...
  • 65 篇 university of ch...
  • 65 篇 college of mathe...
  • 64 篇 computer network...
  • 64 篇 state grid key l...
  • 62 篇 peng cheng labor...
  • 60 篇 key laboratory o...
  • 59 篇 school of softwa...
  • 58 篇 school of comput...
  • 55 篇 key laboratory o...

作者

  • 55 篇 jianfeng ma
  • 50 篇 ma jianfeng
  • 50 篇 yang yang
  • 45 篇 yixian yang
  • 41 篇 zheng wei-shi
  • 41 篇 ding yong
  • 38 篇 huang qingming
  • 34 篇 hu yupu
  • 33 篇 zhang huanguo
  • 33 篇 yang yixian
  • 31 篇 cong runmin
  • 30 篇 wang wei
  • 30 篇 xu an wang
  • 28 篇 wang bin
  • 28 篇 zhou deyu
  • 26 篇 zhang minqing
  • 25 篇 xu li
  • 25 篇 xie xiaohua
  • 23 篇 xinhong hei
  • 23 篇 yang xiaoyuan

语言

  • 7,173 篇 英文
  • 330 篇 其他
  • 276 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
检索条件"机构=Key Laboratory of Computer Network and Information Security"
7765 条 记 录,以下是1-10 订阅
排序:
Partial multi-label learning via label-specific feature corrections
收藏 引用
Science China(information Sciences) 2025年 第3期68卷 95-109页
作者: Jun-Yi HANG Min-Ling ZHANG School of Computer Science and Engineering Southeast University Key Laboratory of Computer Network and Information Integration(Southeast University) Ministry of Education
Partial multi-label learning(PML) allows learning from rich-semantic objects with inaccurate annotations, where a set of candidate labels are assigned to each training example but only some of them are valid. Existi... 详细信息
来源: 评论
High Capacity Reversible Data Hiding Algorithm in Encrypted Images Based on Image Adaptive MSB Prediction and Secret Sharing
收藏 引用
清华大学学报自然科学版(英文版) 2025年 第3期30卷 1139-1156页
作者: Kaili Qi Minqing Zhang Fuqiang Di Chao Jiang Key Laboratory of Network & Information Security under PAP Engineering University of PAPXi'an 710086China
Until now,some reversible data hiding in encrypted images(RDH-EI)schemes based on secret sharing(SIS-RDHEI)still have the problems of not realizing diffusivity and high embedding ***,this paper innovatively proposes a... 详细信息
来源: 评论
Weighted Attribute Based Conditional Proxy Re-Encryption in the Cloud
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 1399-1414页
作者: Xixi Yan Jing Zhang Pengyu Cheng Henan Key Laboratory of Network Cryptography Technology Network Information Security and Cryptography LaboratorySchool of SoftwareHenan Polytechnic UniversityJiaozuo454003China School of Computer Science and Technology Henan Polytechnic UniversityJiaozuo454000China
Conditional proxy re-encryption(CPRE)is an effective cryptographic primitive language that enhances the access control mechanism and makes the delegation of decryption permissions more granular,but most of the attribu... 详细信息
来源: 评论
An Enhanced Clustering-Based (k, t)-Anonymity Algorithm for Graphs
收藏 引用
Chinese Journal of Electronics 2025年 第1期34卷 365-372页
作者: Yuanyuan Wang Xing Zhang Zhiguang Chu Wei Shi Xiang Li School of Electronics and Information Engineering Liaoning University of Technology Key Laboratory of Security for Network and Data in Industrial Internet of Liaoning Province Faculty of Information Technology Beijing University of Technology
As people become increasingly reliant on the Internet, securely storing and publishing private data has become an important issue. In real life, the release of graph data can lead to privacy breaches, which is a highl... 详细信息
来源: 评论
DDoS Attack Autonomous Detection Model Based on Multi-Strategy Integrate Zebra Optimization Algorithm
收藏 引用
computers, Materials & Continua 2025年 第1期82卷 645-674页
作者: Chunhui Li Xiaoying Wang Qingjie Zhang Jiaye Liang Aijing Zhang School of Information Engineering Institute of Disaster PreventionLangfang065201China Langfang Key Laboratory of Network Emergency Protection and Network Security Langfang065201China
Previous studies have shown that deep learning is very effective in detecting known ***,when facing unknown attacks,models such as Deep Neural networks(DNN)combined with Long Short-Term Memory(LSTM),Convolutional Neur... 详细信息
来源: 评论
Blockchain and signcryption enabled asynchronous federated learning framework in fog computing
收藏 引用
Digital Communications and networks 2025年 第2期11卷 442-454页
作者: Zhou, Zhou Tian, Youliang Xiong, Jinbo Peng, Changgen Li, Jing Yang, Nan State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang550025 China Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fujian Normal University Fuzhou350117 China Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology Guilin541004 China
Federated learning combines with fog computing to transform data sharing into model sharing, which solves the issues of data isolation and privacy disclosure in fog computing. However, existing studies focus on centra... 详细信息
来源: 评论
A Novel Approach to Cloud security: Publicly Verifiable Remote Signcryption Framework
收藏 引用
IEEE Internet of Things Journal 2025年 第10期12卷 14828-14844页
作者: Ali, Mohammad Liu, Ximeng Amirkabir University of Technology Department of Mathematics and Computer Science Tehran Iran Fuzhou University Key Laboratory of Information Security of Network Systems College of Computer and Data Science Fuzhou350108 China
In communication systems, ensuring both data integrity and confidentiality is crucial. Traditional methods, such as encryption and signature schemes, handle these aspects separately, leading to inefficiencies. Signcry... 详细信息
来源: 评论
Block-gram:Mining knowledgeable features for efficiently smart contract vulnerability detection
收藏 引用
Digital Communications and networks 2025年 第1期11卷 1-12页
作者: Xueshuo Xie Haolong Wang Zhaolong Jian Yaozheng Fang Zichun Wang Tao Li Tianjin Key Laboratory of Network and Data Security Technology TianjinChina College of Computer Science Nankai UniversityTianjinChina Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province China State Key Laboratory of Computer Architecture Institute of Computing TechnologyChinese Academy of SciencesChina
Smart contracts are widely used on the blockchain to implement complex transactions,such as decentralized applications on *** vulnerability detection of large-scale smart contracts is critical,as attacks on smart cont... 详细信息
来源: 评论
Fusion of Time-Frequency Features in Contrastive Learning for Shipboard Wind Speed Correction
收藏 引用
Journal of Ocean University of China 2025年 第2期24卷 377-386页
作者: SONG Jian HUANG Meng LI Xiang ZHANG Zhenqiang WANG Chunxiao ZHAO Zhigang Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science Center(National Supercomputer Center in Jinan)Qilu University of Technology(Shandong Academy of Sciences)Jinan 250000China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer ScienceJinan 250000China
Accurate wind speed measurements on maritime vessels are crucial for weather forecasting,sea state prediction,and safe ***,vessel motion and challenging environmental conditions often affect measurement *** address th... 详细信息
来源: 评论
HTC-HAD: A Hybrid Transformer-CNN Approach for Hyperspectral Anomaly Detection
收藏 引用
IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing 2025年 18卷 10144-10156页
作者: Zhao, Minghua Zheng, Wen Hu, Jing Xi'an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology School of Computer Science and Engineering Xi'an710048 China
Hyperspectral anomaly detection (HAD) identifies anomalies by analyzing differences between anomalies and background pixels without prior information, presenting a significant challenge. Most existing studies leverage... 详细信息
来源: 评论