咨询与建议

限定检索结果

文献类型

  • 4,435 篇 会议
  • 3,397 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,840 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,280 篇 工学
    • 3,971 篇 计算机科学与技术...
    • 3,151 篇 软件工程
    • 1,357 篇 信息与通信工程
    • 695 篇 电气工程
    • 557 篇 控制科学与工程
    • 542 篇 电子科学与技术(可...
    • 455 篇 网络空间安全
    • 439 篇 生物工程
    • 303 篇 机械工程
    • 233 篇 光学工程
    • 224 篇 仪器科学与技术
    • 189 篇 生物医学工程(可授...
    • 168 篇 安全科学与工程
    • 148 篇 动力工程及工程热...
    • 145 篇 化学工程与技术
    • 133 篇 交通运输工程
    • 127 篇 建筑学
  • 2,305 篇 理学
    • 1,382 篇 数学
    • 506 篇 物理学
    • 475 篇 生物学
    • 430 篇 统计学(可授理学、...
    • 208 篇 系统科学
    • 165 篇 化学
  • 1,340 篇 管理学
    • 816 篇 管理科学与工程(可...
    • 584 篇 图书情报与档案管...
    • 290 篇 工商管理
  • 288 篇 法学
    • 167 篇 社会学
    • 119 篇 法学
  • 160 篇 医学
    • 130 篇 临床医学
    • 118 篇 基础医学(可授医学...
  • 117 篇 经济学
  • 98 篇 军事学
  • 54 篇 农学
  • 46 篇 教育学
  • 24 篇 文学
  • 22 篇 艺术学

主题

  • 239 篇 feature extracti...
  • 230 篇 semantics
  • 214 篇 cryptography
  • 182 篇 authentication
  • 181 篇 information secu...
  • 162 篇 computational mo...
  • 158 篇 security
  • 150 篇 protocols
  • 142 篇 accuracy
  • 140 篇 privacy
  • 139 篇 deep learning
  • 126 篇 training
  • 122 篇 laboratories
  • 106 篇 data models
  • 100 篇 federated learni...
  • 100 篇 cloud computing
  • 95 篇 servers
  • 93 篇 blockchain
  • 91 篇 public key crypt...
  • 88 篇 data privacy

机构

  • 203 篇 shandong provinc...
  • 174 篇 key laboratory o...
  • 158 篇 school of comput...
  • 155 篇 state key labora...
  • 114 篇 school of comput...
  • 106 篇 department of co...
  • 106 篇 school of cyber ...
  • 97 篇 information secu...
  • 80 篇 key laboratory o...
  • 79 篇 institute of inf...
  • 68 篇 guangdong provin...
  • 66 篇 computer network...
  • 65 篇 college of mathe...
  • 64 篇 university of ch...
  • 63 篇 state grid key l...
  • 62 篇 peng cheng labor...
  • 60 篇 key laboratory o...
  • 59 篇 school of softwa...
  • 59 篇 school of comput...
  • 55 篇 key laboratory o...

作者

  • 55 篇 jianfeng ma
  • 54 篇 yang yang
  • 50 篇 ma jianfeng
  • 45 篇 yixian yang
  • 41 篇 zheng wei-shi
  • 41 篇 ding yong
  • 38 篇 huang qingming
  • 33 篇 zhang huanguo
  • 32 篇 wang wei
  • 32 篇 hu yupu
  • 31 篇 cong runmin
  • 31 篇 xu an wang
  • 30 篇 yang yixian
  • 29 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 25 篇 xu li
  • 25 篇 xie xiaohua
  • 24 篇 xinhong hei
  • 23 篇 liu xin

语言

  • 7,214 篇 英文
  • 362 篇 其他
  • 277 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Computer Network and Information Security"
7840 条 记 录,以下是131-140 订阅
排序:
Age of information in Internet of Vehicles: A Discrete-Time Multisource Queueing Model
收藏 引用
IEEE Transactions on Communications 2025年 第5期73卷 3298-3317页
作者: Zhang, Tianci Chen, Zhengchuan Tian, Zhong Wang, Min Zhen, Li Wu, Dapeng Oliver Li, Yonghui Quek, Tony Q. S. Chongqing University School of Microelectronics and Communication Engineering Chongqing400044 China Shaanxi Key Laboratory of Information Communication Network and Security Xi’an University of Posts and Telecommunications Xi’an710122 China Chongqing University of Posts and Telecommunications School of Optoelectronics Engineering Chongqing400065 China City University of Hong Kong Department of Computer Science Hong Kong The University of Sydney School of Electrical and Information Engineering SydneyNSW2050 Australia Singapore University of Technology and Design Department of Information Systems Technology and Design Tampines 487372 Singapore Yonsei University Yonsei Frontier Laboratory Seoul03722 Korea Republic of
This work studies information freshness of a V2I status updating link in IoV. The status updating link is modeled as a multi-source Ber/Geo/1/1 non-preemptive or preemptive queue. We focus on statistical characteristi... 详细信息
来源: 评论
MISP: An Efficient Quantum-resistant Misbehavior Preventing Scheme with Self-enforcement for Vehicle-to-Everything
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Chen, Ying He, Debiao Bao, Zijian Wang, Huaqun Luo, Min Wuhan University School of Cyber Science and Engineering Wuhan430072 China Key Laboratory of Computing Power Network & Information Security Ministry of Education Shandong Computer Science Center Jinan250014 China Nanjing University of Posts and Telecommunications College of Computer Nanjing210023 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network & Information System Security Jinan250014 China
In the Vehicle-to-Everything (V2X) communication system, the presence of ambiguous warnings significantly increases the risk of severe accidents, posing a substantial threat to the safety of autonomous driving. It is ... 详细信息
来源: 评论
Research on Low-Light Image Enhancement method based on UNet  5
Research on Low-Light Image Enhancement method based on UNet
收藏 引用
5th International Conference on Telecommunications, Optics, and computer Science, TOCS 2024
作者: Zhu, Fuyu Fei, Rong Ji, Chengjie School of Computer Science and Engineering Xi'an University of Technology Xi'an China Shannxi Key Laboratory for Network Computing and Security Technology Xi'an University of Technology Xi'an China
As technology develops continuously, digital images are being applied more and more extensively in daily life. Digital images are mainly divided into two categories: one is the images obtained by photosensitive device... 详细信息
来源: 评论
MAGRET: Machine-generated Text Detection with Rewritten Texts  31
MAGRET: Machine-generated Text Detection with Rewritten Text...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Huang, Yifei Cao, Jingxin Luo, Hanyu Guan, Xin Liu, Bo School of Cyber Science and Engineering Southeast University Nanjing211189 China Key Laboratory of Computer Network and Information of Ministry of Education of China Nanjing211189 China School of Computer Science and Engineering Southeast University Nanjing211189 China
With the quick advancement in text generation ability of Large Language Model(LLM), concerns about the misuse of machine-generated text(MGT) have grown, raising potential violations of legal and ethical standards. Som... 详细信息
来源: 评论
Outsourced Secure Cross-Modal Retrieval based on Secret Sharing for Lightweight Clients
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Niu, Ziyu Wang, Hao Li, Zhi Su, Ye Xu, Lijuan Zhang, Yudi Susilo, Willy Shandong Normal University School of Information Science and Engineering Jinan China University of Wollongong School of Computing and Information Technology Australia Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education National Supercomputer Center in Jinan Shandong Computer Science Center Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
Cross-modal retrieval is a technique that uses one modality to query another modality in multimedia data (e.g., retrieving images based on text, or retrieving text based on images). It can break down the barriers betw... 详细信息
来源: 评论
DCCT-Net: A network Combined Dynamic CNN and Transformer for Image Compressive Sensing
DCCT-Net: A Network Combined Dynamic CNN and Transformer for...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Lijuan Xu Haixiao Mei Fenghua Tong Dawei Zhao Fuqiang Yu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
Recent end-to-end image compressive sensing networks primarily use Convolutional Neural networks (CNNs) and Transformers, each with distinct limitations: CNNs struggle with global feature capture, while Transformers l... 详细信息
来源: 评论
Joint Optimization of Compression, Transmission and Computation for Cooperative Perception Aided Intelligent Vehicular networks
收藏 引用
IEEE Transactions on Vehicular Technology 2025年 第5期74卷 8201-8214页
作者: Lu, Binbin Huang, Xumin Wu, Yuan Qian, Liping Zhou, Sheng Niyato, Dusit University of Macau State Key Laboratory of Internet of Things for Smart City The Department of Computer and Information Science Macau China Guangdong University of Technology School of Automation Guangzhou510006 China University of Macau State Key Lab of Internet of Things for Smart City Macau China University of Macau State Key Laboratory of Internet of Things for Smart City The Department of Computer Information Science Macau China Zhuhai UM Science and Technology AQ2 Research Institute Zhuhai519301 China Zhejiang University of Technology Institute of Cyberspace Security Hangzhou310023 China Tsinghua University Beijing National Research Center for Information Science and Technology Department of Electronic Engineering Beijing100084 China Nanyang Technological University School of Computer Science and Engineering Singapore
Cooperative perception is a promising paradigm to tackle the perception limitations of a single intelligent vehicle (IV) to enhance the driving safety and efficiency in intelligent vehicular networks. However, the rea... 详细信息
来源: 评论
All-optical pattern matching systems based on optical RTFT and conjugate multiplication for 260GBaud PSK optical signal
收藏 引用
Optics Express 2025年 第8期33卷 18024-18036页
作者: Zhang, Tiantian Gong, Xiaoxue Zhang, Qihan Hou, Weigang Zhang, Xu Guo, Lei School of Communications and Information Engineering Chongqing University of Posts and Telecommunications Chongqing400065 China Institute of Intelligent Communications and Network Security Chongqing University of Posts and Telecommunications Chongqing400065 China State Key Laboratory of Advanced Manufacturing for Optical Systems Changchun Institute of Optics Fine Mechanics and Physics Chinese Academy of Sciences Jilin Changchun130033 China
The photonic firewall is a device that detects and localizes risky information at the optical layer to enhance the security of optical networks. The most significant and challenging component of the photonic firewall ... 详细信息
来源: 评论
Brillouin Frequency Shift Extraction for BOTDA Based on Gramian Angular Fields  4
Brillouin Frequency Shift Extraction for BOTDA Based on Gram...
收藏 引用
4th International Computational Imaging Conference, CITA 2024
作者: Zhu, Borong Zhang, Zhihao Qian, Yuhao Ma, Xiaole Wang, Liang Yu, Kuanglu Beijing Key Laboratory of Advanced Information Science and Network Technology Beijing100044 China Institute of Information Science School of Computer and Information Technology Beijing Jiaotong University Beijing100044 China National Engineering Laboratory for Next Generation Internet Access System School of Optics and Electronic Information Huazhong University of Science and Technology Wuhan430074 China
To accurately extract Brillouin frequency shift of BOTDA with large sweeping step sizes, a novel structure of GAFCNN is proposed, combining time series coding with convolutional neural networks. The experimental data ... 详细信息
来源: 评论
Efficient Module-Lattice-based Certificateless Online/Offline Signcryption Scheme for Internet of Medical Things
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Bai, Ye He, Debiao Yang, Zhichao Luo, Min Peng, Cong Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan430072 China Wuhan University School of Cyber Science and Engineering Wuhan430072 China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250014 China Naval University of Engineering Department of Information Security Wuhan430000 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250014 China
The Internet of Medical Things (IoMT) has achieved remote diagnosis and real-time health monitoring through intelligent sensor devices and Internet of Things (IoT) technology, providing great convenience for analyzing... 详细信息
来源: 评论