咨询与建议

限定检索结果

文献类型

  • 4,435 篇 会议
  • 3,397 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,840 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,280 篇 工学
    • 3,971 篇 计算机科学与技术...
    • 3,151 篇 软件工程
    • 1,357 篇 信息与通信工程
    • 695 篇 电气工程
    • 557 篇 控制科学与工程
    • 542 篇 电子科学与技术(可...
    • 455 篇 网络空间安全
    • 439 篇 生物工程
    • 303 篇 机械工程
    • 233 篇 光学工程
    • 224 篇 仪器科学与技术
    • 189 篇 生物医学工程(可授...
    • 168 篇 安全科学与工程
    • 148 篇 动力工程及工程热...
    • 145 篇 化学工程与技术
    • 133 篇 交通运输工程
    • 127 篇 建筑学
  • 2,305 篇 理学
    • 1,382 篇 数学
    • 506 篇 物理学
    • 475 篇 生物学
    • 430 篇 统计学(可授理学、...
    • 208 篇 系统科学
    • 165 篇 化学
  • 1,340 篇 管理学
    • 816 篇 管理科学与工程(可...
    • 584 篇 图书情报与档案管...
    • 290 篇 工商管理
  • 288 篇 法学
    • 167 篇 社会学
    • 119 篇 法学
  • 160 篇 医学
    • 130 篇 临床医学
    • 118 篇 基础医学(可授医学...
  • 117 篇 经济学
  • 98 篇 军事学
  • 54 篇 农学
  • 46 篇 教育学
  • 24 篇 文学
  • 22 篇 艺术学

主题

  • 239 篇 feature extracti...
  • 230 篇 semantics
  • 214 篇 cryptography
  • 182 篇 authentication
  • 181 篇 information secu...
  • 162 篇 computational mo...
  • 158 篇 security
  • 150 篇 protocols
  • 142 篇 accuracy
  • 140 篇 privacy
  • 139 篇 deep learning
  • 126 篇 training
  • 122 篇 laboratories
  • 106 篇 data models
  • 100 篇 federated learni...
  • 100 篇 cloud computing
  • 95 篇 servers
  • 93 篇 blockchain
  • 91 篇 public key crypt...
  • 88 篇 data privacy

机构

  • 203 篇 shandong provinc...
  • 174 篇 key laboratory o...
  • 158 篇 school of comput...
  • 155 篇 state key labora...
  • 114 篇 school of comput...
  • 106 篇 department of co...
  • 106 篇 school of cyber ...
  • 97 篇 information secu...
  • 80 篇 key laboratory o...
  • 79 篇 institute of inf...
  • 68 篇 guangdong provin...
  • 66 篇 computer network...
  • 65 篇 college of mathe...
  • 64 篇 university of ch...
  • 63 篇 state grid key l...
  • 62 篇 peng cheng labor...
  • 60 篇 key laboratory o...
  • 59 篇 school of softwa...
  • 59 篇 school of comput...
  • 55 篇 key laboratory o...

作者

  • 55 篇 jianfeng ma
  • 54 篇 yang yang
  • 50 篇 ma jianfeng
  • 45 篇 yixian yang
  • 41 篇 zheng wei-shi
  • 41 篇 ding yong
  • 38 篇 huang qingming
  • 33 篇 zhang huanguo
  • 32 篇 wang wei
  • 32 篇 hu yupu
  • 31 篇 cong runmin
  • 31 篇 xu an wang
  • 30 篇 yang yixian
  • 29 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 25 篇 xu li
  • 25 篇 xie xiaohua
  • 24 篇 xinhong hei
  • 23 篇 liu xin

语言

  • 7,214 篇 英文
  • 362 篇 其他
  • 277 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Computer Network and Information Security"
7840 条 记 录,以下是141-150 订阅
排序:
A Traceable Privacy-Preserving Transaction Protocol With Evolutionary Threshold Authentication
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Xie, Ninghai Li, Jiguo Lin, Chao Zhang, Yichen Shen, Jian Fujian Normal University College of Computer and Cyber Security Fuzhou350117 China School of Mathematics and Statistics Key Laboratory of Analytical Mathematics and Applications Ministry of Education Fujian Fuzhou350117 China Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou350117 China Fujian Normal University Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fuzhou350117 China Guangzhou University Guangdong Key Laboratory of Blockchain Security Guangzhou510006 China Zhejiang Sci-Tech University School of Information Science and Engineering Hangzhou310018 China
Decentralized payment systems, such as Bitcoin, enable immutable and transparent payments in a distributed manner. To address the issue of user privacy leakage due to transaction transparency, some efforts have enhanc... 详细信息
来源: 评论
Highway Gates Dynamic Adaptation network For Knowledge Graph Entity Alignment  21st
Highway Gates Dynamic Adaptation Network For Knowledge Graph...
收藏 引用
21st Pacific Rim International Conference on Artificial Intelligence, PRICAI 2024
作者: Yusuf, Nursharbat Yilahun, Hankiz Imam, Seyyare Hamdulla, Askar School of Computer Science and Technology Xinjiang University Urumqi830017 China Xinjiang Key Laboratory of Multilingual Information Technology Urumqi830017 China School of National Security Studies Xinjiang University Urumqi830017 China
The Entity alignment aims to align entities across different Knowledge Graphs and plays an important role in knowledge fusion tasks. In recent years, existing methods have typically used multiple aspects of informatio... 详细信息
来源: 评论
Document-Level Relation Extraction Model Based on Boundary Distance Loss and Long-Tail Relation Enhancement  21st
Document-Level Relation Extraction Model Based on Boundary D...
收藏 引用
21st Pacific Rim International Conference on Artificial Intelligence, PRICAI 2024
作者: Liu, Xin Yilahun, Hankiz Imam, Seyyare Hamdulla, Askar School of Computer Science and Technology Xinjiang University Urumqi830017 China Xinjiang Key Laboratory of Multilingual Information Technology Urumqi830017 China School of National Security Studies Xinjiang University Urumqi830017 China
In today’s data-driven era, deriving meaningful insights from documents poses a considerable challenge. The task of Document-level Relation Extraction (DocRE) seeks to discern relationships among multiple entities wi... 详细信息
来源: 评论
Multi-Relational Variational Contrastive Learning for Next POI Recommendation
Multi-Relational Variational Contrastive Learning for Next P...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Lin Chen Peipei Wang Xiaohui Han Lijuan Xu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China Quan Cheng Laboratory Jinan China
Next point-of-interest (POI) recommendation aims to predict the next interested POI to the user based on their historical check-in data in location-based social services. Most existing studies have attempted to model ... 详细信息
来源: 评论
A security-Enhanced Certificateless Anonymous Authentication Scheme with High Computational Efficiency for Mobile Edge Computing
收藏 引用
IEEE Transactions on network and Service Management 2025年
作者: Tian, Junfeng Wang, Yiting Shen, Yue Hebei University School of Cyberspace Security and Computer Key Laboratory on High Trusted Information System Baoding071000 China
Mobile Edge Computing (MEC), as a new computing paradigm, provides high-quality and low-latency services for mobile users and also reduces the load on cloud servers. However, MEC faces some security threats, such as d... 详细信息
来源: 评论
HiRes: Hierarchical Feature Optimization and Rescorer for Automatic ICD Coding
HiRes: Hierarchical Feature Optimization and Rescorer for Au...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Liang, Zhenpeng Guan, Hongjiao Lu, Wenpeng Peng, Xueping Xu, Bing Yang, Muyun Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China Australian Artificial Intelligence Institute University of Technology Sydney Sydney Australia Faculty of Computing Harbin Institute of Technology Harbin China
The International Classification of Diseases (ICD) coding assigns standardized codes to diseases. Automating this process enhances the efficiency and accuracy of clinical records processing. However, current methods s... 详细信息
来源: 评论
EPRFL:An Efficient Privacy-Preserving and Robust Federated Learning Scheme for Fog Computing
收藏 引用
China Communications 2025年 第4期22卷 202-222页
作者: Ke Zhijie Xie Yong Syed Hamad Shirazi Li Haifeng School of Computer Technology and Application Qinghai UniversityXining 810016China School of Computer and Information Science Qinghai Institute of TechnologyXining 810016China Guangdong Key Laboratory of Blockchain Security Guangzhou UniversityGuangzhou 510006China Department of Information Technology Hazara UniversityBaffa 21110Pakistan Qinghai Provincial Key Laboratory of Big Data in Finance and Artificial Intelligence Application Technology Xining 810016China
Federated learning(FL)is a distributed machine learning paradigm that excels at preserving data privacy when using data from multiple *** combined with Fog Computing,FL offers enhanced capabilities for machine learnin... 详细信息
来源: 评论
FreqSense: Universal and Low-Latency Adversarial Example Detection for Speaker Recognition with Interpretability in Frequency Domain
FreqSense: Universal and Low-Latency Adversarial Example Det...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Huang, Yihuan Li, Yuanzhe Ren, Yanzhen Tu, Weiping Yang, Yuhong Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education China School of Cyber Science and Engineering Wuhan University China National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University China
Speaker recognition (SR) systems are particularly vulnerable to adversarial example (AE) attacks. To mitigate these attacks, AE detection systems are typically integrated into SR systems. To overcome the limitations o... 详细信息
来源: 评论
Visible-Infrared Person Search: A Novel Benchmark and Solution  27th
Visible-Infrared Person Search: A Novel Benchmark and Solut...
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Chen, Hongxu Xiong, Jianghao Huang, Yuheng Xie, Xiaohua Lai, Jian-Huang School of Computer Science and Engineering Sun Yat-Sen University Guangzhou510006 China Guangzhou GRGBanking Equipment Co. Ltd. Guangzhou China Guangdong Key Laboratory of Information Security Technology Guangzhou510006 China
Person search aims to simultaneously localize and identify a query person from realistic and uncropped images, which consists of person detection and re-identification (Re-ID). Existing person search methods and datas... 详细信息
来源: 评论
Underwater Image Restoration Based on Improved SwinIR Model  13
Underwater Image Restoration Based on Improved SwinIR Model
收藏 引用
13th International Conference on Intelligent Control and information Processing, ICICIP 2025
作者: Lu, Yanke Li, Fang Luo, Xiaonan Guangxi Key Laboratory of Image and Graphic Intelligent Processing Guilin University of Electronic Technology Guilin541004 China School of Computer Science and Information Security Guilin University of Electronic Technology Guilin541004 China Guilin541004 China Guangxi Key Laboratory of Image and Graphic Intelligent Processing Guilin541004 China
Image restoration is a classic foundational visual task, aimed at recovering damaged images, such as those affected by compression, blurring, or noise, to high-definition clarity. Although current image enhancement te... 详细信息
来源: 评论