咨询与建议

限定检索结果

文献类型

  • 4,435 篇 会议
  • 3,397 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,840 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,280 篇 工学
    • 3,971 篇 计算机科学与技术...
    • 3,151 篇 软件工程
    • 1,357 篇 信息与通信工程
    • 695 篇 电气工程
    • 557 篇 控制科学与工程
    • 542 篇 电子科学与技术(可...
    • 455 篇 网络空间安全
    • 439 篇 生物工程
    • 303 篇 机械工程
    • 233 篇 光学工程
    • 224 篇 仪器科学与技术
    • 189 篇 生物医学工程(可授...
    • 168 篇 安全科学与工程
    • 148 篇 动力工程及工程热...
    • 145 篇 化学工程与技术
    • 133 篇 交通运输工程
    • 127 篇 建筑学
  • 2,305 篇 理学
    • 1,382 篇 数学
    • 506 篇 物理学
    • 475 篇 生物学
    • 430 篇 统计学(可授理学、...
    • 208 篇 系统科学
    • 165 篇 化学
  • 1,340 篇 管理学
    • 816 篇 管理科学与工程(可...
    • 584 篇 图书情报与档案管...
    • 290 篇 工商管理
  • 288 篇 法学
    • 167 篇 社会学
    • 119 篇 法学
  • 160 篇 医学
    • 130 篇 临床医学
    • 118 篇 基础医学(可授医学...
  • 117 篇 经济学
  • 98 篇 军事学
  • 54 篇 农学
  • 46 篇 教育学
  • 24 篇 文学
  • 22 篇 艺术学

主题

  • 239 篇 feature extracti...
  • 230 篇 semantics
  • 214 篇 cryptography
  • 182 篇 authentication
  • 181 篇 information secu...
  • 162 篇 computational mo...
  • 158 篇 security
  • 150 篇 protocols
  • 142 篇 accuracy
  • 140 篇 privacy
  • 139 篇 deep learning
  • 126 篇 training
  • 122 篇 laboratories
  • 106 篇 data models
  • 100 篇 federated learni...
  • 100 篇 cloud computing
  • 95 篇 servers
  • 93 篇 blockchain
  • 91 篇 public key crypt...
  • 88 篇 data privacy

机构

  • 203 篇 shandong provinc...
  • 174 篇 key laboratory o...
  • 158 篇 school of comput...
  • 155 篇 state key labora...
  • 114 篇 school of comput...
  • 106 篇 department of co...
  • 106 篇 school of cyber ...
  • 97 篇 information secu...
  • 80 篇 key laboratory o...
  • 79 篇 institute of inf...
  • 68 篇 guangdong provin...
  • 66 篇 computer network...
  • 65 篇 college of mathe...
  • 64 篇 university of ch...
  • 63 篇 state grid key l...
  • 62 篇 peng cheng labor...
  • 60 篇 key laboratory o...
  • 59 篇 school of softwa...
  • 59 篇 school of comput...
  • 55 篇 key laboratory o...

作者

  • 55 篇 jianfeng ma
  • 54 篇 yang yang
  • 50 篇 ma jianfeng
  • 45 篇 yixian yang
  • 41 篇 zheng wei-shi
  • 41 篇 ding yong
  • 38 篇 huang qingming
  • 33 篇 zhang huanguo
  • 32 篇 wang wei
  • 32 篇 hu yupu
  • 31 篇 cong runmin
  • 31 篇 xu an wang
  • 30 篇 yang yixian
  • 29 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 25 篇 xu li
  • 25 篇 xie xiaohua
  • 24 篇 xinhong hei
  • 23 篇 liu xin

语言

  • 7,214 篇 英文
  • 362 篇 其他
  • 277 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Computer Network and Information Security"
7840 条 记 录,以下是151-160 订阅
排序:
Leveraging semantic relations in code and data to enhance taint analysis of embedded systems  24
Leveraging semantic relations in code and data to enhance ta...
收藏 引用
Proceedings of the 33rd USENIX Conference on security Symposium
作者: Jiaxu Zhao Yuekang Li Yanyan Zou Zhaohui Liang Yang Xiao Yeting Li Bingwei Peng Nanyu Zhong Xinyi Wang Wei Wang Wei Huo Institute of Information Engineering Chinese Academy of Sciences China and School of Cyber Security University of Chinese Academy of Sciences China and Key Laboratory of Network Assessment Technology Chinese Academy of Sciences China and Beijing Key Laboratory of Network Security and Protection Technology China University of New South Wales Australia Institute of Information Engineering Chinese Academy of Sciences China and Key Laboratory of Network Assessment Technology Chinese Academy of Sciences China and Beijing Key Laboratory of Network Security and Protection Technology China
IoT devices have significantly impacted our daily lives, and detecting vulnerabilities in embedded systems early on is critical for ensuring their security. Among the existing vulnerability detection techniques for em...
来源: 评论
On the -differential spectra of two classes of power functions over finite fields
收藏 引用
Applicable Algebra in Engineering, Communication and Computing 2025年 1-30页
作者: Liu, Qian Huang, Zhiwei Chen, Zhixiong Jiang, Rong Zhang, Liupiao Key Laboratory of Information Security of Network Systems College of Computer and Data Science Fuzhou University Fuzhou China Hubei Key Laboratory of Applied Mathematics Faculty of Mathematics and Statistics Hubei University Wuhan China Yunnan Key Laboratory of Service Computing Yunnan University of Finance and Economics Kunming China Fujian Key Laboratory of Financial Information Processing Putian University Putian China School of Computer Science and Technology Dongguan University of Technology Dongguan China
Recently, a new concept called multiplicative differential was introduced by Ellingsen et al. [7]. As an extension of the differential uniformity, it is theoretically appealing to determine the properties of c-differe...
来源: 评论
THC-DL: Three-Party Homomorphic Computing Delegation Learning for Secure Optimization
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Yang, Ze Tian, Youliang Xiong, Jinbo Niu, Kun Li, Mengqian Zhang, Xinyu Ma, Jianfeng Guizhou University Guizhou Provincial Key Laboratory of Cryptography and Blockchain Technology College of Computer Science and Technology Guiyang550025 China Guizhou University College of Big Data and Information Engineering Guiyang550025 China Fujian Normal University Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fuzhou350117 China Xidian University State Key Laboratory of Integrated Services Network Xi’an710071 China Xidian University State Key Laboratory of Integrated Services Network School of Cyber Engineering Xi’an710071 China
Delegation Learning(DL) flourishes data sharing, enabling agents to delegate data to the cloud for model training. To preserve privacy, homomorphic encryption (HE) offers an effective solution for privacy-preserving m... 详细信息
来源: 评论
ILP-Based Heuristics for the Multi-Modal Stable Matching Problem
收藏 引用
Tsinghua Science and Technology 2025年 第2期30卷 479-487页
作者: Yang Yang Rolf H.Möhring Junteng Song Yicheng Xu Yong Zhang Shenzhen Institute of Advanced Technology Chinese Academy of SciencesShenzhen 518055China University of Chinese Academy of Sciences Beijing 101408China School of Applied Mathematics and Computer Science Technische Universität BerlinBerlin 10623Germany School of Mathematics and Information Science Hebei UniversityBaoding 071002China Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic TechnologyGuilin 541004China
In this paper,we investigate the stable matching problem with multiple preferences in bipartite graphs,where each agent has various preference lists for all available partners with respect to different *** problem req... 详细信息
来源: 评论
Fratricide! Hijacking in Android Multi-Window
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年 第3期22卷 3075-3092页
作者: Guo, Chenkai Wang, Tianhong Wang, Qianlu Dong, Naipeng Luo, Xiangyang Liu, Zheli Nankai University College of Cyber Science Tianjin300350 China Anhui Province Key Laboratory of Cyberspace Security Situation Awareness and Evaluation Anhui 230007 China Haihe Lab of ITAI Tianjin300350 China Nankai University College of Computer Science Tianjin300350 China University of Queensland School of Information Technology and Electrical Engineering Saint LuciaQLD4072 Australia State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
Android’s multi-window solutions allow several apps to coexist on one screen, providing powerful functionalities and appealing visuals for modern mobile devices. However, this opens the door for potential malware hij... 详细信息
来源: 评论
CL-TAP: An Efficient Certificateless Based Trusted Access Protocol for WLAN
收藏 引用
Chinese Journal of Electronics 2025年 第1期23卷 142-146页
作者: Zhuo Ma Fenghua Li Jianfeng Ma Wenjiang Ji School of Computer Science and Technology Xidian University Xi'an Shannxi China State Key Laboratory of Information Security Institute of Information Engineering CAS Beijing China
Based on the certificateless public key cryptography and the trusted computing technologies, a certificateless based trusted access protocol for WLAN (Wireless local area networks) is proposed. Such protocol realizes ... 详细信息
来源: 评论
Data Dynamics Enabled Privacy-Preserving Public Batch Auditing in Cloud Storage
收藏 引用
Chinese Journal of Electronics 2025年 第2期23卷 297-301页
作者: Zhengwei Ren Lina Wang Qianhong Wu Ruyi Deng School of Computer Wuhan University Wuhan China Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education Wuhan China
Many schemes have been present to tackle data integrity and retrievability in cloud storage. Few of existing schemes support data dynamics, public verification and protect data privacy simultaneously. We propose a pub... 详细信息
来源: 评论
MCFTNet: Multimodal Cross-layer Fusion Transformer network for Hyperspectral and LiDAR Data Classification
收藏 引用
IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing 2025年 18卷 12803-12818页
作者: Huang, Wei Wu, Tianren Zhang, Xueyu Li, Liangliang Lv, Ming Jia, Zhenhong Zhao, Xiaobin Ma, Hongbing Vivone, Gemine Xinjiang University School of Computer Science and Technology Urumqi830017 China Xinjiang University Key Laboratory of Signal Detection and Processing Urumqi830017 China Guangxi University School of Computer and Electronic Information Nanning530004 China Guangxi University Guangxi Key Laboratory of Multimedia Communications and Network Technology Nanning530004 China Beijing Institute of Technology School of Information and Electronics Beijing100081 China University of Science and Technology Beijing School of Computer and Communication Engineering Beijing100083 China Tsinghua University Department of Electronic Engineering Beijing100084 China National Research Council Tito85050 Italy NBFC National Biodiversity Future Center Palermo90133 Italy
Remote sensing image classification is a popular yet challenging field. Many researchers have combined convolutional neural networks (CNNs) and Transformers for hyperspectral image (HSI) classification tasks. However,... 详细信息
来源: 评论
Oracles-Based Framework for Introducing Governance Entitlements Across DAOs  30th
Oracles-Based Framework for Introducing Governance Entitleme...
收藏 引用
30th International Conference on Computational and Experimental Engineering and Sciences, ICCES 2024
作者: Xu, Yuting Chen, Lin Yu, Xiang Liu, Kui Guangdong Key Laboratory of Blockchain Security Guangzhou University Guangzhou University Guangzhou510006 China School of Electronics and Information Engineering Taizhou University Taizhou318000 China Guangzhou University Technology Center of Network and Modern Education Technology Guangzhou Guangdong510006 China
With the arose of digital era, Decentralized Autonomous Organization (DAO), as the primary representatives of blockchain decentralized application organizational forms, have consistently showcased their autonomous gov... 详细信息
来源: 评论
Persuasion Should be Double-Blind: A Multi-Domain Dialogue Dataset With Faithfulness Based on Causal Theory of Mind
arXiv
收藏 引用
arXiv 2025年
作者: Zhang, Dingyi Zhou, Deyu School of Computer Science and Engineering Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University China
Persuasive dialogue plays a pivotal role in human communication, influencing various domains. Recent persuasive dialogue datasets often fail to align with real-world interpersonal interactions, leading to unfaithful r... 详细信息
来源: 评论