咨询与建议

限定检索结果

文献类型

  • 4,435 篇 会议
  • 3,397 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,840 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,280 篇 工学
    • 3,971 篇 计算机科学与技术...
    • 3,151 篇 软件工程
    • 1,357 篇 信息与通信工程
    • 695 篇 电气工程
    • 557 篇 控制科学与工程
    • 542 篇 电子科学与技术(可...
    • 455 篇 网络空间安全
    • 439 篇 生物工程
    • 303 篇 机械工程
    • 233 篇 光学工程
    • 224 篇 仪器科学与技术
    • 189 篇 生物医学工程(可授...
    • 168 篇 安全科学与工程
    • 148 篇 动力工程及工程热...
    • 145 篇 化学工程与技术
    • 133 篇 交通运输工程
    • 127 篇 建筑学
  • 2,305 篇 理学
    • 1,382 篇 数学
    • 506 篇 物理学
    • 475 篇 生物学
    • 430 篇 统计学(可授理学、...
    • 208 篇 系统科学
    • 165 篇 化学
  • 1,340 篇 管理学
    • 816 篇 管理科学与工程(可...
    • 584 篇 图书情报与档案管...
    • 290 篇 工商管理
  • 288 篇 法学
    • 167 篇 社会学
    • 119 篇 法学
  • 160 篇 医学
    • 130 篇 临床医学
    • 118 篇 基础医学(可授医学...
  • 117 篇 经济学
  • 98 篇 军事学
  • 54 篇 农学
  • 46 篇 教育学
  • 24 篇 文学
  • 22 篇 艺术学

主题

  • 239 篇 feature extracti...
  • 230 篇 semantics
  • 214 篇 cryptography
  • 182 篇 authentication
  • 181 篇 information secu...
  • 162 篇 computational mo...
  • 158 篇 security
  • 150 篇 protocols
  • 142 篇 accuracy
  • 140 篇 privacy
  • 139 篇 deep learning
  • 126 篇 training
  • 122 篇 laboratories
  • 106 篇 data models
  • 100 篇 federated learni...
  • 100 篇 cloud computing
  • 95 篇 servers
  • 93 篇 blockchain
  • 91 篇 public key crypt...
  • 88 篇 data privacy

机构

  • 203 篇 shandong provinc...
  • 174 篇 key laboratory o...
  • 158 篇 school of comput...
  • 155 篇 state key labora...
  • 114 篇 school of comput...
  • 106 篇 department of co...
  • 106 篇 school of cyber ...
  • 97 篇 information secu...
  • 80 篇 key laboratory o...
  • 79 篇 institute of inf...
  • 68 篇 guangdong provin...
  • 66 篇 computer network...
  • 65 篇 college of mathe...
  • 64 篇 university of ch...
  • 63 篇 state grid key l...
  • 62 篇 peng cheng labor...
  • 60 篇 key laboratory o...
  • 59 篇 school of softwa...
  • 59 篇 school of comput...
  • 55 篇 key laboratory o...

作者

  • 55 篇 jianfeng ma
  • 54 篇 yang yang
  • 50 篇 ma jianfeng
  • 45 篇 yixian yang
  • 41 篇 zheng wei-shi
  • 41 篇 ding yong
  • 38 篇 huang qingming
  • 33 篇 zhang huanguo
  • 32 篇 wang wei
  • 32 篇 hu yupu
  • 31 篇 cong runmin
  • 31 篇 xu an wang
  • 30 篇 yang yixian
  • 29 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 25 篇 xu li
  • 25 篇 xie xiaohua
  • 24 篇 xinhong hei
  • 23 篇 liu xin

语言

  • 7,214 篇 英文
  • 362 篇 其他
  • 277 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Computer Network and Information Security"
7840 条 记 录,以下是161-170 订阅
排序:
Privacy-Enhanced Role-Based Access Control for IoT Systems
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Zhang, Yawei Chen, Lanxiang Zhu, Yizhao Fujian Normal University Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fuzhou350117 China City University of Macau Faculty of Data Science China
Unauthorized accessing private information poses a significant security risk in IoT. Although role-based access control can partially address the problem, there is a lack of studies on protecting the privacy of roles.... 详细信息
来源: 评论
Get the Punchline: Headline-Centric Multi-View Learning for Personalized Headline Generation
收藏 引用
IEEE Transactions on Audio, Speech and Language Processing 2025年 33卷 962-973页
作者: Wenya Guo Shenglong Yu Ying Zhang Zhengkun Zhang Xiaojie Yuan College of Computer Science Nankai University Tianjin China Tianjin Key Laboratory of Network and Data Security Technology College of Cyber Science Nankai University Tianjin China
Personalized news headline generation aims to generate a user-specific headline based on their reading histories. Existing approaches incorporate information from various aspects of news articles, which leads to a lac... 详细信息
来源: 评论
Across-Platform Detection of Malicious Cryptocurrency Accounts via Interaction Feature Learning
收藏 引用
IEEE Transactions on information Forensics and security 2025年 20卷 4783-4798页
作者: Che, Zheng Shen, Meng Tan, Zhehui Du, Hanbiao Wang, Wei Chen, Ting Zhao, Qinglin Xie, Yong Zhu, Liehuang Beijing Institute of Technology School of Computer Science Beijing100081 China Beijing Institute of Technology School of Cyberspace Science and Technology Beijing100081 China Xi'an Jiaotong University Key Laboratory for Intelligent Networks and Network Security Ministry of Education Xi'an710049 China University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China Macau University of Science and Technology School of Computer Science and Engineering Taipa China Qinghai Institute of Technology School of Computer and Information Science Xining810016 China
With the rapid evolution of Web3.0, cryptocurrency has become a cornerstone of decentralized finance. While these digital assets enable efficient and borderless financial transactions, their pseudonymous nature has al... 详细信息
来源: 评论
Voiceprint recognition model based on Ecapa-Tdnn and ResNet  5
Voiceprint recognition model based on Ecapa-Tdnn and ResNet
收藏 引用
5th International Conference on Telecommunications, Optics, and computer Science, TOCS 2024
作者: Jia, Chengjie Fei, Rong Li, Xiaomeng School of Computer Science and Engineering Xi'an University of Technology Shaanxi Xi'an 710004 China Shaanxi Key Laboratory for Network Computing and Security Technology School of Computer Science and Engineering Xi'an University of Technology Shaanxi Xi'an 710048 China
In recent years, with the continuous progress of deep learning neural networks and the construction of large data sets, new breakthroughs in voiceprint verification technology for voice calls have been rapidly achieve... 详细信息
来源: 评论
Research and Implementation of Trusted Blockchain Core Technology Based on State Secret Algorithm
收藏 引用
China Communications 2025年 第4期22卷 143-160页
作者: Zheng Qingan Meng Jialin Wu Junjie Li Jingtao Lin Haonan Computer Science and Information Security Management Department Fujian Police CollegeFuzhou 350007China Fujian Province Key Laboratory for Digital Network Crime Supervision and Prevention Fuzhou 350007China ByteDance Technology(Beijing)Co. Ltd.Haidian DistrictBeijing 100080China Dongguan Water Group Co. LtdDongguan 523000China Fuqing Municipal Public Security Bureau Fuzhou 350301China
With the rapid development of blockchain technology,the Chinese government has proposed that the commercial use of blockchain services in China should support the national encryption standard,also known as the state s... 详细信息
来源: 评论
Recipient-Aware Photo Automatic Deletion Control Policy Recommendation Scheme in Online Social networks
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年 第3期22卷 2352-2366页
作者: Luo, Haiyang Sun, Zhe Sun, Yunqing Li, Ang Wang, Binghui Cao, Jin Niu, Ben Chinese Academy of Sciences Institute of Information Engineering Beijing100085 China University of Chinese Academy of Sciences School of Cyber Security Beijing100049 China Key Laboratory of Cyberspace Security Defense Beijing100085 China Guangdong Guangzhou510006 China Northwestern University McCormick School of Engineering and Applied Science EvanstonIL60208 United States University of Maryland Department of Electrical and Computer Engineering College ParkMD20742 United States Illinois Institute of Technology Department of Computer Science ChicagoIL60616 United States Xidian University State Key Laboratory of Integrated Services Networks School of Cyber Engineering Shaanxi Xi’an710071 China
Content sharing, whether in Online Social networks (OSNs) or even in the Internet of Things (IoT), serves as a pivotal link in the flow of data. To better protect the privacy of shared content, current OSNs allow shar... 详细信息
来源: 评论
ALFC-Point: Adaptive Laplacian Feature Convolution network for 3D Point Cloud Understanding  41st
ALFC-Point: Adaptive Laplacian Feature Convolution Network f...
收藏 引用
41st computer Graphics International Conference, CGI 2024
作者: Liao, Junjie Yin, Mengxiao Li, Ming Zhu, Congyang Yang, Zhiqiang Zhan, Feng School of Computer and Electronics Information Guangxi University Guangxi Nanning530004 China Guangxi Key Laboratory of Multimedia Communications and Network Technology Guangxi Nanning530004 China Education Department of Guangxi Zhuang Autonomous Region Nanning China
To capture 3D geometric details, point cloud understanding primarily employs convolution, dynamic map, or transformer methods to build complex local geometry extractors. When dealing with sparse and noisy point clouds... 详细信息
来源: 评论
Spatial-Temporal Semantic Feature Interaction network for Semantic Change Detection in Remote Sensing Images
收藏 引用
IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing 2025年 18卷 12090-12102页
作者: Zhang, Yuhang Zhang, Wuxia Ding, Songtao Wu, Siyuan Lu, Xiaoqiang Xi'an University of Posts and Telecommunications Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing School of Computer Science and Technology Xi'an710121 China Xi'an University of Technology College of Computer Science and Engineering Shaanxi Xi'an710048 China Fuzhou University College of Physics and Information Engineering Fuzhou350002 China
Semantic Change Detection (SCD) in Remote Sensing Images (RSI) aims to identify changes in the type of Land Cover/Land Use (LCLU) corresponding to changed areas in RSI. The "from-to" information of the acqui... 详细信息
来源: 评论
Pairing-Free Blockchain-Assisted Certificateless Aggregation Signcryption Scheme for VANETs
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 15545-15557页
作者: Wang, Yahui Peng, Cong Jia, Xiaoying Wen, Jiaming Zhang, Yuanyuan Xinyang Normal University School of Computer and Information Technology School of Software Xinyang464000 China Wuhan University School of Cyber Science and Engineering Wuhan430072 China South-Central Minzu University School of Mathematics and Statistics Wuhan430074 China Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan430072 China University of Wollongong Institute of Cybersecurity and Cryptology School of Computing and Information Technology WollongongNSW2522 Australia Hubei University of Technology School of computer science Wuhan430072 China
Smart vehicle applications play a crucial role in intelligent transportation systems, enabling sensor-equipped vehicles to establish dynamic networks for efficient collection, sharing, and aggregation. This significan... 详细信息
来源: 评论
network intrusion detection based on feature fusion of attack dimension
收藏 引用
Journal of Supercomputing 2025年 第6期81卷 1-33页
作者: Sun, Xiaolong Gu, Zhengyao Zhang, Hao Gu, Jason Liu, Yanhua Dong, Chen Ye, Junwei College of Computer and Data Science Fuzhou University Fuzhou350116 China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou350116 China Engineering Research Center of Big Data Intelligence Chinese Ministry of Education Fuzhou350116 China Department of Electrical and Computer Engineering Dalhousie University HalifaxNSB3J 1Z1 Canada
network traffic anomaly detection involves the rapid identification of intrusions within a network through the detection, analysis, and classification of network traffic data. The variety of cyberattacks encompasses d... 详细信息
来源: 评论