咨询与建议

限定检索结果

文献类型

  • 4,435 篇 会议
  • 3,397 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,840 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,280 篇 工学
    • 3,971 篇 计算机科学与技术...
    • 3,151 篇 软件工程
    • 1,357 篇 信息与通信工程
    • 695 篇 电气工程
    • 557 篇 控制科学与工程
    • 542 篇 电子科学与技术(可...
    • 455 篇 网络空间安全
    • 439 篇 生物工程
    • 303 篇 机械工程
    • 233 篇 光学工程
    • 224 篇 仪器科学与技术
    • 189 篇 生物医学工程(可授...
    • 168 篇 安全科学与工程
    • 148 篇 动力工程及工程热...
    • 145 篇 化学工程与技术
    • 133 篇 交通运输工程
    • 127 篇 建筑学
  • 2,305 篇 理学
    • 1,382 篇 数学
    • 506 篇 物理学
    • 475 篇 生物学
    • 430 篇 统计学(可授理学、...
    • 208 篇 系统科学
    • 165 篇 化学
  • 1,340 篇 管理学
    • 816 篇 管理科学与工程(可...
    • 584 篇 图书情报与档案管...
    • 290 篇 工商管理
  • 288 篇 法学
    • 167 篇 社会学
    • 119 篇 法学
  • 160 篇 医学
    • 130 篇 临床医学
    • 118 篇 基础医学(可授医学...
  • 117 篇 经济学
  • 98 篇 军事学
  • 54 篇 农学
  • 46 篇 教育学
  • 24 篇 文学
  • 22 篇 艺术学

主题

  • 239 篇 feature extracti...
  • 230 篇 semantics
  • 214 篇 cryptography
  • 182 篇 authentication
  • 181 篇 information secu...
  • 162 篇 computational mo...
  • 158 篇 security
  • 150 篇 protocols
  • 142 篇 accuracy
  • 140 篇 privacy
  • 139 篇 deep learning
  • 126 篇 training
  • 122 篇 laboratories
  • 106 篇 data models
  • 100 篇 federated learni...
  • 100 篇 cloud computing
  • 95 篇 servers
  • 93 篇 blockchain
  • 91 篇 public key crypt...
  • 88 篇 data privacy

机构

  • 203 篇 shandong provinc...
  • 174 篇 key laboratory o...
  • 158 篇 school of comput...
  • 155 篇 state key labora...
  • 114 篇 school of comput...
  • 106 篇 department of co...
  • 106 篇 school of cyber ...
  • 97 篇 information secu...
  • 80 篇 key laboratory o...
  • 79 篇 institute of inf...
  • 68 篇 guangdong provin...
  • 66 篇 computer network...
  • 65 篇 college of mathe...
  • 64 篇 university of ch...
  • 63 篇 state grid key l...
  • 62 篇 peng cheng labor...
  • 60 篇 key laboratory o...
  • 59 篇 school of softwa...
  • 59 篇 school of comput...
  • 55 篇 key laboratory o...

作者

  • 55 篇 jianfeng ma
  • 54 篇 yang yang
  • 50 篇 ma jianfeng
  • 45 篇 yixian yang
  • 41 篇 zheng wei-shi
  • 41 篇 ding yong
  • 38 篇 huang qingming
  • 33 篇 zhang huanguo
  • 32 篇 wang wei
  • 32 篇 hu yupu
  • 31 篇 cong runmin
  • 31 篇 xu an wang
  • 30 篇 yang yixian
  • 29 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 25 篇 xu li
  • 25 篇 xie xiaohua
  • 24 篇 xinhong hei
  • 23 篇 liu xin

语言

  • 7,214 篇 英文
  • 362 篇 其他
  • 277 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Computer Network and Information Security"
7840 条 记 录,以下是181-190 订阅
排序:
Nonlinear Interference-Aware Routing,Wavelength and Power Allocation in C+L+S Multi-Band Optical networks
收藏 引用
China Communications 2025年 第4期22卷 129-142页
作者: Zhang Xu Xie Wang Feng Chuan Zeng Hankun Zhou Shanshan Zhang Fan Gong Xiaoxue School of Communications and Information Engineering Chongqing University of Posts and TelecommunicationsChongqing 400065China Institute of Intelligent Communications and Network Security Chongqing University of Posts and TelecommunicationsChongqing 400065China Key Laboratory of Big Data Intelligent Computing Chongqing University of Posts and TelecommunicationsChongqing 400065China
Multi-band optical networks are a potential technology for increasing network ***,the strong interference and non-uniformity between wavelengths in multi-band optical networks have become a bottleneck restricting the ... 详细信息
来源: 评论
Semantic-Aware Prompt Learning for Multimodal Sarcasm Detection
Semantic-Aware Prompt Learning for Multimodal Sarcasm Detect...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Guangjin Wang Bao Wang Fuyong Xu Zhenfang Zhu Peipei Wang Ru Wang Peiyu Liu School of Information Science and Engineering Shandong Normal University Jinan China School of Information Science and Electrical Engineering Shandong Jiao Tong University Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
Multimodal sarcasm detection aims to identify whether utterances express sarcastic intentions contrary to their literal meaning based on multimodal information. However, existing methods fail to explore the model’s &... 详细信息
来源: 评论
A secure quantum homomorphic encryption ciphertext retrieval scheme
收藏 引用
Soft Computing 2025年 第3期29卷 1497-1509页
作者: Cheng, Zhen-Wen Chen, Xiu-Bo Xu, Gang Chang, Yan Miao, Li-Hua Yang, Yi-Xian Wang, Ya-Lan School of Data and Computer Science Shandong Women’s University Jinan250300 China Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing100876 China School of Information Science and Technology North China University of Technology Beijing100144 China School of Cybersecurity Chengdu University of Information Technology Chengdu610225 China Huawei Technologies Co. Ltd Shenzhen518129 China Department of Computer Science Faculty of Engineering and Physical Sciences University of Surrey Surrey GuildfordGU2 7XH United Kingdom
In a recent paper (Gong et al. Quantum Inf Process 19:3, 2020), a novel ciphertext retrieval scheme based on the Grover algorithm and quantum homomorphic encryption was presented. In this scheme, when the server perfo... 详细信息
来源: 评论
DSDIR: A Two-Stage Method for Addressing Noisy Long-Tailed Problems in Malicious Traffic Detection
DSDIR: A Two-Stage Method for Addressing Noisy Long-Tailed P...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Guoliang Li Ruiqi Zhang Zhe Sun Lingkai Xing Yu Zhang College of Cyber Science Nankai University China Tianjin Key Laboratory of Network and Data Security Technology China Key Laboratory of Data and Intelligent System Security Ministry of Education China College of Computer Science Nankai University China
In recent years, deep learning based malicious traffic detection (MTD) systems have demonstrated remarkable success. However, their effectiveness tend to decrease because most malicious traffic datasets are suffered f... 详细信息
来源: 评论
A Comprehensive Review on Deep Learning System Testing  24th
A Comprehensive Review on Deep Learning System Testing
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Li, Ying Shan, Chun Liu, Zhen Liao, Shuyan Beijing Key Laboratory of Software Security Engineering Technology Beijing Institute of Technology Beijing China School of Computer Science and Technology Beijing Institute of Technology Beijing China Computer School Beijing Information Science and Technology University Beijing China School of Cyberspace Science and Technology Beijing Institute of Technology Beijing China
Deep learning(DL) systems exhibit multiple behavioral characteristics such as correctness, robustness, and fairness. Ensuring that these behavioral characteristics function properly is crucial for maintaining the accu... 详细信息
来源: 评论
HIFI-Stego: A High-Fidelity Embedding Audio Steganography Based on Audio Features Decoupling
IEEE Transactions on Audio, Speech and Language Processing
收藏 引用
IEEE Transactions on Audio, Speech and Language Processing 2025年 33卷 2032-2044页
作者: Sanfeng Zhang Baiyu Tian Yang Gao Xingyu Liu Wang Yang School of Cyber Science and Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Nanjing China
The higher audio quality of steganography is directly correlated with the increased resistance to steganalysis tools. The advancement of generative AI technologies, particularly those that decouple style features from... 详细信息
来源: 评论
EVPIR: Efficient and Verifiable Privacy-Preserving Image Retrieval in Cloud-assisted Internet of Things
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Li, Mingyue Li, Yuntao Du, Ruizhong Jia, Chunfu Shao, Wei Hebei University School of Cyber Security and Computer Baoding071000 China Key Lab on High Trusted Information Sys tem in Hebei Province Hebei China College of Cyber Sciences Nankai university Tianjin300350 China Tianjin Key Laboratory of Network and Data Security Technology Tianjin300350 China Jinan250014 China
With the proliferation of mobile devices and the advancement of cloud computing capabilities, cloud-assisted Internet of Things (IoT) attracts increased attention based on its computational and storage advantages. Upo... 详细信息
来源: 评论
Unveiling the Superiority of Unsupervised Learning on GPU Cryptojacking Detection: Practice on Magnetic Side Channel-Based Mechanism
收藏 引用
IEEE Transactions on information Forensics and security 2025年 20卷 4874-4889页
作者: Cao, Hangcheng Xu, Guowen He, Ziyang Shi, Shaoqing Xu, Shengmin Wu, Cong Ning, Jianting Hunan University College of Computer Science and Electronic Engineering Changsha410012 China City University of Hong Kong Department of Computer Science Hong Kong Hong Kong University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu610054 China Zhengzhou University School of Cyber Science and Engineering Zhengzhou450001 China Zhengzhou University International College Zhengzhou450001 China Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fuzhou350007 China Nanyang Technological University College of Computing and Data Science Jurong West 639798 Singapore Wuhan University School of Cyber Science and Engineering Wuhan430072 China City University of Macau Faculty of Data Science Macau China
Ample profits of GPU cryptojacking attract hackers to recklessly invade victims’ devices, for completing specific cryptocurrency mining tasks. Such malicious invasion undoubtedly obstructs normal device usage and was... 详细信息
来源: 评论
Using Depth-Enhanced Spatial Transformation for Student Gaze Target Estimation in Dual-View Classroom Images
Using Depth-Enhanced Spatial Transformation for Student Gaze...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Miao, Haonan Zhao, Peizheng Sun, Yuqi Nan, Fang Zhang, Xiaolong Wu, Yaqiang Tian, Feng School of Computer Science and Technology Xi'an Jiaotong University Xi'an710049 China Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an710049 China School of Advanced Technology Xi'an Jiaotong-Liverpool University Suzhou215123 China Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Xi'an Jiaotong University Xi'an710049 China
Dual-view gaze target estimation in classroom environments has not been thoroughly explored. Existing methods lack consideration of depth information, primarily focusing on 2D image information and neglecting the late... 详细信息
来源: 评论
TA-DPDP: Dynamic Provable Data Possession for Online Collaborative System with Tractable Anonymous  20th
TA-DPDP: Dynamic Provable Data Possession for Online Collab...
收藏 引用
20th International Conference on information security and Cryptology, Inscrypt 2024
作者: Wu, Chenchen You, Weijing Xu, Li College of Computer and Cyber Security Fujian Normal University Fuzhou 350117 China Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Normal University Fuzhou 350117 China
Recently, multiple parties cooperate together in online collaborative systems, e.g., Overleaf and Git, to enhance working efficiency, while with concerns about losing ownership of their online dynamic data. For tradit... 详细信息
来源: 评论