咨询与建议

限定检索结果

文献类型

  • 4,446 篇 会议
  • 3,346 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,800 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,222 篇 工学
    • 3,921 篇 计算机科学与技术...
    • 3,127 篇 软件工程
    • 1,329 篇 信息与通信工程
    • 652 篇 电气工程
    • 539 篇 控制科学与工程
    • 522 篇 电子科学与技术(可...
    • 441 篇 网络空间安全
    • 439 篇 生物工程
    • 299 篇 机械工程
    • 230 篇 光学工程
    • 224 篇 仪器科学与技术
    • 188 篇 生物医学工程(可授...
    • 162 篇 安全科学与工程
    • 149 篇 动力工程及工程热...
    • 145 篇 化学工程与技术
    • 126 篇 建筑学
    • 124 篇 交通运输工程
  • 2,280 篇 理学
    • 1,359 篇 数学
    • 498 篇 物理学
    • 476 篇 生物学
    • 420 篇 统计学(可授理学、...
    • 208 篇 系统科学
    • 165 篇 化学
  • 1,324 篇 管理学
    • 807 篇 管理科学与工程(可...
    • 573 篇 图书情报与档案管...
    • 289 篇 工商管理
  • 287 篇 法学
    • 167 篇 社会学
    • 118 篇 法学
  • 154 篇 医学
    • 127 篇 临床医学
  • 116 篇 经济学
    • 116 篇 应用经济学
  • 98 篇 军事学
  • 54 篇 农学
  • 42 篇 教育学
  • 24 篇 文学
  • 22 篇 艺术学

主题

  • 238 篇 feature extracti...
  • 228 篇 semantics
  • 216 篇 cryptography
  • 182 篇 authentication
  • 181 篇 information secu...
  • 162 篇 computational mo...
  • 158 篇 security
  • 151 篇 protocols
  • 142 篇 accuracy
  • 140 篇 privacy
  • 139 篇 deep learning
  • 126 篇 training
  • 122 篇 laboratories
  • 105 篇 data models
  • 99 篇 federated learni...
  • 99 篇 cloud computing
  • 94 篇 servers
  • 93 篇 blockchain
  • 92 篇 public key crypt...
  • 88 篇 data privacy

机构

  • 203 篇 shandong provinc...
  • 175 篇 key laboratory o...
  • 158 篇 school of comput...
  • 156 篇 state key labora...
  • 111 篇 school of comput...
  • 106 篇 department of co...
  • 106 篇 school of cyber ...
  • 97 篇 information secu...
  • 80 篇 key laboratory o...
  • 78 篇 institute of inf...
  • 65 篇 university of ch...
  • 65 篇 college of mathe...
  • 65 篇 state grid key l...
  • 65 篇 guangdong provin...
  • 64 篇 computer network...
  • 61 篇 peng cheng labor...
  • 60 篇 key laboratory o...
  • 59 篇 school of softwa...
  • 57 篇 school of comput...
  • 54 篇 key laboratory o...

作者

  • 55 篇 jianfeng ma
  • 53 篇 yang yang
  • 48 篇 ma jianfeng
  • 45 篇 yixian yang
  • 42 篇 ding yong
  • 41 篇 zheng wei-shi
  • 38 篇 huang qingming
  • 31 篇 cong runmin
  • 31 篇 zhang huanguo
  • 31 篇 xu an wang
  • 31 篇 hu yupu
  • 31 篇 yang yixian
  • 30 篇 wang wei
  • 28 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 26 篇 min-ling zhang
  • 25 篇 xu li
  • 24 篇 xinhong hei
  • 24 篇 xie xiaohua

语言

  • 7,190 篇 英文
  • 348 篇 其他
  • 277 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Computer Network and Information Security"
7800 条 记 录,以下是211-220 订阅
排序:
FirmPorter: Porting RTOSes at the Binary Level for Firmware Re-hosting  26th
FirmPorter: Porting RTOSes at the Binary Level for Firmwa...
收藏 引用
26th International Conference on information and Communications security, ICICS 2024
作者: Xin, Mingfeng Wen, Hui Deng, Liting Li, Hong Li, Qiang Sun, Limin Beijing Key Laboratory of IOT Information Security Technology Institute of Information Engineering CAS Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China School of Computer and Information Technology Beijing Jiaotong University Beijing China
The rapid growth of the Industrial Internet of Things (IIoT) has brought real-time operating system (RTOS) into focus as major targets for both security analysts and malicious adversaries. Due to the non-standard hard... 详细信息
来源: 评论
MFFLEN: Multi-Label Text Classification Based on Multi-Feature Fusion and Label Embedding
MFFLEN: Multi-Label Text Classification Based on Multi-Featu...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Gu, Qiliang Zhao, Shuo Zhang, Jianqiang Song, Gongpeng Lu, Qin Key Laboratory of Computing Power Network and Information Security Jinan China Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China Shandong Branch of China Mobile Communication Group Design Institute Co. Jinan China
To address the challenges associated with insufficiently extracting and utilizing features at different levels, overlooking the connection between label meanings and text, and facing problems of over-compression or in... 详细信息
来源: 评论
A firmware upgrade solution based on hardware unique ID and SM4 cryptographic algorithm
A firmware upgrade solution based on hardware unique ID and ...
收藏 引用
2023 International Conference on computer Graphics, Artificial Intelligence, and Data Processing, ICCAID 2023
作者: Gao, Shaofeng Wang, Kun Chen, Xinze Fu, Yong Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan250000 China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan250000 China
This article presents and implements a firmware upgrade solution for embedded systems, which aims to address the vulnerability of using the same file that can be easily copied or stolen. When upgrading firmware, a txt... 详细信息
来源: 评论
Secure Similar Adjacent Vertex Query on Sparse Graph Data in Cloud Environment  8th
Secure Similar Adjacent Vertex Query on Sparse Graph Data i...
收藏 引用
8th International Congress on Edge Computing, EDGE 2024, Held as Part of the Services Conference Federation, SCF 2024
作者: Tian, Yun Wu, Bin Shi, Jiaoli Zhang, Caicai Xu, Du School of Computer and Big Data Science Jiujiang University Jiujiang332005 China Jiujiang Key Laboratory of Network and Information Security Jiujiang332005 China School of Modern Information Technology Zhejiang Polytechnic University of Mechanical and Electrical Engineering Hangzhou310053 China
The development of cloud computing and the widespread application of cloud services have made outsourcing services more convenient. The need for individuals and businesses to store and manipulate the graph data they g... 详细信息
来源: 评论
A knowledge-enhanced interest segment division attention network for click-through rate prediction
收藏 引用
Neural Computing and Applications 2024年 第34期36卷 21817-21837页
作者: Liu, Zhanghui Chen, Shijie Chen, Yuzhong Su, Jieyang Zhong, Jiayuan Dong, Chen College of Computer and Data Science Fuzhou University Fujian Province Fuzhou350108 China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fujian Province Fuzhou350108 China
Click-through rate (CTR) prediction aims to estimate the probability of a user clicking on a particular item, making it one of the core tasks in various recommendation platforms. In such systems, user behavior data ar... 详细信息
来源: 评论
Research on Setting of Two Firewall Rules Based on Ubuntu Linux System  5
Research on Setting of Two Firewall Rules Based on Ubuntu Li...
收藏 引用
5th International Conference on computer network, Electronic and Automation, ICCNEA 2022
作者: Ma, Limei Zhao, Dongmei Hebei Normal University College of Computer and Cyber Security Shijiazhuang China Key Laboratory of Network and Information Security in Hebei Province Shijiazhuang China
'security first' is the most concerned issue of Linux administrators. security refers to the integrity of data. The authentication security and integrity of data are higher than the privacy security of data. F... 详细信息
来源: 评论
Privacy-Preserving Responsible Gaming Systems  2
Privacy-Preserving Responsible Gaming Systems
收藏 引用
2nd International Conference on Big Data and Privacy Computing, BDPC 2024
作者: Zhu, Yizhao Chen, Lanxiang City University of Macau Faculty of Data Science 999078 China College of Computer and Cyber Security Fujian Normal University Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou China
Responsible gaming aims at maintaining the integrity and sustainability of the gaming industry. However, The exchange of sensitive data, such as player and gaming related information, among different parties raises si... 详细信息
来源: 评论
Evaluation Method of Object Control Capability for Children Based on Nonlinear Dynamics  23
Evaluation Method of Object Control Capability for Children ...
收藏 引用
3rd International Conference on Bioinformatics and Intelligent Computing, BIC 2023
作者: Wang, Huaijun Li, Chao Zhang, Dongsheng Li, Junhuai Key Laboratory of Network Computing and Security Technology School of Computer Science and Engineering Xi an University of Technology Xi'an China
DCD (Developmental Coordination Disorder) has become a global problem, and several studies have shown that early detection and intervention are important for the prevention and treatment of DCD in children. To address... 详细信息
来源: 评论
Light Up Fireflies: Towards Understanding the Design of Interpersonal Bodily Intertwinement in Bodily Play  24
Light Up Fireflies: Towards Understanding the Design of Inte...
收藏 引用
11th ACM SIGCHI Annual Symposium on computer-Human Interaction in Play, CHI-PLAY Companion 2024
作者: Lu, Yingtong Li, Zhuying Ding, Ding Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Nanjing China
In this paper, we explore the design of interpersonal bodily intertwinement through a VR social game, "Light Up Fireflies". Inspired by works of virtual co-embodiment, our game lets two players embody a sing... 详细信息
来源: 评论
A k-nearest neighbor query method based on trust and location privacy protection
A k-nearest neighbor query method based on trust and locatio...
收藏 引用
作者: Guo, Liangmin Zhu, Ying Yang, Hao Luo, Yonglong Sun, Liping Zheng, Xiaoyao School of Computer and Information Anhui Normal University Wuhu China Anhui Provincial Key Laboratory of Network and Information Security Wuhu China
Spatial query is an important supporting technology in the Internet of Things (IoT) and location-based services (LBS). The k-nearest neighbor query is widely used for spatial queries. However, user location privacy ma... 详细信息
来源: 评论