咨询与建议

限定检索结果

文献类型

  • 4,435 篇 会议
  • 3,397 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,840 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,280 篇 工学
    • 3,971 篇 计算机科学与技术...
    • 3,151 篇 软件工程
    • 1,357 篇 信息与通信工程
    • 695 篇 电气工程
    • 557 篇 控制科学与工程
    • 542 篇 电子科学与技术(可...
    • 455 篇 网络空间安全
    • 439 篇 生物工程
    • 303 篇 机械工程
    • 233 篇 光学工程
    • 224 篇 仪器科学与技术
    • 189 篇 生物医学工程(可授...
    • 168 篇 安全科学与工程
    • 148 篇 动力工程及工程热...
    • 145 篇 化学工程与技术
    • 133 篇 交通运输工程
    • 127 篇 建筑学
  • 2,305 篇 理学
    • 1,382 篇 数学
    • 506 篇 物理学
    • 475 篇 生物学
    • 430 篇 统计学(可授理学、...
    • 208 篇 系统科学
    • 165 篇 化学
  • 1,340 篇 管理学
    • 816 篇 管理科学与工程(可...
    • 584 篇 图书情报与档案管...
    • 290 篇 工商管理
  • 288 篇 法学
    • 167 篇 社会学
    • 119 篇 法学
  • 160 篇 医学
    • 130 篇 临床医学
    • 118 篇 基础医学(可授医学...
  • 117 篇 经济学
  • 98 篇 军事学
  • 54 篇 农学
  • 46 篇 教育学
  • 24 篇 文学
  • 22 篇 艺术学

主题

  • 239 篇 feature extracti...
  • 230 篇 semantics
  • 214 篇 cryptography
  • 182 篇 authentication
  • 181 篇 information secu...
  • 162 篇 computational mo...
  • 158 篇 security
  • 150 篇 protocols
  • 142 篇 accuracy
  • 140 篇 privacy
  • 139 篇 deep learning
  • 126 篇 training
  • 122 篇 laboratories
  • 106 篇 data models
  • 100 篇 federated learni...
  • 100 篇 cloud computing
  • 95 篇 servers
  • 93 篇 blockchain
  • 91 篇 public key crypt...
  • 88 篇 data privacy

机构

  • 203 篇 shandong provinc...
  • 174 篇 key laboratory o...
  • 158 篇 school of comput...
  • 155 篇 state key labora...
  • 114 篇 school of comput...
  • 106 篇 department of co...
  • 106 篇 school of cyber ...
  • 97 篇 information secu...
  • 80 篇 key laboratory o...
  • 79 篇 institute of inf...
  • 68 篇 guangdong provin...
  • 66 篇 computer network...
  • 65 篇 college of mathe...
  • 64 篇 university of ch...
  • 63 篇 state grid key l...
  • 62 篇 peng cheng labor...
  • 60 篇 key laboratory o...
  • 59 篇 school of softwa...
  • 59 篇 school of comput...
  • 55 篇 key laboratory o...

作者

  • 55 篇 jianfeng ma
  • 54 篇 yang yang
  • 50 篇 ma jianfeng
  • 45 篇 yixian yang
  • 41 篇 zheng wei-shi
  • 41 篇 ding yong
  • 38 篇 huang qingming
  • 33 篇 zhang huanguo
  • 32 篇 wang wei
  • 32 篇 hu yupu
  • 31 篇 cong runmin
  • 31 篇 xu an wang
  • 30 篇 yang yixian
  • 29 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 25 篇 xu li
  • 25 篇 xie xiaohua
  • 24 篇 xinhong hei
  • 23 篇 liu xin

语言

  • 7,214 篇 英文
  • 362 篇 其他
  • 277 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Computer Network and Information Security"
7840 条 记 录,以下是221-230 订阅
排序:
Privacy-Preserving Interactive Semantic Codec Training for IoT-Based Holographic Counterparts
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Xu, Jinpeng Chen, Liang Lin, Limei Wang, Xiaoding Huang, Yanze Xu, Li Piran, Md. Jalil Fujian Normal University College of Computer and Cyber Security Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Fuzhou350117 China Fujian University of Technology School of Computer Science and Mathematics Fujian Fuzhou350118 China Sejong University Department of Computer Science and Engineering Seoul05006 Korea Republic of
The use of IoT-based semantic codecs to process complex contextual semantic information in holographic counterparts introduces significant privacy risks, as it may expose sensitive data, thereby increasing the likelih... 详细信息
来源: 评论
A Novel Riemannian Sparse Representation Learning network for Polarimetric SAR Image Classification
arXiv
收藏 引用
arXiv 2025年
作者: Shi, Junfei Nie, Mengmeng Lin, Weisi Jin, Haiyan Li, Junhuai Wang, Rui The Department of Computer Science and Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an University of Technology Xi’an China The Department of Computer Science and Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an University of Technology Xi’an710048 China the School of Computer Science and Engineering Nanyang Technological University 639798 Singapore The School of Artificial Intelligence and Computer Science Jiangnan University Wuxi214122 China
Deep learning is an effective end-to-end method for Polarimetric Synthetic Aperture Radar(PolSAR) image classification, but it lacks the guidance of related mathematical principle and is essentially a black-box model.... 详细信息
来源: 评论
Towards an Ontology of Traceable Impact Management in the Food Supply Chain
arXiv
收藏 引用
arXiv 2025年
作者: Gajderowicz, Bart Fox, Mark S. Gao, Yongchao Urban Data Centre School of Cities University of Toronto Toronto Canada Key Laboratory of Computing Power Network and Information Security Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Jinan China
The pursuit of quality improvements and accountability in the food supply chains, especially how they relate to food-related outcomes, such as hunger, has become increasingly vital, necessitating a comprehensive appro...
来源: 评论
Power control and task offloading strategies for high-density wireless body area networks based on deep reinforcement learning
收藏 引用
computer networks 2025年 267卷
作者: Liao, Yang Zhou, Huayang Leng, Chengfeng Su, Zhenlang Qin, Tuanfa School of Computer and Electronic Information Guangxi University Nanning530004 China Guangxi Key Laboratory of Multimedia Communications and Network Technology Guangxi University Nanning530004 China
With the widespread application of Wireless Body Area network (WBAN) in healthcare, issues such as a lack of computational resources and communication interference in high-density WBAN scenarios have become increasing... 详细信息
来源: 评论
EPI-Mamba: State Space Model for Semantic Segmentation from Light Fields
EPI-Mamba: State Space Model for Semantic Segmentation from ...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Yan Li Jianan Chen Qiong Wang Jinshan Xu College of Computer Science & Technology Zhejiang University of Technology Hangzhou China Guangdong Provincial Key Laboratory of Intelligent Information Processing & Shenzhen Key Laboratory of Media Security Shenzhen University Shenzhen China
Global contextual dependency is of significance for semantic segmentation from light fields. However, previous works mostly exploit attention mechanisms to model spatial context dependency and angular context dependen... 详细信息
来源: 评论
Classification of Zhuang Dialect combined with Bert and SimAM
Classification of Zhuang Dialect combined with Bert and SimA...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Min Huang Xuejun Zhang Wenkang Chen School of Computer Electronics and Information Guangxi Key Laboratory of Multimedia Communications and Network Technology Guangxi University Nanning China School of Electrical Engineering Guangxi Key Laboratory of Multimedia Communications and Network Technology Guangxi University Nanning China
Language recognition refers to the automatic recognition of the language type of the given speech segments. Zhuang is an important language in Southeast Asia, with more than 16 million native speakers. Due to the scar... 详细信息
来源: 评论
PPEC: A Privacy-Preserving, Cost-Effective Incremental Density Peak Clustering Analysis on Encrypted Outsourced Data
收藏 引用
IEEE Transactions on Cloud Computing 2025年
作者: Yang, Haomiao Ding, Zikang Lu, Ruiheng Xiang, Kunlan Li, Hongwei Wu, Dakui University of Electronic Science and Technology of China Chengdu611731 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan250353 China Shanghai University Shanghai200444 China
Call detail records (CDRs) provide valuable insights into user behavior, which are instrumental for telecom companies in optimizing network coverage and service quality. However, while cloud computing facilitates clus... 详细信息
来源: 评论
Privacy-Preserving IoT Image Transmission: Multi-Stage SVD Data Embedding and Heatmap Alignment
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Du, Kaixin Ma, Bin Yang, Meihong Wang, Xiaoyu Li, Xiaolong Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250101 China Beijing Jiaotong University School of Computer and Information Technology Beijing100044 China
The images transmitted by IoT devices, particularly those used for surveillance or sensor data, are vulnerable to malicious screenshots and unauthorized access, leading to potential privacy breaches. To address this, ... 详细信息
来源: 评论
DDoS Attack Detection and Mitigation Based on Asynchronous Personalized Federated Learning
收藏 引用
Jisuanji Xuebao/Chinese Journal of computers 2025年 第4期48卷 808-827页
作者: Zhu, Hai-Ting Wei, Ming-Gang Liu, Feng-Ning He, Gao-Feng Zhang, Lu School of Internet of Things Nanjing University of Posts and Telecommunications Nanjing210003 China Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University Nanjing210096 China School of Computer Science Nanjing Audit University Nanjing211815 China
network traffic classification serves as a fundamental component of both network management and cybersecurity, playing a pivotal role in ensuring the stability and security of modern communication infrastructures. Amo... 详细信息
来源: 评论
Self-Attention Policy Optimization for Task Offloading and Resource Allocation in Low-Carbon Agricultural Consumer Electronic Devices
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Huang, Yi Zeng, Jisong Wei, Yanting Chen, Miaojiang Xiao, Wenjing Yang, Yang Liu, Zhiquan Farouk, Ahmed Song, Houbing Herbert Guangxi University School of Computer Electronics and Information China Guangxi Key Laboratory of Multimedia Communications and Network Technology Nanning530004 China Jinan University College of Cyber Security Guangzhou510632 China Faculty of Computers and Artificial Intelligence Egypt Department of Information Systems BaltimoreMD21250 United States
In recent years, the widespread use of edge agricultural consumer electronics has greatly contributed to the level of intelligence in agricultural production, bringing higher efficiency and quality. However, offloadin... 详细信息
来源: 评论