咨询与建议

限定检索结果

文献类型

  • 4,446 篇 会议
  • 3,346 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,800 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,222 篇 工学
    • 3,921 篇 计算机科学与技术...
    • 3,127 篇 软件工程
    • 1,329 篇 信息与通信工程
    • 652 篇 电气工程
    • 539 篇 控制科学与工程
    • 522 篇 电子科学与技术(可...
    • 441 篇 网络空间安全
    • 439 篇 生物工程
    • 299 篇 机械工程
    • 230 篇 光学工程
    • 224 篇 仪器科学与技术
    • 188 篇 生物医学工程(可授...
    • 162 篇 安全科学与工程
    • 149 篇 动力工程及工程热...
    • 145 篇 化学工程与技术
    • 126 篇 建筑学
    • 124 篇 交通运输工程
  • 2,280 篇 理学
    • 1,359 篇 数学
    • 498 篇 物理学
    • 476 篇 生物学
    • 420 篇 统计学(可授理学、...
    • 208 篇 系统科学
    • 165 篇 化学
  • 1,324 篇 管理学
    • 807 篇 管理科学与工程(可...
    • 573 篇 图书情报与档案管...
    • 289 篇 工商管理
  • 287 篇 法学
    • 167 篇 社会学
    • 118 篇 法学
  • 154 篇 医学
    • 127 篇 临床医学
  • 116 篇 经济学
    • 116 篇 应用经济学
  • 98 篇 军事学
  • 54 篇 农学
  • 42 篇 教育学
  • 24 篇 文学
  • 22 篇 艺术学

主题

  • 238 篇 feature extracti...
  • 228 篇 semantics
  • 216 篇 cryptography
  • 182 篇 authentication
  • 181 篇 information secu...
  • 162 篇 computational mo...
  • 158 篇 security
  • 151 篇 protocols
  • 142 篇 accuracy
  • 140 篇 privacy
  • 139 篇 deep learning
  • 126 篇 training
  • 122 篇 laboratories
  • 105 篇 data models
  • 99 篇 federated learni...
  • 99 篇 cloud computing
  • 94 篇 servers
  • 93 篇 blockchain
  • 92 篇 public key crypt...
  • 88 篇 data privacy

机构

  • 203 篇 shandong provinc...
  • 175 篇 key laboratory o...
  • 158 篇 school of comput...
  • 156 篇 state key labora...
  • 111 篇 school of comput...
  • 106 篇 department of co...
  • 106 篇 school of cyber ...
  • 97 篇 information secu...
  • 80 篇 key laboratory o...
  • 78 篇 institute of inf...
  • 65 篇 university of ch...
  • 65 篇 college of mathe...
  • 65 篇 state grid key l...
  • 65 篇 guangdong provin...
  • 64 篇 computer network...
  • 61 篇 peng cheng labor...
  • 60 篇 key laboratory o...
  • 59 篇 school of softwa...
  • 57 篇 school of comput...
  • 54 篇 key laboratory o...

作者

  • 55 篇 jianfeng ma
  • 53 篇 yang yang
  • 48 篇 ma jianfeng
  • 45 篇 yixian yang
  • 42 篇 ding yong
  • 41 篇 zheng wei-shi
  • 38 篇 huang qingming
  • 31 篇 cong runmin
  • 31 篇 zhang huanguo
  • 31 篇 xu an wang
  • 31 篇 hu yupu
  • 31 篇 yang yixian
  • 30 篇 wang wei
  • 28 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 26 篇 min-ling zhang
  • 25 篇 xu li
  • 24 篇 xinhong hei
  • 24 篇 xie xiaohua

语言

  • 7,190 篇 英文
  • 348 篇 其他
  • 277 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Computer Network and Information Security"
7800 条 记 录,以下是231-240 订阅
排序:
An Efficient and Provably Secure SM2 key-Insulated Signature Scheme for Industrial Internet of Things
收藏 引用
computer Modeling in Engineering & Sciences 2024年 第1期138卷 903-915页
作者: Senshan Ouyang Xiang Liu Lei Liu Shangchao Wang Baichuan Shao Yang Zhao School of Mechanical Engineering Northwestern Polytechnical UniversityXi’anChina Department of Process and Information Technology Chengdu Aircraft Industrial(Group)Co.Ltd.ChengduChina School of Information and Software Engineering The Network and Data Security Key Laboratory of Sichuan ProvinceUniversity of Electronic Science and Technology of ChinaChengduChina
With the continuous expansion of the Industrial Internet of Things(IIoT),more andmore organisations are placing large amounts of data in the cloud to reduce ***,the channel between cloud servers and smart equipment is... 详细信息
来源: 评论
Context-Aware Grammatical Error Correction Model  5
Context-Aware Grammatical Error Correction Model
收藏 引用
5th International Conference on Big Data and Artificial Intelligence and Software Engineering, ICBASE 2024
作者: Lin, Jianxing Huang, Guimin Wang, JiaHao Guilin University of Electronic Technology School of Computer Science and Information Security Guangxi Key Laboratory of Image and Graphic Intelligent Processing Guilin China
The pursuit of accurate and fluent English communication is the cornerstone of global academic exchange and expression. The accuracy of written English is crucial for effective discourse;however, despite advancements ... 详细信息
来源: 评论
Crop Classification Methods Based on Siamese CBMM-CNN Architectures Using Hyperspectral Remote Sensing Data  24th
Crop Classification Methods Based on Siamese CBMM-CNN Archi...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Xie, Bin Zhang, Jiahao Li, Yuling Li, Yusong Dong, Xinyu College of Computer and Cyber Security Hebei Normal University Hebei Shijiazhuang China Hebei Provincial Key Laboratory of Network and Information Security Hebei Normal University Hebei Shijiazhuang China Hebei Provincial Engineering Research Center for Supply Chain Big Data Analytics and Data Security Hebei Normal University Hebei Shijiazhuang China
Amidst global population growth and escalating food demands, real-time agricultural monitoring is crucial for ensuring food security. During the initial stages of crop growth, however, it faces significant challenges ... 详细信息
来源: 评论
Dynamic Student Classification with Forgetting Mechanisms on Memory networks for Knowledge Tracing  5
Dynamic Student Classification with Forgetting Mechanisms on...
收藏 引用
5th International Conference on Intelligent Computing and Human-computer Interaction, ICHCI 2024
作者: Huang, Guimin Qin, Xiangqian School of Computer Science and Information Security Guilin University of Electronic Technology Guangxi Key Laboratory of Image and Graphic Intelligent Processing Guilin China
Knowledge Tracing (KT), a technique for modeling students' knowledge levels and predicting their future question-answering performance based on their historical answer data, is one of the key research areas to str... 详细信息
来源: 评论
Shorter ZK-SNARKs from square span programs over ideal lattices
收藏 引用
Cybersecurity 2025年 第1期8卷 208-226页
作者: Xi Lin Heyang Cao Feng‑Hao Liu Zhedong Wang Mingsheng Wang Key Laboratory of Cyberspace Security Defense Institute of Information EngineeringChinese Academy of SciencesBeijingChina School of Cyber Security University of Chinese Academy of SciencesBeijingChina School of Electrical Engineering&Computer Science Washington State UniversityPullmanWAUSA School of Cyber Science and Engineering Shanghai Jiaotong UniversityShanghaiChina
Zero-knowledge succinct non-interactive arguments of knowledge(zk-SNARKs)are cryptographic protocols that ofer efcient and privacy-preserving means of verifying NP language relations and have drawn considerable atten‑... 详细信息
来源: 评论
Sentence Similarity Model based on Semantics and Syntax  5
Sentence Similarity Model based on Semantics and Syntax
收藏 引用
5th International Conference on Big Data and Artificial Intelligence and Software Engineering, ICBASE 2024
作者: Zhou, Ya Chen, Chen Huang, Guimin Guilin University of Electronic Technology School of Computer Science and Information Security Guangxi Key Laboratory of Image and Graphic Intelligent Processing Guilin China
In the research methods of sentence similarity, sentence similarity is often calculated from the semantic aspect, while the influence of syntactic structure is ignored. We propose an enhanced knowledge language repres... 详细信息
来源: 评论
Genetic-A* Algorithm-Based Routing for Continuous-Flow Microfluidic Biochip in Intelligent Digital Healthcare  18th
Genetic-A* Algorithm-Based Routing for Continuous-Flow Micr...
收藏 引用
18th International Conference on Green, Pervasive, and Cloud Computing, GPC 2023
作者: Huang, Huichang Yang, Zhongliao Zhong, Jiayuan Xu, Li Dong, Chen Bao, Ruishen College of Computer and Data Science Fuzhou University Fuzhou350116 China College of Computer and Cyber Security Fujian Normal University Fuzhou350007 China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou China
In the field of intelligent digital healthcare, Continuous-flow microfluidic biochip (CFMB) has become a research direction of widespread concern. CFMB integrates a large number of microvalves and large-scale microcha... 详细信息
来源: 评论
A Personalized Recommendation Model based on Collaborative Filtering and Federated Learning for Cultural Tourism Attractions in Fujian-Taiwan
A Personalized Recommendation Model based on Collaborative F...
收藏 引用
2023 International Conference on Software and System Engineering, ICoSSE 2023
作者: Cai, Yunsen Gao, Haolin Liao, Junkai Li, Xinwei Xu, Yushan Xiong, Jinbo Fujian Normal University College of Computer and Cyber Security Fuzhou350117 China Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou350007 China
In the era of big data, the explosive growth of cultural tourism information should provide personalized and privacy requirements for people's travel. However, the existing travel recommendation algorithms have so... 详细信息
来源: 评论
Multi-Label Open Set Recognition  38
Multi-Label Open Set Recognition
收藏 引用
38th Conference on Neural information Processing Systems, NeurIPS 2024
作者: Wang, Yi-Bo Hang, Jun-Yi Zhang, Min-Ling School of Computer Science and Engineering Southeast University Nanjing210096 China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education China
In multi-label learning, each training instance is associated with multiple labels simultaneously. Traditional multi-label learning studies primarily focus on closed set scenario, i.e. the class label set of test data...
来源: 评论
A divide-and-conquer reconstruction method for defending against adversarial example attacks
收藏 引用
Visual Intelligence 2024年 第1期2卷 1-17页
作者: Liu, Xiyao Hu, Jiaxin Yang, Qingying Jiang, Ming He, Jianbiao Fang, Hui School of Computer Science and Engineering Central South University Hunan Changsha 410083 China Guangxi Key Laboratory of Cryptography and Information Security School of Computer Science and Information Security Guilin University of Electronic Technology Guangxi Guilin China Department of Computer Science Loughborough University Loughborough LE113TU United Kingdom
In recent years, defending against adversarial examples has gained significant importance, leading to a growing body of research in this area. Among these studies, pre-processing defense approaches have emerged as a p... 详细信息
来源: 评论