咨询与建议

限定检索结果

文献类型

  • 4,446 篇 会议
  • 3,346 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,800 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,222 篇 工学
    • 3,921 篇 计算机科学与技术...
    • 3,127 篇 软件工程
    • 1,329 篇 信息与通信工程
    • 652 篇 电气工程
    • 539 篇 控制科学与工程
    • 522 篇 电子科学与技术(可...
    • 441 篇 网络空间安全
    • 439 篇 生物工程
    • 299 篇 机械工程
    • 230 篇 光学工程
    • 224 篇 仪器科学与技术
    • 188 篇 生物医学工程(可授...
    • 162 篇 安全科学与工程
    • 149 篇 动力工程及工程热...
    • 145 篇 化学工程与技术
    • 126 篇 建筑学
    • 124 篇 交通运输工程
  • 2,280 篇 理学
    • 1,359 篇 数学
    • 498 篇 物理学
    • 476 篇 生物学
    • 420 篇 统计学(可授理学、...
    • 208 篇 系统科学
    • 165 篇 化学
  • 1,324 篇 管理学
    • 807 篇 管理科学与工程(可...
    • 573 篇 图书情报与档案管...
    • 289 篇 工商管理
  • 287 篇 法学
    • 167 篇 社会学
    • 118 篇 法学
  • 154 篇 医学
    • 127 篇 临床医学
  • 116 篇 经济学
    • 116 篇 应用经济学
  • 98 篇 军事学
  • 54 篇 农学
  • 42 篇 教育学
  • 24 篇 文学
  • 22 篇 艺术学

主题

  • 238 篇 feature extracti...
  • 228 篇 semantics
  • 216 篇 cryptography
  • 182 篇 authentication
  • 181 篇 information secu...
  • 162 篇 computational mo...
  • 158 篇 security
  • 151 篇 protocols
  • 142 篇 accuracy
  • 140 篇 privacy
  • 139 篇 deep learning
  • 126 篇 training
  • 122 篇 laboratories
  • 105 篇 data models
  • 99 篇 federated learni...
  • 99 篇 cloud computing
  • 94 篇 servers
  • 93 篇 blockchain
  • 92 篇 public key crypt...
  • 88 篇 data privacy

机构

  • 203 篇 shandong provinc...
  • 175 篇 key laboratory o...
  • 158 篇 school of comput...
  • 156 篇 state key labora...
  • 111 篇 school of comput...
  • 106 篇 department of co...
  • 106 篇 school of cyber ...
  • 97 篇 information secu...
  • 80 篇 key laboratory o...
  • 78 篇 institute of inf...
  • 65 篇 university of ch...
  • 65 篇 college of mathe...
  • 65 篇 state grid key l...
  • 65 篇 guangdong provin...
  • 64 篇 computer network...
  • 61 篇 peng cheng labor...
  • 60 篇 key laboratory o...
  • 59 篇 school of softwa...
  • 57 篇 school of comput...
  • 54 篇 key laboratory o...

作者

  • 55 篇 jianfeng ma
  • 53 篇 yang yang
  • 48 篇 ma jianfeng
  • 45 篇 yixian yang
  • 42 篇 ding yong
  • 41 篇 zheng wei-shi
  • 38 篇 huang qingming
  • 31 篇 cong runmin
  • 31 篇 zhang huanguo
  • 31 篇 xu an wang
  • 31 篇 hu yupu
  • 31 篇 yang yixian
  • 30 篇 wang wei
  • 28 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 26 篇 min-ling zhang
  • 25 篇 xu li
  • 24 篇 xinhong hei
  • 24 篇 xie xiaohua

语言

  • 7,190 篇 英文
  • 348 篇 其他
  • 277 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Computer Network and Information Security"
7800 条 记 录,以下是261-270 订阅
排序:
An Adaptive Heterogeneous Credit Card Fraud Detection Model Based on Deep Reinforcement Training Subset Selection
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第8期5卷 4026-4041页
作者: Zhu, Kun Zhang, Nana Ding, Weiping Jiang, Changjun the Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai201804 China Collaborative Innovation Center for Financial Network Security Tongji University Shanghai201804 China the School of Computer Science and Technology Donghua University Shanghai201620 China the School of Information Science and Technology Nantong University Nantong226019 China
Heterogeneous fraud detection is an important means of credit card security assurance, which can utilize historical transaction records in a source and target domain to build an effective fraud detection model. Nevert... 详细信息
来源: 评论
New Construction of Code-Based Signature Schemes  26th
New Construction of Code-Based Signature Schemes
收藏 引用
26th International Conference on information and Communications security, ICICS 2024
作者: Yang, Yang Zhang, Fangguo School of Computer Science and Engineering Sun Yat-sen University Guangzhou510006 China Guangdong Key Laboratory of Information Security Technology Guangzhou510006 China
In this paper, we present a novel approach to construct code-based digital signature schemes. Our focus is on addressing the efficiency issues stemming from the low proportion of decodable syndromes in classical CFS s... 详细信息
来源: 评论
Research on the Application of Digital Signature in University Electronic Government System  6
Research on the Application of Digital Signature in Universi...
收藏 引用
6th International Conference on computer network, Electronic and Automation, ICCNEA 2023
作者: Wang, Tianma Zhao, Dongmei Qi, Jianjun North China Electric Power University International Education Institute Beijing China Hebei Normal University College of Computer and Cyber Security Shijiazhuang China Key Laboratory of Network and Information Security in Hebei Province Shijiazhuang China
This article analyzes the principles and processes of digital signature technology, as well as its application methods in the university e-government system. On the one hand, it meets the business management needs of ... 详细信息
来源: 评论
TAKAP: A Lightweight Three-Party Authenticated key Agreement Protocol with User Anonymity
收藏 引用
Chinese Journal of Electronics 2021年 第4期30卷 686-696页
作者: QIAO Hui DONG Xuewen SHEN Yulong LIU Haozhe YANG Lingxiao School of Computer Science and Technology Xidian University Shaanxi Key Laboratory of Network and System Security Xidian University
The three-party authenticated key agreement protocol is a significant cryptographic mechanism for secure communication, which encourages two entities to authenticate each other and generate a shared session key with t... 详细信息
来源: 评论
A universal intelligent method for intrusion detection
收藏 引用
Journal of Cyber security Technology 2022年 第1-2期6卷 91-111页
作者: Wang, Yong Xi, Jinsong Zhong, Meiling School of Computer Science and Information Security Guilin University of Electronic Technology Guangxi Guilin China Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology Guangxi Guilin China
Machine learning algorithms have been widely used in the field of intrusion detection, which effectively improves the detection effect. However, with changeable attack methods and the increasingly complex data, which ... 详细信息
来源: 评论
Prompting Large Language Models with Knowledge-Injection for Knowledge-Based Visual Question Answering
收藏 引用
Big Data Mining and Analytics 2024年 第3期7卷 843-857页
作者: Zhongjian Hu Peng Yang Fengyuan Liu Yuan Meng Xingyu Liu School of Computer Science and Engineering Southeast University the Key Laboratory of Computer Network and Information Integration(Southeast University) Ministry of Education of the People’s Republic of ChinaNanjing 211189China Southeast University-Monash University Joint Graduate School(Suzhou) Southeast UniversitySuzhou 215125China
Previous works employ the Large Language Model(LLM)like GPT-3 for knowledge-based Visual Question Answering(VQA).We argue that the inferential capacity of LLM can be enhanced through knowledge *** methods that utilize... 详细信息
来源: 评论
Layer-Wise Learning Rate Optimization for Task-Dependent Fine-Tuning of Pre-Trained Models: An Evolutionary Approach
收藏 引用
ACM Transactions on Evolutionary Learning and Optimization 2024年 第4期4卷 1-23页
作者: Bu, Chenyang Liu, Yuxin Huang, Manzong Shao, Jianxuan Ji, Shengwei Luo, Wenjian Wu, Xindong Key Laboratory of Knowledge Engineering with Big Data Ministry of Education and School of Computer Science and Information Engineering Hefei University of Technology Hefei China School of Artificial Intelligence and Big Data Hefei University Hefei China Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies School of Computer Science and Technology Harbin Institute of Technology Shenzhen China
The superior performance of large-scale pre-Trained models, such as Bidirectional Encoder Representations from Transformers (BERT) and Generative Pre-Trained Transformer (GPT), has received increasing attention in bot... 详细信息
来源: 评论
Electronic band structures of topological kagome materials
收藏 引用
Chinese Physics B 2025年 第1期34卷 29-44页
作者: Man Li Huan Ma Rui Lou Shancai Wang School of Information Network Security People’s Public Security University of ChinaBeijing 100038China Department of Physics Key Laboratory of Quantum State Construction and Manipulation(Ministry of Education)and Beijing Key Laboratory of Opto-electronic Functional Materials&Micronano DevicesRenmin University of ChinaBeijing 100872China Leibniz Institute for Solid State and Materials Research IFW Dresden01069 DresdenGermany Helmholtz-Zentrum Berlin fur Materialien und Energie Albert-Einstein-Strabe 1512489 BerlinGermany Joint Laboratory“Functional Quantum Materials”at BESSY II 12489 BerlinGermany
The kagome lattice has garnered significant attention due to its ability to host quantum spin Fermi liquid ***,the combination of unique lattice geometry,electron–electron correlations,and adjustable magnetism in sol... 详细信息
来源: 评论
Vertical Federated Learning Based on Consortium Blockchain for Data Sharing in Mobile Edge Computing
收藏 引用
computer Modeling in Engineering & Sciences 2023年 第10期137卷 345-361页
作者: Yonghao Zhang Yongtang Wu Tao Li Hui Zhou Yuling Chen State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang550025China Blockchain Laboratory of Agricultural Vegetables Weifang University of Science and TechnologyWeifang262700China Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic TechnologyGuilin541004China
The data in Mobile Edge Computing(MEC)contains tremendousmarket value,and data sharing canmaximize the usefulness of the ***,certain data is quite sensitive,and sharing it directly may violate *** Federated Learning(V... 详细信息
来源: 评论
Short Text Similarity Model Using Semantic and Word Order Features  4
Short Text Similarity Model Using Semantic and Word Order Fe...
收藏 引用
4th International Conference on computer Science and Blockchain, CCSB 2024
作者: Huang, Guimin Shi, Canjun School of Computer Science and Information Security Guilin University of Electronic Technology Guangxi Key Laboratory of Image and Graphic Intelligent Processing Guilin541004 China
Short textual similarity has been more and more widely used in the field of natural language processing. However, people tend to pay more attention to the semantic similarity of sentences and ignore the word order sim... 详细信息
来源: 评论