咨询与建议

限定检索结果

文献类型

  • 4,511 篇 会议
  • 3,407 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,926 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,322 篇 工学
    • 4,005 篇 计算机科学与技术...
    • 3,158 篇 软件工程
    • 1,357 篇 信息与通信工程
    • 658 篇 电气工程
    • 588 篇 控制科学与工程
    • 531 篇 电子科学与技术(可...
    • 452 篇 网络空间安全
    • 440 篇 生物工程
    • 301 篇 机械工程
    • 233 篇 光学工程
    • 224 篇 仪器科学与技术
    • 188 篇 生物医学工程(可授...
    • 165 篇 安全科学与工程
    • 153 篇 动力工程及工程热...
    • 147 篇 化学工程与技术
    • 129 篇 建筑学
    • 127 篇 交通运输工程
  • 2,306 篇 理学
    • 1,374 篇 数学
    • 504 篇 物理学
    • 478 篇 生物学
    • 425 篇 统计学(可授理学、...
    • 207 篇 系统科学
    • 167 篇 化学
  • 1,340 篇 管理学
    • 818 篇 管理科学与工程(可...
    • 579 篇 图书情报与档案管...
    • 295 篇 工商管理
  • 287 篇 法学
    • 167 篇 社会学
    • 118 篇 法学
  • 156 篇 医学
    • 128 篇 临床医学
  • 116 篇 经济学
    • 116 篇 应用经济学
  • 99 篇 军事学
  • 54 篇 农学
  • 44 篇 教育学
  • 24 篇 文学
  • 23 篇 艺术学

主题

  • 238 篇 feature extracti...
  • 229 篇 semantics
  • 214 篇 cryptography
  • 184 篇 authentication
  • 181 篇 information secu...
  • 163 篇 computational mo...
  • 160 篇 security
  • 151 篇 protocols
  • 144 篇 deep learning
  • 144 篇 accuracy
  • 139 篇 privacy
  • 122 篇 laboratories
  • 122 篇 training
  • 103 篇 data models
  • 102 篇 federated learni...
  • 99 篇 cloud computing
  • 94 篇 servers
  • 92 篇 public key crypt...
  • 92 篇 blockchain
  • 89 篇 data privacy

机构

  • 204 篇 shandong provinc...
  • 179 篇 key laboratory o...
  • 166 篇 school of comput...
  • 151 篇 state key labora...
  • 112 篇 school of comput...
  • 111 篇 school of cyber ...
  • 106 篇 department of co...
  • 98 篇 information secu...
  • 84 篇 key laboratory o...
  • 81 篇 institute of inf...
  • 67 篇 computer network...
  • 67 篇 guangdong provin...
  • 66 篇 university of ch...
  • 64 篇 college of mathe...
  • 64 篇 state grid key l...
  • 63 篇 peng cheng labor...
  • 60 篇 key laboratory o...
  • 59 篇 school of softwa...
  • 57 篇 school of comput...
  • 56 篇 key laboratory o...

作者

  • 55 篇 jianfeng ma
  • 53 篇 yang yang
  • 49 篇 ma jianfeng
  • 45 篇 yixian yang
  • 43 篇 ding yong
  • 41 篇 zheng wei-shi
  • 38 篇 huang qingming
  • 31 篇 cong runmin
  • 31 篇 wang wei
  • 31 篇 zhang huanguo
  • 31 篇 hu yupu
  • 30 篇 xu an wang
  • 30 篇 yang yixian
  • 29 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 27 篇 min-ling zhang
  • 25 篇 xie xiaohua
  • 24 篇 liu xin
  • 23 篇 wang yujue

语言

  • 7,128 篇 英文
  • 536 篇 其他
  • 282 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Computer Network and Information Security"
7926 条 记 录,以下是301-310 订阅
排序:
Research on the mechanical fault diagnosis method based on sound signal and IEMD-DDCNN
收藏 引用
International Journal of Intelligent Computing and Cybernetics 2023年 第3期16卷 629-646页
作者: Haoning Pu Zhan Wen Xiulan Sun Lemei Han Yanhe Na Hantao Liu Wenzao Li Chengdu University of Information Technology ChengduChina Education Department of Sichuan Province Education Informatization and Big Data CenterChengduChina Network and Data Security Key Laboratory of Sichuan Province UESTCChengduChina
Purpose–The purpose of this paper is to provide a shorter time cost,high-accuracy fault diagnosis method for water *** pumps are widely used in industrial equipment and their fault diagnosis is gaining increasing ***... 详细信息
来源: 评论
OPTIMIZING MULTI-INPUT SCHEDULING FOR FUZZING TEST USING BAYESIAN ALGORITHM WEIGHT OPTIMIZATION  10
OPTIMIZING MULTI-INPUT SCHEDULING FOR FUZZING TEST USING BAY...
收藏 引用
10th International Symposium on Test Automation and Instrumentation, ISTAI 2024
作者: Fang, Junzhe Wang, Liyong Ji, Haojie Guo, Teng Hu, Te Key Laboratory of Modern Measurement and Control Technology Ministry of Education Beijing Information Science and Technology University Beijing China Zaozhuang Network Security Guarantee Center Zaozhuang China
As a major software testing method, fuzzing has the potential to enhance testing coverage and detect a great number of software vulnerabilities in complex code programs. The current fuzzy testing for multiple input pa... 详细信息
来源: 评论
Enhanced PIR Scheme Combining SimplePIR and Spiral: Achieving Higher Throughput Without Client Hints  6th
Enhanced PIR Scheme Combining SimplePIR and Spiral: Achievi...
收藏 引用
6th International Conference on Machine Learning for Cyber security, ML4CS 2024
作者: Xu, Haoyao Li, Yitong Tian, Haibo School of Computer Science and Engineering Sun Yat-sen University Guangzhou510006 China Guangdong Province Key Laboratory of Information Security Technology Guangzhou510006 China
In recent years, Private information Retrieval (PIR) schemes capable of rapid response have gotten significant attention, with SimplePIR, for instance, achieving a throughput of approximately 10 GB/s in a single-threa... 详细信息
来源: 评论
key Management and Authentication Scheme Forward Trusted Pervasive Container Computing  2
Key Management and Authentication Scheme Forward Trusted Per...
收藏 引用
2nd International Conference on Big Data and Privacy Computing, BDPC 2024
作者: Hei, XinHong Xue, YuZhan Wang, YiChuan Liu, YiFan Peng, Chen Sun, Xiang School of Computer Science and Engineering Xi'an University of Technology Xi'an China School of Computer Science and Engineering Xi'an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China
Cloud computing technology is an internet-based computing model that provides high reliability and security measures, including data backup, secure access control, etc. As Docker containers play a increasingly importa... 详细信息
来源: 评论
Chip-integrated quantum signature network over 200 km
收藏 引用
Light(Science & Applications) 2025年 第4期14卷 1061-1069页
作者: Yongqiang Du Bing-Hong Li Xin Hua Xiao-Yu Cao Zhengeng Zhao Feng Xie Zhenrong Zhang Hua-Lei Yin Xi Xiao Kejin Wei Guangxi Key Laboratory for Relativistic Astrophysics School of Physical Science and TechnologyGuangxi UniversityNanning 530004China National Laboratory of Solid State Microstructures and School of Physics Collaborative Innovation Center of Advanced MicrostructuresNanjing UniversityNanjing 210093China National Information Optoelectronics Innovation Center(NOEIC) Wuhan 430074China Guangxi Key Laboratory of Multimedia Communications and Network Technology School of ComputerElectronicsand InformationGuangxi UniversityNanning 530004China Department of Physics and Beijing Key Laboratory of Opto-electronic Functional Materials and Micro-nano Devices Key Laboratory of Quantum State Construction and Manipulation(Ministry of Education)Renmin University of ChinaBeijing 100872China Peng Cheng Laboratory Shenzhen 518055China
The development of quantum networks is paramount towards practical and secure *** digital signatures(QDS)offer an information-theoretically secure solution for ensuring data integrity,authenticity,and nonrepudiation,r... 详细信息
来源: 评论
Uncertainty-aware coarse-to-fine alignment for text-image person retrieval
收藏 引用
Visual Intelligence 2025年 第1期3卷 1-14页
作者: Deng, Yifei Chen, Zhengyu Li, Chenglong Tang, Jin Information Materials and Intelligent Sensing Laboratory of Anhui Province Anhui Provincial Key Laboratory of Multimodal Cognitive Computation School of Computer Science and Technology Anhui University Hefei 230601 China Information Materials and Intelligent Sensing Laboratory of Anhui Province Anhui Provincial Key Laboratory of Security Artificial Intelligence School of Artificial Intelligence Anhui University Hefei 230601 China
Text-to-image person retrieval, a fine-grained cross-modal retrieval problem, aims to search for person images from an image library that match a given textual caption. Existing text-to-image person retrieval methods ... 详细信息
来源: 评论
Enhanced Public-key Searchable Encryption Scheme for Cloud-Based EHR Systems
Enhanced Public-Key Searchable Encryption Scheme for Cloud-B...
收藏 引用
2023 IEEE International Conference on E-Health networking, Application and Services, Healthcom 2023
作者: Kong, Xiangqian Chen, Lanxiang City University of Macau Macau999078 China College of Computer and Cyber Security Fujian Normal University Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou China
Due to the swift development of cloud computing technology, an increasing number of healthcare organizations tend to store electronic health records (EHR) on cloud storage servers. To ensure patient privacy, sensitive... 详细信息
来源: 评论
BLAC: A Blockchain-Based Lightweight Access Control Scheme in Vehicular Social networks  25th
BLAC: A Blockchain-Based Lightweight Access Control Scheme i...
收藏 引用
25th International Conference on information and Communications security, ICICS 2023
作者: Zuo, Yuting Xu, Li Zhang, Yuexin Kang, Zhaozhe Zhao, Chenbin Fujian Normal University Fuzhou China Fujian provincial Key Laboratory of Network Security and Cryptology Fuzhou China Wuhan University Wuhan China Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education Wuhan China
Vehicular Social networks (VSNs) rely on data shared by users to provide convenient services. Data is outsourced to the cloud server and the distributed roadside unit in VSNs. However, roadside unit has limited resour... 详细信息
来源: 评论
Enhancing Stance Detection on Social Media via Core Views Discovery  27
Enhancing Stance Detection on Social Media via Core Views Di...
收藏 引用
27th European Conference on Artificial Intelligence, ECAI 2024
作者: Yan, Yu Shen, Yinghan Liu, Teli Jiang, Xuhui Yin, Dechun School of Information and Network Security People Public Security University of China China Institute of Computing Technology Chinese Academy of Sciences China Key Laboratory of AI Safety Institute of Computing Technology Chinese Academy of Sciences China
Stance detection aims to identify the expressed attitude towards a target from the text, which is significant for learning public cognition from social media. The short and implicit nature of social media users' e... 详细信息
来源: 评论
DRL-Based Time-Varying Workload Scheduling With Priority and Resource Awareness
收藏 引用
IEEE Transactions on network and Service Management 2025年 第3期22卷 2838-2852页
作者: Liu, Qifeng Fan, Qilin Zhang, Xu Li, Xiuhua Wang, Kai Xiong, Qingyu Chongqing University School of Big Data and Software Engineering Chongqing400044 China Chongqing University Key Laboratory of Dependable Service Computing in Cyber Physical Society of Ministry of Education Chongqing400044 China Nanjing University School of Electronic Science and Engineering Nanjing210023 China Haihe Laboratory of Information Technology Application Innovation Tianjin300072 China Harbin Institute of Technology School of Computer Science and Technology Weihai264209 China Shandong Key Laboratory of Industrial Network Security Weihai264209 China
With the proliferation of cloud services and the continuous growth in enterprises' demand for dynamic multi-dimensional resources, the implementation of effective strategy for time-varying workload scheduling has ... 详细信息
来源: 评论