咨询与建议

限定检索结果

文献类型

  • 4,511 篇 会议
  • 3,407 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,926 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,322 篇 工学
    • 4,005 篇 计算机科学与技术...
    • 3,158 篇 软件工程
    • 1,357 篇 信息与通信工程
    • 658 篇 电气工程
    • 588 篇 控制科学与工程
    • 531 篇 电子科学与技术(可...
    • 452 篇 网络空间安全
    • 440 篇 生物工程
    • 301 篇 机械工程
    • 233 篇 光学工程
    • 224 篇 仪器科学与技术
    • 188 篇 生物医学工程(可授...
    • 165 篇 安全科学与工程
    • 153 篇 动力工程及工程热...
    • 147 篇 化学工程与技术
    • 129 篇 建筑学
    • 127 篇 交通运输工程
  • 2,306 篇 理学
    • 1,374 篇 数学
    • 504 篇 物理学
    • 478 篇 生物学
    • 425 篇 统计学(可授理学、...
    • 207 篇 系统科学
    • 167 篇 化学
  • 1,340 篇 管理学
    • 818 篇 管理科学与工程(可...
    • 579 篇 图书情报与档案管...
    • 295 篇 工商管理
  • 287 篇 法学
    • 167 篇 社会学
    • 118 篇 法学
  • 156 篇 医学
    • 128 篇 临床医学
  • 116 篇 经济学
    • 116 篇 应用经济学
  • 99 篇 军事学
  • 54 篇 农学
  • 44 篇 教育学
  • 24 篇 文学
  • 23 篇 艺术学

主题

  • 238 篇 feature extracti...
  • 229 篇 semantics
  • 214 篇 cryptography
  • 184 篇 authentication
  • 181 篇 information secu...
  • 163 篇 computational mo...
  • 160 篇 security
  • 151 篇 protocols
  • 144 篇 deep learning
  • 144 篇 accuracy
  • 139 篇 privacy
  • 122 篇 laboratories
  • 122 篇 training
  • 103 篇 data models
  • 102 篇 federated learni...
  • 99 篇 cloud computing
  • 94 篇 servers
  • 92 篇 public key crypt...
  • 92 篇 blockchain
  • 89 篇 data privacy

机构

  • 204 篇 shandong provinc...
  • 179 篇 key laboratory o...
  • 166 篇 school of comput...
  • 151 篇 state key labora...
  • 112 篇 school of comput...
  • 111 篇 school of cyber ...
  • 106 篇 department of co...
  • 98 篇 information secu...
  • 84 篇 key laboratory o...
  • 81 篇 institute of inf...
  • 67 篇 computer network...
  • 67 篇 guangdong provin...
  • 66 篇 university of ch...
  • 64 篇 college of mathe...
  • 64 篇 state grid key l...
  • 63 篇 peng cheng labor...
  • 60 篇 key laboratory o...
  • 59 篇 school of softwa...
  • 57 篇 school of comput...
  • 56 篇 key laboratory o...

作者

  • 55 篇 jianfeng ma
  • 53 篇 yang yang
  • 49 篇 ma jianfeng
  • 45 篇 yixian yang
  • 43 篇 ding yong
  • 41 篇 zheng wei-shi
  • 38 篇 huang qingming
  • 31 篇 cong runmin
  • 31 篇 wang wei
  • 31 篇 zhang huanguo
  • 31 篇 hu yupu
  • 30 篇 xu an wang
  • 30 篇 yang yixian
  • 29 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 27 篇 min-ling zhang
  • 25 篇 xie xiaohua
  • 24 篇 liu xin
  • 23 篇 wang yujue

语言

  • 7,128 篇 英文
  • 536 篇 其他
  • 282 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Computer Network and Information Security"
7926 条 记 录,以下是351-360 订阅
排序:
Maximizing Influence in Temporal Social networks:A Node Feature-Aware Voting Algorithm
收藏 引用
computers, Materials & Continua 2023年 第12期77卷 3095-3117页
作者: Wenlong Zhu Yu Miao Shuangshuang Yang Zuozheng Lian Lianhe Cui College of Computer and Control Engineering Qiqihar UniversityQiqihar161006China Heilongjiang Key Laboratory of Big Data Network Security Detection and Analysis Qiqihar UniversityQiqihar161006China College of Teacher Education Qiqihar UniversityQiqihar161006China
Influence Maximization(IM)aims to select a seed set of size k in a social network so that information can be spread most widely under a specific information propagation model through this set of ***,most existing stud... 详细信息
来源: 评论
Integrating Syntactic and Semantic Knowledge in AMR Parsing with Heterogeneous Graph Attention network  48
Integrating Syntactic and Semantic Knowledge in AMR Parsing ...
收藏 引用
48th IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2023
作者: Sataer, Yikemaiti Shi, Chuanqi Gao, Miao Fan, Yunlong Li, Bin Gao, Zhiqiang Southeast University School of Computer Science and Engineering Nanjing China Ministry of Education Key Laboratory of Computer Network and Information Integration Nanjing China
Meaning Representation (AMR) parsing is the task of translating a sentence to an AMR semantic graph which captures the basic meaning of the sentence, and is empowered by pre-trained Transformer models recently. These ... 详细信息
来源: 评论
Image Compression Algorithm Based on Region of Interest Extraction for Unmanned Aerial Vehicles Communication  8
Image Compression Algorithm Based on Region of Interest Extr...
收藏 引用
8th IEEE information Technology and Mechatronics Engineering Conference, ITOEC 2025
作者: Liang, Yanxia Jia, Tong Liu, Xin Zhang, Huanhuan Xi'an University of Posts and Telecommunications Shaanxi Key Laboratory of Information Communication Network and Security Xi'an China Xi'an Eurasia University College of Information Engineering Xi'an China
The flexibility and maneuverability of unmanned aerial vehicles (UAVs) have led to their widespread use, but the challenge of limited storage space and bandwidth in emergency scenarios necessitates efficient image com... 详细信息
来源: 评论
Lossless embedding: A visually meaningful image encryption algorithm based on hyperchaos and compressive sensing
收藏 引用
Chinese Physics B 2023年 第2期32卷 136-149页
作者: 王兴元 王哓丽 滕琳 蒋东华 咸永锦 School of Information Science and Technology Dalian Maritime UniversityDalian 116026China Guangxi Key Laboratory of Multi-source Information Mining&Security Guangxi Normal UniversityGuilin 541004China School of Computer Science and Engineering Sun Yat-sen UniversityGuangzhou 511400China School of Cyber Security Qilu University of Technology(Shandong Academy of Sciences)Jinan 250353China
A novel visually meaningful image encryption algorithm is proposed based on a hyperchaotic system and compressive sensing(CS), which aims to improve the visual security of steganographic image and decrypted quality. F... 详细信息
来源: 评论
EPI-Mamba: State Space Model for Semantic Segmentation from Light Fields
EPI-Mamba: State Space Model for Semantic Segmentation from ...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Li, Yan Chen, Jianan Wang, Qiong Xu, Jinshan College of Computer Science & Technology Zhejiang University of Technology Hangzhou China Guangdong Provincial Key Laboratory of Intelligent Information Processing Shenzhen Key Laboratory of Media Security Shenzhen University Shenzhen China
Global contextual dependency is of significance for semantic segmentation from light fields. However, previous works mostly exploit attention mechanisms to model spatial context dependency and angular context dependen... 详细信息
来源: 评论
A Blackbox Fuzzing Based on Automated State Machine Extraction  8
A Blackbox Fuzzing Based on Automated State Machine Extracti...
收藏 引用
8th International Conference on Data Science in Cyberspace, DSC 2023
作者: Zhang, Zhaowei Yu, Wenjing Wang, Zibin Xiang, Youlin National Key Laboratory of Science and Technology on Information System Security Beijing China School of Computer Science Fudan University Shanghai Key Laboratory of Data Science Shanghai China
Currently, protocol fuzzing techniques mainly employ two approaches: greybox fuzzing based on mutation and blackbox fuzzing based on generation. Greybox fuzzing techniques use message exchanges between the protocol se... 详细信息
来源: 评论
A Low-Rank Matching Attention Based Cross-Modal Feature Fusion Method for Conversational Emotion Recognition
收藏 引用
IEEE Transactions on Affective Computing 2024年 第2期16卷 1177-1189页
作者: Shou, Yuntao Liu, Huan Cao, Xiangyong Meng, Deyu Dong, Bo Xi'An Jiaotong School of Computer Science and Technology Ministry of Education Key Laboratory for Intelligent Networks and Network Security Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Shaanxi Xi'an710049 China Xi'An Jiaotong School of Computer Science and Technology Shaanxi Xi'an710049 China BigKEJoint Innovation Center SHMEEA Shanghai China Xi'An Jiaotong University School of Mathematics and Statistics Xi'an China
Conversational emotion recognition (CER) is an important research topic in human-computer interactions. Although recent advancements in transformer-based cross-modal fusion methods have shown promise in CER tasks, the... 详细信息
来源: 评论
Fortifying Smart Grids: A Holistic Assessment Strategy against Cyber Attacks and Physical Threats for Intelligent Electronic Devices
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 2579-2609页
作者: Yangrong Chen June Li Yu Xia Ruiwen Zhang Lingling Li Xiaoyu Li Lin Ge School of Computer Science Zhengzhou University of AeronauticsZhengzhou450046China Henan Xin’an Century Technology Co. Ltd.Henan Data Security Engineering Technology Research CenterZhengzhou450046China Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of EducationSchool of Cyber Science and EngineeringWuhan UniversityWuhan430072China
Intelligent electronic devices(IEDs)are interconnected via communication networks and play pivotal roles in transmitting grid-related operational data and executing control *** the context of the heightened security c... 详细信息
来源: 评论
Intermittent Artificial Noise Assisted Covert Cooperative Backscatter Communication with Residual Hardware Impairments
IEEE Transactions on Green Communications and Networking
收藏 引用
IEEE Transactions on Green Communications and networking 2024年
作者: Gao, Zhangrui Li, Huan Ye, Yinghui Lu, Guangyue Xi'an University of Posts and Telecommunications Shaanxi Key Laboratory of Information Communication Network and Security China
Existing works on artificial noise (AN) assisted covert backscatter communication (BC) assumed a jammer continuously transmitting AN, leading to the reduction of the reliability of the legitimate link. Additionally, t... 详细信息
来源: 评论
Efficient Sensitive Data Identification Using Multi-Protocol Automatic Parsing and Vector Classification Based on Feature Fusion
收藏 引用
Informatica (Slovenia) 2024年 第22期48卷 55-62页
作者: Hu, Jian Zhang, Lina Lu, Guangqian Xu, Wenqian Jiang, Yixin Yunnan Power Grid Information Center China Southern Power Grid Kunming650217 China Electric Power Research Institute China Southern Power Grid Guangzhou510663 China Guangdong Provincial Key Laboratory of Power System Network Security Guangzhou510663 China
At this stage, data has become essential and important information in people's daily life, and how to automate the identification and classification of sensitive attributes of structured datasets in the production... 详细信息
来源: 评论