咨询与建议

限定检索结果

文献类型

  • 4,506 篇 会议
  • 3,387 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,901 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,299 篇 工学
    • 3,983 篇 计算机科学与技术...
    • 3,164 篇 软件工程
    • 1,348 篇 信息与通信工程
    • 653 篇 电气工程
    • 561 篇 控制科学与工程
    • 523 篇 电子科学与技术(可...
    • 449 篇 网络空间安全
    • 440 篇 生物工程
    • 301 篇 机械工程
    • 233 篇 光学工程
    • 224 篇 仪器科学与技术
    • 188 篇 生物医学工程(可授...
    • 165 篇 安全科学与工程
    • 151 篇 动力工程及工程热...
    • 148 篇 化学工程与技术
    • 127 篇 交通运输工程
    • 126 篇 建筑学
  • 2,310 篇 理学
    • 1,377 篇 数学
    • 504 篇 物理学
    • 479 篇 生物学
    • 428 篇 统计学(可授理学、...
    • 206 篇 系统科学
    • 166 篇 化学
  • 1,338 篇 管理学
    • 818 篇 管理科学与工程(可...
    • 576 篇 图书情报与档案管...
    • 297 篇 工商管理
  • 289 篇 法学
    • 168 篇 社会学
    • 119 篇 法学
  • 154 篇 医学
    • 127 篇 临床医学
  • 116 篇 经济学
    • 116 篇 应用经济学
  • 99 篇 军事学
  • 55 篇 农学
  • 46 篇 教育学
  • 24 篇 文学
  • 23 篇 艺术学

主题

  • 238 篇 feature extracti...
  • 229 篇 semantics
  • 216 篇 cryptography
  • 184 篇 authentication
  • 181 篇 information secu...
  • 163 篇 computational mo...
  • 158 篇 security
  • 152 篇 protocols
  • 144 篇 accuracy
  • 141 篇 deep learning
  • 138 篇 privacy
  • 122 篇 laboratories
  • 121 篇 training
  • 103 篇 data models
  • 100 篇 federated learni...
  • 99 篇 cloud computing
  • 94 篇 servers
  • 92 篇 public key crypt...
  • 92 篇 blockchain
  • 89 篇 data privacy

机构

  • 204 篇 shandong provinc...
  • 178 篇 key laboratory o...
  • 164 篇 school of comput...
  • 152 篇 state key labora...
  • 113 篇 school of comput...
  • 111 篇 school of cyber ...
  • 106 篇 department of co...
  • 98 篇 information secu...
  • 83 篇 key laboratory o...
  • 81 篇 institute of inf...
  • 69 篇 guangdong provin...
  • 68 篇 computer network...
  • 66 篇 university of ch...
  • 64 篇 college of mathe...
  • 64 篇 state grid key l...
  • 63 篇 peng cheng labor...
  • 60 篇 key laboratory o...
  • 59 篇 school of softwa...
  • 56 篇 school of comput...
  • 54 篇 key laboratory o...

作者

  • 55 篇 jianfeng ma
  • 53 篇 yang yang
  • 49 篇 ma jianfeng
  • 45 篇 yixian yang
  • 43 篇 ding yong
  • 41 篇 zheng wei-shi
  • 38 篇 huang qingming
  • 31 篇 cong runmin
  • 31 篇 wang wei
  • 31 篇 hu yupu
  • 31 篇 yang yixian
  • 30 篇 zhang huanguo
  • 30 篇 xu an wang
  • 29 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 26 篇 min-ling zhang
  • 24 篇 liu xin
  • 24 篇 xinhong hei
  • 24 篇 xie xiaohua

语言

  • 7,143 篇 英文
  • 499 篇 其他
  • 278 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Computer Network and Information Security"
7901 条 记 录,以下是451-460 订阅
排序:
Malicious Traffic Detection with Noise Labels Based on Cross-Modal Consistency
IEEE Networking Letters
收藏 引用
IEEE networking Letters 2024年 第2期6卷 148-151页
作者: Yuan, Qingjun Niu, Weina Wang, Yongjuan Gou, Gaopeng Lu, Bin Henan Key Laboratory of Network Cryptography Technology Zhengzhou450001 China Institute for Cyber Security School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu611731 China Shenzhen Institute for Advanced Study University of Electronic Science and Technology of China Shenzhen518110 China Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China
To train robust malicious traffic identification models under noisy labeled datasets, a number of learning with noise labels approaches have been introduced, among which parallel training methods have been proved to b... 详细信息
来源: 评论
Multi-dimensional Classification via Selective Feature Augmentation
收藏 引用
Machine Intelligence Research 2022年 第1期19卷 38-51页
作者: Bin-Bin Jia Min-Ling Zhang School of Computer Science and Engineering Southeast UniversityNanjing 210096China College of Electrical and Information Engineering Lanzhou University of TechnologyLanzhou 730050China Key Laboratory of Computer Network and Information Integration Southeast UniversityMinistry of EducationChina
In multi-dimensional classification(MDC), the semantics of objects are characterized by multiple class spaces from different dimensions. Most MDC approaches try to explicitly model the dependencies among class spaces ... 详细信息
来源: 评论
Block-based fine-grained and publicly verifiable data deletion for cloud storage: Block-based fine-grained and publicly verifiable..: C. Yang et al.
收藏 引用
Soft Computing 2024年 第21期28卷 12491-12506页
作者: Yang, Changsong Liu, Yueling Ding, Yong Wu, Yongqiang Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology Guilin541004 China Lion Rock Labs of Cyberspace Security Institute of Cyberspace Technology HKCT Institute for Higher Education 999077 Hong Kong Guangxi Engineering Research Center of Industrial Internet Security and Blockchain Guilin University of Electronic Technology Guilin541004 China School of Computer Guangdong University of Science & Technology Dongguan523083 China South China Technical Support Department Topsec Network Technology Inc. Guangzhou510000 China
One of the most important services provided by cloud service providers (CSPs), cloud storage is economically attractive and can provide on-demand data storage service to resource-constrained tenants in the manner of p... 详细信息
来源: 评论
A Review on Binary Code Analysis Datasets  18th
A Review on Binary Code Analysis Datasets
收藏 引用
18th International Conference on Wireless Artificial Intelligent Computing Systems and Applications, WASA 2024
作者: Huang, Zhijian Song, Shuguang Liu, Han Kuang, Hongyu Zhang, Jingjing Hu, Pengfei National Key Laboratory of Science and Technology on Information System Security Systems Engineering Institute Academy of Military Sciences Beijing China School of Computer Science and Technology Shandong University Qingdao China
Binary code analysis serves as the foundation for research in vulnerability discovery, software protection, and malicious code analysis. However, analyzing binary files is challenging due to the lack of high-level sem... 详细信息
来源: 评论
Fault-tolerant identity-based encryption from SM9
收藏 引用
Science China(information Sciences) 2024年 第2期67卷 104-117页
作者: Xiaohong LIU Xinyi HUANG Zhaohui CHENG Wei WU Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber SecurityFujian Normal University Artificial Intelligence Thrust Information HubThe Hong Kong University of Science and Technology (Guangzhou) Olym Information Security Technology Ltd. Center for Applied Mathematics of Fujian Province School of Mathematics and StatisticsFujian Normal University
This paper initiates the formal study of attribute-based encryption within the framework of SM9,the Chinese National Cryptography Standard for Identity-Based Cryptography, by presenting two new faulttolerant identity-... 详细信息
来源: 评论
Sentences Similarity Model Based on Fusion of Semantic, Syntactic and Word Order Multi-Features  4
Sentences Similarity Model Based on Fusion of Semantic, Synt...
收藏 引用
4th International Conference on information Science, Parallel and Distributed Systems, ISPDS 2023
作者: Zhou, Ya Zhao, Ning Huang, Guimin Deng, Nanxiao Guo, Qingkai School of Computer Science and Information Security Guilin University of Electronic Technology Guangxi Key Laboratory of Image and Graphic Intelligent Processing Guilin China
In sentence similarity research methods, sentence similarity is often calculated from semantic aspects, however, the influence of other features is ignored. For example, the influence of sentence syntactic structure a... 详细信息
来源: 评论
Trusted Auditing of Data Operation Behaviors in Cloud based on Blockchain and TEE  21
Trusted Auditing of Data Operation Behaviors in Cloud based ...
收藏 引用
21st IEEE International Symposium on Parallel and Distributed Processing with Applications, 13th IEEE International Conference on Big Data and Cloud Computing, 16th IEEE International Conference on Social Computing and networking and 13th International Conference on Sustainable Computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Xu, Shujiang Wang, Fansheng Wang, Lianhai Mihaljevic, Miodrag J. Zhang, Shuhui Shao, Wei Huang, Qihao Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Mathematical Institute The Serbian Academy of Sciences and Arts Belgrade Serbia Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
With the rapid development of the new generation of information technologies, including cloud computing, 5G, and the Internet of Things, data outsourcing storage in the cloud has brought great convenience to data stor... 详细信息
来源: 评论
Stereoscopic Video Retargeting Based on Camera Motion Classification  48
Stereoscopic Video Retargeting Based on Camera Motion Classi...
收藏 引用
48th IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2023
作者: Cai, Linghui Tang, Zhenhua Guangxi University School of Computer and Electronics Information Nanning China Guangxi Key Laboratory of Multimedia Communication and Network Technology Nanning China
The existing stereo video retargeting algorithms commonly use a same methodology to perform resizing without considering different videos with various features, leading to the low quality of reconstructed videos. To a... 详细信息
来源: 评论
Extinction Chains Reveal Intermediate Phases Between the Safety and Collapse in Mutualistic Ecosystems
收藏 引用
Engineering 2024年 第12期43卷 89-98页
作者: Guangwei Wang Xueming Liu Ying Xiao Ye Yuan Linqiang Pan Xiaohong Guan Jianxi Gao Hai-Tao Zhang The MOE Engineering Research Center of Autonomous Intelligent Unmanned Systems State Key Laboratory of Digital Manufacturing Equipment and TechnologySchool of Artificial Intelligence and AutomationHuazhong University of Science and TechnologyWuhan 430074China Guangdong HUST Industrial Technology Research Institute Huazhong University of Science and TechnologyDongguan 523808China Guangdong Provincial Engineering Technology Center of Autonomous Unmanned Vessels Dongguan 523808China MOE Key Laboratory of Intelligent Networks and Network Security&State Key Laboratory of Manufacturing Systems Xi’an Jiaotong UniversityXi’an 710049China Tsinghua National Laboratory of Information Science and Technology Department of AutomationTsinghua UniversityBeijing 100084China Department of Computer Science Rensselaer Polytechnic InstituteTroyNY 12180USA
Ecosystems are undergoing unprecedented persistent deterioration due to unsustainable anthropogenic human activities,such as overfishing and deforestation,and the effects of such damage on ecological stability are ***... 详细信息
来源: 评论
Characterization and Properties of Bent-Negabent Functions
收藏 引用
Chinese Journal of Electronics 2022年 第4期31卷 786-792页
作者: JIANG Niu ZHAO Min YANG Zhiyao ZHUO Zepeng CHEN Guolong School of Mathematical Sciences Huaibei Normal University Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Normal University School of Cyber Science University of Science and Technology of China School of Computer Engineering Bengbu University
A further characterization of the bentnegabent functions is presented. Based on the concept of complete mapping polynomial, we provide a necessary and sufficient condition for a class of quadratic Boolean functions to... 详细信息
来源: 评论