咨询与建议

限定检索结果

文献类型

  • 4,435 篇 会议
  • 3,397 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,840 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,280 篇 工学
    • 3,971 篇 计算机科学与技术...
    • 3,151 篇 软件工程
    • 1,357 篇 信息与通信工程
    • 695 篇 电气工程
    • 557 篇 控制科学与工程
    • 542 篇 电子科学与技术(可...
    • 455 篇 网络空间安全
    • 439 篇 生物工程
    • 303 篇 机械工程
    • 233 篇 光学工程
    • 224 篇 仪器科学与技术
    • 189 篇 生物医学工程(可授...
    • 168 篇 安全科学与工程
    • 148 篇 动力工程及工程热...
    • 145 篇 化学工程与技术
    • 133 篇 交通运输工程
    • 127 篇 建筑学
  • 2,305 篇 理学
    • 1,382 篇 数学
    • 506 篇 物理学
    • 475 篇 生物学
    • 430 篇 统计学(可授理学、...
    • 208 篇 系统科学
    • 165 篇 化学
  • 1,340 篇 管理学
    • 816 篇 管理科学与工程(可...
    • 584 篇 图书情报与档案管...
    • 290 篇 工商管理
  • 288 篇 法学
    • 167 篇 社会学
    • 119 篇 法学
  • 160 篇 医学
    • 130 篇 临床医学
    • 118 篇 基础医学(可授医学...
  • 117 篇 经济学
  • 98 篇 军事学
  • 54 篇 农学
  • 46 篇 教育学
  • 24 篇 文学
  • 22 篇 艺术学

主题

  • 239 篇 feature extracti...
  • 230 篇 semantics
  • 214 篇 cryptography
  • 182 篇 authentication
  • 181 篇 information secu...
  • 162 篇 computational mo...
  • 158 篇 security
  • 150 篇 protocols
  • 142 篇 accuracy
  • 140 篇 privacy
  • 139 篇 deep learning
  • 126 篇 training
  • 122 篇 laboratories
  • 106 篇 data models
  • 100 篇 federated learni...
  • 100 篇 cloud computing
  • 95 篇 servers
  • 93 篇 blockchain
  • 91 篇 public key crypt...
  • 88 篇 data privacy

机构

  • 203 篇 shandong provinc...
  • 174 篇 key laboratory o...
  • 158 篇 school of comput...
  • 155 篇 state key labora...
  • 114 篇 school of comput...
  • 106 篇 department of co...
  • 106 篇 school of cyber ...
  • 97 篇 information secu...
  • 80 篇 key laboratory o...
  • 79 篇 institute of inf...
  • 68 篇 guangdong provin...
  • 66 篇 computer network...
  • 65 篇 college of mathe...
  • 64 篇 university of ch...
  • 63 篇 state grid key l...
  • 62 篇 peng cheng labor...
  • 60 篇 key laboratory o...
  • 59 篇 school of softwa...
  • 59 篇 school of comput...
  • 55 篇 key laboratory o...

作者

  • 55 篇 jianfeng ma
  • 54 篇 yang yang
  • 50 篇 ma jianfeng
  • 45 篇 yixian yang
  • 41 篇 zheng wei-shi
  • 41 篇 ding yong
  • 38 篇 huang qingming
  • 33 篇 zhang huanguo
  • 32 篇 wang wei
  • 32 篇 hu yupu
  • 31 篇 cong runmin
  • 31 篇 xu an wang
  • 30 篇 yang yixian
  • 29 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 25 篇 xu li
  • 25 篇 xie xiaohua
  • 24 篇 xinhong hei
  • 23 篇 liu xin

语言

  • 7,214 篇 英文
  • 362 篇 其他
  • 277 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Computer Network and Information Security"
7840 条 记 录,以下是4961-4970 订阅
排序:
L2: Lazy forwarding in low duty cycle wireless sensor networks
L2: Lazy forwarding in low duty cycle wireless sensor networ...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: Zhichao Cao Yuan He Yunhao Liu Department of Computer Science and Engineering HKUST Hong Kong China MOE Key Laboratory for Information System Security School of Software TNLIST Tsinghua University China
Energy-constrained wireless sensor networks are duty-cycled, relaying on multi-hop forwarding to collect data packets. A forwarding scheme generally involves three design elements: media access, link estimation, and r... 详细信息
来源: 评论
Efficient partially policy-hidden with multi-authority for access control scheme in Internet of Things
Efficient partially policy-hidden with multi-authority for a...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Yan Liu Ruizhong Du School of Cyber Security and Computer Hebei University Baoding China Key Laboratory on High Trusted Information System in Hebei Province Hebei University Baoding China
The widespread application from all walks of life in the Internet of Things (IoT) has improved our daily lives, however, the rapidly increased number of devices and data has brought security attacks frequently. To max... 详细信息
来源: 评论
BTC: Bilateral-Branch Vision Transformer via Hilbert Patch Embedding for Image Clustering
BTC: Bilateral-Branch Vision Transformer via Hilbert Patch E...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Taizhang Hu Fan Yang Xing Wei Chong Zhao Li Meng Bin Wen Yang Lu School of Computer and Information Hefei University of Technology Anhui Mine IOT and Security Monitoring Technology Key Laboratory School of Biomedical Engineering Anhui Medical University
Recently, image clustering methods based on contrastive learning have attracted attention for their advantage of enhancing image representation. However, existing clustering methods struggle to accurately capture glob... 详细信息
来源: 评论
Real perfect contrast visual cryptography scheme with reversing
收藏 引用
Journal of Computational information Systems 2009年 第1期5卷 401-405页
作者: Han, Yanyan Hu, Yupu He, Wencai Ministry of Education Key Laboratory of Computer Networks and Information Security Xidian University Xi'an 710071 China Department of Scientific Research Beijing Electronics and Scientist Technology Institute Beijing 100070 China
Visual cryptography schemes are characterized by two parameters: the pixel expansion and the contrast. Generally, to achieve high contrast, schemes should have large pixel expansion. This paper proposed a real perfect... 详细信息
来源: 评论
FLEER: A Federated Learning Framework for EEG Emotion Recognition
FLEER: A Federated Learning Framework for EEG Emotion Recogn...
收藏 引用
Artificial Intelligence, networking and information Technology (AINIT), International Seminar on
作者: Mingming Li Xianglei Tang School of Computer Science and Technology Hangzhou Dianzi University Hangzhou China Zhejiang Electronic Information Products Inspection and Research Institute (Key Laboratory of Information Security of Zhejiang Province) Hangzhou China
The success of deep learning (DL) methods in the Brain-computer Interface (BCI) field for emotion recognition of electroencephalographic (EEG) recordings has been limited due to the scarcity of large datasets. Individ... 详细信息
来源: 评论
Minfer: A method of inferring motif statistics from sampled edges
Minfer: A method of inferring motif statistics from sampled ...
收藏 引用
International Conference on Data Engineering
作者: Pinghui Wang John C.S. Lui Don Towsley Junzhou Zhao MOE Key Laboratory for Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an China Department of Computer Science and Engineering The Chinese University of Hong Kong Hong Kong
Characterizing motif (i.e., locally connected sub-graph patterns) statistics is important for understanding complex networks such as online social networks and communication networks. Previous work made the strong ass... 详细信息
来源: 评论
Full Service Hopping for Proactive Cyber-Defense
Full Service Hopping for Proactive Cyber-Defense
收藏 引用
IEEE International Conference on networking, Sensing and Control
作者: Leyi Shi Chunfu Jia Shuwang Lu College of Computer and CommunicationEngineering China University of Petroleum Dongying China State Key Laboratory of Information Security Graduate School of Chinese Academy of Sciences Beijing China
Inspired by deceptive and evasive countermeasures for military environment, a proactive cyber defense tactic of full service hopping is proposed which changes all the service information pseudo-randomly, including ser... 详细信息
来源: 评论
Using evolutionary process for cross-version software defect prediction
收藏 引用
International Journal of Performability Engineering 2019年 第9期15卷 2484-2493页
作者: Li, Yong Liu, Zhandong Zhang, Haijun College of Computer Science and Technology Xinjiang Normal University Urumqi830054 China Data Security Key Laboratory Xinjiang Normal University Urumqi830054 China Key Laboratory of Safety-Critical Software Ministry of Industry and Information Technology Nanjing211106 China
Cross-version defect prediction can effectively reduce the construction cost of a model, which is of great significance for understanding the causes of defects in subsequent software versions and improving the quality... 详细信息
来源: 评论
Seeing is not Believing: An Identity Hider for Human Vision Privacy Protection
arXiv
收藏 引用
arXiv 2023年
作者: Wang, Tao Zhang, Yushu Yang, Zixuan Xiao, Xiangli Zhang, Hua Hua, Zhongyun The College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing211106 China The Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies Shenzhen518055 China The State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China Shenzhen518055 China
Massive captured face images are stored in the database for the identification of individuals. However, these images can be observed unintentionally by data examiners, which is not at the will of individuals and may c...
来源: 评论
Enhanced Competitive Swarm Optimizer for Multi-task Optimization  2020
Enhanced Competitive Swarm Optimizer for Multi-task Optimiza...
收藏 引用
Proceedings of the 2020 9th International Conference on Computing and Pattern Recognition
作者: Wei Li Junqing Yuan Haonan Luo Zhou Lei Qingzheng Xu School of Computer Science and Engineering Xi'an University of Technology and Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China School of Computer Science and Engineering Xi'an University of Technology Xi'an China College of Information and Communication National University of Defense Technology Xi'an China
In the real world, many problems possess the high degree of similarity. Inspired by multifactorial inheritance model, evolutionary multi-task optimization paradigm is proposed to simultaneously solve multiple optimiza... 详细信息
来源: 评论