咨询与建议

限定检索结果

文献类型

  • 4,435 篇 会议
  • 3,397 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,840 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,280 篇 工学
    • 3,971 篇 计算机科学与技术...
    • 3,151 篇 软件工程
    • 1,357 篇 信息与通信工程
    • 695 篇 电气工程
    • 557 篇 控制科学与工程
    • 542 篇 电子科学与技术(可...
    • 455 篇 网络空间安全
    • 439 篇 生物工程
    • 303 篇 机械工程
    • 233 篇 光学工程
    • 224 篇 仪器科学与技术
    • 189 篇 生物医学工程(可授...
    • 168 篇 安全科学与工程
    • 148 篇 动力工程及工程热...
    • 145 篇 化学工程与技术
    • 133 篇 交通运输工程
    • 127 篇 建筑学
  • 2,305 篇 理学
    • 1,382 篇 数学
    • 506 篇 物理学
    • 475 篇 生物学
    • 430 篇 统计学(可授理学、...
    • 208 篇 系统科学
    • 165 篇 化学
  • 1,340 篇 管理学
    • 816 篇 管理科学与工程(可...
    • 584 篇 图书情报与档案管...
    • 290 篇 工商管理
  • 288 篇 法学
    • 167 篇 社会学
    • 119 篇 法学
  • 160 篇 医学
    • 130 篇 临床医学
    • 118 篇 基础医学(可授医学...
  • 117 篇 经济学
  • 98 篇 军事学
  • 54 篇 农学
  • 46 篇 教育学
  • 24 篇 文学
  • 22 篇 艺术学

主题

  • 239 篇 feature extracti...
  • 230 篇 semantics
  • 214 篇 cryptography
  • 182 篇 authentication
  • 181 篇 information secu...
  • 162 篇 computational mo...
  • 158 篇 security
  • 150 篇 protocols
  • 142 篇 accuracy
  • 140 篇 privacy
  • 139 篇 deep learning
  • 126 篇 training
  • 122 篇 laboratories
  • 106 篇 data models
  • 100 篇 federated learni...
  • 100 篇 cloud computing
  • 95 篇 servers
  • 93 篇 blockchain
  • 91 篇 public key crypt...
  • 88 篇 data privacy

机构

  • 203 篇 shandong provinc...
  • 174 篇 key laboratory o...
  • 158 篇 school of comput...
  • 155 篇 state key labora...
  • 114 篇 school of comput...
  • 106 篇 department of co...
  • 106 篇 school of cyber ...
  • 97 篇 information secu...
  • 80 篇 key laboratory o...
  • 79 篇 institute of inf...
  • 68 篇 guangdong provin...
  • 66 篇 computer network...
  • 65 篇 college of mathe...
  • 64 篇 university of ch...
  • 63 篇 state grid key l...
  • 62 篇 peng cheng labor...
  • 60 篇 key laboratory o...
  • 59 篇 school of softwa...
  • 59 篇 school of comput...
  • 55 篇 key laboratory o...

作者

  • 55 篇 jianfeng ma
  • 54 篇 yang yang
  • 50 篇 ma jianfeng
  • 45 篇 yixian yang
  • 41 篇 zheng wei-shi
  • 41 篇 ding yong
  • 38 篇 huang qingming
  • 33 篇 zhang huanguo
  • 32 篇 wang wei
  • 32 篇 hu yupu
  • 31 篇 cong runmin
  • 31 篇 xu an wang
  • 30 篇 yang yixian
  • 29 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 25 篇 xu li
  • 25 篇 xie xiaohua
  • 24 篇 xinhong hei
  • 23 篇 liu xin

语言

  • 7,214 篇 英文
  • 362 篇 其他
  • 277 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Computer Network and Information Security"
7840 条 记 录,以下是41-50 订阅
排序:
JDC-GCN: joint diversity and consistency graph convolutional network
收藏 引用
Neural Computing and Applications 2025年 1-17页
作者: Lin, Renjie Yao, Jie Wang, Shiping Guo, Wenzhong College of Computer and Data Science Fuzhou University Fuzhou350116 China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou350116 China
In real-world scenarios, multi-view data comprises heterogeneous features, with each feature corresponding to a specific view. The objective of multi-view semi-supervised classification is to enhance classification pe... 详细信息
来源: 评论
DM-FedMF: A Recommendation Model of Federated Matrix Factorization with Detection Mechanism
收藏 引用
IEEE Transactions on network Science and Engineering 2025年
作者: Zheng, Xiaoyao Jia, Xianmin Cheng, Xiongchao He, Wenxuan Sun, Liping Guo, Liangmin Yu, Qingying Luo, Yonglong Anhui Normal University Anhui Provincial Key Laboratory of Network and Information Security School of Computer and Information Wuhu China
Items are recommended to users by the federated recommendation system while protecting user privacy, but there is a risk of the performance of the global model being seriously affected by malicious clients through the... 详细信息
来源: 评论
Mamba-based spatial-spectral fusion network for hyperspectral unmixing
收藏 引用
Journal of King Saud University - computer and information Sciences 2025年 第3期37卷 1-24页
作者: Gan, Yuquan Wei, Jingtao Xu, Mengmeng School of Telecommunication and Information Engineering Xi’an University of Posts & Telecommunications Xi’an 710121 China Xi’ an Key Laboratory of Image Processing Technology and Applications for Public Security Xi’an University of Posts & Telecommunications Xi’an 710121 China Shaanxi Key Laboratory of Information Communication Network and Security Xi’an University of Posts & Telecommunications Xi’an 710121 China
Hyperspectral unmixing (HU) is a critical technique in hyperspectral image (HSI) analysis, aimed at decomposing mixed pixels into a set of spectral signatures (endmembers) and their corresponding abundance values. Rec... 详细信息
来源: 评论
An Efficient and Secure Data Audit Scheme for Cloud-Based EHRs with Recoverable and Batch Auditing
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 1533-1553页
作者: Yuanhang Zhang Xu An Wang Weiwei Jiang Mingyu Zhou Xiaoxuan Xu Hao Liu College of Cryptography Engineering Engineering University of People’s Armed PoliceXi’an710086China Key Laboratory of Network and Information Security Engineering University of People’s Armed PoliceXi’an710086China School of Information and Communication Engineering Beijing University of Posts and TelecommunicationsBeijing100876China
Cloud storage,a core component of cloud computing,plays a vital role in the storage and management of *** Health Records(EHRs),which document users’health information,are typically stored on cloud ***,users’sensitiv... 详细信息
来源: 评论
Textual Data De-Privatization Scheme Based on Generative Adversarial networks  24th
Textual Data De-Privatization Scheme Based on Generative Adv...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Du, Yanning Xu, Jinnan Zhang, Yaling Wang, Yichuan Wang, Zhoukai School of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China
In many fields, such as healthcare, finance, and scientific research, data sharing and collaboration are critical to achieving better outcomes. However, the sharing of personal data often involves privacy risks, so pr... 详细信息
来源: 评论
LP2CR-IoT: Lightweight and Privacy-Preserving Cross-Modal Retrieval in IoT
收藏 引用
IEEE Internet of Things Journal 2025年 第10期12卷 14812-14827页
作者: Li, Mingyue Zhu, Yuting Du, Ruizhong Jia, Chunfu Hebei University School of Cyber Security and Computer Key Laboratory of High Trusted Information System in Hebei Province Hebei Baoding071002 China Nankai University Department of Cyber Sciences Tianjin300350 China
As a pivotal link between visual and linguistic relationships, image-text cross-modal retrieval has received widespread attention. However, existing studies primarily focus on intricate machine learning models to enha... 详细信息
来源: 评论
Enhancing Adversarial Example Transferability via Regularized Constrained Feature Layer
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 157-175页
作者: Xiaoyin Yi Long Chen Jiacheng Huang Ning Yu Qian Huang School of Computer Science and Technology Chongqing University of Posts and TelecommunicationsChongqing400065China Chongqing Key Laboratory of Public Big Data Security Technology Chongqing401420China School of Cyber Security and Information Law Chongqing University of Posts and TelecommunicationsChongqing400065China Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of EducationChongqing400065China Artificial Intelligence and Big Data College Chongqing Polytechnic University of Electronic TechnologyChongqing401331China
Transfer-based Adversarial Attacks(TAAs)can deceive a victim model even without prior *** is achieved by leveraging the property of adversarial *** is,when generated from a surrogate model,they retain their features i... 详细信息
来源: 评论
Embedding Data in Bitcoin Transaction Values with Restricted Boltzmann Machine  2nd
Embedding Data in Bitcoin Transaction Values with Restrict...
收藏 引用
2nd International Conference on Data security and Privacy Protection, DSPP 2024
作者: An, Jiayi Tian, Haibo Guangdong Province Key Laboratory of Information Security Technology School of Computer Science and Engineering Sun Yat-Sen University Guangzhou China
Constructing covert channels on blockchains has recently become a significant research focus. A major challenge lies in embedding data into blockchain transactions, while maintaining strong concealment. This stud... 详细信息
来源: 评论
A Reversible Data Hiding in Encryption Domain for JPEG Image Based on Controllable Ciphertext Range of Paillier Homomorphic Encryption Algorithm  21st
A Reversible Data Hiding in Encryption Domain for JPEG Ima...
收藏 引用
21st Pacific Rim International Conference on Artificial Intelligence, PRICAI 2024
作者: Ma, Bin Zhao, Chunxin Ma, Ruihe Xian, Yongjin Wang, Chunpeng Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China School of Economics Jilin University Changchun130015 China
With the rapid advancement of cloud computing, significant security concerns regarding data storage have been continuously raised. When the encrypted images are stored in the cloud, reversible data hiding in encrypted... 详细信息
来源: 评论
Extracting High-Discriminative Features for Detecting Double JPEG Compression With the Same Quantization Matrix
收藏 引用
IEEE Transactions on Circuits and Systems for Video Technology 2025年 第5期35卷 4727-4739页
作者: Li, Wenjie Li, Xiaolong Ni, Rongrong Zhao, Yao Tianjin University of Technology School of Computer Science and Engineering Tianjin300384 China Beijing Jiaotong University Institute of Information Science Beijing100044 China Beijing Key Laboratory of Advanced Information Science and Network Technology Beijing100044 China
Detecting double JPEG compression with the same quantization matrix is a crucial yet challenging task in image forensics. Existing methods often fail to accurately identify and fully exploit the differences between si... 详细信息
来源: 评论