咨询与建议

限定检索结果

文献类型

  • 4,511 篇 会议
  • 3,407 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,926 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,322 篇 工学
    • 4,005 篇 计算机科学与技术...
    • 3,158 篇 软件工程
    • 1,357 篇 信息与通信工程
    • 658 篇 电气工程
    • 588 篇 控制科学与工程
    • 531 篇 电子科学与技术(可...
    • 452 篇 网络空间安全
    • 440 篇 生物工程
    • 301 篇 机械工程
    • 233 篇 光学工程
    • 224 篇 仪器科学与技术
    • 188 篇 生物医学工程(可授...
    • 165 篇 安全科学与工程
    • 153 篇 动力工程及工程热...
    • 147 篇 化学工程与技术
    • 129 篇 建筑学
    • 127 篇 交通运输工程
  • 2,306 篇 理学
    • 1,374 篇 数学
    • 504 篇 物理学
    • 478 篇 生物学
    • 425 篇 统计学(可授理学、...
    • 207 篇 系统科学
    • 167 篇 化学
  • 1,340 篇 管理学
    • 818 篇 管理科学与工程(可...
    • 579 篇 图书情报与档案管...
    • 295 篇 工商管理
  • 287 篇 法学
    • 167 篇 社会学
    • 118 篇 法学
  • 156 篇 医学
    • 128 篇 临床医学
  • 116 篇 经济学
    • 116 篇 应用经济学
  • 99 篇 军事学
  • 54 篇 农学
  • 44 篇 教育学
  • 24 篇 文学
  • 23 篇 艺术学

主题

  • 238 篇 feature extracti...
  • 229 篇 semantics
  • 214 篇 cryptography
  • 184 篇 authentication
  • 181 篇 information secu...
  • 163 篇 computational mo...
  • 160 篇 security
  • 151 篇 protocols
  • 144 篇 deep learning
  • 144 篇 accuracy
  • 139 篇 privacy
  • 122 篇 laboratories
  • 122 篇 training
  • 103 篇 data models
  • 102 篇 federated learni...
  • 99 篇 cloud computing
  • 94 篇 servers
  • 92 篇 public key crypt...
  • 92 篇 blockchain
  • 89 篇 data privacy

机构

  • 204 篇 shandong provinc...
  • 179 篇 key laboratory o...
  • 166 篇 school of comput...
  • 151 篇 state key labora...
  • 112 篇 school of comput...
  • 111 篇 school of cyber ...
  • 106 篇 department of co...
  • 98 篇 information secu...
  • 84 篇 key laboratory o...
  • 81 篇 institute of inf...
  • 67 篇 computer network...
  • 67 篇 guangdong provin...
  • 66 篇 university of ch...
  • 64 篇 college of mathe...
  • 64 篇 state grid key l...
  • 63 篇 peng cheng labor...
  • 60 篇 key laboratory o...
  • 59 篇 school of softwa...
  • 57 篇 school of comput...
  • 56 篇 key laboratory o...

作者

  • 55 篇 jianfeng ma
  • 53 篇 yang yang
  • 49 篇 ma jianfeng
  • 45 篇 yixian yang
  • 43 篇 ding yong
  • 41 篇 zheng wei-shi
  • 38 篇 huang qingming
  • 31 篇 cong runmin
  • 31 篇 wang wei
  • 31 篇 zhang huanguo
  • 31 篇 hu yupu
  • 30 篇 xu an wang
  • 30 篇 yang yixian
  • 29 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 27 篇 min-ling zhang
  • 25 篇 xie xiaohua
  • 24 篇 liu xin
  • 23 篇 wang yujue

语言

  • 7,128 篇 英文
  • 536 篇 其他
  • 282 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Computer Network and Information Security"
7926 条 记 录,以下是501-510 订阅
排序:
An Improved Data Backup Scheme Based on Multi-Factor Authentication  9
An Improved Data Backup Scheme Based on Multi-Factor Authent...
收藏 引用
9th IEEE International Conference on Big Data security on Cloud, 9th IEEE International Conference on High Performance and Smart Computing and 9th IEEE International Conference on Intelligent Data and security, BigDatasecurity-HPSC-IDS 2023
作者: Yi, Jinghai Wen, Yunhua Donghua University School of Computer Science and Technology Shanghai201620 China Institute of Information Engineering Chinese Academy of Sciences State Key Laboratory of Information Security Beijing100093 China
Remote backup is an effective alternative to local backup. It overcomes the shortcomings of local backup that is easy to be stolen and tampered with. In order to protect sensitive information, it is usually necessary ... 详细信息
来源: 评论
Verifiable and Forward-Secure Multi-keyword Query in Internet of Medical Things
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Li, Hongjun He, Debiao Feng, Qi Luo, Min Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan China Wuhan University School of Cyber Science and Engineering Wuhan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250014 China National Key Laboratory of Security Communication Chengdu China
The Internet of Medical Things (IoMT) plays a pivotal role in modern healthcare systems, enhancing patients' medical experiences and improving the efficiency of public medical services. However, concerns regarding... 详细信息
来源: 评论
Block-gram: Mining Knowledgeable Features for Smart Contract Vulnerability Detection  7th
Block-gram: Mining Knowledgeable Features for Smart Contrac...
收藏 引用
7th International Conference on Smart Computing and Communication, SmartCom 2022
作者: Li, Tao Wang, Haolong Fang, Yaozheng Jian, Zhaolong Wang, Zichun Xie, Xueshuo Tianjin Key Laboratory of Network and Data Security Technology Tianjin China College of Computer Science Nankai University Tianjin China Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province Hangzhou China State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing China
Effective vulnerability detection of large-scale smart contracts is critical because smart contract attacks frequently bring about tremendous economic loss. However, code analysis requiring traversal paths and learnin... 详细信息
来源: 评论
A numerical magnitude aware multi-channel hierarchical encoding network for math word problem solving
收藏 引用
Neural Computing and Applications 2025年 第3期37卷 1651-1672页
作者: Xu, Junjie Chen, Yuzhong Xiao, Lingsheng Liao, Hongmiao Zhong, Jiayuan Dong, Chen College of Computer and Data Science Fuzhou University Fujian Province Fuzhou350108 China Engineering Research Center of Big Data Intelligence Ministry of Education Fuzhou China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fujian Province Fuzhou350108 China
Math word problem (MWP) represents a critical research area within reading comprehension, where accurate comprehension of math problem text is crucial for generating math expressions. However, current approaches still... 详细信息
来源: 评论
How to Construct Public Timeline for RSA-Formed Time-Lock Cryptography  20th
How to Construct Public Timeline for RSA-Formed Time-Lock ...
收藏 引用
20th International Conference on information security and Cryptology, Inscrypt 2024
作者: Jin, Huixuan Peng, Cong Fu, Jintao Luo, Min Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Wuhan China Henan Key Laboratory of Network Cryptography Technology Henan Zhengzhou China Inspur Academy of Science and Technology Jinan China
Time-Locked Puzzle (TLP) and timed-release encryption (T-RE) are both time-based locking mechanisms. The former requires the decryptor to perform a predetermined amount of computation, while the latter requires a trus... 详细信息
来源: 评论
The Utility Optimization of Type I-PTT for Satellite Internet Navigation Location information Protection
The Utility Optimization of Type I-PTT for Satellite Interne...
收藏 引用
2024 International Conference on Satellite Internet, SAT-NET 2024
作者: Qin, Zhixing Zhou, Jiafeng Tian, Mengjie Zhou, Yihui Lu, Laifeng Shaanxi Normal University School of Mathematics and Statistics Xi'an China Shaanxi Normal University School of Computer Science Xi'an China Xidian University Shaanxi Key Laboratory of Network and System Security Xi'an China
With the realization of direct-to-handset in Huawei smart phones, satellite communication has become a part of daily life, raising more and more concerns on security. Local differential privacy is a promising method f... 详细信息
来源: 评论
CurMIM: Curriculum Masked Image Modeling
CurMIM: Curriculum Masked Image Modeling
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Liu, Hao Wang, Kun Han, Yudong Wang, Haocong Hu, Yupeng Wang, Chunxiao Nie, Liqiang School of Software Shandong University Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology Shandong Academy of Sciences Jinan China School of Computer Science and Technology Harbin Institute of Technology Shenzhen China
Masked Image Modeling (MIM), following "mask-and-reconstruct" scheme, is a promising self-supervised method to learn scalable visual representation. Studies indicate that selecting an effective mask strategy... 详细信息
来源: 评论
TMAS:A transaction misbehavior analysis scheme for blockchain
收藏 引用
Blockchain(Research and Applications) 2024年 第3期5卷 42-52页
作者: Shiyong Huang Xiaohan Hao Yani Sun Chenhuang Wu Huimin Li Wei Ren Kim-Kwang Raymond Choo School of Computer Science China University of GeosciencesWuhan430074China Artificial Intelligence Thrust Information HubHong Kong University of Science and TechnologyGuangzhou511400China Yunnan Key Laboratory of Blockchain Application Technology Yunnan Innovation Institute of Beihang UniversityKunming650233China Fujian Key Laboratory of Financial Information Processing Putian UniversityPutian351100China Department of Information Systems and Cyber Security University of Texas at San AntonioSan AntonioTX 78249-0631USA
Blockchain-based cryptocurrencies,such as Bitcoins,are increasingly ***,the decentralized and anonymous nature of these currencies can also be(ab)used for nefarious activities such as money laundering,thus reinforcing... 详细信息
来源: 评论
Denoising Low-Dose CT Images Using a Multi-Layer Convolutional Analysis-Based Sparse Encoder network  15
Denoising Low-Dose CT Images Using a Multi-Layer Convolution...
收藏 引用
15th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics, CISP-BMEI 2022
作者: Kang, Yanqin Liu, Jin Liu, Tao Qiang, Jun College of Computer and Information Anhui Polytechnic University Wuhu China Ministry of Education Key Laboratory of Computer Network and Information Nanjing China
Imaging in the field of low-dose computed tomography (LDCT) tend to be rather noisy and artificial but is diagnostically useful. One approach to improve the quality of LDCT images is to use deep learning (DL) techniqu... 详细信息
来源: 评论
Malicious Client Detection with Differential Privacy Constraints Based on Model Update Slicing and K-Means Clustering
Malicious Client Detection with Differential Privacy Constra...
收藏 引用
Frontiers Technology of information and computer (ICFTIC), IEEE International Conference on
作者: Mengshi Qi Xin Wang Yunpeng He Ming Yang Xiaoming Wu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
Federated learning (FL) is a decentralized machine learning technique that protects data privacy by trainng models locally on devices and sharing only model updates instead of raw data. However, FL also faces multiple... 详细信息
来源: 评论