咨询与建议

限定检索结果

文献类型

  • 4,506 篇 会议
  • 3,387 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,901 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,299 篇 工学
    • 3,983 篇 计算机科学与技术...
    • 3,164 篇 软件工程
    • 1,348 篇 信息与通信工程
    • 653 篇 电气工程
    • 561 篇 控制科学与工程
    • 523 篇 电子科学与技术(可...
    • 449 篇 网络空间安全
    • 440 篇 生物工程
    • 301 篇 机械工程
    • 233 篇 光学工程
    • 224 篇 仪器科学与技术
    • 188 篇 生物医学工程(可授...
    • 165 篇 安全科学与工程
    • 151 篇 动力工程及工程热...
    • 148 篇 化学工程与技术
    • 127 篇 交通运输工程
    • 126 篇 建筑学
  • 2,310 篇 理学
    • 1,377 篇 数学
    • 504 篇 物理学
    • 479 篇 生物学
    • 428 篇 统计学(可授理学、...
    • 206 篇 系统科学
    • 166 篇 化学
  • 1,338 篇 管理学
    • 818 篇 管理科学与工程(可...
    • 576 篇 图书情报与档案管...
    • 297 篇 工商管理
  • 289 篇 法学
    • 168 篇 社会学
    • 119 篇 法学
  • 154 篇 医学
    • 127 篇 临床医学
  • 116 篇 经济学
    • 116 篇 应用经济学
  • 99 篇 军事学
  • 55 篇 农学
  • 46 篇 教育学
  • 24 篇 文学
  • 23 篇 艺术学

主题

  • 238 篇 feature extracti...
  • 229 篇 semantics
  • 216 篇 cryptography
  • 184 篇 authentication
  • 181 篇 information secu...
  • 163 篇 computational mo...
  • 158 篇 security
  • 152 篇 protocols
  • 144 篇 accuracy
  • 141 篇 deep learning
  • 138 篇 privacy
  • 122 篇 laboratories
  • 121 篇 training
  • 103 篇 data models
  • 100 篇 federated learni...
  • 99 篇 cloud computing
  • 94 篇 servers
  • 92 篇 public key crypt...
  • 92 篇 blockchain
  • 89 篇 data privacy

机构

  • 204 篇 shandong provinc...
  • 178 篇 key laboratory o...
  • 164 篇 school of comput...
  • 152 篇 state key labora...
  • 113 篇 school of comput...
  • 111 篇 school of cyber ...
  • 106 篇 department of co...
  • 98 篇 information secu...
  • 83 篇 key laboratory o...
  • 81 篇 institute of inf...
  • 69 篇 guangdong provin...
  • 68 篇 computer network...
  • 66 篇 university of ch...
  • 64 篇 college of mathe...
  • 64 篇 state grid key l...
  • 63 篇 peng cheng labor...
  • 60 篇 key laboratory o...
  • 59 篇 school of softwa...
  • 56 篇 school of comput...
  • 54 篇 key laboratory o...

作者

  • 55 篇 jianfeng ma
  • 53 篇 yang yang
  • 49 篇 ma jianfeng
  • 45 篇 yixian yang
  • 43 篇 ding yong
  • 41 篇 zheng wei-shi
  • 38 篇 huang qingming
  • 31 篇 cong runmin
  • 31 篇 wang wei
  • 31 篇 hu yupu
  • 31 篇 yang yixian
  • 30 篇 zhang huanguo
  • 30 篇 xu an wang
  • 29 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 26 篇 min-ling zhang
  • 24 篇 liu xin
  • 24 篇 xinhong hei
  • 24 篇 xie xiaohua

语言

  • 7,143 篇 英文
  • 499 篇 其他
  • 278 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Computer Network and Information Security"
7901 条 记 录,以下是521-530 订阅
排序:
A Verifiable Privacy-Preserving Outsourced Prediction Scheme Based on Blockchain in Smart Healthcare
A Verifiable Privacy-Preserving Outsourced Prediction Scheme...
收藏 引用
2023 IEEE International Conference on E-Health networking, Application and Services, Healthcom 2023
作者: Li, Ta Tian, Youliang Xiong, Jinbo Wang, Linjie College of Computer Science and Technology Guizhou University State Key Laboratory of Public Big Data Guiyang550025 China College of Computer and Cyber Security Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Normal University Fuzhou350117 China School of Data Science Tongren University Tongren554300 China
The swift progression of the Internet of Things and the extensive integration of machine learning have spurred the growth of intelligent healthcare. Many intelligent healthcare devices, limited by their own computing ... 详细信息
来源: 评论
A Lightweight Chinese Summarization Generation Method Based on Knowledge Distillation  4
A Lightweight Chinese Summarization Generation Method Based ...
收藏 引用
4th International Conference on information Science, Parallel and Distributed Systems, ISPDS 2023
作者: Liu, Shiyue Xiao, Yannan Wang, Xueyong Huang, Wenming Deng, Zhenrong School of Computer and Information Security Guilin University of Electronic Technology Guangxi Key Laboratory of Image and Graphic Intelligent Processing Guilin China School of Computer and Information Security Guilin University of Electronic Technology Guilin China Guilin Xintong Technology Co. Guilin China
In recent years, large-scale pretrained natural language processing models such as BERT, GPT3 have achieved good results in processing tasks. However, in daily applications, these large-scale language models usually e... 详细信息
来源: 评论
FastIoTBot: Identifying IoT Bots by Fast Detecting Anomalous Domain Queries with Long Short-Term Memory networks  3
FastIoTBot: Identifying IoT Bots by Fast Detecting Anomalous...
收藏 引用
3rd International Conference on Consumer Electronics and computer Engineering, ICCECE 2023
作者: Li, Ruyu Yin, Lihua Zhang, Yuanfei Qian, Kexiang Luo, Xi School of Cyberspace Security Guangzhou University Guangzhou China Peng Cheng Laboratory Shenzhen518038 China School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China Institute of Information and Telecommunication of Global Energy Interconnection Research Institute State Grid Key Laboratory of Information and Network Security Beijing China
Along with the progression in technology, Internet of Things (IoT) has been dramatically developed in recent ten years. It connects physical world and digital world, which makes people's life more convenient. Howe... 详细信息
来源: 评论
Monitoring method of API encryption parameter tamper attack based on deep learning  6
Monitoring method of API encryption parameter tamper attack ...
收藏 引用
6th International Conference on Intelligent Computing, Communication, and Devices, ICCD 2023
作者: Chen, Lu Zhang, Tao Ma, Yuanyuan Chen, Mu State Grid Smart Grid Research Institute Co. Ltd Nanjing210003 China State Grid Key Laboratory of Information and Network Security Nanjing210003 China
This paper proposes an abnormal behavior detection technology of power 5G terminal based on the characteristics of business interaction mode. First, the abnormal behavior detection framework of power 5G terminal is de... 详细信息
来源: 评论
A Frequent Subgraph Publishing Algorithm Based on Differential Privacy
A Frequent Subgraph Publishing Algorithm Based on Differenti...
收藏 引用
2022 International Conference on Cloud Computing, Big Data Applications and Software Engineering, CBASE 2022
作者: Liu, Wenfen Chen, Di Yu, MingHao Xu, Qiang Guilin University of Electronic Technology School of Computer and Information Security Guilin Guangxi China Guangxi Key Laboratory of Cryptography and Information Security Guilin Guangxi China
Frequent subgraph mining is a common technology in data mining and has important application value. However, If graph data contains private information, publishing frequent subgraphs and support directly will lead to ... 详细信息
来源: 评论
Automatic skin lesion classification using a novel densely connected convolutional network integrated with an attention module
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第7期14卷 8943-8956页
作者: Shan, Pufang Chen, Jialei Fu, Chong Cao, Lin Tie, Ming Sham, Chiu-Wing School of Computer Science and Engineering Northeastern University Shenyang110819 China Engineering Research Center of Security Technology of Complex Network System Ministry of Education Shenyang China Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Northeastern University Shenyang110819 China School of Information and Communication Engineering Beijing Information Science and Technology University Beijing100101 China Science and Technology on Space Physics Laboratory Beijing100076 China School of Computer Science The University of Auckland Auckland New Zealand
Automated skin lesion classification in dermoscopy images remains challenging due to the existence of artefacts and intrinsic cutaneous features, diversity of lesion morphology, insufficiency of training data, and cla... 详细信息
来源: 评论
CASSOR: Class-Aware Sample Selection for Ordinal Regression with Noisy Labels  20th
CASSOR: Class-Aware Sample Selection for Ordinal Regression...
收藏 引用
20th Pacific Rim International Conference on Artificial Intelligence, PRICAI 2023
作者: Yuan, Yue Wan, Sheng Zhang, Chuang Gong, Chen School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing China Key Laboratory of Intelligent Perception and Systems for High-Dimensional Information of Ministry of Education Nanjing China Jiangsu Key Laboratory of Image and Video Understanding for Social Security Nanjing China
Ordinal regression aims at solving the classification problem, where the categories are related in a natural order. Due to the difficulty in distinguishing between highly relevant categories, label noise is frequently... 详细信息
来源: 评论
A High-Quality and Efficient Bus-Aware Global Router
收藏 引用
Chinese Journal of Electronics 2025年 第2期34卷 444-456页
作者: Liu Genggeng Wei Ling Yu Yantao Xu Ning College of Computer and Data Science Fuzhou University Fuzhou 350108 China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou 350108 China School of Information Engineering Wuhan University of Technology Wuhan 430070 China
As advanced technology nodes enter the nanometer era, the complexity of integrated circuit design is increasing, and the proportion of bus in the net is also increasing. The bus routing has become a key factor affecti... 详细信息
来源: 评论
Abnormal behavior detection technology of power 5G terminal based on the characteristics of service interaction mode  6
Abnormal behavior detection technology of power 5G terminal ...
收藏 引用
6th International Conference on Intelligent Computing, Communication, and Devices, ICCD 2023
作者: Chen, Lu Li, Nige Chen, Mu Dai, Zaojian Li, Yong State Grid Smart Grid Research Institute Co. Ltd Nanjing210003 China State Grid Key Laboratory of Information and Network Security Nanjing210003 China
This paper proposes an abnormal behavior detection technology of power 5G terminal based on the characteristics of business interaction mode. First, the abnormal behavior detection framework of power 5G terminal is de... 详细信息
来源: 评论
Interference Coordination Technology of Ultra Dense Deployment Based on Clustering Algorithm  5
Interference Coordination Technology of Ultra Dense Deployme...
收藏 引用
5th IEEE International Conference on Power, Intelligent Computing and Systems, ICPICS 2023
作者: Wang, Haoyuan Tian, Yue Li, Wenda Xiamen University of Technology Fujian Key Laboratory of Communication Network and Information Processing Xiamen China University College London Department of Security and Crime Science London United Kingdom
A clustering algorithm based Ultra Dense Deployment is proposed to address the problem of establishing a reasonable interference model and allocating ABS reasonably to minimize interference and maximize throughput in ... 详细信息
来源: 评论