咨询与建议

限定检索结果

文献类型

  • 4,506 篇 会议
  • 3,387 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,901 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,299 篇 工学
    • 3,983 篇 计算机科学与技术...
    • 3,164 篇 软件工程
    • 1,348 篇 信息与通信工程
    • 653 篇 电气工程
    • 561 篇 控制科学与工程
    • 523 篇 电子科学与技术(可...
    • 449 篇 网络空间安全
    • 440 篇 生物工程
    • 301 篇 机械工程
    • 233 篇 光学工程
    • 224 篇 仪器科学与技术
    • 188 篇 生物医学工程(可授...
    • 165 篇 安全科学与工程
    • 151 篇 动力工程及工程热...
    • 148 篇 化学工程与技术
    • 127 篇 交通运输工程
    • 126 篇 建筑学
  • 2,310 篇 理学
    • 1,377 篇 数学
    • 504 篇 物理学
    • 479 篇 生物学
    • 428 篇 统计学(可授理学、...
    • 206 篇 系统科学
    • 166 篇 化学
  • 1,338 篇 管理学
    • 818 篇 管理科学与工程(可...
    • 576 篇 图书情报与档案管...
    • 297 篇 工商管理
  • 289 篇 法学
    • 168 篇 社会学
    • 119 篇 法学
  • 154 篇 医学
    • 127 篇 临床医学
  • 116 篇 经济学
    • 116 篇 应用经济学
  • 99 篇 军事学
  • 55 篇 农学
  • 46 篇 教育学
  • 24 篇 文学
  • 23 篇 艺术学

主题

  • 238 篇 feature extracti...
  • 229 篇 semantics
  • 216 篇 cryptography
  • 184 篇 authentication
  • 181 篇 information secu...
  • 163 篇 computational mo...
  • 158 篇 security
  • 152 篇 protocols
  • 144 篇 accuracy
  • 141 篇 deep learning
  • 138 篇 privacy
  • 122 篇 laboratories
  • 121 篇 training
  • 103 篇 data models
  • 100 篇 federated learni...
  • 99 篇 cloud computing
  • 94 篇 servers
  • 92 篇 public key crypt...
  • 92 篇 blockchain
  • 89 篇 data privacy

机构

  • 204 篇 shandong provinc...
  • 178 篇 key laboratory o...
  • 164 篇 school of comput...
  • 152 篇 state key labora...
  • 113 篇 school of comput...
  • 111 篇 school of cyber ...
  • 106 篇 department of co...
  • 98 篇 information secu...
  • 83 篇 key laboratory o...
  • 81 篇 institute of inf...
  • 69 篇 guangdong provin...
  • 68 篇 computer network...
  • 66 篇 university of ch...
  • 64 篇 college of mathe...
  • 64 篇 state grid key l...
  • 63 篇 peng cheng labor...
  • 60 篇 key laboratory o...
  • 59 篇 school of softwa...
  • 56 篇 school of comput...
  • 54 篇 key laboratory o...

作者

  • 55 篇 jianfeng ma
  • 53 篇 yang yang
  • 49 篇 ma jianfeng
  • 45 篇 yixian yang
  • 43 篇 ding yong
  • 41 篇 zheng wei-shi
  • 38 篇 huang qingming
  • 31 篇 cong runmin
  • 31 篇 wang wei
  • 31 篇 hu yupu
  • 31 篇 yang yixian
  • 30 篇 zhang huanguo
  • 30 篇 xu an wang
  • 29 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 26 篇 min-ling zhang
  • 24 篇 liu xin
  • 24 篇 xinhong hei
  • 24 篇 xie xiaohua

语言

  • 7,143 篇 英文
  • 499 篇 其他
  • 278 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Computer Network and Information Security"
7901 条 记 录,以下是531-540 订阅
排序:
PPA: Preference Profiling Attack Against Federated Learning  30
PPA: Preference Profiling Attack Against Federated Learning
收藏 引用
30th Annual network and Distributed System security Symposium, NDSS 2023
作者: Zhou, Chunyi Gao, Yansong Fu, Anmin Chen, Kai Dai, Zhiyang Zhang, Zhi Xue, Minhui Zhang, Yuqing School of Computer Science and Engineering Nanjing University of Science and Technology China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Science China Data61 CSIRO Syndey Australia National Computer Network Intrusion Protection Center University of Chinese Academy of Science China
—Federated learning (FL) trains a global model across a number of decentralized users, each with a local dataset. Compared to traditional centralized learning, FL does not require direct access to local datasets and ...
来源: 评论
MISP: An Efficient Quantum-resistant Misbehavior Preventing Scheme with Self-enforcement for Vehicle-to-Everything
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Chen, Ying He, Debiao Bao, Zijian Wang, Huaqun Luo, Min Wuhan University School of Cyber Science and Engineering Wuhan430072 China Key Laboratory of Computing Power Network & Information Security Ministry of Education Shandong Computer Science Center Jinan250014 China Nanjing University of Posts and Telecommunications College of Computer Nanjing210023 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network & Information System Security Jinan250014 China
In the Vehicle-to-Everything (V2X) communication system, the presence of ambiguous warnings significantly increases the risk of severe accidents, posing a substantial threat to the safety of autonomous driving. It is ... 详细信息
来源: 评论
Length matters:Scalable fast encrypted internet traffic service classification based on multiple protocol data unit length sequence with composite deep learning
收藏 引用
Digital Communications and networks 2022年 第3期8卷 289-302页
作者: Zihan Chen Guang Cheng Ziheng Xu Shuyi Guo Yuyang Zhou Yuyu Zhao School of Cyber Science and Engineering Southeast UniversityNanjing211189China Key Laboratory of Computer Network and Information Integration Ministry of EducationNanjing211189China Purple Mountain Laboratories Nanjing211111China
As an essential function of encrypted Internet traffic analysis,encrypted traffic service classification can support both coarse-grained network service traffic management and security ***,the traditional plaintext-ba... 详细信息
来源: 评论
Multi-loss joint cross-modal pedestrian re-identification method fused with grayscale and RGA  6
Multi-loss joint cross-modal pedestrian re-identification me...
收藏 引用
6th International Conference on Electronic information Technology and computer Engineering, EITCE 2022
作者: Yuan, Ruichao Hu, Xiaoguang Dong, Anyang Cai, Nengbin School of information and network security People's Public Security University of China Beijing China School of investigation School of information and network security People's Public Security University of China Beijing China Shanghai Key Laboratory of Crime Scene Evidence Shanghai China
Cross-modal pedestrian re-identification is to match the color image and infrared image of the pedestrian to determine whether there is the same pedestrian. The images have large inter-modal differences and large intr... 详细信息
来源: 评论
Enhancing Power System Stability Against DoS Attacks Through Hardware-in-the-Loop Simulation  16
Enhancing Power System Stability Against DoS Attacks Through...
收藏 引用
16th IEEE PES Asia-Pacific Power and Energy Engineering Conference, APPEEC 2024
作者: Tao, Jiaye Liang, Zhihong Wei, Lipeng Hong, Chao Fu, Yun Yang, Yiwei Zhou, Zeyuan Chen, Lin Information Centre Guizhou Power Grid Co. Guizhou China Electric Power Research Institute China Southern Power Grid Guangdong Provincial Key Laboratory of Power System Network Security Guangzhou China
This study explores the stability and security of power systems in the face of Denial of Service (DoS) attacks through Hardware-in-the-Loop (HiL) simulation technology. As the application of Distributed Energy Resourc... 详细信息
来源: 评论
SR-AFU: super-resolution network using adaptive frequency component upsampling and multi-resolution features
收藏 引用
Frontiers of computer Science 2023年 第1期17卷 123-132页
作者: Ke-Jia CHEN Mingyu WU Yibo ZHANG Zhiwei CHEN School of Computer Science Nanjing University of Posts and TelecommunicationsNanjing 210023China Jiangsu Key Laboratory of Big Data Security&Intelligent Processing Nanjing University of Posts and TelecommunicationsNanjing 210023China College of Telecommunications and Information Engineering Nanjing University of Posts and TelecommunicationsNanjing 210003China
Image super-resolution (SR) is one of the classic computer vision tasks. This paper proposes a super-resolution network based on adaptive frequency component upsampling, named SR-AFU. The network is composed of multip... 详细信息
来源: 评论
Switched Event-Triggering Secondary Frequency Control of Power Systems Considering Wind and Solar Stochastics Under Denial of Service Attack  16
Switched Event-Triggering Secondary Frequency Control of Pow...
收藏 引用
16th IEEE PES Asia-Pacific Power and Energy Engineering Conference, APPEEC 2024
作者: Hong, Chao Fu, Yun Chen, Lin Tao, Jiaye Liang, Zhihong Wei, Lipeng Yang, Yiwei Ban, Qiucheng Wu, Shutan Electric Power Research Institute China Southern Power Grid Guangdong Provincial Key Laboratory of Power System Network Security Guangdong China Information Centr Guizhou Power Grid Co. Guizhou China
This paper addresses the stochastic nature of wind and photovoltaic power generation, along with the increasing threat of denial of service (DoS) attacks on power systems. To counteract the growing incidence of DoS at... 详细信息
来源: 评论
Secrecy Communication for Wireless-Powered Cooperative NOMA Systems With a Friendly Jammer
Secrecy Communication for Wireless-Powered Cooperative NOMA ...
收藏 引用
2022 IEEE GLOBECOM Workshops, GC Wkshps 2022
作者: Ren, Yuan Zhang, Xuewei Long, Pinyi Wang, Junxuan Lu, Guangyue Xi'an University of Posts and Telecommunications Shaanxi Key Laboratory of Information Communication Network and Security School of Communications and Information Engineering Xi'an710121 China
In this paper, we investigate the physical layer security of wireless-powered cooperative non-orthogonal multiple access (NOMA) systems with an energy harvesting (EH) friendly jammer. In particular, the eavesdropper i... 详细信息
来源: 评论
Adaptive Group Personalization for Federated Mutual Transfer Learning  41
Adaptive Group Personalization for Federated Mutual Transfer...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Xu, Haoqing Shen, Dian Wang, Meng Wang, Beilun School of Computer Science and Engineering Southeast University Nanjing210096 China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education China College of Design and Innovation Tongji University Shanghai China
Mutual transfer learning aims to improve prediction with knowledge from related domains. Recently, federated learning is applied in this field to address the communication and privacy concerns. However, previous clust... 详细信息
来源: 评论
Collision Detection and Load Estimation for Massive Random Access in Satellite-Based Internet of Things: A Deep Learning Approach
Collision Detection and Load Estimation for Massive Random A...
收藏 引用
2024 IEEE Global Communications Conference, GLOBECOM 2024
作者: Zhen, Li Li, Mingyang He, Yuxuan Su, Jingrui Yu, Keping Rodrigues, Joel J. P. C. Xi'an University of Posts and Telecommunications Shaanxi Key Laboratory of Information Communication Network and Security Xi'an China Hosei University Graduate School of Science and Engineering Tokyo Japan Amazonas State University AM Manaus Brazil
Satellite communications have been regarded as a promising solution to be incorporated in future Internet of Things (IoT) to support continuous and ubiquitous connectivity services. Constrained by limited contention r... 详细信息
来源: 评论