咨询与建议

限定检索结果

文献类型

  • 4,506 篇 会议
  • 3,387 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,901 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,299 篇 工学
    • 3,983 篇 计算机科学与技术...
    • 3,164 篇 软件工程
    • 1,348 篇 信息与通信工程
    • 653 篇 电气工程
    • 561 篇 控制科学与工程
    • 523 篇 电子科学与技术(可...
    • 449 篇 网络空间安全
    • 440 篇 生物工程
    • 301 篇 机械工程
    • 233 篇 光学工程
    • 224 篇 仪器科学与技术
    • 188 篇 生物医学工程(可授...
    • 165 篇 安全科学与工程
    • 151 篇 动力工程及工程热...
    • 148 篇 化学工程与技术
    • 127 篇 交通运输工程
    • 126 篇 建筑学
  • 2,310 篇 理学
    • 1,377 篇 数学
    • 504 篇 物理学
    • 479 篇 生物学
    • 428 篇 统计学(可授理学、...
    • 206 篇 系统科学
    • 166 篇 化学
  • 1,338 篇 管理学
    • 818 篇 管理科学与工程(可...
    • 576 篇 图书情报与档案管...
    • 297 篇 工商管理
  • 289 篇 法学
    • 168 篇 社会学
    • 119 篇 法学
  • 154 篇 医学
    • 127 篇 临床医学
  • 116 篇 经济学
    • 116 篇 应用经济学
  • 99 篇 军事学
  • 55 篇 农学
  • 46 篇 教育学
  • 24 篇 文学
  • 23 篇 艺术学

主题

  • 238 篇 feature extracti...
  • 229 篇 semantics
  • 216 篇 cryptography
  • 184 篇 authentication
  • 181 篇 information secu...
  • 163 篇 computational mo...
  • 158 篇 security
  • 152 篇 protocols
  • 144 篇 accuracy
  • 141 篇 deep learning
  • 138 篇 privacy
  • 122 篇 laboratories
  • 121 篇 training
  • 103 篇 data models
  • 100 篇 federated learni...
  • 99 篇 cloud computing
  • 94 篇 servers
  • 92 篇 public key crypt...
  • 92 篇 blockchain
  • 89 篇 data privacy

机构

  • 204 篇 shandong provinc...
  • 178 篇 key laboratory o...
  • 164 篇 school of comput...
  • 152 篇 state key labora...
  • 113 篇 school of comput...
  • 111 篇 school of cyber ...
  • 106 篇 department of co...
  • 98 篇 information secu...
  • 83 篇 key laboratory o...
  • 81 篇 institute of inf...
  • 69 篇 guangdong provin...
  • 68 篇 computer network...
  • 66 篇 university of ch...
  • 64 篇 college of mathe...
  • 64 篇 state grid key l...
  • 63 篇 peng cheng labor...
  • 60 篇 key laboratory o...
  • 59 篇 school of softwa...
  • 56 篇 school of comput...
  • 54 篇 key laboratory o...

作者

  • 55 篇 jianfeng ma
  • 53 篇 yang yang
  • 49 篇 ma jianfeng
  • 45 篇 yixian yang
  • 43 篇 ding yong
  • 41 篇 zheng wei-shi
  • 38 篇 huang qingming
  • 31 篇 cong runmin
  • 31 篇 wang wei
  • 31 篇 hu yupu
  • 31 篇 yang yixian
  • 30 篇 zhang huanguo
  • 30 篇 xu an wang
  • 29 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 26 篇 min-ling zhang
  • 24 篇 liu xin
  • 24 篇 xinhong hei
  • 24 篇 xie xiaohua

语言

  • 7,143 篇 英文
  • 499 篇 其他
  • 278 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Computer Network and Information Security"
7901 条 记 录,以下是541-550 订阅
排序:
Practical asynchronous measurement-device-independent quantum key distribution with advantage distillation
收藏 引用
Physical Review A 2024年 第2期110卷 022605-022605页
作者: Di Luo Xin Liu Kaibiao Qin Zhenrong Zhang Kejin Wei Guangxi Key Laboratory for Relativistic Astrophysics School of Physical Science and Technology Guangxi Key Laboratory of Multimedia Communications and Network Technology School of Computer Electronics and Information
The advantage distillation (AD) method has proven effective in improving the performance of quantum key distribution (QKD). In this paper we introduce the AD method into a recently proposed asynchronous measurement-de... 详细信息
来源: 评论
Time Series Anomaly Detection Based on Normalized Flow and Bayesian networks  9
Time Series Anomaly Detection Based on Normalized Flow and B...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Yao, Honglei Liu, Donglan Chang, Yingxian Liu, Xin Tang, Chaofan State Grid Shandong Electric Power Research Institute Jinan China State Grid Shandong Electric Power Company Jinan China Qilu University of Technology Shandong Academy of Sciences Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China
Time series anomaly detection often faces significant challenges due to the high dimensionality, interdependence, and label sparsity of the data. Traditional methods struggle to model the intricate relationships betwe... 详细信息
来源: 评论
A Deep Learning-based Data Usability Enhancement Scheme for Differential Privacy  9
A Deep Learning-based Data Usability Enhancement Scheme for ...
收藏 引用
9th IEEE Smart World Congress, SWC 2023
作者: Yan, Haonan Li, Xiaoguang Zheng, Gewei Li, Hui Li, Fenghua Lin, Xiaodong Xidian University University of Guelph China Xidian University State Key Laboratory of Isn School of Cyber Engineering Xi'an China University of Cas State Key Laboratory of Information Security Institute of Information Engineering Cas School of Cyber Security Beijing China University of Guelph School of Computer Science Guelph Canada
While differential privacy (DP) is widely used to ensure privacy, it can also significantly reduce data accuracy. Current research attempts to improve accuracy by leveraging post-processing techniques, but these metho... 详细信息
来源: 评论
A personalized test paper generation model for English examination based on knowledge tracking  5
A personalized test paper generation model for English exami...
收藏 引用
5th International Conference on Artificial Intelligence and computer Science, AICS 2023
作者: Zhou, Ya Shao, Xiuli Huang, Guimin Guo, Qingkai Deng, Nanxiao Lin, Jianxing School of Computer Science and Information Security Guangxi Key Laboratory of Image and Graphic Intelligent Processing Guilin University of Electronic Technology Guangxi Guilin541004 China
In recent years, personalized paper grouping is a hot research topic in the field of intelligence education. In this paper, we propose an optimized deep knowledge tracking model Mul-MAKT combined with a genetic algori... 详细信息
来源: 评论
Multimodal emotion recognition based on multilevel acoustic and textual information  5
Multimodal emotion recognition based on multilevel acoustic ...
收藏 引用
5th International Conference on Artificial Intelligence and computer Science, AICS 2023
作者: Zhou, Ya Xing, Yuyi Huang, Guimin Guo, Qingkai Deng, Nanxiao School of Computer Science and Information Security Guangxi Key Laboratory of Image and Graphic Intelligent Processing Guilin University of Electronic Technology Guangxi Guilin541004 China
The study and application of multimodal emotion recognition have gained significant popularity in recent years, representing one of the challenging tasks in the field of affective computing. We propose a multimodal sp... 详细信息
来源: 评论
MAGRET: Machine-generated Text Detection with Rewritten Texts  31
MAGRET: Machine-generated Text Detection with Rewritten Text...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Huang, Yifei Cao, Jingxin Luo, Hanyu Guan, Xin Liu, Bo School of Cyber Science and Engineering Southeast University Nanjing211189 China Key Laboratory of Computer Network and Information of Ministry of Education of China Nanjing211189 China School of Computer Science and Engineering Southeast University Nanjing211189 China
With the quick advancement in text generation ability of Large Language Model(LLM), concerns about the misuse of machine-generated text(MGT) have grown, raising potential violations of legal and ethical standards. Som... 详细信息
来源: 评论
MMLN: Multi-directional and Multi-constraint Learning network for Remote Sensing Imagery Semantic Segmentation
收藏 引用
IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing 2024年 1-16页
作者: Sun, Hang Xie, Yongchang Ren, Dong Wen, Fangqing Tong, Lyuyang Chang, Laibin Hubei Key Laboratory of Intelligent Vision Based Monitoring for Hydroelectric Engineering China Three Gorges University Yichang China Institute of Vehicle Information Control and Network Technology Hubei University of Automotive Technology Shiyan China School of Computer Science Wuhan University Wuhan China
Recent advances in satellite remote sensing technology and computer technology have significantly impacted practical applications in remote sensing image segmentation. However, the prevalent hybrid segmentation models... 详细信息
来源: 评论
FairCoRe: Fairness-Aware Recommendation Through Counterfactual Representation Learning
收藏 引用
IEEE Transactions on Knowledge and Data Engineering 2025年 第7期37卷 4049-4062页
作者: Bin, Chenzhong Liu, Wenqiang Zhang, Feng Chang, Liang Gu, Tianlong Guilin University of Electronic Technology School of Computer Science and Information Security Guilin541004 China Guilin University of Electronic Technology School of Business Guilin541004 China Guilin University of Electronic Technology Guangxi Key Laboratory of Trusted Software Guilin541004 China Jinan University College of Cyber Security Engineering Research Center of Trustworthy AI Ministry of Education Guangzhou510632 China
Eliminating bias from data representations is crucial to ensure fairness in recommendation. Existing studies primarily focus on weakening the correlation between data representations and sensitive attributes, yet may ... 详细信息
来源: 评论
Blockchain-Based Ciphertext Policy-Hiding Access Control Scheme  1
收藏 引用
18th EAI International Conference on security and Privacy in Communication networks, SecureComm 2022
作者: Du, Ruizhong Zhang, Tianhe School of Cyber Security and Computer Hebei University Baoding071002 China Hebei Provincial Key Laboratory of High Credibility Information System Baoding071000 China
Ciphertext policy attribute encryption(CP-ABE) can realize one-to-many fine-grained access control, which can effectively solve the security problem of shared data. However, most existing CP-ABE protocols exhibit a si... 详细信息
来源: 评论
Cloud Data Deduplication Scheme Based on Blockchain
Cloud Data Deduplication Scheme Based on Blockchain
收藏 引用
2023 International Conference on networking and network Applications, NaNA 2023
作者: Shi, Pengliang Hao, Dongning Cyber Security and Computer Science Hebei University Key Laboratory on High Trusted Information System Baoding China International College of Hebei University Baoding China
To address the problem of untrustworthiness among entities faced in the process of data deduplication in cloud storage environment, this paper proposes a cloud data deduplication scheme based on blockchain. Firstly, t... 详细信息
来源: 评论