咨询与建议

限定检索结果

文献类型

  • 4,506 篇 会议
  • 3,387 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,901 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,299 篇 工学
    • 3,983 篇 计算机科学与技术...
    • 3,164 篇 软件工程
    • 1,348 篇 信息与通信工程
    • 653 篇 电气工程
    • 561 篇 控制科学与工程
    • 523 篇 电子科学与技术(可...
    • 449 篇 网络空间安全
    • 440 篇 生物工程
    • 301 篇 机械工程
    • 233 篇 光学工程
    • 224 篇 仪器科学与技术
    • 188 篇 生物医学工程(可授...
    • 165 篇 安全科学与工程
    • 151 篇 动力工程及工程热...
    • 148 篇 化学工程与技术
    • 127 篇 交通运输工程
    • 126 篇 建筑学
  • 2,310 篇 理学
    • 1,377 篇 数学
    • 504 篇 物理学
    • 479 篇 生物学
    • 428 篇 统计学(可授理学、...
    • 206 篇 系统科学
    • 166 篇 化学
  • 1,338 篇 管理学
    • 818 篇 管理科学与工程(可...
    • 576 篇 图书情报与档案管...
    • 297 篇 工商管理
  • 289 篇 法学
    • 168 篇 社会学
    • 119 篇 法学
  • 154 篇 医学
    • 127 篇 临床医学
  • 116 篇 经济学
    • 116 篇 应用经济学
  • 99 篇 军事学
  • 55 篇 农学
  • 46 篇 教育学
  • 24 篇 文学
  • 23 篇 艺术学

主题

  • 238 篇 feature extracti...
  • 229 篇 semantics
  • 216 篇 cryptography
  • 184 篇 authentication
  • 181 篇 information secu...
  • 163 篇 computational mo...
  • 158 篇 security
  • 152 篇 protocols
  • 144 篇 accuracy
  • 141 篇 deep learning
  • 138 篇 privacy
  • 122 篇 laboratories
  • 121 篇 training
  • 103 篇 data models
  • 100 篇 federated learni...
  • 99 篇 cloud computing
  • 94 篇 servers
  • 92 篇 public key crypt...
  • 92 篇 blockchain
  • 89 篇 data privacy

机构

  • 204 篇 shandong provinc...
  • 178 篇 key laboratory o...
  • 164 篇 school of comput...
  • 152 篇 state key labora...
  • 113 篇 school of comput...
  • 111 篇 school of cyber ...
  • 106 篇 department of co...
  • 98 篇 information secu...
  • 83 篇 key laboratory o...
  • 81 篇 institute of inf...
  • 69 篇 guangdong provin...
  • 68 篇 computer network...
  • 66 篇 university of ch...
  • 64 篇 college of mathe...
  • 64 篇 state grid key l...
  • 63 篇 peng cheng labor...
  • 60 篇 key laboratory o...
  • 59 篇 school of softwa...
  • 56 篇 school of comput...
  • 54 篇 key laboratory o...

作者

  • 55 篇 jianfeng ma
  • 53 篇 yang yang
  • 49 篇 ma jianfeng
  • 45 篇 yixian yang
  • 43 篇 ding yong
  • 41 篇 zheng wei-shi
  • 38 篇 huang qingming
  • 31 篇 cong runmin
  • 31 篇 wang wei
  • 31 篇 hu yupu
  • 31 篇 yang yixian
  • 30 篇 zhang huanguo
  • 30 篇 xu an wang
  • 29 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 26 篇 min-ling zhang
  • 24 篇 liu xin
  • 24 篇 xinhong hei
  • 24 篇 xie xiaohua

语言

  • 7,143 篇 英文
  • 499 篇 其他
  • 278 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Computer Network and Information Security"
7901 条 记 录,以下是551-560 订阅
排序:
A Dynamic Multi-Attribute Resource Bidding Mechanism with Privacy Protection in Edge Computing
收藏 引用
computers, Materials & Continua 2023年 第4期75卷 373-391页
作者: Shujuan Tian Wenjian Ding Gang Liu Yuxia Sun Saiqin Long Jiang Zhu Xiangtan University Xiangtan411105China Key Laboratory of Hunan Province for Internet of Things and Information Security Xiangtan411105China Hunan International Scientific and Technological Cooperation Base of Intelligent Network Xiangtan411105China Hunan University Changsha410082China Jinan University Guangzhou510632China
In edge computing,a reasonable edge resource bidding mechanism can enable edge providers and users to obtain benefits in a relatively fair *** maximize such benefits,this paper proposes a dynamic multiattribute resour... 详细信息
来源: 评论
Fine-Grained Software Vulnerability Detection via Neural Architecture Search  28th
Fine-Grained Software Vulnerability Detection via Neural Ar...
收藏 引用
28th International Conference on Database Systems for Advanced Applications, DASFAA 2023
作者: Du, Qianjin Kuang, Xiaohui Li, Xiang Zhao, Gang The Department of Computer Science and Technology Tsinghua University Beijing100084 China National Key Laboratory of Science and Technology on Information System Security Beijing100084 China
Vulnerability detection methods based on the deep learning have achieved remarkable performance improvements compared to traditional methods. Current deep learning-based detectors mostly use a single RNN or its varian... 详细信息
来源: 评论
Efficient privacy-preserving federated learning under dishonest-majority setting
收藏 引用
Science China(information Sciences) 2024年 第5期67卷 323-324页
作者: Yinbin MIAO Da KUANG Xinghua LI Tao LENG Ximeng LIU Jianfeng MA School of Cyber Engineering Xidian University Intelligent Policing Key Laboratory of Sichuan Province Sichuan Police College Institute of Information Engineering Chinese Academy of Sciences School of Cyber Security University of Chinese Academy of Sciences Key Laboratory of Information Security of Network Systems Fuzhou University
Federated learning(FL) is an emerging distributed learning paradigm that solves the problem of isolated data by jointly learning the global model through distributed ***, recent studies have shown that FL may not alwa... 详细信息
来源: 评论
DCCT-Net: A network Combined Dynamic CNN and Transformer for Image Compressive Sensing
DCCT-Net: A Network Combined Dynamic CNN and Transformer for...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Lijuan Xu Haixiao Mei Fenghua Tong Dawei Zhao Fuqiang Yu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
Recent end-to-end image compressive sensing networks primarily use Convolutional Neural networks (CNNs) and Transformers, each with distinct limitations: CNNs struggle with global feature capture, while Transformers l... 详细信息
来源: 评论
IRS for The Unicast Realizable Rate Maximization in RSMA-ISAC
IRS for The Unicast Realizable Rate Maximization in RSMA-ISA...
收藏 引用
IEEE International Conference on Communications in China (ICCC)
作者: Bing Han Yang Gou Yinghui Ye Guangyue Lu Shaanxi Key Laboratory of Information Communication Network and Security Xi’an University of Posts & Telecommunications China
Integrated Sensing and Communication (ISAC) has emerged as a promising technology for the next-generation wireless networks. Given that the rate splitting multiple access (RSMA) can maximize resource utilization and t... 详细信息
来源: 评论
Joint Optimization of Compression, Transmission and Computation for Cooperative Perception Aided Intelligent Vehicular networks
收藏 引用
IEEE Transactions on Vehicular Technology 2025年 第5期74卷 8201-8214页
作者: Lu, Binbin Huang, Xumin Wu, Yuan Qian, Liping Zhou, Sheng Niyato, Dusit University of Macau State Key Laboratory of Internet of Things for Smart City Department of Computer and Information Science 999078 China Guangdong University of Technology School of Automation Guangzhou510006 China University of Macau State Key Lab of Internet of Things for Smart City 999078 China University of Macau State Key Laboratory of Internet of Things for Smart City Department of Computer Information Science 999078 China Zhuhai UM Science and Technology AQ2 Research Institute Zhuhai519301 China Zhejiang University of Technology Institute of Cyberspace Security Hangzhou310023 China Tsinghua University Beijing National Research Center for Information Science and Technology Department of Electronic Engineering Beijing100084 China Nanyang Technological University School of Computer Science and Engineering 639815 Singapore
Cooperative perception is a promising paradigm to tackle the perception limitations of a single intelligent vehicle (IV) to enhance the driving safety and efficiency in intelligent vehicular networks. However, the rea... 详细信息
来源: 评论
Voiceprint recognition model based on Ecapa-Tdnn and ResNet  5
Voiceprint recognition model based on Ecapa-Tdnn and ResNet
收藏 引用
5th International Conference on Telecommunications, Optics, and computer Science, TOCS 2024
作者: Jia, Chengjie Fei, Rong Li, Xiaomeng School of Computer Science and Engineering Xi'an University of Technology Shaanxi Xi'an710004 China Shaanxi Key Laboratory for Network Computing and Security Technology School of Computer Science and Engineering Xi'an University of Technology Shaanxi Xi'an710048 China
In recent years, with the continuous progress of deep learning neural networks and the construction of large data sets, new breakthroughs in voiceprint verification technology for voice calls have been rapidly achieve... 详细信息
来源: 评论
Quantum Remote State Preparation Based on Quantum network Coding
收藏 引用
computers, Materials & Continua 2022年 第10期73卷 119-132页
作者: Zhen-Zhen Li Zi-Chen Li Yi-Ru Sun Haseeb Ahmad Gang Xu Xiu-Bo Chen School of Information Engineering Beijing Institute of Graphic CommunicationBeijing102600China School of Computer Science and Information Engineering Zhejiang Gongshang UniversityHangzhou310018China Information Security Center State key Laboratory of Networking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijing100876China Department of Computer Science National Textile UniversityFaisalabad37610Pakistan School of Information Science and Technology North China University of TechnologyBeijing100144China Advanced Cryptography and System Security Key Laboratory of Sichuan Province China
As an innovative theory and technology,quantum network coding has become the research hotspot in quantum network *** this paper,a quantum remote state preparation scheme based on quantum network coding is *** with the... 详细信息
来源: 评论
Polynomial-Time Assignment-Based Cell Association with Generic Utility Functions
收藏 引用
China Communications 2022年 第9期19卷 214-228页
作者: Lusheng Wang Chao Fang Hai Lin Min Peng Caihong Kai Key Laboratory of Knowledge Engineering with Big Data Ministry of Education.School of Computer Science and Information EngineeringHefei University of TechnologyHefei 230601China Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education.School of Cyber Science and EngineeringWuhan UniversityWuhan 430072China
Cell association is a significant research issue in future mobile communication systems due to the unacceptably large computational time of traditional *** article proposes a polynomial-time cell association scheme wh... 详细信息
来源: 评论
An Adaptive Image Compression Algorithm Based on Deep Learning  23
An Adaptive Image Compression Algorithm Based on Deep Learni...
收藏 引用
Proceedings of the 2023 6th International Conference on Artificial Intelligence and Pattern Recognition
作者: Yanxia Liang Meng Zhao Guangyue Lu Jing Jiang Hua He Tong Jia Shaanxi Key Laboratory of Information Communication Network and Security Xi'an University of Posts and Telecommunications China
In recent years, deep artificial neural networks have received wide attention because it surpasses the effect of traditional methods by parameter fitting under the condition of data convergence. On the other hand, lim...
来源: 评论