咨询与建议

限定检索结果

文献类型

  • 4,423 篇 会议
  • 3,347 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,778 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,213 篇 工学
    • 3,929 篇 计算机科学与技术...
    • 3,141 篇 软件工程
    • 1,329 篇 信息与通信工程
    • 657 篇 电气工程
    • 545 篇 控制科学与工程
    • 526 篇 电子科学与技术(可...
    • 443 篇 网络空间安全
    • 439 篇 生物工程
    • 300 篇 机械工程
    • 223 篇 仪器科学与技术
    • 222 篇 光学工程
    • 189 篇 生物医学工程(可授...
    • 164 篇 安全科学与工程
    • 148 篇 动力工程及工程热...
    • 143 篇 化学工程与技术
    • 128 篇 交通运输工程
    • 125 篇 建筑学
  • 2,278 篇 理学
    • 1,364 篇 数学
    • 498 篇 物理学
    • 473 篇 生物学
    • 427 篇 统计学(可授理学、...
    • 208 篇 系统科学
    • 163 篇 化学
  • 1,326 篇 管理学
    • 806 篇 管理科学与工程(可...
    • 577 篇 图书情报与档案管...
    • 287 篇 工商管理
  • 287 篇 法学
    • 167 篇 社会学
    • 118 篇 法学
  • 158 篇 医学
    • 130 篇 临床医学
  • 117 篇 经济学
    • 117 篇 应用经济学
  • 98 篇 军事学
  • 54 篇 农学
  • 46 篇 教育学
  • 24 篇 文学
  • 22 篇 艺术学

主题

  • 237 篇 feature extracti...
  • 230 篇 semantics
  • 218 篇 cryptography
  • 182 篇 authentication
  • 181 篇 information secu...
  • 162 篇 computational mo...
  • 157 篇 security
  • 153 篇 protocols
  • 141 篇 accuracy
  • 137 篇 privacy
  • 136 篇 deep learning
  • 126 篇 training
  • 122 篇 laboratories
  • 105 篇 data models
  • 99 篇 cloud computing
  • 96 篇 federated learni...
  • 95 篇 servers
  • 91 篇 public key crypt...
  • 91 篇 blockchain
  • 89 篇 network security

机构

  • 202 篇 shandong provinc...
  • 182 篇 key laboratory o...
  • 157 篇 school of comput...
  • 152 篇 state key labora...
  • 121 篇 school of comput...
  • 106 篇 school of cyber ...
  • 105 篇 department of co...
  • 99 篇 information secu...
  • 80 篇 key laboratory o...
  • 78 篇 institute of inf...
  • 72 篇 guangdong provin...
  • 67 篇 state grid key l...
  • 65 篇 university of ch...
  • 65 篇 college of mathe...
  • 64 篇 computer network...
  • 62 篇 peng cheng labor...
  • 60 篇 key laboratory o...
  • 60 篇 school of softwa...
  • 59 篇 school of comput...
  • 59 篇 key laboratory o...

作者

  • 55 篇 jianfeng ma
  • 53 篇 yang yang
  • 50 篇 ma jianfeng
  • 44 篇 yixian yang
  • 41 篇 zheng wei-shi
  • 41 篇 ding yong
  • 38 篇 huang qingming
  • 34 篇 hu yupu
  • 34 篇 yang yixian
  • 33 篇 zhang huanguo
  • 32 篇 wang wei
  • 31 篇 cong runmin
  • 29 篇 xu an wang
  • 29 篇 wang bin
  • 28 篇 xu li
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 26 篇 xie xiaohua
  • 23 篇 yong ding
  • 23 篇 xinhong hei

语言

  • 7,170 篇 英文
  • 346 篇 其他
  • 275 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Computer Network and Information Security"
7778 条 记 录,以下是51-60 订阅
排序:
Density Peak Clustering Algorithm Based on Data Field Theory and Grid Similarity
收藏 引用
Journal of computer Science and Technology 2025年 第2期40卷 301-321页
作者: Yu, Qing-Ying Shi, Ge-Ge Xu, Dong-Sheng Wang, Wen-Kai Chen, Chuan-Ming Luo, Yong-Long School of Computer and Information Anhui Normal University Wuhu241002 China Anhui Provincial Key Laboratory of Network and Information Security Wuhu241002 China
The density peak clustering algorithm can rapidly identify cluster centers by drawing decision graphs without any prior knowledge;however, when multiple density peaks are present in one cluster of the dataset, the clu... 详细信息
来源: 评论
Enhancing Parameter-Efficient Transformers with Contrastive Syntax and Regularized Dropout for Neural Machine Translation  21st
Enhancing Parameter-Efficient Transformers with Contrastive...
收藏 引用
21st Pacific Rim International Conference on Artificial Intelligence, PRICAI 2024
作者: Fan, Yunlong Yang, Zhiheng Li, Baixuan Gao, Zhiqiang School of Computer Science and Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Nanjing China
Transformers have significantly improved Neural Machine Translation (NMT) models, accompanied by the inherent space complexity of O(n2). While recent approaches aim to be parameter-efficient, they often exhibit limite... 详细信息
来源: 评论
Random Staircase Generator Matrix Codes: Coding Theorem, Performance Analysis, and Code Design
收藏 引用
IEEE Transactions on information Theory 2025年 第5期71卷 3497-3509页
作者: Wang, Qianfan Wang, Yiwen Wang, Yixin Liang, Jifan Ma, Xiao Sun Yat-sen University School of Computer Science Engineering and Guangdong Key Laboratory of Information Security Technology Guangzhou510006 China Sun Yat-sen University School of Systems Science and Engineering Guangzhou510006 China
In this paper, we present a class of codes, referred to as random staircase generator matrix codes (SGMCs), which have staircase-like generator matrices. In the infinite-length region, we prove that the random SGMC is... 详细信息
来源: 评论
DSDIR: A Two-Stage Method for Addressing Noisy Long-Tailed Problems in Malicious Traffic Detection
DSDIR: A Two-Stage Method for Addressing Noisy Long-Tailed P...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Li, Guoliang Zhang, Ruiqi Sun, Zhe Xing, Lingkai Zhang, Yu College of Cyber Science Nankai University Tianjin China College of Computer Science Nankai University Tianjin China Tianjin Key Laboratory of Network and Data Security Technology Tianjin China Key Laboratory of Data and Intelligent System Security Ministry of Education Tianjin China
In recent years, deep learning based malicious traffic detection (MTD) systems have demonstrated remarkable success. However, their effectiveness tend to decrease because most malicious traffic datasets are suffered f... 详细信息
来源: 评论
FirmPorter: Porting RTOSes at the Binary Level for Firmware Re-hosting  26th
FirmPorter: Porting RTOSes at the Binary Level for Firmwa...
收藏 引用
26th International Conference on information and Communications security, ICICS 2024
作者: Xin, Mingfeng Wen, Hui Deng, Liting Li, Hong Li, Qiang Sun, Limin Beijing Key Laboratory of IOT Information Security Technology Institute of Information Engineering CAS Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China School of Computer and Information Technology Beijing Jiaotong University Beijing China
The rapid growth of the Industrial Internet of Things (IIoT) has brought real-time operating system (RTOS) into focus as major targets for both security analysts and malicious adversaries. Due to the non-standard hard... 详细信息
来源: 评论
Secure Similar Adjacent Vertex Query on Sparse Graph Data in Cloud Environment  8th
Secure Similar Adjacent Vertex Query on Sparse Graph Data i...
收藏 引用
8th International Congress on Edge Computing, EDGE 2024, Held as Part of the Services Conference Federation, SCF 2024
作者: Tian, Yun Wu, Bin Shi, Jiaoli Zhang, Caicai Xu, Du School of Computer and Big Data Science Jiujiang University Jiujiang332005 China Jiujiang Key Laboratory of Network and Information Security Jiujiang332005 China School of Modern Information Technology Zhejiang Polytechnic University of Mechanical and Electrical Engineering Hangzhou310053 China
The development of cloud computing and the widespread application of cloud services have made outsourcing services more convenient. The need for individuals and businesses to store and manipulate the graph data they g... 详细信息
来源: 评论
EPI-Mamba: State Space Model for Semantic Segmentation from Light Fields
EPI-Mamba: State Space Model for Semantic Segmentation from ...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Li, Yan Chen, Jianan Wang, Qiong Xu, Jinshan College of Computer Science & Technology Zhejiang University of Technology Hangzhou China Guangdong Provincial Key Laboratory of Intelligent Information Processing Shenzhen Key Laboratory of Media Security Shenzhen University Shenzhen China
Global contextual dependency is of significance for semantic segmentation from light fields. However, previous works mostly exploit attention mechanisms to model spatial context dependency and angular context dependen... 详细信息
来源: 评论
A Code-Based ISE to Protect Boolean Masking in Software
IACR Transactions on Cryptographic Hardware and Embedded Sys...
收藏 引用
IACR Transactions on Cryptographic Hardware and Embedded Systems 2025年 第2期2025卷 293-332页
作者: Tian, Qi Cheng, Hao Guo, Chun Page, Daniel Wang, Meiqin Wang, Weijia School of Cyber Science and Technology Shandong University Qingdao China Quan Cheng Laboratory Jinan China Key Laboratory of Cryptologic Technology and Information Security Ministry of Education Shandong University Qingdao China School of Computer Science University of Bristol Bristol United Kingdom
Side-Channel Attacks (SCAs) pose a significant threat to data security in embedded environments. To counteract the power-based SCAs, masking is a widely used defense technique, that introduces randomness to obscure th... 详细信息
来源: 评论
ICCG:low-cost and efficient consistency with adaptive synchronization for metadata replication
收藏 引用
Frontiers of computer Science 2025年 第1期19卷 53-70页
作者: Chenhao ZHANG Liang WANG Jing SHANG Zhiwen XIAO Limin XIAO Meng HAN Bing WEI Runnan SHEN Jinquan WANG State Key Laboratory of Software Development Environment Beihang UniversityBeijing 100191China School of Computer Science and Engineering Beihang UniversityBeijing 100191China School of Cyberspace Security Hainan UniversityHaikou 570228China China Mobile Information Technology Center Beijing 100033China
The rapid growth in the storage scale of wide-area distributed file systems (DFS) calls for fast and scalable metadata management. Metadata replication is the widely used technique for improving the performance and sc... 详细信息
来源: 评论
FedFLD: Heterogeneous Federated Learning via Forget-Less Distillation
FedFLD: Heterogeneous Federated Learning via Forget-Less Dis...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Yi, Xiaoyang Zhang, Jian Chen, Jing Bao, Yuru Xing, Lingkai College of Cyber Science Nankai University China College of Computer Science Nankai University China Tianjin Key Laboratory of Network and Data Security Technology Tianjin China
Federated learning, as a distributed machine learning paradigm, enhances privacy protection but faces the challenge of heterogeneity. Data-free knowledge distillation (DFKD) methods attempt to overcome this challenge ... 详细信息
来源: 评论