咨询与建议

限定检索结果

文献类型

  • 4,506 篇 会议
  • 3,387 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,901 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,299 篇 工学
    • 3,983 篇 计算机科学与技术...
    • 3,164 篇 软件工程
    • 1,348 篇 信息与通信工程
    • 653 篇 电气工程
    • 561 篇 控制科学与工程
    • 523 篇 电子科学与技术(可...
    • 449 篇 网络空间安全
    • 440 篇 生物工程
    • 301 篇 机械工程
    • 233 篇 光学工程
    • 224 篇 仪器科学与技术
    • 188 篇 生物医学工程(可授...
    • 165 篇 安全科学与工程
    • 151 篇 动力工程及工程热...
    • 148 篇 化学工程与技术
    • 127 篇 交通运输工程
    • 126 篇 建筑学
  • 2,310 篇 理学
    • 1,377 篇 数学
    • 504 篇 物理学
    • 479 篇 生物学
    • 428 篇 统计学(可授理学、...
    • 206 篇 系统科学
    • 166 篇 化学
  • 1,338 篇 管理学
    • 818 篇 管理科学与工程(可...
    • 576 篇 图书情报与档案管...
    • 297 篇 工商管理
  • 289 篇 法学
    • 168 篇 社会学
    • 119 篇 法学
  • 154 篇 医学
    • 127 篇 临床医学
  • 116 篇 经济学
    • 116 篇 应用经济学
  • 99 篇 军事学
  • 55 篇 农学
  • 46 篇 教育学
  • 24 篇 文学
  • 23 篇 艺术学

主题

  • 238 篇 feature extracti...
  • 229 篇 semantics
  • 216 篇 cryptography
  • 184 篇 authentication
  • 181 篇 information secu...
  • 163 篇 computational mo...
  • 158 篇 security
  • 152 篇 protocols
  • 144 篇 accuracy
  • 141 篇 deep learning
  • 138 篇 privacy
  • 122 篇 laboratories
  • 121 篇 training
  • 103 篇 data models
  • 100 篇 federated learni...
  • 99 篇 cloud computing
  • 94 篇 servers
  • 92 篇 public key crypt...
  • 92 篇 blockchain
  • 89 篇 data privacy

机构

  • 204 篇 shandong provinc...
  • 178 篇 key laboratory o...
  • 164 篇 school of comput...
  • 152 篇 state key labora...
  • 113 篇 school of comput...
  • 111 篇 school of cyber ...
  • 106 篇 department of co...
  • 98 篇 information secu...
  • 83 篇 key laboratory o...
  • 81 篇 institute of inf...
  • 69 篇 guangdong provin...
  • 68 篇 computer network...
  • 66 篇 university of ch...
  • 64 篇 college of mathe...
  • 64 篇 state grid key l...
  • 63 篇 peng cheng labor...
  • 60 篇 key laboratory o...
  • 59 篇 school of softwa...
  • 56 篇 school of comput...
  • 54 篇 key laboratory o...

作者

  • 55 篇 jianfeng ma
  • 53 篇 yang yang
  • 49 篇 ma jianfeng
  • 45 篇 yixian yang
  • 43 篇 ding yong
  • 41 篇 zheng wei-shi
  • 38 篇 huang qingming
  • 31 篇 cong runmin
  • 31 篇 wang wei
  • 31 篇 hu yupu
  • 31 篇 yang yixian
  • 30 篇 zhang huanguo
  • 30 篇 xu an wang
  • 29 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 26 篇 min-ling zhang
  • 24 篇 liu xin
  • 24 篇 xinhong hei
  • 24 篇 xie xiaohua

语言

  • 7,143 篇 英文
  • 499 篇 其他
  • 278 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Computer Network and Information Security"
7901 条 记 录,以下是591-600 订阅
排序:
Cross-chain Transaction Tracking Protocol based on Multi-dimensional Digital Watermarking Fingerprints
Cross-chain Transaction Tracking Protocol based on Multi-dim...
收藏 引用
Frontiers Technology of information and computer (ICFTIC), IEEE International Conference on
作者: Duanzhen Li Shujiang Xu Haochen He Hongrui Xue Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan PR China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan PR China
Cross-chain technology plays a critical role in the process of interconnecting blockchains. However, all attention has been focused on how to achieve efficient cross-chain interoperability protocols, thus neglecting t... 详细信息
来源: 评论
LateBA: Latent Backdoor Attack on Deep Bug Search via Infrequent Execution Codes  15
LateBA: Latent Backdoor Attack on Deep Bug Search via Infreq...
收藏 引用
15th Asia-Pacific Symposium on Internetware, Internetware 2024
作者: Yi, Xiaoyu Li, Gaolei Huang, Wenkai Lin, Xi Li, Jianhua Liu, Yuchen The School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University Shanghai Key Laboratory of Integrated Administration Technologies for Information Security Shanghai Shanghai China The Department of Computer Science North Carolina State University Raleigh United States
Backdoor attacks can mislead deep bug search models by exploring model-sensitive assembly code, which can change alerts to benign results and cause buggy binaries to enter production environments. But assembly instruc... 详细信息
来源: 评论
Large-Scale Model Meets Federated Learning:A Hierarchical Hybrid Distributed Training Mechanism for Intelligent Intersection Large-Scale Model
收藏 引用
Big Data Mining and Analytics 2024年 第4期7卷 1031-1049页
作者: Chang Liu Shaoyong Guo Fangfang Dang Xuesong Qiu Sujie Shao State Key Laboratory of Networking and Switching Technology Beijing University of Posts and TelecommunicationsBeijing 100876China Network Security Center State Grid Henan Electric Power Company Information Communication BranchZhengzhou 450052China
The large-scale model(LSM)can handle large-scale data and complex problems,effectively improving the intelligence level of urban ***,the traffic conditions at intersections are becoming increasingly complex,so the int... 详细信息
来源: 评论
Highway Gates Dynamic Adaptation network For Knowledge Graph Entity Alignment  21st
Highway Gates Dynamic Adaptation Network For Knowledge Graph...
收藏 引用
21st Pacific Rim International Conference on Artificial Intelligence, PRICAI 2024
作者: Yusuf, Nursharbat Yilahun, Hankiz Imam, Seyyare Hamdulla, Askar School of Computer Science and Technology Xinjiang University Urumqi830017 China Xinjiang Key Laboratory of Multilingual Information Technology Urumqi830017 China School of National Security Studies Xinjiang University Urumqi830017 China
The Entity alignment aims to align entities across different Knowledge Graphs and plays an important role in knowledge fusion tasks. In recent years, existing methods have typically used multiple aspects of informatio... 详细信息
来源: 评论
Docker-based security protection system for container applications
Docker-based security protection system for container applic...
收藏 引用
2023 International Conference on computer network security and Software Engineering, CNSSE 2023
作者: Wang, Chen Zhu, Sheng Li, Weiwei State Grid Smart Grid Research Institute co. Ltd. Nanjing210003 China State Grid Key Laboratory of Information & Network Security Nanjing210003 China
At present, smart grid information platforms mostly use containers to realize the miniaturization deployment of power services. However, containers interact frequently with the outside world, their performance is frag... 详细信息
来源: 评论
Don’t Forget Pairing-Friendly Curves with Odd Prime Embedding Degrees
IACR Transactions on Cryptographic Hardware and Embedded Sys...
收藏 引用
IACR Transactions on Cryptographic Hardware and Embedded Systems 2023年 第4期2023卷 393-419页
作者: Dai, Yu Zhang, Fangguo Zhao, Chang-An School of Mathematics Wuhan University Wuhan China School of Mathematics Sun Yat-sen University Guangzhou China School of Computer Science and Engineering Sun Yat-sen University Guangzhou China Guangdong Key Laboratory of Information Security Guangzhou China
Pairing-friendly curves with odd prime embedding degrees at the 128bit security level, such as BW13-310 and BW19-286, sparked interest in the field of public-key cryptography as small sizes of the prime fields. Howeve... 详细信息
来源: 评论
FPPNet: Fast Privacy-Preserving Neural network via Three-Party Arithmetic Secret Sharing  15th
FPPNet: Fast Privacy-Preserving Neural Network via Three-Pa...
收藏 引用
15th EAI International Conference on Mobile Multimedia Communications, MobiMedia 2022
作者: Bi, Renwan Xiong, Jinbo Li, Qi Liu, Ximeng Tian, Youliang Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fujian Normal University Fuzhou350117 China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210023 China Key Laboratory of Cryptography of Zhejiang Province Hangzhou Normal University Hangzhou311121 China Key Laboratory of Information Security of Network Systems College of Mathematics and Computer Science Fuzhou University Fuzhou350108 China State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang550025 China
Jointing multi-source data for model training can improve the accuracy of neural network. To solve the raising privacy concerns caused by data sharing, data are generally encrypted and outsourced to a group of cloud s... 详细信息
来源: 评论
Resource Allocation and Trajectories Design for UAV-Assisted Jamming Cognitive UAV networks
收藏 引用
China Communications 2022年 第5期19卷 206-217页
作者: Zhenhui Tao Fuhui Zhou Yuhao Wang Xiaodong Liu Qihui Wu School of Information Engineering Nanchang UniversityNanchang 330031China College of Electronic and Information Engineering Nanjing University of Aeronautics and AstronauticsNanjing 210000China Shanxi Key Laboratory of Information Communication Network and Security Xi’an University of Posts and TelecommunicationXi’an 710121China School of Electronic Information Wuhan UniversityWuhan 430072China
Unmanned aerial vehicle(UAV)communications are subject to the severe spectrum scarcity *** UAV networks are promising to tackle this issue while the confidential information is susceptible to be eavesdropped.A UAV jam... 详细信息
来源: 评论
Research on liquid crystal display technology based on regional dynamic dimming algorithm  9
Research on liquid crystal display technology based on regio...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Yu, Zhitao Sun, Peng Zhou, Mingle Liu, Qianlong Zhao, Shilong Hisense Video Technology Co. Ltd. Qing Dao China Hisense Visual Technology Co. Ltd. Qing Dao China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
In vehicle liquid crystal display (LCD) technology has attracted much attention for its wide range of applications in automotive infotainment systems. However, conventional LCD technologies have limitations in terms o... 详细信息
来源: 评论
Document-Level Relation Extraction Model Based on Boundary Distance Loss and Long-Tail Relation Enhancement  21st
Document-Level Relation Extraction Model Based on Boundary D...
收藏 引用
21st Pacific Rim International Conference on Artificial Intelligence, PRICAI 2024
作者: Liu, Xin Yilahun, Hankiz Imam, Seyyare Hamdulla, Askar School of Computer Science and Technology Xinjiang University Urumqi830017 China Xinjiang Key Laboratory of Multilingual Information Technology Urumqi830017 China School of National Security Studies Xinjiang University Urumqi830017 China
In today’s data-driven era, deriving meaningful insights from documents poses a considerable challenge. The task of Document-level Relation Extraction (DocRE) seeks to discern relationships among multiple entities wi... 详细信息
来源: 评论