咨询与建议

限定检索结果

文献类型

  • 4,554 篇 会议
  • 3,369 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,931 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,258 篇 工学
    • 3,946 篇 计算机科学与技术...
    • 3,125 篇 软件工程
    • 1,325 篇 信息与通信工程
    • 641 篇 电气工程
    • 556 篇 控制科学与工程
    • 522 篇 电子科学与技术(可...
    • 445 篇 网络空间安全
    • 440 篇 生物工程
    • 301 篇 机械工程
    • 226 篇 光学工程
    • 225 篇 仪器科学与技术
    • 187 篇 生物医学工程(可授...
    • 165 篇 安全科学与工程
    • 151 篇 动力工程及工程热...
    • 147 篇 化学工程与技术
    • 126 篇 交通运输工程
    • 125 篇 建筑学
  • 2,286 篇 理学
    • 1,359 篇 数学
    • 504 篇 物理学
    • 477 篇 生物学
    • 418 篇 统计学(可授理学、...
    • 205 篇 系统科学
    • 166 篇 化学
  • 1,324 篇 管理学
    • 810 篇 管理科学与工程(可...
    • 567 篇 图书情报与档案管...
    • 294 篇 工商管理
  • 286 篇 法学
    • 169 篇 社会学
    • 115 篇 法学
  • 151 篇 医学
    • 125 篇 临床医学
  • 115 篇 经济学
    • 115 篇 应用经济学
  • 98 篇 军事学
  • 55 篇 农学
  • 46 篇 教育学
  • 24 篇 文学
  • 23 篇 艺术学

主题

  • 255 篇 feature extracti...
  • 233 篇 semantics
  • 212 篇 cryptography
  • 187 篇 authentication
  • 180 篇 information secu...
  • 177 篇 computational mo...
  • 166 篇 accuracy
  • 164 篇 security
  • 155 篇 protocols
  • 141 篇 deep learning
  • 141 篇 privacy
  • 133 篇 training
  • 126 篇 federated learni...
  • 122 篇 laboratories
  • 109 篇 data models
  • 101 篇 cloud computing
  • 98 篇 servers
  • 93 篇 data privacy
  • 93 篇 blockchain
  • 91 篇 public key crypt...

机构

  • 215 篇 key laboratory o...
  • 207 篇 shandong provinc...
  • 160 篇 school of comput...
  • 152 篇 state key labora...
  • 116 篇 school of cyber ...
  • 116 篇 school of comput...
  • 106 篇 department of co...
  • 99 篇 information secu...
  • 85 篇 key laboratory o...
  • 83 篇 institute of inf...
  • 71 篇 guangdong provin...
  • 67 篇 computer network...
  • 67 篇 university of ch...
  • 64 篇 college of mathe...
  • 64 篇 peng cheng labor...
  • 63 篇 state grid key l...
  • 60 篇 school of softwa...
  • 58 篇 school of comput...
  • 56 篇 shandong provinc...
  • 54 篇 key laboratory o...

作者

  • 56 篇 jianfeng ma
  • 53 篇 yang yang
  • 45 篇 ma jianfeng
  • 45 篇 yixian yang
  • 42 篇 ding yong
  • 41 篇 zheng wei-shi
  • 39 篇 huang qingming
  • 31 篇 cong runmin
  • 31 篇 wang wei
  • 31 篇 xu an wang
  • 31 篇 hu yupu
  • 31 篇 yang yixian
  • 30 篇 zhang huanguo
  • 28 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 27 篇 xiaoming wu
  • 26 篇 min-ling zhang
  • 24 篇 liu xin
  • 24 篇 xinhong hei

语言

  • 6,839 篇 英文
  • 863 篇 其他
  • 257 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Computer Network and Information Security"
7931 条 记 录,以下是611-620 订阅
排序:
Software Defined security Flow Scheduling Method Based on PSO Algorithm  4
Software Defined Security Flow Scheduling Method Based on PS...
收藏 引用
2023 4th International Conference on Electrical, Electronic information and Communication Engineering, EEICE 2023
作者: Zhu, Sheng Li, Weiwei Zhou, Cheng State Grid Smart Grid Research Institute Co. Ltd. Nanjing210003 China State Grid Key Laboratory of Information & Network Security Nanjing210003 China
To solve the problem of link load imbalance and bandwidth waste in software defined security, a secure traffic scheduling method based on particle swarm optimization is proposed in this paper. This method combines the... 详细信息
来源: 评论
MedX-Net: Hierarchical Transformer with Large Kernel Convolutions for 3D Medical Image Segmentation
MedX-Net: Hierarchical Transformer with Large Kernel Convolu...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Lu, Lin Zou, Qingzhi Key Laboratory of Computing Power Network and Information Se-curity Ministry of Education Shandong Computer Science Center Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Due to the exceptional performance of Transform-ers in 2D medical image segmentation, recent work has also introduced them into 3D medical segmentation tasks. For instance, Swin UNETR and other hierarchical Transforme... 详细信息
来源: 评论
A verifiable privacy-preserving data collection scheme supporting multi-party computation in fog-based smart grid
收藏 引用
Frontiers of computer Science 2022年 第1期16卷 143-153页
作者: Zhusen LIU Zhenfu CAO Xiaolei DONG Xiaopeng ZHAO Haiyong BAO Jiachen SHEN Shanghai Key Laboratory of Trustworthy Computing East China Normal UniversityShanghai200062China Cyberspace Security Research Center Peng Cheng LaboratoryShenzhen518055China School of Computer Science and Information Engineering Zhejiang Gongshang UniversityHangzhou310018China
Incorporation of fog computing with low latency,preprocession(e.g.,data aggregation)and location awareness,can facilitate fine-grained collection of smart metering data in smart grid and promotes the sustainability an... 详细信息
来源: 评论
An Efficient and Privacy-Preserving Data Aggregation Scheme Supporting Arbitrary Statistical Functions in IoT
收藏 引用
China Communications 2022年 第6期19卷 91-104页
作者: Haihui Liu Jianwei Chen Liwei Lin Ayong Ye Chuan Huang College of Computer and Cyber Security Fujian Normal UniversityFuzhou 350117China Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Normal UniversityFuzhou 350117China School of Computer Science and Mathematics Fujian University of TechnologyFuzhou 350118China Digital Fujian Institute of Big Data Security Technology Fujian Normal UniversityFuzhou 350117China
The Internet of Things(IoT)has profoundly impacted our lives and has greatly revolutionized our *** terminal devices in an IoT data aggregation application sense real-time data for the remote cloud server to achieve i... 详细信息
来源: 评论
Dual Fusion network for Hyperspectral Semantic Segmentation  12th
Dual Fusion Network for Hyperspectral Semantic Segmentation
收藏 引用
12th International Conference on Image and Graphics, ICIG 2023
作者: Ding, Xuan Gu, Shuo Yang, Jian PCA Laboratory Key Laboratory of Intelligent Perception and Systems for High-Dimensional Information of Ministry of Education Jiangsu Key Laboratory of Image and Video Understanding for Social Security School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing China
With the development of imaging technology, it becomes increasingly easy to obtain hyperspectral images (HSI) containing rich spectral information. The application of hyperspectral images in autonomous driving is expe... 详细信息
来源: 评论
Cross-chain Transaction Tracking Protocol based on Multi-dimensional Digital Watermarking Fingerprints
Cross-chain Transaction Tracking Protocol based on Multi-dim...
收藏 引用
Frontiers Technology of information and computer (ICFTIC), IEEE International Conference on
作者: Duanzhen Li Shujiang Xu Haochen He Hongrui Xue Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan PR China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan PR China
Cross-chain technology plays a critical role in the process of interconnecting blockchains. However, all attention has been focused on how to achieve efficient cross-chain interoperability protocols, thus neglecting t... 详细信息
来源: 评论
Research on semantics and algorithm of formal analysis tool Scyther  4
Research on semantics and algorithm of formal analysis tool ...
收藏 引用
4th IEEE International Conference on Civil Aviation Safety and information Technology, ICCASIT 2022
作者: Xi, Chen Siqi, Lu Information Engineering University School of Cyberspace Security Zhengzhou China Henan Key Laboratory of Network Cryptography Technology Zhengzhou China
Current security analysis on security protocols mainly relies on computational complexity and formalization. Based on the research of formal analysis method, this paper analyze the basic semantics, security attributes... 详细信息
来源: 评论
LateBA: Latent Backdoor Attack on Deep Bug Search via Infrequent Execution Codes  15
LateBA: Latent Backdoor Attack on Deep Bug Search via Infreq...
收藏 引用
15th Asia-Pacific Symposium on Internetware, Internetware 2024
作者: Yi, Xiaoyu Li, Gaolei Huang, Wenkai Lin, Xi Li, Jianhua Liu, Yuchen The School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University Shanghai Key Laboratory of Integrated Administration Technologies for Information Security Shanghai Shanghai China The Department of Computer Science North Carolina State University Raleigh United States
Backdoor attacks can mislead deep bug search models by exploring model-sensitive assembly code, which can change alerts to benign results and cause buggy binaries to enter production environments. But assembly instruc... 详细信息
来源: 评论
Large-Scale Model Meets Federated Learning:A Hierarchical Hybrid Distributed Training Mechanism for Intelligent Intersection Large-Scale Model
收藏 引用
Big Data Mining and Analytics 2024年 第4期7卷 1031-1049页
作者: Chang Liu Shaoyong Guo Fangfang Dang Xuesong Qiu Sujie Shao State Key Laboratory of Networking and Switching Technology Beijing University of Posts and TelecommunicationsBeijing 100876China Network Security Center State Grid Henan Electric Power Company Information Communication BranchZhengzhou 450052China
The large-scale model(LSM)can handle large-scale data and complex problems,effectively improving the intelligence level of urban ***,the traffic conditions at intersections are becoming increasingly complex,so the int... 详细信息
来源: 评论
Highway Gates Dynamic Adaptation network For Knowledge Graph Entity Alignment  21st
Highway Gates Dynamic Adaptation Network For Knowledge Graph...
收藏 引用
21st Pacific Rim International Conference on Artificial Intelligence, PRICAI 2024
作者: Yusuf, Nursharbat Yilahun, Hankiz Imam, Seyyare Hamdulla, Askar School of Computer Science and Technology Xinjiang University Urumqi830017 China Xinjiang Key Laboratory of Multilingual Information Technology Urumqi830017 China School of National Security Studies Xinjiang University Urumqi830017 China
The Entity alignment aims to align entities across different Knowledge Graphs and plays an important role in knowledge fusion tasks. In recent years, existing methods have typically used multiple aspects of informatio... 详细信息
来源: 评论