咨询与建议

限定检索结果

文献类型

  • 4,506 篇 会议
  • 3,387 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,901 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,299 篇 工学
    • 3,983 篇 计算机科学与技术...
    • 3,164 篇 软件工程
    • 1,348 篇 信息与通信工程
    • 653 篇 电气工程
    • 561 篇 控制科学与工程
    • 523 篇 电子科学与技术(可...
    • 449 篇 网络空间安全
    • 440 篇 生物工程
    • 301 篇 机械工程
    • 233 篇 光学工程
    • 224 篇 仪器科学与技术
    • 188 篇 生物医学工程(可授...
    • 165 篇 安全科学与工程
    • 151 篇 动力工程及工程热...
    • 148 篇 化学工程与技术
    • 127 篇 交通运输工程
    • 126 篇 建筑学
  • 2,310 篇 理学
    • 1,377 篇 数学
    • 504 篇 物理学
    • 479 篇 生物学
    • 428 篇 统计学(可授理学、...
    • 206 篇 系统科学
    • 166 篇 化学
  • 1,338 篇 管理学
    • 818 篇 管理科学与工程(可...
    • 576 篇 图书情报与档案管...
    • 297 篇 工商管理
  • 289 篇 法学
    • 168 篇 社会学
    • 119 篇 法学
  • 154 篇 医学
    • 127 篇 临床医学
  • 116 篇 经济学
    • 116 篇 应用经济学
  • 99 篇 军事学
  • 55 篇 农学
  • 46 篇 教育学
  • 24 篇 文学
  • 23 篇 艺术学

主题

  • 238 篇 feature extracti...
  • 229 篇 semantics
  • 216 篇 cryptography
  • 184 篇 authentication
  • 181 篇 information secu...
  • 163 篇 computational mo...
  • 158 篇 security
  • 152 篇 protocols
  • 144 篇 accuracy
  • 141 篇 deep learning
  • 138 篇 privacy
  • 122 篇 laboratories
  • 121 篇 training
  • 103 篇 data models
  • 100 篇 federated learni...
  • 99 篇 cloud computing
  • 94 篇 servers
  • 92 篇 public key crypt...
  • 92 篇 blockchain
  • 89 篇 data privacy

机构

  • 204 篇 shandong provinc...
  • 178 篇 key laboratory o...
  • 164 篇 school of comput...
  • 152 篇 state key labora...
  • 113 篇 school of comput...
  • 111 篇 school of cyber ...
  • 106 篇 department of co...
  • 98 篇 information secu...
  • 83 篇 key laboratory o...
  • 81 篇 institute of inf...
  • 69 篇 guangdong provin...
  • 68 篇 computer network...
  • 66 篇 university of ch...
  • 64 篇 college of mathe...
  • 64 篇 state grid key l...
  • 63 篇 peng cheng labor...
  • 60 篇 key laboratory o...
  • 59 篇 school of softwa...
  • 56 篇 school of comput...
  • 54 篇 key laboratory o...

作者

  • 55 篇 jianfeng ma
  • 53 篇 yang yang
  • 49 篇 ma jianfeng
  • 45 篇 yixian yang
  • 43 篇 ding yong
  • 41 篇 zheng wei-shi
  • 38 篇 huang qingming
  • 31 篇 cong runmin
  • 31 篇 wang wei
  • 31 篇 hu yupu
  • 31 篇 yang yixian
  • 30 篇 zhang huanguo
  • 30 篇 xu an wang
  • 29 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 26 篇 min-ling zhang
  • 24 篇 liu xin
  • 24 篇 xinhong hei
  • 24 篇 xie xiaohua

语言

  • 7,143 篇 英文
  • 499 篇 其他
  • 278 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Computer Network and Information Security"
7901 条 记 录,以下是631-640 订阅
排序:
ID-based Signcryption KEM to Multiple Recipients
收藏 引用
Chinese Journal of Electronics 2023年 第2期20卷 317-322页
作者: Yinxia Sun Hui Li Key Laboratory of Computer Networks and Information Security Ministry of Education Xidian University Xi'an China
Identity based signcryption key encapsulation mechanism (KEM) is used to encapsulate a symmetric key during the construction of hybrid signcryption in the identity based setting. We introduce the notion of Identity ba... 详细信息
来源: 评论
A Privacy-friendly sequential progressive framework for segmented decision making
A Privacy-friendly sequential progressive framework for segm...
收藏 引用
2023 International Conference on Artificial Intelligence of Things and Systems, AIoTSys 2023
作者: Liu, Peng Yu, Zhiyong Huang, Fangwan Fuzhou University College of Computer and Data Science Fuzhou China Fuzhou University Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou China
To achieve progressive and accurate decision-making for long-term time series data while meeting the needs of privacy-friendly and early, this paper proposes a universal framework for sequential progressive decision-m... 详细信息
来源: 评论
Large Model-Based Data Augmentation for Imbalanced Text Classification  5
Large Model-Based Data Augmentation for Imbalanced Text Clas...
收藏 引用
5th International Seminar on Artificial Intelligence, networking and information Technology, AINIT 2024
作者: Zhang, Dawei Mi, Rongxin Zhou, Peiyao Jin, Dawei Zhang, Manman Song, Tianhang School of Computer Science Jiangsu University of Science and Technology Jiangsu Zhenjiang China National Computer Network Emergency Response Technical Team Coordination Center of China Beijing China Key Laboratory of Intelligent Information Processing Beijing China
This study focuses on the application of large models to deal with imbalanced data problems in text classification. In view of the central position of text in web data and the negative impact of class imbalance on cla... 详细信息
来源: 评论
Research on Cross-site Scripting Vulnerability of XSS Based on International Student Website  5
Research on Cross-site Scripting Vulnerability of XSS Based ...
收藏 引用
5th International Conference on computer network, Electronic and Automation, ICCNEA 2022
作者: Wang, Tianma Zhao, Dongmei Qi, Jianjun International Education Institute North China Electric Power University Beijing China Hebei Normal University College of Computer and Cyber Security Shijiazhuang China Key Laboratory of Network and Information Security in Hebei Province Shijiazhuang China
The international student website is the window of the school's external publicity. Through the website, international students can understand the school in a wider range and in all aspects. The website is often a... 详细信息
来源: 评论
A Power IoT Terminal Asset Identification Technology Suitable for Modbus Protocol
A Power IoT Terminal Asset Identification Technology Suitabl...
收藏 引用
2024 International Conference on Interactive Intelligent Systems and Techniques, IIST 2024
作者: Li, Yong Ma, YuanYuan Chen, Mu Wang, Chao State Grid Smart Grid Research Enstitute Co. Ltd State Grid Key Laboratory of Information & Network Security Nanjing210003 China State Grid Beijing Electric Power Research Institute Beijing100075 China
In the new power system scenario, Power IoT terminals have new characteristics such as diverse hardware heterogeneity and complex subject ownership, which make it technically difficult to achieve secure access authent... 详细信息
来源: 评论
Scheduling Multiple Mobile Agents with Abilities of Sensing and Executing Simultaneously
Scheduling Multiple Mobile Agents with Abilities of Sensing ...
收藏 引用
2023 International Conference on Artificial Intelligence of Things and Systems, AIoTSys 2023
作者: Guo, Zhipeng Yu, Zhiyong Huang, Fangwan Tu, Chunyu Fuzhou University College of Computer and Data Science Fuzhou China Fuzhou University Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou China
How to schedule public resources to maximize the coverage of crowds has always been a hot topic. There are mainly two types of research. One is the scheduling of static resources, whose coverage efficiency is lower be... 详细信息
来源: 评论
Energy Efficiency Maximization for Aerial RIS-Aided Over-the-Air Federated Learning
Energy Efficiency Maximization for Aerial RIS-Aided Over-the...
收藏 引用
IEEE Conference on Wireless Communications and networking
作者: Yuan Ren Zeyang Wang Xuewei Zhang Guangyue Lu Shaanxi Key Laboratory of Information Communication Network and Security Xi'an University of Posts and Telecommunications Xi'an China
Compared with terrestrial reconfigurable intelligent surface (RIS), aerial RIS provides improved transmission performance owing to its high adaptability in three-dimensional space and the existence of established line... 详细信息
来源: 评论
A Task Offloading and Resource Allocation Strategy Based on Improved WSO for Internet of Vehicles
A Task Offloading and Resource Allocation Strategy Based on ...
收藏 引用
2023 IEEE/CIC International Conference on Communications in China, ICCC Workshops 2023
作者: Jiang, Fan He, Guangxue Liu, Lei Su, Heyu Wang, Chaowei Shaanxi Key Laboratory of Information Communication Network and Security Xi'an China Xi'an University of Posts and Telecommunications Xi'an China Beijing University of Posts and Telecommunications School of Electronic Engineering Beijing China
In this paper, we investigate a task offloading and resource allocation strategy concerning multi-access edge computing (MEC) servers and multi-vehicles in the Internet of Vehicles (IoV). Aiming at dealing with resour... 详细信息
来源: 评论
YOLOv5 Algorithm Optimization: Precise Target Detection Amidst Background Interference  4
YOLOv5 Algorithm Optimization: Precise Target Detection Amid...
收藏 引用
4th International Conference on Consumer Electronics and computer Engineering, ICCECE 2024
作者: Xiong, Bingbing Shi, Wenxi Fu, Yanyun Zhu, Zhansheng Wang, Deyong Jia, Bin School of Computer Science and Technology Xinjiang University Urumqi China Xinjiang Lianhaichuangzhi Information Technology Co. Ltd. Key Laboratory of Big Data of Xinjiang Social Security Risk Beijing China Beijing Academy of Science and Technology Beijing China Xinjiang Lianhaichuangzhi Information Technology Co. Ltd. Key Laboratory of Big Data of Xinjiang Social Security Risk Urumqi China
This paper solves the challenge that the target is submerged in the background in the border security scenario, and proposes the enhancement of YOLOv5 algorithm. EfficientViT replaces the DarkNet backbone, leveraging ... 详细信息
来源: 评论
Structured Fourier Contour Embedding for Arbitrary-shaped Slender Text Detection  3
Structured Fourier Contour Embedding for Arbitrary-shaped Sl...
收藏 引用
3rd International Conference on Artificial Intelligence, Virtual Reality, and Visualization, AIVRV 2023
作者: Chen, Jianyong Liang, Lingyu Xiao, Wocheng South China University of Technology Guangzhou China Guangzhou China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Nanjing China
Arbitrary-shaped text detection is a challenging task where a text instance representation should be well designed to cover diverse text geometry variances. Most of current methods represent text instances as image ma... 详细信息
来源: 评论