咨询与建议

限定检索结果

文献类型

  • 4,506 篇 会议
  • 3,387 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,901 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,299 篇 工学
    • 3,983 篇 计算机科学与技术...
    • 3,164 篇 软件工程
    • 1,348 篇 信息与通信工程
    • 653 篇 电气工程
    • 561 篇 控制科学与工程
    • 523 篇 电子科学与技术(可...
    • 449 篇 网络空间安全
    • 440 篇 生物工程
    • 301 篇 机械工程
    • 233 篇 光学工程
    • 224 篇 仪器科学与技术
    • 188 篇 生物医学工程(可授...
    • 165 篇 安全科学与工程
    • 151 篇 动力工程及工程热...
    • 148 篇 化学工程与技术
    • 127 篇 交通运输工程
    • 126 篇 建筑学
  • 2,310 篇 理学
    • 1,377 篇 数学
    • 504 篇 物理学
    • 479 篇 生物学
    • 428 篇 统计学(可授理学、...
    • 206 篇 系统科学
    • 166 篇 化学
  • 1,338 篇 管理学
    • 818 篇 管理科学与工程(可...
    • 576 篇 图书情报与档案管...
    • 297 篇 工商管理
  • 289 篇 法学
    • 168 篇 社会学
    • 119 篇 法学
  • 154 篇 医学
    • 127 篇 临床医学
  • 116 篇 经济学
    • 116 篇 应用经济学
  • 99 篇 军事学
  • 55 篇 农学
  • 46 篇 教育学
  • 24 篇 文学
  • 23 篇 艺术学

主题

  • 238 篇 feature extracti...
  • 229 篇 semantics
  • 216 篇 cryptography
  • 184 篇 authentication
  • 181 篇 information secu...
  • 163 篇 computational mo...
  • 158 篇 security
  • 152 篇 protocols
  • 144 篇 accuracy
  • 141 篇 deep learning
  • 138 篇 privacy
  • 122 篇 laboratories
  • 121 篇 training
  • 103 篇 data models
  • 100 篇 federated learni...
  • 99 篇 cloud computing
  • 94 篇 servers
  • 92 篇 public key crypt...
  • 92 篇 blockchain
  • 89 篇 data privacy

机构

  • 204 篇 shandong provinc...
  • 178 篇 key laboratory o...
  • 164 篇 school of comput...
  • 152 篇 state key labora...
  • 113 篇 school of comput...
  • 111 篇 school of cyber ...
  • 106 篇 department of co...
  • 98 篇 information secu...
  • 83 篇 key laboratory o...
  • 81 篇 institute of inf...
  • 69 篇 guangdong provin...
  • 68 篇 computer network...
  • 66 篇 university of ch...
  • 64 篇 college of mathe...
  • 64 篇 state grid key l...
  • 63 篇 peng cheng labor...
  • 60 篇 key laboratory o...
  • 59 篇 school of softwa...
  • 56 篇 school of comput...
  • 54 篇 key laboratory o...

作者

  • 55 篇 jianfeng ma
  • 53 篇 yang yang
  • 49 篇 ma jianfeng
  • 45 篇 yixian yang
  • 43 篇 ding yong
  • 41 篇 zheng wei-shi
  • 38 篇 huang qingming
  • 31 篇 cong runmin
  • 31 篇 wang wei
  • 31 篇 hu yupu
  • 31 篇 yang yixian
  • 30 篇 zhang huanguo
  • 30 篇 xu an wang
  • 29 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 26 篇 min-ling zhang
  • 24 篇 liu xin
  • 24 篇 xinhong hei
  • 24 篇 xie xiaohua

语言

  • 7,143 篇 英文
  • 499 篇 其他
  • 278 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Computer Network and Information Security"
7901 条 记 录,以下是651-660 订阅
排序:
EPRFL:An Efficient Privacy-Preserving and Robust Federated Learning Scheme for Fog Computing
收藏 引用
China Communications 2025年 第4期22卷 202-222页
作者: Ke Zhijie Xie Yong Syed Hamad Shirazi Li Haifeng School of Computer Technology and Application Qinghai UniversityXining 810016China School of Computer and Information Science Qinghai Institute of TechnologyXining 810016China Guangdong Key Laboratory of Blockchain Security Guangzhou UniversityGuangzhou 510006China Department of Information Technology Hazara UniversityBaffa 21110Pakistan Qinghai Provincial Key Laboratory of Big Data in Finance and Artificial Intelligence Application Technology Xining 810016China
Federated learning(FL)is a distributed machine learning paradigm that excels at preserving data privacy when using data from multiple *** combined with Fog Computing,FL offers enhanced capabilities for machine learnin... 详细信息
来源: 评论
ID-YOLOv7: A Method for Steel Surface Defect Detection Combining Residual Attention and Dynamic Upsampling
ID-YOLOv7: A Method for Steel Surface Defect Detection Combi...
收藏 引用
Smart World Congress (SWC), IEEE
作者: Shanshan Liu Xiangzhi Liu Jiazheng Man Bingyang Cao Yunfeng Dong Xiaoming Wu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
Industrial defect detection is a crucial challenge in computer vision. The accuracy of detecting defects on steel surfaces is hindered by spatially varying noise. To address this challenge, we propose an efficient met... 详细信息
来源: 评论
LCLB: Low Cross-Chain Transaction Ratio and Load Balancing for Blockchain Sharding
LCLB: Low Cross-Chain Transaction Ratio and Load Balancing f...
收藏 引用
Robotics, Intelligent Control and Artificial Intelligence (RICAI), International Conference on
作者: Yu Wang Xiaoming Wu Qile Yuan Yunfeng Dong Xiangzhi Liu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
As blockchain technology becomes widely applied, handling high volumes of transactions has become a critical challenge. Sharding has emerged as an effective solution to enhance the throughput of blockchain systems. Ye... 详细信息
来源: 评论
Activation Distance and Capacity Analysis for Ambient Backscatter Communications with Sensitivity Constraint and Beamforming
收藏 引用
China Communications 2024年 第11期21卷 257-266页
作者: Mu Yunping Fan Dian Wang Gongpu Xu Yongjun Kuang Lei Engineering Research Center of Network Management Technology for High Speed Railway of Ministry of Education School of Computer and Information TechnologyBeijing Jiaotong UniversityBeijing 100044China China Academy of Information and Communications Technology Beijing 100191China School of Communication and Information Engineering Chongqing University of Posts and TelemcommunicationsChongqing 400065China Shanghai Key Laboratory of Multidimensional Information Processing Engineering Center of SHMEC for Space Information and GNSSSchool of Information Science and TechnologyEast China Normal UniversityShanghai 200241China
Circuit sensitivity of sensors or tags without battery is one practical constraint for ambient backscatter communication *** letter considers using beamforming to reduce the sensitivity constraint and evaluates the co... 详细信息
来源: 评论
Secure outsourced VANET data in clouds with designated supervisor  7
Secure outsourced VANET data in clouds with designated super...
收藏 引用
7th IEEE International Conference on Data Science in Cyberspace, DSC 2022
作者: Zhao, Meng Ding, Yong Zhang, Tong Zhou, Xiaochun Guilin University of Electronic Technology Guangxi Key Laboratory of Cryptography and Information Security School of Computer Science and Information Security Guilin China Cyberspace Security Research Center Pengcheng Laboratory Shenzhen China Shenzhen Olym Information Security Technology Co. Ltd. Shenzhen China
With the rapid development of information technology, a large number of vehicles and roadside units can be communicated through vehicular ad-hoc network (VANET). The information collected by vehicles can be shared wit... 详细信息
来源: 评论
A Triangular Stable Node network based on Self-supervised Learning for personalized prediction
A Triangular Stable Node Network based on Self-supervised Le...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Liu, Qing Gao, Qian Fan, Jun Zhang, Zhiqiang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan250014 China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology Shandong Academy of Sciences Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan250014 China China Telecom Digital Intelligence Techonology Co Ltd. No.1999 Shunhua road Shandong Jinan250101 China
In recent years, research has illuminated the potency of implicit data processing in enhancing user preferences. Nevertheless, barriers remain in breaking through the constraints of implicit information. This study ai... 详细信息
来源: 评论
A Lossless Relational Data Watermarking Scheme Based on Uneven Partitioning  20th
A Lossless Relational Data Watermarking Scheme Based on Une...
收藏 引用
20th International Conference on information security and Cryptology, Inscrypt 2024
作者: Xu, Wenhao Xian, Hequn College of Computer Science and Technology Qingdao University Qingdao266071 China Key Laboratory of Cyberspace Security Defense Institute of Information Engineering Chinese Academy of Sciences Beijing100085 China Cryptograph and Cyber Security Whampoa Institute Guangzhou510000 China
In modern relational databases, data security and integrity are crucial, particularly in large-scale, unevenly distributed big data environments. This paper proposes a lossless relational data watermarking scheme base... 详细信息
来源: 评论
A Blockchain-Based Hierarchical Dynamic Collaborative Storage Model
A Blockchain-Based Hierarchical Dynamic Collaborative Storag...
收藏 引用
Smart World Congress (SWC), IEEE
作者: Qile Yuan Xiangzhi Liu Yu Wang Yunfeng Dong Haoyu Jia Xiaoming Wu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
The pervasive application of blockchain technology has led to a significant increase in data volume, presenting significant challenges to existing storage architectures in environments characterized by large volumes o... 详细信息
来源: 评论
PCRTAM-Net:A Novel Pre-Activated Convolution Residual and Triple Attention Mechanism network for Retinal Vessel Segmentation
收藏 引用
Journal of computer Science & Technology 2023年 第3期38卷 567-581页
作者: 汪华登 李紫正 保罗 黎兵兵 潘细朋 刘振丙 蓝如师 罗笑南 Guangxi Key Laboratory of Image and Graphic Intelligent Processing Guilin 541004China School of Computer Science and Information Security Guilin University of Electronic TechnologyGuilin 541004China School of Artificial Intelligence Guilin University of Electronic TechnologyGuilin 541004China Department of Pathology Ganzhou Municipal HospitalGanzhou 341000China
Retinal images play an essential role in the early diagnosis of ophthalmic *** segmentation of retinal vessels in color fundus images is challenging due to the morphological differences between the retinal vessels and... 详细信息
来源: 评论
SGNet: A Multi-Scale Method for Steel Surface Defect Detection
SGNet: A Multi-Scale Method for Steel Surface Defect Detecti...
收藏 引用
Smart World Congress (SWC), IEEE
作者: Shanshan Liu Xiangzhi Liu Jiazheng Man Bingyang Cao Yunfeng Dong Xiaoming Wu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
The large variation in target scales within steel surface defect images often results in low detection accuracy. To address this issue, we have developed a multi-scale defect detection method named SGNet. Initially, w... 详细信息
来源: 评论