咨询与建议

限定检索结果

文献类型

  • 4,506 篇 会议
  • 3,387 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,901 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,299 篇 工学
    • 3,983 篇 计算机科学与技术...
    • 3,164 篇 软件工程
    • 1,348 篇 信息与通信工程
    • 653 篇 电气工程
    • 561 篇 控制科学与工程
    • 523 篇 电子科学与技术(可...
    • 449 篇 网络空间安全
    • 440 篇 生物工程
    • 301 篇 机械工程
    • 233 篇 光学工程
    • 224 篇 仪器科学与技术
    • 188 篇 生物医学工程(可授...
    • 165 篇 安全科学与工程
    • 151 篇 动力工程及工程热...
    • 148 篇 化学工程与技术
    • 127 篇 交通运输工程
    • 126 篇 建筑学
  • 2,310 篇 理学
    • 1,377 篇 数学
    • 504 篇 物理学
    • 479 篇 生物学
    • 428 篇 统计学(可授理学、...
    • 206 篇 系统科学
    • 166 篇 化学
  • 1,338 篇 管理学
    • 818 篇 管理科学与工程(可...
    • 576 篇 图书情报与档案管...
    • 297 篇 工商管理
  • 289 篇 法学
    • 168 篇 社会学
    • 119 篇 法学
  • 154 篇 医学
    • 127 篇 临床医学
  • 116 篇 经济学
    • 116 篇 应用经济学
  • 99 篇 军事学
  • 55 篇 农学
  • 46 篇 教育学
  • 24 篇 文学
  • 23 篇 艺术学

主题

  • 238 篇 feature extracti...
  • 229 篇 semantics
  • 216 篇 cryptography
  • 184 篇 authentication
  • 181 篇 information secu...
  • 163 篇 computational mo...
  • 158 篇 security
  • 152 篇 protocols
  • 144 篇 accuracy
  • 141 篇 deep learning
  • 138 篇 privacy
  • 122 篇 laboratories
  • 121 篇 training
  • 103 篇 data models
  • 100 篇 federated learni...
  • 99 篇 cloud computing
  • 94 篇 servers
  • 92 篇 public key crypt...
  • 92 篇 blockchain
  • 89 篇 data privacy

机构

  • 204 篇 shandong provinc...
  • 178 篇 key laboratory o...
  • 164 篇 school of comput...
  • 152 篇 state key labora...
  • 113 篇 school of comput...
  • 111 篇 school of cyber ...
  • 106 篇 department of co...
  • 98 篇 information secu...
  • 83 篇 key laboratory o...
  • 81 篇 institute of inf...
  • 69 篇 guangdong provin...
  • 68 篇 computer network...
  • 66 篇 university of ch...
  • 64 篇 college of mathe...
  • 64 篇 state grid key l...
  • 63 篇 peng cheng labor...
  • 60 篇 key laboratory o...
  • 59 篇 school of softwa...
  • 56 篇 school of comput...
  • 54 篇 key laboratory o...

作者

  • 55 篇 jianfeng ma
  • 53 篇 yang yang
  • 49 篇 ma jianfeng
  • 45 篇 yixian yang
  • 43 篇 ding yong
  • 41 篇 zheng wei-shi
  • 38 篇 huang qingming
  • 31 篇 cong runmin
  • 31 篇 wang wei
  • 31 篇 hu yupu
  • 31 篇 yang yixian
  • 30 篇 zhang huanguo
  • 30 篇 xu an wang
  • 29 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 26 篇 min-ling zhang
  • 24 篇 liu xin
  • 24 篇 xinhong hei
  • 24 篇 xie xiaohua

语言

  • 7,143 篇 英文
  • 499 篇 其他
  • 278 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Computer Network and Information Security"
7901 条 记 录,以下是671-680 订阅
排序:
Leveraging High-Order Similar Nodes and Structural Correlation for Attention-Based Graph Embedding
Leveraging High-Order Similar Nodes and Structural Correlati...
收藏 引用
2023 International Conference on Machine Learning and Cybernetics, ICMLC 2023
作者: Wang, Jing-Hong Li, Chang-Xin Yang, Jia-Teng College of Computer and Cyber Security Hebei Normal University Shijiazhuang050024 China Hebei Normal University Hebei Key Laboratory of Network and Information Security Shijiazhuang050024 China Hebei Provincial Engineering Research Center for Supply Chain Big Data Analytics & Security Hebei Normal University Shijiazhuang050024 China Hebei Polytechnic Institute Shijiazhuang050020 China
Graph Attention network (GAT) is a popular method for graph embedding as they effectively leverage attention mechanisms to aggregate first-order neighborhood node information. However, they have limitations in their a... 详细信息
来源: 评论
Privacy-Preserving Blockchain Supervision with Responsibility Tracking  19th
Privacy-Preserving Blockchain Supervision with Responsibili...
收藏 引用
19th EAI International Conference on Collaborative Computing: networking, Applications and Worksharing, CollaborateCom 2023
作者: Wen, Baodong Wang, Yujue Ding, Yong Zheng, Haibin Liang, Hai Yang, Changsong Liu, Jinyuan Guangxi Key Laboratory of Cryptography and Information Security School of Computer Science and Information Security Guilin University of Electronic Technology Guilin China Hangzhou Innovation Institute of Beihang University Hangzhou China Institute of Cyberspace Technology HKCT Institute for Higher Education Hong Kong WeBank Institute of Financial Technology Shenzhen University Shenzhen China
Blockchain technology is a strategic technology to support the development of digital economy, which helps to promote data sharing, improve the efficiency of communication and build a trusted system. With the continuo... 详细信息
来源: 评论
On-chain is not enough:Ensuring pre-data on the chain credibility for blockchain-based source-tracing systems
收藏 引用
Digital Communications and networks 2023年 第5期9卷 1053-1060页
作者: Yilei Wang Zhaojie Wang Guoyu Yang Shan Ai Xiaoyu Xiang Chang Chen Minghao Zhao School of Computer Science Qufu Normal UniversityRizhao276826China Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic TechnologyGuilin541004China Institute of Artificial Intelligence and Blockchain Guangzhou UniversityGuangzhou510006China School of Software Tsinghua UniversityTsinghua UniversityBeijing100191China
The blockchain provides a reliable and scalable method for enabling source-tracing functionality in large-scale Internet of Things(IoT)*** blockchain-based source tracing applications are generally based on the hypoth... 详细信息
来源: 评论
A Web Attack Detection Method Based on DistilBERT and Feature Fusion for Power Micro-Application Server  2
A Web Attack Detection Method Based on DistilBERT and Featur...
收藏 引用
2nd International Conference on Advanced Electronics, Electrical and Green Energy, AEEGE 2023
作者: Nige, Li Lu, Chen Lei, Zhao Zhenning, Teng Zhiqiang, Wang Yiyang, Shao Xiaolin, Gui State Grid Laboratory of Power Cyber-Security Protection and Monitoring Technology State Grid Smart Grid Research Institute Co.Ltd. Nanjing China Xi'an Jiaotong University Faculty of Electronic and Information Engineering Shaanxi Province Key Laboratory of Computer Network Xi'an China
The widespread use of power micro-applications has significantly expanded the attack surface of their server side, thus increasing the risk of vulnerability attacks such as SQL injection, XSS, and CRLF injection. To e... 详细信息
来源: 评论
Enabling Efficient Spatio-Temporal Range Query over Encrypted Databases
Enabling Efficient Spatio-Temporal Range Query over Encrypte...
收藏 引用
2024 IEEE Global Communications Conference, GLOBECOM 2024
作者: Zhu, Dan Wang, Xiangyu Huang, Cheng Han, Peilin Hu, Wei Ma, Jianfeng Research & Development Institute Northwestern Polytechnical University Shenzhen China Northwestern Polytechnical University School of Cybersecurity China Xidian University Shaanxi Key Laboratory of Network and System Security China Fudan University School of Computer Science China
Spatio-temporal query services have been playing an increasingly important role in people's daily lives. While outsourcing such services to third parties (e.g., cloud servers) offers considerable benefits, it rais... 详细信息
来源: 评论
A decouple-decomposition noise analysis model for closed-loop mode-localized tilt sensors
收藏 引用
Microsystems & Nanoengineering 2023年 第6期9卷 297-307页
作者: Kunfeng Wang XingYin Xiong Zheng Wang Liangbo Ma BoWen Wang WuHao Yang Xiaorui Bie ZhiTian Li XuDong Zou The State Key Laboratory of Transducer Technology Aerospace Information Research InstituteChinese Academy of SciencesBeijingChina School of Electronic Electrical and Communication EngineeringUniversity of Chinese Academy of SciencesBeijingChina Ming Hsieh Department of Electrical and Computer Engineering University of Southern CaliforniaLos AngelesCAUSA Shangdong Key Laboratory of Low-altitude Airspace Surveillance Network Technology QiLu Aerospace Information Research InstituteJinanChina
The development of mode-localized sensors based on amplitude output metrics has attracted increasing attention in recent years due to the potential of such sensors for high sensitivity and ***-localization phenomena l... 详细信息
来源: 评论
Regulation of the intermittent release of giant unilamellar vesicles under osmotic pressure
收藏 引用
Chinese Physics B 2022年 第9期31卷 644-651页
作者: Qi Zhou Ping Wang Bei-Bei Ma Zhong-Ying Jiang Tao Zhu Key Laboratory of Micro-Nano Electronic Sensing Technology and Bionic Devices Yili Normal UniversityYining 835000China School of Network Security and Information Technology Yili Normal UniversityYining 835000China National Laboratory of Solid State Microstructures Department of PhysicsNanjing UniversityNanjing 210093China
Osmotic pressure can break the fluid balance between intracellular and extracellular *** hypo-osmotic so-lution,water molecules,which transfer into the cell and burst,are driven by the concentration difference of solu... 详细信息
来源: 评论
Rail Transit Event Extraction based on the Fusion of Semantic and Local Dependency Features  15
Rail Transit Event Extraction based on the Fusion of Semanti...
收藏 引用
15th IEEE International Conference on Knowledge Graph, ICKG 2024
作者: Chen, Qiang Meng, Haining Bao, Yihao Yang, Mingsong Tong, Xinyu Zhao, Qin Khan, Muhammad Bilal Hei, Xinhong Xi'an University of Technology School of Computer Science and Engineering Xi'an China Xi'an University of Technology School of Computer Science and Engineering Shaanxi Key Laboratory of Network Computing and Security Technology Xi'an China Xi'an University of Technology School of Civil Engineering and Architecture Xi'an China
Event extraction in rail transit plays a vital role in all stages of design, construction, and final acceptance. Event extraction is a key part of building event logic graph (ELG). However, the difficulty in obtaining... 详细信息
来源: 评论
Video Anomaly Detection with Video Vision Transformer  8
Video Anomaly Detection with Video Vision Transformer
收藏 引用
8th International Conference on Signal and Image Processing, ICSIP 2023
作者: Guo, Biao Liu, Mingrui He, Qian Jiang, Ming Guilin University of Electronic Technology Guangxi Key Laboratory of Trusted Software Guilin China Guilin University of Electronic Technology School of Computer Science and Information Security Guilin China
Video anomaly detection refers to the identification of unusual events or activities and represents irregular behavior. However, it is extremely difficult to localize and extract abnormal events containing potentially... 详细信息
来源: 评论
ESNet: Evolution and Succession network for High-Resolution Salient Object Detection  41
ESNet: Evolution and Succession Network for High-Resolution ...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Liu, Hongyu Cong, Runmin Li, Hua Xu, Qianqian Huang, Qingming Zhang, Wei Institute of Information Science Beijing Jiaotong University Beijing Key Laboratory of Advanced Information Science and Network Technology Beijing China School of Control Science and Engineering Shandong University Key Laboratory of Machine Intelligence and System Control Ministry of Education Jinan China School of Computer Science and Technology Hainan University Hainan China Key Laboratory of Intelligent Information Processing Institute of Computing Technology CAS Beijing China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China
Preserving details and avoiding high computational costs are the two main challenges for the High-Resolution Salient Object Detection (HRSOD) task. In this paper, we propose a two-stage HRSOD model from the perspectiv... 详细信息
来源: 评论