咨询与建议

限定检索结果

文献类型

  • 4,435 篇 会议
  • 3,397 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,840 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,280 篇 工学
    • 3,971 篇 计算机科学与技术...
    • 3,151 篇 软件工程
    • 1,357 篇 信息与通信工程
    • 695 篇 电气工程
    • 557 篇 控制科学与工程
    • 542 篇 电子科学与技术(可...
    • 455 篇 网络空间安全
    • 439 篇 生物工程
    • 303 篇 机械工程
    • 233 篇 光学工程
    • 224 篇 仪器科学与技术
    • 189 篇 生物医学工程(可授...
    • 168 篇 安全科学与工程
    • 148 篇 动力工程及工程热...
    • 145 篇 化学工程与技术
    • 133 篇 交通运输工程
    • 127 篇 建筑学
  • 2,305 篇 理学
    • 1,382 篇 数学
    • 506 篇 物理学
    • 475 篇 生物学
    • 430 篇 统计学(可授理学、...
    • 208 篇 系统科学
    • 165 篇 化学
  • 1,340 篇 管理学
    • 816 篇 管理科学与工程(可...
    • 584 篇 图书情报与档案管...
    • 290 篇 工商管理
  • 288 篇 法学
    • 167 篇 社会学
    • 119 篇 法学
  • 160 篇 医学
    • 130 篇 临床医学
    • 118 篇 基础医学(可授医学...
  • 117 篇 经济学
  • 98 篇 军事学
  • 54 篇 农学
  • 46 篇 教育学
  • 24 篇 文学
  • 22 篇 艺术学

主题

  • 239 篇 feature extracti...
  • 230 篇 semantics
  • 214 篇 cryptography
  • 182 篇 authentication
  • 181 篇 information secu...
  • 162 篇 computational mo...
  • 158 篇 security
  • 150 篇 protocols
  • 142 篇 accuracy
  • 140 篇 privacy
  • 139 篇 deep learning
  • 126 篇 training
  • 122 篇 laboratories
  • 106 篇 data models
  • 100 篇 federated learni...
  • 100 篇 cloud computing
  • 95 篇 servers
  • 93 篇 blockchain
  • 91 篇 public key crypt...
  • 88 篇 data privacy

机构

  • 203 篇 shandong provinc...
  • 174 篇 key laboratory o...
  • 158 篇 school of comput...
  • 155 篇 state key labora...
  • 114 篇 school of comput...
  • 106 篇 department of co...
  • 106 篇 school of cyber ...
  • 97 篇 information secu...
  • 80 篇 key laboratory o...
  • 79 篇 institute of inf...
  • 68 篇 guangdong provin...
  • 66 篇 computer network...
  • 65 篇 college of mathe...
  • 64 篇 university of ch...
  • 63 篇 state grid key l...
  • 62 篇 peng cheng labor...
  • 60 篇 key laboratory o...
  • 59 篇 school of softwa...
  • 59 篇 school of comput...
  • 55 篇 key laboratory o...

作者

  • 55 篇 jianfeng ma
  • 54 篇 yang yang
  • 50 篇 ma jianfeng
  • 45 篇 yixian yang
  • 41 篇 zheng wei-shi
  • 41 篇 ding yong
  • 38 篇 huang qingming
  • 33 篇 zhang huanguo
  • 32 篇 wang wei
  • 32 篇 hu yupu
  • 31 篇 cong runmin
  • 31 篇 xu an wang
  • 30 篇 yang yixian
  • 29 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 25 篇 xu li
  • 25 篇 xie xiaohua
  • 24 篇 xinhong hei
  • 23 篇 liu xin

语言

  • 7,214 篇 英文
  • 362 篇 其他
  • 277 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Computer Network and Information Security"
7840 条 记 录,以下是61-70 订阅
排序:
FirmPorter: Porting RTOSes at the Binary Level for Firmware Re-hosting  26th
FirmPorter: Porting RTOSes at the Binary Level for Firmwa...
收藏 引用
26th International Conference on information and Communications security, ICICS 2024
作者: Xin, Mingfeng Wen, Hui Deng, Liting Li, Hong Li, Qiang Sun, Limin Beijing Key Laboratory of IOT Information Security Technology Institute of Information Engineering CAS Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China School of Computer and Information Technology Beijing Jiaotong University Beijing China
The rapid growth of the Industrial Internet of Things (IIoT) has brought real-time operating system (RTOS) into focus as major targets for both security analysts and malicious adversaries. Due to the non-standard hard... 详细信息
来源: 评论
Secure Similar Adjacent Vertex Query on Sparse Graph Data in Cloud Environment  8th
Secure Similar Adjacent Vertex Query on Sparse Graph Data i...
收藏 引用
8th International Congress on Edge Computing, EDGE 2024, Held as Part of the Services Conference Federation, SCF 2024
作者: Tian, Yun Wu, Bin Shi, Jiaoli Zhang, Caicai Xu, Du School of Computer and Big Data Science Jiujiang University Jiujiang332005 China Jiujiang Key Laboratory of Network and Information Security Jiujiang332005 China School of Modern Information Technology Zhejiang Polytechnic University of Mechanical and Electrical Engineering Hangzhou310053 China
The development of cloud computing and the widespread application of cloud services have made outsourcing services more convenient. The need for individuals and businesses to store and manipulate the graph data they g... 详细信息
来源: 评论
EPI-Mamba: State Space Model for Semantic Segmentation from Light Fields
EPI-Mamba: State Space Model for Semantic Segmentation from ...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Li, Yan Chen, Jianan Wang, Qiong Xu, Jinshan College of Computer Science & Technology Zhejiang University of Technology Hangzhou China Guangdong Provincial Key Laboratory of Intelligent Information Processing Shenzhen Key Laboratory of Media Security Shenzhen University Shenzhen China
Global contextual dependency is of significance for semantic segmentation from light fields. However, previous works mostly exploit attention mechanisms to model spatial context dependency and angular context dependen... 详细信息
来源: 评论
A Code-Based ISE to Protect Boolean Masking in Software
IACR Transactions on Cryptographic Hardware and Embedded Sys...
收藏 引用
IACR Transactions on Cryptographic Hardware and Embedded Systems 2025年 第2期2025卷 293-332页
作者: Tian, Qi Cheng, Hao Guo, Chun Page, Daniel Wang, Meiqin Wang, Weijia School of Cyber Science and Technology Shandong University Qingdao China Quan Cheng Laboratory Jinan China Key Laboratory of Cryptologic Technology and Information Security Ministry of Education Shandong University Qingdao China School of Computer Science University of Bristol Bristol United Kingdom
Side-Channel Attacks (SCAs) pose a significant threat to data security in embedded environments. To counteract the power-based SCAs, masking is a widely used defense technique, that introduces randomness to obscure th... 详细信息
来源: 评论
ICCG:low-cost and efficient consistency with adaptive synchronization for metadata replication
收藏 引用
Frontiers of computer Science 2025年 第1期19卷 53-70页
作者: Chenhao ZHANG Liang WANG Jing SHANG Zhiwen XIAO Limin XIAO Meng HAN Bing WEI Runnan SHEN Jinquan WANG State Key Laboratory of Software Development Environment Beihang UniversityBeijing 100191China School of Computer Science and Engineering Beihang UniversityBeijing 100191China School of Cyberspace Security Hainan UniversityHaikou 570228China China Mobile Information Technology Center Beijing 100033China
The rapid growth in the storage scale of wide-area distributed file systems (DFS) calls for fast and scalable metadata management. Metadata replication is the widely used technique for improving the performance and sc... 详细信息
来源: 评论
FedFLD: Heterogeneous Federated Learning via Forget-Less Distillation
FedFLD: Heterogeneous Federated Learning via Forget-Less Dis...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Yi, Xiaoyang Zhang, Jian Chen, Jing Bao, Yuru Xing, Lingkai College of Cyber Science Nankai University China College of Computer Science Nankai University China Tianjin Key Laboratory of Network and Data Security Technology Tianjin China
Federated learning, as a distributed machine learning paradigm, enhances privacy protection but faces the challenge of heterogeneity. Data-free knowledge distillation (DFKD) methods attempt to overcome this challenge ... 详细信息
来源: 评论
Defending Data Inference Attacks Against Machine Learning Models by Mitigating Prediction Distinguishability
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年 第3期22卷 2687-2704页
作者: Yang, Ziqi Zhu, Yiran Wan, Jie Xiang, ChuXiao Tang, Tong Wang, Yilin Xu, Ruite Wang, Lijin Zhang, Fan Xu, Jiarong Qin, Zhan Zhejiang University State Key Laboratory of Blockchain and Data Security Hangzhou310027 China Institute of Blockchain and Data Security Hangzhou310027 China Zhejiang University College of Computer Science and Technology Hangzhou310027 China Fudan University Department of Information Management and Business Intelligence Shanghai200437 China
Neural networks are vulnerable to data inference attacks, including the membership inference attack, the model inversion attack, and the attribute inference attack. In this paper, we propose PURIFIER to defend against... 详细信息
来源: 评论
Deep anomaly detection on attributed networks by graph update
收藏 引用
Computing 2025年 第6期107卷 1-25页
作者: Li, Yifan Li, Jiayin Liu, Ximeng Xu, Li College of Computer and Cyber Security Fujian Normal University Fuzhou China Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Normal University Fuzhou China College of Mathematics and Computer Science Fuzhou University Fuzhou China University Key Laboratory of Information Security of Network Systems Fuzhou University Fuzhou China
Anomaly detection on attributed networks has become extremely important as attributed networks are modeled in various real-world scenarios such as financial, communication, and social networks. Traditional anomaly det... 详细信息
来源: 评论
Crop Classification Methods Based on Siamese CBMM-CNN Architectures Using Hyperspectral Remote Sensing Data  24th
Crop Classification Methods Based on Siamese CBMM-CNN Archi...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Xie, Bin Zhang, Jiahao Li, Yuling Li, Yusong Dong, Xinyu College of Computer and Cyber Security Hebei Normal University Hebei Shijiazhuang China Hebei Provincial Key Laboratory of Network and Information Security Hebei Normal University Hebei Shijiazhuang China Hebei Provincial Engineering Research Center for Supply Chain Big Data Analytics and Data Security Hebei Normal University Hebei Shijiazhuang China
Amidst global population growth and escalating food demands, real-time agricultural monitoring is crucial for ensuring food security. During the initial stages of crop growth, however, it faces significant challenges ... 详细信息
来源: 评论
Shorter ZK-SNARKs from square span programs over ideal lattices
收藏 引用
Cybersecurity 2025年 第1期8卷 208-226页
作者: Xi Lin Heyang Cao Feng‑Hao Liu Zhedong Wang Mingsheng Wang Key Laboratory of Cyberspace Security Defense Institute of Information EngineeringChinese Academy of SciencesBeijingChina School of Cyber Security University of Chinese Academy of SciencesBeijingChina School of Electrical Engineering&Computer Science Washington State UniversityPullmanWAUSA School of Cyber Science and Engineering Shanghai Jiaotong UniversityShanghaiChina
Zero-knowledge succinct non-interactive arguments of knowledge(zk-SNARKs)are cryptographic protocols that ofer efcient and privacy-preserving means of verifying NP language relations and have drawn considerable atten‑... 详细信息
来源: 评论