咨询与建议

限定检索结果

文献类型

  • 4,585 篇 会议
  • 3,423 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 8,016 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,350 篇 工学
    • 4,013 篇 计算机科学与技术...
    • 3,165 篇 软件工程
    • 1,364 篇 信息与通信工程
    • 704 篇 电气工程
    • 586 篇 控制科学与工程
    • 543 篇 电子科学与技术(可...
    • 469 篇 网络空间安全
    • 442 篇 生物工程
    • 305 篇 机械工程
    • 237 篇 光学工程
    • 230 篇 仪器科学与技术
    • 188 篇 生物医学工程(可授...
    • 180 篇 安全科学与工程
    • 152 篇 动力工程及工程热...
    • 149 篇 化学工程与技术
    • 140 篇 交通运输工程
    • 127 篇 建筑学
  • 2,314 篇 理学
    • 1,371 篇 数学
    • 517 篇 物理学
    • 480 篇 生物学
    • 419 篇 统计学(可授理学、...
    • 205 篇 系统科学
    • 172 篇 化学
  • 1,348 篇 管理学
    • 829 篇 管理科学与工程(可...
    • 573 篇 图书情报与档案管...
    • 295 篇 工商管理
  • 287 篇 法学
    • 169 篇 社会学
    • 116 篇 法学
  • 157 篇 医学
    • 130 篇 临床医学
  • 115 篇 经济学
    • 115 篇 应用经济学
  • 98 篇 军事学
  • 55 篇 农学
  • 48 篇 教育学
  • 24 篇 文学
  • 23 篇 艺术学

主题

  • 257 篇 feature extracti...
  • 233 篇 semantics
  • 211 篇 cryptography
  • 188 篇 authentication
  • 180 篇 information secu...
  • 177 篇 computational mo...
  • 169 篇 accuracy
  • 166 篇 security
  • 156 篇 protocols
  • 145 篇 deep learning
  • 140 篇 privacy
  • 133 篇 training
  • 130 篇 federated learni...
  • 122 篇 laboratories
  • 109 篇 data models
  • 101 篇 cloud computing
  • 100 篇 servers
  • 96 篇 blockchain
  • 95 篇 data privacy
  • 91 篇 public key crypt...

机构

  • 218 篇 key laboratory o...
  • 207 篇 shandong provinc...
  • 162 篇 school of comput...
  • 151 篇 state key labora...
  • 118 篇 school of cyber ...
  • 112 篇 school of comput...
  • 106 篇 department of co...
  • 98 篇 information secu...
  • 85 篇 key laboratory o...
  • 84 篇 institute of inf...
  • 70 篇 guangdong provin...
  • 69 篇 computer network...
  • 67 篇 university of ch...
  • 64 篇 college of mathe...
  • 64 篇 peng cheng labor...
  • 63 篇 state grid key l...
  • 59 篇 school of softwa...
  • 58 篇 shandong provinc...
  • 56 篇 school of comput...
  • 54 篇 key laboratory o...

作者

  • 56 篇 jianfeng ma
  • 53 篇 yang yang
  • 45 篇 ma jianfeng
  • 45 篇 yixian yang
  • 42 篇 ding yong
  • 41 篇 zheng wei-shi
  • 40 篇 huang qingming
  • 32 篇 wang wei
  • 31 篇 cong runmin
  • 31 篇 xu an wang
  • 31 篇 hu yupu
  • 31 篇 yang yixian
  • 30 篇 zhang huanguo
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 26 篇 xiaoming wu
  • 26 篇 min-ling zhang
  • 26 篇 wang bin
  • 25 篇 liu xin
  • 23 篇 li tao

语言

  • 6,638 篇 英文
  • 1,144 篇 其他
  • 269 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Computer Network and Information Security"
8016 条 记 录,以下是691-700 订阅
排序:
Decentralized and Lightweight Cross-Chain Transaction Scheme Based on Proxy Re-signature  23
Decentralized and Lightweight Cross-Chain Transaction Scheme...
收藏 引用
23rd IEEE International Conference on Trust, security and Privacy in Computing and Communications, TrustCom 2024
作者: Zou, Huiying Duan, Jia Liu, Xi Ren, Wei Li, Tao Zheng, Xianghan Choo, Kim-Kwang Raymond Hunan Engineering Research Center of Geographic Information Security and Application The Third Surveying and Mapping Institute of Hunan Province Hunan China China University of Geosciences School of Computer Science Wuhan China Sichuan University Ministry of Education Key Laboratory of Data Protection and Intelligent Management China Casm State Key Laboratory of Geo-Information Engineering Key Laboratory of Surveying and Mapping Science and Geospatial Information Technology of Mnr Beijing China Fuzhou University College of Computer and Big Data China Sanya College School of Information and Intelligent Engineering China University of Texas at San Antonio Department of Information Systems and Cyber Security San Antonio United States
With the widespread application of digital assets and the rapid development of blockchain technology, achieving secure and efficient transactions between different blockchain networks has become an urgent challenge. E... 详细信息
来源: 评论
Prediction of piRNA-mRNA interactions based on an interactive inference network
Prediction of piRNA-mRNA interactions based on an interactiv...
收藏 引用
2023 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2023
作者: Liu, Yajun Li, Ru Li, Aimin Fei, Rong Guo, Xie Wu, Fang-Xiang Xi'an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China Xi'an University of Technology Shaanxi Key Laboratory of Complex System Control and Intelligent Information Processing Xi'an China University of Saskatchewan Division of Biomedical Engineering Department of Computer Science Department of Mechanical Engineering Saskatoon Canada
As the largest class of small non-coding RNAs, piRNAs primarily present in the reproductive cells of mammals, which influence post-transcriptional processes of mRNAs in multiple ways. Effective methods for predicting ... 详细信息
来源: 评论
Innovations in Machine Learning for Flight Delay Prediction: A Targeted Overview  5
Innovations in Machine Learning for Flight Delay Prediction:...
收藏 引用
5th International Conference on computers and Artificial Intelligence Technology, CAIT 2024
作者: Wei, Wei Yu, Chenchen Yang, Zhao Bo, Fu Xi'an University Of Technology School of Computer Science and Engineering Shaanxi Key Laboratory for Network Computing and Security Xi'an China Xi'an University Of Technology School of Computer Science and Engineering Xi'an China
Artificial intelligence technology is increasingly being applied to air traffic flow forecasting. Based on the core data of Web of Science, this study uses bibliometrics and content review methods to investigate the c... 详细信息
来源: 评论
Prompt and Contrastive Learning for Few-shot Sentiment Classification  5
Prompt and Contrastive Learning for Few-shot Sentiment Class...
收藏 引用
5th International Conference on Artificial Intelligence and Pattern Recognition, AIPR 2022
作者: Wang, Fei Chen, Long Huang, Xiaohua Xu, Cai Zhao, Wei Guan, Ziyu Lu, Guangyue Shaanxi Key Laboratory of Information Communication Network and Security Xi'an University of Posts and Telecommunications China School of Information Science and Technology Northwest University China School of Computer Science and Technology Xidian University China
Sentiment classification is a hot topic in the field of natural language processing. Currently, state-of-the-art classification models follow two steps: pre-training a large language model on upstream tasks, and then ... 详细信息
来源: 评论
Multi-Scale Feature Extraction with Supervised Contrastive Learning for Vulnerability Detection  36
Multi-Scale Feature Extraction with Supervised Contrastive L...
收藏 引用
36th International Conference on Software Engineering and Knowledge Engineering, SEKE 2024
作者: Zhao, Yahui Lu, Lu Liang, Zhihong Suo, Siliang School of Computer Science and Engineering South China University of Technology Guangzhou China Pazhou Laboratory Guangzhou China Pengcheng Laboratory Shenzhen China Electric Power Research Institute CSG Guangzhou China Guangdong Provincial Key Laboratory of Power System Network Security Guangzhou China
The capacity of Deep Learning to automatically learn features from source code has facilitated its extensive utilization in detecting software vulnerabilities. However, existing pre-trained models regard code snippets... 详细信息
来源: 评论
Optimized Block-K Clustering IoT Clustering and Blockchain Sharding Strategy Using Deep Reinforcement Learning
Optimized Block-K Clustering IoT Clustering and Blockchain S...
收藏 引用
Cyber Science and Technology Congress (CyberSciTech), IEEE
作者: Tianci Chen Hui Lin Lizhao Wu Xiaoding Wang Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fujian Normal University Fuzhou Fujian
The inherent properties of immutability, decentralization, and enable linear scalability, making sharded blockchain a compelling approach to resolving trust issues in large-scale Internet of Things (IoT) networks. Sha... 详细信息
来源: 评论
Joint Optimization of Latency and Energy Consumption for Mobile Edge Computing Based Proximity Detection in Road networks
收藏 引用
China Communications 2022年 第4期19卷 274-290页
作者: Tongyu Zhao Yaqiong Liu Guochu Shou Xinwei Yao School of Information and Communication Engineering Beijing University of Posts and TelecommunicationsBeijing 100876China Beijing Laboratory of Advanced Information Networks Beijing Key Laboratory of Network System Architecture and ConvergenceBeijing 100876China School of Computer Science and Technology Zhejiang University of TechnologyChina
In recent years, artificial intelligence and automotive industry have developed rapidly, and autonomous driving has gradually become the focus of the industry. In road networks, the problem of proximity detection refe... 详细信息
来源: 评论
Privacy-Preserving IoT Image Transmission: Multi-Stage SVD Data Embedding and Heatmap Alignment
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Du, Kaixin Ma, Bin Yang, Meihong Wang, Xiaoyu Li, Xiaolong Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250101 China Beijing Jiaotong University School of Computer and Information Technology Beijing100044 China
The images transmitted by IoT devices, particularly those used for surveillance or sensor data, are vulnerable to malicious screenshots and unauthorized access, leading to potential privacy breaches. To address this, ... 详细信息
来源: 评论
The Construction and Experimental Technologies of Anonymous network Analysis and Control Platform  7
The Construction and Experimental Technologies of Anonymous ...
收藏 引用
7th International Conference on Pattern Recognition and Artificial Intelligence, PRAI 2024
作者: Zhao, Yue Yang, Bin Tian, Bo Yang, Yarang National Key Laboratory of Security Communication Chengdu610041 China School of Computer and Information Engineering Chuzhou University Chuzhou239000 China College of Physics and Electrical Engineering Kashi University Kashi844006 China
In view of the shortcomings of low accuracy and high false positive rate in the traditional anonymous network traffic analysis methods, this paper proposes the construction and experimental technologies of the anonymo... 详细信息
来源: 评论
Cross-Layer-Optimized Link Selection for Hologram Video Streaming Over Millimeter Wave networks
Cross-Layer-Optimized Link Selection for Hologram Video Stre...
收藏 引用
2025 IEEE Wireless Communications and networking Conference, WCNC 2025
作者: Jiang, Yiming Liu, Yanwei Liu, Jinxia Argyriou, Antonios Chen, Yifei Zhang, Wen Institute of Information Engineering Chinese Academy of Sciences State Key Laboratory of Cyberspace Security Defense Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Zhejiang Wanli University Ningbo China University of Thessaly Department of Electrical and Computer Engineering Greece
Holographic-type communication brings an immersive tele-holography experience by delivering holographic contents to users. As the direct representation of holographic contents, hologram videos are naturally three-dime... 详细信息
来源: 评论