咨询与建议

限定检索结果

文献类型

  • 4,506 篇 会议
  • 3,387 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,901 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,299 篇 工学
    • 3,983 篇 计算机科学与技术...
    • 3,164 篇 软件工程
    • 1,348 篇 信息与通信工程
    • 653 篇 电气工程
    • 561 篇 控制科学与工程
    • 523 篇 电子科学与技术(可...
    • 449 篇 网络空间安全
    • 440 篇 生物工程
    • 301 篇 机械工程
    • 233 篇 光学工程
    • 224 篇 仪器科学与技术
    • 188 篇 生物医学工程(可授...
    • 165 篇 安全科学与工程
    • 151 篇 动力工程及工程热...
    • 148 篇 化学工程与技术
    • 127 篇 交通运输工程
    • 126 篇 建筑学
  • 2,310 篇 理学
    • 1,377 篇 数学
    • 504 篇 物理学
    • 479 篇 生物学
    • 428 篇 统计学(可授理学、...
    • 206 篇 系统科学
    • 166 篇 化学
  • 1,338 篇 管理学
    • 818 篇 管理科学与工程(可...
    • 576 篇 图书情报与档案管...
    • 297 篇 工商管理
  • 289 篇 法学
    • 168 篇 社会学
    • 119 篇 法学
  • 154 篇 医学
    • 127 篇 临床医学
  • 116 篇 经济学
    • 116 篇 应用经济学
  • 99 篇 军事学
  • 55 篇 农学
  • 46 篇 教育学
  • 24 篇 文学
  • 23 篇 艺术学

主题

  • 238 篇 feature extracti...
  • 229 篇 semantics
  • 216 篇 cryptography
  • 184 篇 authentication
  • 181 篇 information secu...
  • 163 篇 computational mo...
  • 158 篇 security
  • 152 篇 protocols
  • 144 篇 accuracy
  • 141 篇 deep learning
  • 138 篇 privacy
  • 122 篇 laboratories
  • 121 篇 training
  • 103 篇 data models
  • 100 篇 federated learni...
  • 99 篇 cloud computing
  • 94 篇 servers
  • 92 篇 public key crypt...
  • 92 篇 blockchain
  • 89 篇 data privacy

机构

  • 204 篇 shandong provinc...
  • 178 篇 key laboratory o...
  • 164 篇 school of comput...
  • 152 篇 state key labora...
  • 113 篇 school of comput...
  • 111 篇 school of cyber ...
  • 106 篇 department of co...
  • 98 篇 information secu...
  • 83 篇 key laboratory o...
  • 81 篇 institute of inf...
  • 69 篇 guangdong provin...
  • 68 篇 computer network...
  • 66 篇 university of ch...
  • 64 篇 college of mathe...
  • 64 篇 state grid key l...
  • 63 篇 peng cheng labor...
  • 60 篇 key laboratory o...
  • 59 篇 school of softwa...
  • 56 篇 school of comput...
  • 54 篇 key laboratory o...

作者

  • 55 篇 jianfeng ma
  • 53 篇 yang yang
  • 49 篇 ma jianfeng
  • 45 篇 yixian yang
  • 43 篇 ding yong
  • 41 篇 zheng wei-shi
  • 38 篇 huang qingming
  • 31 篇 cong runmin
  • 31 篇 wang wei
  • 31 篇 hu yupu
  • 31 篇 yang yixian
  • 30 篇 zhang huanguo
  • 30 篇 xu an wang
  • 29 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 26 篇 min-ling zhang
  • 24 篇 liu xin
  • 24 篇 xinhong hei
  • 24 篇 xie xiaohua

语言

  • 7,143 篇 英文
  • 499 篇 其他
  • 278 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Computer Network and Information Security"
7901 条 记 录,以下是701-710 订阅
排序:
Verifiable searchable symmetric encryption for conjunctive keyword queries in cloud storage
收藏 引用
Frontiers of computer Science 2022年 第6期16卷 103-121页
作者: Qingqing GAN Joseph K.LIU Xiaoming WANG Xingliang YUAN Shi-Feng SUN Daxin HUANG Cong ZUO Jianfeng WANG Guangzhou Key Laboratory of Multilingual Intelligent Processing School of Information Science and Technology/School of Cyber SecurityGuangdong University of Foreign StudiesGuangzhou510006China Department of Computer Science Jinan UniversityGuangzhou510632China Faculty of Information Technology Monash UniversityClayton3168Australia State Key Laboratory of Integrated Service Networks(ISN) Xidian UniversityXi’an710071China
Searchable symmetric encryption(SSE)has been introduced for secure outsourcing the encrypted database to cloud storage,while maintaining searchable *** various SSE schemes,most of them assume the server is honest but ... 详细信息
来源: 评论
Civil Engineering Design in IoT: Leveraging Improved Swarm Intelligence Optimization  17
Civil Engineering Design in IoT: Leveraging Improved Swarm I...
收藏 引用
IEEE Congress on Cybermatics: 17th IEEE International Conference on Internet of Things, iThings 2024, 20th IEEE International Conference on Green Computing and Communications, GreenCom 2024, 17th IEEE International Conference on Cyber, Physical and Social Computing, CPSCom 2024, 10th IEEE International Conference on Smart Data, SmartData 2024
作者: Fu, Weiheng Chen, Rongzhong Chen, Kaiwen Xie, Xiaojun Fuzhou University College of Computer and Data Science Fuzhou China Xiamen Meteorological Bureau Xiamen Key Laboratory of Straits Meteorology Xiamen China Florida Transportarion Engineeeing Inc Roadway Design Department Punta Gorda United States Fuzhou University Zhicheng College Office of Network Security and Information Fuzhou China
Nowadays, swarm intelligence algorithms are used to solve various problem in IoT environments because of their excellent performance, and the particle swarm algorithm(PSO) is a superior algorithm in swarm intelligence... 详细信息
来源: 评论
OdCFU-Net for Brain Tumor Segmentation Based on MRI
OdCFU-Net for Brain Tumor Segmentation Based on MRI
收藏 引用
2024 IEEE International Conference on Computational Intelligence and Virtual Environments for Measurement Systems and Applications, CIVEMSA 2024
作者: Wu, Shang Yang, Sijing Li, Boyue Yin, Shimin Zhu, Jianming Li, Shiyong Chen, Zhencheng Guilin University of Electronic Science and Technology School of Computer and Information Security China School of Electronic Engineering and Automation Guilin University of Electronic Technology Guilin China Key Laboratory of Biomedical Sensors and Intelligent Instruments Guangxi Colleges and Universities Guilin China Guangxi Engineering Technology Research Center of Human-Physiological Information Noninvasive Detection Guilin China School of Computer and Information Security Guilin University of Electronic Science and Technology China
In the field of medical image analysis, the accurate segmentation of brain tumors plays a crucial role in the diagnosis and treatment of brain-related diseases. This study aims to address key challenges in this domain... 详细信息
来源: 评论
Edge-Based Resilient Consensus Control of Islanded Microgrids  1
Edge-Based Resilient Consensus Control of Islanded Microgrid...
收藏 引用
1st International Conference on Cyber-Energy Systems and Intelligent Energy, ICCSIE 2022
作者: Jiang, Yixin Xu, Peiming Xu, Wenqian Liang, Zhihong Yang, Yiwei Zhang, Yunan Huang, Kaitian Zhai, Meina Electric Power Research Institute Csg Guangdong Provincial Key Laboratory of Power System Network Security Guangdong Guangzhou China Northeastern University College of Information Science and Engineering Shenyang110819 China
We present a resilient output voltage recovery strategy for AC microgrids (MGs). In the presence of network attacks, distributed generators (DGs) may experience partial loss of effectiveness (PLOE) and bias faults in ... 详细信息
来源: 评论
Visible-Infrared Person Search: A Novel Benchmark and Solution  27th
Visible-Infrared Person Search: A Novel Benchmark and Solut...
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Chen, Hongxu Xiong, Jianghao Huang, Yuheng Xie, Xiaohua Lai, Jian-Huang School of Computer Science and Engineering Sun Yat-Sen University Guangzhou510006 China Guangzhou GRGBanking Equipment Co. Ltd. Guangzhou China Guangdong Key Laboratory of Information Security Technology Guangzhou510006 China
Person search aims to simultaneously localize and identify a query person from realistic and uncropped images, which consists of person detection and re-identification (Re-ID). Existing person search methods and datas... 详细信息
来源: 评论
Slew-Driven Layer Assignment for Advanced Non-default-rule Wires  20th
Slew-Driven Layer Assignment for Advanced Non-default-rule W...
收藏 引用
Proceedings of the 20th Web information Systems and Applications Conference, WISA 2023
作者: Lu, Ren Zhang, Wei Jiang, Lieqiu Liu, Genggeng College of Computer and Data Science Fuzhou University Fuzhou350116 China Key Laboratory of Network Computing and Intelligent Information Processing Fujian Province Fuzhou350116 China
With the rapid increase in circuit density in Very Large Scale Integration, the proportion of interconnect delay in circuit timing is also increasing. This makes the importance of layer assignment algorithms increasin... 详细信息
来源: 评论
Coverage-guided fuzz testing method based on reinforcement learning seed scheduling  4
Coverage-guided fuzz testing method based on reinforcement l...
收藏 引用
2024 4th International Conference on Artificial Intelligence and Industrial Technology Applications, AIITA 2024
作者: Tao, Jiaye Hong, Chao Fu, Yun Yang, Yiwei Wei, Lipeng Liang, Zhihong Liu, Junrong Information Centre of Guizhou Power Grid Co Guizhou China Electric Power Research Institute China Southern Power Grid Guangdong Guangzhou China Guangdong Provincial Key Laboratory of Power System Network Security Guangdong Guangzhou China
The existing fuzz testing methods for industrial control protocols suffer from insufficient coverage, false positives, and an inability to handle protocol semantics. This paper proposes a reinforcement learning-based ... 详细信息
来源: 评论
A Continuous Authentication Scheme for Digital Therapeutics Using Denoising Autoencoder  13
A Continuous Authentication Scheme for Digital Therapeutics ...
收藏 引用
13th International Conference on Communication and network security, ICCNS 2023
作者: Wang, Chengling Ma, Yunru Zhang, Yuexin Ye, Ayong Xu, Li College of Computer and Cyber Security Fujian Normal University Provincial Key Laboratory of Network Security and Cryptology Fuzhou China School of Health Fujian Medical University Fujian Provincial Collaborative Innovation Center of Geriatric Rehabilitation and Industry Promotion Fuzhou China
In healthcare, digital therapeutics provides users with better services in terms of preventing, managing and treating diseases. However, it is a non-trivial task to ensure the security of digital therapeutics. In some... 详细信息
来源: 评论
Community detection with attributed random walk via seed replacement
收藏 引用
Frontiers of computer Science 2022年 第5期16卷 45-56页
作者: Yang CHANG Huifang MA Liang CHANG Zhixin LI College of Computer Science and Engineering Northwest Normal UniversityLanzhou 730070China Guangxi Key Lab of Multi-source Information Mining and Security Guangxi Normal UniversityGuilin 541004China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic TechnologyGuilin 541004China
Community detection methods based on random walks are widely adopted in various network analysis *** could capture structures and attributed information while alleviating the issues of *** random walks on plain networ... 详细信息
来源: 评论
SCREADER: Prompting Large Language Models to Interpret scRNA-seq Data  24
SCREADER: Prompting Large Language Models to Interpret scRNA...
收藏 引用
24th IEEE International Conference on Data Mining Workshops, ICDMW 2024
作者: Li, Cong Long, Qingqing Zhou, Yuanchun Xiao, Meng Institute of Zoology Chinese Academy of Sciences State Key Laboratory of Stem Cell and Reproductive Biology China University of Chinese Academy of Sciences China Chinese Academy of Sciences Computer Network Information Center China
Large language models (LLMs) have demonstrated remarkable advancements, primarily due to their capabilities in modeling the hidden relationships within text sequences. This innovation presents a unique opportunity in ... 详细信息
来源: 评论