咨询与建议

限定检索结果

文献类型

  • 4,506 篇 会议
  • 3,387 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,901 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,299 篇 工学
    • 3,983 篇 计算机科学与技术...
    • 3,164 篇 软件工程
    • 1,348 篇 信息与通信工程
    • 653 篇 电气工程
    • 561 篇 控制科学与工程
    • 523 篇 电子科学与技术(可...
    • 449 篇 网络空间安全
    • 440 篇 生物工程
    • 301 篇 机械工程
    • 233 篇 光学工程
    • 224 篇 仪器科学与技术
    • 188 篇 生物医学工程(可授...
    • 165 篇 安全科学与工程
    • 151 篇 动力工程及工程热...
    • 148 篇 化学工程与技术
    • 127 篇 交通运输工程
    • 126 篇 建筑学
  • 2,310 篇 理学
    • 1,377 篇 数学
    • 504 篇 物理学
    • 479 篇 生物学
    • 428 篇 统计学(可授理学、...
    • 206 篇 系统科学
    • 166 篇 化学
  • 1,338 篇 管理学
    • 818 篇 管理科学与工程(可...
    • 576 篇 图书情报与档案管...
    • 297 篇 工商管理
  • 289 篇 法学
    • 168 篇 社会学
    • 119 篇 法学
  • 154 篇 医学
    • 127 篇 临床医学
  • 116 篇 经济学
    • 116 篇 应用经济学
  • 99 篇 军事学
  • 55 篇 农学
  • 46 篇 教育学
  • 24 篇 文学
  • 23 篇 艺术学

主题

  • 238 篇 feature extracti...
  • 229 篇 semantics
  • 216 篇 cryptography
  • 184 篇 authentication
  • 181 篇 information secu...
  • 163 篇 computational mo...
  • 158 篇 security
  • 152 篇 protocols
  • 144 篇 accuracy
  • 141 篇 deep learning
  • 138 篇 privacy
  • 122 篇 laboratories
  • 121 篇 training
  • 103 篇 data models
  • 100 篇 federated learni...
  • 99 篇 cloud computing
  • 94 篇 servers
  • 92 篇 public key crypt...
  • 92 篇 blockchain
  • 89 篇 data privacy

机构

  • 204 篇 shandong provinc...
  • 178 篇 key laboratory o...
  • 164 篇 school of comput...
  • 152 篇 state key labora...
  • 113 篇 school of comput...
  • 111 篇 school of cyber ...
  • 106 篇 department of co...
  • 98 篇 information secu...
  • 83 篇 key laboratory o...
  • 81 篇 institute of inf...
  • 69 篇 guangdong provin...
  • 68 篇 computer network...
  • 66 篇 university of ch...
  • 64 篇 college of mathe...
  • 64 篇 state grid key l...
  • 63 篇 peng cheng labor...
  • 60 篇 key laboratory o...
  • 59 篇 school of softwa...
  • 56 篇 school of comput...
  • 54 篇 key laboratory o...

作者

  • 55 篇 jianfeng ma
  • 53 篇 yang yang
  • 49 篇 ma jianfeng
  • 45 篇 yixian yang
  • 43 篇 ding yong
  • 41 篇 zheng wei-shi
  • 38 篇 huang qingming
  • 31 篇 cong runmin
  • 31 篇 wang wei
  • 31 篇 hu yupu
  • 31 篇 yang yixian
  • 30 篇 zhang huanguo
  • 30 篇 xu an wang
  • 29 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 26 篇 min-ling zhang
  • 24 篇 liu xin
  • 24 篇 xinhong hei
  • 24 篇 xie xiaohua

语言

  • 7,143 篇 英文
  • 499 篇 其他
  • 278 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Computer Network and Information Security"
7901 条 记 录,以下是741-750 订阅
排序:
Data Dynamics Enabled Privacy-Preserving Public Batch Auditing in Cloud Storage
收藏 引用
Chinese Journal of Electronics 2025年 第2期23卷 297-301页
作者: Zhengwei Ren Lina Wang Qianhong Wu Ruyi Deng School of Computer Wuhan University Wuhan China Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education Wuhan China
Many schemes have been present to tackle data integrity and retrievability in cloud storage. Few of existing schemes support data dynamics, public verification and protect data privacy simultaneously. We propose a pub... 详细信息
来源: 评论
MCFTNet: Multimodal Cross-Layer Fusion Transformer network for Hyperspectral and LiDAR Data Classification
收藏 引用
IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing 2025年 18卷 12803-12818页
作者: Huang, Wei Wu, Tianren Zhang, Xueyu Li, Liangliang Lv, Ming Jia, Zhenhong Zhao, Xiaobin Ma, Hongbing Vivone, Gemine Xinjiang University School of Computer Science and Technology Urumqi830017 China Xinjiang University Key Laboratory of Signal Detection and Processing Urumqi830017 China Guangxi University School of Computer and Electronic Information Nanning530004 China Guangxi University Guangxi Key Laboratory of Multimedia Communications and Network Technology Nanning530004 China Beijing Institute of Technology School of Information and Electronics Beijing100081 China University of Science and Technology Beijing School of Computer and Communication Engineering Beijing100083 China Tsinghua University Department of Electronic Engineering Beijing100084 China National Research Council Tito85050 Italy National Biodiversity Future Center NBFC Palermo90133 Italy
Remote sensing image classification is a popular yet challenging field. Many researchers have combined convolutional neural networks (CNNs) and Transformers for hyperspectral imaging (HSI) classification tasks. Howeve... 详细信息
来源: 评论
Efficient and Revocable Anonymous Account Guarantee System Based on Blockchain  19th
Efficient and Revocable Anonymous Account Guarantee System ...
收藏 引用
19th EAI International Conference on Collaborative Computing: networking, Applications and Worksharing, CollaborateCom 2023
作者: Liang, Weiyou Wang, Yujue Ding, Yong Liang, Hai Yang, Changsong Wang, Huiyong Guangxi Key Laboratory of Cryptography and Information Security School of Computer Science and Information Security Guilin University of Electronic Technology Guilin China Hangzhou Innovation Institute of Beihang University Hangzhou China School of Mathematics and Computing Science GuilinUniversity of Electronic Technology Guilin China Institute of Cyberspace Technology HKCT Institute for Higher Education Hong Kong
The fast expansion of information technology and public concern for personal privacy and security have raised expectations for the authentication process. Although existing anonymous authentication schemes can achieve... 详细信息
来源: 评论
Code Vulnerability Detection via Nearest Neighbor Mechanism
Code Vulnerability Detection via Nearest Neighbor Mechanism
收藏 引用
2022 Findings of the Association for Computational Linguistics: EMNLP 2022
作者: Du, Qianjin Kuang, Xiaohui Zhao, Gang Department of Computer Science and Technology Tsinghua University China National Key Laboratory of Science and Technology on Information System Security China
Code vulnerability detection is a fundamental and challenging task in the software security field. Existing research works aim to learn semantic information from the source code by utilizing NLP technologies. However,... 详细信息
来源: 评论
Gray-scale transformation for traffic classification: leveraging local and global features in flow data  3
Gray-scale transformation for traffic classification: levera...
收藏 引用
3rd International Conference on Electronic information Engineering, Big Data, and computer Technology, EIBDCT 2024
作者: Xia, Yuchao Xue, Mutian Li, Wei Network and Data Security Key Laboratory of Sichuan Province School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China University of Electronic Science and Technology of China Chengdu China Sichuan University of Media and Communications Chengdu China
The rapid expansion and diversification of internet traffic pose a pressing demand for accurate classification of diverse application streams in network management and security monitoring. This paper introduces a deep... 详细信息
来源: 评论
Oracles-Based Framework for Introducing Governance Entitlements Across DAOs  30th
Oracles-Based Framework for Introducing Governance Entitleme...
收藏 引用
30th International Conference on Computational and Experimental Engineering and Sciences, ICCES 2024
作者: Xu, Yuting Chen, Lin Yu, Xiang Liu, Kui Guangdong Key Laboratory of Blockchain Security Guangzhou University Guangzhou University Guangzhou510006 China School of Electronics and Information Engineering Taizhou University Taizhou318000 China Guangzhou University Technology Center of Network and Modern Education Technology Guangzhou Guangdong510006 China
With the arose of digital era, Decentralized Autonomous Organization (DAO), as the primary representatives of blockchain decentralized application organizational forms, have consistently showcased their autonomous gov... 详细信息
来源: 评论
Research on power grid equipment disaster loss model based on "strong wind and heavy rain"combined disaster  2
Research on power grid equipment disaster loss model based o...
收藏 引用
2nd International Conference on Smart Grids and Energy Systems, SGES 2023
作者: Zhang, Zehao Wang, Tianyu Li, Jingshi Feng, Jie Guan, Cheng Yan, Yiran State Grid Key Laboratory of Information & Network Security State Grid Smart Grid Research Institute Co. LTD Beijing102206 China State Grid Corporation of China Beijing100031 China
This paper comprehensively considers the evolution characteristics and recurrence laws of urban power grid complex disasters, studies the superimposed amplified damage effects of natural disasters of different causes ... 详细信息
来源: 评论
Persuasion Should be Double-Blind: A Multi-Domain Dialogue Dataset With Faithfulness Based on Causal Theory of Mind
arXiv
收藏 引用
arXiv 2025年
作者: Zhang, Dingyi Zhou, Deyu School of Computer Science and Engineering Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University China
Persuasive dialogue plays a pivotal role in human communication, influencing various domains. Recent persuasive dialogue datasets often fail to align with real-world interpersonal interactions, leading to unfaithful r... 详细信息
来源: 评论
A Data security Protection Method for Deep Neural network Model Based on Mobility and Sharing  1
收藏 引用
18th International Conference on Green, Pervasive, and Cloud Computing, GPC 2023
作者: Zhao, Xinjian Li, Qianmu Wang, Qi Chen, Shi Li, Tengfei Li, Nianzhe State Grid Jiangsu Information and Telecommunication Company Jiangsu Nanjing210024 China School of Computer Science and Engineering Nanjing University of Science and Technology Jiangsu Nanjing210094 China State Grid Smart Grid Research Institute Co. Ltd. Jiangsu Nanjing210003 China State Grid Key Laboratory of Information and Network Security Jiangsu Nanjing210003 China
With the rapid development of digital economy, numerous business scenarios, such as smart grid, energy network, intelligent transportation, etc., require the design and distribution of deep neural network (DNN) models... 详细信息
来源: 评论
Reversible Data Hiding in Encrypted Images based on Classic McEliece Cryptosystem
Reversible Data Hiding in Encrypted Images based on Classic ...
收藏 引用
Image Processing, computer Vision and Machine Learning (ICICML), International Conference on
作者: Zongbao Jiang Minqing Zhang Fuqiang Di Weina Dong Key Laboratory of Network and Information Security of PAP Engineering University of PAP Xi’an China
Aiming at the problems that the security of traditional data hiding algorithms is difficult to be guaranteed and the existing algorithms’ embedded volume is restricted under quantum operation attacks, a reversible da...
来源: 评论