咨询与建议

限定检索结果

文献类型

  • 4,506 篇 会议
  • 3,387 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,901 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,299 篇 工学
    • 3,983 篇 计算机科学与技术...
    • 3,164 篇 软件工程
    • 1,348 篇 信息与通信工程
    • 653 篇 电气工程
    • 561 篇 控制科学与工程
    • 523 篇 电子科学与技术(可...
    • 449 篇 网络空间安全
    • 440 篇 生物工程
    • 301 篇 机械工程
    • 233 篇 光学工程
    • 224 篇 仪器科学与技术
    • 188 篇 生物医学工程(可授...
    • 165 篇 安全科学与工程
    • 151 篇 动力工程及工程热...
    • 148 篇 化学工程与技术
    • 127 篇 交通运输工程
    • 126 篇 建筑学
  • 2,310 篇 理学
    • 1,377 篇 数学
    • 504 篇 物理学
    • 479 篇 生物学
    • 428 篇 统计学(可授理学、...
    • 206 篇 系统科学
    • 166 篇 化学
  • 1,338 篇 管理学
    • 818 篇 管理科学与工程(可...
    • 576 篇 图书情报与档案管...
    • 297 篇 工商管理
  • 289 篇 法学
    • 168 篇 社会学
    • 119 篇 法学
  • 154 篇 医学
    • 127 篇 临床医学
  • 116 篇 经济学
    • 116 篇 应用经济学
  • 99 篇 军事学
  • 55 篇 农学
  • 46 篇 教育学
  • 24 篇 文学
  • 23 篇 艺术学

主题

  • 238 篇 feature extracti...
  • 229 篇 semantics
  • 216 篇 cryptography
  • 184 篇 authentication
  • 181 篇 information secu...
  • 163 篇 computational mo...
  • 158 篇 security
  • 152 篇 protocols
  • 144 篇 accuracy
  • 141 篇 deep learning
  • 138 篇 privacy
  • 122 篇 laboratories
  • 121 篇 training
  • 103 篇 data models
  • 100 篇 federated learni...
  • 99 篇 cloud computing
  • 94 篇 servers
  • 92 篇 public key crypt...
  • 92 篇 blockchain
  • 89 篇 data privacy

机构

  • 204 篇 shandong provinc...
  • 178 篇 key laboratory o...
  • 164 篇 school of comput...
  • 152 篇 state key labora...
  • 113 篇 school of comput...
  • 111 篇 school of cyber ...
  • 106 篇 department of co...
  • 98 篇 information secu...
  • 83 篇 key laboratory o...
  • 81 篇 institute of inf...
  • 69 篇 guangdong provin...
  • 68 篇 computer network...
  • 66 篇 university of ch...
  • 64 篇 college of mathe...
  • 64 篇 state grid key l...
  • 63 篇 peng cheng labor...
  • 60 篇 key laboratory o...
  • 59 篇 school of softwa...
  • 56 篇 school of comput...
  • 54 篇 key laboratory o...

作者

  • 55 篇 jianfeng ma
  • 53 篇 yang yang
  • 49 篇 ma jianfeng
  • 45 篇 yixian yang
  • 43 篇 ding yong
  • 41 篇 zheng wei-shi
  • 38 篇 huang qingming
  • 31 篇 cong runmin
  • 31 篇 wang wei
  • 31 篇 hu yupu
  • 31 篇 yang yixian
  • 30 篇 zhang huanguo
  • 30 篇 xu an wang
  • 29 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 26 篇 min-ling zhang
  • 24 篇 liu xin
  • 24 篇 xinhong hei
  • 24 篇 xie xiaohua

语言

  • 7,143 篇 英文
  • 499 篇 其他
  • 278 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Computer Network and Information Security"
7901 条 记 录,以下是761-770 订阅
排序:
Privacy protection oriented on data stream computing
Privacy protection oriented on data stream computing
收藏 引用
2022 International Conference on computer Application and information security, ICCAIS 2022
作者: He, Renjie Zheng, Xianghan Wang, Gong School of Computer and Big Data Fuzhou University Fujian Fuzhou China The Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fujian Fuzhou China
Data security has always been one of the public concerns, and homomorphic encryption technology, as one of the effective means to ensure data security, has always been a hot topic of academic research. Traditional mac... 详细信息
来源: 评论
Research on Text Mining Technology for Power Grid Safety Hazard Identification
Research on Text Mining Technology for Power Grid Safety Haz...
收藏 引用
2023 IEEE International Conference on Electrical, Automation and computer Engineering, ICEACE 2023
作者: Guo, Yusong Dai, Caiyan Wang, Junliang Feng, Jie State Grid Smart Grid Research Institute Co. Ltd State Grid Key Laboratory of Information & Network Security Beijing China Beijing China State Grid Corporation of China Beijing China
Text data mining and analysis for power grid safety hidden danger files, and in-depth study of power grid hidden danger investigation standards and norms, can help power grid enterprises to carry out hidden danger man... 详细信息
来源: 评论
A Unified Stream and Batch Graph Computing Model for Community Detection  17th
A Unified Stream and Batch Graph Computing Model for Commu...
收藏 引用
17th CCF Conference on computer Supported Cooperative Work and Social Computing, ChineseCSCW 2022
作者: Dai, Jinkun Wu, Ling Guo, Kun Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou350108 China College of Computer and Data Science Fuzhou University Fuzhou350108 China Key Laboratory of Spatial Data Mining and Information Sharing Ministry of Education Fuzhou350108 China
An essential challenge in graph data analysis and mining is to simply and effectively deal with large-scale network data that is expanding dynamically. Although batch-based parallel graph computation frameworks have b... 详细信息
来源: 评论
Efficient Private Circuits with Precomputation
IACR Transactions on Cryptographic Hardware and Embedded Sys...
收藏 引用
IACR Transactions on Cryptographic Hardware and Embedded Systems 2023年 第2期2023卷 286-309页
作者: Wang, Weijia Ji, Fanjie Zhang, Juelin Yu, Yu School of Cyber Science and Technology Shandong University Qingdao China Key Laboratory of Cryptologic Technology and Information Security Ministry of Education Shandong University Qingdao China Quan Cheng Shandong Laboratory Jinan China Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai China Shanghai Qi Zhi Institute Shanghai China Shanghai Key Laboratory of Privacy-Preserving Computation Shanghai China
At CHES 2022, Wang et al. described a new paradigm for masked implementations using private circuits, where most intermediates can be precomputed before the input shares are accessed, significantly accelerating the on... 详细信息
来源: 评论
Block-Streaming Service Loading Optimization of Android Dalvik Executable File for Cloud-End Collaboration
Block-Streaming Service Loading Optimization of Android Dalv...
收藏 引用
2022 International Conference on networking and network Applications, NaNA 2022
作者: Wang, Yichuan Feng, Yanhua Du, Yanning Hei, Xinhong Tian, Yuying Cui, Xiangjie School of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China
In recent years, dynamic loading technologies of Android applications have emerged in an endless stream. At present, the existing Android application loading method is to load the entire Android Dalvik Executable (DEX... 详细信息
来源: 评论
Quantum K-Means Model based on Optimization Framework
Quantum K-Means Model based on Optimization Framework
收藏 引用
2023 Asia-Pacific Conference on Image Processing, Electronics and computers, IPEC 2023
作者: Shao, Zexiang Zhang, Shibin Kumar, Sachin School of Cyberspace Security Chengdu University of Information Technology Chengdu610225 China Sichuan Key Laboratory of Advanced Cryptography and System Security Chengdu610225 China Ajay Kumar Garg Engineering College Department of Computer Science and Engineering India
The Quantum K-means clustering algorithm offers the advantage of quantum parallel computing, but suffers from issues related to cluster center initialization and sensitivity to noisy data due to its similarity with th... 详细信息
来源: 评论
Design and implementation of content confidentiality check system  3
Design and implementation of content confidentiality check s...
收藏 引用
3rd International Conference on Electronic information Engineering, Big Data, and computer Technology, EIBDCT 2024
作者: Song, Yanyan Chen, Menghong Pi, Chunying Nie, Peng College of Computer Science Nankai University Tianjin300350 China College of Cyber Science Nankai University Tianjin300350 China College of Cyber Science Tianjin Key Laboratory of Network and Data Security Technology Nankai University Tianjin300350 China
Nowadays, companies use databases for information storage and it is inevitable that there will be confidential information which can cause severe crises and public relations problems if leaked. In order to solve this ... 详细信息
来源: 评论
A Multidimensional Adaptive Perception Model for security Contraband Detection
SSRN
收藏 引用
SSRN 2023年
作者: Bian, Weixin Feng, Luo Xu, Deqin Jie, Biao Huang, Yi The School of Computer and Information Anhui Normal University Wuhu241002 China Anhui Province Key Laboratory of Network and Information Security Wuhu241002 China
Identifying prohibited items in security X-ray images is a challenging task. Since prohibited items may be intentionally concealed, and the background of X-ray images is complex and the image representation ability is... 详细信息
来源: 评论
Research on iOS Remote security Access Technology Based on Zero Trust  6
Research on iOS Remote Security Access Technology Based on Z...
收藏 引用
6th IEEE information Technology and Mechatronics Engineering Conference, ITOEC 2022
作者: Fang, Wengao Guan, Xiaojuan Global Energy Interconnection Research Institute Co. Ltd State Grid Key Laboratory of Information Network Security Information Communication Department Jiangsu Province Nanjing China
Under the situation of regular epidemic prevention and control, teleworking has gradually become a normal working mode. With the development of modern information technologies such as big data, cloud computing and mob... 详细信息
来源: 评论
OpenViewer: Openness-Aware Multi-View Learning
arXiv
收藏 引用
arXiv 2024年
作者: Du, Shide Fang, Zihan Tan, Yanchao Wang, Changwei Wang, Shiping Guo, Wenzhong College of Computer and Data Science Fuzhou University Fuzhou China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Jinan China
Multi-view learning methods leverage multiple data sources to enhance perception by mining correlations across views, typically relying on predefined categories. However, deploying these models in real-world scenarios... 详细信息
来源: 评论