咨询与建议

限定检索结果

文献类型

  • 4,554 篇 会议
  • 3,358 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,920 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,257 篇 工学
    • 3,947 篇 计算机科学与技术...
    • 3,126 篇 软件工程
    • 1,326 篇 信息与通信工程
    • 642 篇 电气工程
    • 556 篇 控制科学与工程
    • 524 篇 电子科学与技术(可...
    • 445 篇 网络空间安全
    • 440 篇 生物工程
    • 301 篇 机械工程
    • 225 篇 仪器科学与技术
    • 224 篇 光学工程
    • 187 篇 生物医学工程(可授...
    • 165 篇 安全科学与工程
    • 151 篇 动力工程及工程热...
    • 147 篇 化学工程与技术
    • 126 篇 交通运输工程
    • 125 篇 建筑学
  • 2,286 篇 理学
    • 1,360 篇 数学
    • 504 篇 物理学
    • 477 篇 生物学
    • 419 篇 统计学(可授理学、...
    • 205 篇 系统科学
    • 166 篇 化学
  • 1,324 篇 管理学
    • 810 篇 管理科学与工程(可...
    • 567 篇 图书情报与档案管...
    • 294 篇 工商管理
  • 286 篇 法学
    • 169 篇 社会学
    • 115 篇 法学
  • 151 篇 医学
    • 125 篇 临床医学
  • 115 篇 经济学
    • 115 篇 应用经济学
  • 98 篇 军事学
  • 55 篇 农学
  • 46 篇 教育学
  • 24 篇 文学
  • 23 篇 艺术学

主题

  • 257 篇 feature extracti...
  • 233 篇 semantics
  • 215 篇 cryptography
  • 187 篇 authentication
  • 180 篇 information secu...
  • 177 篇 computational mo...
  • 164 篇 security
  • 163 篇 accuracy
  • 157 篇 protocols
  • 141 篇 deep learning
  • 138 篇 privacy
  • 136 篇 training
  • 123 篇 federated learni...
  • 122 篇 laboratories
  • 108 篇 data models
  • 100 篇 cloud computing
  • 98 篇 servers
  • 94 篇 data privacy
  • 92 篇 blockchain
  • 91 篇 public key crypt...

机构

  • 214 篇 key laboratory o...
  • 206 篇 shandong provinc...
  • 160 篇 school of comput...
  • 149 篇 state key labora...
  • 122 篇 school of comput...
  • 116 篇 school of cyber ...
  • 105 篇 department of co...
  • 100 篇 information secu...
  • 85 篇 key laboratory o...
  • 83 篇 institute of inf...
  • 72 篇 guangdong provin...
  • 67 篇 computer network...
  • 67 篇 university of ch...
  • 67 篇 state grid key l...
  • 64 篇 college of mathe...
  • 64 篇 peng cheng labor...
  • 60 篇 school of softwa...
  • 60 篇 school of comput...
  • 57 篇 shandong provinc...
  • 57 篇 key laboratory o...

作者

  • 56 篇 jianfeng ma
  • 53 篇 yang yang
  • 45 篇 ma jianfeng
  • 45 篇 yixian yang
  • 42 篇 ding yong
  • 41 篇 zheng wei-shi
  • 39 篇 huang qingming
  • 33 篇 yang yixian
  • 32 篇 hu yupu
  • 31 篇 cong runmin
  • 31 篇 wang wei
  • 31 篇 zhou deyu
  • 30 篇 zhang huanguo
  • 30 篇 xu an wang
  • 28 篇 wang bin
  • 27 篇 zhang minqing
  • 27 篇 xiaoming wu
  • 27 篇 xu li
  • 24 篇 liu xin
  • 24 篇 min-ling zhang

语言

  • 6,829 篇 英文
  • 862 篇 其他
  • 257 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Computer Network and Information Security"
7920 条 记 录,以下是771-780 订阅
排序:
Gray-scale transformation for traffic classification: leveraging local and global features in flow data  3
Gray-scale transformation for traffic classification: levera...
收藏 引用
3rd International Conference on Electronic information Engineering, Big Data, and computer Technology, EIBDCT 2024
作者: Xia, Yuchao Xue, Mutian Li, Wei Network and Data Security Key Laboratory of Sichuan Province School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China University of Electronic Science and Technology of China Chengdu China Sichuan University of Media and Communications Chengdu China
The rapid expansion and diversification of internet traffic pose a pressing demand for accurate classification of diverse application streams in network management and security monitoring. This paper introduces a deep... 详细信息
来源: 评论
Brainnetformer: Decoding Brain Cognitive States with Spatial-Temporal Cross Attention  48
Brainnetformer: Decoding Brain Cognitive States with Spatial...
收藏 引用
48th IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2023
作者: Sheng, Leheng Wang, Wenhan Shi, Zhiyi Zhan, Jichao Kong, Youyong Southeast University Chien-Shiung Wu College China Southeast University Jiangsu Provincial Joint International Research Laboratory of Medical Information Processing School of Computer Science and Engineering China Southeast University Ministry of Education Key Laboratory of Computer Network and Information Integration Nanjing China
Learning about the cognitive state of the brain has always been a popular topic. Based on the fact that fluctuations of brain signals and functional connectome (FC) relate to specific human behaviors, deep learning ba... 详细信息
来源: 评论
Data Dynamics Enabled Privacy-Preserving Public Batch Auditing in Cloud Storage
收藏 引用
Chinese Journal of Electronics 2025年 第2期23卷 297-301页
作者: Zhengwei Ren Lina Wang Qianhong Wu Ruyi Deng School of Computer Wuhan University Wuhan China Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education Wuhan China
Many schemes have been present to tackle data integrity and retrievability in cloud storage. Few of existing schemes support data dynamics, public verification and protect data privacy simultaneously. We propose a pub... 详细信息
来源: 评论
Demand Response Scheme: Achieving Sustainability in Distributed Data Processing  9
Demand Response Scheme: Achieving Sustainability in Distribu...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Zhai, Xueying Peng, Yunfeng Guo, Xiuping Zhang, Liang Zhang, Wei University of Science and Technology Beijing School of Computer and Communication Engineering Beijing China Beijing University of Posts and Telecommunications School of Economics and Management Beijing China Guizhou Institute of Technology Guizhou Key Laboratory of Electric Power Big Data Guizhou China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China
The rapid development of Internet of Things (IoT) technology has driven the intelligent transformation of various industries, including manufacturing, agriculture, and healthcare, etc., significantly enhancing their m... 详细信息
来源: 评论
Research on the Design of Government Data Governance Evaluation System under the Perspective of Digital Government  9
Research on the Design of Government Data Governance Evaluat...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Xu, Zirui Sun, Jinyang Lu, Zhe Han, Delong Qilu University of Technology Shandong Academy of Sciences Information Research Institute Shandong Academy of Sciences Jinan China SHANDONG SCICOM Information and Economy Research Institute Co. Ltd. Jinan China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China
In the context of the digital era, government data governance is a key factor in promoting the modernization of government governance, but there is a lack of a complete set of evaluation index system to standardize th... 详细信息
来源: 评论
Code Vulnerability Detection via Nearest Neighbor Mechanism
Code Vulnerability Detection via Nearest Neighbor Mechanism
收藏 引用
2022 Findings of the Association for Computational Linguistics: EMNLP 2022
作者: Du, Qianjin Kuang, Xiaohui Zhao, Gang Department of Computer Science and Technology Tsinghua University China National Key Laboratory of Science and Technology on Information System Security China
Code vulnerability detection is a fundamental and challenging task in the software security field. Existing research works aim to learn semantic information from the source code by utilizing NLP technologies. However,... 详细信息
来源: 评论
Reversible Data Hiding in Encrypted Images based on Classic McEliece Cryptosystem
Reversible Data Hiding in Encrypted Images based on Classic ...
收藏 引用
Image Processing, computer Vision and Machine Learning (ICICML), International Conference on
作者: Zongbao Jiang Minqing Zhang Fuqiang Di Weina Dong Key Laboratory of Network and Information Security of PAP Engineering University of PAP Xi’an China
Aiming at the problems that the security of traditional data hiding algorithms is difficult to be guaranteed and the existing algorithms’ embedded volume is restricted under quantum operation attacks, a reversible da...
来源: 评论
A Data security Protection Method for Deep Neural network Model Based on Mobility and Sharing  1
收藏 引用
18th International Conference on Green, Pervasive, and Cloud Computing, GPC 2023
作者: Zhao, Xinjian Li, Qianmu Wang, Qi Chen, Shi Li, Tengfei Li, Nianzhe State Grid Jiangsu Information and Telecommunication Company Jiangsu Nanjing210024 China School of Computer Science and Engineering Nanjing University of Science and Technology Jiangsu Nanjing210094 China State Grid Smart Grid Research Institute Co. Ltd. Jiangsu Nanjing210003 China State Grid Key Laboratory of Information and Network Security Jiangsu Nanjing210003 China
With the rapid development of digital economy, numerous business scenarios, such as smart grid, energy network, intelligent transportation, etc., require the design and distribution of deep neural network (DNN) models... 详细信息
来源: 评论
Oracles-Based Framework for Introducing Governance Entitlements Across DAOs  30th
Oracles-Based Framework for Introducing Governance Entitleme...
收藏 引用
30th International Conference on Computational and Experimental Engineering and Sciences, ICCES 2024
作者: Xu, Yuting Chen, Lin Yu, Xiang Liu, Kui Guangdong Key Laboratory of Blockchain Security Guangzhou University Guangzhou University Guangzhou510006 China School of Electronics and Information Engineering Taizhou University Taizhou318000 China Guangzhou University Technology Center of Network and Modern Education Technology Guangzhou Guangdong510006 China
With the arose of digital era, Decentralized Autonomous Organization (DAO), as the primary representatives of blockchain decentralized application organizational forms, have consistently showcased their autonomous gov... 详细信息
来源: 评论
Persuasion Should be Double-Blind: A Multi-Domain Dialogue Dataset With Faithfulness Based on Causal Theory of Mind
arXiv
收藏 引用
arXiv 2025年
作者: Zhang, Dingyi Zhou, Deyu School of Computer Science and Engineering Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University China
Persuasive dialogue plays a pivotal role in human communication, influencing various domains. Recent persuasive dialogue datasets often fail to align with real-world interpersonal interactions, leading to unfaithful r... 详细信息
来源: 评论