咨询与建议

限定检索结果

文献类型

  • 4,554 篇 会议
  • 3,358 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,920 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,257 篇 工学
    • 3,947 篇 计算机科学与技术...
    • 3,126 篇 软件工程
    • 1,326 篇 信息与通信工程
    • 642 篇 电气工程
    • 556 篇 控制科学与工程
    • 524 篇 电子科学与技术(可...
    • 445 篇 网络空间安全
    • 440 篇 生物工程
    • 301 篇 机械工程
    • 225 篇 仪器科学与技术
    • 224 篇 光学工程
    • 187 篇 生物医学工程(可授...
    • 165 篇 安全科学与工程
    • 151 篇 动力工程及工程热...
    • 147 篇 化学工程与技术
    • 126 篇 交通运输工程
    • 125 篇 建筑学
  • 2,286 篇 理学
    • 1,360 篇 数学
    • 504 篇 物理学
    • 477 篇 生物学
    • 419 篇 统计学(可授理学、...
    • 205 篇 系统科学
    • 166 篇 化学
  • 1,324 篇 管理学
    • 810 篇 管理科学与工程(可...
    • 567 篇 图书情报与档案管...
    • 294 篇 工商管理
  • 286 篇 法学
    • 169 篇 社会学
    • 115 篇 法学
  • 151 篇 医学
    • 125 篇 临床医学
  • 115 篇 经济学
    • 115 篇 应用经济学
  • 98 篇 军事学
  • 55 篇 农学
  • 46 篇 教育学
  • 24 篇 文学
  • 23 篇 艺术学

主题

  • 257 篇 feature extracti...
  • 233 篇 semantics
  • 215 篇 cryptography
  • 187 篇 authentication
  • 180 篇 information secu...
  • 177 篇 computational mo...
  • 164 篇 security
  • 163 篇 accuracy
  • 157 篇 protocols
  • 141 篇 deep learning
  • 138 篇 privacy
  • 136 篇 training
  • 123 篇 federated learni...
  • 122 篇 laboratories
  • 108 篇 data models
  • 100 篇 cloud computing
  • 98 篇 servers
  • 94 篇 data privacy
  • 92 篇 blockchain
  • 91 篇 public key crypt...

机构

  • 214 篇 key laboratory o...
  • 206 篇 shandong provinc...
  • 160 篇 school of comput...
  • 149 篇 state key labora...
  • 122 篇 school of comput...
  • 116 篇 school of cyber ...
  • 105 篇 department of co...
  • 100 篇 information secu...
  • 85 篇 key laboratory o...
  • 83 篇 institute of inf...
  • 72 篇 guangdong provin...
  • 67 篇 computer network...
  • 67 篇 university of ch...
  • 67 篇 state grid key l...
  • 64 篇 college of mathe...
  • 64 篇 peng cheng labor...
  • 60 篇 school of softwa...
  • 60 篇 school of comput...
  • 57 篇 shandong provinc...
  • 57 篇 key laboratory o...

作者

  • 56 篇 jianfeng ma
  • 53 篇 yang yang
  • 45 篇 ma jianfeng
  • 45 篇 yixian yang
  • 42 篇 ding yong
  • 41 篇 zheng wei-shi
  • 39 篇 huang qingming
  • 33 篇 yang yixian
  • 32 篇 hu yupu
  • 31 篇 cong runmin
  • 31 篇 wang wei
  • 31 篇 zhou deyu
  • 30 篇 zhang huanguo
  • 30 篇 xu an wang
  • 28 篇 wang bin
  • 27 篇 zhang minqing
  • 27 篇 xiaoming wu
  • 27 篇 xu li
  • 24 篇 liu xin
  • 24 篇 min-ling zhang

语言

  • 6,829 篇 英文
  • 862 篇 其他
  • 257 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Computer Network and Information Security"
7920 条 记 录,以下是781-790 订阅
排序:
Anti-interference Intelligent Decision-making Technology Based on Deep Reinforcement Learning
Anti-interference Intelligent Decision-making Technology Bas...
收藏 引用
IEEE International Conference on information Communication and Signal Processing (ICICSP)
作者: Shuo Ma Haitao Xiao Qinyao Li Linkun Ma The Key Laboratory of Intelligent Network and Network Security Ministry of Education China School of Information and Communication Engineering Xi'an Jiaotong University Xi'an China
In recent years, with the rapid development of wireless communication technology in the military field and the proliferation of the number of various types of wireless communication devices, the battlefield electromag... 详细信息
来源: 评论
Reversible Data Hiding Algorithm in Encrypted Domain Based on Matrix Secret Sharing
Reversible Data Hiding Algorithm in Encrypted Domain Based o...
收藏 引用
Electronics and Communication, network and computer Technology (ECNCT), International Conference on
作者: Zongbao Jiang Minqing Zhang Yan Ke Chao Jiang Key Laboratory of Network and Information Security of PAP Engineering University of PAP Xi 'an China
Focused on the problems of user privacy disclosure and ciphertext data management in cloud service environment, this paper proposes a reversible data hiding algorithm in encrypted domain based on matrix secret sharing...
来源: 评论
SF-DETR: A Road Small Target Detection Model Based on RTDETR
SF-DETR: A Road Small Target Detection Model Based on RTDETR
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Jianhua Gao Jiazheng Man Chunlin Zhao Xiaoming Wu Xiangzhi Liu Huomin Dong Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China Shandong Shanke Intelligent Technology Co. Ltd
As a part of computer vision, object detection is crucial for traffic management, emergency response, autonomous driving vehicles, and smart cities. Despite significant progress in object detection, detecting small ob... 详细信息
来源: 评论
A DoS-attack Resilient Control Approach for AIOT-enabled Systems
A DoS-attack Resilient Control Approach for AIOT-enabled Sys...
收藏 引用
2023 International Conference on Artificial Intelligence of Things and Systems, AIoTSys 2023
作者: Cao, Xiaoya Chen, Zhenya Liu, Weisheng Liu, Yuanlong Wang, Wenting Wang, Xin Yang, Ming Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China State Grid Shandong Electric Power Company Jinan China State Grid Shandong Electric Power Research Institute Jinan China
This paper presents a novel controller design for dealing with the challenges posed by Denial-of-Service (DoS) attacks in the context of Artificial Intelligence of Things (AIOT). The proposed design employs a predicti... 详细信息
来源: 评论
Privacy-Enhanced Role-Based Access Control for IoT Systems
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Zhang, Yawei Chen, Lanxiang Zhu, Yizhao Fujian Normal University Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fuzhou350117 China City University of Macau Faculty of Data Science China
Unauthorized accessing private information poses a significant security risk in IoT. Although role-based access control can partially address the problem, there is a lack of studies on protecting the privacy of roles.... 详细信息
来源: 评论
Research on power grid equipment disaster loss model based on "strong wind and heavy rain"combined disaster  2
Research on power grid equipment disaster loss model based o...
收藏 引用
2nd International Conference on Smart Grids and Energy Systems, SGES 2023
作者: Zhang, Zehao Wang, Tianyu Li, Jingshi Feng, Jie Guan, Cheng Yan, Yiran State Grid Key Laboratory of Information & Network Security State Grid Smart Grid Research Institute Co. LTD Beijing102206 China State Grid Corporation of China Beijing100031 China
This paper comprehensively considers the evolution characteristics and recurrence laws of urban power grid complex disasters, studies the superimposed amplified damage effects of natural disasters of different causes ... 详细信息
来源: 评论
An Intelligent Routing Decision-Making Technique Based on DQN for MANETs
An Intelligent Routing Decision-Making Technique Based on DQ...
收藏 引用
IEEE International Conference on information Communication and Signal Processing (ICICSP)
作者: Qinyao Li Haitao Xiao Shuo Ma Linkun Ma The Key Laboratory of intelligent network and network security Ministry of Education China School of Information and Communication Engineering Xi'an Jiaotong University Xi'an China
The rapid advancement and utilization of Mobile Ad Hoc networks(MANETs) have led to the widespread application of deep learning in intelligent routing issues. While current intelligent routing algorithms concentrate o... 详细信息
来源: 评论
Multimodal Multi-objective Particle Swarm Optimization Algorithm Based on Multi-directional Guidance  4
Multimodal Multi-objective Particle Swarm Optimization Algor...
收藏 引用
4th International Conference on High Performance Big Data and Intelligent Systems, HDIS 2022
作者: Li, Wei Gao, Yetong Wang, Lei School of Computer Science and Engineering Xi'an University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China
In multimodal multi-objective optimization, the key issue is to find as many Pareto optimal solutions as possible and select promising solutions in the environmental selection. This paper proposes a multimodal multi-o... 详细信息
来源: 评论
Privacy protection oriented on data stream computing
Privacy protection oriented on data stream computing
收藏 引用
2022 International Conference on computer Application and information security, ICCAIS 2022
作者: He, Renjie Zheng, Xianghan Wang, Gong School of Computer and Big Data Fuzhou University Fujian Fuzhou China The Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fujian Fuzhou China
Data security has always been one of the public concerns, and homomorphic encryption technology, as one of the effective means to ensure data security, has always been a hot topic of academic research. Traditional mac... 详细信息
来源: 评论
Cross-Chain Identity Authentication Protocol based on Group Signature and Zero-Knowledge Proof
Cross-Chain Identity Authentication Protocol based on Group ...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Shujiang Xu Duanzhen Li Lianhai Wang Miodrag J. Mihaljević Shuhui Zhang Wei Shao Qizheng Wang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan PR China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan PR China Serbian Academy of Sciences and Arts Mathematical Institute Belgrade Serbia
Cross-chain interaction plays a crucial role in enhancing asset circulation and data sharing across diverse blockchain systems. Cross-chain identity authentication is the primary pre-requisite of cross-chain security ... 详细信息
来源: 评论