咨询与建议

限定检索结果

文献类型

  • 4,554 篇 会议
  • 3,369 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,931 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,258 篇 工学
    • 3,946 篇 计算机科学与技术...
    • 3,125 篇 软件工程
    • 1,325 篇 信息与通信工程
    • 641 篇 电气工程
    • 556 篇 控制科学与工程
    • 522 篇 电子科学与技术(可...
    • 445 篇 网络空间安全
    • 440 篇 生物工程
    • 301 篇 机械工程
    • 226 篇 光学工程
    • 225 篇 仪器科学与技术
    • 187 篇 生物医学工程(可授...
    • 165 篇 安全科学与工程
    • 151 篇 动力工程及工程热...
    • 147 篇 化学工程与技术
    • 126 篇 交通运输工程
    • 125 篇 建筑学
  • 2,286 篇 理学
    • 1,359 篇 数学
    • 504 篇 物理学
    • 477 篇 生物学
    • 418 篇 统计学(可授理学、...
    • 205 篇 系统科学
    • 166 篇 化学
  • 1,324 篇 管理学
    • 810 篇 管理科学与工程(可...
    • 567 篇 图书情报与档案管...
    • 294 篇 工商管理
  • 286 篇 法学
    • 169 篇 社会学
    • 115 篇 法学
  • 151 篇 医学
    • 125 篇 临床医学
  • 115 篇 经济学
    • 115 篇 应用经济学
  • 98 篇 军事学
  • 55 篇 农学
  • 46 篇 教育学
  • 24 篇 文学
  • 23 篇 艺术学

主题

  • 255 篇 feature extracti...
  • 233 篇 semantics
  • 212 篇 cryptography
  • 187 篇 authentication
  • 180 篇 information secu...
  • 177 篇 computational mo...
  • 166 篇 accuracy
  • 164 篇 security
  • 155 篇 protocols
  • 141 篇 deep learning
  • 141 篇 privacy
  • 133 篇 training
  • 126 篇 federated learni...
  • 122 篇 laboratories
  • 109 篇 data models
  • 101 篇 cloud computing
  • 98 篇 servers
  • 93 篇 data privacy
  • 93 篇 blockchain
  • 91 篇 public key crypt...

机构

  • 215 篇 key laboratory o...
  • 207 篇 shandong provinc...
  • 160 篇 school of comput...
  • 152 篇 state key labora...
  • 116 篇 school of cyber ...
  • 116 篇 school of comput...
  • 106 篇 department of co...
  • 99 篇 information secu...
  • 85 篇 key laboratory o...
  • 83 篇 institute of inf...
  • 71 篇 guangdong provin...
  • 67 篇 computer network...
  • 67 篇 university of ch...
  • 64 篇 college of mathe...
  • 64 篇 peng cheng labor...
  • 63 篇 state grid key l...
  • 60 篇 school of softwa...
  • 58 篇 school of comput...
  • 56 篇 shandong provinc...
  • 54 篇 key laboratory o...

作者

  • 56 篇 jianfeng ma
  • 53 篇 yang yang
  • 45 篇 ma jianfeng
  • 45 篇 yixian yang
  • 42 篇 ding yong
  • 41 篇 zheng wei-shi
  • 39 篇 huang qingming
  • 31 篇 cong runmin
  • 31 篇 wang wei
  • 31 篇 xu an wang
  • 31 篇 hu yupu
  • 31 篇 yang yixian
  • 30 篇 zhang huanguo
  • 28 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 27 篇 xiaoming wu
  • 26 篇 min-ling zhang
  • 24 篇 liu xin
  • 24 篇 xinhong hei

语言

  • 6,839 篇 英文
  • 863 篇 其他
  • 257 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Computer Network and Information Security"
7931 条 记 录,以下是831-840 订阅
排序:
Research and Implementation of Electric Topology Intelligent Checking System Based on Graph Computing  7
Research and Implementation of Electric Topology Intelligent...
收藏 引用
7th International Conference on Intelligent, Interactive Systems and Applications, IISA2022
作者: Qiao, Junfeng Pan, Sen Yang, Pei State Grid Key Laboratory of Information and Network Security State Grid Smart Grid Research Institute Co.Ltd Nanjing210003 China
The information system of low-voltage distribution network correctly records the topological structure of distribution network, which is the premise of fine management and safe operation of electric power *** the topo... 详细信息
来源: 评论
Fair and Verifiable Identity-Based Broadcast Proxy Re-Encryption With Designated Sender Feasible for Medical Internet of Things
收藏 引用
IEEE Transactions on information Forensics and security 2025年 20卷 6033-6045页
作者: Liqing Chen Shiyu Chen Hao Zhang Jian Weng Faculty of Computer and Software Engineering Huaiyin Institute of Technology Huai’an Jiangsu China Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou Fujian China College of Information Science and Technology Jinan University Guangzhou Guangdong China
With the development of big data, cloud computing is widely used by individual and enterprise users due to its powerful computing and storage capabilities. How to share the encrypted data stored in cloud servers flexi... 详细信息
来源: 评论
A New Joint Source-Channel Coding Scheme with Overlay Spread Spectrum Transmission  15
A New Joint Source-Channel Coding Scheme with Overlay Spread...
收藏 引用
15th IEEE International Conference on Wireless Communications and Signal Processing, WCSP 2023
作者: Chen, Yanzhi Liang, Jifan Wang, Qianfan Ma, Xiao School of Computer Science and Engineering Sun Yat-sen University Guangzhou 510006 China Guangdong Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou 510006 China
In this paper, we propose a new joint source-channel coding (JSCC) scheme, especially in conjunction with overlay spread spectrum transmission. At the transmitter, a source sequence is redescribed by classified enumer... 详细信息
来源: 评论
Improving Performance of LDPC-Coded Links via Partial Superposition Retransmission
收藏 引用
Journal of Communications and information networks 2022年 第3期7卷 259-268页
作者: Yinchu Wang Qianfan Wang Ming Jiang Xiao Ma School of Computer Science and Engineering Sun Yat-sen UniversityGuangzhou 510006China Guangdong Key Laboratory of Information Security Technology Sun Yat-sen UniversityGuangzhou 510006China School of Electronics and Information Technology Sun Yat-sen UniversityGuangzhou 510006China
In this paper,we propose a transmission scheme for uplink and downlink transmissions,where the fifth generation(5G)low-density parity-check(LDPC)codes are implemented for error *** the proposed scheme,the acknowledgme... 详细信息
来源: 评论
Stackelberg Game-Based Pricing and Offloading for the DVFS-Enabled MEC Systems
收藏 引用
IEEE Transactions on network and Service Management 2025年 第3期22卷 2502-2515页
作者: Mei, Jing Zeng, Cuibin Tong, Zhao Yang, Zhibang Li, Keqin Hunan Normal University College of Information Science and Engineering Changsha410081 China Changsha University in Changsha Hunan Province Key Laboratory of Industrial Internet Technology and Security Hunan 410022 China Hunan University College of Information Science and Engineering Changsha410012 China National Supercomputing Center Hunan Changsha410082 China State University of New York Department of Computer Science New YorkNY12561 United States
Due to the limited computing resources of both mobile devices (MDs) and the mobile edge computing (MEC) server, devising reasonable strategies for MD task offloading, MEC server resource pricing, and resource allocati... 详细信息
来源: 评论
A Blockchain-based PHR Sharing Scheme with Attribute Privacy Protection
A Blockchain-based PHR Sharing Scheme with Attribute Privacy...
收藏 引用
IEEE International Conference on Trust, security and Privacy in Computing and Communications (TrustCom)
作者: Chaohe Lu Zhongyuan Yu Guijuan Wang Anming Dong Xiang Tian School of Computer Science Qufu Normal University Rizhao China School of Information Science and Engineering Lanzhou University Lanzhou China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
With the rapid advancement and application of the Internet of Medical Things (IoMT), personal health records (PHRs) are now increasingly comprised of data collected by Internet of Things (IoT) devices and medical reco... 详细信息
来源: 评论
Age of information Analysis for CR-NOMA Aided Uplink Systems with Randomly Arrived Packets
收藏 引用
IEEE Transactions on Communications 2024年
作者: Sun, Yanshi Ye, Yanglin Ding, Zhiguo Zhou, Momiao Liu, Lei Hefei University of Technology School of Computer Science and Information Engineering Hefei230009 China Khalifa University Department of Computer and Information Engineering Abu Dhabi United Arab Emirates Xi'an University of Posts and Telecommunications Shaanxi Key Laboratory of Information Communication Network and Security Xi'an710121 China
This paper studies the application of cognitive radio inspired non-orthogonal multiple access (CR-NOMA) to reduce age of information (AoI) for uplink transmission. In particular, a time division multiple access (TDMA)... 详细信息
来源: 评论
Asynchronous Deep Reinforcement Learning for Collaborative Task Computing and On-Demand Resource Allocation in Vehicular Edge Computing
收藏 引用
IEEE Transactions on Intelligent Transportation Systems 2023年 第12期24卷 15513-15526页
作者: Liu, Lei Feng, Jie Mu, Xuanyu Pei, Qingqi Lan, Dapeng Xiao, Ming Xidian University Guangzhou Institute of Technology Guangzhou510555 China Ministry of Education Shanghai201804 China Xidian University State Key Laboratory of Integrated Services Networks School of Telecommunication Engineering Shaanxi Xi'an710071 China Xi'an University of Posts and Telecommunications Shaanxi Key Laboratory of Information Communication Network and Security Shaanxi Xi'an710121 China Xidian University State Key Laboratory of Integrated Services Networks Xi'an710071 China University of Oslo Department of Informatics Oslo0373 Norway Royal Institute of Technology School of Electrical Engineering and Computer Science Stockholm10044 Sweden
Vehicular Edge Computing (VEC) is enjoying a surge in research interest due to the remarkable potential to reduce response delay and alleviate bandwidth pressure. Facing the ever-growing service applications in VEC, h... 详细信息
来源: 评论
Neural network Driven by Density and Parallel Features for Field-Road Mode Mining
Neural Network Driven by Density and Parallel Features for F...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Fengqi Hao Xiyuan Zhao Cunxiang Bian Jinqiang Bai Qingyan Ding Faculty of Data Science City University of Macau Macau China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
Field-road mode mining (FRMM) has gained increasing attention because of its crucial role in machinery management. As the Global Navigation Satellite System (GNSS) is widely applied in agricultural machinery, many met... 详细信息
来源: 评论
JPEG Compression-Resistant Generative Image Hiding Utilizing Cascaded Invertible networks
收藏 引用
IEEE Transactions on information Forensics and security 2025年 20卷 6019-6032页
作者: Tiewei Qin Bingwen Feng Bingbing Zhou Jilian Zhang Zhihua Xia Jian Weng Wei Lu College of Cyber Security Jinan University Guangzhou China College of Cyber Security Engineering Research Center for Trustworthy AI Ministry of Education Jinan University Guangzhou China School of Computer Science and Engineering Ministry of Education Key Laboratory of Information Technology Guangdong Province Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou China
Generative steganography is renowned for its exceptional undetectability. However, prevalent generative methods often have insufficient capacity for concealing secret images. Furthermore, the sensitivity of commonly u... 详细信息
来源: 评论