咨询与建议

限定检索结果

文献类型

  • 4,554 篇 会议
  • 3,369 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,931 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,258 篇 工学
    • 3,946 篇 计算机科学与技术...
    • 3,125 篇 软件工程
    • 1,325 篇 信息与通信工程
    • 641 篇 电气工程
    • 556 篇 控制科学与工程
    • 522 篇 电子科学与技术(可...
    • 445 篇 网络空间安全
    • 440 篇 生物工程
    • 301 篇 机械工程
    • 226 篇 光学工程
    • 225 篇 仪器科学与技术
    • 187 篇 生物医学工程(可授...
    • 165 篇 安全科学与工程
    • 151 篇 动力工程及工程热...
    • 147 篇 化学工程与技术
    • 126 篇 交通运输工程
    • 125 篇 建筑学
  • 2,286 篇 理学
    • 1,359 篇 数学
    • 504 篇 物理学
    • 477 篇 生物学
    • 418 篇 统计学(可授理学、...
    • 205 篇 系统科学
    • 166 篇 化学
  • 1,324 篇 管理学
    • 810 篇 管理科学与工程(可...
    • 567 篇 图书情报与档案管...
    • 294 篇 工商管理
  • 286 篇 法学
    • 169 篇 社会学
    • 115 篇 法学
  • 151 篇 医学
    • 125 篇 临床医学
  • 115 篇 经济学
    • 115 篇 应用经济学
  • 98 篇 军事学
  • 55 篇 农学
  • 46 篇 教育学
  • 24 篇 文学
  • 23 篇 艺术学

主题

  • 255 篇 feature extracti...
  • 233 篇 semantics
  • 212 篇 cryptography
  • 187 篇 authentication
  • 180 篇 information secu...
  • 177 篇 computational mo...
  • 166 篇 accuracy
  • 164 篇 security
  • 155 篇 protocols
  • 141 篇 deep learning
  • 141 篇 privacy
  • 133 篇 training
  • 126 篇 federated learni...
  • 122 篇 laboratories
  • 109 篇 data models
  • 101 篇 cloud computing
  • 98 篇 servers
  • 93 篇 data privacy
  • 93 篇 blockchain
  • 91 篇 public key crypt...

机构

  • 215 篇 key laboratory o...
  • 207 篇 shandong provinc...
  • 160 篇 school of comput...
  • 152 篇 state key labora...
  • 116 篇 school of cyber ...
  • 116 篇 school of comput...
  • 106 篇 department of co...
  • 99 篇 information secu...
  • 85 篇 key laboratory o...
  • 83 篇 institute of inf...
  • 71 篇 guangdong provin...
  • 67 篇 computer network...
  • 67 篇 university of ch...
  • 64 篇 college of mathe...
  • 64 篇 peng cheng labor...
  • 63 篇 state grid key l...
  • 60 篇 school of softwa...
  • 58 篇 school of comput...
  • 56 篇 shandong provinc...
  • 54 篇 key laboratory o...

作者

  • 56 篇 jianfeng ma
  • 53 篇 yang yang
  • 45 篇 ma jianfeng
  • 45 篇 yixian yang
  • 42 篇 ding yong
  • 41 篇 zheng wei-shi
  • 39 篇 huang qingming
  • 31 篇 cong runmin
  • 31 篇 wang wei
  • 31 篇 xu an wang
  • 31 篇 hu yupu
  • 31 篇 yang yixian
  • 30 篇 zhang huanguo
  • 28 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 27 篇 xiaoming wu
  • 26 篇 min-ling zhang
  • 24 篇 liu xin
  • 24 篇 xinhong hei

语言

  • 6,839 篇 英文
  • 863 篇 其他
  • 257 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Computer Network and Information Security"
7931 条 记 录,以下是861-870 订阅
排序:
A New High-Capacity Robust Image Steganography Method via Adversarial network
A New High-Capacity Robust Image Steganography Method via Ad...
收藏 引用
Science and Technology Innovation (IAECST), International Academic Exchange Conference on
作者: Weina Dong Zongbao Jiang Lifeng Chen Wenquan Sun Key Laboratory of Network and Information Security of PAP Engineering University of PAP Xi’an Shaanxi China
Aiming at the problem that the high-capacity steganography model based on encoding-decoding network had weak robustness and could not resist noise attack and channel compression, an improved high-capacity robust image...
来源: 评论
Another Lattice Attack Against ECDSA with the wNAF to Recover More Bits per Signature  1
收藏 引用
18th EAI International Conference on security and Privacy in Communication networks, SecureComm 2022
作者: Ma, Ziqiang Li, Shuaigang Lin, Jingqiang Cai, Quanwei Fan, Shuqin Zhang, Fan Luo, Bo School of Information Engineering Ningxia University Yinchuan China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Science and Technology of China Hefei China State Key Laboratory of Cryptology Beijing China School of Cyber Science and Technology College of Computer Science and Technology Zhejiang University Hangzhou310027 China Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province Hangzhou310027 China Department of Electrical Engineering and Computer Science University of Kansas Lawrence United States
In the resource-constrained environment such as the Internet of Things, the windowed Non-Adjacent-Form (wNAF) representation is usually used to improve the calculation speed of the scalar multiplication of ECDSA. This... 详细信息
来源: 评论
Image Recognition In Complex Environments Based On Improved FCM Algorithm  43
Image Recognition In Complex Environments Based On Improved ...
收藏 引用
43rd Chinese Control Conference, CCC 2024
作者: Pengxin, Zhao Qing, Lv Qiang, Li Jin, Wang Hebei Normal University College of Computer and Cyberspace Security Shijiazhuang050010 China College of Engineering of Hebei Normal University Hebei Normal University Shijiazhuang050010 China Hebei Provincial Key Laboratory of Information Fusion and Intelligent Control China
In recent years, image recognition has been commonly utilized in the field of computer vision, while the challenge of image recognition in complex environments has become a topical study. The fuzzy C-mean (FCM) is a c... 详细信息
来源: 评论
ADACQR: Enhancing Query Reformulation for Conversational Search via Sparse and Dense Retrieval Alignment
arXiv
收藏 引用
arXiv 2024年
作者: Lai, Yilong Wu, Jialong Zhang, Congzhi Sun, Haowen Zhou, Deyu School of Computer Science and Engineering Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University China
Conversational Query Reformulation (CQR) has significantly advanced in addressing the challenges of conversational search, particularly those stemming from the latent user intent and the need for historical context. R... 详细信息
来源: 评论
Power amplifier circuit defect detection based on improved Patch SVDD
Power amplifier circuit defect detection based on improved P...
收藏 引用
作者: Xie, Zhonghui Kong, Wa Zhou, Xinyu Zhang, Wence Zhong, Yujie Xia, Jing School of Computer Science and Communication Engineering Jiangsu University Zhenjiang China Jiangsu Key Laboratory of Security Technology for Industrial Cyberspace Jiangsu University Zhenjiang China Department of Electronic Information Engineering Hong Kong Polytechnic University Hong Kong
In the manufacturing process of power amplifier (PA), various defects on the circuit surface will seriously affect the circuit performance and its operation. To solve the above problems, this article proposes a circui... 详细信息
来源: 评论
SEED: Accelerating Reasoning Tree Construction via Scheduled Speculative Decoding
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Zhenglin Wu, Jialong Lai, Yilong Zhang, Congzhi Zhou, Deyu School of Computer Science and Engineering Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University China
Large Language Models (LLMs) demonstrate remarkable emergent abilities across various tasks, yet fall short of complex reasoning and planning tasks. The tree-search-based reasoning methods address this by encouraging ... 详细信息
来源: 评论
A Method of Firmware Vulnerability Mining and Verification Based on Code Property Graph  8th
A Method of Firmware Vulnerability Mining and Verification B...
收藏 引用
8th International Conference on Artificial Intelligence and security , ICAIS 2022
作者: Xiao, Na Zeng, Jing Yao, Qigui Huang, Xiuli Platform Operation and Security Department Information and Telecommunication Company Beijing100000 China State Grid Key Laboratory of Information and Network Security Global Energy Interconnection Research Institute Co. Ltd. Nanjing210000 China
With the rapid development of smart power grid, the security of intelligent terminal has been widely concerned. Firmware is the core component of intelligent terminal equipment, and its vulnerability has become one of... 详细信息
来源: 评论
A generalized reliability analysis of 3-ary n-cubes
A generalized reliability analysis of 3-ary n-cubes
收藏 引用
International Conference on Communication Software and networks, ICCSN
作者: Zefang Bai Guijuan Wang Meijie Ma School of Mathematics and Statistics Qilu University of Technology (Shandong Academy of Sciences) Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
Evaluating the reliability of interconnection networks is crucial. The edge-connectivity is a parameter used to assess reliability. In this paper, we discuss a conditional edge-connectivity called the h-extra g-compon... 详细信息
来源: 评论
An Efficient Authentication and key Agreement Scheme for CAV Internal Applications  19th
An Efficient Authentication and Key Agreement Scheme for C...
收藏 引用
19th EAI International Conference on Collaborative Computing: networking, Applications and Worksharing, CollaborateCom 2023
作者: Li, Yang Zhang, Qingyang Cao, Wenwen Cui, Jie Zhong, Hong Anhui Province Key Laboratory of Cyberspace Security Situation Awareness and Evaluation Hefei230037 China School of Computer Science and Technology Anhui University Hefei230039 China Anhui Engineering Laboratory of IoT Security Technologies Anhui University Hefei230039 China Institute of Physical Science and Information Technology Anhui University Hefei230039 China Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education Anhui University Hefei230039 China
The data of applications in connected and autonomous vehicles are important, which is usually collected by service providers to improve their services, such as object detection model. But, wireless communication is su... 详细信息
来源: 评论
Causal Walk: Debiasing Multi-Hop Fact Verification with Front-Door Adjustment
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Congzhi Zhang, Linhai Zhou, Deyu School of Computer Science and Engineering Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University China
Multi-hop fact verification aims to detect the veracity of the given claim by integrating and reasoning over multiple pieces of evidence. Conventional multi-hop fact verification models are prone to rely on spurious c... 详细信息
来源: 评论