咨询与建议

限定检索结果

文献类型

  • 4,585 篇 会议
  • 3,423 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 8,016 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,350 篇 工学
    • 4,013 篇 计算机科学与技术...
    • 3,165 篇 软件工程
    • 1,364 篇 信息与通信工程
    • 704 篇 电气工程
    • 586 篇 控制科学与工程
    • 543 篇 电子科学与技术(可...
    • 469 篇 网络空间安全
    • 442 篇 生物工程
    • 305 篇 机械工程
    • 237 篇 光学工程
    • 230 篇 仪器科学与技术
    • 188 篇 生物医学工程(可授...
    • 180 篇 安全科学与工程
    • 152 篇 动力工程及工程热...
    • 149 篇 化学工程与技术
    • 140 篇 交通运输工程
    • 127 篇 建筑学
  • 2,314 篇 理学
    • 1,371 篇 数学
    • 517 篇 物理学
    • 480 篇 生物学
    • 419 篇 统计学(可授理学、...
    • 205 篇 系统科学
    • 172 篇 化学
  • 1,348 篇 管理学
    • 829 篇 管理科学与工程(可...
    • 573 篇 图书情报与档案管...
    • 295 篇 工商管理
  • 287 篇 法学
    • 169 篇 社会学
    • 116 篇 法学
  • 157 篇 医学
    • 130 篇 临床医学
  • 115 篇 经济学
    • 115 篇 应用经济学
  • 98 篇 军事学
  • 55 篇 农学
  • 48 篇 教育学
  • 24 篇 文学
  • 23 篇 艺术学

主题

  • 257 篇 feature extracti...
  • 233 篇 semantics
  • 211 篇 cryptography
  • 188 篇 authentication
  • 180 篇 information secu...
  • 177 篇 computational mo...
  • 169 篇 accuracy
  • 166 篇 security
  • 156 篇 protocols
  • 145 篇 deep learning
  • 140 篇 privacy
  • 133 篇 training
  • 130 篇 federated learni...
  • 122 篇 laboratories
  • 109 篇 data models
  • 101 篇 cloud computing
  • 100 篇 servers
  • 96 篇 blockchain
  • 95 篇 data privacy
  • 91 篇 public key crypt...

机构

  • 218 篇 key laboratory o...
  • 207 篇 shandong provinc...
  • 162 篇 school of comput...
  • 151 篇 state key labora...
  • 118 篇 school of cyber ...
  • 112 篇 school of comput...
  • 106 篇 department of co...
  • 98 篇 information secu...
  • 85 篇 key laboratory o...
  • 84 篇 institute of inf...
  • 70 篇 guangdong provin...
  • 69 篇 computer network...
  • 67 篇 university of ch...
  • 64 篇 college of mathe...
  • 64 篇 peng cheng labor...
  • 63 篇 state grid key l...
  • 59 篇 school of softwa...
  • 58 篇 shandong provinc...
  • 56 篇 school of comput...
  • 54 篇 key laboratory o...

作者

  • 56 篇 jianfeng ma
  • 53 篇 yang yang
  • 45 篇 ma jianfeng
  • 45 篇 yixian yang
  • 42 篇 ding yong
  • 41 篇 zheng wei-shi
  • 40 篇 huang qingming
  • 32 篇 wang wei
  • 31 篇 cong runmin
  • 31 篇 xu an wang
  • 31 篇 hu yupu
  • 31 篇 yang yixian
  • 30 篇 zhang huanguo
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 26 篇 xiaoming wu
  • 26 篇 min-ling zhang
  • 26 篇 wang bin
  • 25 篇 liu xin
  • 23 篇 li tao

语言

  • 6,638 篇 英文
  • 1,144 篇 其他
  • 269 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Computer Network and Information Security"
8016 条 记 录,以下是891-900 订阅
排序:
How Does the Smoothness Approximation Method Facilitate Generalization for Federated Adversarial Learning?  39
How Does the Smoothness Approximation Method Facilitate Gene...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Ding, Wenjun An, Ying Chen, Lixing Kan, Shichao Wu, Fan Qu, Zhe School of Computer Science and Engineering Central South University Changsha China Xiangjiang Laboratory Changsha China Big Data Institute Central South University Changsha China School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University Shanghai China Shanghai Key Laboratory of Integrated Administration Technologies for Information Security Shanghai China
Federated Adversarial Learning (FAL) is a robust framework for resisting adversarial attacks on federated learning. Although some FAL studies have developed efficient algorithms, they primarily focus on convergence pe... 详细信息
来源: 评论
Fair and Verifiable Identity-Based Broadcast Proxy Re-Encryption With Designated Sender Feasible for Medical Internet of Things
收藏 引用
IEEE Transactions on information Forensics and security 2025年 20卷 6033-6045页
作者: Liqing Chen Shiyu Chen Hao Zhang Jian Weng Faculty of Computer and Software Engineering Huaiyin Institute of Technology Huai’an Jiangsu China Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou Fujian China College of Information Science and Technology Jinan University Guangzhou Guangdong China
With the development of big data, cloud computing is widely used by individual and enterprise users due to its powerful computing and storage capabilities. How to share the encrypted data stored in cloud servers flexi... 详细信息
来源: 评论
An Imperceptible Adversarial Attack Against 3-D Object Detectors in Autonomous Driving
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 21404-21414页
作者: Wang, Yizhou Wu, Libing Jin, Jiong Wang, Enshu Zhang, Zhuangzhuang Zhao, Yu Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan430072 China Swinburne University of Technology School of Engineering MelbourneVIC3122 Australia Wuhan University School of Cyber Science and Engineering Wuhan430072 China City University of Hong Kong Department of Computer Science Hong Kong
As LiDAR-based 3-D object detection gains attention, existing research on point cloud adversarial attacks has exposed vulnerabilities in 3-D neural network models, which can further impact the reliability of perceptio... 详细信息
来源: 评论
A New Joint Source-Channel Coding Scheme with Overlay Spread Spectrum Transmission  15
A New Joint Source-Channel Coding Scheme with Overlay Spread...
收藏 引用
15th IEEE International Conference on Wireless Communications and Signal Processing, WCSP 2023
作者: Chen, Yanzhi Liang, Jifan Wang, Qianfan Ma, Xiao School of Computer Science and Engineering Sun Yat-sen University Guangzhou 510006 China Guangdong Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou 510006 China
In this paper, we propose a new joint source-channel coding (JSCC) scheme, especially in conjunction with overlay spread spectrum transmission. At the transmitter, a source sequence is redescribed by classified enumer... 详细信息
来源: 评论
Improving Performance of LDPC-Coded Links via Partial Superposition Retransmission
收藏 引用
Journal of Communications and information networks 2022年 第3期7卷 259-268页
作者: Yinchu Wang Qianfan Wang Ming Jiang Xiao Ma School of Computer Science and Engineering Sun Yat-sen UniversityGuangzhou 510006China Guangdong Key Laboratory of Information Security Technology Sun Yat-sen UniversityGuangzhou 510006China School of Electronics and Information Technology Sun Yat-sen UniversityGuangzhou 510006China
In this paper,we propose a transmission scheme for uplink and downlink transmissions,where the fifth generation(5G)low-density parity-check(LDPC)codes are implemented for error *** the proposed scheme,the acknowledgme... 详细信息
来源: 评论
A Revocable Pairing-Free Certificateless Signature Scheme Based on RSA Accumulator  23
A Revocable Pairing-Free Certificateless Signature Scheme Ba...
收藏 引用
23rd IEEE International Conference on Trust, security and Privacy in Computing and Communications, TrustCom 2024
作者: Shen, Zhuowei Kou, Xiao Yang, Taiyao Xu, Haoqin Wang, Dongbin Niu, Shaobo Southeast University School of Cyber Science and Engineering Nanjing China Minster of Education Key Laboratory of Computer Network and Information Intergration Nanjing China Beijing University of Post and Telecommunications School of Cyberspace Security Beijing China Ministry of Education Engineering Research Center of Blockchain and Network Convergence Technology Beijing China
Certificateless public key cryptography (CL-PKC) has garnered significant attention in recent years due to its ability to address the complex certificate management requirements inherent in public key infrastructure (... 详细信息
来源: 评论
A Blockchain-based PHR Sharing Scheme with Attribute Privacy Protection
A Blockchain-based PHR Sharing Scheme with Attribute Privacy...
收藏 引用
IEEE International Conference on Trust, security and Privacy in Computing and Communications (TrustCom)
作者: Chaohe Lu Zhongyuan Yu Guijuan Wang Anming Dong Xiang Tian School of Computer Science Qufu Normal University Rizhao China School of Information Science and Engineering Lanzhou University Lanzhou China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
With the rapid advancement and application of the Internet of Medical Things (IoMT), personal health records (PHRs) are now increasingly comprised of data collected by Internet of Things (IoT) devices and medical reco... 详细信息
来源: 评论
Age of information Analysis for CR-NOMA Aided Uplink Systems with Randomly Arrived Packets
收藏 引用
IEEE Transactions on Communications 2024年
作者: Sun, Yanshi Ye, Yanglin Ding, Zhiguo Zhou, Momiao Liu, Lei Hefei University of Technology School of Computer Science and Information Engineering Hefei230009 China Khalifa University Department of Computer and Information Engineering Abu Dhabi United Arab Emirates Xi'an University of Posts and Telecommunications Shaanxi Key Laboratory of Information Communication Network and Security Xi'an710121 China
This paper studies the application of cognitive radio inspired non-orthogonal multiple access (CR-NOMA) to reduce age of information (AoI) for uplink transmission. In particular, a time division multiple access (TDMA)... 详细信息
来源: 评论
Asynchronous Deep Reinforcement Learning for Collaborative Task Computing and On-Demand Resource Allocation in Vehicular Edge Computing
收藏 引用
IEEE Transactions on Intelligent Transportation Systems 2023年 第12期24卷 15513-15526页
作者: Liu, Lei Feng, Jie Mu, Xuanyu Pei, Qingqi Lan, Dapeng Xiao, Ming Xidian University Guangzhou Institute of Technology Guangzhou510555 China Ministry of Education Shanghai201804 China Xidian University State Key Laboratory of Integrated Services Networks School of Telecommunication Engineering Shaanxi Xi'an710071 China Xi'an University of Posts and Telecommunications Shaanxi Key Laboratory of Information Communication Network and Security Shaanxi Xi'an710121 China Xidian University State Key Laboratory of Integrated Services Networks Xi'an710071 China University of Oslo Department of Informatics Oslo0373 Norway Royal Institute of Technology School of Electrical Engineering and Computer Science Stockholm10044 Sweden
Vehicular Edge Computing (VEC) is enjoying a surge in research interest due to the remarkable potential to reduce response delay and alleviate bandwidth pressure. Facing the ever-growing service applications in VEC, h... 详细信息
来源: 评论
Neural network Driven by Density and Parallel Features for Field-Road Mode Mining
Neural Network Driven by Density and Parallel Features for F...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Fengqi Hao Xiyuan Zhao Cunxiang Bian Jinqiang Bai Qingyan Ding Faculty of Data Science City University of Macau Macau China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
Field-road mode mining (FRMM) has gained increasing attention because of its crucial role in machinery management. As the Global Navigation Satellite System (GNSS) is widely applied in agricultural machinery, many met... 详细信息
来源: 评论