咨询与建议

限定检索结果

文献类型

  • 4,554 篇 会议
  • 3,369 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,931 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,258 篇 工学
    • 3,946 篇 计算机科学与技术...
    • 3,125 篇 软件工程
    • 1,325 篇 信息与通信工程
    • 641 篇 电气工程
    • 556 篇 控制科学与工程
    • 522 篇 电子科学与技术(可...
    • 445 篇 网络空间安全
    • 440 篇 生物工程
    • 301 篇 机械工程
    • 226 篇 光学工程
    • 225 篇 仪器科学与技术
    • 187 篇 生物医学工程(可授...
    • 165 篇 安全科学与工程
    • 151 篇 动力工程及工程热...
    • 147 篇 化学工程与技术
    • 126 篇 交通运输工程
    • 125 篇 建筑学
  • 2,286 篇 理学
    • 1,359 篇 数学
    • 504 篇 物理学
    • 477 篇 生物学
    • 418 篇 统计学(可授理学、...
    • 205 篇 系统科学
    • 166 篇 化学
  • 1,324 篇 管理学
    • 810 篇 管理科学与工程(可...
    • 567 篇 图书情报与档案管...
    • 294 篇 工商管理
  • 286 篇 法学
    • 169 篇 社会学
    • 115 篇 法学
  • 151 篇 医学
    • 125 篇 临床医学
  • 115 篇 经济学
    • 115 篇 应用经济学
  • 98 篇 军事学
  • 55 篇 农学
  • 46 篇 教育学
  • 24 篇 文学
  • 23 篇 艺术学

主题

  • 255 篇 feature extracti...
  • 233 篇 semantics
  • 212 篇 cryptography
  • 187 篇 authentication
  • 180 篇 information secu...
  • 177 篇 computational mo...
  • 166 篇 accuracy
  • 164 篇 security
  • 155 篇 protocols
  • 141 篇 deep learning
  • 141 篇 privacy
  • 133 篇 training
  • 126 篇 federated learni...
  • 122 篇 laboratories
  • 109 篇 data models
  • 101 篇 cloud computing
  • 98 篇 servers
  • 93 篇 data privacy
  • 93 篇 blockchain
  • 91 篇 public key crypt...

机构

  • 215 篇 key laboratory o...
  • 207 篇 shandong provinc...
  • 160 篇 school of comput...
  • 152 篇 state key labora...
  • 116 篇 school of cyber ...
  • 116 篇 school of comput...
  • 106 篇 department of co...
  • 99 篇 information secu...
  • 85 篇 key laboratory o...
  • 83 篇 institute of inf...
  • 71 篇 guangdong provin...
  • 67 篇 computer network...
  • 67 篇 university of ch...
  • 64 篇 college of mathe...
  • 64 篇 peng cheng labor...
  • 63 篇 state grid key l...
  • 60 篇 school of softwa...
  • 58 篇 school of comput...
  • 56 篇 shandong provinc...
  • 54 篇 key laboratory o...

作者

  • 56 篇 jianfeng ma
  • 53 篇 yang yang
  • 45 篇 ma jianfeng
  • 45 篇 yixian yang
  • 42 篇 ding yong
  • 41 篇 zheng wei-shi
  • 39 篇 huang qingming
  • 31 篇 cong runmin
  • 31 篇 wang wei
  • 31 篇 xu an wang
  • 31 篇 hu yupu
  • 31 篇 yang yixian
  • 30 篇 zhang huanguo
  • 28 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 27 篇 xiaoming wu
  • 26 篇 min-ling zhang
  • 24 篇 liu xin
  • 24 篇 xinhong hei

语言

  • 6,839 篇 英文
  • 863 篇 其他
  • 257 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Computer Network and Information Security"
7931 条 记 录,以下是901-910 订阅
排序:
CryptoPyt: Unraveling Python Cryptographic APIs Misuse with Precise Static Taint Analysis  40
CryptoPyt: Unraveling Python Cryptographic APIs Misuse with ...
收藏 引用
40th Annual computer security Applications Conference, ACSAC 2024
作者: Guo, Xiangxin Jia, Shijie Lin, Jingqiang Ma, Yuan Zheng, Fangyu Li, Guangzheng Xu, Bowen Cheng, Yueqiang Ji, Kailiang School of Cyber Security University of Science and Technology of China Hefei China Key Laboratory of Cyberspace Security Defense Institute of Information Engineering CAS Beijing China School of Cryptology University of Chinese Academy of Sciences Beijing China Faculty of Electrical Engineering and Computer Science Ningbo University Ningbo China NIO China
Cryptographic APIs are essential for ensuring the security of software systems. However, many research studies have revealed that the misuse of cryptographic APIs is commonly widespread. Detecting such misuse in Pytho... 详细信息
来源: 评论
SarlBFT: Scalable Tree Communication Pattern BFT Protocol
SarlBFT: Scalable Tree Communication Pattern BFT Protocol
收藏 引用
Cyber Science and Technology Congress (CyberSciTech), IEEE
作者: Jianxin Yang Hui Lin Xiaoding Wang Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fujian Normal University Fuzhou Fujian P.R. China
With the increasing interest in blockchain within the business domain, there has been a growing focus on the implementation of permissioned blockchains. However, many of these blockchains rely on Byzantine Fault Toler... 详细信息
来源: 评论
Regularization Mixup Adversarial Training: A Defense Strategy for Membership Privacy with Model Availability Assurance
Regularization Mixup Adversarial Training: A Defense Strateg...
收藏 引用
Big Data and Privacy Computing (BDPC), International Conference on
作者: Zehua Ding Youliang Tian Guorong Wang Jinbo Xiong State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang China Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fujian Normal University Fuzhou China
Neural network models face two highly destructive threats in real-world applications: membership inference attacks (MIAs) and adversarial attacks (AAs). One compromises the model's confidentiality, leading to memb... 详细信息
来源: 评论
Lightweight Federated Learning Secure Aggregation Protocols
Lightweight Federated Learning Secure Aggregation Protocols
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Xianyu Mu Youliang Tian Zhou Zhou Jinbo Xiong State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang China Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fujian Normal University Fuzhou China Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies Shenzhen China
With the increasing awareness of user privacy protection and the improvement of domestic and international privacy protection laws, coalitional learning has become the current machine learning framework to protect use... 详细信息
来源: 评论
PE: A Poincare Explanation Method for Fast Text Hierarchy Generation
PE: A Poincare Explanation Method for Fast Text Hierarchy Ge...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Chen, Qian Li, Dongyang He, Xiaofeng Li, Hongzhao Yi, Hongyu School of Computer Science and Technology East China Normal University Shanghai China NPPA Key Laboratory of Publishing Integration Development ECNUP Shanghai China Sichuan Caizi Software Information Network Co. Ltd. China
The black-box nature of deep learning models in NLP hinders their widespread *** research focus has shifted to Hierarchical Attribution (HA) for its ability to model feature *** works model non-contiguous combinations... 详细信息
来源: 评论
An Imperceptible Adversarial Attack Against 3D Object Detectors in Autonomous Driving
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 21404-21414页
作者: Wang, Yizhou Wu, Libing Jin, Jiong Wang, Enshu Zhang, Zhuangzhuang Zhao, Yu Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan430072 China Swinburne University of Technology School of Engineering MelbourneVIC3122 Australia Wuhan University School of Cyber Science and Engineering Wuhan430072 China City University of Hong Kong Department of Computer Science Hong Kong Hong Kong
As LiDAR-based 3D object detection gains attention, existing research on point cloud adversarial attacks has exposed vulnerabilities in 3D neural network models, which can further impact the reliability of perception ... 详细信息
来源: 评论
Multimodal Dialogue Emotion Recognition Based on Label Optimization and Coarse-Grained Assisted Fine-Grained
Multimodal Dialogue Emotion Recognition Based on Label Optim...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Zhibo Zhang Zhenyu Yang Yan Huang Baojie Xu Wenyue Hu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science China
Multimodal dialogue emotion recognition integrates data from multiple modalities to accurately identify emotional states in conversations. However, differences in expression and information density across modalities c... 详细信息
来源: 评论
network security Situation Assessment Method Based on Absorbing Markov Chain
Network Security Situation Assessment Method Based on Absorb...
收藏 引用
2022 International Conference on networking and network Applications, NaNA 2022
作者: Gao, Hongbin Wang, Shangxing Zhang, Hongbin Liu, Bin Zhao, Dongmei Liu, Zhen Hebei University of Science and Technology School of Information Science and Engineering Shijiazhuang China Hebei University of Science and Technology School of Information Science and Engineering Hebei Key Laboratory of Network and Information Security Shijiazhuang China Hebei University of Science and Technology School of Economics and Management Research Center of Big Data and Social Computing Shijiazhuang China Hebei Normal University Hebei Key Laboratory of Network and Information Security Shijiazhuang China
This paper has a new network security evaluation method as an absorbing Markov chain-based assessment method. This method is different from other network security situation assessment methods based on graph theory. It... 详细信息
来源: 评论
Efficient self-testing system for quantum computations based on permutations
收藏 引用
Chinese Physics B 2021年 第4期30卷 61-73页
作者: Shuquan Ma Changhua Zhu Min Nie Dongxiao Quan State Key Laboratory of Integrated Services Networks Xidian UniversityXi'an 710071China Shaanxi Key Laboratory of Information Communication Network and Security Xi'an University of Posts&TelecommunicationsXi'an 710121China School of Communications and Information Engineering Xi'an University of Posts&TelecommunicationsXi'an 710121China
Verification in quantum computations is crucial since quantum systems are extremely vulnerable to the ***,verifying directly the output of a quantum computation is difficult since we know that efficiently simulating a... 详细信息
来源: 评论
Three-level Compact Caching for Search Engines Based on Solid State Drives  23
Three-level Compact Caching for Search Engines Based on Soli...
收藏 引用
23rd IEEE International Conference on High Performance Computing and Communications, 7th IEEE International Conference on Data Science and Systems, 19th IEEE International Conference on Smart City and 7th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC-DSS-SmartCity-DependSys 2021
作者: Zhang, Rui Sun, Pengyu Tong, Jiancong Zang, Ruirui Qian, Heng Pan, Yu Stones, Rebecca J. Wang, Gang Liu, Xiaoguang Li, Yusen College of Computer Science Nankai University Tianjin China Tianjin Key Laboratory of Network and Data Security Technology Tianjin China Baidu Inc Beijing China
The query processing in search engines can be classified into either disk I/O operations and CPU computation operations. Conventional search engine caching methods mostly aimed at reducing disk I/O operations. However... 详细信息
来源: 评论