咨询与建议

限定检索结果

文献类型

  • 4,554 篇 会议
  • 3,369 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,931 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,258 篇 工学
    • 3,946 篇 计算机科学与技术...
    • 3,125 篇 软件工程
    • 1,325 篇 信息与通信工程
    • 641 篇 电气工程
    • 556 篇 控制科学与工程
    • 522 篇 电子科学与技术(可...
    • 445 篇 网络空间安全
    • 440 篇 生物工程
    • 301 篇 机械工程
    • 226 篇 光学工程
    • 225 篇 仪器科学与技术
    • 187 篇 生物医学工程(可授...
    • 165 篇 安全科学与工程
    • 151 篇 动力工程及工程热...
    • 147 篇 化学工程与技术
    • 126 篇 交通运输工程
    • 125 篇 建筑学
  • 2,286 篇 理学
    • 1,359 篇 数学
    • 504 篇 物理学
    • 477 篇 生物学
    • 418 篇 统计学(可授理学、...
    • 205 篇 系统科学
    • 166 篇 化学
  • 1,324 篇 管理学
    • 810 篇 管理科学与工程(可...
    • 567 篇 图书情报与档案管...
    • 294 篇 工商管理
  • 286 篇 法学
    • 169 篇 社会学
    • 115 篇 法学
  • 151 篇 医学
    • 125 篇 临床医学
  • 115 篇 经济学
    • 115 篇 应用经济学
  • 98 篇 军事学
  • 55 篇 农学
  • 46 篇 教育学
  • 24 篇 文学
  • 23 篇 艺术学

主题

  • 255 篇 feature extracti...
  • 233 篇 semantics
  • 212 篇 cryptography
  • 187 篇 authentication
  • 180 篇 information secu...
  • 177 篇 computational mo...
  • 166 篇 accuracy
  • 164 篇 security
  • 155 篇 protocols
  • 141 篇 deep learning
  • 141 篇 privacy
  • 133 篇 training
  • 126 篇 federated learni...
  • 122 篇 laboratories
  • 109 篇 data models
  • 101 篇 cloud computing
  • 98 篇 servers
  • 93 篇 data privacy
  • 93 篇 blockchain
  • 91 篇 public key crypt...

机构

  • 215 篇 key laboratory o...
  • 207 篇 shandong provinc...
  • 160 篇 school of comput...
  • 152 篇 state key labora...
  • 116 篇 school of cyber ...
  • 116 篇 school of comput...
  • 106 篇 department of co...
  • 99 篇 information secu...
  • 85 篇 key laboratory o...
  • 83 篇 institute of inf...
  • 71 篇 guangdong provin...
  • 67 篇 computer network...
  • 67 篇 university of ch...
  • 64 篇 college of mathe...
  • 64 篇 peng cheng labor...
  • 63 篇 state grid key l...
  • 60 篇 school of softwa...
  • 58 篇 school of comput...
  • 56 篇 shandong provinc...
  • 54 篇 key laboratory o...

作者

  • 56 篇 jianfeng ma
  • 53 篇 yang yang
  • 45 篇 ma jianfeng
  • 45 篇 yixian yang
  • 42 篇 ding yong
  • 41 篇 zheng wei-shi
  • 39 篇 huang qingming
  • 31 篇 cong runmin
  • 31 篇 wang wei
  • 31 篇 xu an wang
  • 31 篇 hu yupu
  • 31 篇 yang yixian
  • 30 篇 zhang huanguo
  • 28 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 27 篇 xiaoming wu
  • 26 篇 min-ling zhang
  • 24 篇 liu xin
  • 24 篇 xinhong hei

语言

  • 6,839 篇 英文
  • 863 篇 其他
  • 257 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Computer Network and Information Security"
7931 条 记 录,以下是921-930 订阅
排序:
Image Compression Algorithm Based on Region of Interest Extraction for Unmanned Aerial Vehicles Communication
Image Compression Algorithm Based on Region of Interest Extr...
收藏 引用
IEEE information Technology and Mechatronics Engineering Conference (ITOEC)
作者: Yanxia Liang Tong Jia Xin Liu Huanhuan Zhang Shaanxi Key Laboratory of Information Communication Network and Security Xi’an University of Posts and Telecommunications Xi’an China College of Information Engineering Xi’an Eurasia University Xi’an China
The flexibility and maneuverability of unmanned aerial vehicles (UAVs) have led to their widespread use, but the challenge of limited storage space and bandwidth in emergency scenarios necessitates efficient image com... 详细信息
来源: 评论
APFT: Adaptive Phoneme Filter Template to Generate Anti-Compression Speech Adversarial Example in Real-Time
收藏 引用
IEEE Transactions on information Forensics and security 2025年 20卷 5152-5165页
作者: Huang, Yihuan Ren, Yanzhen Sun, Zongkun Zhai, Liming Wang, Jingmin Liu, Wuyang Wuhan University School of Cyber Science and Engineering Wuhan430072 China Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan430072 China Central China Normal University School of Computer Science Wuhan430079 China
Automatic Speech Recognition (ASR) systems are widely used for speech censoring. Speech Adversarial Example (AE) offers a novel approach to protect speech privacy by forcing ASR to mistranscribe. However, existing spe... 详细信息
来源: 评论
Crucial Interaction Elements Detection for 5G Core network based on the Complex network Model
Crucial Interaction Elements Detection for 5G Core Network b...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Ruinan Peng Xinhong Hei Yichuan Wang Xiaoxue Liu Yeqiu Xiao School of Computer Science and Engineering Xi’an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China
This paper focuses on the issue of crucial interaction elements detection in the 5G core network. Given the current absence of an effective method for quantification evaluating the importance of interaction elements, ... 详细信息
来源: 评论
Region Partition based Hybrid Deep network for Polarimetric SAR Image Classification
Region Partition based Hybrid Deep Network for Polarimetric ...
收藏 引用
IEEE International Symposium on Geoscience and Remote Sensing (IGARSS)
作者: Junfei Shi Linjing Xu Haiyan Jin Wei Wang Rong Fei Shanshan Ji Department of Computer Science and Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an University of Technology Xi’an China
The Convolutional Neural network (CNN) model excels at learning local features, but struggles with capturing global large-scale features, particularly in extremely heterogeneous areas. In contrast, the Graph Convoluti... 详细信息
来源: 评论
A Novel Auralization Model for network security Situation Assessment
A Novel Auralization Model for Network Security Situation As...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Yeqiu Xiao Yibin Ma Yichuan Wang Kun Jiang Lanlan Cui School of Computer Science and Engineering Xi’an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China
Situation assessment is one of indispensable part for protecting network security. However, with the development of network attacks, the timeliness of attack threat assessment using traditional mathematical methods ha... 详细信息
来源: 评论
Hyperspectral Band Selection Based on Classification Reward Adjustment
Hyperspectral Band Selection Based on Classification Reward ...
收藏 引用
IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems (MASS)
作者: Jing Hu Jiawei Liang Yunfei Ju Minghua Zhao Shaanxi Key Laboratory for Network Computing and Security Technology School of Computer Science and Engineering Xi'an University of Technology Xi'an China
Hyperspectral image band selection is a crucial link in image processing. It is necessary to screen out bands with rich information and low correlation, to achieve data dimensionality reduction and retain key informat... 详细信息
来源: 评论
Nonlinear Interference-Aware Routing,Wavelength and Power Allocation in C+L+S Multi-Band Optical networks
收藏 引用
China Communications 2025年 第4期22卷 129-142页
作者: Zhang Xu Xie Wang Feng Chuan Zeng Hankun Zhou Shanshan Zhang Fan Gong Xiaoxue School of Communications and Information Engineering Chongqing University of Posts and TelecommunicationsChongqing 400065China Institute of Intelligent Communications and Network Security Chongqing University of Posts and TelecommunicationsChongqing 400065China Key Laboratory of Big Data Intelligent Computing Chongqing University of Posts and TelecommunicationsChongqing 400065China
Multi-band optical networks are a potential technology for increasing network ***,the strong interference and non-uniformity between wavelengths in multi-band optical networks have become a bottleneck restricting the ... 详细信息
来源: 评论
A Novel Multipath Data Transmission Method with Traffic Obfuscation
A Novel Multipath Data Transmission Method with Traffic Obfu...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Xinhong Hei Jianfeng Chen Yichuan Wang Xin Song Lei Zhu School of Computer Science and Engineering Xi’an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China
With the rapid progress of network communication technology, the issues of user identity and privacy are critical. However, there are many disadvantages in traditional single-path data transmission, for example, the l... 详细信息
来源: 评论
Compiler Differentiation Detection Method for Binary Similarity
Compiler Differentiation Detection Method for Binary Similar...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Xiaoxue Liu Xinwei Duan Xinhong Hei Yichuan Wang Xin Song School of computer science and engineering Xi’an University of technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology
Compiler differential detection can be performed by detecting the similarity between the binary compiled by the compiler and the ideal compiled file. This article proposes a javac compiler differentiation detection sy... 详细信息
来源: 评论
Semantic-Aware Prompt Learning for Multimodal Sarcasm Detection
Semantic-Aware Prompt Learning for Multimodal Sarcasm Detect...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Guangjin Wang Bao Wang Fuyong Xu Zhenfang Zhu Peipei Wang Ru Wang Peiyu Liu School of Information Science and Engineering Shandong Normal University Jinan China School of Information Science and Electrical Engineering Shandong Jiao Tong University Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
Multimodal sarcasm detection aims to identify whether utterances express sarcastic intentions contrary to their literal meaning based on multimodal information. However, existing methods fail to explore the model’s &... 详细信息
来源: 评论