咨询与建议

限定检索结果

文献类型

  • 6,675 篇 会议
  • 4,558 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 11,240 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,522 篇 工学
    • 5,098 篇 计算机科学与技术...
    • 4,089 篇 软件工程
    • 2,146 篇 信息与通信工程
    • 1,044 篇 电子科学与技术(可...
    • 981 篇 电气工程
    • 796 篇 控制科学与工程
    • 628 篇 生物工程
    • 519 篇 网络空间安全
    • 473 篇 机械工程
    • 443 篇 仪器科学与技术
    • 436 篇 光学工程
    • 266 篇 化学工程与技术
    • 252 篇 动力工程及工程热...
    • 252 篇 生物医学工程(可授...
    • 227 篇 安全科学与工程
    • 210 篇 交通运输工程
    • 186 篇 材料科学与工程(可...
    • 166 篇 土木工程
    • 164 篇 建筑学
  • 3,552 篇 理学
    • 1,955 篇 数学
    • 1,027 篇 物理学
    • 674 篇 生物学
    • 607 篇 统计学(可授理学、...
    • 330 篇 系统科学
    • 297 篇 化学
  • 1,645 篇 管理学
    • 1,020 篇 管理科学与工程(可...
    • 693 篇 图书情报与档案管...
    • 349 篇 工商管理
  • 329 篇 法学
    • 211 篇 社会学
  • 206 篇 医学
    • 175 篇 临床医学
  • 125 篇 军事学
  • 115 篇 经济学
  • 86 篇 农学
  • 47 篇 教育学
  • 25 篇 文学
  • 23 篇 艺术学
  • 1 篇 历史学

主题

  • 305 篇 feature extracti...
  • 237 篇 semantics
  • 201 篇 simulation
  • 196 篇 security
  • 191 篇 deep learning
  • 190 篇 authentication
  • 182 篇 computational mo...
  • 153 篇 cryptography
  • 141 篇 protocols
  • 136 篇 accuracy
  • 133 篇 information secu...
  • 133 篇 training
  • 132 篇 wireless communi...
  • 126 篇 optimization
  • 118 篇 internet of thin...
  • 114 篇 neural networks
  • 114 篇 machine learning
  • 108 篇 laboratories
  • 106 篇 privacy
  • 103 篇 servers

机构

  • 623 篇 state key labora...
  • 506 篇 school of cyber ...
  • 204 篇 shandong provinc...
  • 198 篇 institute of inf...
  • 194 篇 key laboratory o...
  • 168 篇 college of under...
  • 164 篇 school of comput...
  • 132 篇 university of ch...
  • 120 篇 key laboratory o...
  • 114 篇 shandong provinc...
  • 114 篇 beijing key labo...
  • 97 篇 state key labora...
  • 97 篇 school of inform...
  • 92 篇 information secu...
  • 90 篇 zhejiang provinc...
  • 89 篇 acoustic science...
  • 85 篇 school of inform...
  • 77 篇 school of comput...
  • 76 篇 peng cheng labor...
  • 73 篇 shanghai key lab...

作者

  • 86 篇 yang yang
  • 50 篇 lin dongdai
  • 45 篇 li yang
  • 45 篇 wang wei
  • 40 篇 wang lei
  • 40 篇 liu risheng
  • 38 篇 ruyan wang
  • 37 篇 yixian yang
  • 34 篇 zheng wei-shi
  • 34 篇 zhang rui
  • 34 篇 guo caili
  • 33 篇 feng zhiquan
  • 33 篇 huang qingming
  • 33 篇 ji donghong
  • 31 篇 liu bo
  • 31 篇 hu lei
  • 31 篇 zhang minqing
  • 30 篇 liu jun
  • 30 篇 jianhua li
  • 30 篇 cong runmin

语言

  • 10,254 篇 英文
  • 645 篇 其他
  • 360 篇 中文
  • 2 篇 法文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
检索条件"机构=Key Laboratory of Information and Network Security Engineering"
11240 条 记 录,以下是1-10 订阅
排序:
High Capacity Reversible Data Hiding Algorithm in Encrypted Images Based on Image Adaptive MSB Prediction and Secret Sharing
收藏 引用
清华大学学报自然科学版(英文版) 2025年 第3期30卷 1139-1156页
作者: Kaili Qi Minqing Zhang Fuqiang Di Chao Jiang Key Laboratory of Network & Information Security under PAP Engineering University of PAPXi'an 710086China
Until now,some reversible data hiding in encrypted images(RDH-EI)schemes based on secret sharing(SIS-RDHEI)still have the problems of not realizing diffusivity and high embedding ***,this paper innovatively proposes a... 详细信息
来源: 评论
An Enhanced Clustering-Based (k, t)-Anonymity Algorithm for Graphs
收藏 引用
Chinese Journal of Electronics 2025年 第1期34卷 365-372页
作者: Yuanyuan Wang Xing Zhang Zhiguang Chu Wei Shi Xiang Li School of Electronics and Information Engineering Liaoning University of Technology Key Laboratory of Security for Network and Data in Industrial Internet of Liaoning Province Faculty of Information Technology Beijing University of Technology
As people become increasingly reliant on the Internet, securely storing and publishing private data has become an important issue. In real life, the release of graph data can lead to privacy breaches, which is a highl... 详细信息
来源: 评论
DDoS Attack Autonomous Detection Model Based on Multi-Strategy Integrate Zebra Optimization Algorithm
收藏 引用
Computers, Materials & Continua 2025年 第1期82卷 645-674页
作者: Chunhui Li Xiaoying Wang Qingjie Zhang Jiaye Liang Aijing Zhang School of Information Engineering Institute of Disaster PreventionLangfang065201China Langfang Key Laboratory of Network Emergency Protection and Network Security Langfang065201China
Previous studies have shown that deep learning is very effective in detecting known ***,when facing unknown attacks,models such as Deep Neural networks(DNN)combined with Long Short-Term Memory(LSTM),Convolutional Neur... 详细信息
来源: 评论
Malicious Document Detection Based on GGE Visualization
收藏 引用
Computers, Materials & Continua 2025年 第1期82卷 1233-1254页
作者: Youhe Wang Yi Sun Yujie Li Chuanqi Zhou Henan Province Key Laboratory of Information Security Information Engineering UniversityZhengzhou450000China
With the development of anti-virus technology,malicious documents have gradually become the main pathway of Advanced Persistent Threat(APT)attacks,therefore,the development of effective malicious document classifiers ... 详细信息
来源: 评论
Institution Attribute Mining Technology for Access Control Based on Hybrid Capsule network
收藏 引用
Computers, Materials & Continua 2025年 第4期83卷 1495-1513页
作者: Aodi Liu Xuehui Du Na Wang Xiangyu Wu Henan Province Key Laboratory of Information Security Information Engineering UniversityZhengzhou450000China
security attributes are the premise and foundation for implementing Attribute-Based Access Control(ABAC)***,when dealing with massive volumes of unstructured text big data resources,the current attribute management me... 详细信息
来源: 评论
SAT-Based Automatic Searching for Differential and Linear Trails: Applying to CRAX
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 72-79页
作者: Yiyi HAN Caibing WANG Zhongfeng NIU Lei HU State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences School of Cyber Security University of Chinese Academy of Sciences
Boolean satisfiability problem(SAT) is now widely applied in differential cryptanalysis and linear cryptanalysis for various cipher *** generated many excellent results for some ciphers,for example,*** this research... 详细信息
来源: 评论
MarkNeRF:Watermarking for Neural Radiance Field
收藏 引用
Computers, Materials & Continua 2024年 第7期80卷 1235-1250页
作者: Lifeng Chen Jia Liu Wenquan Sun Weina Dong Xiaozhong Pan Cryptographic Engineering Department Institute of Cryptographic EngineeringEngineering University of PAPXi’an710086China Key Laboratory of Network and Information Security of PAP Xi’an710086China
This paper presents a novel watermarking scheme designed to address the copyright protection challenges encountered with Neural radiation field(NeRF)*** employ an embedding network to integrate the watermark into the ... 详细信息
来源: 评论
Big Data Access Control Mechanism Based on Two-Layer Permission Decision Structure
收藏 引用
Computers, Materials & Continua 2024年 第4期79卷 1705-1726页
作者: Aodi Liu Na Wang Xuehui Du Dibin Shan Xiangyu Wu Wenjuan Wang He’nan Province Key Laboratory of Information Security Information Engineering UniversityZhengzhou450000China
Big data resources are characterized by large scale, wide sources, and strong dynamics. Existing access controlmechanisms based on manual policy formulation by security experts suffer from drawbacks such as low policy... 详细信息
来源: 评论
High capacity reversible data hiding in encrypted images based on adaptive quadtree partitioning and MSB prediction
收藏 引用
Frontiers of information Technology & Electronic engineering 2023年 第8期24卷 1156-1168页
作者: Kaili QI Minqing ZHANG Fuqiang DI Yongjun KONG Key Laboratory of Network&Information Security under Chinese People Armed Police Force Engineering University of PAPXi’an710086China
To improve the embedding capacity of reversible data hiding in encrypted images(RDH-EI),a new RDH-EI scheme is proposed based on adaptive quadtree partitioning and most significant bit(MSB)***,according to the smoothn... 详细信息
来源: 评论
TMC-GCN: Encrypted Traffic Mapping Classification Method Based on Graph Convolutional networks
收藏 引用
Computers, Materials & Continua 2025年 第2期82卷 3179-3201页
作者: Baoquan Liu Xi Chen Qingjun Yuan Degang Li Chunxiang Gu School of Cyberspace Security Zhengzhou UniversityZhengzhou450002China School of Cyberspace Security Information Engineering UniversityZhengzhou450001China Henan Key Laboratory of Network Cryptography Technology Zhengzhou450001China
With the emphasis on user privacy and communication security, encrypted traffic has increased dramatically, which brings great challenges to traffic classification. The classification method of encrypted traffic based... 详细信息
来源: 评论