咨询与建议

限定检索结果

文献类型

  • 6,675 篇 会议
  • 4,558 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 11,240 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,522 篇 工学
    • 5,098 篇 计算机科学与技术...
    • 4,089 篇 软件工程
    • 2,146 篇 信息与通信工程
    • 1,044 篇 电子科学与技术(可...
    • 981 篇 电气工程
    • 796 篇 控制科学与工程
    • 628 篇 生物工程
    • 519 篇 网络空间安全
    • 473 篇 机械工程
    • 443 篇 仪器科学与技术
    • 436 篇 光学工程
    • 266 篇 化学工程与技术
    • 252 篇 动力工程及工程热...
    • 252 篇 生物医学工程(可授...
    • 227 篇 安全科学与工程
    • 210 篇 交通运输工程
    • 186 篇 材料科学与工程(可...
    • 166 篇 土木工程
    • 164 篇 建筑学
  • 3,552 篇 理学
    • 1,955 篇 数学
    • 1,027 篇 物理学
    • 674 篇 生物学
    • 607 篇 统计学(可授理学、...
    • 330 篇 系统科学
    • 297 篇 化学
  • 1,645 篇 管理学
    • 1,020 篇 管理科学与工程(可...
    • 693 篇 图书情报与档案管...
    • 349 篇 工商管理
  • 329 篇 法学
    • 211 篇 社会学
  • 206 篇 医学
    • 175 篇 临床医学
  • 125 篇 军事学
  • 115 篇 经济学
  • 86 篇 农学
  • 47 篇 教育学
  • 25 篇 文学
  • 23 篇 艺术学
  • 1 篇 历史学

主题

  • 305 篇 feature extracti...
  • 237 篇 semantics
  • 201 篇 simulation
  • 196 篇 security
  • 191 篇 deep learning
  • 190 篇 authentication
  • 182 篇 computational mo...
  • 153 篇 cryptography
  • 141 篇 protocols
  • 136 篇 accuracy
  • 133 篇 information secu...
  • 133 篇 training
  • 132 篇 wireless communi...
  • 126 篇 optimization
  • 118 篇 internet of thin...
  • 114 篇 neural networks
  • 114 篇 machine learning
  • 108 篇 laboratories
  • 106 篇 privacy
  • 103 篇 servers

机构

  • 623 篇 state key labora...
  • 506 篇 school of cyber ...
  • 204 篇 shandong provinc...
  • 198 篇 institute of inf...
  • 194 篇 key laboratory o...
  • 168 篇 college of under...
  • 164 篇 school of comput...
  • 132 篇 university of ch...
  • 120 篇 key laboratory o...
  • 114 篇 shandong provinc...
  • 114 篇 beijing key labo...
  • 97 篇 state key labora...
  • 97 篇 school of inform...
  • 92 篇 information secu...
  • 90 篇 zhejiang provinc...
  • 89 篇 acoustic science...
  • 85 篇 school of inform...
  • 77 篇 school of comput...
  • 76 篇 peng cheng labor...
  • 73 篇 shanghai key lab...

作者

  • 86 篇 yang yang
  • 50 篇 lin dongdai
  • 45 篇 li yang
  • 45 篇 wang wei
  • 40 篇 wang lei
  • 40 篇 liu risheng
  • 38 篇 ruyan wang
  • 37 篇 yixian yang
  • 34 篇 zheng wei-shi
  • 34 篇 zhang rui
  • 34 篇 guo caili
  • 33 篇 feng zhiquan
  • 33 篇 huang qingming
  • 33 篇 ji donghong
  • 31 篇 liu bo
  • 31 篇 hu lei
  • 31 篇 zhang minqing
  • 30 篇 liu jun
  • 30 篇 jianhua li
  • 30 篇 cong runmin

语言

  • 10,254 篇 英文
  • 645 篇 其他
  • 360 篇 中文
  • 2 篇 法文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
检索条件"机构=Key Laboratory of Information and Network Security Engineering"
11240 条 记 录,以下是11-20 订阅
排序:
Reversible Data Hiding Algorithm in Encrypted Images Based on Adaptive Median Edge Detection and Ciphertext-Policy Attribute-Based Encryption
收藏 引用
Computers, Materials & Continua 2024年 第10期81卷 1123-1155页
作者: Zongbao Jiang Minqing Zhang Weina Dong Chao Jiang Fuqiang Di Key Laboratory of Network and Information Security of People’s Armed Police Chinese People’s Armed Police Force Engineering UniversityXi’an710086China
With the rapid advancement of cloud computing technology,reversible data hiding algorithms in encrypted images(RDH-EI)have developed into an important field of study concentrated on safeguarding privacy in distributed... 详细信息
来源: 评论
Heterogeneous Dual-Dynamic Attention network for Modeling Mutual Interplay of Stocks
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第7期5卷 3595-3606页
作者: Liu, Haotian Zhou, Yadong Zhou, Yuxun Hu, Bowen Xi'an Jiaotong University Ministry of Education Key Laboratory for Intelligent Networks and Network Security Faculty of Electronic and Information Engineering Xi'an710049 China
Modern quantitative finance and portfolio-based investment hinge on the dependence structure among financial instruments (like stocks) for return prediction, risk management, and hedging. Several attempts have been ma... 详细信息
来源: 评论
Blockchain and signcryption enabled asynchronous federated learning framework in fog computing
收藏 引用
Digital Communications and networks 2025年 第2期11卷 442-454页
作者: Zhou Zhou Youliang Tian Jinbo Xiong Changgen Peng Jing Li Nan Yang State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang 550025China Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber SecurityFujian Normal UniversityFuzhou 350117China Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic TechnologyGuilin 541004China
Federated learning combines with fog computing to transform data sharing into model sharing,which solves the issues of data isolation and privacy disclosure in fog ***,existing studies focus on centralized single-laye... 详细信息
来源: 评论
Minimizing CNOT-count in quantum circuit of the extended Shor’s algorithm for ECDLP
收藏 引用
Cybersecurity 2025年 第1期8卷 153-179页
作者: Xia Liu Huan Yang Li Yang State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of SciencesBeijingChina School of Cyber Security University of Chinese Academy of SciencesBeijingChina Beijing Youzhuju Network Technology Co. Ltd.BeijingChina
The elliptic curve discrete logarithm problem(ECDLP)is a popular choice for cryptosystems due to its high level of ***,with the advent of the extended Shor’s algorithm,there is concern that ECDLP may soon be *** the ... 详细信息
来源: 评论
Full-round impossible diferential attack on shadow block cipher
收藏 引用
Cybersecurity 2025年 第1期8卷 247-261页
作者: Yuting Liu Yongqiang Li Huiqin Chen Mingsheng Wang State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of SciencesBeijingChina School of Cyber Security University of Chinese Academy of SciencesBeijingChina
Lightweight block ciphers are the essential encryption algorithm for devices with limited *** goal is to ensure the security of data transmission through resource-constrained *** diferential cryptanalysis is one of th... 详细信息
来源: 评论
Partial multi-label learning via label-specific feature corrections
收藏 引用
Science China(information Sciences) 2025年 第3期68卷 95-109页
作者: Jun-Yi HANG Min-Ling ZHANG School of Computer Science and Engineering Southeast University Key Laboratory of Computer Network and Information Integration(Southeast University) Ministry of Education
Partial multi-label learning(PML) allows learning from rich-semantic objects with inaccurate annotations, where a set of candidate labels are assigned to each training example but only some of them are valid. Existi... 详细信息
来源: 评论
Multimodal Cross-Attention Mechanism-Based Algorithm for Elderly Behavior Monitoring and Recognition
收藏 引用
Chinese Journal of Electronics 2025年 第1期34卷 309-321页
作者: Hao Liu Zhiquan Feng Qingbei Guo School of Information Science and Engineering Unicersity of Jinan Shandong Provincial Key Laboratory of Network Based Intelligent Computing Unicersity of Jinan
In contrast to the general population, behavior recognition among the elderly poses increased specificity and difficulty, rendering the reliability and usability aspects of safety monitoring systems for the elderly mo... 详细信息
来源: 评论
DLP:towards active defense against backdoor attacks with decoupled learning process
收藏 引用
Cybersecurity 2024年 第1期7卷 122-134页
作者: Zonghao Ying Bin Wu State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of SciencesBeijingChina School of Cyber Security University of Chinese Academy of SciencesBeijingChina
Deep learning models are well known to be susceptible to backdoor attack,where the attacker only needs to provide a tampered dataset on which the triggers are *** trained on the dataset will passively implant the back... 详细信息
来源: 评论
Fairness is essential for robustness:fair adversarial training by identifying and augmenting hard examples
收藏 引用
Frontiers of Computer Science 2025年 第3期19卷 1-13页
作者: Ningping MOU Xinli YUE Lingchen ZHAO Qian WANG Key Laboratory of Aerospace Information Security and Trusted Computing(Ministry of Education) School of Cyber Science and EngineeringWuhan UniversityWuhan 430072China
Adversarial training has been widely considered the most effective defense against adversarial ***,recent studies have demonstrated that a large discrepancy exists in the class-wise robustness of adversarial training,... 详细信息
来源: 评论
A Model for Detecting Fake News by Integrating Domain-Specific Emotional and Semantic Features
收藏 引用
Computers, Materials & Continua 2024年 第8期80卷 2161-2179页
作者: Wen Jiang Mingshu Zhang Xu’an Wang Wei Bin Xiong Zhang Kelan Ren Facheng Yan College of Cryptography Engineering Engineering University of People’s Armed PoliceXi’an710086China Key Laboratory of Network and Information Security Engineering University of People’s Armed PoliceXi’an710086China Key Laboratory of CTC&Information Engineering Engineering University of People’s Armed PoliceMinistry of EducationXi’an710086China
With the rapid spread of Internet information and the spread of fake news,the detection of fake news becomes more and more *** detection methods often rely on a single emotional or semantic feature to identify fake ne... 详细信息
来源: 评论