咨询与建议

限定检索结果

文献类型

  • 2,101 篇 会议
  • 1,612 篇 期刊文献

馆藏范围

  • 3,713 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,413 篇 工学
    • 1,834 篇 计算机科学与技术...
    • 1,467 篇 软件工程
    • 603 篇 信息与通信工程
    • 346 篇 电气工程
    • 275 篇 控制科学与工程
    • 240 篇 电子科学与技术(可...
    • 232 篇 生物工程
    • 182 篇 网络空间安全
    • 141 篇 机械工程
    • 113 篇 光学工程
    • 94 篇 生物医学工程(可授...
    • 94 篇 安全科学与工程
    • 89 篇 交通运输工程
    • 88 篇 化学工程与技术
    • 83 篇 仪器科学与技术
    • 66 篇 材料科学与工程(可...
    • 61 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,089 篇 理学
    • 623 篇 数学
    • 263 篇 物理学
    • 250 篇 生物学
    • 207 篇 统计学(可授理学、...
    • 101 篇 系统科学
    • 90 篇 化学
  • 606 篇 管理学
    • 336 篇 管理科学与工程(可...
    • 306 篇 图书情报与档案管...
    • 100 篇 工商管理
  • 118 篇 法学
    • 72 篇 社会学
  • 80 篇 医学
    • 70 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 43 篇 经济学
  • 31 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 165 篇 feature extracti...
  • 129 篇 semantics
  • 125 篇 accuracy
  • 109 篇 training
  • 106 篇 computational mo...
  • 102 篇 federated learni...
  • 98 篇 deep learning
  • 80 篇 privacy
  • 72 篇 data models
  • 68 篇 cryptography
  • 62 篇 authentication
  • 61 篇 security
  • 59 篇 data privacy
  • 59 篇 robustness
  • 58 篇 protocols
  • 53 篇 object detection
  • 52 篇 neural networks
  • 52 篇 cloud computing
  • 50 篇 adaptation model...
  • 47 篇 optimization

机构

  • 271 篇 key laboratory o...
  • 206 篇 shandong provinc...
  • 97 篇 university of ch...
  • 83 篇 school of comput...
  • 83 篇 key laboratory o...
  • 66 篇 school of cyber ...
  • 65 篇 shandong provinc...
  • 64 篇 cas key laborato...
  • 64 篇 information secu...
  • 60 篇 guangdong provin...
  • 52 篇 shandong enginee...
  • 52 篇 tianjin key labo...
  • 50 篇 network and data...
  • 50 篇 shandong fundame...
  • 49 篇 state key labora...
  • 47 篇 peng cheng labor...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 46 篇 school of comput...
  • 44 篇 institute of inf...

作者

  • 100 篇 cheng xueqi
  • 49 篇 guo jiafeng
  • 47 篇 shen huawei
  • 43 篇 zheng wei-shi
  • 34 篇 xie xiaohua
  • 33 篇 huang qingming
  • 33 篇 yixian yang
  • 33 篇 cao xiaochun
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 25 篇 jin hai
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 21 篇 hu shengshan
  • 21 篇 lai jianhuang
  • 21 篇 wang yichuan
  • 20 篇 yang zhiyong

语言

  • 2,977 篇 英文
  • 661 篇 其他
  • 87 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3713 条 记 录,以下是2351-2360 订阅
排序:
A Hybrid Routing Algorithm based on Destruction Resistance Cost and Reliability in Flying Ad-Hoc networks
A Hybrid Routing Algorithm based on Destruction Resistance C...
收藏 引用
International Conference on Computer and Communications (ICCC)
作者: Kun Guo Dongbin Wang Hui Zhi Yibo Gao Tao Zhang Tiejun Lv Yueming Lu Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China National Engineering Laboratory for Mobile Network Beijing University of Posts and Telecommunications Beijing China TravelSky Technology Limited Beijing China Cyberspace Security Research Center Peng Cheng Laboratory Beijing University of Posts and Telecommunications Beijing China China Academy of Launch Vehicle Technology Beijing China
Existing routing algorithms in Flying Ad-Hoc Net- works (FANETs) lack the optimization consideration of destruction resistance cost caused by routing recovery when some nodes fail suddenly. In this paper, we propose a... 详细信息
来源: 评论
Research on the Current State of Privacy Risks in Children’s Mobile Applications
Research on the Current State of Privacy Risks in Children’...
收藏 引用
Computer technology and Information Science (ISCTIS), International Symposium on
作者: Xinrui Geng Tao Liu Chong Shang Jianxiang Chen Yueran Lu Yan Zhang Lifeng Wang School of AI and Advanced Computing Xi’an Jiaotong-Liverpool University Suzhou China Key Laboratory of Mobile Application Innovation and Governance Technology MIIT Beijing China Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Agricultural Engineering Shanxi Agricultural University China School of Software Engineering Tianjin Normal University Tianjin China Institute of Information Engineering Chinese Academy of Sciences School of Cyber Security University of Chinese Academy of Sciences Beijing China Shandong Yeda Smart City Operation Technology Co. Ltd. Shandong China
In the digital age, children increasingly access a vast world of information through mobile applications. Despite global regulations and protective measures by app stores, privacy breaches in these apps persist. This ... 详细信息
来源: 评论
security and privacy for healthcare blockchains
arXiv
收藏 引用
arXiv 2021年
作者: Zhang, Rui Xue, Rui Liu, Ling State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China College of Computing Georgia Institute of Technology AtlantaGA30332 United States School of Cyber Security University of Chinese Academy of Sciences Beijing100049 China
Healthcare blockchains provide an innovative way to store healthcare information, execute healthcare transactions, and build trust for healthcare data sharing and data integration in a decentralized open healthcare ne... 详细信息
来源: 评论
Privacy-Preserving Multi-keyword Search over Outsourced Data for Resource-Constrained Devices  2nd
Privacy-Preserving Multi-keyword Search over Outsourced Data...
收藏 引用
2nd International Conference on Blockchain and Trustworthy Systems, Blocksys 2020
作者: Liu, Lin-Gang Zhao, Meng Ding, Yong Wang, Yujue Deng, Hua Wang, Huiyong Guangxi Key Laboratory of Cryptography and Information Security School of Computer Science and Information Security Guilin University of Electronic Technology Guilin541004 China School of Mechanical and Electrical Engineering Guilin University of Electronic Technology Guilin541004 China College of Computer Science and Electronic Engineering Hunan University Changsha410082 China School of Mathematics and Computing Science Guilin University of Electronic Technology Guilin541004 China Cyberspace Security Research Center Peng Cheng Laboratory Shenzhen518055 China
With the rapid development of cloud computing, a variety of cloud-based applications have been developed. Since cloud computing has the features of high capacity and flexible computing, more and more users are motivat... 详细信息
来源: 评论
Imperceptible diffusion modification for facial privacy protection
收藏 引用
Neurocomputing 2025年 649卷
作者: Jia Li Junhao Dong Jianhuang Lai Xiaohua Xie School of Computer Science and Engineering Sun Yat-sen University Guangzhou China College of Computing and Data Science Nanyang Technological University Singapore Guangdong Province Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou China Key Laboratory of Machine Intelligence and Advanced Computing (Sun Yat-sen University) Ministry of Education Guangzhou China
The remarkable success of Face Recognition (FR) systems has raised significant privacy concerns, particularly the potential for unauthorized tracking of individuals on social media. To mitigate these risks, various ad...
来源: 评论
Constructing benchmarks for supporting explainable evaluations of static application security testing tools  13
Constructing benchmarks for supporting explainable evaluatio...
收藏 引用
13th International Symposium on Theoretical Aspects of Software Engineering, TASE 2019
作者: Hao, Gaojian Li, Feng Huo, Wei Sun, Qing Wang, Wei Li, Xinhua Zou, Wei Institute of Information Engineering Chinese Academy of Sciences China Key Laboratory of Network Assessment Technology Chinese Academy of Sciences Beijing Key Laboratory of Network Security and Protection Technology China School of Cyber Security University of Chinese Academy of Sciences China
When evaluating Static Application security Testing (SAST) tools, benchmarks based on real-world softwares are considered more representative than synthetic micro benchmarks. Generated from real-world software, the te... 详细信息
来源: 评论
AndroCreme: Unseen Android Malware Detection Based on Inductive Conformal Learning
AndroCreme: Unseen Android Malware Detection Based on Induct...
收藏 引用
IEEE International Conference on Trust, security and Privacy in computing and Communications (TrustCom)
作者: Gang Zhang Hao Li Zhenxiang Chen Lizhi Peng Yuhui Zhu Chuan Zhao Shandong Provincial Key Laboratory of Network Based Intelligent Computing University of Jinan China School of Information Science and Engineering University of Jinan China School of cyber science and technology Shandong University China
Android platform is facing serious malware threats due to its popularity, as evidenced by the drastic increase on the number of mobile malware families and variants in recent years. Detecting malware variants and zero... 详细信息
来源: 评论
Assessing Carbon Emission Mitigation Potential of Greening Vegetation and Distributed Photovoltaic Along Highway:A Case in Guangdong, China
SSRN
收藏 引用
SSRN 2024年
作者: Zhang, Haitao Zhang, Xinying Liu, Nieyangzi Yu, Qian Fu, Zishi Wang, Yuanqing Engineering Research Center of Road Transportation Decarbonization Ministry of Education Shaanxi Province Xi’an710064 China College of Transportation Engineering Chang’an University Shaanxi Province Xi’an710064 China Engineering Research Center of Road Transportation Decarbonization Ministry of Education Chang’an University Shaanxi Province Xi’an710064 China Key Laboratory of Transport Industry of Management Control and Cycle Repair Technology for Traffic Network Facilities in Ecological Security Barrier Area Shaanxi Province Xi’an710064 China Guangzhou Lvzhineng Technology Co. Ltd. Guangdong Province Guangzhou510700 China
The promotion of distributed photovoltaics (PV) along highways helps to advance the clean energy transition in the transportation industry. By combining road space photovoltaic systems (RSPV) and road space vegetation... 详细信息
来源: 评论
Concept-aware denoising graph neural network for micro-video recommendation
arXiv
收藏 引用
arXiv 2021年
作者: Liu, Yiyu Liu, Qian Tian, Yu Wang, Changping Niu, Yanan Song, Yang Li, Chenliang Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Wuhan430072 China Kuaishou Technology Co. Ltd. Beijing10010 China
Recently, micro-video sharing platforms such as Kuaishou and Tiktok have become a major source of information for people’s lives. Thanks to the large traffic volume, short video lifespan and streaming fashion of thes... 详细信息
来源: 评论
Optimal logistics transportation and route planning based on fpga processor real-time system and machine learning
收藏 引用
Microprocessors and Microsystems 2021年 80卷 103621-103621页
作者: Dai, Xuezhen Chen, Meiqi Zhou, Yanan College of Transportation Engineering Chang'an University Xi'anShaanxi710064 China Key Laboratory of Transport Industry of Management Control and Cycle Repair Technology for Traffic Network Facilities in Ecological Security Barrier Area Chang'an University Xi’ anShaanxi710064 China
The shared bus's development requirements, relief of traffic congestion in urban areas, and improved utilization of the road resources providing the transport mode of the excellent user experience neotype are very... 详细信息
来源: 评论