咨询与建议

限定检索结果

文献类型

  • 2,081 篇 会议
  • 1,579 篇 期刊文献

馆藏范围

  • 3,660 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,357 篇 工学
    • 1,793 篇 计算机科学与技术...
    • 1,442 篇 软件工程
    • 580 篇 信息与通信工程
    • 314 篇 电气工程
    • 260 篇 控制科学与工程
    • 231 篇 生物工程
    • 228 篇 电子科学与技术(可...
    • 168 篇 网络空间安全
    • 136 篇 机械工程
    • 106 篇 光学工程
    • 93 篇 生物医学工程(可授...
    • 87 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 81 篇 仪器科学与技术
    • 81 篇 交通运输工程
    • 60 篇 材料科学与工程(可...
    • 60 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,073 篇 理学
    • 613 篇 数学
    • 253 篇 物理学
    • 249 篇 生物学
    • 206 篇 统计学(可授理学、...
    • 101 篇 系统科学
    • 86 篇 化学
  • 592 篇 管理学
    • 325 篇 管理科学与工程(可...
    • 302 篇 图书情报与档案管...
    • 99 篇 工商管理
  • 118 篇 法学
    • 72 篇 社会学
  • 79 篇 医学
    • 69 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 43 篇 经济学
  • 31 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 163 篇 feature extracti...
  • 129 篇 semantics
  • 123 篇 accuracy
  • 107 篇 training
  • 106 篇 computational mo...
  • 97 篇 federated learni...
  • 95 篇 deep learning
  • 79 篇 privacy
  • 70 篇 data models
  • 68 篇 cryptography
  • 61 篇 authentication
  • 59 篇 security
  • 57 篇 data privacy
  • 57 篇 protocols
  • 57 篇 robustness
  • 52 篇 object detection
  • 52 篇 neural networks
  • 52 篇 cloud computing
  • 50 篇 adaptation model...
  • 47 篇 information secu...

机构

  • 264 篇 key laboratory o...
  • 206 篇 shandong provinc...
  • 95 篇 university of ch...
  • 83 篇 key laboratory o...
  • 82 篇 school of comput...
  • 65 篇 information secu...
  • 65 篇 school of cyber ...
  • 63 篇 cas key laborato...
  • 61 篇 shandong provinc...
  • 59 篇 guangdong provin...
  • 52 篇 shandong enginee...
  • 50 篇 tianjin key labo...
  • 49 篇 network and data...
  • 49 篇 shandong fundame...
  • 48 篇 state key labora...
  • 47 篇 peng cheng labor...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 45 篇 school of comput...
  • 43 篇 shandong provinc...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 34 篇 xie xiaohua
  • 33 篇 yixian yang
  • 32 篇 huang qingming
  • 32 篇 cao xiaochun
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 25 篇 xu qianqian
  • 25 篇 li wei
  • 25 篇 jin hai
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 21 篇 hu shengshan
  • 21 篇 lai jianhuang
  • 21 篇 meng deyu

语言

  • 3,103 篇 英文
  • 484 篇 其他
  • 82 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3660 条 记 录,以下是2491-2500 订阅
排序:
Fair and autonomous sharing of federate learning models in mobile Internet of Things
arXiv
收藏 引用
arXiv 2020年
作者: Hao, Xiaohan Ren, Wei Xiong, Ruoting Zheng, Xianghan Zhu, Tianqing Xiong, Neal N. School of Computer Science China University of Geoscience Wuhan China Guangxi Key Laboratory of Cryptography and Information Security Guilin541004 China Key Laboratory of Network Assessment Technology CAS Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou China Mingbyte Technology QingDao China School of Software University of Technology Sydney UltimoNSW2007 Australia Dept. of Mathematics and Computer Science Northeastern State University United States
Federate learning can conduct machine learning as well as protect the privacy of self-owned training data on corresponding ends, instead of having to upload to a central trusted data aggregation server. In mobile scen... 详细信息
来源: 评论
DeepkeyGen: A deep learning-based stream cipher generator for medical image encryption and decryption
arXiv
收藏 引用
arXiv 2020年
作者: Ding, Yi Tan, Fuyuan Qin, Zhen Cao, Mingsheng Choo, Kim-Kwang Raymond Qin, Zhiguang Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China ChengduSichuan610054 China Institute of Electronic and Information Engineering of UESTC in Guangdong Guangdong523808 China Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China ChengduSichuan610054 China Department of Information Systems and Cyber Security University of Texas at San Antonio San AntonioTX78249-0631 United States
The need for medical image encryption is increasingly pronounced, for example to safeguard the privacy of the patients’ medical imaging data. In this paper, a novel deep learning-based key generation network (Deepkey... 详细信息
来源: 评论
Dual attention mechanism object tracking algorithm based on Fully-convolutional Siamese network
Dual attention mechanism object tracking algorithm based on ...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Sugang Ma Zixian Zhang Lei Zhang Yanping Chen Xiaobao Yang Lei Pu Zhiqiang Hou School of Computer Science and Technology Xi’an University of Posts and Telecommunications Xi’an Shaanxi China School of Information Engineering Chang’an University Xi’an Shaanxi China Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi’an Key Laboratory of Big Data and Intelligent Computing Xi’an University of Posts and Telecommunications Xi’an Shaanxi China School of Information and Navigation Air Force Engineering University Xi’an Shaanxi China
In an effort to the problem of insufficient tracking performance of the Fully-convolutional Siamese network (SiamFC) in complex scenarios, a dual attention mechanism object tracking algorithm based on the Fully-convol... 详细信息
来源: 评论
SECP-AKE: Secure and efficient certificateless-password-based authenticated key exchange protocol for smart healthcare systems
收藏 引用
Journal of Systems Architecture 2025年 167卷
作者: Zhiqiang Zhao Xuexian Hu Yining Liu Jianghong Wei Yuanjun Xia Yangfan Liang State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou 450000 Henan China School of Data Science and Artificial Intelligence Wenzhou University of Technology Wenzhou 325027 Zhejiang China School of Computer and Information Security Guilin University of Electronic Technology Guilin 541004 Guangxi China College of Information Science and Engineering the Provincial Key Laboratory of Multimodal Perceiving and Intelligent Systems the Key Laboratory of Medical Electronics and Digital Health of Zhejiang Province and the Engineering Research Center of Intelligent Human Health Situation Awareness of Zhejiang Province Jiaxing University Jiaxing 314001 Zhejiang China
Due to the importance and sensitivity of medical data, the security protection and privacy preservation of the Healthcare Internet of Things (IoT) are current research hotspots. However, existing research schemes stil...
来源: 评论
Underwater image enhancement via medium transmission-guided multi-color space embedding
arXiv
收藏 引用
arXiv 2021年
作者: Li, Chongyi Anwar, Saeed Hou, Junhui Cong, Runmin Guo, Chunle Ren, Wenqi CSIRO Department of Computer Science City University of Hong Kong Kowloon999077 Hong Kong Institute of Information Science Beijing Jiaotong University Beijing100044 China Beijing Key Laboratory of Advanced Information Science and Network Technology Beijing Jiaotong University Beijing100044 China College of Computer Science Nankai University Tianjin China Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences China
State key laboratory of Information security, Institute of Information Engineering, Chinese Academy of Sciences, China Underwater images suffer from color casts and low contrast due to wavelength- A nd distance-depend... 详细信息
来源: 评论
Unbounded key-Policy Attribute-Based Encryption with Black-Box Traceability
Unbounded Key-Policy Attribute-Based Encryption with Black-B...
收藏 引用
IEEE International Conference on Trust, security and Privacy in computing and Communications (TrustCom)
作者: Yunxiu Ye Zhenfu Cao Jiachen Shen Shanghai Key Laboratory of Trustworthy Computing East China Normal University Shanghai China Cyberspace Security Research Center Peng Cheng Laboratory Shenzhen and Shanghai Institute of Intelligent Science and Technology Tongji University China
Attribute-based encryption received widespread attention as soon as it was proposed. However, due to its specific characteristics, some restrictions on attribute set are not flexible enough in actual operation. In add... 详细信息
来源: 评论
Practical and Secure Circular Range Search on Private Spatial Data
Practical and Secure Circular Range Search on Private Spatia...
收藏 引用
IEEE International Conference on Trust, security and Privacy in computing and Communications (TrustCom)
作者: Zhihao Zheng Zhenfu Cao Jiachen Shen Shanghai Key Laboratory of Trustworthy Computing East China Normal University Shanghai China Cyberspace Security Research Center Peng Cheng Laboratory Shenzhen Shanghai Institute of Intelligent Science and Technology Tongji University China
With the location-based services (LBS) booming, the volume of spatial data inevitably explodes. In order to reduce local storage and computational overhead, users tend to outsource data and initiate queries to the clo... 详细信息
来源: 评论
Unsupervised Domain Adaptive Person Re-Identification via Human Learning Imitation
arXiv
收藏 引用
arXiv 2021年
作者: Peng, Yang Liu, Ping Luo, Yawei Zhou, Pan Xu, Zichuan Liu, Jingen Center for Frontier AI Research Agency for Science Technology and Research Singapore Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Hubei Wuhan China College of Computer Science and Technology Zhejiang University Zhejiang Hangzhou China Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province School of Software Dalian University of Technology Liaoning Dalian China
Unsupervised domain adaptive person re-identification has received significant attention due to its high practical value. In past years, by following the clustering and finetuning paradigm, researchers propose to util... 详细信息
来源: 评论
VCKSCF: Efficient Verifiable Conjunctive keyword Search Based on Cuckoo Filter for Cloud Storage
VCKSCF: Efficient Verifiable Conjunctive Keyword Search Base...
收藏 引用
IEEE International Conference on Trust, security and Privacy in computing and Communications (TrustCom)
作者: Chan Fan Xiaolei Dong Zhenfu Cao Jiachen Shen Shanghai Key Laboratory of Trustworthy Computing East China Normal University Shanghai China Cyberspace Security Research Center Peng Cheng Laboratory Shenzhen and Shanghai Institute of Intelligent Science and Technology Tongji University China
Searchable Symmetric Encryption(SSE) remains to be one of the hot topics in the field of cloud storage technology. However, malicious servers may return incorrect search results intentionally, which will bring signifi... 详细信息
来源: 评论
A Novel Distributed Anomaly Detection Algorithm for Low-density Data
A Novel Distributed Anomaly Detection Algorithm for Low-dens...
收藏 引用
Advances in Electrical Engineering and Computer Applications( AEECA), 2020 IEEE International Conference on
作者: Lin Mei Fengli Zhang University of Electronic Science and Technology of China Chengdu China Southwest Minzu University Chengdu China Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Chengdu China
Anomaly detection becomes an interesting and significant problem in data mining area. It, in turn, generates many promising applications such as Intrusion Detection, Fraud Detection, Mobile cellular network fraud, and... 详细信息
来源: 评论