咨询与建议

限定检索结果

文献类型

  • 2,000 篇 会议
  • 1,550 篇 期刊文献

馆藏范围

  • 3,550 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,327 篇 工学
    • 1,767 篇 计算机科学与技术...
    • 1,442 篇 软件工程
    • 578 篇 信息与通信工程
    • 316 篇 电气工程
    • 249 篇 控制科学与工程
    • 231 篇 生物工程
    • 225 篇 电子科学与技术(可...
    • 167 篇 网络空间安全
    • 136 篇 机械工程
    • 112 篇 光学工程
    • 95 篇 生物医学工程(可授...
    • 86 篇 化学工程与技术
    • 83 篇 安全科学与工程
    • 80 篇 仪器科学与技术
    • 79 篇 交通运输工程
    • 61 篇 建筑学
    • 59 篇 动力工程及工程热...
    • 58 篇 材料科学与工程(可...
  • 1,054 篇 理学
    • 601 篇 数学
    • 251 篇 物理学
    • 247 篇 生物学
    • 206 篇 统计学(可授理学、...
    • 101 篇 系统科学
    • 84 篇 化学
  • 586 篇 管理学
    • 323 篇 管理科学与工程(可...
    • 298 篇 图书情报与档案管...
    • 95 篇 工商管理
  • 118 篇 法学
    • 70 篇 社会学
  • 80 篇 医学
    • 70 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 43 篇 经济学
  • 31 篇 军事学
  • 16 篇 农学
  • 14 篇 教育学
  • 7 篇 艺术学
  • 6 篇 文学

主题

  • 151 篇 feature extracti...
  • 124 篇 semantics
  • 98 篇 accuracy
  • 97 篇 training
  • 93 篇 computational mo...
  • 91 篇 deep learning
  • 73 篇 federated learni...
  • 71 篇 privacy
  • 66 篇 cryptography
  • 63 篇 data models
  • 57 篇 authentication
  • 55 篇 protocols
  • 51 篇 security
  • 50 篇 data privacy
  • 49 篇 neural networks
  • 48 篇 object detection
  • 47 篇 information secu...
  • 47 篇 cloud computing
  • 45 篇 robustness
  • 44 篇 machine learning

机构

  • 219 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 93 篇 university of ch...
  • 80 篇 school of comput...
  • 80 篇 key laboratory o...
  • 64 篇 information secu...
  • 62 篇 cas key laborato...
  • 62 篇 school of cyber ...
  • 58 篇 guangdong provin...
  • 52 篇 tianjin key labo...
  • 50 篇 shandong fundame...
  • 48 篇 network and data...
  • 48 篇 state key labora...
  • 46 篇 shandong enginee...
  • 46 篇 peng cheng labor...
  • 45 篇 college of compu...
  • 45 篇 school of comput...
  • 44 篇 state key labora...
  • 42 篇 shandong provinc...
  • 42 篇 institute of inf...

作者

  • 97 篇 cheng xueqi
  • 47 篇 shen huawei
  • 46 篇 guo jiafeng
  • 42 篇 zheng wei-shi
  • 33 篇 yixian yang
  • 33 篇 xie xiaohua
  • 32 篇 huang qingming
  • 32 篇 cao xiaochun
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 24 篇 xinhong hei
  • 23 篇 jin hai
  • 21 篇 lai jianhuang
  • 21 篇 meng deyu
  • 21 篇 wang yichuan
  • 20 篇 xiaoming wu
  • 20 篇 shen yulong

语言

  • 3,284 篇 英文
  • 190 篇 其他
  • 82 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3550 条 记 录,以下是21-30 订阅
排序:
THL: Fast Targeted High Utility Itemset Mining within Length Consideration
Journal of Network Intelligence
收藏 引用
Journal of network Intelligence 2025年 第1期10卷 541-558页
作者: Xu, Peiming Jiang, Yixin Kuang, Xiaoyun Luo, Yu Chen, Jiahui Guangdong Provincial Key Laboratory of Power System Network Security CSG Guangzhou510000 China School of Computer Science and Technology Guangdong University of Technology Guangzhou510006 China
High utility itemset mining is a research topic of the pattern mining domain, which has been widely applied in reality during the past decade. Although most high utility itemset mining algorithms show significant exec... 详细信息
来源: 评论
The Study of Multi-type computing Power Trading Mechanism in computing Power network Based on Blockchain and Combinatorial Double Auction  24
The Study of Multi-type Computing Power Trading Mechanism in...
收藏 引用
4th International Conference on Artificial Intelligence, Big Data and Algorithms, CAIBDA 2024
作者: Zhao, Yue Wang, Jizhi Kong, Lingrui Sui, Tongtong Shandong Computer Science Center National Supercomputer Center in Jinan Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Provincial Key Laboratory of Industrial Network and Information System Security Qilu University of Technology Shandong Academy of Sciences Jinan Shandong China Quancheng Laboratory Jinan Key Laboratory of Digital Security Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan Shandong China
The advancement of 5G and mobile internet technologies has propelled the development of emerging businesses and applications, demanding higher requirements for network bandwidth and computational resources. To address... 详细信息
来源: 评论
Structure-based Street Tree Extraction from Mobile Laser Scanning Point Clouds  2022
Structure-based Street Tree Extraction from Mobile Laser Sca...
收藏 引用
5th International Conference on Image and Graphics Processing, ICIGP 2022
作者: Hao, Wen Zuo, Zhanbin Liang, Wei School of Computer Science and Engineering Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an University of Technology China Shaanxi Key Laboratory for Network Computing and Security Technology China
We present an automatic method based on structure analysis for extracting street trees from mobile laser scanning (MLS) data. Tree trunk and canopy can be characterized by the shape information and height above the gr... 详细信息
来源: 评论
Achieving dynamic privacy measurement and protection based on reinforcement learning for mobile edge crowdsensing of IoT
收藏 引用
Digital Communications and networks 2024年 第2期10卷 380-388页
作者: Renwan Bi Mingfeng Zhao Zuobin Ying Youliang Tian Jinbo Xiong Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber SecurityFujian Normal UniversityFuzhou350117China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic TechnologyGuilin541004China Faculty of Data Science City University of Macao999078MacaoChina State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang550025China
With the maturity and development of 5G field,Mobile Edge CrowdSensing(MECS),as an intelligent data collection paradigm,provides a broad prospect for various applications in ***,sensing users as data uploaders lack a ... 详细信息
来源: 评论
A Novel Construction of Updatable Identity-Based Hash Proof System and Its Applications
收藏 引用
Chinese Journal of Electronics 2023年 第3期32卷 564-576页
作者: QIAO Zirui ZHOU Yanwei YANG Bo ZHANG Wenzheng ZHANG Mingwu School of Computer Science Shaanxi Normal University State Key Laboratory of Cryptology Science and Technology on Communication Security Laboratory Henan Key Laboratory of Network Cryptography Technology School of Computere Hubei University of Technology
In the previous works, to further provide the continuous leakage resilience for the identity-based encryption scheme, a new cryptography primitive, called updatable identity-based hash proof system(U-IB-HPS),was propo... 详细信息
来源: 评论
Malicious Client Detection with Differential Privacy Constraints Based on Model Update Slicing and K-Means Clustering  6
Malicious Client Detection with Differential Privacy Constra...
收藏 引用
6th International Conference on Frontier Technologies of Information and Computer, ICFTIC 2024
作者: Qi, Mengshi Wang, Xin He, Yunpeng Yang, Ming Wu, Xiaoming Key Laboratory of Computing Power Network and Information Security Jinan250014 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250014 China
Federated learning (FL) is a decentralized machine learning technique that protects data privacy by trainng models locally on devices and sharing only model updates instead of raw data. However, FL also faces multiple... 详细信息
来源: 评论
On the complete weight distributions of quantum error-correcting codes
收藏 引用
Chinese Physics B 2023年 第5期32卷 272-287页
作者: 杜超 马智 熊茂胜 State Key Laboratory of Mathematical Engineering and Advanced Computing Zhenghzhou 450001China Henan Key Laboratory of Network Cryptography Technology Zhenghzhou 450001China Department of Mathematics Hong Kong University of Science and TechnologyHong KongChina
In a recent paper, Hu et al. defined the complete weight distributions of quantum codes and proved the Mac Williams identities, and as applications they showed how such weight distributions may be used to obtain the s... 详细信息
来源: 评论
NDFuzz:a non-intrusive coverage-guided fuzzing framework for virtualized network devices
收藏 引用
Cybersecurity 2023年 第1期6卷 54-74页
作者: Yu Zhang Nanyu Zhong Wei You Yanyan Zou Kunpeng Jian Jiahuan Xu Jian Sun Baoxu Liu Wei Huo Institute of Information Engineering Chinese Academy of SciencesBejingChina School of Cyber Security University of Chinese Academy of SciencesBejingChina Key Laboratory of Network Assessment Technology Chinese Academy of SciencesBeijingChina Beijing Key Laboratory of Network Security and Protection Technology BeijingChina Renmin University of China BeijingChina
network function virtualization provides programmable in-network middlewares by leveraging virtualization tech-nologies and commodity hardware and has gained popularity among all mainstream network device *** it is ch... 详细信息
来源: 评论
Remote Data Auditing for Cloud-Assisted WBANs with Pay-as-You-Go Business Model
收藏 引用
Chinese Journal of Electronics 2023年 第2期32卷 248-261页
作者: LI Yumei ZHANG Futai School of Computer Science Hubei University of Technology Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber SecurityFujian Normal University
As an emerging technology, cloud-assisted wireless body area networks(WBANs) provide more convenient services to users. Recently, many remote data auditing protocols have been proposed to ensure the data integrity and... 详细信息
来源: 评论
DDoS Attack Detection Based on Information Entropy Feature Extraction in Software Defined networks
DDoS Attack Detection Based on Information Entropy Feature E...
收藏 引用
2023 International Conference on networking and network Applications, NaNA 2023
作者: Ji, Wenjiang Yang, Yixin Zhang, Yaling Wang, Yichuan Tian, Mengjie Qiu, Yuan Xi'an University of Technology School of Computer Science and Engineering Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology China
Distributed Denial of Service(DDoS) attacks target the forwarding-control separation feature of Software-Defined networking(SDN) to launch attacks, causing network disruptions. Therefore security against DDoS attack d... 详细信息
来源: 评论