咨询与建议

限定检索结果

文献类型

  • 555 篇 会议
  • 494 篇 期刊文献

馆藏范围

  • 1,049 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 712 篇 工学
    • 574 篇 计算机科学与技术...
    • 457 篇 软件工程
    • 189 篇 信息与通信工程
    • 125 篇 电气工程
    • 68 篇 网络空间安全
    • 66 篇 生物工程
    • 64 篇 控制科学与工程
    • 56 篇 电子科学与技术(可...
    • 29 篇 机械工程
    • 26 篇 光学工程
    • 26 篇 安全科学与工程
    • 24 篇 交通运输工程
    • 24 篇 生物医学工程(可授...
    • 21 篇 仪器科学与技术
    • 17 篇 化学工程与技术
  • 325 篇 理学
    • 213 篇 数学
    • 68 篇 生物学
    • 64 篇 统计学(可授理学、...
    • 60 篇 物理学
    • 32 篇 系统科学
    • 16 篇 化学
  • 191 篇 管理学
    • 112 篇 管理科学与工程(可...
    • 92 篇 图书情报与档案管...
    • 38 篇 工商管理
  • 48 篇 法学
    • 27 篇 法学
    • 22 篇 社会学
  • 20 篇 医学
    • 19 篇 临床医学
    • 17 篇 基础医学(可授医学...
  • 20 篇 军事学
    • 18 篇 军队指挥学
  • 18 篇 经济学
    • 18 篇 应用经济学
  • 6 篇 农学
  • 4 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 43 篇 cryptography
  • 40 篇 privacy
  • 35 篇 computational mo...
  • 34 篇 feature extracti...
  • 31 篇 authentication
  • 31 篇 semantics
  • 31 篇 cloud computing
  • 30 篇 data privacy
  • 26 篇 data models
  • 25 篇 federated learni...
  • 24 篇 network security
  • 23 篇 accuracy
  • 22 篇 encryption
  • 21 篇 security
  • 21 篇 protocols
  • 19 篇 deep learning
  • 19 篇 training
  • 18 篇 servers
  • 17 篇 blockchain
  • 15 篇 neural networks

机构

  • 43 篇 key laboratory o...
  • 40 篇 school of comput...
  • 37 篇 shandong provinc...
  • 36 篇 school of comput...
  • 33 篇 shaanxi key labo...
  • 30 篇 key laboratory o...
  • 29 篇 fujian provincia...
  • 28 篇 school of comput...
  • 28 篇 shaanxi key labo...
  • 21 篇 school of comput...
  • 21 篇 fujian provincia...
  • 21 篇 state key labora...
  • 19 篇 school of comput...
  • 19 篇 state key labora...
  • 17 篇 shaanxi key labo...
  • 16 篇 school of mathem...
  • 16 篇 state key labora...
  • 12 篇 information cent...
  • 12 篇 jilin province k...
  • 12 篇 school of comput...

作者

  • 37 篇 xu li
  • 26 篇 yichuan wang
  • 23 篇 meng deyu
  • 22 篇 xinhong hei
  • 19 篇 wang yichuan
  • 16 篇 cao xiangyong
  • 16 篇 shen yulong
  • 16 篇 di xiaoqiang
  • 16 篇 li xu
  • 15 篇 hei xinhong
  • 13 篇 li wei
  • 13 篇 chen lanxiang
  • 12 篇 jinbo xiong
  • 12 篇 lin limei
  • 12 篇 xiong jinbo
  • 11 篇 chen zhong
  • 11 篇 xiaoqiang di
  • 11 篇 wu wei
  • 11 篇 fu chong
  • 11 篇 wei wei

语言

  • 949 篇 英文
  • 68 篇 其他
  • 35 篇 中文
检索条件"机构=Key Laboratory of Network Security and Cryptology School of Mathematics and Computer Science"
1049 条 记 录,以下是11-20 订阅
排序:
Characterization and Properties of Bent-Negabent Functions
收藏 引用
Chinese Journal of Electronics 2022年 第4期31卷 786-792页
作者: JIANG Niu ZHAO Min YANG Zhiyao ZHUO Zepeng CHEN Guolong School of Mathematical Sciences Huaibei Normal University Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Normal University School of Cyber Science University of Science and Technology of China School of Computer Engineering Bengbu University
A further characterization of the bentnegabent functions is presented. Based on the concept of complete mapping polynomial, we provide a necessary and sufficient condition for a class of quadratic Boolean functions to... 详细信息
来源: 评论
Intermittent Fault Diagnosis of Split-Star networks and its Applications
收藏 引用
IEEE Transactions on Parallel and Distributed Systems 2023年 第4期34卷 1253-1264页
作者: Song, Jiankang Lin, Limei Huang, Yanze Hsieh, Sun-Yuan Fujian Normal University College of Computer and Cyber Security Key Laboratory of Network Security and Cryptology Fuzhou Fujian350117 China Fujian University of Technology School of Computer Science and Mathematics Fuzhou Fujian350118 China National Cheng Kung University Department of Computer Science and Information Engineering Tainan701 Taiwan
With the rapid increase of the number of processors in multiprocessor systems and the fast expansion of interconnection networks, the reliability of interconnection network is facing severe challenges, where the fast ... 详细信息
来源: 评论
Ramp Scheme Based on CRT for Polynomial Ring over Finite Field
收藏 引用
Journal of Systems science & Complexity 2023年 第1期36卷 129-150页
作者: DING Jian KE Pinhui LIN Changlu WANG Huaxiong College of Computer and Cyber Security Fujian Normal UniversityFuzhou 350007China School of Mathematics and Big Data Chaohu UniveristyHefei 238024China School of Mathematics and Statistics and Fujian Provincial Key Lab of Network Security and CryptologyFujian Normal UniversityFuzhou 350007China School of Physical and Mathematical Sciences Nanyang Technological UniversitySingapore 639798Singapore
Chinese Reminder Theorem(CRT)for integers has been widely used to construct secret sharing schemes for different scenarios,but these schemes have lower information rates than that of Lagrange interpolation-based *** A... 详细信息
来源: 评论
Achieving reliable and anti-collusive outsourcing computation and verification based on blockchain in 5G-enabled IoT
收藏 引用
Digital Communications and networks 2022年 第5期8卷 644-653页
作者: Linjie Wang Youliang Tian Jinbo Xiong School of Data Science Tongren UniversityTongren554300China State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou UniversityGuiyang550025China Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber SecurityFujian Normal UniversityFuzhou350117China
Widespread applications of 5G technology have prompted the outsourcing of computation dominated by the Internet of Things(IoT)cloud to improve transmission efficiency,which has created a novel paradigm for improving t... 详细信息
来源: 评论
THL: Fast Targeted High Utility Itemset Mining within Length Consideration
Journal of Network Intelligence
收藏 引用
Journal of network Intelligence 2025年 第1期10卷 541-558页
作者: Xu, Peiming Jiang, Yixin Kuang, Xiaoyun Luo, Yu Chen, Jiahui Guangdong Provincial Key Laboratory of Power System Network Security CSG Guangzhou510000 China School of Computer Science and Technology Guangdong University of Technology Guangzhou510006 China
High utility itemset mining is a research topic of the pattern mining domain, which has been widely applied in reality during the past decade. Although most high utility itemset mining algorithms show significant exec... 详细信息
来源: 评论
Regularization Mixup Adversarial Training: A Defense Strategy for Membership Privacy with Model Availability Assurance  2
Regularization Mixup Adversarial Training: A Defense Strateg...
收藏 引用
2nd International Conference on Big Data and Privacy Computing, BDPC 2024
作者: Ding, Zehua Tian, Youliang Wang, Guorong Xiong, Jinbo College of Computer Science and Technology Guizhou University State Key Laboratory of Public Big Data Guiyang China College of Computer and Cyber Security Fujian Normal University Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou China
Neural network models face two highly destructive threats in real-world applications: membership inference attacks (MIAs) and adversarial attacks (AAs). One compromises the model's confidentiality, leading to memb... 详细信息
来源: 评论
Privacy-Preserving Access Control Model for E-Medical Systems  2
Privacy-Preserving Access Control Model for E-Medical System...
收藏 引用
2nd International Conference on Big Data and Privacy Computing, BDPC 2024
作者: Cai, Rongsheng Chen, Lanxiang Zhu, Yizhao City University of Macau Faculty of Data Science 999078 China College of Computer and Cyber Security Fujian Normal University Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou China
With the high speed development of information technology, the healthcare system increasingly relies on cloud servers for data storage and complex computation, patient data privacy issues stem from healthcare systems&... 详细信息
来源: 评论
Privacy-Preserving Responsible Gaming Systems  2
Privacy-Preserving Responsible Gaming Systems
收藏 引用
2nd International Conference on Big Data and Privacy Computing, BDPC 2024
作者: Zhu, Yizhao Chen, Lanxiang City University of Macau Faculty of Data Science 999078 China College of Computer and Cyber Security Fujian Normal University Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou China
Responsible gaming aims at maintaining the integrity and sustainability of the gaming industry. However, The exchange of sensitive data, such as player and gaming related information, among different parties raises si... 详细信息
来源: 评论
Online Queue-Aware Service Migration and Resource Allocation in Mobile Edge Computing
收藏 引用
IEEE Transactions on Vehicular Technology 2025年 第5期74卷 8063-8078页
作者: Du, An Jia, Jie Chen, Jian Wang, Xingwei Huang, Ming Northeastern University School of Computer Science and Engineering Engineering Research Center of Security Technology of Complex Network System Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Shenyang110819 China Northeastern University School of Computer Science and Engineering Shenyang110819 China
Mobile edge computing (MEC) integrated with network Functions Virtualization (NFV) helps run a wide range of services implemented by Virtual network Functions (VNFs) deployed at MEC networks. This emerging paradigm of... 详细信息
来源: 评论
Blockchain-Based Data Acquisition with Privacy Protection in UAV Cluster network
收藏 引用
computer Modeling in Engineering & sciences 2023年 第10期137卷 879-902页
作者: Lemei Da Hai Liang Yong Ding Yujue Wang Changsong Yang Huiyong Wang Guangxi Key Laboratory of Cryptography and Information Security School of Computer Science and Information SecurityGuilin University of Electronic TechnologyGuilin541004China Cyberspace Security Research Center Pengcheng LaboratoryShenzhen518055China School of Mathematics and Computing Science Guilin University of Electronic TechnologyGuilin541004China
The unmanned aerial vehicle(UAV)self-organizing network is composed of multiple UAVs with autonomous capabilities according to a certain structure and scale,which can quickly and accurately complete complex tasks such... 详细信息
来源: 评论