咨询与建议

限定检索结果

文献类型

  • 564 篇 会议
  • 506 篇 期刊文献

馆藏范围

  • 1,070 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 729 篇 工学
    • 589 篇 计算机科学与技术...
    • 466 篇 软件工程
    • 189 篇 信息与通信工程
    • 130 篇 电气工程
    • 69 篇 网络空间安全
    • 68 篇 控制科学与工程
    • 66 篇 生物工程
    • 56 篇 电子科学与技术(可...
    • 29 篇 机械工程
    • 27 篇 安全科学与工程
    • 26 篇 光学工程
    • 25 篇 交通运输工程
    • 24 篇 生物医学工程(可授...
    • 21 篇 仪器科学与技术
    • 18 篇 化学工程与技术
  • 332 篇 理学
    • 216 篇 数学
    • 68 篇 生物学
    • 63 篇 统计学(可授理学、...
    • 62 篇 物理学
    • 32 篇 系统科学
    • 17 篇 化学
  • 195 篇 管理学
    • 114 篇 管理科学与工程(可...
    • 95 篇 图书情报与档案管...
    • 39 篇 工商管理
  • 49 篇 法学
    • 28 篇 法学
    • 22 篇 社会学
  • 20 篇 医学
    • 19 篇 临床医学
    • 17 篇 基础医学(可授医学...
  • 20 篇 军事学
    • 18 篇 军队指挥学
  • 18 篇 经济学
    • 18 篇 应用经济学
  • 6 篇 农学
  • 5 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 43 篇 cryptography
  • 41 篇 privacy
  • 35 篇 computational mo...
  • 35 篇 feature extracti...
  • 32 篇 authentication
  • 31 篇 data privacy
  • 31 篇 semantics
  • 31 篇 cloud computing
  • 26 篇 federated learni...
  • 26 篇 data models
  • 24 篇 network security
  • 24 篇 accuracy
  • 22 篇 security
  • 22 篇 encryption
  • 21 篇 protocols
  • 19 篇 deep learning
  • 19 篇 training
  • 18 篇 servers
  • 17 篇 blockchain
  • 15 篇 neural networks

机构

  • 42 篇 key laboratory o...
  • 41 篇 school of comput...
  • 38 篇 shandong provinc...
  • 37 篇 school of comput...
  • 34 篇 shaanxi key labo...
  • 30 篇 key laboratory o...
  • 29 篇 fujian provincia...
  • 29 篇 school of comput...
  • 28 篇 shaanxi key labo...
  • 22 篇 school of comput...
  • 21 篇 fujian provincia...
  • 21 篇 state key labora...
  • 19 篇 school of comput...
  • 18 篇 shaanxi key labo...
  • 18 篇 state key labora...
  • 16 篇 school of mathem...
  • 16 篇 state key labora...
  • 13 篇 shandong fundame...
  • 13 篇 school of comput...
  • 12 篇 information cent...

作者

  • 37 篇 xu li
  • 26 篇 yichuan wang
  • 23 篇 meng deyu
  • 22 篇 xinhong hei
  • 20 篇 wang yichuan
  • 16 篇 cao xiangyong
  • 16 篇 shen yulong
  • 16 篇 di xiaoqiang
  • 16 篇 li xu
  • 16 篇 hei xinhong
  • 14 篇 chen lanxiang
  • 13 篇 li wei
  • 13 篇 xiong jinbo
  • 12 篇 xiaoqiang di
  • 12 篇 jinbo xiong
  • 12 篇 lin limei
  • 11 篇 chen zhong
  • 11 篇 liu jun
  • 11 篇 wu wei
  • 11 篇 fu chong

语言

  • 942 篇 英文
  • 96 篇 其他
  • 35 篇 中文
检索条件"机构=Key Laboratory of Network Security and Cryptology School of Mathematics and Computer Science"
1070 条 记 录,以下是21-30 订阅
排序:
A Novel Teaching Strategy Based on EduCoder Platform for C Programming Language  5th
A Novel Teaching Strategy Based on EduCoder Platform for C P...
收藏 引用
5th International Conference on computer science and Educational Informatization, CSEI 2023
作者: Li, Wei Hei, Xinhong Wang, Lei Wang, Yichuan School of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China School of Mathematics and Computer Science Shaanxi University of Technology Hanzhong China
Experimental teaching is an important part of the C programming language course, which aims to cultivate students’ Computational thinking ability, problem solving ability and programming ability. However, the existin... 详细信息
来源: 评论
A Low-Rank Matching Attention Based Cross-Modal Feature Fusion Method for Conversational Emotion Recognition
收藏 引用
IEEE Transactions on Affective Computing 2024年 第2期16卷 1177-1189页
作者: Shou, Yuntao Liu, Huan Cao, Xiangyong Meng, Deyu Dong, Bo Xi'An Jiaotong School of Computer Science and Technology Ministry of Education Key Laboratory for Intelligent Networks and Network Security Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Shaanxi Xi'an710049 China Xi'An Jiaotong School of Computer Science and Technology Shaanxi Xi'an710049 China BigKEJoint Innovation Center SHMEEA Shanghai China Xi'An Jiaotong University School of Mathematics and Statistics Xi'an China
Conversational emotion recognition (CER) is an important research topic in human-computer interactions. Although recent advancements in transformer-based cross-modal fusion methods have shown promise in CER tasks, the... 详细信息
来源: 评论
A generalized reliability analysis of 3-ary n-cubes  16
A generalized reliability analysis of 3-ary n-cubes
收藏 引用
16th International Conference on Communication Software and networks, ICCSN 2024
作者: Bai, Zefang Wang, Guijuan Ma, Meijie School of Mathematics and Statistics Jinan250353 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250353 China
Evaluating the reliability of interconnection networks is crucial. The edge-connectivity is a parameter used to assess reliability. In this paper, we discuss a conditional edge-connectivity called the h-extra g-compon... 详细信息
来源: 评论
Volume Hiding Conjunctive Searchable Symmetric Encryption over Cloud  16
Volume Hiding Conjunctive Searchable Symmetric Encryption ov...
收藏 引用
16th International Conference on Cyber-Enabled Distributed Computing and Knowledge Discover, CyberC 2024
作者: Deng, Qinghua Chen, Lanxiang Zhu, Yizhao Mu, Yi City University of Macau Faculty of Data Science 999078 China Hanshan Normal University School of Computer and Information Engineering Chaozhou521041 China Fujian Normal University Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fuzhou China
Symmetric searchable encryption (SSE) is crucial for promoting cloud storage. It enables users to encrypt private data and outsource it to untrusted servers while retaining query capabilities. To prevent the cloud fro... 详细信息
来源: 评论
A Fine-Grained Ownership Transfer Protocol for Cloud EMRs Auditing  24th
A Fine-Grained Ownership Transfer Protocol for Cloud EMRs A...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Wang, Yamei Zhang, Yuexin You, Weijing Ma, Yunru Wang, Derui Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fujian Normal University Fuzhou China School of Health Fujian Medical University Fuzhou China CSIRO’s Data61 Melbourne Australia
In cloud Electronic Medical Records (EMRs), a user’s medical records typically comprise various types of health-related sensitive data. When data ownership needs to be transferred, it is preferred to transfer the req... 详细信息
来源: 评论
Malware Detection Method Based on TPE Optimized Stacking  3
Malware Detection Method Based on TPE Optimized Stacking
收藏 引用
3rd International Conference on High Performance Computing and Communication Engineering, HPCCE 2023
作者: Zhao, Dongbo Yuan, Zesong Xie, Nannan Jilin Province Key Laboratory of Network and Information Security School of Computer Science and Technology Changchun University of Science and Technology Changchun130022 China
Fast detection and categorization of malware are increasingly important for securing hosts and networks. Although many Machine Learning models have been utilized to detect malware, single-model detection may not remai... 详细信息
来源: 评论
Towards Public Integrity Audition for Cloud-IoT Data Based on Blockchain
收藏 引用
computer Systems science & Engineering 2022年 第6期41卷 1129-1142页
作者: Hao Yan Yanan Liu Shuo Qiu Shengzhou Hu Weijian Zhang Jinyue Xia School of Network Security Jinling Institute of TechnologyNanjing211169China Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Normal UniversityFuzhou350007China Department of Mathematics and Computer Science Gannan Normal UniversityGanzhou341000China Network Security and Information Office Hohai UniversityNanjing210098China International Business Machines Corporation(IBM) New YorkNYUSA
With the rapidly developing of Internet of Things (IoT), the volume ofdata generated by IoT systems is increasing quickly. To release the pressure ofdata management and storage, more and more enterprises and individua... 详细信息
来源: 评论
Aggregation-based dual heterogeneous task allocation in spatial crowdsourcing
收藏 引用
Frontiers of computer science 2024年 第6期18卷 215-227页
作者: Xiaochuan LIN Kaimin WEI Zhetao LI Jinpeng CHEN Tingrui PEI College of Information Science and Technology&Cyberspace Security Jinan UniversityGuangzhou 510632China National&Local Joint Engineering Research Center of Network Security Detection and Protection Technology Guangzhou 510632China Guangdong Provincial Key Laboratory of Data Security and Privacy Protection Guangzhou 510632China School of Computer Science Beijing University of Posts and TelecommunicationsBeijing 100876China
Spatial crowdsourcing(SC)is a popular data collection paradigm for numerous *** the increment of tasks and workers in SC,heterogeneity becomes an unavoidable difficulty in task *** researches only focus on the single-... 详细信息
来源: 评论
Textual Data De-Privatization Scheme Based on Generative Adversarial networks  24th
Textual Data De-Privatization Scheme Based on Generative Adv...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Du, Yanning Xu, Jinnan Zhang, Yaling Wang, Yichuan Wang, Zhoukai School of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China
In many fields, such as healthcare, finance, and scientific research, data sharing and collaboration are critical to achieving better outcomes. However, the sharing of personal data often involves privacy risks, so pr... 详细信息
来源: 评论
An Efficient and Privacy-Preserving Data Aggregation Scheme Supporting Arbitrary Statistical Functions in IoT
收藏 引用
China Communications 2022年 第6期19卷 91-104页
作者: Haihui Liu Jianwei Chen Liwei Lin Ayong Ye Chuan Huang College of Computer and Cyber Security Fujian Normal UniversityFuzhou 350117China Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Normal UniversityFuzhou 350117China School of Computer Science and Mathematics Fujian University of TechnologyFuzhou 350118China Digital Fujian Institute of Big Data Security Technology Fujian Normal UniversityFuzhou 350117China
The Internet of Things(IoT)has profoundly impacted our lives and has greatly revolutionized our *** terminal devices in an IoT data aggregation application sense real-time data for the remote cloud server to achieve i... 详细信息
来源: 评论