咨询与建议

限定检索结果

文献类型

  • 564 篇 会议
  • 506 篇 期刊文献

馆藏范围

  • 1,070 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 729 篇 工学
    • 589 篇 计算机科学与技术...
    • 466 篇 软件工程
    • 189 篇 信息与通信工程
    • 130 篇 电气工程
    • 69 篇 网络空间安全
    • 68 篇 控制科学与工程
    • 66 篇 生物工程
    • 56 篇 电子科学与技术(可...
    • 29 篇 机械工程
    • 27 篇 安全科学与工程
    • 26 篇 光学工程
    • 25 篇 交通运输工程
    • 24 篇 生物医学工程(可授...
    • 21 篇 仪器科学与技术
    • 18 篇 化学工程与技术
  • 332 篇 理学
    • 216 篇 数学
    • 68 篇 生物学
    • 63 篇 统计学(可授理学、...
    • 62 篇 物理学
    • 32 篇 系统科学
    • 17 篇 化学
  • 195 篇 管理学
    • 114 篇 管理科学与工程(可...
    • 95 篇 图书情报与档案管...
    • 39 篇 工商管理
  • 49 篇 法学
    • 28 篇 法学
    • 22 篇 社会学
  • 20 篇 医学
    • 19 篇 临床医学
    • 17 篇 基础医学(可授医学...
  • 20 篇 军事学
    • 18 篇 军队指挥学
  • 18 篇 经济学
    • 18 篇 应用经济学
  • 6 篇 农学
  • 5 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 43 篇 cryptography
  • 41 篇 privacy
  • 35 篇 computational mo...
  • 35 篇 feature extracti...
  • 32 篇 authentication
  • 31 篇 data privacy
  • 31 篇 semantics
  • 31 篇 cloud computing
  • 26 篇 federated learni...
  • 26 篇 data models
  • 24 篇 network security
  • 24 篇 accuracy
  • 22 篇 security
  • 22 篇 encryption
  • 21 篇 protocols
  • 19 篇 deep learning
  • 19 篇 training
  • 18 篇 servers
  • 17 篇 blockchain
  • 15 篇 neural networks

机构

  • 42 篇 key laboratory o...
  • 41 篇 school of comput...
  • 38 篇 shandong provinc...
  • 37 篇 school of comput...
  • 34 篇 shaanxi key labo...
  • 30 篇 key laboratory o...
  • 29 篇 fujian provincia...
  • 29 篇 school of comput...
  • 28 篇 shaanxi key labo...
  • 22 篇 school of comput...
  • 21 篇 fujian provincia...
  • 21 篇 state key labora...
  • 19 篇 school of comput...
  • 18 篇 shaanxi key labo...
  • 18 篇 state key labora...
  • 16 篇 school of mathem...
  • 16 篇 state key labora...
  • 13 篇 shandong fundame...
  • 13 篇 school of comput...
  • 12 篇 information cent...

作者

  • 37 篇 xu li
  • 26 篇 yichuan wang
  • 23 篇 meng deyu
  • 22 篇 xinhong hei
  • 20 篇 wang yichuan
  • 16 篇 cao xiangyong
  • 16 篇 shen yulong
  • 16 篇 di xiaoqiang
  • 16 篇 li xu
  • 16 篇 hei xinhong
  • 14 篇 chen lanxiang
  • 13 篇 li wei
  • 13 篇 xiong jinbo
  • 12 篇 xiaoqiang di
  • 12 篇 jinbo xiong
  • 12 篇 lin limei
  • 11 篇 chen zhong
  • 11 篇 liu jun
  • 11 篇 wu wei
  • 11 篇 fu chong

语言

  • 942 篇 英文
  • 96 篇 其他
  • 35 篇 中文
检索条件"机构=Key Laboratory of Network Security and Cryptology School of Mathematics and Computer Science"
1070 条 记 录,以下是31-40 订阅
排序:
Partial Offloading Strategy Based on Deep Reinforcement Learning in the Internet of Vehicles
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第07期24卷 6517-6531页
作者: Tian, Shujuan Zhu, Xinjie Feng, Bochao Zheng, Zhirun Liu, Haolin Li, Zhetao Xiangtan University School of Computer Science School of Cyberspace Security Xiangtan411105 China Xiangtan University Hunan International Scientific and Technological Cooperation Base of Intelligent network Xiangtan411105 China Xiangtan University Key Laboratory of Hunan Province for Internet of Things and Information Security Xiangtan411105 China Xiangtan University School of Mathematics and Compulational Science Xiangtan China Jinan University College of Information Science and Technology Guangzhou510632 China
Driven by the increasing demands of vehicular tasks, edge offloading has emerged as a promising paradigm to enhance quality of experience (QoE) in Internet of Vehicles (IoV) networks. This approach enables vehicles to... 详细信息
来源: 评论
A bitcoin service community classification method based on Random Forest and improved KNN algorithm
IET Blockchain
收藏 引用
IET Blockchain 2024年 第3期4卷 276-286页
作者: Gao, Muyun Lin, Shenwen Tian, Xin He, Xi He, Ketai Chen, Shifeng School of Mechanical Engineering University of Science and Technology Beijing Beijing China Internet Financial Security Technology Key Laboratory National Computer Network Emergency Response Technical Team/Coordination Center of China Beijing China
There are service communities with different functions in the Bitcoin transactions system. Identifying community categories helps to further understand the Bitcoin transactions system and facilitates targeted regulati... 详细信息
来源: 评论
Privacy Preserving Adjacency Query Supporting Homoionym Search over Medical Graph Data in Cloud Computing  17th
Privacy Preserving Adjacency Query Supporting Homoionym Sear...
收藏 引用
17th International Conference on Cloud Computing, CLOUD 2024, Held as Part of the Services Conference Federation, SCF 2024
作者: Li, Hourong Tian, Yun Wu, Bin Shi, Jiaoli School of Computer and Big Data Science Jiujiang University Jiujiang332005 China Jiujiang Key Laboratory of Network and Information Security Jiujiang332005 China
Cloud computing is widely used in all walks of life today. Massive amounts of medical graph data are being outsourced to cloud servers to reduce overhead. The untrustworthiness of cloud servers puts the sensitive info... 详细信息
来源: 评论
A Technique for Ensured Cross Chain IBC Transactions Using TPM  2
A Technique for Ensured Cross Chain IBC Transactions Using T...
收藏 引用
2nd International Conference on Big Data and Privacy Computing, BDPC 2024
作者: Wang, YiChuan Yan, YiLiang Liu, XiaoXue Gao, Wen Wang, ZiYan School of Computer Science and Engineering Xi'an University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China
Cross chain contact across several blockchains becomes increasingly significant in importance with the increased use of blockchain technology. However, security cannot be assured when producing equivalent outputs thro... 详细信息
来源: 评论
The Utility Optimization of Type I-PTT for Satellite Internet Navigation Location Information Protection
The Utility Optimization of Type I-PTT for Satellite Interne...
收藏 引用
2024 International Conference on Satellite Internet, SAT-NET 2024
作者: Qin, Zhixing Zhou, Jiafeng Tian, Mengjie Zhou, Yihui Lu, Laifeng Shaanxi Normal University School of Mathematics and Statistics Xi'an China Shaanxi Normal University School of Computer Science Xi'an China Xidian University Shaanxi Key Laboratory of Network and System Security Xi'an China
With the realization of direct-to-handset in Huawei smart phones, satellite communication has become a part of daily life, raising more and more concerns on security. Local differential privacy is a promising method f... 详细信息
来源: 评论
A Verifiable Privacy-Preserving Outsourced Prediction Scheme Based on Blockchain in Smart Healthcare
A Verifiable Privacy-Preserving Outsourced Prediction Scheme...
收藏 引用
2023 IEEE International Conference on E-Health networking, Application and Services, Healthcom 2023
作者: Li, Ta Tian, Youliang Xiong, Jinbo Wang, Linjie College of Computer Science and Technology Guizhou University State Key Laboratory of Public Big Data Guiyang550025 China College of Computer and Cyber Security Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Normal University Fuzhou350117 China School of Data Science Tongren University Tongren554300 China
The swift progression of the Internet of Things and the extensive integration of machine learning have spurred the growth of intelligent healthcare. Many intelligent healthcare devices, limited by their own computing ... 详细信息
来源: 评论
Provably Secure Efficient key-Exchange Protocol for Intelligent Supply Line Surveillance in Smart Grids
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 21784-21792页
作者: Ayub, Muhammad Faizan Li, Xiong Mahmood, Khalid Alenazi, Mohammed J.F. Das, Ashok Kumar Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu12599 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan Department of Computer Engineering Riyadh11451 Saudi Arabia International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500 032 India Korea University College of Informatics Department of Computer Science and Engineering Anam-ro Seoul145 Korea Republic of Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security China Shandong Fundamental Research Center for Computer Science Jinan 250353 China
Intelligent supply line surveillance is critical for modern smart grids. Smart sensors and gateway nodes are strategically deployed along supply lines to achieve intelligent surveillance. They collect data continuousl... 详细信息
来源: 评论
key Management and Authentication Scheme Forward Trusted Pervasive Container Computing  2
Key Management and Authentication Scheme Forward Trusted Per...
收藏 引用
2nd International Conference on Big Data and Privacy Computing, BDPC 2024
作者: Hei, XinHong Xue, YuZhan Wang, YiChuan Liu, YiFan Peng, Chen Sun, Xiang School of Computer Science and Engineering Xi'an University of Technology Xi'an China School of Computer Science and Engineering Xi'an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China
Cloud computing technology is an internet-based computing model that provides high reliability and security measures, including data backup, secure access control, etc. As Docker containers play a increasingly importa... 详细信息
来源: 评论
Privacy-Preserving Multi-keyword Fuzzy Adjacency Search Strategy for Encrypted Graph in Cloud Environment
收藏 引用
computers, Materials & Continua 2024年 第3期78卷 3177-3194页
作者: Bin Wu Xianyi Chen Jinzhou Huang Caicai Zhang Jing Wang Jing Yu Zhiqiang Zhao Zhuolin Mei School of Computer and Big Data Science Jiujiang UniversityJiujiang332005China Jiujiang Key Laboratory of Network and Information Security Jiujiang332005China School of Computer and Software Nanjing University of Information Science&TechnologyNanjing210044China School of Computer Engineering Hubei University of Arts and ScienceXiangyang441053China School of Modern Information Technology Zhejiang Institute of Mechanical and Electrical EngineeringHangzhou310053China Information Center Jiangxi Changjiang Chemical Co.Ltd.Jiujiang332005China School of Mathematics and Computer Science Ningxia Normal UniversityGuyuan756099China
In a cloud environment,outsourced graph data is widely used in companies,enterprises,medical institutions,and so *** owners and users can save costs and improve efficiency by storing large amounts of graph data on clo... 详细信息
来源: 评论
Multi-class Bitcoin mixing service identification based on graph classification
收藏 引用
Digital Communications and networks 2024年 第6期10卷 1881-1893页
作者: Xiaoyan Hu Meiqun Gui Guang Cheng Ruidong Li Hua Wu School of Cyber Science&Engineering Southeast UniversityNanjing 211189China Purple Mountain Laboratories for Network and Communication Security Nanjing 211111China Jiangsu Provincial Engineering Research Center of Security for Ubiquitous Network Nanjing 211189China Key Laboratory of Computer Network and Information Integration Southeast UniversityMinistry of EducationChina Research Base of International Cyberspace Governance Southeast UniversityNanjing 211189China Institute of Science and Engineering Kanazawa UniversityKakumaKanazawa920-1192Japan
Due to its anonymity and decentralization,Bitcoin has long been a haven for various illegal *** generally legalize illicit funds by Bitcoin mixing ***,it is critical to investigate the mixing services in cryptocurrenc... 详细信息
来源: 评论