咨询与建议

限定检索结果

文献类型

  • 769 篇 会议
  • 510 篇 期刊文献

馆藏范围

  • 1,279 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 836 篇 工学
    • 626 篇 计算机科学与技术...
    • 485 篇 软件工程
    • 221 篇 信息与通信工程
    • 140 篇 电气工程
    • 100 篇 电子科学与技术(可...
    • 92 篇 网络空间安全
    • 84 篇 控制科学与工程
    • 58 篇 生物工程
    • 48 篇 机械工程
    • 29 篇 动力工程及工程热...
    • 26 篇 仪器科学与技术
    • 26 篇 建筑学
    • 25 篇 安全科学与工程
    • 24 篇 交通运输工程
    • 21 篇 光学工程
    • 20 篇 土木工程
    • 20 篇 航空宇航科学与技...
    • 20 篇 生物医学工程(可授...
  • 328 篇 理学
    • 212 篇 数学
    • 73 篇 统计学(可授理学、...
    • 62 篇 生物学
    • 56 篇 物理学
    • 39 篇 系统科学
  • 196 篇 管理学
    • 130 篇 管理科学与工程(可...
    • 69 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 48 篇 法学
    • 26 篇 法学
    • 22 篇 社会学
  • 29 篇 医学
    • 23 篇 临床医学
    • 20 篇 基础医学(可授医学...
  • 20 篇 军事学
  • 13 篇 经济学
  • 7 篇 农学
  • 3 篇 教育学
  • 2 篇 文学

主题

  • 49 篇 cryptography
  • 42 篇 authentication
  • 39 篇 feature extracti...
  • 38 篇 accuracy
  • 36 篇 protocols
  • 35 篇 semantics
  • 34 篇 information secu...
  • 34 篇 security
  • 33 篇 public key crypt...
  • 32 篇 simulation
  • 28 篇 deep learning
  • 28 篇 computational mo...
  • 26 篇 privacy
  • 25 篇 federated learni...
  • 24 篇 internet of thin...
  • 24 篇 training
  • 22 篇 laboratories
  • 20 篇 robustness
  • 19 篇 steganography
  • 18 篇 wireless communi...

机构

  • 82 篇 key laboratory o...
  • 66 篇 shandong provinc...
  • 51 篇 shandong enginee...
  • 35 篇 information secu...
  • 31 篇 school of cyber ...
  • 29 篇 state key labora...
  • 27 篇 institute of inf...
  • 21 篇 national enginee...
  • 21 篇 shandong provinc...
  • 20 篇 key laboratory o...
  • 18 篇 key laboratory o...
  • 18 篇 college of compu...
  • 18 篇 shandong fundame...
  • 17 篇 xi'an university...
  • 16 篇 network and data...
  • 16 篇 key laboratory o...
  • 16 篇 shaanxi key labo...
  • 14 篇 key laboratory o...
  • 14 篇 shaanxi key labo...
  • 13 篇 key laboratory o...

作者

  • 45 篇 yang xiaoyuan
  • 41 篇 xiaoyuan yang
  • 29 篇 xu an wang
  • 27 篇 zhang minqing
  • 24 篇 wang hui-ming
  • 23 篇 wang xu an
  • 20 篇 ye yinghui
  • 18 篇 yang yixian
  • 18 篇 minqing zhang
  • 17 篇 yiliang han
  • 16 篇 yixian yang
  • 15 篇 han yiliang
  • 15 篇 jing zhao
  • 15 篇 lu guangyue
  • 14 篇 ping wei
  • 14 篇 liu jia
  • 12 篇 ding yi
  • 12 篇 zhenyu yang
  • 12 篇 xuanwu zhou
  • 12 篇 zhao dongmei

语言

  • 1,125 篇 英文
  • 126 篇 其他
  • 31 篇 中文
检索条件"机构=Key Laboratory of Network and Information Security of PAP Engineering"
1279 条 记 录,以下是11-20 订阅
排序:
DDoS Attack Autonomous Detection Model Based on Multi-Strategy Integrate Zebra Optimization Algorithm
收藏 引用
Computers, Materials & Continua 2025年 第1期82卷 645-674页
作者: Chunhui Li Xiaoying Wang Qingjie Zhang Jiaye Liang Aijing Zhang School of Information Engineering Institute of Disaster PreventionLangfang065201China Langfang Key Laboratory of Network Emergency Protection and Network Security Langfang065201China
Previous studies have shown that deep learning is very effective in detecting known ***,when facing unknown attacks,models such as Deep Neural networks(DNN)combined with Long Short-Term Memory(LSTM),Convolutional Neur... 详细信息
来源: 评论
SFSDA:Secure and Flexible Subset Data Aggregation with Fault Tolerance for Smart Grid
收藏 引用
Intelligent Automation & Soft Computing 2023年 第8期37卷 2477-2497页
作者: Dong Chen Tanping Zhou Xu An Wang Zichao Song Yujie Ding Xiaoyuan Yang College of Cryptography Engineering Engineering University of PAPXi’an710086China Key Laboratory of Network and Information Security under the PAP Xi’an710086China Institute of Software Chinese Academy of Sciences Beijing100080China
Smart grid(SG)brings convenience to users while facing great chal-lenges in protecting personal private *** aggregation plays a key role in protecting personal privacy by aggregating all personal data into a single va... 详细信息
来源: 评论
Review of Coverless Image Steganography  4
Review of Coverless Image Steganography
收藏 引用
4th International Conference on Electronic information engineering and Computer Technology, EIECT 2024
作者: Tang, Yixin Di, Fuqiang Zhang, Zhen Zhang, Minqing College of Cryptography Engineering Engineering University of Pap Xi'an China Key Laboratory of Pap for Cryptology and Information Security Xi'an China Key Laboratory of Ctc & Information Engineering Ministry of Education Xi'an China
Traditional image steganography techniques have revealed many drawbacks due to advancements in steganalysis and steganalysis detection technologies. With the continuous development and improvement of various generator... 详细信息
来源: 评论
GAN-INN-Steg: a simple and accurate method for image steganography  2
GAN-INN-Steg: a simple and accurate method for image stegano...
收藏 引用
2nd International Conference on Big Data, Computational Intelligence, and Applications, BDCIA 2024
作者: Zhang, Zhuo Liu, Jia College of Cipher Engineering Engineering University of PAP Shaanxi Xi'an710086 China Key Laboratory of PAP for Cryptology and Information Security Shaanxi Xi'an710086 China
We propose an efficient and accurate image steganography method that combines generative adversarial networks (GAN) with reversible neural network models. In this approach, the reversible neural network model is used ... 详细信息
来源: 评论
TMC-GCN: Encrypted Traffic Mapping Classification Method Based on Graph Convolutional networks
收藏 引用
Computers, Materials & Continua 2025年 第2期82卷 3179-3201页
作者: Baoquan Liu Xi Chen Qingjun Yuan Degang Li Chunxiang Gu School of Cyberspace Security Zhengzhou UniversityZhengzhou450002China School of Cyberspace Security Information Engineering UniversityZhengzhou450001China Henan Key Laboratory of Network Cryptography Technology Zhengzhou450001China
With the emphasis on user privacy and communication security, encrypted traffic has increased dramatically, which brings great challenges to traffic classification. The classification method of encrypted traffic based... 详细信息
来源: 评论
Reversible Data Hiding Algorithm in Encrypted Images Based on Adaptive Median Edge Detection and Ciphertext-Policy Attribute-Based Encryption
收藏 引用
Computers, Materials & Continua 2024年 第10期81卷 1123-1155页
作者: Zongbao Jiang Minqing Zhang Weina Dong Chao Jiang Fuqiang Di Key Laboratory of Network and Information Security of People’s Armed Police Chinese People’s Armed Police Force Engineering UniversityXi’an710086China
With the rapid advancement of cloud computing technology,reversible data hiding algorithms in encrypted images(RDH-EI)have developed into an important field of study concentrated on safeguarding privacy in distributed... 详细信息
来源: 评论
Heterogeneous Dual-Dynamic Attention network for Modeling Mutual Interplay of Stocks
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第7期5卷 3595-3606页
作者: Liu, Haotian Zhou, Yadong Zhou, Yuxun Hu, Bowen Xi'an Jiaotong University Ministry of Education Key Laboratory for Intelligent Networks and Network Security Faculty of Electronic and Information Engineering Xi'an710049 China
Modern quantitative finance and portfolio-based investment hinge on the dependence structure among financial instruments (like stocks) for return prediction, risk management, and hedging. Several attempts have been ma... 详细信息
来源: 评论
Verifiable and Forward-Secure Multi-keyword Query in Internet of Medical Things
收藏 引用
IEEE Internet of Things Journal 2025年 第13期12卷 23809-23822页
作者: Li, Hongjun He, Debiao Feng, Qi Luo, Min Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan China Wuhan University School of Cyber Science and Engineering Wuhan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250014 China National Key Laboratory of Security Communication Chengdu China
The Internet of Medical Things (IoMT) plays a pivotal role in modern healthcare systems, enhancing patients' medical experiences and improving the efficiency of public medical services. However, concerns regarding... 详细信息
来源: 评论
Minimizing CNOT-count in quantum circuit of the extended Shor’s algorithm for ECDLP
收藏 引用
Cybersecurity 2025年 第1期8卷 153-179页
作者: Xia Liu Huan Yang Li Yang State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of SciencesBeijingChina School of Cyber Security University of Chinese Academy of SciencesBeijingChina Beijing Youzhuju Network Technology Co. Ltd.BeijingChina
The elliptic curve discrete logarithm problem(ECDLP)is a popular choice for cryptosystems due to its high level of ***,with the advent of the extended Shor’s algorithm,there is concern that ECDLP may soon be *** the ... 详细信息
来源: 评论
Complexity-Adaptive Reversible Video information Hiding Based on Motion Vectors  4
Complexity-Adaptive Reversible Video Information Hiding Base...
收藏 引用
4th International Conference on Computer Science and Management Technology, ICCSMT 2023
作者: Meng, Yifei Niu, Ke Liang, Yucheng School of Cryptographic Engineering University of Pap Shanxi Xi'an China Key Laboratory of Information Security of Pap Shanxi Xi'an China
In order to address the issue of the existing motion vector-based video reversible information hiding algorithms, which are unable to adaptively adjust the embedding capacity based on the visual characteristics of vid... 详细信息
来源: 评论