咨询与建议

限定检索结果

文献类型

  • 2,809 篇 会议
  • 2,365 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 5,177 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,454 篇 工学
    • 2,599 篇 计算机科学与技术...
    • 2,076 篇 软件工程
    • 923 篇 信息与通信工程
    • 446 篇 电气工程
    • 366 篇 电子科学与技术(可...
    • 358 篇 控制科学与工程
    • 299 篇 生物工程
    • 285 篇 网络空间安全
    • 196 篇 机械工程
    • 152 篇 光学工程
    • 139 篇 仪器科学与技术
    • 125 篇 生物医学工程(可授...
    • 103 篇 动力工程及工程热...
    • 96 篇 化学工程与技术
    • 88 篇 交通运输工程
    • 88 篇 安全科学与工程
    • 82 篇 建筑学
    • 75 篇 土木工程
  • 1,497 篇 理学
    • 904 篇 数学
    • 321 篇 物理学
    • 321 篇 生物学
    • 278 篇 统计学(可授理学、...
    • 132 篇 系统科学
    • 105 篇 化学
  • 893 篇 管理学
    • 533 篇 管理科学与工程(可...
    • 393 篇 图书情报与档案管...
    • 179 篇 工商管理
  • 175 篇 法学
    • 104 篇 社会学
  • 104 篇 医学
    • 86 篇 临床医学
    • 77 篇 基础医学(可授医学...
  • 65 篇 军事学
  • 61 篇 经济学
  • 31 篇 农学
  • 25 篇 教育学
  • 12 篇 文学
  • 8 篇 艺术学

主题

  • 186 篇 feature extracti...
  • 161 篇 semantics
  • 137 篇 accuracy
  • 127 篇 cryptography
  • 117 篇 computational mo...
  • 117 篇 training
  • 103 篇 authentication
  • 103 篇 security
  • 99 篇 federated learni...
  • 96 篇 privacy
  • 94 篇 deep learning
  • 94 篇 information secu...
  • 91 篇 protocols
  • 79 篇 data models
  • 71 篇 cloud computing
  • 68 篇 robustness
  • 65 篇 object detection
  • 65 篇 neural networks
  • 63 篇 machine learning
  • 62 篇 optimization

机构

  • 258 篇 key laboratory o...
  • 207 篇 shandong provinc...
  • 164 篇 state key labora...
  • 160 篇 school of comput...
  • 141 篇 school of comput...
  • 117 篇 school of cyber ...
  • 83 篇 institute of inf...
  • 80 篇 guangdong provin...
  • 74 篇 key laboratory o...
  • 67 篇 key laboratory o...
  • 63 篇 shandong provinc...
  • 54 篇 information secu...
  • 53 篇 peng cheng labor...
  • 52 篇 shandong enginee...
  • 51 篇 school of comput...
  • 50 篇 key laboratory o...
  • 49 篇 shandong fundame...
  • 46 篇 key laboratory o...
  • 44 篇 school of comput...
  • 44 篇 college of compu...

作者

  • 39 篇 cao xiaochun
  • 36 篇 yang yang
  • 36 篇 huang qingming
  • 36 篇 yang xiaoyuan
  • 34 篇 zheng wei-shi
  • 34 篇 zhou deyu
  • 30 篇 xie xiaohua
  • 28 篇 cong runmin
  • 28 篇 jianfeng ma
  • 28 篇 xu an wang
  • 27 篇 xiaoyuan yang
  • 26 篇 xiaoming wu
  • 26 篇 yichuan wang
  • 25 篇 zhang minqing
  • 24 篇 xinhong hei
  • 24 篇 yang jian
  • 23 篇 min-ling zhang
  • 22 篇 ma jianfeng
  • 21 篇 wang wei
  • 21 篇 yang yixian

语言

  • 4,423 篇 英文
  • 634 篇 其他
  • 140 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of computer Network and Information Security of Engineering"
5177 条 记 录,以下是151-160 订阅
排序:
A Novel 3D Medical Image Segmentation Model Using Improved SAM
A Novel 3D Medical Image Segmentation Model Using Improved S...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Kuang, Yuansen Ma, Xitong Zhao, Jing Wang, Guangchen Zeng, Yijie Liu, Song Key Laboratory of Computing Power Network and Information Security Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
3D medical image segmentation is an essential task in the medical image field, which aims to segment organs or tumours into different labels. A number of issues exist with the current 3D medical image segmentation tas... 详细信息
来源: 评论
Detecting Double Mixed Compressed Images Based on Quaternion Convolutional Neural network
收藏 引用
Chinese Journal of Electronics 2024年 第3期33卷 657-671页
作者: Hao WANG Jinwei WANG Xuelong HU Bingtao HU Qilin YIN Xiangyang LUO Bin MA Jinsheng SUN Department of Automation Nanjing University of Science and Technology Engineering Research Center of Digital Forensics Ministry of Education Department of Computer and Software Nanjing University of Information Science and Technology School of Management Nanjing University of Posts and Telecommunications Department of Computer Science and Engineering Guangdong Province Key Laboratory of Information Security Technology Sun Yat-sen University State Key Laboratory of Mathematical Engineering and Advanced Computing Qilu University of Technology
Detection of color images that have undergone double compression is a critical aspect of digital image *** the existence of various methods capable of detecting double Joint Photographic Experts Group(JPEG) compressio... 详细信息
来源: 评论
SFSDA:Secure and Flexible Subset Data Aggregation with Fault Tolerance for Smart Grid
收藏 引用
Intelligent Automation & Soft Computing 2023年 第8期37卷 2477-2497页
作者: Dong Chen Tanping Zhou Xu An Wang Zichao Song Yujie Ding Xiaoyuan Yang College of Cryptography Engineering Engineering University of PAPXi’an710086China Key Laboratory of Network and Information Security under the PAP Xi’an710086China Institute of Software Chinese Academy of Sciences Beijing100080China
Smart grid(SG)brings convenience to users while facing great chal-lenges in protecting personal private *** aggregation plays a key role in protecting personal privacy by aggregating all personal data into a single va... 详细信息
来源: 评论
Semantic Location Privacy Protection Method Based on Differential Privacy and Temporal Association Under Continuous Query
收藏 引用
International Journal of network security 2023年 第5期25卷 841-848页
作者: Wang, Yonglu Zuo, Kaizhong Pan, Tao Huang, Zhongchun Anhui Technical College Of Mechanical and Electrical Engineering Wuhu241002 China School of Computer and Information Anhui Normal University Wuhu241002 China Anhui Provincial Key Laboratory of Network and Information Security Anhui Normal University Wuhu241002 China
Aiming at problems that the existing location privacy protection methods for continuous query ignore the time distribution of semantic locations and the transfer of semantic locations in the constructed dummy trajecto... 详细信息
来源: 评论
Research on Lightweight Sensing Technology Based on Single-Antenna Multicarrier
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 20678-20694页
作者: Jiang, Yu Zhu, Di Wang, Jiadong Hu, Aiqun Southeast University School of Cyber Scienc and Engineering Purple Mountain Laboratories Nanjing210096 China Key Laboratory of Computer Network Technology of Jiangsu Province Nanjing210096 China Southeast University Frontiers Science Center for Mobile Information Communication and Security Nanjing210096 China Southeast University School of Cyber Science and Engineering Nanjing210096 China Southeast University School of Cyber Science and Engineering School of Information Science and Engineering Nanjing210096 China Southeast University State Key Laboratory of Mobile Communication Nanjing210096 China
Channel State information (CSI) serves as a critical indicator of wireless signal conditions and is widely regarded by researchers for its sensitivity in detecting changes within the channel. However, traditional sens... 详细信息
来源: 评论
Lattice-based group encryptions with only one trapdoor
收藏 引用
Science China(information Sciences) 2022年 第5期65卷 205-222页
作者: Jing PAN Jiang ZHANG Fangguo ZHANG Xiaofeng CHEN Willy SUSILO State Key Laboratory of Integrated Service Networks(ISN) Xidian University State Key Laboratory of Cryptology School of Computer Science and Engineering Sun Yat-sen University Guangdong Key Laboratory of Information Security Institute of Cybersecurity and Cryptology School of Computing and Information TechnologyUniversity of Wollongong
Group encryption(GE), the encryption analog of group signatures, is a fundamental primitive that offers a privacy-preserving service for a specific receiver concealed within a group of certified *** other cryptographi... 详细信息
来源: 评论
Volume Hiding Conjunctive Searchable Symmetric Encryption over Cloud  16
Volume Hiding Conjunctive Searchable Symmetric Encryption ov...
收藏 引用
16th International Conference on Cyber-Enabled Distributed Computing and Knowledge Discover, CyberC 2024
作者: Deng, Qinghua Chen, Lanxiang Zhu, Yizhao Mu, Yi City University of Macau Faculty of Data Science 999078 China Hanshan Normal University School of Computer and Information Engineering Chaozhou521041 China Fujian Normal University Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fuzhou China
Symmetric searchable encryption (SSE) is crucial for promoting cloud storage. It enables users to encrypt private data and outsource it to untrusted servers while retaining query capabilities. To prevent the cloud fro... 详细信息
来源: 评论
Secrecy Communications for Wireless-Powered Full-Duplex Cooperative NOMA Systems: A User Selection and Friendly Jamming Approach
Secrecy Communications for Wireless-Powered Full-Duplex Coop...
收藏 引用
2023 IEEE/CIC International Conference on Communications in China, ICCC Workshops 2023
作者: Ren, Yuan Ren, Jing Zhang, Xuewei Lu, Guangyue Xi'an University of Posts and Telecommunications Shaanxi Key Laboratory of Information Communication Network and Security School of Communications and Information Engineering Xi'an710121 China
This paper studies the secure communications of a wireless-powered full-duplex cooperative non-orthogonal multiple access (CoNOMA) system with a source node, a group of near users, a far user and an external eavesdrop... 详细信息
来源: 评论
Evaluation Method of Object Control Capability for Children Based on Nonlinear Dynamics  23
Evaluation Method of Object Control Capability for Children ...
收藏 引用
3rd International Conference on Bioinformatics and Intelligent Computing, BIC 2023
作者: Wang, Huaijun Li, Chao Zhang, Dongsheng Li, Junhuai Key Laboratory of Network Computing and Security Technology School of Computer Science and Engineering Xi an University of Technology Xi'an China
DCD (Developmental Coordination Disorder) has become a global problem, and several studies have shown that early detection and intervention are important for the prevention and treatment of DCD in children. To address... 详细信息
来源: 评论
Research on active defense decision-making method for cloud boundary networks based on reinforcement learning of intelligent agent
收藏 引用
High-Confidence Computing 2024年 第2期4卷 50-61页
作者: Huan Wang Yunlong Tang Yan Wang Ning Wei Junyi Deng Zhiyan Bin Weilong Li School of Computer Science and Technology Guangxi University of Science and TechnologyLiuzhou 545000China Liuzhou Key Laboratory of Big Data Intelligent Processing and Security Liuzhou 545000China Guangxi Education System Network Security Monitoring Center Liuzhou 545000China Center of Graphics and Information Guangxi ECO-Engineering Vocational&Technical CollegeLiuzhou 545004China
The cloud boundary network environment is characterized by a passive defense strategy,discrete defense actions,and delayed defense feedback in the face of network attacks,ignoring the influence of the external environ... 详细信息
来源: 评论