咨询与建议

限定检索结果

文献类型

  • 2,809 篇 会议
  • 2,365 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 5,177 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,454 篇 工学
    • 2,599 篇 计算机科学与技术...
    • 2,076 篇 软件工程
    • 923 篇 信息与通信工程
    • 446 篇 电气工程
    • 366 篇 电子科学与技术(可...
    • 358 篇 控制科学与工程
    • 299 篇 生物工程
    • 285 篇 网络空间安全
    • 196 篇 机械工程
    • 152 篇 光学工程
    • 139 篇 仪器科学与技术
    • 125 篇 生物医学工程(可授...
    • 103 篇 动力工程及工程热...
    • 96 篇 化学工程与技术
    • 88 篇 交通运输工程
    • 88 篇 安全科学与工程
    • 82 篇 建筑学
    • 75 篇 土木工程
  • 1,497 篇 理学
    • 904 篇 数学
    • 321 篇 物理学
    • 321 篇 生物学
    • 278 篇 统计学(可授理学、...
    • 132 篇 系统科学
    • 105 篇 化学
  • 893 篇 管理学
    • 533 篇 管理科学与工程(可...
    • 393 篇 图书情报与档案管...
    • 179 篇 工商管理
  • 175 篇 法学
    • 104 篇 社会学
  • 104 篇 医学
    • 86 篇 临床医学
    • 77 篇 基础医学(可授医学...
  • 65 篇 军事学
  • 61 篇 经济学
  • 31 篇 农学
  • 25 篇 教育学
  • 12 篇 文学
  • 8 篇 艺术学

主题

  • 186 篇 feature extracti...
  • 161 篇 semantics
  • 137 篇 accuracy
  • 127 篇 cryptography
  • 117 篇 computational mo...
  • 117 篇 training
  • 103 篇 authentication
  • 103 篇 security
  • 99 篇 federated learni...
  • 96 篇 privacy
  • 94 篇 deep learning
  • 94 篇 information secu...
  • 91 篇 protocols
  • 79 篇 data models
  • 71 篇 cloud computing
  • 68 篇 robustness
  • 65 篇 object detection
  • 65 篇 neural networks
  • 63 篇 machine learning
  • 62 篇 optimization

机构

  • 258 篇 key laboratory o...
  • 207 篇 shandong provinc...
  • 164 篇 state key labora...
  • 160 篇 school of comput...
  • 141 篇 school of comput...
  • 117 篇 school of cyber ...
  • 83 篇 institute of inf...
  • 80 篇 guangdong provin...
  • 74 篇 key laboratory o...
  • 67 篇 key laboratory o...
  • 63 篇 shandong provinc...
  • 54 篇 information secu...
  • 53 篇 peng cheng labor...
  • 52 篇 shandong enginee...
  • 51 篇 school of comput...
  • 50 篇 key laboratory o...
  • 49 篇 shandong fundame...
  • 46 篇 key laboratory o...
  • 44 篇 school of comput...
  • 44 篇 college of compu...

作者

  • 39 篇 cao xiaochun
  • 36 篇 yang yang
  • 36 篇 huang qingming
  • 36 篇 yang xiaoyuan
  • 34 篇 zheng wei-shi
  • 34 篇 zhou deyu
  • 30 篇 xie xiaohua
  • 28 篇 cong runmin
  • 28 篇 jianfeng ma
  • 28 篇 xu an wang
  • 27 篇 xiaoyuan yang
  • 26 篇 xiaoming wu
  • 26 篇 yichuan wang
  • 25 篇 zhang minqing
  • 24 篇 xinhong hei
  • 24 篇 yang jian
  • 23 篇 min-ling zhang
  • 22 篇 ma jianfeng
  • 21 篇 wang wei
  • 21 篇 yang yixian

语言

  • 4,423 篇 英文
  • 634 篇 其他
  • 140 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of computer Network and Information Security of Engineering"
5177 条 记 录,以下是221-230 订阅
排序:
Enhanced PIR Scheme Combining SimplePIR and Spiral: Achieving Higher Throughput Without Client Hints  6th
Enhanced PIR Scheme Combining SimplePIR and Spiral: Achievi...
收藏 引用
6th International Conference on Machine Learning for Cyber security, ML4CS 2024
作者: Xu, Haoyao Li, Yitong Tian, Haibo School of Computer Science and Engineering Sun Yat-sen University Guangzhou510006 China Guangdong Province Key Laboratory of Information Security Technology Guangzhou510006 China
In recent years, Private information Retrieval (PIR) schemes capable of rapid response have gotten significant attention, with SimplePIR, for instance, achieving a throughput of approximately 10 GB/s in a single-threa... 详细信息
来源: 评论
DDoS Attack Detection Based on information Entropy Feature Extraction in Software Defined networks
DDoS Attack Detection Based on Information Entropy Feature E...
收藏 引用
2023 International Conference on networking and network Applications, NaNA 2023
作者: Ji, Wenjiang Yang, Yixin Zhang, Yaling Wang, Yichuan Tian, Mengjie Qiu, Yuan Xi'an University of Technology School of Computer Science and Engineering Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology China
Distributed Denial of Service(DDoS) attacks target the forwarding-control separation feature of Software-Defined networking(SDN) to launch attacks, causing network disruptions. Therefore security against DDoS attack d... 详细信息
来源: 评论
A divide-and-conquer reconstruction method for defending against adversarial example attacks
收藏 引用
Visual Intelligence 2024年 第1期2卷 360-376页
作者: Xiyao Liu Jiaxin Hu Qingying Yang Ming Jiang Jianbiao He Hui Fang School of Computer Science and Engineering Central South UniversityChangsha410083HunanChina Guangxi Key Laboratory of Cryptography and Information Security School of Computer Science and Information SecurityGuilin University of Electronic TechnologyGuilinGuangxiChina Department of Computer Science Loughborough UniversityLoughboroughLE113TUUK
In recent years,defending against adversarial examples has gained significant importance,leading to a growing body of research in this *** these studies,pre-processing defense approaches have emerged as a prominent re... 详细信息
来源: 评论
A Label Flipping Attack on Machine Learning Model and Its Defense Mechanism  22nd
A Label Flipping Attack on Machine Learning Model and Its De...
收藏 引用
22nd International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2022
作者: Li, Qingru Wang, Xinru Wang, Fangwei Wang, Changguang Key Laboratory of Network and Information Security of Hebei Province Hebei Normal University Shijiazhuang050024 China College of Computer and Cyberspace Security Hebei Normal University Shijiazhuang050024 China
Recently, the robustness of machine learning against data poisoning attacks is widely concerned. As a subclass of poisoning attack, the label flipping attack can poison training data resulting in reducing the cla... 详细信息
来源: 评论
Crop Classification Methods Based on Siamese CBMM-CNN Architectures Using Hyperspectral Remote Sensing Data  24th
Crop Classification Methods Based on Siamese CBMM-CNN Archi...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Xie, Bin Zhang, Jiahao Li, Yuling Li, Yusong Dong, Xinyu College of Computer and Cyber Security Hebei Normal University Hebei Shijiazhuang China Hebei Provincial Key Laboratory of Network and Information Security Hebei Normal University Hebei Shijiazhuang China Hebei Provincial Engineering Research Center for Supply Chain Big Data Analytics and Data Security Hebei Normal University Hebei Shijiazhuang China
Amidst global population growth and escalating food demands, real-time agricultural monitoring is crucial for ensuring food security. During the initial stages of crop growth, however, it faces significant challenges ... 详细信息
来源: 评论
A Novel On-Demand Service Architecture for Efficient Cloud-Edge Collaboration
A Novel On-Demand Service Architecture for Efficient Cloud-E...
收藏 引用
2023 International Conference on networking and network Applications, NaNA 2023
作者: Zhang, Yaling Chen, Jingjing Wang, Yichuan Xiao, Yeqiu Liu, Xiaoxue School of Computer Science and Engineering Xi'an University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology China
With the advent of 5G era, the model of cloud-edge collaboration is used to handle massive data computing tasks with significant superiority. However, this architecture still uses the traditional web service model, wh... 详细信息
来源: 评论
Don’t Abandon the Primary key: A High-Synchronization and Robust Virtual Primary key Scheme for Watermarking Relational Databases  26th
Don’t Abandon the Primary Key: A High-Synchronization and...
收藏 引用
26th International Conference on information and Communications security, ICICS 2024
作者: Yang, Ke Yuan, Shuguang Yu, Jing Wang, Yuyang Yang, Tengfei Chen, Chi Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Key Laboratory of Cyberspace Security Defense Beijing China National Computer Network Emergency Response Technical Team/Coordination Center of China Beijing China
A relational database is an infrastructure that manages and shares structured data. To safeguard the copyrights of data within such databases, database watermarking is an effective technique. Most watermarking schemes... 详细信息
来源: 评论
Post-quantum Dropout-Resilient Aggregation for Federated Learning via Lattice-Based PRF  1st
Post-quantum Dropout-Resilient Aggregation for Federated Le...
收藏 引用
1st International Conference on Artificial Intelligence security and Privacy, AIS and P 2023
作者: Zuo, Ruozhou Tian, Haibo Zhang, Fangguo School of Computer Science and Engineering Sun Yat-sen University Guangzhou510006 China Guangdong Key Laboratory of Information Security Technology Guangzhou510006 China
Machine learning has greatly improved the convenience of modern life. As the deployment scale of machine learning grows larger, the corresponding data scale also increases, leading to a large number of small and mediu... 详细信息
来源: 评论
Some Classes of Cryptographic Power Functions and Permutation Polynomials with Low (-1)-Differential Uniformity in Cyber security
Some Classes of Cryptographic Power Functions and Permutatio...
收藏 引用
2023 IEEE International Conference on Dependable, Autonomic and Secure Computing, 2023 International Conference on Pervasive Intelligence and Computing, 2023 International Conference on Cloud and Big Data Computing, 2023 International Conference on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2023
作者: Liu, Qian Dong, Xiaobei Chen, Zhixiong Liu, Ximeng Xu, Li College of Computer and Data Science Fuzhou University Fuzhou China Putian University Fujian Key Laboratory of Financial Information Processing Putian China College of Computer and Data Science Fuzhou University Key Laboratory of Information Security of Network Systems Fuzhou China College of Computer and Cyber Security Fujian Normal University Fuzhou China
Cryptographic functions with low differential uniformity have wide applications in cryptography and cyber security. In this paper, we further investigate c-differential uniformity proposed by Ellingsen et al. (IEEE Tr... 详细信息
来源: 评论
Automated object recognition in high-resolution optical remote sensing imagery
收藏 引用
National Science Review 2023年 第6期10卷 38-41页
作者: Yazhou Yao Tao Chen Hanbo Bi Xinhao Cai Gensheng Pei Guoye Yang Zhiyuan Yan Xian Sun Xing Xu Hai Zhang School of Computer Science and Engineering Nanjing University of Science and Technology Aerospace Information Research Institute Chinese Academy of Sciences School of Electronic Electrical and Communication Engineering University of Chinese Academy of Sciences Key Laboratory of Network Information System Technology (NIST) Aerospace Information Research Institute Chinese Academy of Sciences Department of Computer Science and Technology Tsinghua University School of Computer Science and Engineering University of Electronic Science and Technology of China Pazhou Laboratory (Huangpu) School of Mathematics Northwest University
INTRODUCTION With the rapid development of remote sensing technology,high-quality remote sensing images have become widely *** automated object detection and recognition of these images,which aims to automatically loc...
来源: 评论