咨询与建议

限定检索结果

文献类型

  • 2,809 篇 会议
  • 2,365 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 5,177 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,454 篇 工学
    • 2,599 篇 计算机科学与技术...
    • 2,076 篇 软件工程
    • 923 篇 信息与通信工程
    • 446 篇 电气工程
    • 366 篇 电子科学与技术(可...
    • 358 篇 控制科学与工程
    • 299 篇 生物工程
    • 285 篇 网络空间安全
    • 196 篇 机械工程
    • 152 篇 光学工程
    • 139 篇 仪器科学与技术
    • 125 篇 生物医学工程(可授...
    • 103 篇 动力工程及工程热...
    • 96 篇 化学工程与技术
    • 88 篇 交通运输工程
    • 88 篇 安全科学与工程
    • 82 篇 建筑学
    • 75 篇 土木工程
  • 1,497 篇 理学
    • 904 篇 数学
    • 321 篇 物理学
    • 321 篇 生物学
    • 278 篇 统计学(可授理学、...
    • 132 篇 系统科学
    • 105 篇 化学
  • 893 篇 管理学
    • 533 篇 管理科学与工程(可...
    • 393 篇 图书情报与档案管...
    • 179 篇 工商管理
  • 175 篇 法学
    • 104 篇 社会学
  • 104 篇 医学
    • 86 篇 临床医学
    • 77 篇 基础医学(可授医学...
  • 65 篇 军事学
  • 61 篇 经济学
  • 31 篇 农学
  • 25 篇 教育学
  • 12 篇 文学
  • 8 篇 艺术学

主题

  • 186 篇 feature extracti...
  • 161 篇 semantics
  • 137 篇 accuracy
  • 127 篇 cryptography
  • 117 篇 computational mo...
  • 117 篇 training
  • 103 篇 authentication
  • 103 篇 security
  • 99 篇 federated learni...
  • 96 篇 privacy
  • 94 篇 deep learning
  • 94 篇 information secu...
  • 91 篇 protocols
  • 79 篇 data models
  • 71 篇 cloud computing
  • 68 篇 robustness
  • 65 篇 object detection
  • 65 篇 neural networks
  • 63 篇 machine learning
  • 62 篇 optimization

机构

  • 258 篇 key laboratory o...
  • 207 篇 shandong provinc...
  • 164 篇 state key labora...
  • 160 篇 school of comput...
  • 141 篇 school of comput...
  • 117 篇 school of cyber ...
  • 83 篇 institute of inf...
  • 80 篇 guangdong provin...
  • 74 篇 key laboratory o...
  • 67 篇 key laboratory o...
  • 63 篇 shandong provinc...
  • 54 篇 information secu...
  • 53 篇 peng cheng labor...
  • 52 篇 shandong enginee...
  • 51 篇 school of comput...
  • 50 篇 key laboratory o...
  • 49 篇 shandong fundame...
  • 46 篇 key laboratory o...
  • 44 篇 school of comput...
  • 44 篇 college of compu...

作者

  • 39 篇 cao xiaochun
  • 36 篇 yang yang
  • 36 篇 huang qingming
  • 36 篇 yang xiaoyuan
  • 34 篇 zheng wei-shi
  • 34 篇 zhou deyu
  • 30 篇 xie xiaohua
  • 28 篇 cong runmin
  • 28 篇 jianfeng ma
  • 28 篇 xu an wang
  • 27 篇 xiaoyuan yang
  • 26 篇 xiaoming wu
  • 26 篇 yichuan wang
  • 25 篇 zhang minqing
  • 24 篇 xinhong hei
  • 24 篇 yang jian
  • 23 篇 min-ling zhang
  • 22 篇 ma jianfeng
  • 21 篇 wang wei
  • 21 篇 yang yixian

语言

  • 4,423 篇 英文
  • 634 篇 其他
  • 140 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of computer Network and Information Security of Engineering"
5177 条 记 录,以下是271-280 订阅
排序:
A novel firmware secure transmission scheme based on SM2 threshold key agreement algorithm
A novel firmware secure transmission scheme based on SM2 thr...
收藏 引用
2023 International Conference on computer Graphics, Artificial Intelligence, and Data Processing, ICCAID 2023
作者: Wang, Kun Gao, Shaofeng Chen, Xinze Fu, Yong Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
During the process of embedded firmware upgrade, to protect the security of the firmware during transmission, this paper proposes an improved firmware transmission scheme based on the combination of the SM2 threshold ... 详细信息
来源: 评论
Advances and challenges in artificial intelligence text generation
收藏 引用
Frontiers of information Technology & Electronic engineering 2024年 第1期25卷 64-83页
作者: Bing LI Peng YANG Yuankang SUN Zhongjian HU Meng YI School of Computer Science and Engineering Southeast UniversityNanjing 210000China Key Laboratory of Computer Network and Information Integration Ministry of EducationSoutheast UniversityNanjing 210000China
Text generation is an essential research area in artificial intelligence(AI)technology and natural language processing and provides key technical support for the rapid development of AI-generated content(AIGC).It is b... 详细信息
来源: 评论
Partial Offloading Strategy Based on Deep Reinforcement Learning in the Internet of Vehicles
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第7期24卷 6517-6531页
作者: Tian, Shujuan Zhu, Xinjie Feng, Bochao Zheng, Zhirun Liu, Haolin Li, Zhetao Xiangtan University School of Computer Science School of Cyberspace Security Xiangtan411105 China Xiangtan University Hunan International Scientific and Technological Cooperation Base of Intelligent network Xiangtan411105 China Xiangtan University Key Laboratory of Hunan Province for Internet of Things and Information Security Xiangtan411105 China Xiangtan University School of Mathematics and Compulational Science Xiangtan China Jinan University College of Information Science and Technology Guangzhou510632 China
Driven by the increasing demands of vehicular tasks, edge offloading has emerged as a promising paradigm to enhance quality of experience (QoE) in Internet of Vehicles (IoV) networks. This approach enables vehicles to... 详细信息
来源: 评论
A circuit area optimization of MK-3 S-box
收藏 引用
Cybersecurity 2025年 第1期8卷 61-71页
作者: Yanjun Li Weiguo Zhang Yiping Lin Jian Zou Jian Liu Information Industry Information Security Evaluation Center The 15th Research Institute of China Electronic Technology Group CorporationBeijing 100083China Henan Key Laboratory of Network Cryptography Technology Zhengzhou 450001China Beijing Electronic Science and Technology Institute No.7 Fufeng RoadFengtai DistricBeijing 100083China College of Computer and Data Science Fuzhou UniversityFuzhou 350108China
In MILCOM 2015,Kelly et *** the authentication encryption algorithm MK-3,which applied the 16-bit *** paper aims to implement the 16-bit S-box with less circuit ***,we classifed the irreducible polynomials over F_(2n)... 详细信息
来源: 评论
Patent Recommendation Methods Based on Transformer Encoders and Regularization Strategies
Patent Recommendation Methods Based on Transformer Encoders ...
收藏 引用
2024 lEEE International Conference on Advanced information, Mechanical engineering, Robotics and Automation, AIMERA 2024
作者: Zheng, Wan Ding, Qingyan Li, Na Pan, Yu Dong, Xuecheng Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
Patent recommendation service has become a major demand of all walks of life in the society. Patent data collection and analysis can not only help enterprises grasp the development status of the industry, but also pro... 详细信息
来源: 评论
Lightweight Malicious Encrypted Traffic Detection Method Based on KL Image Compression  9
Lightweight Malicious Encrypted Traffic Detection Method Bas...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Wen, Yuecheng Li, Xiaotong Lv, Haiqing Wang, Menglu Zuo, Wenbo Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
Timely and accurate detection of and response to potentially malicious encrypted traffic is crucial in cybersecurity strategies. Convolutional neural network-based approaches that convert traffic loads into images for... 详细信息
来源: 评论
A Patent Fast Recommendation Algorithm Based on User Requirements Combined with an Inverted Table
A Patent Fast Recommendation Algorithm Based on User Require...
收藏 引用
2024 lEEE International Conference on Advanced information, Mechanical engineering, Robotics and Automation, AIMERA 2024
作者: Zheng, Wan Ding, Qingyan Li, Na Pan, Yu Dong, Xuecheng Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
Patent recommendation has always been an essential service for the innovation and development of all walks of life. The matching of demand and patent information can enable enterprises to quickly obtain the innovation... 详细信息
来源: 评论
MTRNet: An Efficient Hybrid network Model for Surface Defect Detection of Sheet Metal  36
MTRNet: An Efficient Hybrid Network Model for Surface Defect...
收藏 引用
36th International Conference on Software engineering and Knowledge engineering, SEKE 2024
作者: Hao, Huijuan Zhu, Sijian Chen, Yu Yi, Changle Zhao, Hongge Feng, Yue Yang, Rong Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Addressing the challenges posed by the insufficient computational power of low-spec devices to achieve the inference efficiency of prevailing deep learning models, alongside the variability in type and shape within in... 详细信息
来源: 评论
An adaptive time-convolutional network online prediction method for ocean observation data  36
An adaptive time-convolutional network online prediction met...
收藏 引用
36th International Conference on Software engineering and Knowledge engineering, SEKE 2024
作者: Li, Enjing Li, Xiang Zhao, Zhigang Wu, Lu Wang, Yinglong Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Deep learning is particularly important in the field of time series data analysis, and has been applied to tasks such as marine data prediction. However, there is a’concept drift’ problem in marine observation data,... 详细信息
来源: 评论
Lossless embedding: A visually meaningful image encryption algorithm based on hyperchaos and compressive sensing
收藏 引用
Chinese Physics B 2023年 第2期32卷 136-149页
作者: 王兴元 王哓丽 滕琳 蒋东华 咸永锦 School of Information Science and Technology Dalian Maritime UniversityDalian 116026China Guangxi Key Laboratory of Multi-source Information Mining&Security Guangxi Normal UniversityGuilin 541004China School of Computer Science and Engineering Sun Yat-sen UniversityGuangzhou 511400China School of Cyber Security Qilu University of Technology(Shandong Academy of Sciences)Jinan 250353China
A novel visually meaningful image encryption algorithm is proposed based on a hyperchaotic system and compressive sensing(CS), which aims to improve the visual security of steganographic image and decrypted quality. F... 详细信息
来源: 评论