咨询与建议

限定检索结果

文献类型

  • 2,809 篇 会议
  • 2,365 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 5,177 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,454 篇 工学
    • 2,599 篇 计算机科学与技术...
    • 2,076 篇 软件工程
    • 923 篇 信息与通信工程
    • 446 篇 电气工程
    • 366 篇 电子科学与技术(可...
    • 358 篇 控制科学与工程
    • 299 篇 生物工程
    • 285 篇 网络空间安全
    • 196 篇 机械工程
    • 152 篇 光学工程
    • 139 篇 仪器科学与技术
    • 125 篇 生物医学工程(可授...
    • 103 篇 动力工程及工程热...
    • 96 篇 化学工程与技术
    • 88 篇 交通运输工程
    • 88 篇 安全科学与工程
    • 82 篇 建筑学
    • 75 篇 土木工程
  • 1,497 篇 理学
    • 904 篇 数学
    • 321 篇 物理学
    • 321 篇 生物学
    • 278 篇 统计学(可授理学、...
    • 132 篇 系统科学
    • 105 篇 化学
  • 893 篇 管理学
    • 533 篇 管理科学与工程(可...
    • 393 篇 图书情报与档案管...
    • 179 篇 工商管理
  • 175 篇 法学
    • 104 篇 社会学
  • 104 篇 医学
    • 86 篇 临床医学
    • 77 篇 基础医学(可授医学...
  • 65 篇 军事学
  • 61 篇 经济学
  • 31 篇 农学
  • 25 篇 教育学
  • 12 篇 文学
  • 8 篇 艺术学

主题

  • 186 篇 feature extracti...
  • 161 篇 semantics
  • 137 篇 accuracy
  • 127 篇 cryptography
  • 117 篇 computational mo...
  • 117 篇 training
  • 103 篇 authentication
  • 103 篇 security
  • 99 篇 federated learni...
  • 96 篇 privacy
  • 94 篇 deep learning
  • 94 篇 information secu...
  • 91 篇 protocols
  • 79 篇 data models
  • 71 篇 cloud computing
  • 68 篇 robustness
  • 65 篇 object detection
  • 65 篇 neural networks
  • 63 篇 machine learning
  • 62 篇 optimization

机构

  • 258 篇 key laboratory o...
  • 207 篇 shandong provinc...
  • 164 篇 state key labora...
  • 160 篇 school of comput...
  • 141 篇 school of comput...
  • 117 篇 school of cyber ...
  • 83 篇 institute of inf...
  • 80 篇 guangdong provin...
  • 74 篇 key laboratory o...
  • 67 篇 key laboratory o...
  • 63 篇 shandong provinc...
  • 54 篇 information secu...
  • 53 篇 peng cheng labor...
  • 52 篇 shandong enginee...
  • 51 篇 school of comput...
  • 50 篇 key laboratory o...
  • 49 篇 shandong fundame...
  • 46 篇 key laboratory o...
  • 44 篇 school of comput...
  • 44 篇 college of compu...

作者

  • 39 篇 cao xiaochun
  • 36 篇 yang yang
  • 36 篇 huang qingming
  • 36 篇 yang xiaoyuan
  • 34 篇 zheng wei-shi
  • 34 篇 zhou deyu
  • 30 篇 xie xiaohua
  • 28 篇 cong runmin
  • 28 篇 jianfeng ma
  • 28 篇 xu an wang
  • 27 篇 xiaoyuan yang
  • 26 篇 xiaoming wu
  • 26 篇 yichuan wang
  • 25 篇 zhang minqing
  • 24 篇 xinhong hei
  • 24 篇 yang jian
  • 23 篇 min-ling zhang
  • 22 篇 ma jianfeng
  • 21 篇 wang wei
  • 21 篇 yang yixian

语言

  • 4,423 篇 英文
  • 634 篇 其他
  • 140 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of computer Network and Information Security of Engineering"
5177 条 记 录,以下是301-310 订阅
排序:
Research on Satellite network Traffic Prediction Algorithm Based on Gray Wolf Algorithm Optimizing GRU and Spatiotemporal Analysis  15
Research on Satellite Network Traffic Prediction Algorithm B...
收藏 引用
15th International Conference on Communication Software and networks, ICCSN 2023
作者: Cong, Ligang Shi, Baoyu Di, Xiaoqiang Ding, Huiying Chen, Chuanhui School of Computer Science and Technology Changchun University of Science and Technology Changchun China Changchun University of Science and Technology Jilin Key Laboratory of Network and Information Security Changchun China
Accurate traffic prediction is crucial for the performance improvement of satellite networks, which can help balance network load, optimize routing, and effectively improve network performance. To better plan traffic ... 详细信息
来源: 评论
Feature Aggregation network for Memory-Based Industrial Anomaly Detection  9
Feature Aggregation Network for Memory-Based Industrial Anom...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Li, Min Han, Delong Shao, Rui He, Jinghui City University of Macau Faculty of Data Science China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
In the process of large-scale industrial production, complex defects of different shapes and sizes can occur in industrial products and their components, and these defects seriously affect the performance of industria... 详细信息
来源: 评论
Characterization and Properties of Bent-Negabent Functions
收藏 引用
Chinese Journal of Electronics 2022年 第4期31卷 786-792页
作者: JIANG Niu ZHAO Min YANG Zhiyao ZHUO Zepeng CHEN Guolong School of Mathematical Sciences Huaibei Normal University Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Normal University School of Cyber Science University of Science and Technology of China School of Computer Engineering Bengbu University
A further characterization of the bentnegabent functions is presented. Based on the concept of complete mapping polynomial, we provide a necessary and sufficient condition for a class of quadratic Boolean functions to... 详细信息
来源: 评论
TFSG: A Self-Supervised Guided Graph Learning Method for Traffic Flow Prediction
收藏 引用
IEEE Internet of Things Journal 2025年 第13期12卷 24345-24357页
作者: Zheng, Yingran Luo, Chao Shao, Rui Shandong Normal University School of Information Science and Engineering Jinan250014 China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan250014 China China Mobile Shandong Co. Ltd center of network optimization Jinan250014 China
With the rapid development of the Internet of Things, a large amount of real-time traffic data has been collected. How to fully utilize these traffic data for rational planning of intelligent transportation systems is... 详细信息
来源: 评论
Resource Cooperative Scheduling Optimization Considering security in Edge Mobile networks  19th
Resource Cooperative Scheduling Optimization Considering Sec...
收藏 引用
19th EAI International Conference on Collaborative Computing: networking, Applications and Worksharing, CollaborateCom 2023
作者: Fang, Cheng Yang, Peng Yi, Meng Du, Miao Li, Bing Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Nanjing China School of Computer Science and Engineering Southeast University Nanjing China School of Cyber Science and Engineering Southeast University Nanjing China
With the rapid development of technologies such as the Internet of Things and artificial intelligence, the contradiction between limited user computing resources and real-time, fast, and safe processing of large amoun... 详细信息
来源: 评论
Optimal replication strategy for mitigating burst traffic in information-centric satellite networks: a focus on remote sensing image transmission
收藏 引用
Frontiers of information Technology & Electronic engineering 2024年 第6期25卷 791-808页
作者: Ziyang XING Xiaoqiang DI Hui QI Jing CHEN Jinhui CAO Jinyao LIU Xusheng LI Zichu ZHANG Yuchen ZHU Lei CHEN Kai HUANG Xinghan HUO Jilin Key Laboratory of Network and Information Security Changchun 130022China School of Computer Science and Technology Changchun University of Science and TechnologyChangchun 130022China Information Center Changchun University of Science and TechnologyChangchun 130022China
information-centric satellite networks play a crucial role in remote sensing applications,particularly in the transmission of remote sensing ***,the occurrence of burst traffic poses significant challenges in meeting ... 详细信息
来源: 评论
Voiceprint recognition model based on Ecapa-Tdnn and ResNet  5
Voiceprint recognition model based on Ecapa-Tdnn and ResNet
收藏 引用
5th International Conference on Telecommunications, Optics, and computer Science, TOCS 2024
作者: Jia, Chengjie Fei, Rong Li, Xiaomeng School of Computer Science and Engineering Xi'an University of Technology Shaanxi Xi'an710004 China Shaanxi Key Laboratory for Network Computing and Security Technology School of Computer Science and Engineering Xi'an University of Technology Shaanxi Xi'an710048 China
In recent years, with the continuous progress of deep learning neural networks and the construction of large data sets, new breakthroughs in voiceprint verification technology for voice calls have been rapidly achieve... 详细信息
来源: 评论
IGED:Towards Intelligent DDoS Detection Model Using Improved Generalized Entropy and DNN
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 1851-1866页
作者: Yanhua Liu Yuting Han HuiChen Baokang Zhao XiaofengWang Ximeng Liu College of Computer and Data Science Fuzhou UniversityFuzhou350108China Engineering Research Center of Big Data Intelligence Ministry of EducationFuzhou350108China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou UniversityFuzhou350108China College of Computer National University of Defense TechnologyChangsha410073China
As the scale of the networks continually expands,the detection of distributed denial of service(DDoS)attacks has become increasingly *** propose an intelligent detection model named IGED by using improved generalized ... 详细信息
来源: 评论
Efficient Wildcard Searchable Symmetric Encryption with Forward and Backward security  1st
Efficient Wildcard Searchable Symmetric Encryption with For...
收藏 引用
1st International Conference on Artificial Intelligence security and Privacy, AIS and P 2023
作者: Zhang, Xi Su, Ye Wei, Zhongkai Shen, Wenting Qin, Jing College of Computer and Cyber Security Hebei Normal University Shijiazhuang050024 China Hebei Provincial Key Laboratory of Network and Information Security Hebei Normal University Shijiazhuang050024 China School of Information Science and Engineering Shandong Normal University Jinan250358 China School of Mathematics Shandong University Jinan250100 China College of Computer Science and Technology Qingdao University Qingdao266071 China
Wildcard Searchable Symmetric Encryption can achieve flexibility and pattern matching while protecting data privacy. There is a promising future for combining secure wildcard search with emerging technologies such as ... 详细信息
来源: 评论
Genetic-A* Algorithm-Based Routing for Continuous-Flow Microfluidic Biochip in Intelligent Digital Healthcare  18th
Genetic-A* Algorithm-Based Routing for Continuous-Flow Micr...
收藏 引用
18th International Conference on Green, Pervasive, and Cloud Computing, GPC 2023
作者: Huang, Huichang Yang, Zhongliao Zhong, Jiayuan Xu, Li Dong, Chen Bao, Ruishen College of Computer and Data Science Fuzhou University Fuzhou350116 China College of Computer and Cyber Security Fujian Normal University Fuzhou350007 China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou China
In the field of intelligent digital healthcare, Continuous-flow microfluidic biochip (CFMB) has become a research direction of widespread concern. CFMB integrates a large number of microvalves and large-scale microcha... 详细信息
来源: 评论