咨询与建议

限定检索结果

文献类型

  • 2,836 篇 会议
  • 2,409 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 5,248 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,531 篇 工学
    • 2,657 篇 计算机科学与技术...
    • 2,109 篇 软件工程
    • 959 篇 信息与通信工程
    • 503 篇 电气工程
    • 385 篇 控制科学与工程
    • 384 篇 电子科学与技术(可...
    • 307 篇 网络空间安全
    • 301 篇 生物工程
    • 200 篇 机械工程
    • 161 篇 光学工程
    • 143 篇 仪器科学与技术
    • 126 篇 生物医学工程(可授...
    • 104 篇 动力工程及工程热...
    • 101 篇 交通运输工程
    • 101 篇 安全科学与工程
    • 98 篇 化学工程与技术
    • 83 篇 建筑学
    • 76 篇 土木工程
  • 1,518 篇 理学
    • 913 篇 数学
    • 333 篇 物理学
    • 324 篇 生物学
    • 279 篇 统计学(可授理学、...
    • 132 篇 系统科学
    • 110 篇 化学
  • 916 篇 管理学
    • 552 篇 管理科学与工程(可...
    • 398 篇 图书情报与档案管...
    • 181 篇 工商管理
  • 175 篇 法学
    • 104 篇 社会学
  • 109 篇 医学
    • 90 篇 临床医学
    • 78 篇 基础医学(可授医学...
  • 65 篇 军事学
  • 62 篇 经济学
  • 31 篇 农学
  • 26 篇 教育学
  • 12 篇 文学
  • 8 篇 艺术学

主题

  • 188 篇 feature extracti...
  • 161 篇 semantics
  • 140 篇 accuracy
  • 128 篇 cryptography
  • 117 篇 computational mo...
  • 117 篇 training
  • 105 篇 security
  • 104 篇 authentication
  • 104 篇 federated learni...
  • 98 篇 privacy
  • 96 篇 deep learning
  • 94 篇 information secu...
  • 92 篇 protocols
  • 81 篇 data models
  • 71 篇 cloud computing
  • 70 篇 robustness
  • 66 篇 object detection
  • 66 篇 machine learning
  • 65 篇 neural networks
  • 64 篇 optimization

机构

  • 263 篇 key laboratory o...
  • 207 篇 shandong provinc...
  • 164 篇 state key labora...
  • 162 篇 school of comput...
  • 141 篇 school of comput...
  • 119 篇 school of cyber ...
  • 84 篇 institute of inf...
  • 80 篇 guangdong provin...
  • 74 篇 key laboratory o...
  • 67 篇 shandong provinc...
  • 67 篇 key laboratory o...
  • 53 篇 peng cheng labor...
  • 53 篇 information secu...
  • 52 篇 shandong enginee...
  • 51 篇 school of comput...
  • 51 篇 key laboratory o...
  • 49 篇 shandong fundame...
  • 47 篇 key laboratory o...
  • 44 篇 school of comput...
  • 44 篇 college of compu...

作者

  • 40 篇 cao xiaochun
  • 37 篇 huang qingming
  • 36 篇 yang yang
  • 35 篇 yang xiaoyuan
  • 34 篇 zheng wei-shi
  • 34 篇 zhou deyu
  • 30 篇 xie xiaohua
  • 28 篇 cong runmin
  • 28 篇 jianfeng ma
  • 28 篇 xu an wang
  • 26 篇 xiaoming wu
  • 26 篇 yichuan wang
  • 26 篇 xiaoyuan yang
  • 25 篇 zhang minqing
  • 24 篇 xinhong hei
  • 24 篇 yang jian
  • 23 篇 min-ling zhang
  • 22 篇 ma jianfeng
  • 21 篇 wang wei
  • 21 篇 yang yixian

语言

  • 4,280 篇 英文
  • 844 篇 其他
  • 147 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of computer Network and Information Security of Engineering"
5248 条 记 录,以下是331-340 订阅
排序:
Design and Realization of Personal Password Management System Based on Domestic Cryptographic Algorithms  14th
Design and Realization of Personal Password Management Syste...
收藏 引用
14th International Conference on computer engineering and networks, CENet 2024
作者: Mo, Zixi Zhuge, Chengchen Ma, Zhuo Li, Xiang Zhang, Heyu Zhang, Xunrui Department of Computer Information and Cyber Security Jiangsu Police Institute Nanjing China Engineering Research Center of Electronic Data Forensics Analysis Nanjing China Department of Public Security of Jiangsu Province Key Laboratory of Digital Forensics Nanjing China
To address the problems of low password security and the use of the same password on multiple network platforms, we analyze the major techniques and shortcomings of the existing personal password manager, and a person... 详细信息
来源: 评论
Design and Implementation of a BERT Based Weibo Public Opinion Monitoring System  14th
Design and Implementation of a BERT Based Weibo Public Opini...
收藏 引用
14th International Conference on computer engineering and networks, CENet 2024
作者: Chen, Shun-Chao Zhu, Tao Pang, Zi-An Xu, Chen Department of Computer Information and Cyber Security Key Laboratory of Digital Forensics Department of Public Security of Jiangsu Province Jiangsu Police Institute Engineering Research Center of Electronic Data Forensics Analysis Jiangsu Province NAN Jing210031 China
With the rapid development of online We Media, it is not easy to monitor and guide massive public opinion information. The massive forwarding, emotional polarization, and mixed rumors of blog posts are highly likely t... 详细信息
来源: 评论
APK Automated Analysis System Based on Machine Learning  14th
APK Automated Analysis System Based on Machine Learning
收藏 引用
14th International Conference on computer engineering and networks, CENet 2024
作者: Tang, keyan Liang, Guangjun Chen, Mengxuan Lu, You Zhang, Yang Xu, Zhongping Xu, Yiquan Department of Computer Information and Cyber Security Jiangsu Police Institute Nanjing China Engineering Research Center of Electronic Data Forensics Analysis Nanjing China Key Laboratory of Digital Forensics Department of Public Security of Jiangsu Province Nanjing China
This article first analyzes and compares the advantages and disadvantages of various traditional data mining methods and machine learning algorithms. Then, a new model for identifying Android malicious code was propos... 详细信息
来源: 评论
Low Resource Chinese Geological Text Named Entity Recognition Based on Prompt Learning
收藏 引用
Journal of Earth Science 2024年 第3期35卷 1035-1043页
作者: Hang He Chao Ma Shan Ye Wenqiang Tang Yuxuan Zhou Zhen Yu Jiaxin Yi Li Hou Mingcai Hou State Key Laboratory of Oil and Gas Reservoir Geology and Exploitation Institute of Sedimentary GeologyCollege of Computer Science and Cyber SecurityChengdu University of TechnologyChengdu 610059China Key Laboratory of Deep-Time Geography and Environment Reconstruction and Applications of Ministry of Natural Resources Chengdu University of TechnologyChengdu 610059China School of Information Engineering China University of Geosciences(Beijing)Beijing 100083China
Geological reports are a significant accomplishment for geologists involved in geological investigations and scientific research as they contain rich data and textual *** the rapid development of science and technolog... 详细信息
来源: 评论
Adversarial-Inspired Backdoor Defense via Bridging Backdoor and Adversarial Attacks  39
Adversarial-Inspired Backdoor Defense via Bridging Backdoor ...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Yin, Jia-Li Wang, Weijian Lyhwa Lin, Wei Liu, Ximeng Fujian Province Key Laboratory of Information Security and Network Systems Fuzhou350108 China College of Computer and Data Science Fuzhou University Fuzhou350118 China Fujian Provincial Key Laboratory of Big Data Mining and Applications Fuzhou350118 China College of Computer Science and Mathematics Fujian University of Technology Fuzhou350118 China Lion Rock Labs of Cyberspace Security CTIHE Hong Kong
Backdoor attacks and adversarial attacks are two major security threats to deep neural networks (DNNs), with the former one is a training-time data poisoning attack that aims to implant backdoor triggers into models b... 详细信息
来源: 评论
Research on Satellite network Traffic Prediction Algorithm Based on Gray Wolf Algorithm Optimizing GRU and Spatiotemporal Analysis  15
Research on Satellite Network Traffic Prediction Algorithm B...
收藏 引用
15th International Conference on Communication Software and networks, ICCSN 2023
作者: Cong, Ligang Shi, Baoyu Di, Xiaoqiang Ding, Huiying Chen, Chuanhui School of Computer Science and Technology Changchun University of Science and Technology Changchun China Changchun University of Science and Technology Jilin Key Laboratory of Network and Information Security Changchun China
Accurate traffic prediction is crucial for the performance improvement of satellite networks, which can help balance network load, optimize routing, and effectively improve network performance. To better plan traffic ... 详细信息
来源: 评论
SyntaxBridge: Protocol Description Transformer for Enhanced Formal Analysis of security Protocols  23
SyntaxBridge: Protocol Description Transformer for Enhanced ...
收藏 引用
23rd IEEE International Conference on Trust, security and Privacy in Computing and Communications, TrustCom 2024
作者: Cai, Liujia Yu, Tong Li, Yumeng Lu, Siqi Dong, Hanjie Cai, Guangying Li, Guangong Wang, Yongjuan Information Engineering University Henan Key Laboratory of Network Cryptography Technology Zhengzhou China Hainan University School of Information and Communication Engineering Haikou China Zhengzhou University School of Computer Science and Artificial Intelligence Zhengzhou China
Currently, formal analysis of security protocols under the symbolic model has become a crucial approach in the field of protocol analysis, owing to its intuitiveness and universality. However, researchers using variou... 详细信息
来源: 评论
Feature Aggregation network for Memory-Based Industrial Anomaly Detection  9
Feature Aggregation Network for Memory-Based Industrial Anom...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Li, Min Han, Delong Shao, Rui He, Jinghui City University of Macau Faculty of Data Science China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
In the process of large-scale industrial production, complex defects of different shapes and sizes can occur in industrial products and their components, and these defects seriously affect the performance of industria... 详细信息
来源: 评论
Characterization and Properties of Bent-Negabent Functions
收藏 引用
Chinese Journal of Electronics 2022年 第4期31卷 786-792页
作者: JIANG Niu ZHAO Min YANG Zhiyao ZHUO Zepeng CHEN Guolong School of Mathematical Sciences Huaibei Normal University Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Normal University School of Cyber Science University of Science and Technology of China School of Computer Engineering Bengbu University
A further characterization of the bentnegabent functions is presented. Based on the concept of complete mapping polynomial, we provide a necessary and sufficient condition for a class of quadratic Boolean functions to... 详细信息
来源: 评论
TFSG: A Self-Supervised Guided Graph Learning Method for Traffic Flow Prediction
收藏 引用
IEEE Internet of Things Journal 2025年 第13期12卷 24345-24357页
作者: Zheng, Yingran Luo, Chao Shao, Rui Shandong Normal University School of Information Science and Engineering Jinan250014 China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan250014 China China Mobile Shandong Co. Ltd center of network optimization Jinan250014 China
With the rapid development of the Internet of Things, a large amount of real-time traffic data has been collected. How to fully utilize these traffic data for rational planning of intelligent transportation systems is... 详细信息
来源: 评论