咨询与建议

限定检索结果

文献类型

  • 2,836 篇 会议
  • 2,409 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 5,248 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,531 篇 工学
    • 2,657 篇 计算机科学与技术...
    • 2,109 篇 软件工程
    • 959 篇 信息与通信工程
    • 503 篇 电气工程
    • 385 篇 控制科学与工程
    • 384 篇 电子科学与技术(可...
    • 307 篇 网络空间安全
    • 301 篇 生物工程
    • 200 篇 机械工程
    • 161 篇 光学工程
    • 143 篇 仪器科学与技术
    • 126 篇 生物医学工程(可授...
    • 104 篇 动力工程及工程热...
    • 101 篇 交通运输工程
    • 101 篇 安全科学与工程
    • 98 篇 化学工程与技术
    • 83 篇 建筑学
    • 76 篇 土木工程
  • 1,518 篇 理学
    • 913 篇 数学
    • 333 篇 物理学
    • 324 篇 生物学
    • 279 篇 统计学(可授理学、...
    • 132 篇 系统科学
    • 110 篇 化学
  • 916 篇 管理学
    • 552 篇 管理科学与工程(可...
    • 398 篇 图书情报与档案管...
    • 181 篇 工商管理
  • 175 篇 法学
    • 104 篇 社会学
  • 109 篇 医学
    • 90 篇 临床医学
    • 78 篇 基础医学(可授医学...
  • 65 篇 军事学
  • 62 篇 经济学
  • 31 篇 农学
  • 26 篇 教育学
  • 12 篇 文学
  • 8 篇 艺术学

主题

  • 188 篇 feature extracti...
  • 161 篇 semantics
  • 140 篇 accuracy
  • 128 篇 cryptography
  • 117 篇 computational mo...
  • 117 篇 training
  • 105 篇 security
  • 104 篇 authentication
  • 104 篇 federated learni...
  • 98 篇 privacy
  • 96 篇 deep learning
  • 94 篇 information secu...
  • 92 篇 protocols
  • 81 篇 data models
  • 71 篇 cloud computing
  • 70 篇 robustness
  • 66 篇 object detection
  • 66 篇 machine learning
  • 65 篇 neural networks
  • 64 篇 optimization

机构

  • 263 篇 key laboratory o...
  • 207 篇 shandong provinc...
  • 164 篇 state key labora...
  • 162 篇 school of comput...
  • 141 篇 school of comput...
  • 119 篇 school of cyber ...
  • 84 篇 institute of inf...
  • 80 篇 guangdong provin...
  • 74 篇 key laboratory o...
  • 67 篇 shandong provinc...
  • 67 篇 key laboratory o...
  • 53 篇 peng cheng labor...
  • 53 篇 information secu...
  • 52 篇 shandong enginee...
  • 51 篇 school of comput...
  • 51 篇 key laboratory o...
  • 49 篇 shandong fundame...
  • 47 篇 key laboratory o...
  • 44 篇 school of comput...
  • 44 篇 college of compu...

作者

  • 40 篇 cao xiaochun
  • 37 篇 huang qingming
  • 36 篇 yang yang
  • 35 篇 yang xiaoyuan
  • 34 篇 zheng wei-shi
  • 34 篇 zhou deyu
  • 30 篇 xie xiaohua
  • 28 篇 cong runmin
  • 28 篇 jianfeng ma
  • 28 篇 xu an wang
  • 26 篇 xiaoming wu
  • 26 篇 yichuan wang
  • 26 篇 xiaoyuan yang
  • 25 篇 zhang minqing
  • 24 篇 xinhong hei
  • 24 篇 yang jian
  • 23 篇 min-ling zhang
  • 22 篇 ma jianfeng
  • 21 篇 wang wei
  • 21 篇 yang yixian

语言

  • 4,280 篇 英文
  • 844 篇 其他
  • 147 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of computer Network and Information Security of Engineering"
5248 条 记 录,以下是341-350 订阅
排序:
Resource Cooperative Scheduling Optimization Considering security in Edge Mobile networks  19th
Resource Cooperative Scheduling Optimization Considering Sec...
收藏 引用
19th EAI International Conference on Collaborative Computing: networking, Applications and Worksharing, CollaborateCom 2023
作者: Fang, Cheng Yang, Peng Yi, Meng Du, Miao Li, Bing Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Nanjing China School of Computer Science and Engineering Southeast University Nanjing China School of Cyber Science and Engineering Southeast University Nanjing China
With the rapid development of technologies such as the Internet of Things and artificial intelligence, the contradiction between limited user computing resources and real-time, fast, and safe processing of large amoun... 详细信息
来源: 评论
Optimal replication strategy for mitigating burst traffic in information-centric satellite networks: a focus on remote sensing image transmission
收藏 引用
Frontiers of information Technology & Electronic engineering 2024年 第6期25卷 791-808页
作者: Ziyang XING Xiaoqiang DI Hui QI Jing CHEN Jinhui CAO Jinyao LIU Xusheng LI Zichu ZHANG Yuchen ZHU Lei CHEN Kai HUANG Xinghan HUO Jilin Key Laboratory of Network and Information Security Changchun 130022China School of Computer Science and Technology Changchun University of Science and TechnologyChangchun 130022China Information Center Changchun University of Science and TechnologyChangchun 130022China
information-centric satellite networks play a crucial role in remote sensing applications,particularly in the transmission of remote sensing ***,the occurrence of burst traffic poses significant challenges in meeting ... 详细信息
来源: 评论
A Blockchain-based PHR Sharing Scheme with Attribute Privacy Protection  23
A Blockchain-based PHR Sharing Scheme with Attribute Privacy...
收藏 引用
23rd IEEE International Conference on Trust, security and Privacy in Computing and Communications, TrustCom 2024
作者: Lu, Chaohe Yu, Zhongyuan Wang, Guijuan Dong, Anming Tian, Xiang Qufu Normal University School of Computer Science Rizhao 276800 China Lanzhou University School of Information Science and Engineering Lanzhou 730000 China Qilu University of Technology (Shandong Academy of Sciences) Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan 250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan 250353 China
With the rapid advancement and application of the Internet of Medical Things (IoMT), personal health records (PHRs) are now increasingly comprised of data collected by Internet of Things (IoT) devices and medical reco... 详细信息
来源: 评论
IGED:Towards Intelligent DDoS Detection Model Using Improved Generalized Entropy and DNN
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 1851-1866页
作者: Yanhua Liu Yuting Han HuiChen Baokang Zhao XiaofengWang Ximeng Liu College of Computer and Data Science Fuzhou UniversityFuzhou350108China Engineering Research Center of Big Data Intelligence Ministry of EducationFuzhou350108China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou UniversityFuzhou350108China College of Computer National University of Defense TechnologyChangsha410073China
As the scale of the networks continually expands,the detection of distributed denial of service(DDoS)attacks has become increasingly *** propose an intelligent detection model named IGED by using improved generalized ... 详细信息
来源: 评论
Efficient Wildcard Searchable Symmetric Encryption with Forward and Backward security  1st
Efficient Wildcard Searchable Symmetric Encryption with For...
收藏 引用
1st International Conference on Artificial Intelligence security and Privacy, AIS and P 2023
作者: Zhang, Xi Su, Ye Wei, Zhongkai Shen, Wenting Qin, Jing College of Computer and Cyber Security Hebei Normal University Shijiazhuang050024 China Hebei Provincial Key Laboratory of Network and Information Security Hebei Normal University Shijiazhuang050024 China School of Information Science and Engineering Shandong Normal University Jinan250358 China School of Mathematics Shandong University Jinan250100 China College of Computer Science and Technology Qingdao University Qingdao266071 China
Wildcard Searchable Symmetric Encryption can achieve flexibility and pattern matching while protecting data privacy. There is a promising future for combining secure wildcard search with emerging technologies such as ... 详细信息
来源: 评论
Genetic-A* Algorithm-Based Routing for Continuous-Flow Microfluidic Biochip in Intelligent Digital Healthcare  18th
Genetic-A* Algorithm-Based Routing for Continuous-Flow Micr...
收藏 引用
18th International Conference on Green, Pervasive, and Cloud Computing, GPC 2023
作者: Huang, Huichang Yang, Zhongliao Zhong, Jiayuan Xu, Li Dong, Chen Bao, Ruishen College of Computer and Data Science Fuzhou University Fuzhou350116 China College of Computer and Cyber Security Fujian Normal University Fuzhou350007 China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou China
In the field of intelligent digital healthcare, Continuous-flow microfluidic biochip (CFMB) has become a research direction of widespread concern. CFMB integrates a large number of microvalves and large-scale microcha... 详细信息
来源: 评论
The Construction and Experimental Technologies of Anonymous network Analysis and Control Platform  7
The Construction and Experimental Technologies of Anonymous ...
收藏 引用
7th International Conference on Pattern Recognition and Artificial Intelligence, PRAI 2024
作者: Zhao, Yue Yang, Bin Tian, Bo Yang, Yarang National Key Laboratory of Security Communication Chengdu610041 China School of Computer and Information Engineering Chuzhou University Chuzhou239000 China College of Physics and Electrical Engineering Kashi University Kashi844006 China
In view of the shortcomings of low accuracy and high false positive rate in the traditional anonymous network traffic analysis methods, this paper proposes the construction and experimental technologies of the anonymo... 详细信息
来源: 评论
GA-Net: Gated Attention Mechanism Based Global Refinement network for Image Inpainting  29
GA-Net: Gated Attention Mechanism Based Global Refinement Ne...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Qiu, Ran Zhao, Shengrong Liang, Hu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
Underwater images are often affected by problems such as light attenuation, color distortion, noise and scattering, resulting in image defects. A novel image inpainting method is proposed to intelligently predict and ... 详细信息
来源: 评论
Activation Distance and Capacity Analysis for Ambient Backscatter Communications with Sensitivity Constraint and Beamforming
收藏 引用
China Communications 2024年 第11期21卷 257-266页
作者: Mu Yunping Fan Dian Wang Gongpu Xu Yongjun Kuang Lei Engineering Research Center of Network Management Technology for High Speed Railway of Ministry of Education School of Computer and Information TechnologyBeijing Jiaotong UniversityBeijing 100044China China Academy of Information and Communications Technology Beijing 100191China School of Communication and Information Engineering Chongqing University of Posts and TelemcommunicationsChongqing 400065China Shanghai Key Laboratory of Multidimensional Information Processing Engineering Center of SHMEC for Space Information and GNSSSchool of Information Science and TechnologyEast China Normal UniversityShanghai 200241China
Circuit sensitivity of sensors or tags without battery is one practical constraint for ambient backscatter communication *** letter considers using beamforming to reduce the sensitivity constraint and evaluates the co... 详细信息
来源: 评论
Rail Transit Event Extraction based on the Fusion of Semantic and Local Dependency Features  15
Rail Transit Event Extraction based on the Fusion of Semanti...
收藏 引用
15th IEEE International Conference on Knowledge Graph, ICKG 2024
作者: Chen, Qiang Meng, Haining Bao, Yihao Yang, Mingsong Tong, Xinyu Zhao, Qin Khan, Muhammad Bilal Hei, Xinhong Xi'an University of Technology School of Computer Science and Engineering Xi'an China Xi'an University of Technology School of Computer Science and Engineering Shaanxi Key Laboratory of Network Computing and Security Technology Xi'an China Xi'an University of Technology School of Civil Engineering and Architecture Xi'an China
Event extraction in rail transit plays a vital role in all stages of design, construction, and final acceptance. Event extraction is a key part of building event logic graph (ELG). However, the difficulty in obtaining... 详细信息
来源: 评论