咨询与建议

限定检索结果

文献类型

  • 2,809 篇 会议
  • 2,365 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 5,177 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,454 篇 工学
    • 2,599 篇 计算机科学与技术...
    • 2,076 篇 软件工程
    • 923 篇 信息与通信工程
    • 446 篇 电气工程
    • 366 篇 电子科学与技术(可...
    • 358 篇 控制科学与工程
    • 299 篇 生物工程
    • 285 篇 网络空间安全
    • 196 篇 机械工程
    • 152 篇 光学工程
    • 139 篇 仪器科学与技术
    • 125 篇 生物医学工程(可授...
    • 103 篇 动力工程及工程热...
    • 96 篇 化学工程与技术
    • 88 篇 交通运输工程
    • 88 篇 安全科学与工程
    • 82 篇 建筑学
    • 75 篇 土木工程
  • 1,497 篇 理学
    • 904 篇 数学
    • 321 篇 物理学
    • 321 篇 生物学
    • 278 篇 统计学(可授理学、...
    • 132 篇 系统科学
    • 105 篇 化学
  • 893 篇 管理学
    • 533 篇 管理科学与工程(可...
    • 393 篇 图书情报与档案管...
    • 179 篇 工商管理
  • 175 篇 法学
    • 104 篇 社会学
  • 104 篇 医学
    • 86 篇 临床医学
    • 77 篇 基础医学(可授医学...
  • 65 篇 军事学
  • 61 篇 经济学
  • 31 篇 农学
  • 25 篇 教育学
  • 12 篇 文学
  • 8 篇 艺术学

主题

  • 186 篇 feature extracti...
  • 161 篇 semantics
  • 137 篇 accuracy
  • 127 篇 cryptography
  • 117 篇 computational mo...
  • 117 篇 training
  • 103 篇 authentication
  • 103 篇 security
  • 99 篇 federated learni...
  • 96 篇 privacy
  • 94 篇 deep learning
  • 94 篇 information secu...
  • 91 篇 protocols
  • 79 篇 data models
  • 71 篇 cloud computing
  • 68 篇 robustness
  • 65 篇 object detection
  • 65 篇 neural networks
  • 63 篇 machine learning
  • 62 篇 optimization

机构

  • 258 篇 key laboratory o...
  • 207 篇 shandong provinc...
  • 164 篇 state key labora...
  • 160 篇 school of comput...
  • 141 篇 school of comput...
  • 117 篇 school of cyber ...
  • 83 篇 institute of inf...
  • 80 篇 guangdong provin...
  • 74 篇 key laboratory o...
  • 67 篇 key laboratory o...
  • 63 篇 shandong provinc...
  • 54 篇 information secu...
  • 53 篇 peng cheng labor...
  • 52 篇 shandong enginee...
  • 51 篇 school of comput...
  • 50 篇 key laboratory o...
  • 49 篇 shandong fundame...
  • 46 篇 key laboratory o...
  • 44 篇 school of comput...
  • 44 篇 college of compu...

作者

  • 39 篇 cao xiaochun
  • 36 篇 yang yang
  • 36 篇 huang qingming
  • 36 篇 yang xiaoyuan
  • 34 篇 zheng wei-shi
  • 34 篇 zhou deyu
  • 30 篇 xie xiaohua
  • 28 篇 cong runmin
  • 28 篇 jianfeng ma
  • 28 篇 xu an wang
  • 27 篇 xiaoyuan yang
  • 26 篇 xiaoming wu
  • 26 篇 yichuan wang
  • 25 篇 zhang minqing
  • 24 篇 xinhong hei
  • 24 篇 yang jian
  • 23 篇 min-ling zhang
  • 22 篇 ma jianfeng
  • 21 篇 wang wei
  • 21 篇 yang yixian

语言

  • 4,423 篇 英文
  • 634 篇 其他
  • 140 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of computer Network and Information Security of Engineering"
5177 条 记 录,以下是81-90 订阅
排序:
DIG: Improved DINO for Graffiti Detection
收藏 引用
IEEE Transactions on Systems, Man, and Cybernetics: Systems 2025年 第5期55卷 3557-3569页
作者: Wang, Bingshu Mao, Qianchen Liu, Aifei Chen, Long Chen, C. L. Philip Northwestern Polytechnical University School of Software Xi’an710129 China Shenzhen University Guangdong Key Laboratory of Intelligent Information Processing Shenzhen Key Laboratory of Media Security Shenzhen518060 China University of Macao Department of Computer and Information Science China South China University of Technology School of Computer Science and Engineering Guangzhou510641 China
Graffiti detection is essential in historic building protection and urban neighborhood management. Graffiti detection has made significant progress in recent years based on the development of deep learning. However, s... 详细信息
来源: 评论
Lip-Audio Modality Fusion for Deep Forgery Video Detection
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 3499-3515页
作者: Yong Liu Zhiyu Wang Shouling Ji Daofu Gong Lanxin Cheng Ruosi Cheng College of Cyberspace Security Information Engineering UniversityZhengzhou450001China Research Institute of Intelligent Networks Zhejiang LabHangzhou311121China College of Computer Science and Technology Zhejiang UniversityHangzhou310027China Henan Key Laboratory of Cyberspace Situation Awareness Zhengzhou450001China Key Laboratory of Cyberspace Security Ministry of EducationZhengzhou450001China
In response to the problem of traditional methods ignoring audio modality tampering, this study aims to explore an effective deep forgery video detection technique that improves detection precision and reliability by ... 详细信息
来源: 评论
Malware Detection Method Based on TPE Optimized Stacking  3
Malware Detection Method Based on TPE Optimized Stacking
收藏 引用
3rd International Conference on High Performance Computing and Communication engineering, HPCCE 2023
作者: Zhao, Dongbo Yuan, Zesong Xie, Nannan Jilin Province Key Laboratory of Network and Information Security School of Computer Science and Technology Changchun University of Science and Technology Changchun130022 China
Fast detection and categorization of malware are increasingly important for securing hosts and networks. Although many Machine Learning models have been utilized to detect malware, single-model detection may not remai... 详细信息
来源: 评论
A Location Recommendation Model Based on User Behavior and Sequence Influence  1
收藏 引用
8th International Conference on Internet on Things, ICIOT 2023, held as part of Services Conference Federation SCF 2023
作者: Mao, Weixuan Wen, Ruwang Cheng, Zhengxiang Mei, Zhuolin Wang, Haibin Wu, Bin Shi, Jiaoli School of Computer and Big Data Science Jiangxi Jiujiang China Jiujiang Key Laboratory of Network and Information Security Jiangxi Jiujiang China Institute of Information Security Jiujiang University Jiangxi Jiujiang China
There are evident sequential patterns in human visits to different locations in daily life, which has led to the emergence of numerous sequence-based geographic location recommendation methods. However, previous resea... 详细信息
来源: 评论
EVPIR: Efficient and Verifiable Privacy-Preserving Image Retrieval in Cloud-assisted Internet of Things
收藏 引用
IEEE Internet of Things Journal 2025年 第13期12卷 24259-24274页
作者: Li, Mingyue Li, Yuntao Du, Ruizhong Jia, Chunfu Shao, Wei Hebei University School of Cyber Security and Computer Baoding071000 China Key Lab on High Trusted Information Sys tem in Hebei Province Hebei China College of Cyber Sciences Nankai university Tianjin300350 China Tianjin Key Laboratory of Network and Data Security Technology Tianjin300350 China Jinan250014 China
With the proliferation of mobile devices and the advancement of cloud computing capabilities, cloud-assisted Internet of Things (IoT) attracts increased attention based on its computational and storage advantages. Upo... 详细信息
来源: 评论
Reinforcement learning of non-additive joint steganographic embedding costs with attention mechanism
收藏 引用
Science China(information Sciences) 2023年 第3期66卷 273-286页
作者: Weixuan TANG Bin LI Weixiang LI Yuangen WANG Jiwu HUANG Institute of Artificial Intelligence and Blockchain Guangzhou University Guangdong Key Laboratory of Intelligent Information Processing Shenzhen Key Laboratory of Media Security Shenzhen University Shenzhen Institute of Artificial Intelligence and Robotics for Society School of Computer Science and Cyber Engineering Guangzhou University
Image steganography is the art and science of secure communication by concealing information within digital images. In recent years, the techniques of steganographic cost learning have developed rapidly. Although the ... 详细信息
来源: 评论
A New High-Capacity Robust Image Steganography Method via Adversarial network  5
A New High-Capacity Robust Image Steganography Method via Ad...
收藏 引用
5th International Academic Exchange Conference on Science and Technology Innovation, IAECST 2023
作者: Dong, Weina Jiang, Zongbao Chen, Lifeng Sun, Wenquan University of PAP Key Laboratory of Network and Information Security of PAP Engineering Shaanxi Xi'an710086 China
Aiming at the problem that the high-capacity steganography model based on encoding-decoding network had weak robustness and could not resist noise attack and channel compression, an improved high-capacity robust image... 详细信息
来源: 评论
Reversible Data Hiding in Encrypted Images based on Classic McEliece Cryptosystem  2
Reversible Data Hiding in Encrypted Images based on Classic ...
收藏 引用
2nd International Conference on Image Processing, computer Vision and Machine Learning, ICICML 2023
作者: Jiang, Zongbao Zhang, Minqing Di, Fuqiang Dong, Weina University of PAP Key Laboratory of Network and Information Security of PAP Engineering Shaanxi Xi'an710086 China
Aiming at the problems that the security of traditional data hiding algorithms is difficult to be guaranteed and the existing algorithms' embedded volume is restricted under quantum operation attacks, a reversible... 详细信息
来源: 评论
A two Stage Mixed Integer Programming Model for Distributionally Robust State Based Non-Intrusive Load Monitoring
收藏 引用
IEEE Transactions on Consumer Electronics 2025年 第1期71卷 1024-1033页
作者: Zhang, Chen Chai, Zimo Yang, Linfeng University of Shanghai for Science and Technology School of Mechanical Engineering Shanghai China Guangxi University School of Computer Electronics and Information the Guangxi Key Laboratory of Multimedia Communication and Network Technology Nanning China
This paper presents a non-intrusive load monitoring (NILM) model based on two-stage mixed-integer linear programming theory. Compared with other mixed integer optimization-based models, this paper model introduces few... 详细信息
来源: 评论
Shorter ZK-SNARKs from square span programs over ideal lattices
收藏 引用
Cybersecurity 2025年 第1期8卷 208-226页
作者: Xi Lin Heyang Cao Feng‑Hao Liu Zhedong Wang Mingsheng Wang Key Laboratory of Cyberspace Security Defense Institute of Information EngineeringChinese Academy of SciencesBeijingChina School of Cyber Security University of Chinese Academy of SciencesBeijingChina School of Electrical Engineering&Computer Science Washington State UniversityPullmanWAUSA School of Cyber Science and Engineering Shanghai Jiaotong UniversityShanghaiChina
Zero-knowledge succinct non-interactive arguments of knowledge(zk-SNARKs)are cryptographic protocols that ofer efcient and privacy-preserving means of verifying NP language relations and have drawn considerable atten‑... 详细信息
来源: 评论