咨询与建议

限定检索结果

文献类型

  • 154 篇 会议
  • 113 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 268 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 193 篇 工学
    • 153 篇 计算机科学与技术...
    • 128 篇 软件工程
    • 43 篇 信息与通信工程
    • 24 篇 控制科学与工程
    • 21 篇 网络空间安全
    • 19 篇 电气工程
    • 16 篇 电子科学与技术(可...
    • 12 篇 生物工程
    • 11 篇 机械工程
    • 9 篇 生物医学工程(可授...
    • 6 篇 交通运输工程
    • 5 篇 仪器科学与技术
    • 4 篇 光学工程
    • 4 篇 化学工程与技术
    • 4 篇 安全科学与工程
  • 85 篇 理学
    • 55 篇 数学
    • 15 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 13 篇 生物学
    • 10 篇 系统科学
    • 5 篇 化学
  • 45 篇 管理学
    • 28 篇 管理科学与工程(可...
    • 18 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 10 篇 法学
    • 6 篇 社会学
    • 4 篇 法学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 8 篇 医学
    • 7 篇 临床医学
    • 6 篇 基础医学(可授医学...
    • 5 篇 药学(可授医学、理...
  • 4 篇 军事学
  • 2 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 17 篇 authentication
  • 12 篇 cryptography
  • 8 篇 deep learning
  • 8 篇 security
  • 8 篇 cloud computing
  • 6 篇 protocols
  • 6 篇 training
  • 5 篇 feature extracti...
  • 5 篇 malware
  • 4 篇 internet of thin...
  • 4 篇 access control
  • 4 篇 reinforcement le...
  • 4 篇 optimization
  • 4 篇 servers
  • 4 篇 internet
  • 4 篇 computers
  • 4 篇 semantics
  • 4 篇 blockchain
  • 4 篇 peer to peer net...
  • 4 篇 trusted computin...

机构

  • 21 篇 key lab of infor...
  • 7 篇 key lab of netwo...
  • 6 篇 guangxi key labo...
  • 6 篇 national compute...
  • 5 篇 network informat...
  • 5 篇 computer departm...
  • 5 篇 institute of inf...
  • 5 篇 key lab. of comp...
  • 4 篇 ministry of edu....
  • 4 篇 key lab. of comp...
  • 4 篇 hebei provincial...
  • 4 篇 key lab of netwo...
  • 4 篇 college of compu...
  • 4 篇 college of mathe...
  • 4 篇 national languag...
  • 4 篇 national compute...
  • 4 篇 school of cyber ...
  • 4 篇 hubei provincial...
  • 4 篇 school of comput...
  • 4 篇 key laboratory o...

作者

  • 9 篇 meng deyu
  • 9 篇 tan zuowen
  • 9 篇 li hui
  • 7 篇 cao xiangyong
  • 6 篇 lopez javier
  • 5 篇 zhang yuqing
  • 5 篇 wang fangwei
  • 5 篇 javier lopez
  • 5 篇 feng yu
  • 5 篇 sun jin
  • 4 篇 fan kai
  • 4 篇 yong-zhen li
  • 4 篇 weizhong zhao
  • 4 篇 yong zhao
  • 4 篇 ma wenping
  • 4 篇 tingting he
  • 4 篇 wang yue
  • 4 篇 hu yupu
  • 4 篇 xingpeng jiang
  • 4 篇 hu yu-pu

语言

  • 247 篇 英文
  • 15 篇 中文
  • 6 篇 其他
检索条件"机构=Lab of Computer Network and Information Security"
268 条 记 录,以下是61-70 订阅
排序:
A Private Statistic Query Scheme for Encrypted Electronic Medical Record System *
A Private Statistic Query Scheme for Encrypted Electronic Me...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Xianxian Li Xuemei Fu Feng Yu Zhenkui Shi Jie Li Junhao Yang Guangxi Key Lab of Multi-source Information Mining & Security Guilin China Key Laboratory of Computer Network and Information Integration Southeast University Nanjing China
In this paper, we propose a scheme that supports statistic query and authorized access control on an Encrypted Electronic Medical Records Databases(EMDB). Different from other schemes, it is based on Differential-Priv... 详细信息
来源: 评论
Across-Platform Detection of Malicious Cryptocurrency Transactions via Account Interaction Learning
arXiv
收藏 引用
arXiv 2024年
作者: Che, Zheng Shen, Meng Tan, Zhehui Du, Hanbiao Zhu, Liehuang Wang, Wei Chen, Ting Zhao, Qinglin Xie, Yong The School of Computer Science Beijing Institute of Technology Beijing100081 China The School of Cyberspace Science and Technology Beijing Institute of Technology Beijing100081 China The Ministry of Education Key Lab for Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an710049 China The School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu611731 China The School of Computer Science and Engineering Macau University of Science and Technology China The School of Computer and Information Science Qinghai Institute of Technology Xining810016 China
With the rapid evolution of Web3.0, cryptocurrency has become a cornerstone of decentralized finance. While these digital assets enable efficient and borderless financial transactions, their pseudonymous nature has al... 详细信息
来源: 评论
Trajectory Privacy Protection with Pricing Awareness on Ride-on-Demand System
Trajectory Privacy Protection with Pricing Awareness on Ride...
收藏 引用
IEEE International Conference on Cyber security and Cloud Computing (CSCloud)
作者: Sihui Jia Saiqin Long Zhirun Zheng Qingyong Deng Ping Wang Shujuan Tian School of Computer Science and School of Cyberspace Science Hunan International Scientific and Technological Cooperation Base of Intelligent network Xiangtan University Xiangtan China School of Information Science and Technology Jinan University Guangzhou China School of Mathematics and Compulational Science Xiangtan University Xiangtan China Guangxi Key Lab of Multi-source Information Mining & Security Guangxi Normal University Guilin China
With the widespread use of the Ride-on Demand (RoD) system, many privacy issues have been exposed, and there is growing concern about whether private information will be leaked. For this problem, our previous work add...
来源: 评论
A Lightening Fine-grained Access Control Scheme Supporting Full Policy Hiding in Cloud Storage
A Lightening Fine-grained Access Control Scheme Supporting F...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Jiaoli Shi Chao Hu Shimao Yao Zhuolin Mei Bin Wu Hui Li School of Computer and Big Data Jiujiang Univ. Jiujiang China School of Software IoT Engineering Jiangxi Univ. of Finance and Economics Nanchang China Jiujiang Key Lab. of Network and Information Security Jiujiang China School of Computer and Big Data Jiujiang University Jiujiang China School of Elec. and Comp. Engineering Peking University Shenzhen China
Efficiency, security, and flexibility are difficult to balance in a full policy hiding CP-ABE scheme. This paper creatively converts the privacy matching problem of access policy and a user’s private key to the priva...
来源: 评论
FAST: a dual-tier few-shot learning paradigm for whole slide image classification  24
FAST: a dual-tier few-shot learning paradigm for whole slide...
收藏 引用
Proceedings of the 38th International Conference on Neural information Processing Systems
作者: Kexue Fu Xiaoyuan Luo Linhao Qu Shuo Wang Ying Xiong Ilias Maglogiannis Longxiang Gao Manning Wang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China and Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China Digital Medical Research Center School of Basic Medical Sciences Fudan University and Shanghai Key Lab of Medical Image Computing and Computer Assisted Intervention Fudan University University of Piraeus
The expensive fine-grained annotation and data scarcity have become the primary obstacles for the widespread adoption of deep learning-based Whole Slide Images (WSI) classification algorithms in clinical practice. Unl...
来源: 评论
HSIGene: A Foundation Model for Hyperspectral Image Generation
arXiv
收藏 引用
arXiv 2024年
作者: Pang, Li Cao, Xiangyong Tang, Datao Xu, Shuang Bai, Xueru Zhou, Feng Meng, Deyu The School of Computer Science and Technology The Ministry of Education Key Lab for Intelligent Networks and Network Security Xi’an Jiaotong University Shaanxi Xi’an710049 China The School of Mathematics and Statistics Northwestern Polytechnical University Shaanxi Xi’an710021 China The National Laboratory of Radar Signal Processing Xidian University Xi’an710071 China The Key Laboratory of Electronic Information Countermeasure and Simulation of the Education Ministry of China Xidian University Xi’an710071 China The School of Mathematics and Statistics The Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi’an Jiaotong University Shaanxi Xi’an710049 China Guangdong Guangzhou510555 China
Hyperspectral image (HSI) plays a vital role in various fields such as agriculture and environmental monitoring. However, due to the expensive acquisition cost, the number of hyperspectral images is limited, degenerat... 详细信息
来源: 评论
Semantic and Emotional Dual Channel for Emotion Recognition in Conversation
收藏 引用
IEEE Transactions on Affective Computing 2025年
作者: Yang, Zhenyu Zhang, Zhibo Cheng, Yuhu Zhang, Tong Wang, Xuesong Jinan250353 China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250353 China China University of Mining and Technology Engineering Research Center of Intelligent Control for Underground Space Ministry of Education Xuzhou Key Laboratory of Artificial Intelligence and Big Data School of Information and Control Engineering Xuzhou221116 China South China University of Technology Guangdong Provincial Key Laboratory of Computational Intelligence and Cyberspace Information School of Computer Science and Engineering Guangzhou510006 China Pazhou Lab Guangzhou510335 China Engineering Research Center Ministry of Education on Health Intelligent Perception and Paralleled Digital-Human Guangzhou China
Emotion recognition in conversation (ERC) aims at accurately identifying emotional states expressed in conversational content. Existing ERC methods, although relying on semantic understanding, often encounter challeng... 详细信息
来源: 评论
Fast Noise Removal in Hyperspectral Images via Representative Coefficient Total Variation
arXiv
收藏 引用
arXiv 2022年
作者: Peng, Jiangjun Wang, Hailin Cao, Xiangyong Liu, Xinlin Rui, Xiangyu Meng, Deyu School of Mathematics and Statistics Ministry of Education Key Lab of Intelligent Networks and Network Security Xi’an Jiaotong University Shaan’xi Xi'An710049 China School of Computer Science and Technology Ministry of Education Key Lab For Intelligent Networks and Network Security Xi’an Jiaotong University Xi'An710049 China The School of Mathematics and Statistics Southwest University Chongqing400715 China School of Mathematics and Information China West Normal University Nanchong637002 China
Mining structural priors in data is a widely recognized technique for hyperspectral image (HSI) denoising tasks, whose typical ways include model-based methods and data-based methods. The model-based methods have good... 详细信息
来源: 评论
A rejection sampling algorithm for off-centered discrete Gaussian distributions over the integers
收藏 引用
Science China(information Sciences) 2019年 第3期62卷 196-198页
作者: Yusong DU Baodian WEI Huang ZHANG School of Data and Computer Science Sun Yat-sen University Guangdong Key Laboratory of Information Security Technology Chongqing Key Lab of Computer Network and Communication Technology
Dear editor,Discrete Gaussian sampling, that is, sampling from a discrete Gaussian distribution DΛ,σ,cwith parameter σ> 0 and center c∈R~n over an ndimensional lattice Λ, has been considered by the cryptograph... 详细信息
来源: 评论
An Analytical Framework for Control Synthesis of Cyber-Physical Systems with Safety Guarantee
arXiv
收藏 引用
arXiv 2022年
作者: Niu, Luyao Al Maruf, Abdullah Clark, Andrew Mertoguno, J. Sukarno Poovendran, Radha The Department of Electrical and Computer Engineering Worcester Polytechnic Institute WorcesterMA01609 United States The Network Security Lab Department of Electrical and Computer Engineering University of Washington SeattleWA98195-2500 United States Information and Cyber Sciences Georgia Tech Research Institute AtlantaGA30332 United States
Cyber-physical systems (CPS) are required to operate safely under fault and malicious attacks. The simplex architecture and the recently proposed cyber resilient architectures, e.g., Byzantine fault tolerant++ (BFT++)... 详细信息
来源: 评论