咨询与建议

限定检索结果

文献类型

  • 163 篇 会议
  • 115 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 279 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 199 篇 工学
    • 151 篇 计算机科学与技术...
    • 126 篇 软件工程
    • 44 篇 信息与通信工程
    • 25 篇 控制科学与工程
    • 25 篇 网络空间安全
    • 19 篇 电气工程
    • 17 篇 电子科学与技术(可...
    • 12 篇 机械工程
    • 12 篇 生物工程
    • 9 篇 生物医学工程(可授...
    • 7 篇 仪器科学与技术
    • 6 篇 交通运输工程
    • 4 篇 光学工程
    • 4 篇 化学工程与技术
    • 4 篇 安全科学与工程
  • 85 篇 理学
    • 55 篇 数学
    • 15 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 13 篇 生物学
    • 10 篇 系统科学
    • 5 篇 化学
  • 44 篇 管理学
    • 29 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 9 篇 法学
    • 6 篇 社会学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 8 篇 医学
    • 7 篇 临床医学
    • 6 篇 基础医学(可授医学...
    • 5 篇 药学(可授医学、理...
  • 5 篇 军事学
    • 5 篇 军队指挥学
  • 2 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 17 篇 authentication
  • 11 篇 cryptography
  • 9 篇 security
  • 9 篇 cloud computing
  • 8 篇 deep learning
  • 7 篇 training
  • 6 篇 protocols
  • 5 篇 feature extracti...
  • 5 篇 malware
  • 5 篇 heuristic algori...
  • 4 篇 internet of thin...
  • 4 篇 access control
  • 4 篇 reinforcement le...
  • 4 篇 optimization
  • 4 篇 servers
  • 4 篇 internet
  • 4 篇 computers
  • 4 篇 semantics
  • 4 篇 blockchain
  • 4 篇 network security

机构

  • 21 篇 key lab of infor...
  • 7 篇 key lab of netwo...
  • 6 篇 guangxi key labo...
  • 6 篇 national compute...
  • 5 篇 network informat...
  • 5 篇 computer departm...
  • 5 篇 institute of inf...
  • 4 篇 ministry of edu....
  • 4 篇 key lab. of comp...
  • 4 篇 hebei provincial...
  • 4 篇 key lab of netwo...
  • 4 篇 college of compu...
  • 4 篇 school of inform...
  • 4 篇 college of mathe...
  • 4 篇 national languag...
  • 4 篇 national compute...
  • 4 篇 school of cyber ...
  • 4 篇 hubei provincial...
  • 4 篇 school of comput...
  • 4 篇 key laboratory o...

作者

  • 9 篇 meng deyu
  • 9 篇 tan zuowen
  • 9 篇 li hui
  • 7 篇 cao xiangyong
  • 6 篇 lopez javier
  • 5 篇 zhang yuqing
  • 5 篇 wang fangwei
  • 5 篇 javier lopez
  • 5 篇 feng yu
  • 5 篇 sun jin
  • 4 篇 fan kai
  • 4 篇 yong-zhen li
  • 4 篇 weizhong zhao
  • 4 篇 yong zhao
  • 4 篇 ma wenping
  • 4 篇 tingting he
  • 4 篇 wang yue
  • 4 篇 hu yupu
  • 4 篇 xingpeng jiang
  • 4 篇 hu yu-pu

语言

  • 247 篇 英文
  • 17 篇 其他
  • 15 篇 中文
检索条件"机构=Lab.of Computer Network and Information Security"
279 条 记 录,以下是1-10 订阅
排序:
security analysis and secured access design for networks of image remote sensing
收藏 引用
Digital Communications and networks 2025年 第1期11卷 136-144页
作者: Juan Zhao Haibo Dai Xiaolong Xu Hao Yan Zheng Zhang Chunguo Li School of Network Security Jinling Institute of TechnologyNanjing 211169China School of IoT Nanjing University of Posts and Telecommunications(NJUPT)Nanjing 210003China Jiangsu Key Lab.of Big Data Security and Intelligent Processing NJUPTNanJing 210003China School of Information Science and Engineering Southeast UniversityNanjing 210096China
The secured access is studied in this paper for the network of the image remote *** sensor in this network encounters the information security when uploading information of the images wirelessly from the sensor to the... 详细信息
来源: 评论
CYBERSHIELD: A Competitive Simulation Environment for Training AI in Cybersecurity  11
CYBERSHIELD: A Competitive Simulation Environment for Traini...
收藏 引用
11th International Conference on Internet of Things: Systems, Management and security, IOTSMS 2024
作者: Carrasco, José Álvaro Fernández Pagola, Iñigo Amonarriz Urrutia, Raúl Orduna Román, Rodrigo San Sebastian Donostia20009 Spain University of Malaga Network Information and Computer Security Lab Malaga29071 Spain
Simulation environments are crucial in cybersecurity for training AI algorithms, providing a secure and controlled space to explore the impact derived from diverse cyber threads. They offer a flexible platform for acc... 详细信息
来源: 评论
Enhancing TrUStAPIS Methodology in the Web of Things with LLM-Generated IoT Trust Semantics  26th
Enhancing TrUStAPIS Methodology in the Web of Things with LL...
收藏 引用
26th International Conference on information and Communications security, ICICS 2024
作者: Ferraris, Davide Kotis, Konstantinos Kalloniatis, Christos Network Information and Computer Security Lab University of Malaga Malaga Spain Department of Cultural Technology and Communication University of the Aegean Mytilene Greece
In the Internet of Things (IoT) there are ecosystems where their physical’smart’ entities virtually interact with each other. Often, this interaction occurs among unknown entities, making trust an essential requirem... 详细信息
来源: 评论
New results on quantum boomerang attacks
收藏 引用
Quantum information Processing 2023年 第4期22卷 1-27页
作者: Zou, Hongkai Zou, Jian Luo, Yiyuan College of Computer and Data Science Fuzhou University Fuzhou China Key Lab of Information Security of Network Systems Fuzhou University Fuzhou China School of Information Sciences and Technology Huizhou University Huizhou China
At SAC 2021, Frixons et al. proposed quantum boomerang attacks that can effectively recover the keys of block ciphers in the quantum setting. Based on their work, we further consider how to quantize the generic boomer... 详细信息
来源: 评论
Integration of MPC into Besu through an extended private transaction model
Integration of MPC into Besu through an extended private tra...
收藏 引用
2023 IEEE International Conference on Metaverse Computing, networking and Applications, MetaCom 2023
作者: Morales, Daniel Agudo, Isaac Lopez, Javier Itis Software Universidad de Málaga Network Information and Computer Security Lab Department of Computer Science Málaga Spain
In the last few years we have seen many different approaches to incorporate privacy features to blockchains. In the area of cryptocurrencies that would normally mean protecting the identity of the owner of some funds,... 详细信息
来源: 评论
Toward data privacy preservation with ciphertext update and key rotation for IoT
Toward data privacy preservation with ciphertext update and ...
收藏 引用
作者: Shen, Shuaiyong Yang, Yang Liu, Ximeng College of Mathematics and Computer Science Key Lab of Information Security of Network Systems Fuzhou University Fujian Fuzhou China
Fine-grained access control become a research spotlight in the scenario of the smart home with Internet-of-Things (IoTs). However, most of the existing works could only realize ciphertext outsourcing with an unchangea... 详细信息
来源: 评论
Task Offloading and Resource Allocation Based on Reinforcement Learning and Load Balancing in Vehicular networking
收藏 引用
IEEE Transactions on Consumer Electronics 2025年 第1期71卷 2217-2230页
作者: Tian, Shujuan Xiang, Shuhuan Zhou, Ziqi Dai, Haipeng Yu, Enze Deng, Qingyong Xiangtan University Key Laboratory of Hunan Province for Internet of Things and Information Security Hunan International Scientific and Technological Cooperation Base of Intelligent network School of Computer Science and School of Cyberspace Security Xiangtan411105 China Nanjing University School of Computer Science and Technology Nanjing211189 China Guangxi Normal University Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guilin541004 China Guangxi Normal University Guangxi Key Lab of Multi-source Information Mining and Security Guilin541004 China
Due to limited on-board resources and the mobility characteristics of vehicles in a multi-access edge computing (MEC)-based vehicular network, efficient task offloading and resource allocation schemes are essential fo... 详细信息
来源: 评论
EVPIR: Efficient and Verifiable Privacy-Preserving Image Retrieval in Cloud-assisted Internet of Things
收藏 引用
IEEE Internet of Things Journal 2025年 第13期12卷 24259-24274页
作者: Li, Mingyue Li, Yuntao Du, Ruizhong Jia, Chunfu Shao, Wei Hebei University School of Cyber Security and Computer Baoding071000 China Key Lab on High Trusted Information Sys tem in Hebei Province Hebei China College of Cyber Sciences Nankai university Tianjin300350 China Tianjin Key Laboratory of Network and Data Security Technology Tianjin300350 China Jinan250014 China
With the proliferation of mobile devices and the advancement of cloud computing capabilities, cloud-assisted Internet of Things (IoT) attracts increased attention based on its computational and storage advantages. Upo... 详细信息
来源: 评论
STGAT: A Spatio-Temporal Graph Attention network for Travel Demand Prediction
STGAT: A Spatio-Temporal Graph Attention Network for Travel ...
收藏 引用
2023 International Conference on networking and network Applications, NaNA 2023
作者: Zhang, Tao Yi Wang, YuBo Wei, ZhiCheng Key Lab of Network and Information Security China College of Computer and Cyberspace Security China Hebei Provincial Engineering Research Center for Supply Chain Big Data Analytics & Security Hebei Normal University Hebei Province Shijiazhuang China
Forecasting travel demand is a challenging task due to the complex spatial dependencies and dynamic temporal correlation of the traffic data. Furthermore, a limited representation of the given spatial graph structure ... 详细信息
来源: 评论
A Caching Strategy Based on Many-to-Many Matching Game in D2D networks
收藏 引用
Tsinghua Science and Technology 2021年 第6期26卷 857-868页
作者: Kaihang Yu Zhonggui Ma Runyu Ni Tao Zhang School of Computer and Communication Engineering University of Science and Technology BeijingBeijing 100083China Key Lab of Information Network Security Ministry of Public SecurityShanghai 201204China
Wireless edge caching has been proposed to reduce data traffic congestion in backhaul links, and it is being envisioned as one of the key components of next-generation wireless networks. This paper focuses on the infl... 详细信息
来源: 评论