咨询与建议

限定检索结果

文献类型

  • 163 篇 会议
  • 115 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 279 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 199 篇 工学
    • 151 篇 计算机科学与技术...
    • 126 篇 软件工程
    • 44 篇 信息与通信工程
    • 25 篇 控制科学与工程
    • 25 篇 网络空间安全
    • 19 篇 电气工程
    • 17 篇 电子科学与技术(可...
    • 12 篇 机械工程
    • 12 篇 生物工程
    • 9 篇 生物医学工程(可授...
    • 7 篇 仪器科学与技术
    • 6 篇 交通运输工程
    • 4 篇 光学工程
    • 4 篇 化学工程与技术
    • 4 篇 安全科学与工程
  • 85 篇 理学
    • 55 篇 数学
    • 15 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 13 篇 生物学
    • 10 篇 系统科学
    • 5 篇 化学
  • 44 篇 管理学
    • 29 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 9 篇 法学
    • 6 篇 社会学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 8 篇 医学
    • 7 篇 临床医学
    • 6 篇 基础医学(可授医学...
    • 5 篇 药学(可授医学、理...
  • 5 篇 军事学
    • 5 篇 军队指挥学
  • 2 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 17 篇 authentication
  • 11 篇 cryptography
  • 9 篇 security
  • 9 篇 cloud computing
  • 8 篇 deep learning
  • 7 篇 training
  • 6 篇 protocols
  • 5 篇 feature extracti...
  • 5 篇 malware
  • 5 篇 heuristic algori...
  • 4 篇 internet of thin...
  • 4 篇 access control
  • 4 篇 reinforcement le...
  • 4 篇 optimization
  • 4 篇 servers
  • 4 篇 internet
  • 4 篇 computers
  • 4 篇 semantics
  • 4 篇 blockchain
  • 4 篇 network security

机构

  • 21 篇 key lab of infor...
  • 7 篇 key lab of netwo...
  • 6 篇 guangxi key labo...
  • 6 篇 national compute...
  • 5 篇 network informat...
  • 5 篇 computer departm...
  • 5 篇 institute of inf...
  • 4 篇 ministry of edu....
  • 4 篇 key lab. of comp...
  • 4 篇 hebei provincial...
  • 4 篇 key lab of netwo...
  • 4 篇 college of compu...
  • 4 篇 school of inform...
  • 4 篇 college of mathe...
  • 4 篇 national languag...
  • 4 篇 national compute...
  • 4 篇 school of cyber ...
  • 4 篇 hubei provincial...
  • 4 篇 school of comput...
  • 4 篇 key laboratory o...

作者

  • 9 篇 meng deyu
  • 9 篇 tan zuowen
  • 9 篇 li hui
  • 7 篇 cao xiangyong
  • 6 篇 lopez javier
  • 5 篇 zhang yuqing
  • 5 篇 wang fangwei
  • 5 篇 javier lopez
  • 5 篇 feng yu
  • 5 篇 sun jin
  • 4 篇 fan kai
  • 4 篇 yong-zhen li
  • 4 篇 weizhong zhao
  • 4 篇 yong zhao
  • 4 篇 ma wenping
  • 4 篇 tingting he
  • 4 篇 wang yue
  • 4 篇 hu yupu
  • 4 篇 xingpeng jiang
  • 4 篇 hu yu-pu

语言

  • 247 篇 英文
  • 17 篇 其他
  • 15 篇 中文
检索条件"机构=Lab.of Computer Network and Information Security"
279 条 记 录,以下是91-100 订阅
排序:
VFGCN: A Vertical Federated Learning Framework With Privacy Preserving for Graph Convolutional network
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Wang, Gang Li, Qingming Liu, Ximeng Yan, Xiaoran Dong, Qingkuan Wu, Huiwen Kong, Xiangjie Zhou, Li Zhejiang Lab HangZhou310000 China Zhejiang University College of Computer Science and Technology Hangzhou310058 China Fuzhou University Key Laboratory of Information Security of Network Systems College of Computer and Big Data Fuzhou350108 China Xidian University State Key Laboratory of Integrated Services Networks Xi'an710071 China Zhejiang University of Technology College of Computer Science and Technology Hangzhou310023 China Dalian University of Technology School of Software Dalian116620 China
Due to the robust representational capabilities of graph data, employing graph neural networks for its processing has demonstrated superior performance over conventional deep learning algorithms. Graph data encompasse... 详细信息
来源: 评论
FANS: fuzzing android native system services via automated interface analysis  20
FANS: fuzzing android native system services via automated i...
收藏 引用
Proceedings of the 29th USENIX Conference on security Symposium
作者: Baozheng Liu Chao Zhang Guang Gong Yishun Zeng Haifeng Ruan Jianwei Zhuge Institute of Network Science and Cyberspace Tsinghua University and Beijing National Research Center for Information Science and Technology Alpha Lab 360 Internet Security Center Department of Computer Science and Technology Tsinghua University
Android native system services provide essential supports and fundamental functionalities for user apps. Finding vulnerabilities in them is crucial for Android security. Fuzzing is one of the most popular vulnerabilit...
来源: 评论
Design and Implementation of Classroom Attendance System Based on Video Face Recognition
Design and Implementation of Classroom Attendance System Bas...
收藏 引用
作者: Lin Zhi-heng Li Yong-zhen Network & Information Security Lab Dept.of Computer Science & TechnologyYanbian University
Classroom attendance,as an indispensable part of teaching activities,plays a very important role in classroom *** attendance can effectively supervise students to attend classes on time and ensure the quality of class... 详细信息
来源: 评论
A novel identity-based authentication scheme for IoV security
收藏 引用
International Journal of network security 2020年 第4期22卷 627-637页
作者: Wang, Changguang Dai, Zimeng Zhao, Dongmei Wang, Fangwei Key Lab of Network and Information Security of Hebei Province No.20 South ErHuan Road YuHua District Shijiazhuang050024 China College of Computer and Cyber Security Hebei Normal University No.20 South ErHuan Road YuHua District Shijiazhuang050024 China
In order to enhance the security of the IoV (Internet of Vehicles), a novel bi-directional authentication scheme is presented in this paper. By use of the elliptic curve en-cryption algorithm and the bilinear pair map... 详细信息
来源: 评论
Secure Data Propagation in Edge-Cloud Orchestrated Computing Paradigms: Statistcs and Taxonomy
Secure Data Propagation in Edge-Cloud Orchestrated Computing...
收藏 引用
International Conference on Advanced Cloud and Big Data (CBD)
作者: Feng Yu Xixian Li Huimin Zhang Li-e Wang College of computer science Guangxi Normal University Guilin China Key Laboratory of Computer Network and Information Integration Southeast University Nanjing China Guangxi Key Lab of Multi-source Information Mining &Security Guilin China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin China
Despite the importance of the secure data propagation in the edge-cloud orchestrated computing paradigms, to the best of our knowledge, there is lack of systematic and comprehensive review on this research topic. The ... 详细信息
来源: 评论
A Control Task Assignment Algorithm based on sub-graph isomorphism
A Control Task Assignment Algorithm based on sub-graph isomo...
收藏 引用
International Conference on Advanced Cloud and Big Data (CBD)
作者: Feng Yu Xixian Li Huimin Zhang Li-e Wang College of computer science Guangxi Normal University Guilin China Key Laboratory of Computer Network and Information Integration Southeast University Nanjing China Guangxi Key Lab of Multi-source Information Mining & Security Guilin China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin China
To enhance the controllability and trustworthiness of the Internet, a new network control architecture has been presented with control task extracted to the intra-domain control node and executed in distributed multi-... 详细信息
来源: 评论
CACAI: Comparative analysis of crypto apps in India
收藏 引用
AIP Conference Proceedings 2023年 第1期2916卷
作者: Rahul Johari Anuj Talwar Suhas Harbola Jyotsna Yadav Himesh Nayak Deo Prakash Vidyarthi SWINGER: Security Wireless IoT Network Group of Engineering and Research University School of Information Communication and Technology (USICT) Guru Gobind Singh Indraprastha University Sector-16C Dwarka Delhi India Computer vision and Image processing lab University School of Information Communication and Technology (USICT) Guru Gobind Singh Indraprastha University Sector-16C Dwarka Delhi India School of Computer and Systems Sciences Parallel and Distributed Systems Lab JNU Delhi India
Crypto-currency is a decentralized digital currency which can be used as a medium of exchange. As it does not have any central authority, it is unregulated and a volatile asset. Globally the crypto market is worth a f...
来源: 评论
Algorithms for Globally-Optimal Secure Signaling over Gaussian MIMO Wiretap Channels Under Interference Constraints
arXiv
收藏 引用
arXiv 2020年
作者: Dong, Limeng Loyka, Sergey Li, Yong Ministry of Education Key Lab for Intelligent Networks and Network Security School of Information and Communications Engineering Xi’an Jiaotong University Xi’anShaanxi710049 China School of Electrical Engineering and Computer Science University of Ottawa Canada School of Electronics and Information Northwestern Polytechnical University Xian China
Multi-user Gaussian MIMO wiretap channel is considered under interference power constraints (IPC), in addition to the total transmit power constraint (TPC). Algorithms for global maximization of its secrecy rate are p... 详细信息
来源: 评论
Blockchain-Based Secure Authentication Scheme for Medical Data Sharing
Blockchain-Based Secure Authentication Scheme for Medical Da...
收藏 引用
2019国际计算机前沿大会
作者: Xu Cheng Fulong Chen Dong Xie Hui Sun Cheng Huang Zhuyun Qi School of Computer and Information Anhui Normal University Anhui Provincial Key Lab of Network and Information Security School of Electronic and Computer Engineering Peking University
Data security is vital for medical cyber physical system(MCPS).The decentralization feature of blockchain is helpful to solve the problem that the secure authentication process is highly dependent on the trusted third...
来源: 评论
Bipartite graph embedding via mutual information maximization
arXiv
收藏 引用
arXiv 2020年
作者: Cao, Jiangxia Lin, Xixun Liu, Luchen Liu, Tingwen Guo, Shu Wang, Bin Institute of Information Engineering Chinese Academy of Sciences & School of Cyber Security University of Chinese Academy of Sciences China National Computer Network Emergency Response Technical Team Coordination Center of China China Xiaomi AI Lab Xiaomi Inc China
Bipartite graph embedding has recently attracted much attention due to the fact that bipartite graphs are widely used in various application domains. Most previous methods, which adopt random walk-based or reconstruct... 详细信息
来源: 评论