咨询与建议

限定检索结果

文献类型

  • 163 篇 会议
  • 115 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 279 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 199 篇 工学
    • 151 篇 计算机科学与技术...
    • 126 篇 软件工程
    • 44 篇 信息与通信工程
    • 25 篇 控制科学与工程
    • 25 篇 网络空间安全
    • 19 篇 电气工程
    • 17 篇 电子科学与技术(可...
    • 12 篇 机械工程
    • 12 篇 生物工程
    • 9 篇 生物医学工程(可授...
    • 7 篇 仪器科学与技术
    • 6 篇 交通运输工程
    • 4 篇 光学工程
    • 4 篇 化学工程与技术
    • 4 篇 安全科学与工程
  • 85 篇 理学
    • 55 篇 数学
    • 15 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 13 篇 生物学
    • 10 篇 系统科学
    • 5 篇 化学
  • 44 篇 管理学
    • 29 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 9 篇 法学
    • 6 篇 社会学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 8 篇 医学
    • 7 篇 临床医学
    • 6 篇 基础医学(可授医学...
    • 5 篇 药学(可授医学、理...
  • 5 篇 军事学
    • 5 篇 军队指挥学
  • 2 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 17 篇 authentication
  • 12 篇 cryptography
  • 9 篇 security
  • 9 篇 cloud computing
  • 8 篇 deep learning
  • 7 篇 training
  • 6 篇 protocols
  • 5 篇 feature extracti...
  • 5 篇 malware
  • 5 篇 heuristic algori...
  • 4 篇 internet of thin...
  • 4 篇 access control
  • 4 篇 reinforcement le...
  • 4 篇 optimization
  • 4 篇 servers
  • 4 篇 internet
  • 4 篇 computers
  • 4 篇 semantics
  • 4 篇 blockchain
  • 4 篇 network security

机构

  • 21 篇 key lab of infor...
  • 7 篇 key lab of netwo...
  • 6 篇 guangxi key labo...
  • 6 篇 national compute...
  • 5 篇 network informat...
  • 5 篇 computer departm...
  • 5 篇 institute of inf...
  • 4 篇 ministry of edu....
  • 4 篇 key lab. of comp...
  • 4 篇 hebei provincial...
  • 4 篇 key lab of netwo...
  • 4 篇 college of compu...
  • 4 篇 school of inform...
  • 4 篇 college of mathe...
  • 4 篇 national languag...
  • 4 篇 national compute...
  • 4 篇 school of cyber ...
  • 4 篇 hubei provincial...
  • 4 篇 school of comput...
  • 4 篇 key laboratory o...

作者

  • 9 篇 meng deyu
  • 9 篇 tan zuowen
  • 9 篇 li hui
  • 7 篇 cao xiangyong
  • 6 篇 lopez javier
  • 5 篇 zhang yuqing
  • 5 篇 wang fangwei
  • 5 篇 javier lopez
  • 5 篇 feng yu
  • 5 篇 sun jin
  • 4 篇 fan kai
  • 4 篇 yong-zhen li
  • 4 篇 weizhong zhao
  • 4 篇 yong zhao
  • 4 篇 ma wenping
  • 4 篇 tingting he
  • 4 篇 wang yue
  • 4 篇 hu yupu
  • 4 篇 xingpeng jiang
  • 4 篇 hu yu-pu

语言

  • 247 篇 英文
  • 17 篇 其他
  • 15 篇 中文
检索条件"机构=Lab.of Computer Network and Information Security"
279 条 记 录,以下是61-70 订阅
排序:
TPM, a pattern for an architecture for trusted computing  20
TPM, a pattern for an architecture for trusted computing
收藏 引用
2020 European Conference on Pattern Languages of Programs, EuroPLoP 2020
作者: Muñoz, Antonio Fernandez, Eduardo B. Network Information and Computer Security Lab University of Malaga Malaga Spain Dept. of Computer and Electrical Eng. and Computer Science Florida Atlantic University Boca RatonFL United States
Trusted Computing (TC) is a valuable technology to use when we need to process highly sensitive data and several variants of it are now available. We present here a pattern that describes the architecture of a standar... 详细信息
来源: 评论
BEIR:A Blockchain-based Encrypted Image Retrieval Scheme
BEIR:A Blockchain-based Encrypted Image Retrieval Scheme
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Xianxian Li Jie Li Feng Yu Xuemei Fu JunHao Yang Yue Chen Guangxi Key Lab of Multi-source Information Mining & Security Guilin China Key Laboratory of Computer Network and Information Integration Southeast University Nanjing China
Encrypted image retrieval may return incorrect or incomplete results due to threats from malicious cloud servers. Most of the existing solutions focus on the efficiency and accuracy of retrieval, lack of verification ... 详细信息
来源: 评论
A Private Statistic Query Scheme for Encrypted Electronic Medical Record System *
A Private Statistic Query Scheme for Encrypted Electronic Me...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Xianxian Li Xuemei Fu Feng Yu Zhenkui Shi Jie Li Junhao Yang Guangxi Key Lab of Multi-source Information Mining & Security Guilin China Key Laboratory of Computer Network and Information Integration Southeast University Nanjing China
In this paper, we propose a scheme that supports statistic query and authorized access control on an Encrypted Electronic Medical Records Databases(EMDB). Different from other schemes, it is based on Differential-Priv... 详细信息
来源: 评论
Across-Platform Detection of Malicious Cryptocurrency Transactions via Account Interaction Learning
arXiv
收藏 引用
arXiv 2024年
作者: Che, Zheng Shen, Meng Tan, Zhehui Du, Hanbiao Zhu, Liehuang Wang, Wei Chen, Ting Zhao, Qinglin Xie, Yong The School of Computer Science Beijing Institute of Technology Beijing100081 China The School of Cyberspace Science and Technology Beijing Institute of Technology Beijing100081 China The Ministry of Education Key Lab for Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an710049 China The School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu611731 China The School of Computer Science and Engineering Macau University of Science and Technology China The School of Computer and Information Science Qinghai Institute of Technology Xining810016 China
With the rapid evolution of Web3.0, cryptocurrency has become a cornerstone of decentralized finance. While these digital assets enable efficient and borderless financial transactions, their pseudonymous nature has al... 详细信息
来源: 评论
Trajectory Privacy Protection with Pricing Awareness on Ride-on-Demand System
Trajectory Privacy Protection with Pricing Awareness on Ride...
收藏 引用
IEEE International Conference on Cyber security and Cloud Computing (CSCloud)
作者: Sihui Jia Saiqin Long Zhirun Zheng Qingyong Deng Ping Wang Shujuan Tian School of Computer Science and School of Cyberspace Science Hunan International Scientific and Technological Cooperation Base of Intelligent network Xiangtan University Xiangtan China School of Information Science and Technology Jinan University Guangzhou China School of Mathematics and Compulational Science Xiangtan University Xiangtan China Guangxi Key Lab of Multi-source Information Mining & Security Guangxi Normal University Guilin China
With the widespread use of the Ride-on Demand (RoD) system, many privacy issues have been exposed, and there is growing concern about whether private information will be leaked. For this problem, our previous work add...
来源: 评论
A Lightening Fine-grained Access Control Scheme Supporting Full Policy Hiding in Cloud Storage
A Lightening Fine-grained Access Control Scheme Supporting F...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Jiaoli Shi Chao Hu Shimao Yao Zhuolin Mei Bin Wu Hui Li School of Computer and Big Data Jiujiang Univ. Jiujiang China School of Software IoT Engineering Jiangxi Univ. of Finance and Economics Nanchang China Jiujiang Key Lab. of Network and Information Security Jiujiang China School of Computer and Big Data Jiujiang University Jiujiang China School of Elec. and Comp. Engineering Peking University Shenzhen China
Efficiency, security, and flexibility are difficult to balance in a full policy hiding CP-ABE scheme. This paper creatively converts the privacy matching problem of access policy and a user’s private key to the priva...
来源: 评论
FAST: a dual-tier few-shot learning paradigm for whole slide image classification  24
FAST: a dual-tier few-shot learning paradigm for whole slide...
收藏 引用
Proceedings of the 38th International Conference on Neural information Processing Systems
作者: Kexue Fu Xiaoyuan Luo Linhao Qu Shuo Wang Ying Xiong Ilias Maglogiannis Longxiang Gao Manning Wang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China and Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China Digital Medical Research Center School of Basic Medical Sciences Fudan University and Shanghai Key Lab of Medical Image Computing and Computer Assisted Intervention Fudan University University of Piraeus
The expensive fine-grained annotation and data scarcity have become the primary obstacles for the widespread adoption of deep learning-based Whole Slide Images (WSI) classification algorithms in clinical practice. Unl...
来源: 评论
HSIGene: A Foundation Model for Hyperspectral Image Generation
arXiv
收藏 引用
arXiv 2024年
作者: Pang, Li Cao, Xiangyong Tang, Datao Xu, Shuang Bai, Xueru Zhou, Feng Meng, Deyu The School of Computer Science and Technology The Ministry of Education Key Lab for Intelligent Networks and Network Security Xi’an Jiaotong University Shaanxi Xi’an710049 China The School of Mathematics and Statistics Northwestern Polytechnical University Shaanxi Xi’an710021 China The National Laboratory of Radar Signal Processing Xidian University Xi’an710071 China The Key Laboratory of Electronic Information Countermeasure and Simulation of the Education Ministry of China Xidian University Xi’an710071 China The School of Mathematics and Statistics The Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi’an Jiaotong University Shaanxi Xi’an710049 China Guangdong Guangzhou510555 China
Hyperspectral image (HSI) plays a vital role in various fields such as agriculture and environmental monitoring. However, due to the expensive acquisition cost, the number of hyperspectral images is limited, degenerat... 详细信息
来源: 评论
Semantic and Emotional Dual Channel for Emotion Recognition in Conversation
收藏 引用
IEEE Transactions on Affective Computing 2025年
作者: Yang, Zhenyu Zhang, Zhibo Cheng, Yuhu Zhang, Tong Wang, Xuesong Jinan250353 China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250353 China China University of Mining and Technology Engineering Research Center of Intelligent Control for Underground Space Ministry of Education Xuzhou Key Laboratory of Artificial Intelligence and Big Data School of Information and Control Engineering Xuzhou221116 China South China University of Technology Guangdong Provincial Key Laboratory of Computational Intelligence and Cyberspace Information School of Computer Science and Engineering Guangzhou510006 China Pazhou Lab Guangzhou510335 China Engineering Research Center Ministry of Education on Health Intelligent Perception and Paralleled Digital-Human Guangzhou China
Emotion recognition in conversation (ERC) aims at accurately identifying emotional states expressed in conversational content. Existing ERC methods, although relying on semantic understanding, often encounter challeng... 详细信息
来源: 评论
Fast Noise Removal in Hyperspectral Images via Representative Coefficient Total Variation
arXiv
收藏 引用
arXiv 2022年
作者: Peng, Jiangjun Wang, Hailin Cao, Xiangyong Liu, Xinlin Rui, Xiangyu Meng, Deyu School of Mathematics and Statistics Ministry of Education Key Lab of Intelligent Networks and Network Security Xi’an Jiaotong University Shaan’xi Xi'An710049 China School of Computer Science and Technology Ministry of Education Key Lab For Intelligent Networks and Network Security Xi’an Jiaotong University Xi'An710049 China The School of Mathematics and Statistics Southwest University Chongqing400715 China School of Mathematics and Information China West Normal University Nanchong637002 China
Mining structural priors in data is a widely recognized technique for hyperspectral image (HSI) denoising tasks, whose typical ways include model-based methods and data-based methods. The model-based methods have good... 详细信息
来源: 评论