咨询与建议

限定检索结果

文献类型

  • 892 篇 会议
  • 503 篇 期刊文献

馆藏范围

  • 1,395 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 859 篇 工学
    • 649 篇 计算机科学与技术...
    • 511 篇 软件工程
    • 233 篇 信息与通信工程
    • 143 篇 电气工程
    • 91 篇 控制科学与工程
    • 88 篇 网络空间安全
    • 80 篇 电子科学与技术(可...
    • 68 篇 生物工程
    • 39 篇 机械工程
    • 34 篇 安全科学与工程
    • 29 篇 交通运输工程
    • 26 篇 生物医学工程(可授...
    • 24 篇 光学工程
    • 22 篇 仪器科学与技术
    • 15 篇 动力工程及工程热...
    • 15 篇 建筑学
  • 352 篇 理学
    • 226 篇 数学
    • 71 篇 生物学
    • 64 篇 物理学
    • 64 篇 统计学(可授理学、...
    • 36 篇 系统科学
    • 16 篇 化学
  • 230 篇 管理学
    • 145 篇 管理科学与工程(可...
    • 102 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 48 篇 法学
    • 29 篇 法学
    • 20 篇 社会学
  • 22 篇 医学
    • 20 篇 临床医学
    • 18 篇 基础医学(可授医学...
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 15 篇 军事学
  • 5 篇 农学
  • 2 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 86 篇 feature extracti...
  • 72 篇 accuracy
  • 59 篇 semantics
  • 51 篇 computational mo...
  • 46 篇 federated learni...
  • 44 篇 cryptography
  • 42 篇 information secu...
  • 41 篇 data models
  • 39 篇 training
  • 36 篇 authentication
  • 33 篇 deep learning
  • 33 篇 privacy
  • 32 篇 protocols
  • 30 篇 neural networks
  • 27 篇 laboratories
  • 27 篇 security
  • 24 篇 transformers
  • 24 篇 data mining
  • 23 篇 object detection
  • 23 篇 visualization

机构

  • 223 篇 key laboratory o...
  • 200 篇 shandong provinc...
  • 50 篇 shandong fundame...
  • 48 篇 information secu...
  • 45 篇 shandong enginee...
  • 39 篇 key laboratory o...
  • 39 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 28 篇 school of comput...
  • 26 篇 college of compu...
  • 22 篇 shandong provinc...
  • 22 篇 shandong fundame...
  • 22 篇 state key labora...
  • 20 篇 key laboratory o...
  • 18 篇 key laboratory o...
  • 18 篇 national enginee...
  • 18 篇 school of cyber ...
  • 18 篇 college of compu...
  • 16 篇 institute of inf...
  • 16 篇 quan cheng labor...

作者

  • 31 篇 yang yixian
  • 30 篇 yixian yang
  • 20 篇 xiaoming wu
  • 19 篇 liu ximeng
  • 16 篇 di xiaoqiang
  • 15 篇 xiangzhi liu
  • 15 篇 jianfeng ma
  • 13 篇 geng xin
  • 13 篇 wu xiaoming
  • 13 篇 guohua lv
  • 13 篇 yang xiaoyuan
  • 12 篇 ma jianfeng
  • 12 篇 wei zhang
  • 11 篇 zhang yuqing
  • 11 篇 lu wenpeng
  • 11 篇 xiaoqiang di
  • 11 篇 xin yang
  • 11 篇 jing zhao
  • 11 篇 xiaohui han
  • 11 篇 mingle zhou

语言

  • 1,289 篇 英文
  • 62 篇 其他
  • 48 篇 中文
检索条件"机构=MOE Key Laboratory of Computer Network and Information Security"
1395 条 记 录,以下是1-10 订阅
排序:
Blockchain and signcryption enabled asynchronous federated learning framework in fog computing
收藏 引用
Digital Communications and networks 2025年 第2期11卷 442-454页
作者: Zhou Zhou Youliang Tian Jinbo Xiong Changgen Peng Jing Li Nan Yang State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang 550025China Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber SecurityFujian Normal UniversityFuzhou 350117China Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic TechnologyGuilin 541004China
Federated learning combines with fog computing to transform data sharing into model sharing,which solves the issues of data isolation and privacy disclosure in fog ***,existing studies focus on centralized single-laye... 详细信息
来源: 评论
A new quantum key distribution resource allocation and routing optimization scheme
收藏 引用
Chinese Physics B 2024年 第3期33卷 244-259页
作者: 毕琳 袁晓同 吴炜杰 林升熙 School of Computer Science and Technology Changchun University of Science and TechnologyChangchun 130012China Key Laboratory of Network and Information Security in Jilin Province Changchun 130012China
Quantum key distribution(QKD)is a technology that can resist the threat of quantum computers to existing conventional cryptographic ***,due to the stringent requirements of the quantum key generation environment,the g... 详细信息
来源: 评论
Weighted Attribute Based Conditional Proxy Re-Encryption in the Cloud
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 1399-1414页
作者: Xixi Yan Jing Zhang Pengyu Cheng Henan Key Laboratory of Network Cryptography Technology Network Information Security and Cryptography LaboratorySchool of SoftwareHenan Polytechnic UniversityJiaozuo454003China School of Computer Science and Technology Henan Polytechnic UniversityJiaozuo454000China
Conditional proxy re-encryption(CPRE)is an effective cryptographic primitive language that enhances the access control mechanism and makes the delegation of decryption permissions more granular,but most of the attribu... 详细信息
来源: 评论
Fusion of Time-Frequency Features in Contrastive Learning for Shipboard Wind Speed Correction
收藏 引用
Journal of Ocean University of China 2025年 第2期24卷 377-386页
作者: SONG Jian HUANG Meng LI Xiang ZHANG Zhenqiang WANG Chunxiao ZHAO Zhigang Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science Center(National Supercomputer Center in Jinan)Qilu University of Technology(Shandong Academy of Sciences)Jinan 250000China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer ScienceJinan 250000China
Accurate wind speed measurements on maritime vessels are crucial for weather forecasting,sea state prediction,and safe ***,vessel motion and challenging environmental conditions often affect measurement *** address th... 详细信息
来源: 评论
Near-Lossless Compression of Two Independent Binary Sources with One Encoder  16
Near-Lossless Compression of Two Independent Binary Sources ...
收藏 引用
16th International Conference on Wireless Communications and Signal Processing, WCSP 2024
作者: Zhu, Tingting Ma, Xiao Sun Yat-sen University School of Computer Science and Engineering MoE Key Laboratory of Information Technology Guangdong Key Laboratory of Information Security Technology Guangzhou China
In this paper, we consider the near-lossless compression of two distinct but independent binary random sources U and V, both of which are asymmetrical independent and identically distributed (i.i.d.) sources. In parti... 详细信息
来源: 评论
Malicious Client Detection with Differential Privacy Constraints Based on Model Update Slicing and K-Means Clustering  6
Malicious Client Detection with Differential Privacy Constra...
收藏 引用
6th International Conference on Frontier Technologies of information and computer, ICFTIC 2024
作者: Qi, Mengshi Wang, Xin He, Yunpeng Yang, Ming Wu, Xiaoming Key Laboratory of Computing Power Network and Information Security Jinan250014 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250014 China
Federated learning (FL) is a decentralized machine learning technique that protects data privacy by trainng models locally on devices and sharing only model updates instead of raw data. However, FL also faces multiple... 详细信息
来源: 评论
Privacy Preserving Demand Side Management Method via Multi-Agent Reinforcement Learning
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2023年 第10期10卷 1984-1999页
作者: Feiye Zhang Qingyu Yang Dou An Faculty of Electronic and Information Engineering Xi’an Jiaotong UniversityXi’an 710049China Key Laboratory for Manufacturing Systems Engineering(SKLMSE) Xi’an Jiaotong UniversityXi’an 710049 MOE Key Laboratory for Intelligent Networks and Network Security Xi’an Jiaotong UniversityXi’an 710049China
The smart grid utilizes the demand side management technology to motivate energy users towards cutting demand during peak power consumption periods, which greatly improves the operation efficiency of the power grid. H... 详细信息
来源: 评论
High-Capacity Image Hiding via Compressible Invertible Neural network  24th
High-Capacity Image Hiding via Compressible Invertible Neur...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Wang, Changguang Shi, Haoyi Li, Qingru Zhao, Dongmei Wang, Fangwei College of Computer and Cyber Security Hebei Normal University Shijiazhuang050024 China Hebei Key Laboratory of Network and Information Security Shijiazhuang050024 China
Image steganography involves the concealment of confidential information within images, rendering it undetectable to unauthorized observers, and subsequently retrieving the hidden information following secure transmis... 详细信息
来源: 评论
Cross-chain Transaction Tracking Protocol based on Multi-dimensional Digital Watermarking Fingerprints  6
Cross-chain Transaction Tracking Protocol based on Multi-dim...
收藏 引用
6th International Conference on Frontier Technologies of information and computer, ICFTIC 2024
作者: Li, Duanzhen Xu, Shujiang He, Haochen Xue, Hongrui Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan250014 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250014 China
Cross-chain technology plays a critical role in the process of interconnecting blockchains. However, all attention has been focused on how to achieve efficient cross-chain interoperability protocols, thus neglecting t... 详细信息
来源: 评论
The Study of Multi-type Computing Power Trading Mechanism in Computing Power network Based on Blockchain and Combinatorial Double Auction  24
The Study of Multi-type Computing Power Trading Mechanism in...
收藏 引用
4th International Conference on Artificial Intelligence, Big Data and Algorithms, CAIBDA 2024
作者: Zhao, Yue Wang, Jizhi Kong, Lingrui Sui, Tongtong Shandong Computer Science Center National Supercomputer Center in Jinan Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Provincial Key Laboratory of Industrial Network and Information System Security Qilu University of Technology Shandong Academy of Sciences Jinan Shandong China Quancheng Laboratory Jinan Key Laboratory of Digital Security Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan Shandong China
The advancement of 5G and mobile internet technologies has propelled the development of emerging businesses and applications, demanding higher requirements for network bandwidth and computational resources. To address... 详细信息
来源: 评论