咨询与建议

限定检索结果

文献类型

  • 2,390 篇 会议
  • 1,185 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 3,583 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,196 篇 工学
    • 1,601 篇 计算机科学与技术...
    • 1,298 篇 软件工程
    • 645 篇 信息与通信工程
    • 316 篇 电气工程
    • 273 篇 控制科学与工程
    • 271 篇 电子科学与技术(可...
    • 185 篇 网络空间安全
    • 165 篇 生物工程
    • 129 篇 机械工程
    • 128 篇 仪器科学与技术
    • 118 篇 安全科学与工程
    • 89 篇 光学工程
    • 87 篇 动力工程及工程热...
    • 86 篇 交通运输工程
    • 74 篇 生物医学工程(可授...
    • 69 篇 化学工程与技术
    • 62 篇 建筑学
    • 53 篇 土木工程
  • 914 篇 理学
    • 532 篇 数学
    • 194 篇 物理学
    • 173 篇 生物学
    • 172 篇 统计学(可授理学、...
    • 106 篇 系统科学
    • 81 篇 化学
  • 522 篇 管理学
    • 339 篇 管理科学与工程(可...
    • 204 篇 图书情报与档案管...
    • 120 篇 工商管理
  • 110 篇 法学
    • 57 篇 法学
    • 53 篇 社会学
  • 72 篇 医学
    • 59 篇 临床医学
  • 52 篇 经济学
  • 44 篇 军事学
  • 23 篇 农学
  • 17 篇 教育学
  • 9 篇 文学
  • 2 篇 艺术学

主题

  • 134 篇 security
  • 122 篇 feature extracti...
  • 105 篇 authentication
  • 104 篇 cryptography
  • 100 篇 protocols
  • 79 篇 accuracy
  • 76 篇 privacy
  • 75 篇 information secu...
  • 70 篇 training
  • 69 篇 deep learning
  • 69 篇 semantics
  • 68 篇 computational mo...
  • 63 篇 network security
  • 63 篇 cloud computing
  • 55 篇 internet of thin...
  • 54 篇 wireless communi...
  • 51 篇 simulation
  • 49 篇 wireless sensor ...
  • 49 篇 robustness
  • 47 篇 machine learning

机构

  • 170 篇 school of cyber ...
  • 166 篇 institute of inf...
  • 133 篇 purple mountain ...
  • 112 篇 school of cyber ...
  • 82 篇 key laboratory o...
  • 78 篇 national compute...
  • 72 篇 national enginee...
  • 66 篇 shandong provinc...
  • 55 篇 national compute...
  • 51 篇 shandong enginee...
  • 48 篇 institute of net...
  • 45 篇 school of comput...
  • 40 篇 department of ne...
  • 38 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 35 篇 college of infor...
  • 35 篇 jiangsu province...
  • 34 篇 information secu...
  • 33 篇 southeast univer...
  • 31 篇 shaanxi key labo...

作者

  • 45 篇 yang xiaoyuan
  • 41 篇 xiaoyuan yang
  • 41 篇 wang hui-ming
  • 31 篇 guang cheng
  • 30 篇 xu an wang
  • 30 篇 poovendran radha
  • 30 篇 mohammad syuhaim...
  • 28 篇 yichuan wang
  • 27 篇 jia yu
  • 26 篇 xinhong hei
  • 26 篇 radha poovendran
  • 25 篇 yu jia
  • 25 篇 qingyun liu
  • 25 篇 kasmiran jumari
  • 24 篇 meng deyu
  • 24 篇 xiaofeng tao
  • 23 篇 zhang minqing
  • 23 篇 wang xu an
  • 22 篇 zhang yuqing
  • 22 篇 kong fanyu

语言

  • 3,057 篇 英文
  • 451 篇 其他
  • 85 篇 中文
检索条件"机构=Network Engineering and Security"
3583 条 记 录,以下是1-10 订阅
排序:
Machine learning approaches to intrusion detection in unmanned aerial vehicles (UAVs)
收藏 引用
Neural Computing and Applications 2024年 第29期36卷 18009-18041页
作者: AL-Syouf, Raghad A. Bani-Hani, Raed M. AL-Jarrah, Omar Y. Department of Network Engineering and Security Jordan University of Science and Technology Irbid Jordan
Unmanned Aerial Vehicles (UAVs) have been gaining popularity in various commercial, civilian, and military applications due to their efficiency and cost-effectiveness. However, the increasing demand for UAVs makes the... 详细信息
来源: 评论
DDoS Attack Autonomous Detection Model Based on Multi-Strategy Integrate Zebra Optimization Algorithm
收藏 引用
Computers, Materials & Continua 2025年 第1期82卷 645-674页
作者: Chunhui Li Xiaoying Wang Qingjie Zhang Jiaye Liang Aijing Zhang School of Information Engineering Institute of Disaster PreventionLangfang065201China Langfang Key Laboratory of Network Emergency Protection and Network Security Langfang065201China
Previous studies have shown that deep learning is very effective in detecting known ***,when facing unknown attacks,models such as Deep Neural networks(DNN)combined with Long Short-Term Memory(LSTM),Convolutional Neur... 详细信息
来源: 评论
High Capacity Reversible Data Hiding Algorithm in Encrypted Images Based on Image Adaptive MSB Prediction and Secret Sharing
收藏 引用
清华大学学报自然科学版(英文版) 2025年 第3期30卷 1139-1156页
作者: Kaili Qi Minqing Zhang Fuqiang Di Chao Jiang Key Laboratory of Network & Information Security under PAP Engineering University of PAPXi'an 710086China
Until now,some reversible data hiding in encrypted images(RDH-EI)schemes based on secret sharing(SIS-RDHEI)still have the problems of not realizing diffusivity and high embedding ***,this paper innovatively proposes a... 详细信息
来源: 评论
MarkNeRF:Watermarking for Neural Radiance Field
收藏 引用
Computers, Materials & Continua 2024年 第7期80卷 1235-1250页
作者: Lifeng Chen Jia Liu Wenquan Sun Weina Dong Xiaozhong Pan Cryptographic Engineering Department Institute of Cryptographic EngineeringEngineering University of PAPXi’an710086China Key Laboratory of Network and Information Security of PAP Xi’an710086China
This paper presents a novel watermarking scheme designed to address the copyright protection challenges encountered with Neural radiation field(NeRF)*** employ an embedding network to integrate the watermark into the ... 详细信息
来源: 评论
Generic attacks on small-state stream cipher constructions in the multi-user setting
收藏 引用
Cybersecurity 2024年 第3期7卷 69-79页
作者: Jianfu Huang Ye Luo Qinggan Fu Yincen Chen Chao Wang Ling Song College of Cyber Security Jinan UniversityGuangzhou 510632China National Joint Engineering Research Center of Network Security Detection and Protection Technology Jinan UniversityGuangzhou 510632China
Small-state stream ciphers(SSCs),which violate the principle that the state size should exceed the key size by a factor of two,still demonstrate robust security properties while maintaining a lightweight *** ciphers c... 详细信息
来源: 评论
Method and Practice of Trusted Embedded Computing and Data Transmission Protection Architecture Based on Android
收藏 引用
Chinese Journal of Electronics 2024年 第3期33卷 623-634页
作者: Yichuan WANG Wen GAO Xinhong HEI Yanning DU School of Computer Science and Engineering Xi'an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology
In recent years,the rapid development of Internet technology has constantly enriched people's daily life and gradually changed from the traditional computer terminal to the mobile *** with it comes the security pr... 详细信息
来源: 评论
TMC-GCN: Encrypted Traffic Mapping Classification Method Based on Graph Convolutional networks
收藏 引用
Computers, Materials & Continua 2025年 第2期82卷 3179-3201页
作者: Baoquan Liu Xi Chen Qingjun Yuan Degang Li Chunxiang Gu School of Cyberspace Security Zhengzhou UniversityZhengzhou450002China School of Cyberspace Security Information Engineering UniversityZhengzhou450001China Henan Key Laboratory of Network Cryptography Technology Zhengzhou450001China
With the emphasis on user privacy and communication security, encrypted traffic has increased dramatically, which brings great challenges to traffic classification. The classification method of encrypted traffic based... 详细信息
来源: 评论
F3l:an automated and secure function-level low-overhead labeled encrypted traffic dataset construction method for IM in Android
收藏 引用
Cybersecurity 2025年 第1期8卷 45-60页
作者: Keya Xu Guang Cheng School of Cyber Science and Engineering Southeast UniversityNanjingChina Jiangsu Province Engineering Research Center of Security for Ubiquitous Network NanjingChina Purple Mountain Laboratories NanjingChina
Fine-grained function-level encrypted traffic classification is an essential approach to maintaining network *** learning and deep learning have become mainstream methods to analyze traffic,and labeled dataset constru... 详细信息
来源: 评论
An Enhanced Clustering-Based (k, t)-Anonymity Algorithm for Graphs
收藏 引用
Chinese Journal of Electronics 2025年 第1期34卷 365-372页
作者: Yuanyuan Wang Xing Zhang Zhiguang Chu Wei Shi Xiang Li School of Electronics and Information Engineering Liaoning University of Technology Key Laboratory of Security for Network and Data in Industrial Internet of Liaoning Province Faculty of Information Technology Beijing University of Technology
As people become increasingly reliant on the Internet, securely storing and publishing private data has become an important issue. In real life, the release of graph data can lead to privacy breaches, which is a highl... 详细信息
来源: 评论
Multi-class Bitcoin mixing service identification based on graph classification
收藏 引用
Digital Communications and networks 2024年 第6期10卷 1881-1893页
作者: Xiaoyan Hu Meiqun Gui Guang Cheng Ruidong Li Hua Wu School of Cyber Science&Engineering Southeast UniversityNanjing 211189China Purple Mountain Laboratories for Network and Communication Security Nanjing 211111China Jiangsu Provincial Engineering Research Center of Security for Ubiquitous Network Nanjing 211189China Key Laboratory of Computer Network and Information Integration Southeast UniversityMinistry of EducationChina Research Base of International Cyberspace Governance Southeast UniversityNanjing 211189China Institute of Science and Engineering Kanazawa UniversityKakumaKanazawa920-1192Japan
Due to its anonymity and decentralization,Bitcoin has long been a haven for various illegal *** generally legalize illicit funds by Bitcoin mixing ***,it is critical to investigate the mixing services in cryptocurrenc... 详细信息
来源: 评论