咨询与建议

限定检索结果

文献类型

  • 154 篇 会议
  • 113 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 268 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 193 篇 工学
    • 153 篇 计算机科学与技术...
    • 128 篇 软件工程
    • 43 篇 信息与通信工程
    • 24 篇 控制科学与工程
    • 21 篇 网络空间安全
    • 19 篇 电气工程
    • 16 篇 电子科学与技术(可...
    • 12 篇 生物工程
    • 11 篇 机械工程
    • 9 篇 生物医学工程(可授...
    • 6 篇 交通运输工程
    • 5 篇 仪器科学与技术
    • 4 篇 光学工程
    • 4 篇 化学工程与技术
    • 4 篇 安全科学与工程
  • 85 篇 理学
    • 55 篇 数学
    • 15 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 13 篇 生物学
    • 10 篇 系统科学
    • 5 篇 化学
  • 45 篇 管理学
    • 28 篇 管理科学与工程(可...
    • 18 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 10 篇 法学
    • 6 篇 社会学
    • 4 篇 法学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 8 篇 医学
    • 7 篇 临床医学
    • 6 篇 基础医学(可授医学...
    • 5 篇 药学(可授医学、理...
  • 4 篇 军事学
  • 2 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 17 篇 authentication
  • 12 篇 cryptography
  • 8 篇 deep learning
  • 8 篇 security
  • 8 篇 cloud computing
  • 6 篇 protocols
  • 6 篇 training
  • 5 篇 feature extracti...
  • 5 篇 malware
  • 4 篇 internet of thin...
  • 4 篇 access control
  • 4 篇 reinforcement le...
  • 4 篇 optimization
  • 4 篇 servers
  • 4 篇 internet
  • 4 篇 computers
  • 4 篇 semantics
  • 4 篇 blockchain
  • 4 篇 peer to peer net...
  • 4 篇 trusted computin...

机构

  • 21 篇 key lab of infor...
  • 7 篇 key lab of netwo...
  • 6 篇 guangxi key labo...
  • 6 篇 national compute...
  • 5 篇 network informat...
  • 5 篇 computer departm...
  • 5 篇 institute of inf...
  • 5 篇 key lab. of comp...
  • 4 篇 ministry of edu....
  • 4 篇 key lab. of comp...
  • 4 篇 hebei provincial...
  • 4 篇 key lab of netwo...
  • 4 篇 college of compu...
  • 4 篇 college of mathe...
  • 4 篇 national languag...
  • 4 篇 national compute...
  • 4 篇 school of cyber ...
  • 4 篇 hubei provincial...
  • 4 篇 school of comput...
  • 4 篇 key laboratory o...

作者

  • 9 篇 meng deyu
  • 9 篇 tan zuowen
  • 9 篇 li hui
  • 7 篇 cao xiangyong
  • 6 篇 lopez javier
  • 5 篇 zhang yuqing
  • 5 篇 wang fangwei
  • 5 篇 javier lopez
  • 5 篇 feng yu
  • 5 篇 sun jin
  • 4 篇 fan kai
  • 4 篇 yong-zhen li
  • 4 篇 weizhong zhao
  • 4 篇 yong zhao
  • 4 篇 ma wenping
  • 4 篇 tingting he
  • 4 篇 wang yue
  • 4 篇 hu yupu
  • 4 篇 xingpeng jiang
  • 4 篇 hu yu-pu

语言

  • 247 篇 英文
  • 15 篇 中文
  • 6 篇 其他
检索条件"机构=Network Information and Computer Security Lab"
268 条 记 录,以下是1-10 订阅
排序:
CYBERSHIELD: A Competitive Simulation Environment for Training AI in Cybersecurity  11
CYBERSHIELD: A Competitive Simulation Environment for Traini...
收藏 引用
11th International Conference on Internet of Things: Systems, Management and security, IOTSMS 2024
作者: Carrasco, José Álvaro Fernández Pagola, Iñigo Amonarriz Urrutia, Raúl Orduna Román, Rodrigo San Sebastian Donostia20009 Spain University of Malaga Network Information and Computer Security Lab Malaga29071 Spain
Simulation environments are crucial in cybersecurity for training AI algorithms, providing a secure and controlled space to explore the impact derived from diverse cyber threads. They offer a flexible platform for acc... 详细信息
来源: 评论
Enhancing TrUStAPIS Methodology in the Web of Things with LLM-Generated IoT Trust Semantics  26th
Enhancing TrUStAPIS Methodology in the Web of Things with LL...
收藏 引用
26th International Conference on information and Communications security, ICICS 2024
作者: Ferraris, Davide Kotis, Konstantinos Kalloniatis, Christos Network Information and Computer Security Lab University of Malaga Malaga Spain Department of Cultural Technology and Communication University of the Aegean Mytilene Greece
In the Internet of Things (IoT) there are ecosystems where their physical’smart’ entities virtually interact with each other. Often, this interaction occurs among unknown entities, making trust an essential requirem... 详细信息
来源: 评论
New results on quantum boomerang attacks
收藏 引用
Quantum information Processing 2023年 第4期22卷 1-27页
作者: Zou, Hongkai Zou, Jian Luo, Yiyuan College of Computer and Data Science Fuzhou University Fuzhou China Key Lab of Information Security of Network Systems Fuzhou University Fuzhou China School of Information Sciences and Technology Huizhou University Huizhou China
At SAC 2021, Frixons et al. proposed quantum boomerang attacks that can effectively recover the keys of block ciphers in the quantum setting. Based on their work, we further consider how to quantize the generic boomer... 详细信息
来源: 评论
Integration of MPC into Besu through an extended private transaction model
Integration of MPC into Besu through an extended private tra...
收藏 引用
2023 IEEE International Conference on Metaverse Computing, networking and Applications, MetaCom 2023
作者: Morales, Daniel Agudo, Isaac Lopez, Javier Itis Software Universidad de Málaga Network Information and Computer Security Lab Department of Computer Science Málaga Spain
In the last few years we have seen many different approaches to incorporate privacy features to blockchains. In the area of cryptocurrencies that would normally mean protecting the identity of the owner of some funds,... 详细信息
来源: 评论
Toward data privacy preservation with ciphertext update and key rotation for IoT
Toward data privacy preservation with ciphertext update and ...
收藏 引用
作者: Shen, Shuaiyong Yang, Yang Liu, Ximeng College of Mathematics and Computer Science Key Lab of Information Security of Network Systems Fuzhou University Fujian Fuzhou China
Fine-grained access control become a research spotlight in the scenario of the smart home with Internet-of-Things (IoTs). However, most of the existing works could only realize ciphertext outsourcing with an unchangea... 详细信息
来源: 评论
STGAT: A Spatio-Temporal Graph Attention network for Travel Demand Prediction
STGAT: A Spatio-Temporal Graph Attention Network for Travel ...
收藏 引用
2023 International Conference on networking and network Applications, NaNA 2023
作者: Zhang, Tao Yi Wang, YuBo Wei, ZhiCheng Key Lab of Network and Information Security China College of Computer and Cyberspace Security China Hebei Provincial Engineering Research Center for Supply Chain Big Data Analytics & Security Hebei Normal University Hebei Province Shijiazhuang China
Forecasting travel demand is a challenging task due to the complex spatial dependencies and dynamic temporal correlation of the traffic data. Furthermore, a limited representation of the given spatial graph structure ... 详细信息
来源: 评论
A Caching Strategy Based on Many-to-Many Matching Game in D2D networks
收藏 引用
Tsinghua Science and Technology 2021年 第6期26卷 857-868页
作者: Kaihang Yu Zhonggui Ma Runyu Ni Tao Zhang School of Computer and Communication Engineering University of Science and Technology BeijingBeijing 100083China Key Lab of Information Network Security Ministry of Public SecurityShanghai 201204China
Wireless edge caching has been proposed to reduce data traffic congestion in backhaul links, and it is being envisioned as one of the key components of next-generation wireless networks. This paper focuses on the infl... 详细信息
来源: 评论
A study on the Application of Multilevel Secure Hash Function in Blockchain  2
A study on the Application of Multilevel Secure Hash Functio...
收藏 引用
2022 2nd Conference on High Performance Computing and Communication Engineering, HPCCE 2022
作者: Jin, Shi-Mei Wang, Yi-Han Li, Yongzhen Yanbian University Information Technology Education Yanji133000 China Yanbian University Network Communication and Information Security Lab. Dept. of Computer Science and Technology Yanji133000 China
With the rapid development and upgrade of the social network and IT, information security has become increasingly significant. Hash function has become a research key-point in the field of information security. To mee... 详细信息
来源: 评论
network Intrusion Detection in Internet of Blended Environment Using Ensemble of Heterogeneous Autoencoders(E-HAE)
收藏 引用
computer Systems Science & Engineering 2023年 第9期46卷 3261-3284页
作者: Lelisa Adeba Jilcha Deuk-Hun Kim Julian Jang-Jaccard Jin Kwak ISAA Lab. Department of AI Convergence NetworkAjou UniversitySuwon16499Korea ISAA Lab. Institute for Information and CommunicationAjou UniversitySuwon16499Korea Department of Computer Science and Information Technology Massey UniversityAuckland0745New Zealand Department of Cyber Security Ajou UniversitySuwon16499Korea
Contemporary attackers,mainly motivated by financial gain,consistently devise sophisticated penetration techniques to access important information or *** growing use of Internet of Things(IoT)technology in the contemp... 详细信息
来源: 评论
Secure fusion of encrypted remote sensing images based on Brovey
收藏 引用
Science China(information Sciences) 2021年 第2期64卷 243-245页
作者: Junzhi YANG Guohua CHENG Meng SHEN School of Information and Electronics Beijing Institute of Technology School of Computer Science Beijing Institute of Technology Key Lab of Information Network Security of Ministry of Public Security (The Third Research Institute of Ministry of Public Security)
Dear editor,In the field of image fusion, panchromatic images captured by the Satellite Pour l'Observation de la Terre(SPOT) [1]have high spatial resolutions, whereas their spectral resolutions are relatively low.... 详细信息
来源: 评论