咨询与建议

限定检索结果

文献类型

  • 588 篇 会议
  • 412 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,001 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 641 篇 工学
    • 486 篇 计算机科学与技术...
    • 396 篇 软件工程
    • 160 篇 信息与通信工程
    • 125 篇 电气工程
    • 61 篇 网络空间安全
    • 59 篇 电子科学与技术(可...
    • 55 篇 控制科学与工程
    • 52 篇 生物工程
    • 29 篇 安全科学与工程
    • 28 篇 生物医学工程(可授...
    • 26 篇 机械工程
    • 23 篇 仪器科学与技术
    • 22 篇 光学工程
    • 18 篇 交通运输工程
    • 16 篇 动力工程及工程热...
    • 16 篇 建筑学
    • 16 篇 化学工程与技术
  • 275 篇 理学
    • 168 篇 数学
    • 55 篇 生物学
    • 49 篇 物理学
    • 49 篇 统计学(可授理学、...
    • 28 篇 系统科学
    • 16 篇 化学
  • 162 篇 管理学
    • 92 篇 管理科学与工程(可...
    • 76 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 40 篇 法学
    • 24 篇 法学
    • 17 篇 社会学
  • 21 篇 医学
    • 18 篇 临床医学
    • 16 篇 基础医学(可授医学...
  • 15 篇 经济学
  • 14 篇 军事学
  • 6 篇 农学
  • 3 篇 教育学
  • 3 篇 文学

主题

  • 39 篇 feature extracti...
  • 35 篇 semantics
  • 34 篇 cryptography
  • 28 篇 protocols
  • 27 篇 computational mo...
  • 27 篇 security
  • 27 篇 accuracy
  • 26 篇 cloud computing
  • 25 篇 privacy
  • 24 篇 authentication
  • 20 篇 deep learning
  • 20 篇 network security
  • 19 篇 encryption
  • 19 篇 computer network...
  • 18 篇 training
  • 17 篇 data privacy
  • 17 篇 data models
  • 16 篇 neural networks
  • 15 篇 servers
  • 15 篇 federated learni...

机构

  • 67 篇 key laboratory o...
  • 65 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 shaanxi key labo...
  • 37 篇 school of comput...
  • 31 篇 school of cyber ...
  • 30 篇 shaanxi key labo...
  • 29 篇 institute of inf...
  • 22 篇 state key labora...
  • 18 篇 national enginee...
  • 18 篇 shandong fundame...
  • 15 篇 school of comput...
  • 15 篇 college of compu...
  • 15 篇 school of comput...
  • 13 篇 key laboratory o...
  • 13 篇 national compute...
  • 12 篇 shaanxi key labo...
  • 12 篇 national compute...
  • 11 篇 shandong enginee...

作者

  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 19 篇 baojiang cui
  • 18 篇 hei xinhong
  • 13 篇 li wei
  • 12 篇 jianfeng ma
  • 12 篇 xu li
  • 12 篇 yang xiaoyuan
  • 11 篇 jing zhao
  • 11 篇 fu chong
  • 11 篇 wei wei
  • 10 篇 zhang yuqing
  • 10 篇 chen zhong
  • 10 篇 liu jun
  • 10 篇 xiaoxue liu
  • 10 篇 li qi
  • 10 篇 lei zhu
  • 9 篇 wang lei
  • 9 篇 ma jianfeng

语言

  • 902 篇 英文
  • 71 篇 其他
  • 30 篇 中文
检索条件"机构=Network Security Laboratory Computer Engineering"
1001 条 记 录,以下是441-450 订阅
排序:
Blockchain-Based Identity Authentication Oriented to Multi-Cluster UAV networking
arXiv
收藏 引用
arXiv 2023年
作者: Dong, Zesong Tong, Wei Zhang, Zhiwei Li, Jian Yang, Weidong Shen, Yulong The Hangzhou Institute of Technology Xidian University Hangzhou China The School of Computer Science and Technology Xidian University Xi’an China The Engineering Research Center of Blockchain Technology Application and Evaluation Ministry of Education Xi’an China Shaanxi Key Laboratory of Network and System Security Xi’an China
Unmanned Aerial Vehicle (UAV) networking is increasingly used in field environments such as power inspection, agricultural plant protection, and emergency rescue. To guarantee UAV networking security, UAV identity aut... 详细信息
来源: 评论
Advancing cancer diagnosis and prognostication through deep learning mastery in breast, colon, and lung histopathology with ResoMergeNet
收藏 引用
computers in Biology and Medicine 2025年 185卷 109494-109494页
作者: Ejiyi, Chukwuebuka Joseph Qin, Zhen Agbesi, Victor K. Yi, Ding Atwereboannah, Abena A. Chikwendu, Ijeoma A. Bamisile, Oluwatoyosi F. Bakanina Kissanga, Grace-Mercure Bamisile, Olusola O. College of Nuclear Technology and Automation Engineering & Sichuan Industrial Internet Intelligent Monitoring and Application Engineering Research Center Chengdu University of Technology Sichuan Chengdu China Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Sichuan Chengdu China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu China School of Life Science University of Electronic Science and Technology of China Chengdu China
Cancer, a global health threat, demands effective diagnostic solutions to combat its impact on public health, particularly for breast, colon, and lung cancers. Early and accurate diagnosis is essential for successful ... 详细信息
来源: 评论
An Attribute-attack-proof Watermarking Technique for Relational Database
An Attribute-attack-proof Watermarking Technique for Relatio...
收藏 引用
IEEE International Conference on Trust, security and Privacy in Computing and Communications (TrustCom)
作者: Shuguang Yuan Chi Chen Ke Yang Tengfei Yang Jing Yu State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China National Computer Network Emergency Response Technical Team/Coordination Center of China
Proving ownership rights on relational databases is an important issue. The robust watermarking technique could claim ownership by insertion information about the data owner. Hence, it is vital to improving the robust... 详细信息
来源: 评论
Chinese named entity recognition method for the field of network security based on RoBERTa
Chinese named entity recognition method for the field of net...
收藏 引用
2021 International Conference on networking and network Applications, NaNA 2021
作者: Zhu, Xiaoyan Zhang, Yu Zhu, Lei Hei, Xinhong Wang, Yichuan Hu, Feixiong Yao, Yanni Xi'an Jiaotong University School of Computer Science and Engineering Xi'an710049 China School of Computer Science and Technology Xi'an University of technology Shaanxi Xi'an710048 China Shaanxi Key Laboratory for Network Computing and Security Technology Shaanxi Xi'an710048 China Shenzhen Tencent Computer System Co. Ltd Shenzhen518054 China
As the mobile Internet is developing rapidly, people who use cell phones to access the Internet dominate, and the mobile Internet has changed the development environment of online public opinion and made online public... 详细信息
来源: 评论
Efficient Batch Verification and Privacy-Preserving Data Aggregation Scheme in V2G networks
收藏 引用
IEEE Transactions on Vehicular Technology 2025年
作者: Wang, Congcong Wang, Chen Shen, Jian Vasilakos, Athanasios V. Wang, Bin Wang, Weizheng Department of Software Engineering Nanjing University of Information Science and Technology Nanjing210044 China the Zhejiang Key Laboratory of Digital Fashion and Data Governance the Zhejiang Provincial International Cooperation Base for Science and Technology on Cloud Computing Security and Data Aggregation Zhejiang Sci-Tech University Hangzhou310018 China Zhejiang Provincial Innovation Center of Advanced Textile Technology Shaoxing312000 China College of Computer Science and Information Technology IAU Saudi Arabia Grimstad4879 Norway Network and Data Security Hangzhou310053 China Computer Science Department City University of Hong Kong Hong Kong the Division of Computer Science University of Aizu Fukushima965–8580 Japan
In recent years, against the backdrop of smart grids, vehicle-to-grid (V2G) interaction has become a hot topic. With the increasing number of new energy vehicles, handling massive amounts of electricity transaction da... 详细信息
来源: 评论
A CPK-Based Identity Authentication Scheme for IoT
收藏 引用
computer Systems Science & engineering 2022年 第3期40卷 1217-1231页
作者: Mingming Zhang Jiaming Mao Yuanyuan Ma Liangjie Xu Chuanjun Wang Ran Zhao Zhihao Li Lu Chen Wenbing Zhao State Grid Jiangsu Electric Power Co. Ltd.Information&Telecommunication BranchNanjing210008China State Grid Key Laboratory of Information&Network Security Institute of Information and CommunicationGlobal Energy Interconnection Research InstituteNanjing210003China Anhui Jiyuan Software Co.Ltd SGITGHefei230088China Engineering Research Center of Post Big Data Technology and Application of Jiangsu Province Research and Development Center of Post Industry Technology of the State Posts Bureau(Internet of Things Technology)Engineering Research Center of Broadband Wireless Communication Technology of the Ministry of EducationNanjing University of Posts and TelecommunicationsNanjing210003China Department of Electrical Engineering and Computer Science Cleveland State UniversityCleveland44115USA
As the power Internet of Things(IoT)enters the security construction stage,the massive use of perception layer devices urgently requires an identity authentication scheme that considers both security and *** existing ... 详细信息
来源: 评论
Intelligent recommendation of related items based on naive bayes and collaborative filtering combination model
Intelligent recommendation of related items based on naive b...
收藏 引用
2020 International Conference on Machine Learning and computer Application, ICMLCA 2020
作者: Wei, Wei Wang, Zhuo Fu, Changlong Damaševičius, Robertas Scherer, Rafal Wožniak, Marcin School of Computer Science and Engineering Xi'An University of Technology Xi'an710048 China Shaanxi Key Laboratory for Network Computing and Security Technology China
Nowadays, data plays a unique role in various fields. Based on the background of the era of big data, this paper collects user evaluations of certain commodities and labels the evaluations into positive emotions and n... 详细信息
来源: 评论
A novel image security protection method based on DCT compression theory and hyper-chaotic mapping
A novel image security protection method based on DCT compre...
收藏 引用
2021 International Conference on Information Technology and Mechanical engineering, ITME 2021
作者: Xue, Xianglian Jin, Haiyan School of Computer Science and Engineering Xi’an University of Technology Shaanxi Xi’an710077 China Shaanxi University of Chinese Medicine Shaanxi Xianyang712046 China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an University of Technology Shaanxi Xi’an710077 China
This paper studies the current situation of image compression encryption and analyzes the influence of low frequency (DC coefficient) and high frequency (AC coefficient) on image structure in DCT transformation. Based... 详细信息
来源: 评论
A Resilient Decentralized Learning Approach against Byzantine Attack via Reputation Evaluation
A Resilient Decentralized Learning Approach against Byzantin...
收藏 引用
Youth Academic Annual Conference of Chinese Association of Automation (YAC)
作者: Heng Zhang Wenting Wang Xuguo Jiao Ming Yang Xiaoming Wu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan P. R. China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan P. R. China College of Control Science and Engineering Zhejiang University Hangzhou China State Grid Shandong Electric Power Research Institute Jinan China School of Information and Control Engineering Qingdao University of Technology Qingdao China
Machine learning is a key component of many applications, among which decentralized learning has attracted wide attention because of its cost-effectiveness and high efficiency. However, decentralized learning is vulne... 详细信息
来源: 评论
Ponzi Scheme Detection in Smart Contracts Using Heterogeneous Semantic Graph  6th
Ponzi Scheme Detection in Smart Contracts Using Heterogeneo...
收藏 引用
6th International Conference on Blockchain and Trustworthy Systems, BlockSys 2024
作者: Chen, Wei Jiang, Xinjun Lan, Tian Liu, Leyuan Li, Chengyu Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Chengdu610000 China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu610000 China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu610000 China Shenzhen Institute for Advanced Study University of Electronic Science and Technology of China Shenzhen518000 China
Behind the booming decentralized finance (DeFi) ecosystem driven by blockchain technology, various financial risks lurking, including money laundering, gambling, Ponzi schemes, and phishing. Due to the decentralizatio... 详细信息
来源: 评论