咨询与建议

限定检索结果

文献类型

  • 606 篇 会议
  • 417 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,024 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 641 篇 工学
    • 488 篇 计算机科学与技术...
    • 395 篇 软件工程
    • 158 篇 信息与通信工程
    • 123 篇 电气工程
    • 61 篇 网络空间安全
    • 59 篇 电子科学与技术(可...
    • 56 篇 控制科学与工程
    • 52 篇 生物工程
    • 30 篇 安全科学与工程
    • 28 篇 生物医学工程(可授...
    • 26 篇 机械工程
    • 23 篇 仪器科学与技术
    • 22 篇 光学工程
    • 18 篇 交通运输工程
    • 17 篇 化学工程与技术
    • 16 篇 动力工程及工程热...
    • 16 篇 建筑学
  • 277 篇 理学
    • 170 篇 数学
    • 54 篇 生物学
    • 50 篇 统计学(可授理学、...
    • 49 篇 物理学
    • 29 篇 系统科学
    • 17 篇 化学
  • 163 篇 管理学
    • 93 篇 管理科学与工程(可...
    • 76 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 38 篇 法学
    • 22 篇 法学
    • 17 篇 社会学
  • 20 篇 医学
    • 18 篇 临床医学
  • 15 篇 经济学
    • 15 篇 应用经济学
  • 14 篇 军事学
  • 6 篇 农学
  • 3 篇 教育学
  • 3 篇 文学

主题

  • 42 篇 feature extracti...
  • 39 篇 semantics
  • 36 篇 accuracy
  • 35 篇 cryptography
  • 31 篇 computational mo...
  • 28 篇 security
  • 28 篇 protocols
  • 27 篇 cloud computing
  • 26 篇 federated learni...
  • 26 篇 privacy
  • 25 篇 authentication
  • 23 篇 training
  • 21 篇 network security
  • 20 篇 deep learning
  • 20 篇 encryption
  • 19 篇 data privacy
  • 19 篇 computer network...
  • 18 篇 servers
  • 18 篇 data models
  • 17 篇 neural networks

机构

  • 82 篇 key laboratory o...
  • 66 篇 shandong provinc...
  • 51 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 shaanxi key labo...
  • 37 篇 school of comput...
  • 33 篇 school of cyber ...
  • 31 篇 institute of inf...
  • 30 篇 shaanxi key labo...
  • 22 篇 state key labora...
  • 21 篇 shandong provinc...
  • 18 篇 college of compu...
  • 18 篇 national enginee...
  • 18 篇 shandong fundame...
  • 17 篇 school of comput...
  • 15 篇 school of comput...
  • 14 篇 national compute...
  • 13 篇 key laboratory o...
  • 13 篇 shaanxi key labo...
  • 13 篇 national compute...

作者

  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 19 篇 baojiang cui
  • 18 篇 hei xinhong
  • 13 篇 jianfeng ma
  • 13 篇 li wei
  • 12 篇 jing zhao
  • 12 篇 xu li
  • 12 篇 zhenyu yang
  • 12 篇 yang xiaoyuan
  • 11 篇 fu chong
  • 11 篇 lei zhu
  • 11 篇 wei wei
  • 10 篇 zhang yuqing
  • 10 篇 chen zhong
  • 10 篇 liu jun
  • 10 篇 xiaoxue liu
  • 10 篇 li qi
  • 9 篇 wang lei

语言

  • 878 篇 英文
  • 117 篇 其他
  • 33 篇 中文
检索条件"机构=Network Security Laboratory Computer Engineering"
1024 条 记 录,以下是551-560 订阅
排序:
A Novel eemd-based privacy preserving approach for top-k snps query in genome-wide association studies  6
A Novel eemd-based privacy preserving approach for top-k snp...
收藏 引用
6th IEEE International Conference on Control Science and Systems engineering, ICCSSE 2020
作者: Xiaoyun, He Hao, Guo Hongsong, Chen Global Energy Interconnection Research Institute Co Ltd State Grid Key Laboratory of Information Network Security Beijing China University of Science and Technology Beijing School of Computer Communication Engineering Beijing China
Genome-wide association studies (GWAS) have been a popular method for querying Top-k most significant sets of singe-nucleotide polymorphism locations (SNPs) to discover the genetic factors of diseases. Doctors have be... 详细信息
来源: 评论
A high-frequency mobility big-data reveals how COVID-19 spread across professions, locations and age groups
arXiv
收藏 引用
arXiv 2022年
作者: Zhao, Chen Zhang, Jialu Hou, Xiaoyue Yeung, Chi Ho Zeng, An College of Computer and Cyber Security Hebei Normal University Shijiazhuang050024 China Hebei Key Laboratory of Network and Information Security Shijiazhuang050024 China Hebei Provincial Engineering Research Center for Supply Chain Big Data Analytics and Data Security Shijiazhuang050024 China Department of Science and Environmental Studies The Education University of Hong Kong Hong Kong School of Systems Science Beijing Normal University Beijing100875 China
As infected and vaccinated population increases, some countries decided not to impose non-pharmaceutical intervention measures anymore and to coexist with COVID-19. However, we do not have a comprehensive understandin... 详细信息
来源: 评论
Channel Drop Out:A Simple Way to Prevent CNN from Overfitting in Motor Imagery Based BCI
Channel Drop Out:A Simple Way to Prevent CNN from Overfittin...
收藏 引用
2021国际计算机前沿大会
作者: Jing Luo Yaojie Wang Rong Xu Guangming Liu Xiaofan Wang Yijing Gong Shaanxi Key Laboratory for Network Computing and Security Technology School of Computer Science and EngineeringXi'an University of Technology Shaanxi Province Institute of Water Resources and Electric Power Investigation and Design
With the development of deep learning,many motor imagery brain-computer interfaces based on convolutional neural networks(CNNs) show outstanding ***,the trial number of EEG in the training set is usually limited,and r...
来源: 评论
Multi-keyword Cipher-text Retrieval Method for Smart Grid Edge Computing  3
Multi-keyword Cipher-text Retrieval Method for Smart Grid Ed...
收藏 引用
2020 3rd International Symposium on Power Electronics and Control engineering, ISPECE 2020
作者: Zhu, Jing Wu, Tao Li, Jintao Liu, Yanbin Jiang, Qixin School of Communication and Information Engineering Chongqing University of Posts and Telecommunications China School of Cybersecurity and Information Law Chongqing University of Posts and Telecommunications Chongqing China School of Computer Science Chongqing University of Posts and Telecommunications Chongqing China Guangdong Provincial Key Laboratory of Power System Network Security Guangzhou China Electric Power Institute CSG Guangzhou China
With the continuous deepening of China's power grid intelligent upgrading and the rise of edge computing technology, power grid terminals can carry out data storage and intelligent calculation at the edge of the p... 详细信息
来源: 评论
Decentralised, Collaborative, and Privacy-preserving Machine Learning for Multi-Hospital Data
arXiv
收藏 引用
arXiv 2024年
作者: Fang, Congyu Dziedzic, Adam Zhang, Lin Oliva, Laura Verma, Amol Razak, Fahad Papernot, Nicolas Wang, Bo Department of Computer Science University of Toronto Canada Peter Munk Cardiac Centre University Health Network Canada Vector Institute Toronto Canada CISPA Helmholtz Center for Information Security Germany Department of Electrical and Computer Engineering University of Toronto Canada Simon Fraser University Canada St. Michael’s Hospital Unity Health Toronto Canada Department of Medicine University of Toronto Canada Institute of Health Policy Management and Evaluation University of Toronto Canada Department of Laboratory Medicine and Pathobiology Temerty Faculty of Medicine University of Toronto Canada
Background: Machine Learning (ML) has demonstrated its great potential on medical data analysis. Large datasets collected from diverse sources and settings are essential for ML models in healthcare to achieve better a... 详细信息
来源: 评论
A Hybrid Blockchain-Based Identity Authentication Scheme for Mobile Crowd Sensing
SSRN
收藏 引用
SSRN 2022年
作者: Taochun, Wang Huimin, Shen Jian, Chen Fulong, Chen Qingshan, Wu Dong, Xie School of Computer and Information Anhui Normal University Wuhu241002 China Anhui Engineering Research Centers of Medical Big Data Intelligent System Anhui Normal University Wuhu241002 China Anhui Key Laboratory of Network and Information Security Anhui Normal University Wuhu241002 China
With the continuous innovation and popularization of mobile smart devices, the application of Mobile Crowd Sensing (MCS) has been widely studied. However, the existing centralized MCS applications that use servers for... 详细信息
来源: 评论
Vulnerability Detection With Graph Attention network And Metric Learning
TechRxiv
收藏 引用
TechRxiv 2022年
作者: Zhang, Chunyong Liu, Bin Fan, Qi Xin, Yang Zhu, Hongliang School of Cyberspace Security Beijing University of Posts and Telecommunications Beijing100876 China College of Information and Network Engineering Anhui Science and Technology University Bengbu233030 China State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang550025 China
Static code vulnerability detection is a critical topic in software security. Existing software analysis methods have a high rate of false positives and false negatives. Researchers are interested in employing deep le... 详细信息
来源: 评论
Leakage Reduced Searchable Symmetric Encryption for Multi-keyword Queries
收藏 引用
IEEE Transactions on Cloud Computing 2025年
作者: Deng, Qinghua Chen, Lanxiang Zhu, Yizhao Mu, Yi City University of Macau Faculty of Data Science 999078 China Hanshan Normal University School of Computer Information Engineering Guangdong Chaozhou521041 China Fujian Normal University Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer Cyber Security Fujian Fuzhou China
Conjunctive keyword queries on untrusted cloud servers represent one of the most common forms of search in encrypted environments. Extensive research has been devoted to developing efficient schemes that support multi... 详细信息
来源: 评论
YOLO-TP: A process detection model of tunnel real scene based on gradient information interaction
YOLO-TP: A process detection model of tunnel real scene base...
收藏 引用
computer, Big Data and Artificial Intelligence (ICCBD+AI), International Conference on
作者: Jiaying Fan Shuping Pan Xinbo Jiang Shengtao Zhang Hongliang Liu Chuan Wang Jianghua Li Chenglin Ke Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Technological Innovation Department Shandong Hi-Speed Group Co Ltd JiNan China School of Qilu Transportation Shandong University JiNan China China Railway 14th Bureau Group First Engineering Development Co. Ltd RiZhao China
Target detection technology is an effective method to detect tunnel operation safety. Although the field has made some progress in detection models, the lack of datasets and detection models has hindered its developme... 详细信息
来源: 评论
EnGAN: Enhancement Generative Adversarial network in Medical Image Segmentation
Research Square
收藏 引用
Research Square 2022年
作者: Deng, ErQiang Qin, ZhiGuang Chen, DaJiang Qin, Zhen Ding, Yi Geng, Ji Zhang, Ning Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Jianshe Road SiChuan Chengdu610054 China Department of Electrical and Computer Engineering University of Windsor 401 Sunset Avenue WindsorONN9B 3P4 Canada
Deep learning has been widely used in medical image segmentation, although the accuracy is affected by the problems of small sample space, data imbalance, and cross-device differences. Aiming at such issues, a enhance... 详细信息
来源: 评论