咨询与建议

限定检索结果

文献类型

  • 424 篇 会议
  • 332 篇 期刊文献

馆藏范围

  • 756 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 470 篇 工学
    • 374 篇 计算机科学与技术...
    • 303 篇 软件工程
    • 116 篇 信息与通信工程
    • 75 篇 电气工程
    • 51 篇 生物工程
    • 42 篇 控制科学与工程
    • 42 篇 网络空间安全
    • 34 篇 机械工程
    • 28 篇 生物医学工程(可授...
    • 28 篇 安全科学与工程
    • 27 篇 电子科学与技术(可...
    • 23 篇 光学工程
    • 20 篇 交通运输工程
    • 18 篇 化学工程与技术
    • 14 篇 仪器科学与技术
    • 14 篇 动力工程及工程热...
  • 202 篇 理学
    • 116 篇 数学
    • 61 篇 生物学
    • 38 篇 统计学(可授理学、...
    • 36 篇 物理学
    • 20 篇 化学
    • 15 篇 系统科学
  • 121 篇 管理学
    • 79 篇 管理科学与工程(可...
    • 54 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 36 篇 医学
    • 31 篇 临床医学
    • 30 篇 基础医学(可授医学...
    • 28 篇 公共卫生与预防医...
  • 29 篇 法学
    • 18 篇 社会学
  • 18 篇 经济学
    • 18 篇 应用经济学
  • 11 篇 农学
  • 8 篇 军事学
  • 6 篇 教育学
  • 1 篇 艺术学

主题

  • 33 篇 feature extracti...
  • 32 篇 semantics
  • 31 篇 accuracy
  • 26 篇 deep learning
  • 26 篇 privacy
  • 25 篇 training
  • 23 篇 federated learni...
  • 22 篇 computational mo...
  • 21 篇 data privacy
  • 18 篇 data models
  • 17 篇 neural networks
  • 15 篇 network security
  • 14 篇 protocols
  • 14 篇 cloud computing
  • 13 篇 predictive model...
  • 12 篇 internet of thin...
  • 12 篇 image segmentati...
  • 12 篇 correlation
  • 12 篇 cryptography
  • 11 篇 speech processin...

机构

  • 69 篇 shandong provinc...
  • 66 篇 key laboratory o...
  • 51 篇 tianjin key labo...
  • 49 篇 network and data...
  • 45 篇 shandong enginee...
  • 41 篇 college of compu...
  • 35 篇 college of cyber...
  • 22 篇 college of compu...
  • 20 篇 shandong fundame...
  • 19 篇 faculty of data ...
  • 18 篇 network and data...
  • 18 篇 state key labora...
  • 17 篇 fujian provincia...
  • 16 篇 tianjin key labo...
  • 15 篇 college of compu...
  • 14 篇 city university ...
  • 11 篇 shandong enginee...
  • 10 篇 key laboratory o...
  • 10 篇 school of inform...
  • 10 篇 college of compu...

作者

  • 17 篇 qin zhen
  • 15 篇 qin zhiguang
  • 14 篇 liu ximeng
  • 13 篇 xiong jinbo
  • 12 篇 jinbo xiong
  • 12 篇 zhen qin
  • 12 篇 fu fang-wei
  • 12 篇 jia chunfu
  • 11 篇 liu jun
  • 11 篇 li tao
  • 11 篇 ding yi
  • 11 篇 jing zhao
  • 11 篇 wang bin
  • 11 篇 tian youliang
  • 11 篇 youliang tian
  • 10 篇 liu bin
  • 10 篇 karsai márton
  • 10 篇 zhao dongmei
  • 9 篇 yi ding
  • 9 篇 luo minnan

语言

  • 706 篇 英文
  • 44 篇 其他
  • 7 篇 中文
检索条件"机构=Network and Data Security"
756 条 记 录,以下是1-10 订阅
排序:
Reinforcing network security by converting massive data flow to continuous connections for IDS
Reinforcing network security by converting massive data flow...
收藏 引用
International Conference for Internet Technology and Secured Transactions (ICITST)
作者: Maher Salem Ulrich Buehler Group of Network and Data Security University of Applied Sciences Fulda Germany
Processing massive data flow in intrusion detection systems (IDS) become a serious challenge. It is considered as a major deficiency while handling heterogeneous and nonstationary data stream to uncover anomaly in the... 详细信息
来源: 评论
security control of unstructured data in the power IoT for isolation network between internal and external  8
Security control of unstructured data in the power IoT for i...
收藏 引用
2022 8th International Symposium on Sensors, Mechatronics and Automation System, ISSMAS 2022
作者: Yang, Ruxia Wang, Di Liang, Fei State Grid Key Laboratory of Information and Network Security Global Energy Interconnection Research Institute Co. Ltd. Nanjing China Big Data Center State Grid of China Beijing China
As a key national infrastructure, the safety of the power grid is an overall and strategic issue that affects the development of the national economy and society. With the popularization and development of the Interne... 详细信息
来源: 评论
Towards Resilience 5G-V2N: Efficient and Privacy-Preserving Authentication Protocol for Multi-Service Access and Handover
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第6期24卷 5446-5463页
作者: Bi, Ye Jia, Chunfu Nankai University College of Cyber Science Tianjin Key Laboratory of Network and Data Security Technology DISSEC Tianjin300350 China
The booming 5 G cellular networks sparked tremendous interest in supporting more sophisticated critical use cases through vehicle-to-network (V2N) communications. However, the inherent technical vulnerabilities and de... 详细信息
来源: 评论
An Enhanced Clustering-Based (k, t)-Anonymity Algorithm for Graphs
收藏 引用
Chinese Journal of Electronics 2025年 第1期34卷 365-372页
作者: Yuanyuan Wang Xing Zhang Zhiguang Chu Wei Shi Xiang Li School of Electronics and Information Engineering Liaoning University of Technology Key Laboratory of Security for Network and Data in Industrial Internet of Liaoning Province Faculty of Information Technology Beijing University of Technology
As people become increasingly reliant on the Internet, securely storing and publishing private data has become an important issue. In real life, the release of graph data can lead to privacy breaches, which is a highl... 详细信息
来源: 评论
security analysis and secured access design for networks of image remote sensing
收藏 引用
Digital Communications and networks 2025年 第1期11卷 136-144页
作者: Juan Zhao Haibo Dai Xiaolong Xu Hao Yan Zheng Zhang Chunguo Li School of Network Security Jinling Institute of TechnologyNanjing 211169China School of IoT Nanjing University of Posts and Telecommunications(NJUPT)Nanjing 210003China Jiangsu Key Lab.of Big Data Security and Intelligent Processing NJUPTNanJing 210003China School of Information Science and Engineering Southeast UniversityNanjing 210096China
The secured access is studied in this paper for the network of the image remote *** sensor in this network encounters the information security when uploading information of the images wirelessly from the sensor to the... 详细信息
来源: 评论
ADLT: a novel method for effective detection of adversarial attacks in image retrieval
ADLT: a novel method for effective detection of adversarial ...
收藏 引用
2024 International Conference on Computer Vision and Image Processing, CVIP 2024
作者: Xu, Shiyue Zhang, Yu College of Cyber Science Tianjin Key Laboratory of Network and Data Security Technology Nankai University Tianjin300350 China
The versatile application of deep learning has made it prone to vulnerabilities, particularly adversarial attacks, which have been increasingly prevalent as its scope expands. Attack methods based on adversarial queri... 详细信息
来源: 评论
A Novel Approach to Cloud security: Publicly Verifiable Remote Signcryption Framework
收藏 引用
IEEE Internet of Things Journal 2025年 第10期12卷 14828-14844页
作者: Ali, Mohammad Liu, Ximeng Amirkabir University of Technology Department of Mathematics and Computer Science Tehran Iran Fuzhou University Key Laboratory of Information Security of Network Systems College of Computer and Data Science Fuzhou350108 China
In communication systems, ensuring both data integrity and confidentiality is crucial. Traditional methods, such as encryption and signature schemes, handle these aspects separately, leading to inefficiencies. Signcry... 详细信息
来源: 评论
A Weighted Discrete Wavelet Transform-Based Capsule network for Malware Classification  27th
A Weighted Discrete Wavelet Transform-Based Capsule Network ...
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Qiao, Tonghua Cao, Chunjie Zou, Binghui Tao, Fangjian Cheng, Yinan Zhang, Qi Sun, Jingzhang Lab of Heterogeneous Network Security and Governance Haikou China School of Cyberspace Security Hainan University Haikou China Faculty of Data Science City University of Macau China
The rise of sophisticated malware poses a grave threat to computer security, challenging traditional detection methods. Traditional malware detection techniques, which primarily rely on feature engineering and definin... 详细信息
来源: 评论
Blockchain and signcryption enabled asynchronous federated learning framework in fog computing
收藏 引用
Digital Communications and networks 2025年 第2期11卷 442-454页
作者: Zhou, Zhou Tian, Youliang Xiong, Jinbo Peng, Changgen Li, Jing Yang, Nan State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang550025 China Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fujian Normal University Fuzhou350117 China Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology Guilin541004 China
Federated learning combines with fog computing to transform data sharing into model sharing, which solves the issues of data isolation and privacy disclosure in fog computing. However, existing studies focus on centra... 详细信息
来源: 评论
Crop Classification Methods Based on Siamese CBMM-CNN Architectures Using Hyperspectral Remote Sensing data  24th
Crop Classification Methods Based on Siamese CBMM-CNN Archi...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Xie, Bin Zhang, Jiahao Li, Yuling Li, Yusong Dong, Xinyu College of Computer and Cyber Security Hebei Normal University Hebei Shijiazhuang China Hebei Provincial Key Laboratory of Network and Information Security Hebei Normal University Hebei Shijiazhuang China Hebei Provincial Engineering Research Center for Supply Chain Big Data Analytics and Data Security Hebei Normal University Hebei Shijiazhuang China
Amidst global population growth and escalating food demands, real-time agricultural monitoring is crucial for ensuring food security. During the initial stages of crop growth, however, it faces significant challenges ... 详细信息
来源: 评论