咨询与建议

限定检索结果

文献类型

  • 425 篇 会议
  • 337 篇 期刊文献

馆藏范围

  • 762 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 489 篇 工学
    • 390 篇 计算机科学与技术...
    • 312 篇 软件工程
    • 128 篇 信息与通信工程
    • 86 篇 电气工程
    • 51 篇 生物工程
    • 50 篇 控制科学与工程
    • 45 篇 网络空间安全
    • 36 篇 电子科学与技术(可...
    • 32 篇 机械工程
    • 29 篇 安全科学与工程
    • 26 篇 生物医学工程(可授...
    • 24 篇 光学工程
    • 21 篇 交通运输工程
    • 18 篇 化学工程与技术
    • 14 篇 动力工程及工程热...
    • 14 篇 建筑学
  • 206 篇 理学
    • 119 篇 数学
    • 61 篇 生物学
    • 40 篇 统计学(可授理学、...
    • 37 篇 物理学
    • 20 篇 化学
    • 15 篇 系统科学
  • 122 篇 管理学
    • 80 篇 管理科学与工程(可...
    • 55 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 34 篇 医学
    • 29 篇 基础医学(可授医学...
    • 27 篇 临床医学
    • 26 篇 公共卫生与预防医...
  • 30 篇 法学
    • 18 篇 社会学
  • 18 篇 经济学
    • 18 篇 应用经济学
  • 11 篇 农学
  • 8 篇 军事学
  • 5 篇 教育学
  • 1 篇 艺术学

主题

  • 33 篇 feature extracti...
  • 32 篇 semantics
  • 31 篇 accuracy
  • 27 篇 deep learning
  • 26 篇 privacy
  • 25 篇 training
  • 24 篇 federated learni...
  • 22 篇 data privacy
  • 22 篇 computational mo...
  • 18 篇 data models
  • 17 篇 neural networks
  • 14 篇 protocols
  • 14 篇 network security
  • 14 篇 cloud computing
  • 13 篇 predictive model...
  • 12 篇 internet of thin...
  • 12 篇 correlation
  • 12 篇 cryptography
  • 11 篇 image segmentati...
  • 11 篇 speech processin...

机构

  • 69 篇 shandong provinc...
  • 66 篇 key laboratory o...
  • 51 篇 tianjin key labo...
  • 49 篇 network and data...
  • 45 篇 shandong enginee...
  • 42 篇 college of compu...
  • 35 篇 college of cyber...
  • 24 篇 college of compu...
  • 19 篇 faculty of data ...
  • 19 篇 shandong fundame...
  • 18 篇 network and data...
  • 17 篇 tianjin key labo...
  • 17 篇 state key labora...
  • 16 篇 fujian provincia...
  • 15 篇 college of compu...
  • 13 篇 city university ...
  • 11 篇 shandong enginee...
  • 11 篇 college of compu...
  • 10 篇 key laboratory o...
  • 10 篇 school of inform...

作者

  • 16 篇 qin zhen
  • 15 篇 qin zhiguang
  • 15 篇 liu ximeng
  • 12 篇 li tao
  • 12 篇 jinbo xiong
  • 12 篇 wang bin
  • 12 篇 xiong jinbo
  • 12 篇 jia chunfu
  • 11 篇 liu jun
  • 11 篇 ding yi
  • 11 篇 jing zhao
  • 11 篇 zhen qin
  • 11 篇 fu fang-wei
  • 11 篇 youliang tian
  • 10 篇 tian youliang
  • 10 篇 liu bin
  • 10 篇 karsai márton
  • 10 篇 zhao dongmei
  • 9 篇 yi ding
  • 9 篇 luo minnan

语言

  • 706 篇 英文
  • 50 篇 其他
  • 7 篇 中文
检索条件"机构=Network and Data Security"
762 条 记 录,以下是111-120 订阅
排序:
A Novel Identification Method for Frequently Switched Encrypted Video Streaming in Complex network Environment  22
A Novel Identification Method for Frequently Switched Encryp...
收藏 引用
2022 Asia Conference on Electrical, Power and Computer Engineering, EPCE 2022
作者: Zhang, Y.U. Ma, Xiaowei Leng, Dongpeng Yu, Peiran College of Cyber Science Nankai University Tianjin Key Laboratory of Network and Data Security Technology Tianjin China College of Computer Science Nankai University Tianjin Key Laboratory of Network and Data Security Technology Tianjin China
Nowadays, to provide stable video streaming and smooth user experience among different scenarios, more and more online video sharing and social media platforms adopt the Dynamic Adaptive Streaming over HTTP (DASH), wh... 详细信息
来源: 评论
A UC-secure authenticated contributory group key exchange protocol based on discrete logarithm
A UC-secure authenticated contributory group key exchange pr...
收藏 引用
9th International Conference on Information Systems security, ICISS 2013
作者: Sobhdel, Yasser Jalili, Rasool Data and Network Security Laboratory Department of Computer Engineering Sharif University of Technology Tehran Iran
Authenticated key exchange protocols allow parties to establish a common session key which in turn is fundamental to building secure channels. Authenticated group key exchange protocols allow parties to interact with ... 详细信息
来源: 评论
Statistical disclosure: Improved, extended, and resisted
Statistical disclosure: Improved, extended, and resisted
收藏 引用
6th International Conference on Emerging security Information, Systems and Technologies, SECURWARE 2012
作者: Emamdoost, Navid Dousti, Mohammad Sadeq Jalili, Rasool Data and Network Security Lab Department of Computer Engineering Sharif University of Technology Tehran Iran
Traffic analysis is a type of attack on secure communications systems, in which the adversary extracts useful patterns and information from the observed traffic. This paper improves and extends an efficient traffic an... 详细信息
来源: 评论
Recommendation System Based on Perceptron and Graph Convolution network
收藏 引用
Computers, Materials & Continua 2024年 第6期79卷 3939-3954页
作者: Zuozheng Lian Yongchao Yin Haizhen Wang College of Computer and Control Engineering Qiqihar UniversityQiqihar161006China Heilongjiang Key Laboratory of Big Data Network Security Detection and Analysis Qiqihar UniversityQiqihar161006China
The relationship between users and items,which cannot be recovered by traditional techniques,can be extracted by the recommendation algorithm based on the graph convolution *** current simple linear combination of the... 详细信息
来源: 评论
A DDoS Identification Method for Unbalanced data CVWGG
收藏 引用
Computers, Materials & Continua 2024年 第12期81卷 3825-3851页
作者: Haizhen Wang Na Jia Yang He Pan Tan College of Computer and Control Engineering Qiqihar UniversityQiqihar161006China Heilongjiang Key Laboratory of Big Data Network Security Detection and Analysis Qiqihar UniversityQiqihar161006China
As the popularity and dependence on the Internet increase,DDoS(distributed denial of service)attacks seriously threaten network *** accurately distinguishing between different types of DDoS attacks,targeted defense st... 详细信息
来源: 评论
Maximizing Area Coverage in Privacy-Preserving Worker Recruitment: A Prior Knowledge-Enhanced Geo-indistinguishable Approach
收藏 引用
IEEE Transactions on Information Forensics and security 2025年 20卷 5138-5151页
作者: Zhang, Pengfei Cheng, Xiang Zhang, Zhikun Zhu, Youwen Zhang, Ji Anhui University of Science and Technology State Key Laboratory of Digital Intelligent Technology for Unmanned Coal Mining the School of Computer Science and Engineering Anhui University of Science and Technology Huainan 232001 China Yunnan University of Finance and Economics Yunnan Key Laboratory of Service Computing Yunnan 650221 China Qilu University of Technology (Shandong Academy of Sciences) Key Laboratory of Equipment Data Security and Guarantee Technology Ministry of Education Key Laboratory of Computing Power Network and Information Security Ministry of Education China Beijing University of Posts and Telecommunications China Zhejiang University China Nanjing University of Aeronautics and Astronautics China University of Southern Queensland China
Worker recruitment for area coverage maximization, typically requires participants to upload location information, which can deter potential participation without proper protection. While existing studies resort to ge... 详细信息
来源: 评论
Focus on Local: Finding Reliable Discriminative Regions for Visual Place Recognition
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Changwei Chen, Shunpeng Song, Yukun Xu, Rongtao Zhang, Zherui Zhang, Jiguang Yang, Haoran Zhang, Yu Fu, Kexue Du, Shide Xu, Zhiwei Gao, Longxiang Guo, Li Xu, Shibiao Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences China School of Artificial Intelligence Beijing University of Posts and Telecommunications China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science China MAIS Institute of Automation Chinese Academy of Sciences China Tongji University China College of Computer and Data Science Fuzhou University China Shandong University China
Visual Place Recognition (VPR) is aimed at predicting the location of a query image by referencing a database of geotagged images. For VPR task, often fewer discriminative local regions in an image produce important e... 详细信息
来源: 评论
VFGCN: A Vertical Federated Learning Framework With Privacy Preserving for Graph Convolutional network
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Wang, Gang Li, Qingming Liu, Ximeng Yan, Xiaoran Dong, Qingkuan Wu, Huiwen Kong, Xiangjie Zhou, Li Zhejiang Lab HangZhou 310000 China Zhejiang University College of Computer Science and Technology Hangzhou 310058 China Fuzhou University Key Laboratory of Information Security of Network Systems College of Computer and Big Data Fuzhou 350108 China Xidian University State Key Laboratory of Integrated Services Networks Xi'an 710071 China Zhejiang University of Technology College of Computer Science and Technology Hangzhou 310023 China Dalian University of Technology School of Software Dalian 116620 China
Due to the robust representational capabilities of graph data, employing graph neural networks for its processing has demonstrated superior performance over conventional deep learning algorithms. Graph data encompasse... 详细信息
来源: 评论
Low-rank tucker decomposition for multi-view outlier detection based on meta-learning
收藏 引用
Information Fusion 2025年 123卷
作者: Wei Lin Kun Xie Jiayin Li Shiping Wang Li Xu College of Computer and Cyber Security Fujian Normal University Fuzhou China Fujian Provincial Key Lab of Network Security and Cryptology Fujian Normal University Fuzhou China College of Computer Science and Electronics Engineering Hunan University Changsha China College of Computer and Data Science Fuzhou University Fuzhou China
The analysis and mining of multi-view data have gained widespread attention, making multi-view anomaly detection a prominent research area. Despite notable advancements in the performance of existing multi-view anomal...
来源: 评论
Research on the mechanical fault diagnosis method based on sound signal and IEMD-DDCNN
收藏 引用
International Journal of Intelligent Computing and Cybernetics 2023年 第3期16卷 629-646页
作者: Haoning Pu Zhan Wen Xiulan Sun Lemei Han Yanhe Na Hantao Liu Wenzao Li Chengdu University of Information Technology ChengduChina Education Department of Sichuan Province Education Informatization and Big Data CenterChengduChina Network and Data Security Key Laboratory of Sichuan Province UESTCChengduChina
Purpose–The purpose of this paper is to provide a shorter time cost,high-accuracy fault diagnosis method for water *** pumps are widely used in industrial equipment and their fault diagnosis is gaining increasing ***... 详细信息
来源: 评论