咨询与建议

限定检索结果

文献类型

  • 450 篇 会议
  • 333 篇 期刊文献

馆藏范围

  • 783 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 486 篇 工学
    • 393 篇 计算机科学与技术...
    • 316 篇 软件工程
    • 123 篇 信息与通信工程
    • 77 篇 电气工程
    • 52 篇 控制科学与工程
    • 51 篇 生物工程
    • 44 篇 网络空间安全
    • 38 篇 电子科学与技术(可...
    • 32 篇 机械工程
    • 28 篇 安全科学与工程
    • 25 篇 生物医学工程(可授...
    • 22 篇 光学工程
    • 20 篇 交通运输工程
    • 19 篇 化学工程与技术
    • 16 篇 建筑学
    • 14 篇 仪器科学与技术
  • 210 篇 理学
    • 120 篇 数学
    • 62 篇 生物学
    • 39 篇 统计学(可授理学、...
    • 37 篇 物理学
    • 24 篇 化学
    • 16 篇 系统科学
  • 117 篇 管理学
    • 77 篇 管理科学与工程(可...
    • 51 篇 图书情报与档案管...
    • 32 篇 工商管理
  • 32 篇 医学
    • 26 篇 基础医学(可授医学...
    • 26 篇 临床医学
    • 25 篇 公共卫生与预防医...
  • 31 篇 法学
    • 19 篇 社会学
  • 18 篇 经济学
    • 18 篇 应用经济学
  • 11 篇 农学
  • 8 篇 军事学
  • 5 篇 教育学
  • 1 篇 艺术学

主题

  • 40 篇 accuracy
  • 38 篇 semantics
  • 38 篇 feature extracti...
  • 32 篇 federated learni...
  • 29 篇 deep learning
  • 29 篇 privacy
  • 27 篇 computational mo...
  • 27 篇 training
  • 23 篇 data privacy
  • 19 篇 data models
  • 18 篇 neural networks
  • 15 篇 protocols
  • 15 篇 network security
  • 14 篇 contrastive lear...
  • 14 篇 security
  • 14 篇 cloud computing
  • 13 篇 internet of thin...
  • 13 篇 speech processin...
  • 13 篇 data mining
  • 12 篇 image segmentati...

机构

  • 82 篇 key laboratory o...
  • 69 篇 shandong provinc...
  • 52 篇 tianjin key labo...
  • 51 篇 shandong enginee...
  • 50 篇 network and data...
  • 42 篇 college of compu...
  • 36 篇 college of cyber...
  • 25 篇 college of compu...
  • 22 篇 faculty of data ...
  • 20 篇 tianjin key labo...
  • 19 篇 shandong provinc...
  • 18 篇 network and data...
  • 18 篇 college of compu...
  • 18 篇 shandong fundame...
  • 17 篇 state key labora...
  • 16 篇 fujian provincia...
  • 12 篇 city university ...
  • 11 篇 shandong enginee...
  • 11 篇 school of comput...
  • 11 篇 school of inform...

作者

  • 16 篇 qin zhen
  • 16 篇 liu ximeng
  • 13 篇 xiong jinbo
  • 13 篇 qin zhiguang
  • 12 篇 liu jun
  • 12 篇 jing zhao
  • 12 篇 jinbo xiong
  • 12 篇 zhenyu yang
  • 12 篇 jia chunfu
  • 11 篇 li tao
  • 11 篇 zhen qin
  • 11 篇 wang bin
  • 11 篇 tian youliang
  • 11 篇 youliang tian
  • 11 篇 karsai márton
  • 10 篇 luo minnan
  • 10 篇 jiguo yu
  • 10 篇 fu fang-wei
  • 10 篇 liu bin
  • 10 篇 zhao dongmei

语言

  • 617 篇 英文
  • 160 篇 其他
  • 10 篇 中文
检索条件"机构=Network and Data Security"
783 条 记 录,以下是121-130 订阅
排序:
Unleashing the Potential of Decentralized Federated Learning in Healthcare: A Comprehensive Survey on Insights and Challenges  9
Unleashing the Potential of Decentralized Federated Learning...
收藏 引用
9th IEEE International Conference on data Science in Cyberspace, DSC 2024
作者: Cheng, Haibo Liu, Wenjian Qu, Youyang Fu, Kexue Wang, Qinyuan City University of Macau Faculty of Data Science China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China
Federated learning (FL) is a distributed learning method that reduces data transmission and privacy risks. However, the existence of a central server may become a target of attackers, resulting in an increased risk of... 详细信息
来源: 评论
Discrete Jaya algorithm to solve the police resource deployment problem in emergency traffic accident  10
Discrete Jaya algorithm to solve the police resource deploym...
收藏 引用
10th IEEE Joint International Information Technology and Artificial Intelligence Conference, ITAIC 2022
作者: Jing, Zhang Weijie, Ding Zhejiang Police College Department of Computer and Information Security Hangzhou310053 China Big-data and Network Security Research Institute Zhejiang Police College Hangzhou310053 China College of Information Engineering Zhejiang University of Technology Hangzhou310023 China Key Laboratory of Public Security Information Application Based on Big-data Architecture Ministry of Public Security Hangzhou310053 China
Aiming at the high frequency of urban traffic accidents and the relative shortage of police resources, a multi-objective discrete Jaya algorithm is proposed to solve the problem of police resource deployment in emerge... 详细信息
来源: 评论
Digital Twins in the IIoT:Current Practices and Future Directions Toward Industry 5.0
收藏 引用
Computers, Materials & Continua 2025年 第6期83卷 3675-3712页
作者: Bisni Fahad Mon Mohammad Hayajneh Najah Abu Ali Farman Ullah Hikmat Ullah Shayma Alkobaisi Computer&Network Engineering United Arab Emirates UniversityAl Ain15551United Arab Emirates Big Data Analytics Centre United Arab Emirates UniversityAl Ain15551United Arab Emirates Department of Business Information Technology Liwa CollegeAbu Dhabi41009United Arab Emirates Information System&Security United Arab Emirates UniversityAl Ain15551United Arab Emirates
In this paper,we explore the ever-changing field ofDigital Twins(DT)in the Industrial Internet of Things(IIoT)context,emphasizing their critical role in advancing Industry 4.0 toward the frontiers of Industry *** arti... 详细信息
来源: 评论
DRL-Based Time-Varying Workload Scheduling With Priority and Resource Awareness
收藏 引用
IEEE Transactions on network and Service Management 2025年 第3期22卷 2838-2852页
作者: Liu, Qifeng Fan, Qilin Zhang, Xu Li, Xiuhua Wang, Kai Xiong, Qingyu Chongqing University School of Big Data and Software Engineering Key Laboratory of Dependable Service Computing in Cyber Physical Society of Ministry of Education Chongqing400044 China Nanjing University School of Electronic Science and Engineering Nanjing210023 China Chongqing University School of Big Data and Software Engineering Chongqing400044 China Haihe Laboratory of Information Technology Application Innovation Tianjin300072 China Harbin Institute of Technology School of Computer Science and Technology Weihai264209 China Shandong Key Laboratory of Industrial Network Security Weihai264209 China
With the proliferation of cloud services and the continuous growth in enterprises’ demand for dynamic multidimensional resources, the implementation of effective strategy for time-varying workload scheduling has beco... 详细信息
来源: 评论
CPSNet: Comprehensive Enhancement Representation for Polyp Segmentation Task
CPSNet: Comprehensive Enhancement Representation for Polyp S...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Cai, Jiati Liu, Xiaogang Yang, Hongjie Ding, Yi Zhong, Ting Qin, Zhen Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Chengdu China Department of Gastroenterology and Hepatology University of Electronic Science and Technology of China Chengdu China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China
Accurately segmenting polyp regions in colonoscopy images is crucial for the diagnosis and intervention of colorectal cancer. However, the task of polyp segmentation remains challenging due to the diverse size and sha... 详细信息
来源: 评论
Privacy-preserving Searchable Encryption Based on Anonymization and Differential privacy
Privacy-preserving Searchable Encryption Based on Anonymizat...
收藏 引用
IEEE International Conference on Web Services (ICWS)
作者: Caixia Ma Chunfu Jia Ruizhong Du Guanxiong Ha Mingyue Li College of Cyber Science Nankai University Tianjin Key Laboratory of Network and Data Security Technology Tianjin China School of Cyber Security and Computer Hebei University Baoding China
With the rapid development of cloud computing, more and more users are storing sensitive data on cloud servers, making the privacy-preserving of data particularly important. Dynamic searchable symmetric encryption ena... 详细信息
来源: 评论
HANE-SHC: Heterogeneous attributed network embedding with structural homophily contents
收藏 引用
Applied Intelligence 2025年 第10期55卷 1-40页
作者: Fu, Yue Zhao, Shuliang Wu, Yongliang College of Information Engineering Hebei GEO University Hebei China College of Computer and Cyber Security Hebei Normal University Hebei China Hebei Provincial Engineering Research Center for Supply Chain Big Data Analytics & Data Security Hebei China Hebei Provincial Key Laboratory of Network and Information Security Hebei China School of Information Science and Technology Shijiazhuang Tiedao University Hebei China
Heterogeneous attributed networks (HANs) are ubiquitous in real-world, spanning domains from the academic network to the movie network. Heterogeneous attributed network embedding (HANE), a promising analytical techniq...
来源: 评论
A network security Situation Assessment Method Based on Multi-attention Mechanism and HHO-ResNeXt  8th
A Network Security Situation Assessment Method Based on Mult...
收藏 引用
8th International Symposium on security and Privacy in Social networks and Big data, SocialSec 2022
作者: Zhao, Dongmei Ji, Guoqing Zeng, Shuiguang School of College of Computer and Cyber Security Hebei Normal University Shijiazhuang050024 China Hebei Provincial Key Laboratory of Network and Information Security Hebei Normal University Shijiazhuang050024 China Hebei Provincial Engineering Research Center for Supply Chain Big Data Analytics and Data Security Hebei Normal University Shijiazhuang050024 China
Because the traditional convolutional neural network (CNN) cannot obtain the importance of each channel and its receptive field is limited, it is difficult to deal with the increasingly complex network environment. Ai... 详细信息
来源: 评论
Design and Implementation of Cyber Space Threat Detection System Based on User Behavioral Logs  3
Design and Implementation of Cyber Space Threat Detection Sy...
收藏 引用
3rd International Conference on Electronic Information Engineering and Computer Communication, EIECC 2023
作者: Wang, Wenhao Li, Hao Nie, Peng College of Cyber Science Nankai University Tianjin Key Laboratory of Network and Data Security Technology Tianjin China Science and Technology on Communication Networks Laboratory Shijiazhuang China College of Cyber Science Nankai University Tianjin China
In contemporary society, the role of networks in daily work and business activities is increasingly prominent. The enterprise intranet, serving as a crucial bridge for maintaining work stability, asset security, and b... 详细信息
来源: 评论
Three-level Compact Caching for Search Engines Based on Solid State Drives  23
Three-level Compact Caching for Search Engines Based on Soli...
收藏 引用
23rd IEEE International Conference on High Performance Computing and Communications, 7th IEEE International Conference on data Science and Systems, 19th IEEE International Conference on Smart City and 7th IEEE International Conference on Dependability in Sensor, Cloud and Big data Systems and Applications, HPCC-DSS-SmartCity-DependSys 2021
作者: Zhang, Rui Sun, Pengyu Tong, Jiancong Zang, Ruirui Qian, Heng Pan, Yu Stones, Rebecca J. Wang, Gang Liu, Xiaoguang Li, Yusen College of Computer Science Nankai University Tianjin China Tianjin Key Laboratory of Network and Data Security Technology Tianjin China Baidu Inc Beijing China
The query processing in search engines can be classified into either disk I/O operations and CPU computation operations. Conventional search engine caching methods mostly aimed at reducing disk I/O operations. However... 详细信息
来源: 评论