咨询与建议

限定检索结果

文献类型

  • 424 篇 会议
  • 326 篇 期刊文献

馆藏范围

  • 750 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 475 篇 工学
    • 380 篇 计算机科学与技术...
    • 307 篇 软件工程
    • 124 篇 信息与通信工程
    • 81 篇 电气工程
    • 51 篇 生物工程
    • 50 篇 控制科学与工程
    • 44 篇 网络空间安全
    • 34 篇 电子科学与技术(可...
    • 32 篇 机械工程
    • 28 篇 安全科学与工程
    • 26 篇 生物医学工程(可授...
    • 23 篇 光学工程
    • 20 篇 交通运输工程
    • 18 篇 化学工程与技术
    • 14 篇 动力工程及工程热...
  • 202 篇 理学
    • 117 篇 数学
    • 61 篇 生物学
    • 39 篇 统计学(可授理学、...
    • 34 篇 物理学
    • 20 篇 化学
    • 15 篇 系统科学
  • 120 篇 管理学
    • 78 篇 管理科学与工程(可...
    • 55 篇 图书情报与档案管...
    • 32 篇 工商管理
  • 33 篇 医学
    • 28 篇 基础医学(可授医学...
    • 27 篇 临床医学
    • 26 篇 公共卫生与预防医...
  • 30 篇 法学
    • 18 篇 社会学
    • 13 篇 法学
  • 18 篇 经济学
    • 18 篇 应用经济学
  • 11 篇 农学
  • 8 篇 军事学
  • 5 篇 教育学
  • 1 篇 艺术学

主题

  • 33 篇 feature extracti...
  • 32 篇 semantics
  • 31 篇 accuracy
  • 26 篇 deep learning
  • 26 篇 privacy
  • 25 篇 training
  • 23 篇 federated learni...
  • 22 篇 computational mo...
  • 21 篇 data privacy
  • 18 篇 data models
  • 17 篇 neural networks
  • 14 篇 protocols
  • 14 篇 network security
  • 14 篇 cloud computing
  • 13 篇 predictive model...
  • 12 篇 internet of thin...
  • 12 篇 correlation
  • 12 篇 cryptography
  • 11 篇 image segmentati...
  • 11 篇 speech processin...

机构

  • 69 篇 shandong provinc...
  • 66 篇 key laboratory o...
  • 51 篇 tianjin key labo...
  • 49 篇 network and data...
  • 45 篇 shandong enginee...
  • 41 篇 college of compu...
  • 35 篇 college of cyber...
  • 24 篇 college of compu...
  • 19 篇 faculty of data ...
  • 19 篇 shandong fundame...
  • 18 篇 network and data...
  • 17 篇 state key labora...
  • 16 篇 tianjin key labo...
  • 16 篇 fujian provincia...
  • 15 篇 college of compu...
  • 13 篇 city university ...
  • 11 篇 shandong enginee...
  • 11 篇 college of compu...
  • 10 篇 key laboratory o...
  • 10 篇 school of inform...

作者

  • 16 篇 qin zhen
  • 15 篇 qin zhiguang
  • 13 篇 liu ximeng
  • 12 篇 li tao
  • 12 篇 jinbo xiong
  • 12 篇 wang bin
  • 12 篇 xiong jinbo
  • 12 篇 jia chunfu
  • 11 篇 liu jun
  • 11 篇 ding yi
  • 11 篇 jing zhao
  • 11 篇 zhen qin
  • 11 篇 fu fang-wei
  • 11 篇 youliang tian
  • 10 篇 tian youliang
  • 10 篇 liu bin
  • 10 篇 karsai márton
  • 10 篇 zhao dongmei
  • 9 篇 yi ding
  • 9 篇 luo minnan

语言

  • 700 篇 英文
  • 44 篇 其他
  • 7 篇 中文
检索条件"机构=Network and Data Security"
750 条 记 录,以下是131-140 订阅
排序:
Achieving dynamic privacy measurement and protection based on reinforcement learning for mobile edge crowdsensing of IoT
收藏 引用
Digital Communications and networks 2024年 第2期10卷 380-388页
作者: Renwan Bi Mingfeng Zhao Zuobin Ying Youliang Tian Jinbo Xiong Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber SecurityFujian Normal UniversityFuzhou350117China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic TechnologyGuilin541004China Faculty of Data Science City University of Macao999078MacaoChina State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang550025China
With the maturity and development of 5G field,Mobile Edge CrowdSensing(MECS),as an intelligent data collection paradigm,provides a broad prospect for various applications in ***,sensing users as data uploaders lack a ... 详细信息
来源: 评论
Privacy-preserving Trajectory data Release Hierarchical Model  13
Privacy-preserving Trajectory Data Release Hierarchical Mode...
收藏 引用
13th International Conference on Communication and network security, ICCNS 2023
作者: Zhang, Qian Zhang, Xing Shi, Wei Key Laboratory of Security for Network and Data in Industrial Internet of Liaoning Province Liaoning University of Technology Jinzhou121000 China
The development of positioning technology and mobile intelligent devices has given rise to plentiful location-based services and generated much trajectory data. The publication and analysis of trajectory data bring co... 详细信息
来源: 评论
UVHM: Model checking based formal analysis scheme for hypervisors
UVHM: Model checking based formal analysis scheme for hyperv...
收藏 引用
International Conference on Information and Communication Technology, ICT-EurAsia 2013
作者: She, Yuchao Li, Hui Zhu, Hui Xidian University Xi'an 710071 China Network and Data Security Key Laboratory of Sichuan Province Chengdu 611731 China
Hypervisors act a central role in virtualization for cloud computing. However, current security solutions, such as installing IDS model on hypervisors to detect known and unknown attacks, can not be applied well to th... 详细信息
来源: 评论
A Performance Comparison Study of Parallel Clustering Algorithms in Cluster Environments  2
A Performance Comparison Study of Parallel Clustering Algori...
收藏 引用
2017 IEEE 2nd International Conference on Big data Analysis(ICBDA 2017)
作者: Mo Hai School of Information Central University of Finance and Economics Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China
We compare the performance of three parallel clustering algorithms:Canopy,K-means and fuzzy K-means in real cluster *** constructing cluster platform of different scale,we compare these algorithms from three metrics:r... 详细信息
来源: 评论
Provably secure and subliminal-free variant of Schnorr signature
Provably secure and subliminal-free variant of Schnorr signa...
收藏 引用
International Conference on Information and Communication Technology, ICT-EurAsia 2013
作者: Zhang, Yinghui Li, Hui Li, Xiaoqing Zhu, Hui Xidian University Xi'an 710071 China Network and Data Security Key Laboratory of Sichuan Province Chengdu 611731 China
Subliminal channels present a severe challenge to information security. Currently, subliminal channels still exist in Schnorr signature. In this paper, we propose a subliminal-free variant of Schnorr signature. In the... 详细信息
来源: 评论
IoT-Driven Predictive Analytics for Precision Harvest Timing with LightGBM Models
IoT-Driven Predictive Analytics for Precision Harvest Timing...
收藏 引用
Visual Analytics and data Visualization (ICVADV), International Conference on
作者: S. Lourdu Jame Chitra Sabapathy Ranganathan S.K. Saravanan Bharat Tidke E. Punarselvam M. Rajmohan Department of Electrical and Electronics Engineering SRM Institute of Science and Technology Kattankulathur Chennai Tamil Nadu India Mphasis Corporation Chennai Tamil Nadu India Department of Big Data and Network Security Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Saveetha University Chennai Tamil Nadu India Symbiosis Institute of Technology Nagpur Campus Symbiosis International (Deemed) University Pune India Department of Information Technology Muthayammal Engineering College (Autonomous) Namakkal Tamil Nadu India Department of Electronics and Communication Engineering Hindustan Institute of Technology and Science Chennai Tamil Nadu India
In agriculture, precise harvest time is essential to maximize production and quality. A predictive analytics system powered by the Internet of Things (IoT) and using LightGBM models for accurate harvest time determina... 详细信息
来源: 评论
Fault Diagnosis for Rolling Bearing Based on RF-LSTM
Fault Diagnosis for Rolling Bearing Based on RF-LSTM
收藏 引用
2021 CAA Symposium on Fault Detection, Supervision, and Safety for Technical Processes, SAFEPROCESS 2021
作者: Li, Qiuting Wang, Xiuqing Yang, Yunpeng Wang, Ruiyi Lv, Feng Hebei Normal University College of Computer and Cyber Security Shijiazhuang050024 China Hebei Provincial Key Laboratory of Network & Information Security Shijiazhuang China Hebei Provincial Engineering Research Center for Supply Chain Big Data Analytics & Data Security Shijiazhuang China
In the era of big data, it is of great significance to study data-driven fault diagnostic methods for equipment in complex industrial environments. In this paper, a data-driven fault diagnostic method for rolling bear... 详细信息
来源: 评论
Conditional selection with CNN augmented transformer for multimodal affective analysis
收藏 引用
CAAI Transactions on Intelligence Technology 2024年 第4期9卷 917-931页
作者: Jianwen Wang Shiping Wang Shunxin Xiao Renjie Lin Mianxiong Dong Wenzhong Guo College of Computer and Data Science Fuzhou UniversityFuzhouChina College of Computer and Cyber Security Fujian Normal UniversityFuzhouChina Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou UniversityFuzhouChina Digital Fujian Institute of Big Data Security Technology Fujian Normal UniversityFuzhouChina Department of Sciences and Informatics Muroran Institute of TechnologyMuroranJapan
Attention mechanism has been a successful method for multimodal affective analysis in recent years. Despite the advances, several significant challenges remain in fusing language and its nonverbal context information.... 详细信息
来源: 评论
Multi-scale hierarchical cross fusion network for hyperspectral image and LiDAR classification
收藏 引用
Journal of the Franklin Institute 2025年 第9期362卷
作者: Pan, Haizhu Li, Xuehu Ge, Haimiao Wang, Liguo Yu, Xiaomin College of Computer and Control Engineering Qiqihar University Qiqihar161000 China Heilongjiang Key Laboratory of Big Data Network Security Detection and Analysis Qiqihar University Qiqihar161000 China College of Information and Communication Engineering Dalian Nationalities University Dalian116000 China
As the satellite sensor technology continues to advance, acquiring hyperspectral images (HSI) and Light Detection and Ranging (LiDAR) data have become increasingly accessible. Consequently, the fusion of these two typ... 详细信息
来源: 评论
Overcoming the obstacles of zero-knowledge watermark detection
Overcoming the obstacles of zero-knowledge watermark detecti...
收藏 引用
Proceedings of the Multimedia and security Workshop 2004, MM and Sec'04
作者: Adelsbach, André Rohe, Markus Sadeghi, Ahmad-Reza Dept. of Network- and Data-Security Ruhr-Universität Bochum Bochum Germany Universität Saarbrücken Saarbrücken Germany Department of Applied Data Security Ruhr-Univeristät Bochum Bochum Germany
Standard watermarking schemes suffer from a major problem: They require to reveal security critical information to potentially untrusted parties, when proving the presence of a watermark to these parties. Zero-knowled... 详细信息
来源: 评论