咨询与建议

限定检索结果

文献类型

  • 424 篇 会议
  • 332 篇 期刊文献

馆藏范围

  • 756 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 470 篇 工学
    • 374 篇 计算机科学与技术...
    • 303 篇 软件工程
    • 116 篇 信息与通信工程
    • 75 篇 电气工程
    • 51 篇 生物工程
    • 42 篇 控制科学与工程
    • 42 篇 网络空间安全
    • 34 篇 机械工程
    • 28 篇 生物医学工程(可授...
    • 28 篇 安全科学与工程
    • 27 篇 电子科学与技术(可...
    • 23 篇 光学工程
    • 20 篇 交通运输工程
    • 18 篇 化学工程与技术
    • 14 篇 仪器科学与技术
    • 14 篇 动力工程及工程热...
  • 202 篇 理学
    • 116 篇 数学
    • 61 篇 生物学
    • 38 篇 统计学(可授理学、...
    • 36 篇 物理学
    • 20 篇 化学
    • 15 篇 系统科学
  • 121 篇 管理学
    • 79 篇 管理科学与工程(可...
    • 54 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 36 篇 医学
    • 31 篇 临床医学
    • 30 篇 基础医学(可授医学...
    • 28 篇 公共卫生与预防医...
  • 29 篇 法学
    • 18 篇 社会学
  • 18 篇 经济学
    • 18 篇 应用经济学
  • 11 篇 农学
  • 8 篇 军事学
  • 6 篇 教育学
  • 1 篇 艺术学

主题

  • 33 篇 feature extracti...
  • 32 篇 semantics
  • 31 篇 accuracy
  • 26 篇 deep learning
  • 26 篇 privacy
  • 25 篇 training
  • 23 篇 federated learni...
  • 22 篇 computational mo...
  • 21 篇 data privacy
  • 18 篇 data models
  • 17 篇 neural networks
  • 15 篇 network security
  • 14 篇 protocols
  • 14 篇 cloud computing
  • 13 篇 predictive model...
  • 12 篇 internet of thin...
  • 12 篇 image segmentati...
  • 12 篇 correlation
  • 12 篇 cryptography
  • 11 篇 speech processin...

机构

  • 69 篇 shandong provinc...
  • 66 篇 key laboratory o...
  • 51 篇 tianjin key labo...
  • 49 篇 network and data...
  • 45 篇 shandong enginee...
  • 41 篇 college of compu...
  • 35 篇 college of cyber...
  • 22 篇 college of compu...
  • 20 篇 shandong fundame...
  • 19 篇 faculty of data ...
  • 18 篇 network and data...
  • 18 篇 state key labora...
  • 17 篇 fujian provincia...
  • 16 篇 tianjin key labo...
  • 15 篇 college of compu...
  • 14 篇 city university ...
  • 11 篇 shandong enginee...
  • 10 篇 key laboratory o...
  • 10 篇 school of inform...
  • 10 篇 college of compu...

作者

  • 17 篇 qin zhen
  • 15 篇 qin zhiguang
  • 14 篇 liu ximeng
  • 13 篇 xiong jinbo
  • 12 篇 jinbo xiong
  • 12 篇 zhen qin
  • 12 篇 fu fang-wei
  • 12 篇 jia chunfu
  • 11 篇 liu jun
  • 11 篇 li tao
  • 11 篇 ding yi
  • 11 篇 jing zhao
  • 11 篇 wang bin
  • 11 篇 tian youliang
  • 11 篇 youliang tian
  • 10 篇 liu bin
  • 10 篇 karsai márton
  • 10 篇 zhao dongmei
  • 9 篇 yi ding
  • 9 篇 luo minnan

语言

  • 706 篇 英文
  • 44 篇 其他
  • 7 篇 中文
检索条件"机构=Network and Data Security"
756 条 记 录,以下是21-30 订阅
排序:
Privacy-Enhanced Role-Based Access Control for IoT Systems
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Zhang, Yawei Chen, Lanxiang Zhu, Yizhao Fujian Normal University Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fuzhou350117 China City University of Macau Faculty of Data Science China
Unauthorized accessing private information poses a significant security risk in IoT. Although role-based access control can partially address the problem, there is a lack of studies on protecting the privacy of roles.... 详细信息
来源: 评论
Unveiling the Superiority of Unsupervised Learning on GPU Cryptojacking Detection: Practice on Magnetic Side Channel-based Mechanism
收藏 引用
IEEE Transactions on Information Forensics and security 2025年 20卷 4874-4889页
作者: Cao, Hangcheng Xu, Guowen He, Ziyang Shi, Shaoqing Xu, Shengmin Wu, Cong Ning, Jianting Hunan University College of Computer Science and Electronic Engineering China City University of Hong Kong Department of Computer Science Hong Kong University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu China Zhengzhou University School of Cyber Science and Engineering Zhengzhou China Zhengzhou University International College Zhengzhou China Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fuzhou China Nanyang Technological University College of Computing and Data Science Singapore Wuhan University School of Cyber Science and Engineering Wuhan China City University of Macau Faculty of Data Science China
Ample profits of GPU cryptojacking attract hackers to recklessly invade victims’ devices, for completing specific cryptocurrency mining tasks. Such malicious invasion undoubtedly obstructs normal device usage and was... 详细信息
来源: 评论
A circuit area optimization of MK-3 S-box
收藏 引用
Cybersecurity 2025年 第1期8卷 61-71页
作者: Yanjun Li Weiguo Zhang Yiping Lin Jian Zou Jian Liu Information Industry Information Security Evaluation Center The 15th Research Institute of China Electronic Technology Group CorporationBeijing 100083China Henan Key Laboratory of Network Cryptography Technology Zhengzhou 450001China Beijing Electronic Science and Technology Institute No.7 Fufeng RoadFengtai DistricBeijing 100083China College of Computer and Data Science Fuzhou UniversityFuzhou 350108China
In MILCOM 2015,Kelly et *** the authentication encryption algorithm MK-3,which applied the 16-bit *** paper aims to implement the 16-bit S-box with less circuit ***,we classifed the irreducible polynomials over F_(2n)... 详细信息
来源: 评论
Secure Similar Adjacent Vertex Query on Sparse Graph data in Cloud Environment  8th
Secure Similar Adjacent Vertex Query on Sparse Graph Data i...
收藏 引用
8th International Congress on Edge Computing, EDGE 2024, Held as Part of the Services Conference Federation, SCF 2024
作者: Tian, Yun Wu, Bin Shi, Jiaoli Zhang, Caicai Xu, Du School of Computer and Big Data Science Jiujiang University Jiujiang332005 China Jiujiang Key Laboratory of Network and Information Security Jiujiang332005 China School of Modern Information Technology Zhejiang Polytechnic University of Mechanical and Electrical Engineering Hangzhou310053 China
The development of cloud computing and the widespread application of cloud services have made outsourcing services more convenient. The need for individuals and businesses to store and manipulate the graph data they g... 详细信息
来源: 评论
Get the Punchline: Headline-Centric Multi-View Learning for Personalized Headline Generation
IEEE Transactions on Audio, Speech and Language Processing
收藏 引用
IEEE Transactions on Audio, Speech and Language Processing 2025年 33卷 962-973页
作者: Wenya Guo Shenglong Yu Ying Zhang Zhengkun Zhang Xiaojie Yuan College of Computer Science Nankai University Tianjin China Tianjin Key Laboratory of Network and Data Security Technology College of Cyber Science Nankai University Tianjin China
Personalized news headline generation aims to generate a user-specific headline based on their reading histories. Existing approaches incorporate information from various aspects of news articles, which leads to a lac... 详细信息
来源: 评论
Understanding User Passwords through Parsing Tree
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Wang, Ding Shan, Xuan Wu, Yuxuan Jia, Chunfu Nankai University College of Cryptology and Cyber Science Tianjin300350 China Ministry of Education of China Henan Key Laboratory of Network Cryptography Key Laboratory of Cyberspace Security China Nankai University Tianjin Key Laboratory of Network and Data Security Technology Tianjin300350 China
Passwords are today's dominant form of authentication, and password guessing is the most effective method for evaluating password strength. Most password guessing models (e.g., PCFG, Markov, and RFGuess) regard pa... 详细信息
来源: 评论
POINTERGUESS: targeted password guessing model using pointer mechanism  24
POINTERGUESS: targeted password guessing model using pointer...
收藏 引用
Proceedings of the 33rd USENIX Conference on security Symposium
作者: Kedong Xiu Ding Wang College of Cyber Science Nankai University Tianjin China and Key Laboratory of Data and Intelligent System Security (NKU) Ministry of Education Tianjin China and Tianjin Key Laboratory of Network and Data Security Technology Nankai University Tianjin China
Most existing targeted password guessing models view users' reuse behaviors as sequences of edit operations (e.g., insert and delete) performed on old passwords. These atomic edit operations are limited to modifyi...
来源: 评论
DSDIR: A Two-Stage Method for Addressing Noisy Long-Tailed Problems in Malicious Traffic Detection
DSDIR: A Two-Stage Method for Addressing Noisy Long-Tailed P...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Guoliang Li Ruiqi Zhang Zhe Sun Lingkai Xing Yu Zhang College of Cyber Science Nankai University China Tianjin Key Laboratory of Network and Data Security Technology China Key Laboratory of Data and Intelligent System Security Ministry of Education China College of Computer Science Nankai University China
In recent years, deep learning based malicious traffic detection (MTD) systems have demonstrated remarkable success. However, their effectiveness tend to decrease because most malicious traffic datasets are suffered f... 详细信息
来源: 评论
Spatial-Temporal Reconstruction Error for AIGC-based Forgery Image Detection
Spatial-Temporal Reconstruction Error for AIGC-based Forgery...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Chengji Shen Zhenjiang Liu Kaixuan Chen Jie Lei Mingli Song Zunlei Feng State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security Idlefish Network Technology Alibaba Group College of Computer Science and Technology Zhejiang University of Technology
The remarkable success of AI-Generated Content (AIGC), especially diffusion image generation models, brings about unprecedented creative applications, but also creates fertile ground for malicious counterfeiting and c... 详细信息
来源: 评论
TransMatch: Employing Bridging Strategy to Overcome Large Deformation for Feature Matching in Gastroscopy Scenario
收藏 引用
IEEE Transactions on Medical Imaging 2025年 PP卷 PP页
作者: Zhu, Guosong Qin, Zhen Yu, Linfang Ding, Yi Qin, Zhiguang University of Electronic Science and Technology of China Network and Data Security Key Laboratory of Sichuan Province Chengdu611731 China Industrial Research Institute Chengdu610000 China
Feature matching is widely applied in the image processing field. However, both traditional feature matching methods and previous deep learning-based methods struggle to accurately match the features with severe defor... 详细信息
来源: 评论