咨询与建议

限定检索结果

文献类型

  • 424 篇 会议
  • 326 篇 期刊文献

馆藏范围

  • 750 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 475 篇 工学
    • 380 篇 计算机科学与技术...
    • 307 篇 软件工程
    • 124 篇 信息与通信工程
    • 81 篇 电气工程
    • 51 篇 生物工程
    • 50 篇 控制科学与工程
    • 44 篇 网络空间安全
    • 34 篇 电子科学与技术(可...
    • 32 篇 机械工程
    • 28 篇 安全科学与工程
    • 26 篇 生物医学工程(可授...
    • 23 篇 光学工程
    • 20 篇 交通运输工程
    • 18 篇 化学工程与技术
    • 14 篇 动力工程及工程热...
  • 202 篇 理学
    • 117 篇 数学
    • 61 篇 生物学
    • 39 篇 统计学(可授理学、...
    • 34 篇 物理学
    • 20 篇 化学
    • 15 篇 系统科学
  • 120 篇 管理学
    • 78 篇 管理科学与工程(可...
    • 55 篇 图书情报与档案管...
    • 32 篇 工商管理
  • 33 篇 医学
    • 28 篇 基础医学(可授医学...
    • 27 篇 临床医学
    • 26 篇 公共卫生与预防医...
  • 30 篇 法学
    • 18 篇 社会学
    • 13 篇 法学
  • 18 篇 经济学
    • 18 篇 应用经济学
  • 11 篇 农学
  • 8 篇 军事学
  • 5 篇 教育学
  • 1 篇 艺术学

主题

  • 33 篇 feature extracti...
  • 32 篇 semantics
  • 31 篇 accuracy
  • 26 篇 deep learning
  • 26 篇 privacy
  • 25 篇 training
  • 23 篇 federated learni...
  • 22 篇 computational mo...
  • 21 篇 data privacy
  • 18 篇 data models
  • 17 篇 neural networks
  • 14 篇 protocols
  • 14 篇 network security
  • 14 篇 cloud computing
  • 13 篇 predictive model...
  • 12 篇 internet of thin...
  • 12 篇 correlation
  • 12 篇 cryptography
  • 11 篇 image segmentati...
  • 11 篇 speech processin...

机构

  • 69 篇 shandong provinc...
  • 66 篇 key laboratory o...
  • 51 篇 tianjin key labo...
  • 49 篇 network and data...
  • 45 篇 shandong enginee...
  • 41 篇 college of compu...
  • 35 篇 college of cyber...
  • 24 篇 college of compu...
  • 19 篇 faculty of data ...
  • 19 篇 shandong fundame...
  • 18 篇 network and data...
  • 17 篇 state key labora...
  • 16 篇 tianjin key labo...
  • 16 篇 fujian provincia...
  • 15 篇 college of compu...
  • 13 篇 city university ...
  • 11 篇 shandong enginee...
  • 11 篇 college of compu...
  • 10 篇 key laboratory o...
  • 10 篇 school of inform...

作者

  • 16 篇 qin zhen
  • 15 篇 qin zhiguang
  • 13 篇 liu ximeng
  • 12 篇 li tao
  • 12 篇 jinbo xiong
  • 12 篇 wang bin
  • 12 篇 xiong jinbo
  • 12 篇 jia chunfu
  • 11 篇 liu jun
  • 11 篇 ding yi
  • 11 篇 jing zhao
  • 11 篇 zhen qin
  • 11 篇 fu fang-wei
  • 11 篇 youliang tian
  • 10 篇 tian youliang
  • 10 篇 liu bin
  • 10 篇 karsai márton
  • 10 篇 zhao dongmei
  • 9 篇 yi ding
  • 9 篇 luo minnan

语言

  • 700 篇 英文
  • 44 篇 其他
  • 7 篇 中文
检索条件"机构=Network and Data Security"
750 条 记 录,以下是81-90 订阅
排序:
Safe and Reliable Diffusion Models via Subspace Projection
arXiv
收藏 引用
arXiv 2025年
作者: Chen, Huiqiang Zhu, Tianqing Wang, Linlin Yu, Xin Gao, Longxiang Zhou, Wanlei Faculty of Data Science City University of Macau China School of Computer Science University of Queensland QLD Australia Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China
Large-scale text-to-image (T2I) diffusion models have revolutionized image generation, enabling the synthesis of highly detailed visuals from textual descriptions. However, these models may inadvertently generate inap... 详细信息
来源: 评论
Reverse-Nearest-Neighbor-Based Clustering by Fast Search and Find of Density Peaks
收藏 引用
Chinese Journal of Electronics 2023年 第6期32卷 1341-1354页
作者: ZHANG Chunhao XIE Bin ZHANG Yiran College of Computer and Cyber Security Hebei Normal University Hebei Provincial Engineering Research Center for Supply Chain Big Data Analytics and Data Security Hebei Normal University Hebei Provincial Key Laboratory of Network and Information Security Hebei Normal University
Clustering by fast search and find of density peaks(CFSFDP) has the advantages of a novel idea, easy implementation, and efficient clustering. It has been widely recognized in various fields since it was proposed in S... 详细信息
来源: 评论
The bug that made me president a browser- and web-security case study on helios voting
The bug that made me president a browser- and web-security c...
收藏 引用
3rd International Conference on E-Voting and Identity, VoteID 2011
作者: Heiderich, Mario Frosch, Tilman Niemietz, Marcus Schwenk, Jörg Department of Network and Data Security Ruhr-University Bochum Germany
This paper briefly describes security challenges for critical web applications such as the Helios Voting system. After analyzing the Helios demonstration website we discovered several small flaws that can have a large... 详细信息
来源: 评论
DRL-Based Time-Varying Workload Scheduling With Priority and Resource Awareness
收藏 引用
IEEE Transactions on network and Service Management 2025年
作者: Liu, Qifeng Fan, Qilin Zhang, Xu Li, Xiuhua Wang, Kai Xiong, Qingyu Chongqing University School of Big Data and Software Engineering Chongqing400044 China Chongqing University Key Laboratory of Dependable Service Computing in Cyber Physical Society of Ministry of Education Chongqing400044 China Nanjing University School of Electronic Science and Engineering Nanjing210023 China Haihe Laboratory of Information Technology Application Innovation Tianjin300072 China Harbin Institute of Technology School of Computer Science and Technology Weihai264209 China Shandong Key Laboratory of Industrial Network Security Weihai264209 China
With the proliferation of cloud services and the continuous growth in enterprises' demand for dynamic multi-dimensional resources, the implementation of effective strategy for time-varying workload scheduling has ... 详细信息
来源: 评论
CrossLinkNet: An Explainable and Trustworthy AI Framework for Whole-Slide Images Segmentation
收藏 引用
Computers, Materials & Continua 2024年 第6期79卷 4703-4724页
作者: Peng Xiao Qi Zhong Jingxue Chen Dongyuan Wu Zhen Qin Erqiang Zhou Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of ChinaChengdu610054China Faculty of Data Science City University of MacaoMacao999078China
In the intelligent medical diagnosis area,Artificial Intelligence(AI)’s trustworthiness,reliability,and interpretability are critical,especially in cancer *** neural networks,while excellent at processing natural ima... 详细信息
来源: 评论
Revisiting SGX-based Encrypted Deduplication via PoW-Before-Encryption and Eliminating Redundant Computations
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2024年 第3期22卷 2037-2053页
作者: Ha, Guanxiong Ge, Xiaowei Jia, Chunfu Chen, Yuchen Su, Zhen Nankai University Tianjin Key Laboratory of Network and Data Security Technology DISSEC College of Cyber Science Tianjin300350 China
Encrypted deduplication is attractive for outsourced storage as it provides both data confidentiality and storage savings. Conventional encrypted deduplication schemes protect data confidentiality based on expensive c... 详细信息
来源: 评论
Poster: A footprint of third-party tracking on mobile web  13
Poster: A footprint of third-party tracking on mobile web
收藏 引用
2013 ACM SIGSAC Conference on Computer and Communications security, CCS 2013
作者: Javed, Ashar Department of Network and Data Security Ruhr University Bochum Bochum Germany
In this paper, we investigate the footprints of third-party tracking on the mobile web. The survey of 100 popular mobile versions of web applications indicates that third-party tracking is also prevalent on mobile web... 详细信息
来源: 评论
AdaptFRCNet: Semi-supervised adaptation of pre-trained model with frequency and region consistency for medical image segmentation
收藏 引用
Medical Image Analysis 2025年 103卷 103626页
作者: He, Along Wu, Yanlin Wang, Zhihong Li, Tao Fu, Huazhu College of Computer Science Tianjin Key Laboratory of Network and Data Security Technology Nankai University Tianjin300350 China 138632 Singapore Haihe Lab of ITAI Tianjin300459 China
Recently, large pre-trained models (LPM) have achieved great success, which provides rich feature representation for downstream tasks. Pre-training and then fine-tuning is an effective way to utilize LPM. However, the... 详细信息
来源: 评论
Correctness verification in database outsourcing: A trust-based fake tuples approach
Correctness verification in database outsourcing: A trust-ba...
收藏 引用
8th International Conference on Information Systems security, ICISS 2012
作者: Ghasemi, Simin Noferesti, Morteza Hadavi, Mohammad Ali Nogoorani, Sadegh Dorri Jalili, Rasool Data and Network Security Lab Sharif University of Technology Tehran Iran
An important security challenge in database outsourcing scenarios is the correctness verification of query results. The proposed approaches in the literature, impose high overhead on both the service provider and spec... 详细信息
来源: 评论
Modelling simultaneous mutual authentication for authenticated key exchange
Modelling simultaneous mutual authentication for authenticat...
收藏 引用
6th International Symposium on Foundations and Practice of security, FPS 2013
作者: Yang, Zheng Horst Görtz Institute for IT Security Department for Network- and Data Security Ruhr-University Bochum Germany
Most recent security models for authenticated key exchange (AKE) do not explicitly model the entity authentication, which enables a party to identify its communication peer in specific session. However, it is quite ne... 详细信息
来源: 评论