咨询与建议

限定检索结果

文献类型

  • 383 篇 会议
  • 283 篇 期刊文献

馆藏范围

  • 666 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 421 篇 工学
    • 346 篇 计算机科学与技术...
    • 288 篇 软件工程
    • 107 篇 信息与通信工程
    • 81 篇 电气工程
    • 48 篇 控制科学与工程
    • 42 篇 生物工程
    • 36 篇 电子科学与技术(可...
    • 36 篇 网络空间安全
    • 24 篇 生物医学工程(可授...
    • 22 篇 安全科学与工程
    • 21 篇 机械工程
    • 21 篇 光学工程
    • 16 篇 交通运输工程
    • 13 篇 建筑学
    • 13 篇 化学工程与技术
    • 12 篇 仪器科学与技术
  • 186 篇 理学
    • 117 篇 数学
    • 52 篇 生物学
    • 40 篇 统计学(可授理学、...
    • 29 篇 物理学
    • 18 篇 化学
  • 104 篇 管理学
    • 67 篇 管理科学与工程(可...
    • 48 篇 图书情报与档案管...
    • 22 篇 工商管理
  • 30 篇 法学
    • 17 篇 社会学
    • 14 篇 法学
  • 22 篇 医学
    • 18 篇 基础医学(可授医学...
    • 18 篇 临床医学
    • 15 篇 公共卫生与预防医...
  • 14 篇 经济学
    • 14 篇 应用经济学
  • 10 篇 农学
  • 7 篇 军事学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 32 篇 semantics
  • 31 篇 feature extracti...
  • 26 篇 privacy
  • 25 篇 federated learni...
  • 25 篇 accuracy
  • 21 篇 data privacy
  • 21 篇 computational mo...
  • 20 篇 training
  • 19 篇 deep learning
  • 16 篇 data models
  • 15 篇 neural networks
  • 13 篇 servers
  • 13 篇 cloud computing
  • 12 篇 anomaly detectio...
  • 12 篇 protocols
  • 12 篇 network security
  • 11 篇 image segmentati...
  • 11 篇 visualization
  • 11 篇 security
  • 11 篇 encryption

机构

  • 70 篇 shandong provinc...
  • 66 篇 key laboratory o...
  • 52 篇 tianjin key labo...
  • 47 篇 network and data...
  • 45 篇 shandong enginee...
  • 41 篇 college of compu...
  • 35 篇 college of cyber...
  • 22 篇 college of compu...
  • 19 篇 shandong fundame...
  • 18 篇 network and data...
  • 18 篇 faculty of data ...
  • 18 篇 state key labora...
  • 17 篇 tianjin key labo...
  • 16 篇 fujian provincia...
  • 15 篇 college of compu...
  • 14 篇 school of comput...
  • 13 篇 advanced cryptog...
  • 12 篇 city university ...
  • 11 篇 shandong enginee...
  • 11 篇 school of inform...

作者

  • 16 篇 qin zhen
  • 15 篇 qin zhiguang
  • 14 篇 liu ximeng
  • 12 篇 jinbo xiong
  • 12 篇 xiong jinbo
  • 11 篇 li tao
  • 11 篇 jing zhao
  • 11 篇 zhen qin
  • 11 篇 youliang tian
  • 11 篇 jia chunfu
  • 10 篇 liu jun
  • 10 篇 ding yi
  • 10 篇 tian youliang
  • 10 篇 fu fang-wei
  • 10 篇 liu bin
  • 10 篇 zhao dongmei
  • 9 篇 yi ding
  • 9 篇 zhenyu yang
  • 9 篇 zhang hongbin
  • 8 篇 huang yuanyuan

语言

  • 617 篇 英文
  • 42 篇 其他
  • 8 篇 中文
检索条件"机构=Network and Data Security Key Laboratory of Sichuan"
666 条 记 录,以下是1-10 订阅
排序:
CrossLinkNet: An Explainable and Trustworthy AI Framework for Whole-Slide Images Segmentation
收藏 引用
Computers, Materials & Continua 2024年 第6期79卷 4703-4724页
作者: Peng Xiao Qi Zhong Jingxue Chen Dongyuan Wu Zhen Qin Erqiang Zhou Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of ChinaChengdu610054China Faculty of Data Science City University of MacaoMacao999078China
In the intelligent medical diagnosis area,Artificial Intelligence(AI)’s trustworthiness,reliability,and interpretability are critical,especially in cancer *** neural networks,while excellent at processing natural ima... 详细信息
来源: 评论
Blockchain and signcryption enabled asynchronous federated learning framework in fog computing
收藏 引用
Digital Communications and networks 2025年 第2期11卷 442-454页
作者: Zhou Zhou Youliang Tian Jinbo Xiong Changgen Peng Jing Li Nan Yang State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fujian Normal University Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology
Federated learning combines with fog computing to transform data sharing into model sharing, which solves the issues of data isolation and privacy disclosure in fog computing. However, existing studies focus on centra... 详细信息
来源: 评论
An Enhanced Clustering-Based (k, t)-Anonymity Algorithm for Graphs
收藏 引用
Chinese Journal of Electronics 2025年 第1期34卷 365-372页
作者: Yuanyuan Wang Xing Zhang Zhiguang Chu Wei Shi Xiang Li School of Electronics and Information Engineering Liaoning University of Technology Key Laboratory of Security for Network and Data in Industrial Internet of Liaoning Province Faculty of Information Technology Beijing University of Technology
As people become increasingly reliant on the Internet, securely storing and publishing private data has become an important issue. In real life, the release of graph data can lead to privacy breaches, which is a highl... 详细信息
来源: 评论
Research on the mechanical fault diagnosis method based on sound signal and IEMD-DDCNN
收藏 引用
International Journal of Intelligent Computing and Cybernetics 2023年 第3期16卷 629-646页
作者: Haoning Pu Zhan Wen Xiulan Sun Lemei Han Yanhe Na Hantao Liu Wenzao Li Chengdu University of Information Technology ChengduChina Education Department of Sichuan Province Education Informatization and Big Data CenterChengduChina Network and Data Security Key Laboratory of Sichuan Province UESTCChengduChina
Purpose–The purpose of this paper is to provide a shorter time cost,high-accuracy fault diagnosis method for water *** pumps are widely used in industrial equipment and their fault diagnosis is gaining increasing ***... 详细信息
来源: 评论
Block-gram:Mining knowledgeable features for efficiently smart contract vulnerability detection
收藏 引用
Digital Communications and networks 2025年 第1期11卷 1-12页
作者: Xueshuo Xie Haolong Wang Zhaolong Jian Yaozheng Fang Zichun Wang Tao Li Tianjin Key Laboratory of Network and Data Security Technology TianjinChina College of Computer Science Nankai UniversityTianjinChina Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province China State Key Laboratory of Computer Architecture Institute of Computing TechnologyChinese Academy of SciencesChina
Smart contracts are widely used on the blockchain to implement complex transactions,such as decentralized applications on *** vulnerability detection of large-scale smart contracts is critical,as attacks on smart cont... 详细信息
来源: 评论
SSpose: Self-Supervised Spatial-Aware Model for Human Pose Estimation
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第11期5卷 5403-5417页
作者: Yu, Linfang Qin, Zhen Xu, Liqun Qin, Zhiguang Choo, Kim-Kwang Raymond University of Electronic Science and Technology of China Network and Data Security Key Laboratory of Sichuan Province Chengdu610054 China Industrial Research Institute Chengdu610213 China University of Electronic Science and Technology of China Network and Data Security Key Laboratory of Sichuan Province School of Information and Software Engineering Chengdu610054 China Industrial Research Institute Chengdu610213 China University of Texas at San Antonio Department of Information Systems and Cyber Security San AntonioTX78249 United States
Human pose estimation (HPE) relies on the anatomical relationships among different body parts to locate keypoints. Despite the significant progress achieved by convolutional neural networks (CNN)-based models in HPE, ... 详细信息
来源: 评论
Threat Model and Defense Scheme for Side-Channel Attacks in Client-Side Deduplication
收藏 引用
Tsinghua Science and Technology 2023年 第1期28卷 1-12页
作者: Guanxiong Ha Hang Chen Chunfu Jia Mingyue Li College of Cyber Science Nankai UniversityTianjin 300350China Tianjin Key Laboratory of Network and Data Security Technology Tianjin 300350China
In cloud storage,client-side deduplication is widely used to reduce storage and communication *** client-side deduplication,if the cloud server detects that the user’s outsourced data have been stored,then clients wi... 详细信息
来源: 评论
Heterogeneous Fault-Tolerant Aggregate Signcryption with Equality Test for Vehicular Sensor networks
收藏 引用
Computer Modeling in Engineering & Sciences 2023年 第10期137卷 555-575页
作者: Yang Zhao Jingmin An Hao Li Saru Kumari Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of ChinaChengdu610054China Department of Mathematics Chaudhary Charan Singh UniversityMeerut250004India
The vehicular sensor network (VSN) is an important part of intelligent transportation, which is used for real-timedetection and operation control of vehicles and real-time transmission of data and information. In the ... 详细信息
来源: 评论
A Linked List Encryption Scheme for Image Steganography without Embedding
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第10期141卷 331-352页
作者: Pengbiao Zhao Qi Zhong Jingxue Chen Xiaopei Wang Zhen Qin Erqiang Zhou Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of ChinaChengdu610054China Faculty of Data Science City University of MacaoMacao999078China Department of Computer Science and Engineering University of CaliforniaRiversideCA 92521USA
Information steganography has received more and more attention from scholars nowadays,especially in the area of image steganography,which uses image content to transmit information and makes the existence of secret in... 详细信息
来源: 评论
Enhanced Privacy-Preserving WiFi Fingerprint Localization from CL Encryption
收藏 引用
Chinese Journal of Electronics 2024年 第6期33卷 1435-1446页
作者: Zhiwei WANG Qiuchi ZHU Zhenqi ZHANG School of Computer Nanjing University of Posts and Telecommunications State Key Laboratory of Public Big Data Guizhou University Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu University of Information Engineering Key Laboratory of Computational Science and Application of Hainan Province Hainan Normal University
The WiFi fingerprint-based localization method is considered one of the most popular techniques for indoor localization. In INFOCOM'14, Li et al. proposed a wireless fidelity(WiFi) fingerprint localization system ... 详细信息
来源: 评论