咨询与建议

限定检索结果

文献类型

  • 1,391 篇 会议
  • 950 篇 期刊文献
  • 9 册 图书

馆藏范围

  • 2,350 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,478 篇 工学
    • 1,122 篇 计算机科学与技术...
    • 897 篇 软件工程
    • 384 篇 信息与通信工程
    • 194 篇 电气工程
    • 175 篇 控制科学与工程
    • 120 篇 生物工程
    • 118 篇 电子科学与技术(可...
    • 107 篇 机械工程
    • 101 篇 网络空间安全
    • 79 篇 生物医学工程(可授...
    • 70 篇 光学工程
    • 70 篇 安全科学与工程
    • 52 篇 交通运输工程
    • 51 篇 化学工程与技术
    • 47 篇 仪器科学与技术
    • 41 篇 动力工程及工程热...
  • 608 篇 理学
    • 327 篇 数学
    • 139 篇 物理学
    • 139 篇 生物学
    • 100 篇 统计学(可授理学、...
    • 55 篇 系统科学
    • 50 篇 化学
  • 384 篇 管理学
    • 252 篇 管理科学与工程(可...
    • 147 篇 图书情报与档案管...
    • 95 篇 工商管理
  • 91 篇 医学
    • 74 篇 临床医学
    • 61 篇 基础医学(可授医学...
  • 81 篇 法学
    • 48 篇 社会学
    • 35 篇 法学
  • 40 篇 经济学
    • 39 篇 应用经济学
  • 18 篇 教育学
  • 17 篇 农学
  • 16 篇 军事学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 98 篇 feature extracti...
  • 84 篇 accuracy
  • 68 篇 semantics
  • 66 篇 information secu...
  • 57 篇 security
  • 57 篇 training
  • 53 篇 computational mo...
  • 53 篇 federated learni...
  • 50 篇 data models
  • 46 篇 authentication
  • 45 篇 computer network...
  • 44 篇 deep learning
  • 43 篇 internet
  • 43 篇 protocols
  • 38 篇 privacy
  • 37 篇 blockchain
  • 36 篇 internet of thin...
  • 35 篇 robustness
  • 34 篇 computer science
  • 34 篇 cryptography

机构

  • 210 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 84 篇 research center ...
  • 49 篇 shandong fundame...
  • 48 篇 school of cyber ...
  • 46 篇 shandong enginee...
  • 41 篇 computer network...
  • 41 篇 institute of inf...
  • 39 篇 national compute...
  • 34 篇 shandong provinc...
  • 33 篇 beijing national...
  • 29 篇 department of co...
  • 28 篇 guilin huigu ins...
  • 27 篇 qilu university ...
  • 26 篇 school of comput...
  • 25 篇 institute for ne...
  • 24 篇 guilin universit...
  • 24 篇 national compute...
  • 22 篇 school of comput...
  • 22 篇 school of cyber ...

作者

  • 43 篇 das ashok kumar
  • 30 篇 luo xiaonan
  • 25 篇 zhang hongli
  • 20 篇 fang binxing
  • 19 篇 ashok kumar das
  • 18 篇 ding yong
  • 17 篇 li ji
  • 17 篇 wei sun
  • 17 篇 xiaorui zhang
  • 17 篇 xiaoming wu
  • 16 篇 xiong ke
  • 16 篇 mahmood khalid
  • 16 篇 jin hai
  • 15 篇 fan pingyi
  • 14 篇 tian zhihong
  • 14 篇 xiangzhi liu
  • 14 篇 wang yujue
  • 14 篇 binxing fang
  • 14 篇 wei zhang
  • 14 篇 yang ming

语言

  • 2,209 篇 英文
  • 84 篇 其他
  • 62 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Research Center of Computer Network and Information Security Technology"
2350 条 记 录,以下是1-10 订阅
排序:
Fusion of Time-Frequency Features in Contrastive Learning for Shipboard Wind Speed Correction
收藏 引用
Journal of Ocean University of China 2025年 第2期24卷 377-386页
作者: SONG Jian HUANG Meng LI Xiang ZHANG Zhenqiang WANG Chunxiao ZHAO Zhigang Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science Center(National Supercomputer Center in Jinan)Qilu University of Technology(Shandong Academy of Sciences)Jinan 250000China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer ScienceJinan 250000China
Accurate wind speed measurements on maritime vessels are crucial for weather forecasting,sea state prediction,and safe ***,vessel motion and challenging environmental conditions often affect measurement *** address th... 详细信息
来源: 评论
Multiple Edge Data Integrity Verification with Multi-Vendors and Multi-Servers in Mobile Edge Computing
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第6期24卷 4668-4683页
作者: Islam, Md Rashedul Xiang, Yong Uddin, Md Palash Zhao, Yao Kua, Jonathan Gao, Longxiang The School of Information Technology Deakin University GeelongVIC3220 Australia The Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Ensuring Edge Data Integrity (EDI) is imperative in providing reliable and low-latency services in mobile edge computing. Existing EDI schemes typically address single-vendor (App Vendor, AV) single-server (Edge Serve... 详细信息
来源: 评论
Enhancing Malware Detection Resilience:A U-Net GAN Denoising Framework for Image-Based Classification
收藏 引用
computers, Materials & Continua 2025年 第3期82卷 4263-4285页
作者: Huiyao Dong Igor Kotenko Faculty of Information Technology and Security ITMO National Research UniversitySt.Petersburg197101Russia Laboratory of Computer Security Problems St.Petersburg Federal Research Center of the Russian Academy of SciencesSt.Petersburg199178Russia
The growing complexity of cyber threats requires innovative machine learning techniques,and image-based malware classification opens up new ***,existing research has largely overlooked the impact of noise and obfuscat... 详细信息
来源: 评论
A circuit area optimization of MK-3 S-box
收藏 引用
Cybersecurity 2025年 第1期8卷 61-71页
作者: Yanjun Li Weiguo Zhang Yiping Lin Jian Zou Jian Liu Information Industry Information Security Evaluation Center The 15th Research Institute of China Electronic Technology Group CorporationBeijing 100083China Henan Key Laboratory of Network Cryptography Technology Zhengzhou 450001China Beijing Electronic Science and Technology Institute No.7 Fufeng RoadFengtai DistricBeijing 100083China College of Computer and Data Science Fuzhou UniversityFuzhou 350108China
In MILCOM 2015,Kelly et *** the authentication encryption algorithm MK-3,which applied the 16-bit *** paper aims to implement the 16-bit S-box with less circuit ***,we classifed the irreducible polynomials over F_(2n)... 详细信息
来源: 评论
MSCACodec: A Low-Rate Neural Speech Codec With Multi-scale Residual Channel Attention  21st
MSCACodec: A Low-Rate Neural Speech Codec With Multi-scale R...
收藏 引用
21st Pacific Rim International Conference on Artificial Intelligence, PRICAI 2024
作者: Yu, Xingye Li, Ye Zhang, Peng Lin, Lingxia Cai, Tianyu Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
In the development of modern communication technology, although wideband speech coding provides high-fidelity speech transmission, its high bandwidth requirement limits its application in resource-constrained environm... 详细信息
来源: 评论
kProtoClust:Towards Adaptive k-Prototype Clustering without Known k
收藏 引用
computers, Materials & Continua 2025年 第3期82卷 4949-4976页
作者: Yuan Ping Huina Li Chun Guo Bin Hao School of Information Engineering Xuchang UniversityXuchang461000China Henan Province Engineering Technology Research Center of Big Data Security andApplications Xuchang461000China College of Computer Science and Technology Guizhou UniversityGuiyang550025China Here Data Technology Shenzhen518000China
Towards optimal k-prototype discovery,k-means-like algorithms give us inspirations of central samples collection,yet the unstable seed samples selection,the hypothesis of a circle-like pattern,and the unknown K are st... 详细信息
来源: 评论
Defending Against Poisoning Attacks in Federated Prototype Learning on Non-IID Data  18th
Defending Against Poisoning Attacks in Federated Prototype ...
收藏 引用
18th International Conference on Wireless Artificial Intelligent Computing Systems and Applications, WASA 2024
作者: Zhang, Jie Zhang, Hongliang Wang, Guijuan Dong, Anming Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan250353 China
Federated learning (FL) is an emerging distributed machine learning paradigm that enables participants to cooperatively train learning tasks without revealing the raw data. However, the distributed nature of FL makes ... 详细信息
来源: 评论
On-Device AI security Solutions: A Study on Lightweight Ensemble Learning Technique  17
On-Device AI Security Solutions: A Study on Lightweight Ense...
收藏 引用
17th International Conference on COMmunication Systems and networkS, COMSNETS 2025
作者: Dong, Huiyao Kotenko, Igor ITMO University Faculty of Information Technology and Security Saint Petersburg Russia St. Petersburg Federal Research Center of the RAS Laboratory of Computer Security Problems Saint Petersburg Russia
IoT security poses a significant challenge due to the presence of extensive confidential data and vulnerable devices. Artificial intelligence (AI) is increasingly viewed as pivotal in cybersecurity, enhancing the effi... 详细信息
来源: 评论
LEGF-DST:LLMs-Enhanced Graph-Fusion Dual-Stream Transformer for Fine-Grained Chinese Malicious SMS Detection
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 1901-1924页
作者: Xin Tong Jingya Wang Ying Yang Tian Peng Hanming Zhai Guangming Ling School of Information and Cybersecurity People’s Public Security University of ChinaBeijing100038China Cyber Investigation Technology Research and Development Center The Third Research Institute of the Ministry of Public SecurityShanghai201204China Department of Cybersecurity Defense Beijing Police CollegeBeijing102202China School of Computer Science Henan Institute of EngineeringZhengzhou451191China
With the widespread use of SMS(Short Message Service),the proliferation of malicious SMS has emerged as a pressing societal *** deep learning-based text classifiers offer promise,they often exhibit suboptimal performa... 详细信息
来源: 评论
Source-free Domain Adaptation with Multiple Alignment for Efficient Image Retrieval
Source-free Domain Adaptation with Multiple Alignment for Ef...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Ni, Jinghui Cui, Hui Zhao, Lihai Li, Fengling Han, Xiaohui Xu, Lijuan Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science China Quan Cheng Laboratory China Shandong Open University China University of Technology Sydney Australia
Domain adaptation techniques help models generalize to target domains by addressing domain discrepancies between the source and target domain data distributions. These techniques are particularly valuable for cross-do... 详细信息
来源: 评论