咨询与建议

限定检索结果

文献类型

  • 736 篇 会议
  • 568 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,305 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 874 篇 工学
    • 697 篇 计算机科学与技术...
    • 564 篇 软件工程
    • 225 篇 信息与通信工程
    • 143 篇 电气工程
    • 88 篇 生物工程
    • 81 篇 控制科学与工程
    • 66 篇 电子科学与技术(可...
    • 66 篇 网络空间安全
    • 42 篇 安全科学与工程
    • 40 篇 机械工程
    • 36 篇 生物医学工程(可授...
    • 34 篇 光学工程
    • 28 篇 仪器科学与技术
    • 27 篇 化学工程与技术
    • 26 篇 交通运输工程
    • 22 篇 动力工程及工程热...
  • 405 篇 理学
    • 239 篇 数学
    • 95 篇 生物学
    • 86 篇 物理学
    • 77 篇 统计学(可授理学、...
    • 38 篇 系统科学
    • 26 篇 化学
  • 243 篇 管理学
    • 138 篇 管理科学与工程(可...
    • 118 篇 图书情报与档案管...
    • 47 篇 工商管理
  • 50 篇 法学
    • 28 篇 法学
    • 23 篇 社会学
  • 36 篇 医学
    • 31 篇 临床医学
    • 29 篇 基础医学(可授医学...
  • 27 篇 经济学
    • 27 篇 应用经济学
  • 14 篇 军事学
  • 7 篇 教育学
  • 7 篇 农学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 44 篇 cryptography
  • 43 篇 feature extracti...
  • 41 篇 accuracy
  • 40 篇 authentication
  • 38 篇 cloud computing
  • 38 篇 privacy
  • 34 篇 semantics
  • 34 篇 security
  • 33 篇 deep learning
  • 31 篇 computational mo...
  • 31 篇 network security
  • 27 篇 federated learni...
  • 26 篇 data privacy
  • 26 篇 data models
  • 25 篇 training
  • 23 篇 protocols
  • 22 篇 servers
  • 21 篇 robustness
  • 20 篇 blockchain
  • 20 篇 encryption

机构

  • 44 篇 school of comput...
  • 41 篇 key laboratory o...
  • 37 篇 shandong provinc...
  • 37 篇 school of comput...
  • 33 篇 shaanxi key labo...
  • 30 篇 school of comput...
  • 29 篇 school of comput...
  • 28 篇 shaanxi key labo...
  • 26 篇 school of cyber ...
  • 25 篇 purple mountain ...
  • 23 篇 school of comput...
  • 22 篇 school of comput...
  • 21 篇 school of comput...
  • 21 篇 school of cyber ...
  • 18 篇 school of comput...
  • 17 篇 school of mathem...
  • 17 篇 school of comput...
  • 17 篇 shaanxi key labo...
  • 16 篇 institute of inf...
  • 16 篇 institute of net...

作者

  • 26 篇 yichuan wang
  • 24 篇 xinhong hei
  • 24 篇 xu li
  • 23 篇 meng deyu
  • 20 篇 wang yichuan
  • 18 篇 cao xiangyong
  • 17 篇 shen yulong
  • 16 篇 di xiaoqiang
  • 16 篇 hei xinhong
  • 15 篇 baojiang cui
  • 14 篇 guang cheng
  • 13 篇 li wei
  • 12 篇 li peng
  • 12 篇 liu jun
  • 12 篇 wang wei
  • 12 篇 fu chong
  • 11 篇 chen zhong
  • 11 篇 yu jia
  • 11 篇 xiaoqiang di
  • 11 篇 hao rong

语言

  • 1,190 篇 英文
  • 77 篇 其他
  • 40 篇 中文
检索条件"机构=School of Computer Science and Network Security"
1305 条 记 录,以下是1-10 订阅
排序:
Weighted Attribute Based Conditional Proxy Re-Encryption in the Cloud
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 1399-1414页
作者: Xixi Yan Jing Zhang Pengyu Cheng Henan Key Laboratory of Network Cryptography Technology Network Information Security and Cryptography LaboratorySchool of SoftwareHenan Polytechnic UniversityJiaozuo454003China School of Computer Science and Technology Henan Polytechnic UniversityJiaozuo454000China
Conditional proxy re-encryption(CPRE)is an effective cryptographic primitive language that enhances the access control mechanism and makes the delegation of decryption permissions more granular,but most of the attribu... 详细信息
来源: 评论
THL: Fast Targeted High Utility Itemset Mining within Length Consideration
Journal of Network Intelligence
收藏 引用
Journal of network Intelligence 2025年 第1期10卷 541-558页
作者: Xu, Peiming Jiang, Yixin Kuang, Xiaoyun Luo, Yu Chen, Jiahui Guangdong Provincial Key Laboratory of Power System Network Security CSG Guangzhou510000 China School of Computer Science and Technology Guangdong University of Technology Guangzhou510006 China
High utility itemset mining is a research topic of the pattern mining domain, which has been widely applied in reality during the past decade. Although most high utility itemset mining algorithms show significant exec... 详细信息
来源: 评论
Online Queue-Aware Service Migration and Resource Allocation in Mobile Edge Computing
收藏 引用
IEEE Transactions on Vehicular Technology 2025年 第5期74卷 8063-8078页
作者: Du, An Jia, Jie Chen, Jian Wang, Xingwei Huang, Ming Northeastern University School of Computer Science and Engineering Engineering Research Center of Security Technology of Complex Network System Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Shenyang110819 China Northeastern University School of Computer Science and Engineering Shenyang110819 China
Mobile edge computing (MEC) integrated with network Functions Virtualization (NFV) helps run a wide range of services implemented by Virtual network Functions (VNFs) deployed at MEC networks. This emerging paradigm of... 详细信息
来源: 评论
Textual Data De-Privatization Scheme Based on Generative Adversarial networks  24th
Textual Data De-Privatization Scheme Based on Generative Adv...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Du, Yanning Xu, Jinnan Zhang, Yaling Wang, Yichuan Wang, Zhoukai School of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China
In many fields, such as healthcare, finance, and scientific research, data sharing and collaboration are critical to achieving better outcomes. However, the sharing of personal data often involves privacy risks, so pr... 详细信息
来源: 评论
Privacy Preserving Adjacency Query Supporting Homoionym Search over Medical Graph Data in Cloud Computing  17th
Privacy Preserving Adjacency Query Supporting Homoionym Sear...
收藏 引用
17th International Conference on Cloud Computing, CLOUD 2024, Held as Part of the Services Conference Federation, SCF 2024
作者: Li, Hourong Tian, Yun Wu, Bin Shi, Jiaoli School of Computer and Big Data Science Jiujiang University Jiujiang332005 China Jiujiang Key Laboratory of Network and Information Security Jiujiang332005 China
Cloud computing is widely used in all walks of life today. Massive amounts of medical graph data are being outsourced to cloud servers to reduce overhead. The untrustworthiness of cloud servers puts the sensitive info... 详细信息
来源: 评论
Unveiling the Superiority of Unsupervised Learning on GPU Cryptojacking Detection: Practice on Magnetic Side Channel-Based Mechanism
收藏 引用
IEEE Transactions on Information Forensics and security 2025年 20卷 4874-4889页
作者: Cao, Hangcheng Xu, Guowen He, Ziyang Shi, Shaoqing Xu, Shengmin Wu, Cong Ning, Jianting Hunan University College of Computer Science and Electronic Engineering Changsha410012 China City University of Hong Kong Department of Computer Science Hong Kong Hong Kong University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu610054 China Zhengzhou University School of Cyber Science and Engineering Zhengzhou450001 China Zhengzhou University International College Zhengzhou450001 China Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fuzhou350007 China Nanyang Technological University College of Computing and Data Science Jurong West 639798 Singapore Wuhan University School of Cyber Science and Engineering Wuhan430072 China City University of Macau Faculty of Data Science Macau China
Ample profits of GPU cryptojacking attract hackers to recklessly invade victims’ devices, for completing specific cryptocurrency mining tasks. Such malicious invasion undoubtedly obstructs normal device usage and was... 详细信息
来源: 评论
A novel coarse-grained knowledge graph embedding framework for platform risk identification from relational data
收藏 引用
Neural Computing and Applications 2025年 1-21页
作者: Zhang, Qi Wang, Shicheng Wang, Lihong Sheng, Jiawei Guo, Shu Li, Chen He, Min Zhang, Renqiang School of Economics and Management Beihang University Beijing China Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China National Computer Network Emergency Response Technical Team Coordination Center of China Beijing China School of Computer Science and Engineering Beihang University Beijing China
Platform risk identification from relational data aims to determine whether the target platforms are risky or not. However, in such a scenario, the relation data involve massive types of relations and numerous numeric... 详细信息
来源: 评论
Multiple Edge Data Integrity Verification With Multi-Vendors and Multi-Servers in Mobile Edge Computing
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第6期24卷 4668-4683页
作者: Islam, Md Rashedul Xiang, Yong Uddin, Md Palash Zhao, Yao Kua, Jonathan Gao, Longxiang Deakin University School of Information Technology GeelongVIC3220 Australia Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250316 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan250014 China
Ensuring Edge Data Integrity (EDI) is imperative in providing reliable and low-latency services in mobile edge computing. Existing EDI schemes typically address single-vendor (App Vendor, AV) single-server (Edge Serve... 详细信息
来源: 评论
Across-Platform Detection of Malicious Cryptocurrency Accounts via Interaction Feature Learning
收藏 引用
IEEE Transactions on Information Forensics and security 2025年 20卷 4783-4798页
作者: Che, Zheng Shen, Meng Tan, Zhehui Du, Hanbiao Wang, Wei Chen, Ting Zhao, Qinglin Xie, Yong Zhu, Liehuang Beijing Institute of Technology School of Computer Science Beijing100081 China Beijing Institute of Technology School of Cyberspace Science and Technology Beijing100081 China Xi'an Jiaotong University Key Laboratory for Intelligent Networks and Network Security Ministry of Education Xi'an710049 China University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China Macau University of Science and Technology School of Computer Science and Engineering Taipa China Qinghai Institute of Technology School of Computer and Information Science Xining810016 China
With the rapid evolution of Web3.0, cryptocurrency has become a cornerstone of decentralized finance. While these digital assets enable efficient and borderless financial transactions, their pseudonymous nature has al... 详细信息
来源: 评论
Hedonic Coalition Formation Game and Contract-Based Federated Learning in AAV-Assisted Internet of Things
收藏 引用
IEEE Internet of Things Journal 2025年 第9期12卷 11258-11272页
作者: Liu, Jia Li, Xiaoxu Xu, Yang Lyu, Chen Wang, Yichuan Liu, Xiaoying Xidian University School of Computer Science and Technology Xi’an710071 China Shanghai University of Finance and Economics School of Computing and Artificial Intelligence MoE Key Laboratory of Interdisciplinary Research of Computation and Economics Shanghai200433 China Xi’an University of Technology Shaanxi Key Laboratory of Network Computing and Security Technology Xi’an710071 China Zhejiang University of Technology School of Computer Science and Technology Hangzhou310023 China
Coupled with the rise of Deep Learning, the wealth of data and enhanced computation capabilities of Internet of Things (IoT) components enable effective artificial intelligence (AI)-based models to be built. Beyond gr... 详细信息
来源: 评论