咨询与建议

限定检索结果

文献类型

  • 446 篇 会议
  • 87 篇 期刊文献

馆藏范围

  • 533 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 208 篇 工学
    • 164 篇 计算机科学与技术...
    • 143 篇 软件工程
    • 56 篇 信息与通信工程
    • 49 篇 电气工程
    • 29 篇 控制科学与工程
    • 18 篇 生物工程
    • 15 篇 机械工程
    • 15 篇 电子科学与技术(可...
    • 15 篇 交通运输工程
    • 14 篇 网络空间安全
    • 13 篇 光学工程
    • 11 篇 安全科学与工程
    • 10 篇 仪器科学与技术
    • 10 篇 土木工程
    • 9 篇 建筑学
    • 8 篇 生物医学工程(可授...
    • 4 篇 化学工程与技术
  • 91 篇 理学
    • 58 篇 数学
    • 20 篇 物理学
    • 16 篇 生物学
    • 10 篇 统计学(可授理学、...
    • 7 篇 系统科学
  • 53 篇 管理学
    • 32 篇 图书情报与档案管...
    • 31 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 14 篇 法学
    • 8 篇 法学
    • 8 篇 社会学
  • 10 篇 医学
    • 9 篇 临床医学
    • 6 篇 基础医学(可授医学...
    • 5 篇 公共卫生与预防医...
  • 3 篇 军事学
  • 2 篇 教育学
  • 2 篇 农学
  • 1 篇 经济学
  • 1 篇 文学

主题

  • 74 篇 feature extracti...
  • 62 篇 accuracy
  • 48 篇 semantics
  • 42 篇 computational mo...
  • 38 篇 data models
  • 30 篇 federated learni...
  • 30 篇 training
  • 27 篇 neural networks
  • 26 篇 transformers
  • 21 篇 predictive model...
  • 19 篇 deep learning
  • 18 篇 data mining
  • 17 篇 noise
  • 17 篇 visualization
  • 17 篇 adaptation model...
  • 16 篇 attention mechan...
  • 15 篇 measurement
  • 14 篇 object detection
  • 14 篇 image segmentati...
  • 14 篇 analytical model...

机构

  • 201 篇 key laboratory o...
  • 198 篇 shandong provinc...
  • 44 篇 shandong enginee...
  • 42 篇 shaanxi key labo...
  • 36 篇 shandong fundame...
  • 35 篇 school of comput...
  • 35 篇 school of comput...
  • 32 篇 shaanxi key labo...
  • 29 篇 shandong provinc...
  • 22 篇 qilu university ...
  • 22 篇 shandong provinc...
  • 15 篇 quan cheng labor...
  • 13 篇 key laboratory o...
  • 13 篇 qilu university ...
  • 12 篇 key laboratory o...
  • 11 篇 xi'an university...
  • 11 篇 shandong fundame...
  • 11 篇 key laboratory o...
  • 10 篇 shandong enginee...
  • 10 篇 faculty of data ...

作者

  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 18 篇 xiaoming wu
  • 17 篇 hei xinhong
  • 15 篇 haiyan jin
  • 14 篇 li wei
  • 14 篇 jin haiyan
  • 13 篇 xiangzhi liu
  • 13 篇 guohua lv
  • 12 篇 aimin li
  • 11 篇 jing zhao
  • 11 篇 xiaohui han
  • 11 篇 mingle zhou
  • 11 篇 lei zhu
  • 11 篇 wenpeng lu
  • 10 篇 wang lei
  • 10 篇 wei wei
  • 9 篇 bin wang
  • 9 篇 guixin zhao

语言

  • 508 篇 英文
  • 24 篇 其他
  • 3 篇 中文
检索条件"机构=Shaanxi Provincial Key Laboratory of Network Computing and Security Technology"
533 条 记 录,以下是181-190 订阅
排序:
Provably Secure Authenticated key-Management Mechanism for e-Healthcare Environment
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Saleem, Muhammad Asad Li, Xiong Mahmood, Khalid Ghaffar, Zahid Xie, Yong Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu611731 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan National Yunlin University of Science and Technology Graduate School of Engineering Science and Technology Douliu64002 Taiwan Qinghai Institute of Technology School of Computer and Information Science China Qinghai Provincial Laboratory for Intelligent Computing and Application China Key Laboratory of Computing Power Network and Information Security Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security China Shandong Fundamental Research Center for Computer Science Jinan250353 China
The Internet of Things (IoT) is rapidly permeating all aspects of human life, involving a network of devices that share sensitive data. A notable application is the e-healthcare systems, which employ connected sensors... 详细信息
来源: 评论
Spatial-Spectral Transformer for Local and Global Hyperspectral Image Classification
Spatial-Spectral Transformer for Local and Global Hyperspect...
收藏 引用
Signal, Information and Data Processing (ICSIDP), IEEE International Conference on
作者: MengXin Cao Guixin Zhao Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China
Deep learning techniques have become increasingly prevalent in hyperspectral image (HSI) classification. However, convolutional neural network (CNN)-based approaches often struggle with inefficient utilization of spec... 详细信息
来源: 评论
An Early Detection Model of Prostate Cancer Based on MRI  9
An Early Detection Model of Prostate Cancer Based on MRI
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Liu, Yuankun Xing, Lumin Wang, Di Nie, Xin Zhang, Xueyan Wu, Di Liu, Wenjian The First Affiliated Hospital of Shandong First Medical University Shandong Provincial Qianfoshan Hospital Jinan China City University of Macau Faculty of Data Science China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China Chongqing Jianzhu College Chongqing China Shandong Youth University of Political Science School of Information Work Office Jinan China University of Southern Queensland School of Mathematics Physics and Computing QLD Australia
Prostate cancer is a prevalent form of cancer among men, with a high rate of occurrence but relatively lower mortality compared to other types of cancer. Early detection is crucial because it allows for earlier interv... 详细信息
来源: 评论
An Encryption Algorithm Cycle Identification Method Based on Bit Execution
An Encryption Algorithm Cycle Identification Method Based on...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Yunge Sun Gaolei Du Junpeng Qu Yong Fu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology(Shandong Academy of Sciences) Jinan China Quan Cheng Laboratory Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
Ransomware uses symmetric encryption algorithms to lock user files to extort money. This paper proposes a cryptographic algorithm loop identification method based on bit-precise execution, aiming to solve the problem ... 详细信息
来源: 评论
A DoS-attack Resilient Control Approach for AIOT-enabled Systems
A DoS-attack Resilient Control Approach for AIOT-enabled Sys...
收藏 引用
2023 International Conference on Artificial Intelligence of Things and Systems, AIoTSys 2023
作者: Cao, Xiaoya Chen, Zhenya Liu, Weisheng Liu, Yuanlong Wang, Wenting Wang, Xin Yang, Ming Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China State Grid Shandong Electric Power Company Jinan China State Grid Shandong Electric Power Research Institute Jinan China
This paper presents a novel controller design for dealing with the challenges posed by Denial-of-Service (DoS) attacks in the context of Artificial Intelligence of Things (AIOT). The proposed design employs a predicti... 详细信息
来源: 评论
HiCoCS: High Concurrency Cross-Sharding on Permissioned Blockchains
收藏 引用
IEEE Transactions on Computers 2025年
作者: Yang, Lingxiao Dong, Xuewen Wan, Zhiguo Lu, Di Zhang, Yushu Shen, Yulong Xidian University School of Computer Science and Technology China Ministry of Education Engineering Research Center of Blockchain Technology Application and Evaluation China Shaanxi Key Laboratory of Blockchain and Secure Computing Xi’an710071 China Zhejiang Lab Zhejiang Hangzhou311121 China Shaanxi Key Laboratory of Network and System Security Xi’an710071 China Jiangxi University of Finance and Economics School of Computing Nanchang330013 China Jiangxi University of Finance and Economics Nanchang330013 China
As the foundation of the Web3 trust system, blockchain technology faces increasing demands for scalability. Sharding emerges as a promising solution, but it struggles to handle highly concurrent cross-shard transactio... 详细信息
来源: 评论
Dynamic detection technology of encryption algorithm based on Pin
Dynamic detection technology of encryption algorithm based o...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Junpeng Qu Gaolei Du Yunge Sun Yong Fu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Quan Cheng Laboratory Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
Aiming at the problem that malicious software uses encryption algorithm to hide its own malicious code and avoid detection, a dynamic detection technology based on Pin encryption algorithm is proposed. Use Pin to get ... 详细信息
来源: 评论
FedSimRep: A Federated Learning Method Based on Data Representation Selection  25
FedSimRep: A Federated Learning Method Based on Data Represe...
收藏 引用
Proceedings of the 2025 3rd International Conference on Communication networks and Machine Learning
作者: Falu Zhai Lu Wu Chunxiao Wang Tongyang Hao Shucang Zang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan Shandong China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan Shandong China
As an emerging distributed technology, Federated learning enables model training while protecting privacy without sharing local data. However, the heterogeneity of geographic locations and devices leads to response de... 详细信息
来源: 评论
An automated construction method for symmetric encryption round function models based on dynamic analysis
An automated construction method for symmetric encryption ro...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Gaolei Du Yunge Sun Junpeng Qu Yong Fu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Quan Cheng Laboratory Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
With the deepening of informatization, the incidence of cybercrimes utilizing malicious software for attacks is on the rise. This paper addresses the detection issue of symmetric encryption in malicious software from ... 详细信息
来源: 评论
Outsourced Secure Cross-Modal Retrieval based on Secret Sharing for Lightweight Clients
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Niu, Ziyu Wang, Hao Li, Zhi Su, Ye Xu, Lijuan Zhang, Yudi Susilo, Willy Shandong Normal University School of Information Science and Engineering Jinan China University of Wollongong School of Computing and Information Technology Australia Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education National Supercomputer Center in Jinan Shandong Computer Science Center Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
Cross-modal retrieval is a technique that uses one modality to query another modality in multimedia data (e.g., retrieving images based on text, or retrieving text based on images). It can break down the barriers betw... 详细信息
来源: 评论