咨询与建议

限定检索结果

文献类型

  • 387 篇 会议
  • 292 篇 期刊文献

馆藏范围

  • 679 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 431 篇 工学
    • 348 篇 计算机科学与技术...
    • 288 篇 软件工程
    • 110 篇 信息与通信工程
    • 85 篇 电气工程
    • 44 篇 控制科学与工程
    • 44 篇 生物工程
    • 39 篇 网络空间安全
    • 34 篇 电子科学与技术(可...
    • 26 篇 机械工程
    • 24 篇 生物医学工程(可授...
    • 23 篇 光学工程
    • 21 篇 安全科学与工程
    • 17 篇 交通运输工程
    • 13 篇 化学工程与技术
    • 12 篇 仪器科学与技术
  • 185 篇 理学
    • 114 篇 数学
    • 52 篇 生物学
    • 38 篇 统计学(可授理学、...
    • 31 篇 物理学
    • 15 篇 化学
    • 13 篇 系统科学
  • 104 篇 管理学
    • 69 篇 管理科学与工程(可...
    • 46 篇 图书情报与档案管...
    • 26 篇 工商管理
  • 30 篇 法学
    • 18 篇 社会学
    • 13 篇 法学
  • 24 篇 医学
    • 21 篇 临床医学
    • 19 篇 基础医学(可授医学...
    • 18 篇 公共卫生与预防医...
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 11 篇 农学
  • 7 篇 军事学
  • 3 篇 教育学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 33 篇 semantics
  • 31 篇 feature extracti...
  • 27 篇 federated learni...
  • 25 篇 accuracy
  • 25 篇 privacy
  • 24 篇 computational mo...
  • 22 篇 training
  • 20 篇 data privacy
  • 19 篇 deep learning
  • 15 篇 neural networks
  • 15 篇 data models
  • 14 篇 cryptography
  • 13 篇 network security
  • 13 篇 cloud computing
  • 12 篇 servers
  • 11 篇 internet of thin...
  • 11 篇 image segmentati...
  • 11 篇 anomaly detectio...
  • 11 篇 data mining
  • 10 篇 speech processin...

机构

  • 69 篇 shandong provinc...
  • 67 篇 key laboratory o...
  • 52 篇 tianjin key labo...
  • 49 篇 network and data...
  • 45 篇 college of compu...
  • 45 篇 shandong enginee...
  • 35 篇 college of cyber...
  • 20 篇 college of compu...
  • 19 篇 shandong fundame...
  • 18 篇 network and data...
  • 18 篇 faculty of data ...
  • 17 篇 state key labora...
  • 16 篇 tianjin key labo...
  • 16 篇 fujian provincia...
  • 15 篇 college of compu...
  • 14 篇 tianjin key labo...
  • 13 篇 city university ...
  • 11 篇 shandong enginee...
  • 11 篇 haihe lab of ita...
  • 10 篇 key laboratory o...

作者

  • 16 篇 qin zhen
  • 16 篇 li tao
  • 15 篇 qin zhiguang
  • 13 篇 liu ximeng
  • 12 篇 jinbo xiong
  • 12 篇 xiong jinbo
  • 12 篇 jia chunfu
  • 11 篇 ding yi
  • 11 篇 jing zhao
  • 11 篇 zhen qin
  • 11 篇 fu fang-wei
  • 11 篇 youliang tian
  • 11 篇 zhao dongmei
  • 10 篇 liu jun
  • 10 篇 tian youliang
  • 10 篇 liu bin
  • 9 篇 yi ding
  • 9 篇 xu li
  • 9 篇 zhenyu yang
  • 9 篇 zhang hongbin

语言

  • 636 篇 英文
  • 37 篇 其他
  • 7 篇 中文
检索条件"机构=Tianjin Key Laboratory of Network and Data Security"
679 条 记 录,以下是51-60 订阅
排序:
VFLMonitor: Defending One-Party Hijacking Attacks in Vertical Federated Learning
收藏 引用
IEEE Transactions on Information Forensics and security 2025年 20卷 4828-4843页
作者: Xu, Xiangrui Zhao, Yiwen Han, Yufei Zhu, Yongsheng Han, Zhen Xu, Guangquan Wang, Bin Ji, Shouling Wang, Wei Beijing Jiaotong University Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing100044 China University of Southern California Thomas Lord Department of Computer Science Los Angeles90007 United States INRIA Bretagne Rennes35042 France College of Intelligence and Computing Tianjin300072 China Network and Data Security Hangzhou310053 China Zhejiang University College of Computer Science and Technology Zhejiang 310058 China Xi’an Jiaotong University Ministry of Education Key Lab for Intelligent Networks and Network Security Xian710049 China Beijing Jiaotong University school of computer science and technology Beijing100044 China
Vertical Federated Learning (VFL) is susceptible to various one-party hijacking attacks, such as Replay and Generation attacks, where a single malicious client can manipulate the model to produce attacker-specified re... 详细信息
来源: 评论
High-Performance Implementation Architecture for Additive Homomorphic Encryption Algorithms on FPGA
High-Performance Implementation Architecture for Additive Ho...
收藏 引用
IEEE International Conference on Big data security on Cloud (Bigdatasecurity), High Performance and Smart Computing (HPSC) and Intelligent data and security (IDS)
作者: Yuxuan Zhang Hua Guo Chen Junxin Chen Wenmao Liu School of Cyber Science and Technology Beihang University BeiJing China Key Laboratory of Data and Intelligent System Security Ministry of Education Tianjin China NSFOCUS Technologies Group Co. Ltd. BeiJing China
Additive homomorphic encryption is one of the key technologies for ensure data privacy in federated learning. To accelerate these algorithms, several studies have deployed homomorphic encryption algorithms on parallel... 详细信息
来源: 评论
NI-GDBA: Non-Intrusive Distributed Backdoor Attack Based on Adaptive Perturbation on Federated Graph Learning  34
NI-GDBA: Non-Intrusive Distributed Backdoor Attack Based on ...
收藏 引用
34th ACM Web Conference, WWW 2025
作者: Li, Ken Shi, Bin Wei, Jiazhe Dong, Bo School of Computer Science and Technology Xi’an Jiaotong University Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi’an China School of Computer Science and Technology Xi’an Jiaotong University Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Xi’an China School of Distance Education Xi’an Jiaotong University Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Xi’an China
Federated Graph Learning (FedGL) is an emerging Federated Learning (FL) framework that learns the graph data from various clients to train better Graph Neural networks(GNNs) model. Owing to concerns regarding the secu... 详细信息
来源: 评论
Towards an Ontology of Traceable Impact Management in the Food Supply Chain
arXiv
收藏 引用
arXiv 2025年
作者: Gajderowicz, Bart Fox, Mark S. Gao, Yongchao Urban Data Centre School of Cities University of Toronto Toronto Canada Key Laboratory of Computing Power Network and Information Security Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Jinan China
The pursuit of quality improvements and accountability in the food supply chains, especially how they relate to food-related outcomes, such as hunger, has become increasingly vital, necessitating a comprehensive appro...
来源: 评论
DRL-Based Time-Varying Workload Scheduling With Priority and Resource Awareness
收藏 引用
IEEE Transactions on network and Service Management 2025年
作者: Liu, Qifeng Fan, Qilin Zhang, Xu Li, Xiuhua Wang, Kai Xiong, Qingyu Chongqing University School of Big Data and Software Engineering Chongqing400044 China Chongqing University Key Laboratory of Dependable Service Computing in Cyber Physical Society of Ministry of Education Chongqing400044 China Nanjing University School of Electronic Science and Engineering Nanjing210023 China Haihe Laboratory of Information Technology Application Innovation Tianjin300072 China Harbin Institute of Technology School of Computer Science and Technology Weihai264209 China Shandong Key Laboratory of Industrial Network Security Weihai264209 China
With the proliferation of cloud services and the continuous growth in enterprises' demand for dynamic multi-dimensional resources, the implementation of effective strategy for time-varying workload scheduling has ... 详细信息
来源: 评论
Multimodal Dialogue Emotion Recognition Based on Label Optimization and Coarse-Grained Assisted Fine-Grained
Multimodal Dialogue Emotion Recognition Based on Label Optim...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Zhibo Zhang Zhenyu Yang Yan Huang Baojie Xu Wenyue Hu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science China
Multimodal dialogue emotion recognition integrates data from multiple modalities to accurately identify emotional states in conversations. However, differences in expression and information density across modalities c... 详细信息
来源: 评论
A Time-Driven UAV Deployment and Content Caching Approach for Multi-UAV-Enabled Consumer Electronics network
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Zhang, Jianshan Yang, Xu Ming, Rui Luo, Haibo Wang, Xiaoding Piran, Md. Jalil Minjiang University School of Computer and Big Data Fuzhou350108 China Fujian Normal University College of Computer and Cyber Security Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Fuzhou350117 China Chinese Academy of Tropical Agricultural Sciences National Key Laboratory for Tropical Crop Breeding Institute of Tropical Bioscience and Biotechnology Sanya Research Institute Hainan Sanya572024 China Sejong University Department of Computer Science and Engineering Seoul05006 Korea Republic of
To address the problem of high delay due to the explosive growth of mobile data traffic in consumer electronics network (CEN), in this paper, we investigate the multiple-unmanned aerial vehicle (UAV)-enabled CEN conte... 详细信息
来源: 评论
Threat Model and Defense Scheme for Side-Channel Attacks in Client-Side Deduplication
收藏 引用
Tsinghua Science and Technology 2023年 第1期28卷 1-12页
作者: Guanxiong Ha Hang Chen Chunfu Jia Mingyue Li College of Cyber Science Nankai UniversityTianjin 300350China Tianjin Key Laboratory of Network and Data Security Technology Tianjin 300350China
In cloud storage,client-side deduplication is widely used to reduce storage and communication *** client-side deduplication,if the cloud server detects that the user’s outsourced data have been stored,then clients wi... 详细信息
来源: 评论
Bidirectionally Guided Large Language Models for Consumer-Centric Personalized Recommendation
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Yu, Linfang Xiao, Peng Xu, Liqun Kumari, Saru Alenazi, Mohammed J.F. Industrial Research Institute Chengdu610213 China University of Electronic Science and Technology of China Network and Data Security Key Laboratory of Sichuan Province Chengdu610054 China Chengdu University of Technology School of Computer and Network Security Chengdu China Industrial Research Institute Chengdu610213 China Chaudhary Charan Singh University Department of Mathematics Uttar Pradesh Meerut250004 India Department of Computer Engineering Riyadh11451 Saudi Arabia
With the increasing abundance of consumer electronics, consumers are facing the challenge of information overload, making personalized recommendation systems (RSs) crucial for enhancing consumer experience and promoti... 详细信息
来源: 评论
PyionNet: Pyramid Progressive Cross-Fusion network for Joint Classification of Hyperspectral and LiDAR data
收藏 引用
IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing 2025年 18卷 12042-12058页
作者: Pan, Haizhu Zhang, Quanxiu Ge, Haimiao Liu, Moqi Shi, Cuiping Qiqihar University College of Computer and Control Engineering Qiqihar161000 China Qiqihar University Heilongjiang Key Laboratory of Big Data Network Security Detection and Analysis Qiqihar161000 China Xi'an Jiaotong University School of Information and Communications Engineering Shanxi Xi'an710049 China Huzhou University College of Information Engineering Huzhou313000 China
Joint hyperspectral (HS) and Light Detection and Ranging (LiDAR) data for land cover classification have received widespread attention. Nevertheless, existing methods often struggle with multi-scale feature extraction... 详细信息
来源: 评论