咨询与建议

限定检索结果

文献类型

  • 293 篇 会议
  • 236 篇 期刊文献

馆藏范围

  • 529 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 323 篇 工学
    • 256 篇 计算机科学与技术...
    • 213 篇 软件工程
    • 78 篇 信息与通信工程
    • 62 篇 电气工程
    • 32 篇 生物工程
    • 29 篇 网络空间安全
    • 26 篇 控制科学与工程
    • 21 篇 电子科学与技术(可...
    • 20 篇 机械工程
    • 17 篇 生物医学工程(可授...
    • 16 篇 光学工程
    • 16 篇 安全科学与工程
    • 13 篇 交通运输工程
    • 12 篇 仪器科学与技术
    • 10 篇 建筑学
    • 9 篇 化学工程与技术
  • 141 篇 理学
    • 79 篇 数学
    • 37 篇 生物学
    • 32 篇 物理学
    • 28 篇 统计学(可授理学、...
    • 11 篇 化学
  • 70 篇 管理学
    • 45 篇 管理科学与工程(可...
    • 32 篇 图书情报与档案管...
    • 15 篇 工商管理
  • 23 篇 法学
    • 15 篇 社会学
    • 9 篇 法学
  • 16 篇 医学
    • 14 篇 临床医学
    • 13 篇 基础医学(可授医学...
    • 13 篇 公共卫生与预防医...
  • 13 篇 经济学
    • 13 篇 应用经济学
  • 7 篇 农学
  • 7 篇 军事学
  • 3 篇 教育学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 30 篇 semantics
  • 30 篇 feature extracti...
  • 24 篇 accuracy
  • 21 篇 federated learni...
  • 20 篇 privacy
  • 20 篇 training
  • 19 篇 computational mo...
  • 18 篇 deep learning
  • 12 篇 data privacy
  • 12 篇 image segmentati...
  • 12 篇 neural networks
  • 10 篇 internet of thin...
  • 10 篇 anomaly detectio...
  • 10 篇 speech processin...
  • 10 篇 contrastive lear...
  • 10 篇 visualization
  • 10 篇 network security
  • 10 篇 cloud computing
  • 10 篇 data models
  • 9 篇 optimization

机构

  • 69 篇 shandong provinc...
  • 67 篇 key laboratory o...
  • 52 篇 tianjin key labo...
  • 49 篇 network and data...
  • 45 篇 shandong enginee...
  • 43 篇 college of compu...
  • 35 篇 college of cyber...
  • 18 篇 state key labora...
  • 16 篇 tianjin key labo...
  • 16 篇 shandong fundame...
  • 14 篇 tianjin key labo...
  • 13 篇 fujian provincia...
  • 12 篇 faculty of data ...
  • 11 篇 shandong enginee...
  • 10 篇 school of inform...
  • 9 篇 school of comput...
  • 9 篇 key laboratory o...
  • 9 篇 network and data...
  • 9 篇 qilu university ...
  • 8 篇 network and data...

作者

  • 17 篇 qin zhen
  • 14 篇 qin zhiguang
  • 13 篇 li tao
  • 12 篇 zhen qin
  • 12 篇 jia chunfu
  • 11 篇 jing zhao
  • 11 篇 fu fang-wei
  • 11 篇 xiong jinbo
  • 10 篇 yi ding
  • 10 篇 ding yi
  • 10 篇 tian youliang
  • 10 篇 youliang tian
  • 10 篇 liu bin
  • 9 篇 jinbo xiong
  • 9 篇 zhenyu yang
  • 9 篇 zhang hongbin
  • 8 篇 qing yu
  • 8 篇 liu jun
  • 8 篇 zhao dongmei
  • 7 篇 jiguo yu

语言

  • 495 篇 英文
  • 29 篇 其他
  • 6 篇 中文
检索条件"机构=Tianjin Key Laboratory of Network and Data Security Technology"
529 条 记 录,以下是1-10 订阅
排序:
Towards Resilience 5G-V2N: Efficient and Privacy-Preserving Authentication Protocol for Multi-Service Access and Handover
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第06期24卷 5446-5463页
作者: Bi, Ye Jia, Chunfu Nankai University College of Cyber Science Tianjin Key Laboratory of Network and Data Security Technology DISSEC Tianjin300350 China
The booming 5 G cellular networks sparked tremendous interest in supporting more sophisticated critical use cases through vehicle-to-network (V2N) communications. However, the inherent technical vulnerabilities and de... 详细信息
来源: 评论
Block-gram:Mining knowledgeable features for efficiently smart contract vulnerability detection
收藏 引用
Digital Communications and networks 2025年 第1期11卷 1-12页
作者: Xueshuo Xie Haolong Wang Zhaolong Jian Yaozheng Fang Zichun Wang Tao Li Tianjin Key Laboratory of Network and Data Security Technology TianjinChina College of Computer Science Nankai UniversityTianjinChina Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province China State Key Laboratory of Computer Architecture Institute of Computing TechnologyChinese Academy of SciencesChina
Smart contracts are widely used on the blockchain to implement complex transactions,such as decentralized applications on *** vulnerability detection of large-scale smart contracts is critical,as attacks on smart cont... 详细信息
来源: 评论
An Enhanced Clustering-Based (k, t)-Anonymity Algorithm for Graphs
收藏 引用
Chinese Journal of Electronics 2025年 第1期34卷 365-372页
作者: Yuanyuan Wang Xing Zhang Zhiguang Chu Wei Shi Xiang Li School of Electronics and Information Engineering Liaoning University of Technology Key Laboratory of Security for Network and Data in Industrial Internet of Liaoning Province Faculty of Information Technology Beijing University of Technology
As people become increasingly reliant on the Internet, securely storing and publishing private data has become an important issue. In real life, the release of graph data can lead to privacy breaches, which is a highl... 详细信息
来源: 评论
ADLT: a novel method for effective detection of adversarial attacks in image retrieval
ADLT: a novel method for effective detection of adversarial ...
收藏 引用
2024 International Conference on Computer Vision and Image Processing, CVIP 2024
作者: Xu, Shiyue Zhang, Yu College of Cyber Science Tianjin Key Laboratory of Network and Data Security Technology Nankai University Tianjin300350 China
The versatile application of deep learning has made it prone to vulnerabilities, particularly adversarial attacks, which have been increasingly prevalent as its scope expands. Attack methods based on adversarial queri... 详细信息
来源: 评论
Deduplication and Approximate Analytics for Encrypted IoT data in Fog-Assisted Cloud Storage  24th
Deduplication and Approximate Analytics for Encrypted IoT ...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Wang, Rongxi Ha, Guanxiong Jia, Chunfu Li, Ruiqi Su, Zhen The College of Cyber Science Nankai University Tianjin China Tianjin Key Laboratory of Network and Data Security Technology Tianjin China The College of Safety Science and Engineering Civil Aviation University of China Tianjin China
With the advancement of the Internet of Things (IoT) technologies, there has been a rapid increase in the volume of IoT data, leading to escalating costs in storage, transmission, and analytics. The benefits of conven... 详细信息
来源: 评论
SmartZone: Runtime Support for Secure and Efficient On-device Inference on ARM TrustZone
收藏 引用
IEEE Transactions on Computers 2025年 第06期74卷 2144-2158页
作者: Jian, Zhaolong Liu, Xu Dong, Qiankun Cheng, Longkai Xie, Xueshuo Li, Tao Nankai University College of Computer Science Tianjin China Tianjin Key Laboratory of Network Tianjin China Data Science Technology Tianjin China Haihe Lab of ITAI Tianjin China
On-device inference is a burgeoning paradigm that performs model inference locally on end devices, allowing private data to remain local. ARM TrustZone as a widely supported trusted execution environment has been appl... 详细信息
来源: 评论
A Novel Approach to Cloud security: Publicly Verifiable Remote Signcryption Framework
收藏 引用
IEEE Internet of Things Journal 2025年 第10期12卷 14828-14844页
作者: Ali, Mohammad Liu, Ximeng Amirkabir University of Technology Department of Mathematics and Computer Science Tehran Iran Fuzhou University Key Laboratory of Information Security of Network Systems College of Computer and Data Science Fuzhou350108 China
In communication systems, ensuring both data integrity and confidentiality is crucial. Traditional methods, such as encryption and signature schemes, handle these aspects separately, leading to inefficiencies. Signcry... 详细信息
来源: 评论
Blockchain and signcryption enabled asynchronous federated learning framework in fog computing
收藏 引用
Digital Communications and networks 2025年 第2期11卷 442-454页
作者: Zhou, Zhou Tian, Youliang Xiong, Jinbo Peng, Changgen Li, Jing Yang, Nan State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang550025 China Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fujian Normal University Fuzhou350117 China Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology Guilin541004 China
Federated learning combines with fog computing to transform data sharing into model sharing, which solves the issues of data isolation and privacy disclosure in fog computing. However, existing studies focus on centra... 详细信息
来源: 评论
Understanding User Passwords through Parsing Tree
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Wang, Ding Shan, Xuan Wu, Yuxuan Jia, Chunfu Nankai University College of Cryptology and Cyber Science Tianjin300350 China Ministry of Education of China Henan Key Laboratory of Network Cryptography Key Laboratory of Cyberspace Security China Nankai University Tianjin Key Laboratory of Network and Data Security Technology Tianjin300350 China
Passwords are today's dominant form of authentication, and password guessing is the most effective method for evaluating password strength. Most password guessing models (e.g., PCFG, Markov, and RFGuess) regard pa... 详细信息
来源: 评论
Get the Punchline: Headline-Centric Multi-View Learning for Personalized Headline Generation
IEEE Transactions on Audio, Speech and Language Processing
收藏 引用
IEEE Transactions on Audio, Speech and Language Processing 2025年 33卷 962-973页
作者: Wenya Guo Shenglong Yu Ying Zhang Zhengkun Zhang Xiaojie Yuan College of Computer Science Nankai University Tianjin China Tianjin Key Laboratory of Network and Data Security Technology College of Cyber Science Nankai University Tianjin China
Personalized news headline generation aims to generate a user-specific headline based on their reading histories. Existing approaches incorporate information from various aspects of news articles, which leads to a lac... 详细信息
来源: 评论