咨询与建议

限定检索结果

文献类型

  • 293 篇 会议
  • 242 篇 期刊文献

馆藏范围

  • 535 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 328 篇 工学
    • 258 篇 计算机科学与技术...
    • 214 篇 软件工程
    • 80 篇 信息与通信工程
    • 67 篇 电气工程
    • 32 篇 生物工程
    • 30 篇 网络空间安全
    • 26 篇 控制科学与工程
    • 22 篇 电子科学与技术(可...
    • 20 篇 机械工程
    • 18 篇 生物医学工程(可授...
    • 17 篇 光学工程
    • 16 篇 安全科学与工程
    • 13 篇 仪器科学与技术
    • 13 篇 交通运输工程
    • 10 篇 建筑学
    • 9 篇 化学工程与技术
  • 141 篇 理学
    • 78 篇 数学
    • 37 篇 生物学
    • 32 篇 物理学
    • 28 篇 统计学(可授理学、...
    • 12 篇 化学
  • 71 篇 管理学
    • 45 篇 管理科学与工程(可...
    • 33 篇 图书情报与档案管...
    • 15 篇 工商管理
  • 23 篇 法学
    • 15 篇 社会学
    • 9 篇 法学
  • 18 篇 医学
    • 16 篇 临床医学
    • 14 篇 基础医学(可授医学...
    • 14 篇 公共卫生与预防医...
  • 13 篇 经济学
    • 13 篇 应用经济学
  • 7 篇 农学
  • 7 篇 军事学
  • 3 篇 教育学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 30 篇 semantics
  • 30 篇 feature extracti...
  • 24 篇 accuracy
  • 22 篇 federated learni...
  • 21 篇 training
  • 20 篇 computational mo...
  • 20 篇 privacy
  • 18 篇 deep learning
  • 12 篇 data privacy
  • 12 篇 image segmentati...
  • 12 篇 neural networks
  • 11 篇 data models
  • 10 篇 internet of thin...
  • 10 篇 anomaly detectio...
  • 10 篇 speech processin...
  • 10 篇 contrastive lear...
  • 10 篇 visualization
  • 10 篇 network security
  • 10 篇 cloud computing
  • 9 篇 optimization

机构

  • 69 篇 shandong provinc...
  • 67 篇 key laboratory o...
  • 52 篇 tianjin key labo...
  • 49 篇 network and data...
  • 45 篇 shandong enginee...
  • 43 篇 college of compu...
  • 35 篇 college of cyber...
  • 18 篇 state key labora...
  • 17 篇 shandong fundame...
  • 16 篇 tianjin key labo...
  • 14 篇 tianjin key labo...
  • 13 篇 fujian provincia...
  • 12 篇 faculty of data ...
  • 11 篇 shandong enginee...
  • 10 篇 school of inform...
  • 9 篇 school of comput...
  • 9 篇 key laboratory o...
  • 9 篇 network and data...
  • 9 篇 haihe lab of ita...
  • 9 篇 qilu university ...

作者

  • 17 篇 qin zhen
  • 14 篇 qin zhiguang
  • 13 篇 li tao
  • 12 篇 zhen qin
  • 12 篇 jia chunfu
  • 11 篇 jing zhao
  • 11 篇 fu fang-wei
  • 11 篇 xiong jinbo
  • 10 篇 yi ding
  • 10 篇 ding yi
  • 10 篇 tian youliang
  • 10 篇 youliang tian
  • 10 篇 liu bin
  • 9 篇 liu jun
  • 9 篇 jinbo xiong
  • 9 篇 zhenyu yang
  • 9 篇 zhang hongbin
  • 8 篇 qing yu
  • 8 篇 zhao dongmei
  • 7 篇 jiguo yu

语言

  • 499 篇 英文
  • 31 篇 其他
  • 6 篇 中文
检索条件"机构=Tianjin Key Laboratory of Network and Data Security Technology"
535 条 记 录,以下是1-10 订阅
排序:
Towards Resilience 5G-V2N: Efficient and Privacy-Preserving Authentication Protocol for Multi-Service Access and Handover
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第6期24卷 5446-5463页
作者: Bi, Ye Jia, Chunfu Nankai University College of Cyber Science Tianjin Key Laboratory of Network and Data Security Technology DISSEC Tianjin300350 China
The booming 5 G cellular networks sparked tremendous interest in supporting more sophisticated critical use cases through vehicle-to-network (V2N) communications. However, the inherent technical vulnerabilities and de... 详细信息
来源: 评论
Block-gram:Mining knowledgeable features for efficiently smart contract vulnerability detection
收藏 引用
Digital Communications and networks 2025年 第1期11卷 1-12页
作者: Xueshuo Xie Haolong Wang Zhaolong Jian Yaozheng Fang Zichun Wang Tao Li Tianjin Key Laboratory of Network and Data Security Technology TianjinChina College of Computer Science Nankai UniversityTianjinChina Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province China State Key Laboratory of Computer Architecture Institute of Computing TechnologyChinese Academy of SciencesChina
Smart contracts are widely used on the blockchain to implement complex transactions,such as decentralized applications on *** vulnerability detection of large-scale smart contracts is critical,as attacks on smart cont... 详细信息
来源: 评论
An Enhanced Clustering-Based (k, t)-Anonymity Algorithm for Graphs
收藏 引用
Chinese Journal of Electronics 2025年 第1期34卷 365-372页
作者: Yuanyuan Wang Xing Zhang Zhiguang Chu Wei Shi Xiang Li School of Electronics and Information Engineering Liaoning University of Technology Key Laboratory of Security for Network and Data in Industrial Internet of Liaoning Province Faculty of Information Technology Beijing University of Technology
As people become increasingly reliant on the Internet, securely storing and publishing private data has become an important issue. In real life, the release of graph data can lead to privacy breaches, which is a highl... 详细信息
来源: 评论
ADLT: a novel method for effective detection of adversarial attacks in image retrieval
ADLT: a novel method for effective detection of adversarial ...
收藏 引用
2024 International Conference on Computer Vision and Image Processing, CVIP 2024
作者: Xu, Shiyue Zhang, Yu College of Cyber Science Tianjin Key Laboratory of Network and Data Security Technology Nankai University Tianjin300350 China
The versatile application of deep learning has made it prone to vulnerabilities, particularly adversarial attacks, which have been increasingly prevalent as its scope expands. Attack methods based on adversarial queri... 详细信息
来源: 评论
SmartZone: Runtime Support for Secure and Efficient On-device Inference on ARM TrustZone
收藏 引用
IEEE Transactions on Computers 2025年 第6期74卷 2144-2158页
作者: Jian, Zhaolong Liu, Xu Dong, Qiankun Cheng, Longkai Xie, Xueshuo Li, Tao Nankai University College of Computer Science Tianjin China Tianjin Key Laboratory of Network Tianjin China Data Science Technology Tianjin China Haihe Lab of ITAI Tianjin China
On-device inference is a burgeoning paradigm that performs model inference locally on end devices, allowing private data to remain local. ARM TrustZone as a widely supported trusted execution environment has been appl... 详细信息
来源: 评论
DSDIR: A Two-Stage Method for Addressing Noisy Long-Tailed Problems in Malicious Traffic Detection
DSDIR: A Two-Stage Method for Addressing Noisy Long-Tailed P...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Li, Guoliang Zhang, Ruiqi Sun, Zhe Xing, Lingkai Zhang, Yu College of Cyber Science Nankai University Tianjin China College of Computer Science Nankai University Tianjin China Tianjin Key Laboratory of Network and Data Security Technology Tianjin China Key Laboratory of Data and Intelligent System Security Ministry of Education Tianjin China
In recent years, deep learning based malicious traffic detection (MTD) systems have demonstrated remarkable success. However, their effectiveness tend to decrease because most malicious traffic datasets are suffered f... 详细信息
来源: 评论
Blockchain and signcryption enabled asynchronous federated learning framework in fog computing
收藏 引用
Digital Communications and networks 2025年 第2期11卷 442-454页
作者: Zhou, Zhou Tian, Youliang Xiong, Jinbo Peng, Changgen Li, Jing Yang, Nan State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang550025 China Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fujian Normal University Fuzhou350117 China Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology Guilin541004 China
Federated learning combines with fog computing to transform data sharing into model sharing, which solves the issues of data isolation and privacy disclosure in fog computing. However, existing studies focus on centra... 详细信息
来源: 评论
Enabling Intelligent Connectivity: A Survey of Secure ISAC in 6G networks
收藏 引用
IEEE Communications Surveys and Tutorials 2025年 第2期27卷 748-781页
作者: Zhu, Xiaoqiang Liu, Jiqiang Lu, Lingyun Zhang, Tao Qiu, Tie Wang, Chunpeng Liu, Yuan Beijing Jiaotong University School of Software Engineering Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing100044 China Tianjin University College of Intelligence and Computing Tianjin300350 China Qilu University of Technology School of Cyber Security and the Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan250353 China
The rapid growth of intelligent sensing capabilities and super computation power in 6G mobile communication systems has facilitated their application in diverse domains such as smart health, smart factories, and the i... 详细信息
来源: 评论
Deduplication and Approximate Analytics for Encrypted IoT data in Fog-Assisted Cloud Storage  24th
Deduplication and Approximate Analytics for Encrypted IoT ...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Wang, Rongxi Ha, Guanxiong Jia, Chunfu Li, Ruiqi Su, Zhen The College of Cyber Science Nankai University Tianjin China Tianjin Key Laboratory of Network and Data Security Technology Tianjin China The College of Safety Science and Engineering Civil Aviation University of China Tianjin China
With the advancement of the Internet of Things (IoT) technologies, there has been a rapid increase in the volume of IoT data, leading to escalating costs in storage, transmission, and analytics. The benefits of conven... 详细信息
来源: 评论
FedFLD: Heterogeneous Federated Learning via Forget-Less Distillation
FedFLD: Heterogeneous Federated Learning via Forget-Less Dis...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Yi, Xiaoyang Zhang, Jian Chen, Jing Bao, Yuru Xing, Lingkai College of Cyber Science Nankai University China College of Computer Science Nankai University China Tianjin Key Laboratory of Network and Data Security Technology Tianjin China
Federated learning, as a distributed machine learning paradigm, enhances privacy protection but faces the challenge of heterogeneity. data-free knowledge distillation (DFKD) methods attempt to overcome this challenge ... 详细信息
来源: 评论