咨询与建议

限定检索结果

文献类型

  • 293 篇 会议
  • 245 篇 期刊文献

馆藏范围

  • 538 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 330 篇 工学
    • 259 篇 计算机科学与技术...
    • 214 篇 软件工程
    • 79 篇 信息与通信工程
    • 67 篇 电气工程
    • 32 篇 生物工程
    • 30 篇 网络空间安全
    • 25 篇 控制科学与工程
    • 21 篇 电子科学与技术(可...
    • 20 篇 机械工程
    • 18 篇 光学工程
    • 18 篇 生物医学工程(可授...
    • 16 篇 安全科学与工程
    • 13 篇 交通运输工程
    • 12 篇 仪器科学与技术
    • 11 篇 建筑学
    • 9 篇 化学工程与技术
  • 141 篇 理学
    • 78 篇 数学
    • 37 篇 生物学
    • 32 篇 物理学
    • 28 篇 统计学(可授理学、...
    • 11 篇 化学
  • 71 篇 管理学
    • 46 篇 管理科学与工程(可...
    • 32 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 23 篇 法学
    • 15 篇 社会学
    • 9 篇 法学
  • 18 篇 医学
    • 16 篇 临床医学
    • 14 篇 基础医学(可授医学...
    • 14 篇 公共卫生与预防医...
  • 13 篇 经济学
    • 13 篇 应用经济学
  • 7 篇 农学
  • 7 篇 军事学
  • 3 篇 教育学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 30 篇 semantics
  • 29 篇 feature extracti...
  • 23 篇 accuracy
  • 22 篇 federated learni...
  • 21 篇 training
  • 20 篇 privacy
  • 19 篇 computational mo...
  • 18 篇 deep learning
  • 12 篇 data privacy
  • 12 篇 image segmentati...
  • 12 篇 neural networks
  • 11 篇 data models
  • 10 篇 internet of thin...
  • 10 篇 anomaly detectio...
  • 10 篇 speech processin...
  • 10 篇 contrastive lear...
  • 10 篇 visualization
  • 10 篇 network security
  • 10 篇 cloud computing
  • 9 篇 optimization

机构

  • 69 篇 shandong provinc...
  • 67 篇 key laboratory o...
  • 52 篇 tianjin key labo...
  • 49 篇 network and data...
  • 45 篇 shandong enginee...
  • 43 篇 college of compu...
  • 35 篇 college of cyber...
  • 18 篇 state key labora...
  • 17 篇 shandong fundame...
  • 16 篇 tianjin key labo...
  • 14 篇 tianjin key labo...
  • 13 篇 fujian provincia...
  • 12 篇 faculty of data ...
  • 11 篇 shandong enginee...
  • 10 篇 key laboratory o...
  • 10 篇 school of inform...
  • 9 篇 school of comput...
  • 9 篇 network and data...
  • 9 篇 haihe lab of ita...
  • 9 篇 qilu university ...

作者

  • 17 篇 qin zhen
  • 15 篇 qin zhiguang
  • 13 篇 li tao
  • 12 篇 zhen qin
  • 12 篇 fu fang-wei
  • 12 篇 jia chunfu
  • 11 篇 ding yi
  • 11 篇 jing zhao
  • 11 篇 xiong jinbo
  • 10 篇 tian youliang
  • 10 篇 youliang tian
  • 10 篇 liu bin
  • 9 篇 liu jun
  • 9 篇 yi ding
  • 9 篇 jinbo xiong
  • 9 篇 zhenyu yang
  • 9 篇 zhang hongbin
  • 8 篇 qing yu
  • 8 篇 zhao dongmei
  • 7 篇 cao mingsheng

语言

  • 500 篇 英文
  • 33 篇 其他
  • 6 篇 中文
检索条件"机构=Tianjin Key Laboratory of Network and Data Security Technology"
538 条 记 录,以下是101-110 订阅
排序:
Exploration of Teaching Method of Students’ Independent Proposition
Exploration of Teaching Method of Students’ Independent Pro...
收藏 引用
International Conference on Guidance, Navigation and Control, ICGNC 2020
作者: Zhang, Jin Wang, Lizhi Quan, Weihong Li, Haoran Gong, Xiaoli College of Computer Science Nankai University Tianjin China College of Cyber Science Nankai University Tianjin China Tianjin Key Laboratory of Network and Data Security Technology Tianjin China
Aiming at obsolescence and deficiencies of the question bank in the current teaching of computer major courses, we propose a teaching method of student independent proposition, which can not only enrich the question b... 详细信息
来源: 评论
Integrating Structural Semantic Knowledge for Enhanced Information Extraction Pre-training
Integrating Structural Semantic Knowledge for Enhanced Infor...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Yi, Xiaoyang Bao, Yuru Zhang, Jian Qin, Yifang Lin, Faxin College of Cyber Science Nankai University China College of Computer Science Nankai University China Tianjin Key Laboratory of Network and Data Security Technology China Key Laboratory of Data and Intelligent System Security Ministry of Education China
Information Extraction (IE), aiming to extract structured information from unstructured natural language texts, can significantly benefit from pre-trained language models. However, existing pre-training methods solely... 详细信息
来源: 评论
Iterative Bounded Distance Decoding with Random Flipping for Product-Like Codes
收藏 引用
IEEE Transactions on Communications 2024年 第5期73卷 2864-2875页
作者: Li, Guorong Wang, Shiguo Zhao, Shancheng Jinan University National and Local Joint Research Center of Network Security Detection and Protection Technology College of Information Science and Technology Guangzhou510632 China Guangdong Key Laboratory of Data Security and Privacy Preserving The Guangzhou Key Laboratory of Data Security and Privacy Preserving Guangzhou510632 China Changsha University of Science and Technology Computer and Communication Engineering Institute Changsha410114 China
Product-like codes are widely used in high-speed communication systems since they can be decoded with low-complexity hard decision decoders (HDDs). To meet the growing demand of data rates, enhanced HDDs are required.... 详细信息
来源: 评论
Design and Implementation of Rumor Governance System Based on Blockchain  2
Design and Implementation of Rumor Governance System Based o...
收藏 引用
2nd International Conference on Computer Science and Blockchain, CCSB 2022
作者: Li, Yutong Song, Jiazhen Wang, Jingrong Lu, Haori Nie, Peng College of Cyber Science Nankai University Tianjin300350 China Nankai University College of Cyber Science Tianjin Key Laboratory of Network and Data Security Technology Tianjin300350 China
Nowadays, the network rumor is constantly breeding and spreading. It becomes a big difficulty to trace the source and refute the rumors with high efficiency. For this, we designed and implemented an intelligent rumor ... 详细信息
来源: 评论
Exploration on the key Issues of the Teaching Method of Student Independent Proposition
Exploration on the Key Issues of the Teaching Method of Stud...
收藏 引用
International Conference on Guidance, Navigation and Control, ICGNC 2020
作者: Zhang, Jin Quan, Weihong Li, Haoran Wang, Lizhi Gong, Xiaoli Wu, Qian College of Computer Science Nankai University Tianjin China College of Cyber Science Nankai University Tianjin China Tianjin Key Laboratory of Network and Data Security Technology Tianjin China Tianjin University of Science and Technology Tianjin China
In order to figure out the solutions to difficulties facing the university online education platform in the expansion of the question bank, this paper proposes a teaching method of student independent proposition... 详细信息
来源: 评论
Design and Implementation of Cyber Space Threat Detection System Based on User Behavioral Logs  3
Design and Implementation of Cyber Space Threat Detection Sy...
收藏 引用
3rd International Conference on Electronic Information Engineering and Computer Communication, EIECC 2023
作者: Wang, Wenhao Li, Hao Nie, Peng College of Cyber Science Nankai University Tianjin Key Laboratory of Network and Data Security Technology Tianjin China Science and Technology on Communication Networks Laboratory Shijiazhuang China College of Cyber Science Nankai University Tianjin China
In contemporary society, the role of networks in daily work and business activities is increasingly prominent. The enterprise intranet, serving as a crucial bridge for maintaining work stability, asset security, and b... 详细信息
来源: 评论
Leaky Autofill: An Empirical Study on the Privacy Threat of Password Managers’ Autofill Functionality  40
Leaky Autofill: An Empirical Study on the Privacy Threat of ...
收藏 引用
40th Annual Computer security Applications Conference, ACSAC 2024
作者: Fu, Yanduo Wang, Ding College of Cyber Science Nankai University Tianjin300350 China Ministry of Education Tianjin300350 China Tianjin Key Laboratory of Network and Data Security Technology Nankai University Tianjin300350 China
Password managers (PMs) provide users with convenient and robust functionalities to manage their credentials, highly recommended by security experts and major standard bodies. One of the most popular features is the a... 详细信息
来源: 评论
Design and Implementation of Analyzer Management System Based on Elasticsearch  19th
Design and Implementation of Analyzer Management System Ba...
收藏 引用
19th International Conference on Web Information Systems and Applications, WISA 2022
作者: Sun, Jingqi Nie, Peng Xu, Licheng Zhang, Haiwei College of Cyber Science Nankai University Tianjin300350 China College of Computer Science Nankai University Tianjin300350 China Tianjin Key Laboratory of Network and Data Security Technology Tianjin China
Elasticsearch is one of the most popular full-text search and analytics engine. It can store, search, and analyze big volumes of data in near real time. Before searching, Elasticsearch will build multiple inverted ind... 详细信息
来源: 评论
Heterogeneous Fault-Tolerant Aggregate Signcryption with Equality Test for Vehicular Sensor networks
收藏 引用
Computer Modeling in Engineering & Sciences 2023年 第10期137卷 555-575页
作者: Yang Zhao Jingmin An Hao Li Saru Kumari Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of ChinaChengdu610054China Department of Mathematics Chaudhary Charan Singh UniversityMeerut250004India
The vehicular sensor network (VSN) is an important part of intelligent transportation, which is used for real-timedetection and operation control of vehicles and real-time transmission of data and information. In the ... 详细信息
来源: 评论
A Multi-user Shared Searchable Encryption Scheme Supporting SQL Query  3rd
A Multi-user Shared Searchable Encryption Scheme Supporting ...
收藏 引用
3rd International Conference on security and Privacy in New Computing Environments, SPNCE 2020
作者: Li, Mingyue Du, Ruizhong Jia, Chunfu College of Cyber Science Nankai University Tianjin300350 China Tianjin Key Laboratory of Network and Data Security Technology Nankai University Tianjin300350 China School of Cyber Security and Computer Hebei University Baoding071002 China
Due to the tremendous benefits of cloud computing, organizations are highly motivated to store electronic records on clouds. However, outsourcing data to cloud servers separates it from physical control, resulting in ... 详细信息
来源: 评论