咨询与建议

限定检索结果

文献类型

  • 293 篇 会议
  • 245 篇 期刊文献

馆藏范围

  • 538 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 330 篇 工学
    • 259 篇 计算机科学与技术...
    • 214 篇 软件工程
    • 79 篇 信息与通信工程
    • 67 篇 电气工程
    • 32 篇 生物工程
    • 30 篇 网络空间安全
    • 25 篇 控制科学与工程
    • 21 篇 电子科学与技术(可...
    • 20 篇 机械工程
    • 18 篇 光学工程
    • 18 篇 生物医学工程(可授...
    • 16 篇 安全科学与工程
    • 13 篇 交通运输工程
    • 12 篇 仪器科学与技术
    • 11 篇 建筑学
    • 9 篇 化学工程与技术
  • 141 篇 理学
    • 78 篇 数学
    • 37 篇 生物学
    • 32 篇 物理学
    • 28 篇 统计学(可授理学、...
    • 11 篇 化学
  • 71 篇 管理学
    • 46 篇 管理科学与工程(可...
    • 32 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 23 篇 法学
    • 15 篇 社会学
    • 9 篇 法学
  • 18 篇 医学
    • 16 篇 临床医学
    • 14 篇 基础医学(可授医学...
    • 14 篇 公共卫生与预防医...
  • 13 篇 经济学
    • 13 篇 应用经济学
  • 7 篇 农学
  • 7 篇 军事学
  • 3 篇 教育学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 30 篇 semantics
  • 29 篇 feature extracti...
  • 23 篇 accuracy
  • 22 篇 federated learni...
  • 21 篇 training
  • 20 篇 privacy
  • 19 篇 computational mo...
  • 18 篇 deep learning
  • 12 篇 data privacy
  • 12 篇 image segmentati...
  • 12 篇 neural networks
  • 11 篇 data models
  • 10 篇 internet of thin...
  • 10 篇 anomaly detectio...
  • 10 篇 speech processin...
  • 10 篇 contrastive lear...
  • 10 篇 visualization
  • 10 篇 network security
  • 10 篇 cloud computing
  • 9 篇 optimization

机构

  • 69 篇 shandong provinc...
  • 67 篇 key laboratory o...
  • 52 篇 tianjin key labo...
  • 49 篇 network and data...
  • 45 篇 shandong enginee...
  • 43 篇 college of compu...
  • 35 篇 college of cyber...
  • 18 篇 state key labora...
  • 17 篇 shandong fundame...
  • 16 篇 tianjin key labo...
  • 14 篇 tianjin key labo...
  • 13 篇 fujian provincia...
  • 12 篇 faculty of data ...
  • 11 篇 shandong enginee...
  • 10 篇 key laboratory o...
  • 10 篇 school of inform...
  • 9 篇 school of comput...
  • 9 篇 network and data...
  • 9 篇 haihe lab of ita...
  • 9 篇 qilu university ...

作者

  • 17 篇 qin zhen
  • 15 篇 qin zhiguang
  • 13 篇 li tao
  • 12 篇 zhen qin
  • 12 篇 fu fang-wei
  • 12 篇 jia chunfu
  • 11 篇 ding yi
  • 11 篇 jing zhao
  • 11 篇 xiong jinbo
  • 10 篇 tian youliang
  • 10 篇 youliang tian
  • 10 篇 liu bin
  • 9 篇 liu jun
  • 9 篇 yi ding
  • 9 篇 jinbo xiong
  • 9 篇 zhenyu yang
  • 9 篇 zhang hongbin
  • 8 篇 qing yu
  • 8 篇 zhao dongmei
  • 7 篇 cao mingsheng

语言

  • 500 篇 英文
  • 33 篇 其他
  • 6 篇 中文
检索条件"机构=Tianjin Key Laboratory of Network and Data Security Technology"
538 条 记 录,以下是121-130 订阅
排序:
Frequency-hiding order-preserving encryption with small client storage  47th
Frequency-hiding order-preserving encryption with small clie...
收藏 引用
47th International Conference on Very Large data Bases, VLDB 2021
作者: Li, Dongjie Lv, Siyi Huang, Yanyu Liu, Yijing Li, Tong Liu, Zheli Guo, Liang College of Cyber Science Nankai University China Tianjin Key Laboratory of Network and Data Security Technology Nankai University China Huawei Technology Co. Ltd Shenzhen China
The range query on encrypted databases is usually implemented using the order-preserving encryption (OPE) technique which preserves the order of plaintexts. Since the frequency leakage of plaintexts makes OPE vulnerab... 详细信息
来源: 评论
Privacy-preserving Trajectory data Release Hierarchical Model  13
Privacy-preserving Trajectory Data Release Hierarchical Mode...
收藏 引用
13th International Conference on Communication and network security, ICCNS 2023
作者: Zhang, Qian Zhang, Xing Shi, Wei Key Laboratory of Security for Network and Data in Industrial Internet of Liaoning Province Liaoning University of Technology Jinzhou121000 China
The development of positioning technology and mobile intelligent devices has given rise to plentiful location-based services and generated much trajectory data. The publication and analysis of trajectory data bring co... 详细信息
来源: 评论
PathAFL: Path-Coverage Assisted Fuzzing  20
PathAFL: Path-Coverage Assisted Fuzzing
收藏 引用
15th ACM Asia Conference on Computer and Communications security, ASIA CCS 2020
作者: Yan, Shengbo Wu, Chenlu Li, Hang Shao, Wei Jia, Chunfu Nankai University College of Cyber Science TianJin China Nankai University College of Artificial Intelligence TianJin China Nankai University College of Cyber Science TianJin Key Laboratory of Network and Data Security Technology TianJin300350 China
Fuzzing is an effective method to find software bugs and vulnerabilities. One of the most useful techniques is the coverage-guided fuzzing, whose key element is the tracing code coverage information. Existing coverage... 详细信息
来源: 评论
A Performance Comparison Study of Parallel Clustering Algorithms in Cluster Environments  2
A Performance Comparison Study of Parallel Clustering Algori...
收藏 引用
2017 IEEE 2nd International Conference on Big data Analysis(ICBDA 2017)
作者: Mo Hai School of Information Central University of Finance and Economics Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China
We compare the performance of three parallel clustering algorithms:Canopy,K-means and fuzzy K-means in real cluster *** constructing cluster platform of different scale,we compare these algorithms from three metrics:r... 详细信息
来源: 评论
Improved Global and Local Graph Neural network for Session-based Recommendation  25
Improved Global and Local Graph Neural Network for Session-b...
收藏 引用
25th IEEE International Conference on Computer Supported Cooperative Work in Design, CSCWD 2022
作者: Wang, Yifan Yu, Qing Wang, Zuohua Tianjin University of Technology Tianjin Key Laboratory of Intelligence Computing and Network Security Tianjin China China Everbright Bank Co. Ltd Beijing China
The session-based recommendation(SBR) aims to predict user actions based on anonymous sessions. SBR focuses on recent sessions to make more real-time and reliable recommendations and does not need to extract user IDs,... 详细信息
来源: 评论
Chosen-Instruction Attack Against Commercial Code Virtualization Obfuscators  29
Chosen-Instruction Attack Against Commercial Code Virtualiza...
收藏 引用
29th Annual network and Distributed System security Symposium, NDSS 2022
作者: Li, Shijia Jia, Chunfu Qiu, Pengda Chen, Qiyuan Ming, Jiang Gao, Debin Tianjin Key Laboratory of Network and Data Security Technology College of Computer Science Nankai University China The University of Texas Arlington United States Singapore Management University Singapore
Code virtualization is a well-known sophisticated obfuscation technique that uses custom virtual machines (VM) to emulate the semantics of original native instructions. Commercial VM-based obfuscators (e.g., Themida a... 详细信息
来源: 评论
Novel way to research nonlinear feedback shift register
收藏 引用
Science China(Information Sciences) 2014年 第9期57卷 161-174页
作者: ZHAO DaWei PENG HaiPeng LI LiXiang HUI SiLi YANG YiXian Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and Telecommunications Zhejiang Provincial Key Lab of Data Storage and Transmission Technology Hangzhou Dianzi University National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Shandong Provincial Key Laboratory of Computer Network Shandong Computer Science Center
In this paper,we regard the nonlinear feedback shift register(NLFSR)as a special Boolean network,and use semi-tensor product of matrices and matrix expression of logic to convert the dynamic equations of NLFSR into an... 详细信息
来源: 评论
SSpose: Self-Supervised Spatial-Aware Model for Human Pose Estimation
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第11期5卷 5403-5417页
作者: Yu, Linfang Qin, Zhen Xu, Liqun Qin, Zhiguang Choo, Kim-Kwang Raymond University of Electronic Science and Technology of China Network and Data Security Key Laboratory of Sichuan Province Chengdu610054 China Industrial Research Institute Chengdu610213 China University of Electronic Science and Technology of China Network and Data Security Key Laboratory of Sichuan Province School of Information and Software Engineering Chengdu610054 China Industrial Research Institute Chengdu610213 China University of Texas at San Antonio Department of Information Systems and Cyber Security San AntonioTX78249 United States
Human pose estimation (HPE) relies on the anatomical relationships among different body parts to locate keypoints. Despite the significant progress achieved by convolutional neural networks (CNN)-based models in HPE, ... 详细信息
来源: 评论
FortisAVQA and MAVEN: a Benchmark dataset and Debiasing Framework for Robust Multimodal Reasoning
arXiv
收藏 引用
arXiv 2025年
作者: Ma, Jie Gao, Zhitao Chai, Qi Liu, Jun Wang, Pinghui Tao, Jing Su, Zhou Ministry of Education of Key Laboratory for Intelligent Networks and Network Security School of Cyber Science and Engineering Xi’an Jiaotong University Shaanxi Xi’an710049 China Shannxi Provincial Key Laboratory of Big Data Knowledge Engineering School of Computer Science and Technology Xi’an Jiaotong University Shaanxi Xi’an710049 China Guangdong Guangzhou510000 China
Audio-Visual Question Answering (AVQA) is a challenging multimodal reasoning task requiring intelligent systems to answer natural language queries based on paired audio-video inputs accurately. However, existing AVQA ...
来源: 评论
Design and implementation of content confidentiality check system  3
Design and implementation of content confidentiality check s...
收藏 引用
3rd International Conference on Electronic Information Engineering, Big data, and Computer technology, EIBDCT 2024
作者: Song, Yanyan Chen, Menghong Pi, Chunying Nie, Peng College of Computer Science Nankai University Tianjin300350 China College of Cyber Science Nankai University Tianjin300350 China College of Cyber Science Tianjin Key Laboratory of Network and Data Security Technology Nankai University Tianjin300350 China
Nowadays, companies use databases for information storage and it is inevitable that there will be confidential information which can cause severe crises and public relations problems if leaked. In order to solve this ... 详细信息
来源: 评论