咨询与建议

限定检索结果

文献类型

  • 293 篇 会议
  • 245 篇 期刊文献

馆藏范围

  • 538 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 330 篇 工学
    • 259 篇 计算机科学与技术...
    • 214 篇 软件工程
    • 79 篇 信息与通信工程
    • 67 篇 电气工程
    • 32 篇 生物工程
    • 30 篇 网络空间安全
    • 25 篇 控制科学与工程
    • 21 篇 电子科学与技术(可...
    • 20 篇 机械工程
    • 18 篇 光学工程
    • 18 篇 生物医学工程(可授...
    • 16 篇 安全科学与工程
    • 13 篇 交通运输工程
    • 12 篇 仪器科学与技术
    • 11 篇 建筑学
    • 9 篇 化学工程与技术
  • 141 篇 理学
    • 78 篇 数学
    • 37 篇 生物学
    • 32 篇 物理学
    • 28 篇 统计学(可授理学、...
    • 11 篇 化学
  • 71 篇 管理学
    • 46 篇 管理科学与工程(可...
    • 32 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 23 篇 法学
    • 15 篇 社会学
    • 9 篇 法学
  • 18 篇 医学
    • 16 篇 临床医学
    • 14 篇 基础医学(可授医学...
    • 14 篇 公共卫生与预防医...
  • 13 篇 经济学
    • 13 篇 应用经济学
  • 7 篇 农学
  • 7 篇 军事学
  • 3 篇 教育学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 30 篇 semantics
  • 29 篇 feature extracti...
  • 23 篇 accuracy
  • 22 篇 federated learni...
  • 21 篇 training
  • 20 篇 privacy
  • 19 篇 computational mo...
  • 18 篇 deep learning
  • 12 篇 data privacy
  • 12 篇 image segmentati...
  • 12 篇 neural networks
  • 11 篇 data models
  • 10 篇 internet of thin...
  • 10 篇 anomaly detectio...
  • 10 篇 speech processin...
  • 10 篇 contrastive lear...
  • 10 篇 visualization
  • 10 篇 network security
  • 10 篇 cloud computing
  • 9 篇 optimization

机构

  • 69 篇 shandong provinc...
  • 67 篇 key laboratory o...
  • 52 篇 tianjin key labo...
  • 49 篇 network and data...
  • 45 篇 shandong enginee...
  • 43 篇 college of compu...
  • 35 篇 college of cyber...
  • 18 篇 state key labora...
  • 17 篇 shandong fundame...
  • 16 篇 tianjin key labo...
  • 14 篇 tianjin key labo...
  • 13 篇 fujian provincia...
  • 12 篇 faculty of data ...
  • 11 篇 shandong enginee...
  • 10 篇 key laboratory o...
  • 10 篇 school of inform...
  • 9 篇 school of comput...
  • 9 篇 network and data...
  • 9 篇 haihe lab of ita...
  • 9 篇 qilu university ...

作者

  • 17 篇 qin zhen
  • 15 篇 qin zhiguang
  • 13 篇 li tao
  • 12 篇 zhen qin
  • 12 篇 fu fang-wei
  • 12 篇 jia chunfu
  • 11 篇 ding yi
  • 11 篇 jing zhao
  • 11 篇 xiong jinbo
  • 10 篇 tian youliang
  • 10 篇 youliang tian
  • 10 篇 liu bin
  • 9 篇 liu jun
  • 9 篇 yi ding
  • 9 篇 jinbo xiong
  • 9 篇 zhenyu yang
  • 9 篇 zhang hongbin
  • 8 篇 qing yu
  • 8 篇 zhao dongmei
  • 7 篇 cao mingsheng

语言

  • 500 篇 英文
  • 33 篇 其他
  • 6 篇 中文
检索条件"机构=Tianjin Key Laboratory of Network and Data Security Technology"
538 条 记 录,以下是131-140 订阅
排序:
Aggregation-based dual heterogeneous task allocation in spatial crowdsourcing
收藏 引用
Frontiers of Computer Science 2024年 第6期18卷 215-227页
作者: Xiaochuan LIN Kaimin WEI Zhetao LI Jinpeng CHEN Tingrui PEI College of Information Science and Technology&Cyberspace Security Jinan UniversityGuangzhou 510632China National&Local Joint Engineering Research Center of Network Security Detection and Protection Technology Guangzhou 510632China Guangdong Provincial Key Laboratory of Data Security and Privacy Protection Guangzhou 510632China School of Computer Science Beijing University of Posts and TelecommunicationsBeijing 100876China
Spatial crowdsourcing(SC)is a popular data collection paradigm for numerous *** the increment of tasks and workers in SC,heterogeneity becomes an unavoidable difficulty in task *** researches only focus on the single-... 详细信息
来源: 评论
Self-feedback LSTM regression model for real-time particle source apportionment
收藏 引用
Journal of Environmental Sciences 2022年 第4期34卷 10-20页
作者: Wei Wang Weiman Xu Shuai Deng Yimeng Chai Ruoyu Ma Guoliang Shi Bo Xu Mei Li Yue Li Trusted AI System Laboratory College of Computer ScienceNankai UniversityTianjin 300350China KLMDASR Tianjin Key Laboratory of Network and Data Security TechnologyTianjin 300350China State Environmental Protection Key Laboratory of Urban Ambient Air Particulate Matter Pollution Prevention and Control College of Environmental Science and EngineeringNankai UniversityTianjin 300071China Institute of Mass Spectrometry and Atmospheric Environment Guangdong Provincial Engineering Research Center for on-line source apportionment system of air pollution Jinan UniversityGuangzhou 510632China Guangdong-Hongkong-Macao Joint Laboratory of Collaborative Innovation for Environmental Quality Guangzhou 510632China
Atmospheric particulate matter pollution has attracted much wider attention *** recent years,the development of atmospheric particle collection techniques has put forwards new demands on the real-time source apportion... 详细信息
来源: 评论
DBKEM-AACS: a distributed key escrow model in blockchain with anonymous authentication and committee selection
收藏 引用
Science China(Information Sciences) 2023年 第3期66卷 289-290页
作者: Axin XIANG Hongfeng GAO Youliang TIAN Liang WAN College of Computer Science and Technology Guizhou University Institute of Cryptography and Data Security Guizhou University Network and Information Management Center Guizhou University State Key Laboratory of Public Big Data Guizhou University Institute of Computer Software and Theory Guizhou University
Dear editor, key security is of great practical significance and demand to guarantee the security of digital assets in the blockchain system. At present, users prefer to escrow their assets on centralized institutions...
来源: 评论
Dynamic Detection of Malicious Code on Android Based on Improved Multi-feature Gaussian Kernel  15th
Dynamic Detection of Malicious Code on Android Based on Impr...
收藏 引用
15th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery, ICNC-FSKD 2019, co-located with the 5th International Conference on Harmony Search, Soft Computing and Applications, ICHSA 2019
作者: Yu, Qing Luo, Xixi Wang, Zuohua Tianjin Key Laboratory of Intelligence Computing and Network Security Tianjin University of Technology Tianjin300384 China China Everbright Bank Co. Ltd. Tianjin300384 China
In recent years, with the increasing demand for mobile Internet, smartphones represented by the Android system begin to play an increasingly important role in people’s daily life. Due to the payment and social functi... 详细信息
来源: 评论
A Linked List Encryption Scheme for Image Steganography without Embedding
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第10期141卷 331-352页
作者: Pengbiao Zhao Qi Zhong Jingxue Chen Xiaopei Wang Zhen Qin Erqiang Zhou Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of ChinaChengdu610054China Faculty of Data Science City University of MacaoMacao999078China Department of Computer Science and Engineering University of CaliforniaRiversideCA 92521USA
Information steganography has received more and more attention from scholars nowadays,especially in the area of image steganography,which uses image content to transmit information and makes the existence of secret in... 详细信息
来源: 评论
Design and implementation of coronavirus vaccines information traceability system based on blockchain
Design and implementation of coronavirus vaccines informatio...
收藏 引用
2021 International Symposium on Artificial Intelligence and its Application on Media, ISAIAM 2021
作者: Nie, Peng Zhou, Xinxing Wang, Chong Zheng, Huilin Zeng, Yubing Nankai University College of Cyber Science Tianjin Key Laboratory of Network and Data Security Technology Tianjin300350 China Nankai University College of Computer Science Tianjin300350 China Nankai University College of Cyber Science Tianjin300350 China
At the moment of COVID-19's continuing popularity, vaccination has become a necessary measure to fight against the COVID-19 under the community of common destiny. In order to provide more reliable vaccines traceab... 详细信息
来源: 评论
Cryptanalysis of novel extended multivariate public key cryptosystem with invertible cycle
收藏 引用
International Journal of network security 2018年 第3期20卷 509-514页
作者: Lu, Gang Xue, Linyuan Nie, Xuyun Qin, Zhiguang School of Information and Software Engineering University of Electronic Science and Technology of China Section 2 North Jianshe Road Chengdu610054 China State Key Laboratory of Information Security Institute of Information Engineering China Network and Data Security Key Laboratory of Sichuan Province China
In 2016, Qiao et al. proposed a novel extended multivariate public key cryptosystem (EMC) to enhance the security of multivariate public key cryptosystem. They applied it on Matsumoto-Imai (MI) encryption scheme and c... 详细信息
来源: 评论
Password Guessing via Neural Language Modeling  1
收藏 引用
2nd International Conference on Machine Learning for Cyber security, ML4CS 2019
作者: Li, Hang Chen, Mengqi Yan, Shengbo Jia, Chunfu Li, Zhaohui College of Artificial Intelligence Nankai University Tianjin300350 China College of Cyber Science Nankai University Tianjin300350 China Tianjin Key Laboratory of Network and Data Security Nankai University Tianjin300350 China
Passwords are the major part of authentication in current social networks. The state-of-the-art password guessing approaches, such as Markov model and probabilistic context-free grammars (PCFG) model, assign a probabi... 详细信息
来源: 评论
A Secure and Lightweight Client-Side Deduplication Approach for Resisting Side Channel Attacks
A Secure and Lightweight Client-Side Deduplication Approach ...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Yuchen Chen Chunfu Jia Guanxiong Ha Xuan Shan Hang Chen The College of Cyber Science Nankai University Tianjin China Tianjin Key Laboratory of Network and Data Security Technology Tianjin China Key Laboratory of Data and Intelligent System Security (DISSec) Data Security Technology Tianjin China
Client-side deduplication system is widely used in cloud storage systems to reduce storage and communication overhead by eliminating the storing and uploading of duplicate data. However, it is vulnerable to side chann... 详细信息
来源: 评论
Attribute Propagation Enhanced Community Detection Model for Bitcoin De-anonymizing  3rd
Attribute Propagation Enhanced Community Detection Model for...
收藏 引用
3rd International Conference on Machine Learning for Cyber security, ML4CS 2020
作者: Wang, Jiming Xie, Xueshuo Fang, Yaozheng Lu, Ye Li, Tao Wang, Guiling College of Computer Science Nankai University Tianjin300350 China College of Cyber Science Nankai University Tianjin300350 China Tianjin Key Laboratory of Network and Data Security Technology Tianjin300350 China New Jersey Institute of Technology NewarkNJ07102 United States
Bitcoin is a kind of decentralized cryptocurrency on a peer-to-peer network. Anonymity makes Bitcoin widely used in online payment but it is a disadvantage for regulatory purposes. We aim to de-anonymize Bitcoin to as... 详细信息
来源: 评论