咨询与建议

限定检索结果

文献类型

  • 293 篇 会议
  • 245 篇 期刊文献

馆藏范围

  • 538 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 330 篇 工学
    • 259 篇 计算机科学与技术...
    • 214 篇 软件工程
    • 79 篇 信息与通信工程
    • 67 篇 电气工程
    • 32 篇 生物工程
    • 30 篇 网络空间安全
    • 25 篇 控制科学与工程
    • 21 篇 电子科学与技术(可...
    • 20 篇 机械工程
    • 18 篇 光学工程
    • 18 篇 生物医学工程(可授...
    • 16 篇 安全科学与工程
    • 13 篇 交通运输工程
    • 12 篇 仪器科学与技术
    • 11 篇 建筑学
    • 9 篇 化学工程与技术
  • 141 篇 理学
    • 78 篇 数学
    • 37 篇 生物学
    • 32 篇 物理学
    • 28 篇 统计学(可授理学、...
    • 11 篇 化学
  • 71 篇 管理学
    • 46 篇 管理科学与工程(可...
    • 32 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 23 篇 法学
    • 15 篇 社会学
    • 9 篇 法学
  • 18 篇 医学
    • 16 篇 临床医学
    • 14 篇 基础医学(可授医学...
    • 14 篇 公共卫生与预防医...
  • 13 篇 经济学
    • 13 篇 应用经济学
  • 7 篇 农学
  • 7 篇 军事学
  • 3 篇 教育学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 30 篇 semantics
  • 29 篇 feature extracti...
  • 23 篇 accuracy
  • 22 篇 federated learni...
  • 21 篇 training
  • 20 篇 privacy
  • 19 篇 computational mo...
  • 18 篇 deep learning
  • 12 篇 data privacy
  • 12 篇 image segmentati...
  • 12 篇 neural networks
  • 11 篇 data models
  • 10 篇 internet of thin...
  • 10 篇 anomaly detectio...
  • 10 篇 speech processin...
  • 10 篇 contrastive lear...
  • 10 篇 visualization
  • 10 篇 network security
  • 10 篇 cloud computing
  • 9 篇 optimization

机构

  • 69 篇 shandong provinc...
  • 67 篇 key laboratory o...
  • 52 篇 tianjin key labo...
  • 49 篇 network and data...
  • 45 篇 shandong enginee...
  • 43 篇 college of compu...
  • 35 篇 college of cyber...
  • 18 篇 state key labora...
  • 17 篇 shandong fundame...
  • 16 篇 tianjin key labo...
  • 14 篇 tianjin key labo...
  • 13 篇 fujian provincia...
  • 12 篇 faculty of data ...
  • 11 篇 shandong enginee...
  • 10 篇 key laboratory o...
  • 10 篇 school of inform...
  • 9 篇 school of comput...
  • 9 篇 network and data...
  • 9 篇 haihe lab of ita...
  • 9 篇 qilu university ...

作者

  • 17 篇 qin zhen
  • 15 篇 qin zhiguang
  • 13 篇 li tao
  • 12 篇 zhen qin
  • 12 篇 fu fang-wei
  • 12 篇 jia chunfu
  • 11 篇 ding yi
  • 11 篇 jing zhao
  • 11 篇 xiong jinbo
  • 10 篇 tian youliang
  • 10 篇 youliang tian
  • 10 篇 liu bin
  • 9 篇 liu jun
  • 9 篇 yi ding
  • 9 篇 jinbo xiong
  • 9 篇 zhenyu yang
  • 9 篇 zhang hongbin
  • 8 篇 qing yu
  • 8 篇 zhao dongmei
  • 7 篇 cao mingsheng

语言

  • 500 篇 英文
  • 33 篇 其他
  • 6 篇 中文
检索条件"机构=Tianjin Key Laboratory of Network and Data Security Technology"
538 条 记 录,以下是161-170 订阅
排序:
MDFD: Study of Distributed Non-IID Scenarios and Frechet Distance-Based Evaluation
MDFD: Study of Distributed Non-IID Scenarios and Frechet Dis...
收藏 引用
IEEE International Conference on Image Processing
作者: Wei Wang Mingwei Zhang Ziwen Wu Qianxi Chen Yue Li Trusted AI Laboratory College of Computer Science Nankai University Tianjin Key Laboratory of Network and Data Security Technology Tianjin China
With the development of distributed machine learning and federated learning, the solution to the data island problem is promoted. People use computer clusters to train machine learning models on data distributed in di...
来源: 评论
A security Analysis of Honey Vaults
A Security Analysis of Honey Vaults
收藏 引用
IEEE Symposium on security and Privacy
作者: Fei Duan Ding Wang Chunfu Jia College of Cyber Science Nankai University Tianjin China Key Laboratory of Data and Intelligent System Security (NKU) Ministry of Education Tianjin China Tianjin Key Laboratory of Network and Data Security Technology Nankai University Tianjin China
Honey encryption (HE) protected password vaults (called honey vaults) are promising tools that allow a user to store multiple passwords (called a password vault) and encrypt them with a master password using HE. In ca... 详细信息
来源: 评论
Joint Optimization Task Offloading Strategy for Mobile Edge Computing  2
Joint Optimization Task Offloading Strategy for Mobile Edge ...
收藏 引用
2nd IEEE International Conference on Information technology, Big data and Artificial Intelligence, ICIBA 2021
作者: Tang, Xue Wen, Zhan Chen, Jiali Li, Yiquan Li, Wenzao College of Communication Engineer Chengdu University of Information Technology Chengdu China Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Chengdu611730 China
With increase of Internet of Things (IoT) devices, the burden of cloud computing servers is gradually increasing. Mobile Edge Computing (MEC), as an emerging solution, can relieve the pressure of computing and improve... 详细信息
来源: 评论
Differentially Private and Heterogeneity-Robust Federated Learning With Theoretical Guarantee
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第12期5卷 6369-6384页
作者: Wang, Xiuhua Wang, Shuai Li, Yiwei Fan, Fengrui Li, Shikang Lin, Xiaodong Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China University of Electronic Science and Technology of China National Key Laboratory of Wireless Communications Chengdu611731 China Xiamen University of Technology Fujian Key Laboratory of Communication Network and Information Processing Xiamen361024 China University of Guelph School of Computer Science GuelphONN1G 2W1 Canada
Federated learning (FL) is a popular distributed paradigm where enormous clients collaboratively train a machine learning (ML) model under the orchestration of a central server without knowing the clients' private... 详细信息
来源: 评论
Integrated Multi-featured Android Malicious Code Detection
Integrated Multi-featured Android Malicious Code Detection
收藏 引用
2019国际计算机前沿大会
作者: Qing Yu Hui Zhao Tianjin Key Laboratory of Intelligence Computing and Network Security Tianjin University of Technology
To solve the problem that using a single feature cannot play the role of multiple features of Android application in malicious code detection,an Android malicious code detection mechanism is proposed based on integrat...
来源: 评论
Fair electronic voting via bitcoin deposits  5th
Fair electronic voting via bitcoin deposits
收藏 引用
5th International Conference on Geo-Spatial Knowledge and Intelligence, GSKI 2017
作者: Wu, Xijuan Wei, Baodian Tian, Haibo Du, Yusong Ma, Xiao School of Data and Computer Science Sun Yat-sen University Guangzhou China Guangdong Key Laboratory of Information Security Technology Guangzhou China Chongqing Key Lab of Computer Network and Communication Technology Chongqing China
Bitcoin is the most popular decentralized digital currency now in use. Block chain is the basic technology of Bitcoin, providing a trustable ledger that can be publicly verified. Research on distributed applications b... 详细信息
来源: 评论
E2E-MFERC:AMulti-Face Expression Recognition Model for Group Emotion Assessment
收藏 引用
Computers, Materials & Continua 2024年 第4期79卷 1105-1135页
作者: Lin Wang Juan Zhao Hu Song Xiaolong Xu Jiangsu Key Laboratory of Big Data Security&Intelligent Processing Nanjing University of Posts and TelecommunicationsNanjing210042China School of Network Security Jinling Institute of TechnologyNanjing211169China State Grid Jiangsu Electric Power Company Limited Nanjing210000China School of Computer Science Nanjing University of Posts and TelecommunicationsNanjing210042China
In smart classrooms, conducting multi-face expression recognition based on existing hardware devices to assessstudents’ group emotions can provide educators with more comprehensive and intuitive classroom effect anal... 详细信息
来源: 评论
An Efficient and Provably Secure SM2 key-Insulated Signature Scheme for Industrial Internet of Things
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第1期138卷 903-915页
作者: Senshan Ouyang Xiang Liu Lei Liu Shangchao Wang Baichuan Shao Yang Zhao School of Mechanical Engineering Northwestern Polytechnical UniversityXi’anChina Department of Process and Information Technology Chengdu Aircraft Industrial(Group)Co.Ltd.ChengduChina School of Information and Software Engineering The Network and Data Security Key Laboratory of Sichuan ProvinceUniversity of Electronic Science and Technology of ChinaChengduChina
With the continuous expansion of the Industrial Internet of Things(IIoT),more andmore organisations are placing large amounts of data in the cloud to reduce ***,the channel between cloud servers and smart equipment is... 详细信息
来源: 评论
New (k, l, m)-verifiable multi-secret sharing schemes based on XTR public key system
arXiv
收藏 引用
arXiv 2020年
作者: Yang, Jing Fu, Fang-Wei Chern Institute of Mathematics and LPMC Tianjin Key Laboratory of Network and Data Security Technology Nankai University Tianjin300071 China
Secret sharing was proposed primarily in 1979 to solve the problem of key distribution. In recent decades, researchers have proposed many improvement schemes. Among all these schemes, the verifiable multi-secret shari... 详细信息
来源: 评论
New results on vectorial dual-bent functions and partial difference sets
arXiv
收藏 引用
arXiv 2022年
作者: Wang, Jiaxin Fu, Fang-Wei Chern Institute of Mathematics and LPMC Tianjin Key Laboratory of Network and Data Security Technology Nankai University Tianjin300071 China
Bent functions f: Vn → Fp with certain additional properties play an important role in constructing partial difference sets, where Vn denotes an n-dimensional vector space over Fp, p is an odd prime. In [2,3], the so... 详细信息
来源: 评论