咨询与建议

限定检索结果

文献类型

  • 293 篇 会议
  • 242 篇 期刊文献

馆藏范围

  • 535 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 328 篇 工学
    • 258 篇 计算机科学与技术...
    • 214 篇 软件工程
    • 80 篇 信息与通信工程
    • 67 篇 电气工程
    • 32 篇 生物工程
    • 30 篇 网络空间安全
    • 26 篇 控制科学与工程
    • 22 篇 电子科学与技术(可...
    • 20 篇 机械工程
    • 18 篇 生物医学工程(可授...
    • 17 篇 光学工程
    • 16 篇 安全科学与工程
    • 13 篇 仪器科学与技术
    • 13 篇 交通运输工程
    • 10 篇 建筑学
    • 9 篇 化学工程与技术
  • 141 篇 理学
    • 78 篇 数学
    • 37 篇 生物学
    • 32 篇 物理学
    • 28 篇 统计学(可授理学、...
    • 12 篇 化学
  • 71 篇 管理学
    • 45 篇 管理科学与工程(可...
    • 33 篇 图书情报与档案管...
    • 15 篇 工商管理
  • 23 篇 法学
    • 15 篇 社会学
    • 9 篇 法学
  • 18 篇 医学
    • 16 篇 临床医学
    • 14 篇 基础医学(可授医学...
    • 14 篇 公共卫生与预防医...
  • 13 篇 经济学
    • 13 篇 应用经济学
  • 7 篇 农学
  • 7 篇 军事学
  • 3 篇 教育学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 30 篇 semantics
  • 30 篇 feature extracti...
  • 24 篇 accuracy
  • 22 篇 federated learni...
  • 21 篇 training
  • 20 篇 computational mo...
  • 20 篇 privacy
  • 18 篇 deep learning
  • 12 篇 data privacy
  • 12 篇 image segmentati...
  • 12 篇 neural networks
  • 11 篇 data models
  • 10 篇 internet of thin...
  • 10 篇 anomaly detectio...
  • 10 篇 speech processin...
  • 10 篇 contrastive lear...
  • 10 篇 visualization
  • 10 篇 network security
  • 10 篇 cloud computing
  • 9 篇 optimization

机构

  • 69 篇 shandong provinc...
  • 67 篇 key laboratory o...
  • 52 篇 tianjin key labo...
  • 49 篇 network and data...
  • 45 篇 shandong enginee...
  • 43 篇 college of compu...
  • 35 篇 college of cyber...
  • 18 篇 state key labora...
  • 17 篇 shandong fundame...
  • 16 篇 tianjin key labo...
  • 14 篇 tianjin key labo...
  • 13 篇 fujian provincia...
  • 12 篇 faculty of data ...
  • 11 篇 shandong enginee...
  • 10 篇 school of inform...
  • 9 篇 school of comput...
  • 9 篇 key laboratory o...
  • 9 篇 network and data...
  • 9 篇 haihe lab of ita...
  • 9 篇 qilu university ...

作者

  • 17 篇 qin zhen
  • 14 篇 qin zhiguang
  • 13 篇 li tao
  • 12 篇 zhen qin
  • 12 篇 jia chunfu
  • 11 篇 jing zhao
  • 11 篇 fu fang-wei
  • 11 篇 xiong jinbo
  • 10 篇 yi ding
  • 10 篇 ding yi
  • 10 篇 tian youliang
  • 10 篇 youliang tian
  • 10 篇 liu bin
  • 9 篇 liu jun
  • 9 篇 jinbo xiong
  • 9 篇 zhenyu yang
  • 9 篇 zhang hongbin
  • 8 篇 qing yu
  • 8 篇 zhao dongmei
  • 7 篇 jiguo yu

语言

  • 499 篇 英文
  • 31 篇 其他
  • 6 篇 中文
检索条件"机构=Tianjin Key Laboratory of Network and Data Security Technology"
535 条 记 录,以下是11-20 订阅
排序:
A Novel Approach to Cloud security: Publicly Verifiable Remote Signcryption Framework
收藏 引用
IEEE Internet of Things Journal 2025年 第10期12卷 14828-14844页
作者: Ali, Mohammad Liu, Ximeng Amirkabir University of Technology Department of Mathematics and Computer Science Tehran Iran Fuzhou University Key Laboratory of Information Security of Network Systems College of Computer and Data Science Fuzhou350108 China
In communication systems, ensuring both data integrity and confidentiality is crucial. Traditional methods, such as encryption and signature schemes, handle these aspects separately, leading to inefficiencies. Signcry... 详细信息
来源: 评论
Understanding User Passwords through Parsing Tree
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Wang, Ding Shan, Xuan Wu, Yuxuan Jia, Chunfu Nankai University College of Cryptology and Cyber Science Tianjin300350 China Ministry of Education of China Henan Key Laboratory of Network Cryptography Key Laboratory of Cyberspace Security China Nankai University Tianjin Key Laboratory of Network and Data Security Technology Tianjin300350 China
Passwords are today's dominant form of authentication, and password guessing is the most effective method for evaluating password strength. Most password guessing models (e.g., PCFG, Markov, and RFGuess) regard pa... 详细信息
来源: 评论
Get the Punchline: Headline-Centric Multi-View Learning for Personalized Headline Generation
IEEE Transactions on Audio, Speech and Language Processing
收藏 引用
IEEE Transactions on Audio, Speech and Language Processing 2025年 33卷 962-973页
作者: Wenya Guo Shenglong Yu Ying Zhang Zhengkun Zhang Xiaojie Yuan College of Computer Science Nankai University Tianjin China Tianjin Key Laboratory of Network and Data Security Technology College of Cyber Science Nankai University Tianjin China
Personalized news headline generation aims to generate a user-specific headline based on their reading histories. Existing approaches incorporate information from various aspects of news articles, which leads to a lac... 详细信息
来源: 评论
MMH-FE:AMulti-Precision and Multi-Sourced Heterogeneous Privacy-Preserving Neural network Training Based on Functional Encryption
收藏 引用
Computers, Materials & Continua 2025年 第3期82卷 5387-5405页
作者: Hao Li Kuan Shao Xin Wang Mufeng Wang Zhenyong Zhang The State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang550025China Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science CenterQilu University of Technology(Shandong Academy of Sciences)Jinan250014China China Industrial Control Systems Cyber Emergency Response Team Beijing100040China
Due to the development of cloud computing and machine learning,users can upload their data to the cloud for machine learning model ***,dishonest clouds may infer user data,resulting in user data *** schemes have achie... 详细信息
来源: 评论
POINTERGUESS: targeted password guessing model using pointer mechanism  24
POINTERGUESS: targeted password guessing model using pointer...
收藏 引用
Proceedings of the 33rd USENIX Conference on security Symposium
作者: Kedong Xiu Ding Wang College of Cyber Science Nankai University Tianjin China and Key Laboratory of Data and Intelligent System Security (NKU) Ministry of Education Tianjin China and Tianjin Key Laboratory of Network and Data Security Technology Nankai University Tianjin China
Most existing targeted password guessing models view users' reuse behaviors as sequences of edit operations (e.g., insert and delete) performed on old passwords. These atomic edit operations are limited to modifyi...
来源: 评论
An Improved Multi-objective Particle Swarm Optimization Algorithm with Reduced Initial Search Space  21st
An Improved Multi-objective Particle Swarm Optimization Algo...
收藏 引用
21st Pacific Rim International Conference on Artificial Intelligence, PRICAI 2024
作者: Zhiguang, Chu Yingchen, Fan Xiaolei, Zhang Ruyan, Zhang Xing, Zhang School of Electronics and Information Engineering Liaoning University of Technology Jinzhou121000 China Key Laboratory of Security for Network and Data in Industrial Internet of Liaoning Province Jinzhou121000 China
As data dimensions continue to increase, the challenges of data storage become more severe. While feature selection can reduce the complexity of high-dimensional data, existing methods are prone to local optima and hi... 详细信息
来源: 评论
Practical Two-Factor Authentication Protocol for Real-Time data Access in WSNs
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Xu, Meijia Wang, Ding Nankai University College of Cryptology and Cyber Science Tianjin300350 China Tianjin300350 China Nankai University Tianjin Key Laboratory of Network and Data Security Technology Tianjin300350 China
With the rapid development of sensors and communication technologies, the Internet of Things (IoT) paradigm has increasingly expanded to cover various daily, industrial, and military applications. As a core component ... 详细信息
来源: 评论
A circuit area optimization of MK-3 S-box
收藏 引用
Cybersecurity 2025年 第1期8卷 61-71页
作者: Yanjun Li Weiguo Zhang Yiping Lin Jian Zou Jian Liu Information Industry Information Security Evaluation Center The 15th Research Institute of China Electronic Technology Group CorporationBeijing 100083China Henan Key Laboratory of Network Cryptography Technology Zhengzhou 450001China Beijing Electronic Science and Technology Institute No.7 Fufeng RoadFengtai DistricBeijing 100083China College of Computer and Data Science Fuzhou UniversityFuzhou 350108China
In MILCOM 2015,Kelly et *** the authentication encryption algorithm MK-3,which applied the 16-bit *** paper aims to implement the 16-bit S-box with less circuit ***,we classifed the irreducible polynomials over F_(2n)... 详细信息
来源: 评论
DSDIR: A Two-Stage Method for Addressing Noisy Long-Tailed Problems in Malicious Traffic Detection
DSDIR: A Two-Stage Method for Addressing Noisy Long-Tailed P...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Guoliang Li Ruiqi Zhang Zhe Sun Lingkai Xing Yu Zhang College of Cyber Science Nankai University China Tianjin Key Laboratory of Network and Data Security Technology China Key Laboratory of Data and Intelligent System Security Ministry of Education China College of Computer Science Nankai University China
In recent years, deep learning based malicious traffic detection (MTD) systems have demonstrated remarkable success. However, their effectiveness tend to decrease because most malicious traffic datasets are suffered f... 详细信息
来源: 评论
FedFLD: Heterogeneous Federated Learning via Forget-Less Distillation
FedFLD: Heterogeneous Federated Learning via Forget-Less Dis...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Xiaoyang Yi Jian Zhang Jing Chen Yuru Bao Lingkai Xing College of Cyber Science Nankai University China Tianjin Key Laboratory of Network and Data Security Technology Tianjin China College of Computer Science Nankai University China
Federated learning, as a distributed machine learning paradigm, enhances privacy protection but faces the challenge of heterogeneity. data-free knowledge distillation (DFKD) methods attempt to overcome this challenge ... 详细信息
来源: 评论