咨询与建议

限定检索结果

文献类型

  • 294 篇 会议
  • 235 篇 期刊文献

馆藏范围

  • 529 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 329 篇 工学
    • 262 篇 计算机科学与技术...
    • 219 篇 软件工程
    • 83 篇 信息与通信工程
    • 66 篇 电气工程
    • 32 篇 生物工程
    • 31 篇 控制科学与工程
    • 30 篇 网络空间安全
    • 28 篇 电子科学与技术(可...
    • 19 篇 光学工程
    • 17 篇 机械工程
    • 17 篇 生物医学工程(可授...
    • 16 篇 安全科学与工程
    • 12 篇 仪器科学与技术
    • 12 篇 交通运输工程
    • 11 篇 建筑学
    • 9 篇 化学工程与技术
  • 142 篇 理学
    • 80 篇 数学
    • 37 篇 生物学
    • 31 篇 物理学
    • 30 篇 统计学(可授理学、...
    • 11 篇 化学
  • 69 篇 管理学
    • 44 篇 管理科学与工程(可...
    • 32 篇 图书情报与档案管...
    • 15 篇 工商管理
  • 25 篇 法学
    • 15 篇 社会学
    • 11 篇 法学
  • 14 篇 医学
    • 12 篇 临床医学
    • 11 篇 基础医学(可授医学...
    • 11 篇 公共卫生与预防医...
  • 13 篇 经济学
    • 13 篇 应用经济学
  • 7 篇 农学
  • 7 篇 军事学
  • 2 篇 教育学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 30 篇 semantics
  • 29 篇 feature extracti...
  • 24 篇 federated learni...
  • 23 篇 accuracy
  • 20 篇 privacy
  • 19 篇 training
  • 18 篇 deep learning
  • 18 篇 computational mo...
  • 13 篇 data privacy
  • 12 篇 neural networks
  • 11 篇 image segmentati...
  • 10 篇 internet of thin...
  • 10 篇 anomaly detectio...
  • 10 篇 contrastive lear...
  • 10 篇 visualization
  • 10 篇 network security
  • 10 篇 cloud computing
  • 10 篇 data models
  • 9 篇 speech processin...
  • 9 篇 optimization

机构

  • 69 篇 shandong provinc...
  • 67 篇 key laboratory o...
  • 52 篇 tianjin key labo...
  • 48 篇 network and data...
  • 45 篇 shandong enginee...
  • 44 篇 college of compu...
  • 35 篇 college of cyber...
  • 17 篇 tianjin key labo...
  • 17 篇 state key labora...
  • 16 篇 shandong fundame...
  • 14 篇 tianjin key labo...
  • 12 篇 faculty of data ...
  • 12 篇 fujian provincia...
  • 11 篇 shandong enginee...
  • 10 篇 key laboratory o...
  • 9 篇 school of comput...
  • 9 篇 network and data...
  • 9 篇 school of inform...
  • 9 篇 haihe lab of ita...
  • 9 篇 key laboratory o...

作者

  • 16 篇 qin zhen
  • 14 篇 li tao
  • 14 篇 qin zhiguang
  • 11 篇 jing zhao
  • 11 篇 zhen qin
  • 11 篇 jia chunfu
  • 10 篇 ding yi
  • 10 篇 fu fang-wei
  • 10 篇 youliang tian
  • 10 篇 liu bin
  • 10 篇 xiong jinbo
  • 9 篇 liu jun
  • 9 篇 yi ding
  • 9 篇 jinbo xiong
  • 9 篇 tian youliang
  • 9 篇 zhenyu yang
  • 9 篇 zhang hongbin
  • 8 篇 qing yu
  • 8 篇 huang shenwei
  • 8 篇 zhao dongmei

语言

  • 489 篇 英文
  • 35 篇 其他
  • 6 篇 中文
检索条件"机构=Tianjin Key Laboratory of Network and Data Security Technology"
529 条 记 录,以下是31-40 订阅
排序:
Understanding User Passwords through Parsing Tree
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Wang, Ding Shan, Xuan Wu, Yuxuan Jia, Chunfu Nankai University College of Cryptology and Cyber Science Tianjin300350 China Ministry of Education of China Henan Key Laboratory of Network Cryptography Key Laboratory of Cyberspace Security China Nankai University Tianjin Key Laboratory of Network and Data Security Technology Tianjin300350 China
Passwords are today's dominant form of authentication, and password guessing is the most effective method for evaluating password strength. Most password guessing models (e.g., PCFG, Markov, and RFGuess) regard pa... 详细信息
来源: 评论
Privacy-preserving Trajectory data Release Hierarchical Model  13
Privacy-preserving Trajectory Data Release Hierarchical Mode...
收藏 引用
13th International Conference on Communication and network security, ICCNS 2023
作者: Zhang, Qian Zhang, Xing Shi, Wei Key Laboratory of Security for Network and Data in Industrial Internet of Liaoning Province Liaoning University of Technology Jinzhou121000 China
The development of positioning technology and mobile intelligent devices has given rise to plentiful location-based services and generated much trajectory data. The publication and analysis of trajectory data bring co... 详细信息
来源: 评论
Probabilistic Reliability via Subsystem Structures of Arrangement Graph networks
收藏 引用
IEEE Transactions on Reliability 2024年 第1期73卷 279-289页
作者: Huang, Yanze Lin, Limei Xu, Li Hsieh, Sun-Yuan Fujian University of Technology Fujian Provincial Key Laboratory of Big Data Mining and Applications School of Computer Science and Mathematics Fuzhou350118 China Fujian Normal University College of Computer and Cyber Security Key Laboratory of Network Security and Cryptology Fuzhou350117 China National Cheng Kung University Department of Computer Science and Information Engineering Tainan701 Taiwan
With the rapid growth of the number of processors in a multiprocessor system, faulty processors occur in it with a probability that rises quickly. The probability of a subsystem with an appropriate size being fault-fr... 详细信息
来源: 评论
MMH-FE:AMulti-Precision and Multi-Sourced Heterogeneous Privacy-Preserving Neural network Training Based on Functional Encryption
收藏 引用
Computers, Materials & Continua 2025年 第3期82卷 5387-5405页
作者: Hao Li Kuan Shao Xin Wang Mufeng Wang Zhenyong Zhang The State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang550025China Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science CenterQilu University of Technology(Shandong Academy of Sciences)Jinan250014China China Industrial Control Systems Cyber Emergency Response Team Beijing100040China
Due to the development of cloud computing and machine learning,users can upload their data to the cloud for machine learning model ***,dishonest clouds may infer user data,resulting in user data *** schemes have achie... 详细信息
来源: 评论
Achieving reliable and anti-collusive outsourcing computation and verification based on blockchain in 5G-enabled IoT
收藏 引用
Digital Communications and networks 2022年 第5期8卷 644-653页
作者: Linjie Wang Youliang Tian Jinbo Xiong School of Data Science Tongren UniversityTongren554300China State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou UniversityGuiyang550025China Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber SecurityFujian Normal UniversityFuzhou350117China
Widespread applications of 5G technology have prompted the outsourcing of computation dominated by the Internet of Things(IoT)cloud to improve transmission efficiency,which has created a novel paradigm for improving t... 详细信息
来源: 评论
Regularization Mixup Adversarial Training: A Defense Strategy for Membership Privacy with Model Availability Assurance  2
Regularization Mixup Adversarial Training: A Defense Strateg...
收藏 引用
2nd International Conference on Big data and Privacy Computing, BDPC 2024
作者: Ding, Zehua Tian, Youliang Wang, Guorong Xiong, Jinbo College of Computer Science and Technology Guizhou University State Key Laboratory of Public Big Data Guiyang China College of Computer and Cyber Security Fujian Normal University Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou China
Neural network models face two highly destructive threats in real-world applications: membership inference attacks (MIAs) and adversarial attacks (AAs). One compromises the model's confidentiality, leading to memb... 详细信息
来源: 评论
Statistical Model on CRAFT
收藏 引用
Chinese Journal of Electronics 2022年 第4期31卷 698-712页
作者: WANG Caibing GUO Hao YE Dingfeng WANG Ping State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of Sciences School of Cyber Security University of Chinese Academy of Sciences Tianjin Aerospace Zhongwei Data System Technology Co. Ltd.
Many cryptanalytic techniques for symmetric-key primitives rely on specific statistical analysis to extract some secrete key information from a large number of known or chosen plaintext-ciphertext pairs. For example, ... 详细信息
来源: 评论
POINTERGUESS: targeted password guessing model using pointer mechanism  24
POINTERGUESS: targeted password guessing model using pointer...
收藏 引用
Proceedings of the 33rd USENIX Conference on security Symposium
作者: Kedong Xiu Ding Wang College of Cyber Science Nankai University Tianjin China and Key Laboratory of Data and Intelligent System Security (NKU) Ministry of Education Tianjin China and Tianjin Key Laboratory of Network and Data Security Technology Nankai University Tianjin China
Most existing targeted password guessing models view users' reuse behaviors as sequences of edit operations (e.g., insert and delete) performed on old passwords. These atomic edit operations are limited to modifyi...
来源: 评论
Three-level Compact Caching for Search Engines Based on Solid State Drives  23
Three-level Compact Caching for Search Engines Based on Soli...
收藏 引用
23rd IEEE International Conference on High Performance Computing and Communications, 7th IEEE International Conference on data Science and Systems, 19th IEEE International Conference on Smart City and 7th IEEE International Conference on Dependability in Sensor, Cloud and Big data Systems and Applications, HPCC-DSS-SmartCity-DependSys 2021
作者: Zhang, Rui Sun, Pengyu Tong, Jiancong Zang, Ruirui Qian, Heng Pan, Yu Stones, Rebecca J. Wang, Gang Liu, Xiaoguang Li, Yusen College of Computer Science Nankai University Tianjin China Tianjin Key Laboratory of Network and Data Security Technology Tianjin China Baidu Inc Beijing China
The query processing in search engines can be classified into either disk I/O operations and CPU computation operations. Conventional search engine caching methods mostly aimed at reducing disk I/O operations. However... 详细信息
来源: 评论
DBKEM-AACS: a distributed key escrow model in blockchain with anonymous authentication and committee selection
收藏 引用
Science China(Information Sciences) 2023年 第3期66卷 289-290页
作者: Axin XIANG Hongfeng GAO Youliang TIAN Liang WAN College of Computer Science and Technology Guizhou University Institute of Cryptography and Data Security Guizhou University Network and Information Management Center Guizhou University State Key Laboratory of Public Big Data Guizhou University Institute of Computer Software and Theory Guizhou University
Dear editor, key security is of great practical significance and demand to guarantee the security of digital assets in the blockchain system. At present, users prefer to escrow their assets on centralized institutions...
来源: 评论