咨询与建议

限定检索结果

文献类型

  • 293 篇 会议
  • 245 篇 期刊文献

馆藏范围

  • 538 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 330 篇 工学
    • 259 篇 计算机科学与技术...
    • 214 篇 软件工程
    • 79 篇 信息与通信工程
    • 67 篇 电气工程
    • 32 篇 生物工程
    • 30 篇 网络空间安全
    • 25 篇 控制科学与工程
    • 21 篇 电子科学与技术(可...
    • 20 篇 机械工程
    • 18 篇 光学工程
    • 18 篇 生物医学工程(可授...
    • 16 篇 安全科学与工程
    • 13 篇 交通运输工程
    • 12 篇 仪器科学与技术
    • 11 篇 建筑学
    • 9 篇 化学工程与技术
  • 141 篇 理学
    • 78 篇 数学
    • 37 篇 生物学
    • 32 篇 物理学
    • 28 篇 统计学(可授理学、...
    • 11 篇 化学
  • 71 篇 管理学
    • 46 篇 管理科学与工程(可...
    • 32 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 23 篇 法学
    • 15 篇 社会学
    • 9 篇 法学
  • 18 篇 医学
    • 16 篇 临床医学
    • 14 篇 基础医学(可授医学...
    • 14 篇 公共卫生与预防医...
  • 13 篇 经济学
    • 13 篇 应用经济学
  • 7 篇 农学
  • 7 篇 军事学
  • 3 篇 教育学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 30 篇 semantics
  • 29 篇 feature extracti...
  • 23 篇 accuracy
  • 22 篇 federated learni...
  • 21 篇 training
  • 20 篇 privacy
  • 19 篇 computational mo...
  • 18 篇 deep learning
  • 12 篇 data privacy
  • 12 篇 image segmentati...
  • 12 篇 neural networks
  • 11 篇 data models
  • 10 篇 internet of thin...
  • 10 篇 anomaly detectio...
  • 10 篇 speech processin...
  • 10 篇 contrastive lear...
  • 10 篇 visualization
  • 10 篇 network security
  • 10 篇 cloud computing
  • 9 篇 optimization

机构

  • 69 篇 shandong provinc...
  • 67 篇 key laboratory o...
  • 52 篇 tianjin key labo...
  • 49 篇 network and data...
  • 45 篇 shandong enginee...
  • 43 篇 college of compu...
  • 35 篇 college of cyber...
  • 18 篇 state key labora...
  • 17 篇 shandong fundame...
  • 16 篇 tianjin key labo...
  • 14 篇 tianjin key labo...
  • 13 篇 fujian provincia...
  • 12 篇 faculty of data ...
  • 11 篇 shandong enginee...
  • 10 篇 key laboratory o...
  • 10 篇 school of inform...
  • 9 篇 school of comput...
  • 9 篇 network and data...
  • 9 篇 haihe lab of ita...
  • 9 篇 qilu university ...

作者

  • 17 篇 qin zhen
  • 15 篇 qin zhiguang
  • 13 篇 li tao
  • 12 篇 zhen qin
  • 12 篇 fu fang-wei
  • 12 篇 jia chunfu
  • 11 篇 ding yi
  • 11 篇 jing zhao
  • 11 篇 xiong jinbo
  • 10 篇 tian youliang
  • 10 篇 youliang tian
  • 10 篇 liu bin
  • 9 篇 liu jun
  • 9 篇 yi ding
  • 9 篇 jinbo xiong
  • 9 篇 zhenyu yang
  • 9 篇 zhang hongbin
  • 8 篇 qing yu
  • 8 篇 zhao dongmei
  • 7 篇 cao mingsheng

语言

  • 500 篇 英文
  • 33 篇 其他
  • 6 篇 中文
检索条件"机构=Tianjin Key Laboratory of Network and Data Security Technology"
538 条 记 录,以下是81-90 订阅
排序:
A novel network intrusion detection model based on two-phase detection and manually labeling
A novel network intrusion detection model based on two-phase...
收藏 引用
2021 International Conference on Internet of Things and Machine Learning, IoTML 2021
作者: Zhang, Yu Zhou, Yangbo Ma, Xiaowei Tianjin Key Laboratory of Network and Data Security Technology College of Cyber Science Nankai University Tianjin China
network intrusion detection system (NIDS) is a tool that can detect various network attacks by analyzing network traffic. In recent years, traditional machine learning and deep learning methods have been widely used i... 详细信息
来源: 评论
Fuzzing Drone Control System Configurations Based on Quality-Diversity Enhanced Genetic Algorithm  1st
Fuzzing Drone Control System Configurations Based on Qualit...
收藏 引用
1st International Conference on Artificial Intelligence security and Privacy, AIS and P 2023
作者: Chang, Zhiwei Zhang, Hanfeng Yang, Yue Jia, Yan Xu, Sihan Li, Tong Liu, Zheli College of Cyber Science Tianjin Key Laboratory of Network and Data Security Technology Nankai University Tianjin China
As drones are becoming widely used in various fields, drone security is a growing challenge nowadays. Drone control systems use various configuration parameters to control their positions and attitudes. If these param... 详细信息
来源: 评论
A 3D Memristive Cubic Map with Dual Discrete Memristors: Design, Implementation, and Application in Image Encryption
收藏 引用
IEEE Transactions on Circuits and Systems for Video technology 2025年
作者: Gao, Suo Iu, Herbert Ho-Ching Erkan, Ugur Simsek, Cemaleddin Toktas, Abdurrahim Cao, Yinghong Wu, Rui Mou, Jun Li, Qi Wang, Chunpeng Dalian Polytechnic University School of Information Science and Engineering Dalian116034 China The University of Western Australia School of Electrical Electronic and Computer Engineering Perth6009 Australia Faculty of Engineering Electrical and Electronics Engineering Respectively Karamanoglu Mehmetbey University Karaman70200 Turkey Ankara University Engineering Faculty Department of Artificial Intelligence and Data Engineering Ankara06830 Turkey Harbin Institute of Technology School of Computer Science and Technology Harbin150001 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan250000 China
Discrete chaotic systems based on memristors exhibit excellent dynamical properties and are more straightforward to implement in hardware, making them highly suitable for generating cryptographic keystreams. However, ... 详细信息
来源: 评论
A rejection sampling algorithm for off-centered discrete Gaussian distributions over the integers
收藏 引用
Science China(Information Sciences) 2019年 第3期62卷 196-198页
作者: Yusong DU Baodian WEI Huang ZHANG School of Data and Computer Science Sun Yat-sen University Guangdong Key Laboratory of Information Security Technology Chongqing Key Lab of Computer Network and Communication Technology
Dear editor,Discrete Gaussian sampling, that is, sampling from a discrete Gaussian distribution DΛ,σ,cwith parameter σ> 0 and center c∈R~n over an ndimensional lattice Λ, has been considered by the cryptograph... 详细信息
来源: 评论
Auction Theory and Game Theory Based Pricing of Edge Computing Resources: A Survey
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Yu, Jiguo Liu, Shun Zou, Yifei Wang, Guijuan Hu, Chunqiang University of Electronic Science and Technology of China School of Information and Software Engineering Chengdu610054 China Qilu University of Technology Big Data Institute Jinan250353 China Qufu Normal University School of Computer Science Shandong Rizhao China Shandong University School of Computer Science and Technology Shandong Qingdao266237 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan250353 China Chongqing University School of Big Data and Software Engineering Chongqing400044 China
The proliferation of Internet of Things (IoT) devices and edge computing applications has heightened the demand for efficient resource allocation and pricing mechanisms. Effective pricing strategies play a crucial rol... 详细信息
来源: 评论
Homomorphic Modular Reduction and Improved Bootstrapping for BGV Scheme  17th
Homomorphic Modular Reduction and Improved Bootstrapping for...
收藏 引用
17th International Conference on Information security and Cryptology, Inscrypt 2021
作者: Li, Ruiqi Jia, Chunfu College of Cyber Science Nankai University Tianjin300350 China Tianjin Key Laboratory of Network and Data Security Technology Tianjin300350 China
Bootstrapping is a crucial subroutine of fully homomorphic encryption (FHE), where a homomorphic encryption scheme evaluates its own decryption circuits. Homomorphic modular reduction is a crucial part of bootstrappin... 详细信息
来源: 评论
Research on Text Classification Based on BERT-BiGRU Model  3
Research on Text Classification Based on BERT-BiGRU Model
收藏 引用
2020 3rd International Conference on Modeling, Simulation and Optimization Technologies and Applications, MSOTA 2020
作者: Yu, Qing Wang, Ziyin Jiang, Kaiwen Tianjin Key Laboratory of Intelligence Computing and Network Security Tianjin University of Technology Tianjin China
Text classification is a typical application of natural language processing. At present, the most commonly used text classification method is deep learning. Meanwhile there are many difficulties in natural language pr... 详细信息
来源: 评论
Sentiment Analysis of Web Text Based on Deep Learning with a Attention Mechanism  12
Sentiment Analysis of Web Text Based on Deep Learning with a...
收藏 引用
12th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics, CISP-BMEI 2019
作者: Yu, Qing Zhao, Hui Jiang, Kaiwen Tianjin Key Laboratory of Intelligence Computing and Network Security Tianjin University of Technology Tianjin China
The sentiment analysis of online commentary is a hot research topic in the field of network information mining. Traditional text sentiment analysis methods are mainly based on emotional dictionaries or machine learnin... 详细信息
来源: 评论
TMOVF: A Task-Agnostic Model Ownership Verification Framework
TMOVF: A Task-Agnostic Model Ownership Verification Framewor...
收藏 引用
2023 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2023
作者: Sun, Zhe Huang, Zhongyu Zhao, Wangqi Zhang, Yu Zhang, Jianzhong College of Cyber Science College of Computer Science Nankai University Tianjin China Tianjin Key Laboratory of Network and Data Security Technology Tianjin China
The protection of model intellectual property is becoming an increasingly important issue. However, the existing methods for protecting model ownership, although effective, have limitations. Firstly, they primarily fo...
来源: 评论
Achieving reliable and anti-collusive outsourcing computation and verification based on blockchain in 5G-enabled IoT
收藏 引用
Digital Communications and networks 2022年 第5期8卷 644-653页
作者: Linjie Wang Youliang Tian Jinbo Xiong School of Data Science Tongren UniversityTongren554300China State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou UniversityGuiyang550025China Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber SecurityFujian Normal UniversityFuzhou350117China
Widespread applications of 5G technology have prompted the outsourcing of computation dominated by the Internet of Things(IoT)cloud to improve transmission efficiency,which has created a novel paradigm for improving t... 详细信息
来源: 评论