咨询与建议

限定检索结果

文献类型

  • 56 篇 期刊文献

馆藏范围

  • 56 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 39 篇 工学
    • 26 篇 计算机科学与技术...
    • 14 篇 网络空间安全
    • 5 篇 电子科学与技术(可...
    • 4 篇 控制科学与工程
    • 4 篇 软件工程
    • 3 篇 仪器科学与技术
    • 3 篇 土木工程
    • 2 篇 电气工程
    • 2 篇 信息与通信工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 化学工程与技术
    • 1 篇 交通运输工程
  • 14 篇 医学
    • 5 篇 基础医学(可授医学...
    • 4 篇 中西医结合
    • 2 篇 药学(可授医学、理...
    • 1 篇 临床医学
    • 1 篇 公共卫生与预防医...
    • 1 篇 中药学(可授医学、...
  • 7 篇 管理学
    • 4 篇 管理科学与工程(可...
    • 2 篇 公共管理
    • 1 篇 图书情报与档案管...
  • 2 篇 艺术学
    • 2 篇 设计学(可授艺术学...
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 文学
    • 1 篇 外国语言文学
  • 1 篇 理学
    • 1 篇 生物学
  • 1 篇 农学
    • 1 篇 作物学

主题

  • 4 篇 区块链
  • 3 篇 深度学习
  • 2 篇 deep learning
  • 2 篇 对抗攻击
  • 2 篇 对抗样本
  • 2 篇 洁净室
  • 2 篇 生成对抗网络
  • 2 篇 伪造指纹检测
  • 2 篇 数字水印
  • 2 篇 版权保护
  • 2 篇 压力
  • 2 篇 cloud computing
  • 2 篇 semantic search
  • 1 篇 静脉炎
  • 1 篇 5-氟尿嘧啶
  • 1 篇 全民健康信息平台
  • 1 篇 稠油
  • 1 篇 limestone flora
  • 1 篇 多维度
  • 1 篇 bert model

机构

  • 21 篇 南京信息工程大学
  • 5 篇 广东省卫生健康委...
  • 5 篇 上海中医药大学附...
  • 4 篇 上海中医药大学
  • 4 篇 西安电子科技大学
  • 3 篇 school of comput...
  • 3 篇 college of infor...
  • 3 篇 中国电子系统工程...
  • 2 篇 guangxi key labo...
  • 2 篇 国防科技大学
  • 2 篇 综合业务网理论及...
  • 2 篇 上海电力大学
  • 2 篇 school of comput...
  • 2 篇 上海市松江区方塔...
  • 1 篇 湖南大学
  • 1 篇 上海师范大学
  • 1 篇 暨南大学
  • 1 篇 nanjing univ inf...
  • 1 篇 中国石油吐哈油田...
  • 1 篇 上海市中西医结合...

作者

  • 24 篇 付章杰
  • 9 篇 zhangjie fu
  • 6 篇 吴婷婷
  • 6 篇 付淑娟
  • 6 篇 钟薏
  • 6 篇 周张杰
  • 5 篇 傅承主
  • 5 篇 余张杰
  • 5 篇 李云霄
  • 4 篇 夏晓婷
  • 3 篇 蒋海燕
  • 3 篇 李芸
  • 3 篇 孙星明
  • 3 篇 张士强
  • 3 篇 袁程胜
  • 2 篇 王育飞
  • 2 篇 付张杰
  • 2 篇 吕俊强
  • 2 篇 刘强
  • 2 篇 陈先意

语言

  • 45 篇 中文
  • 11 篇 英文
检索条件"作者=Zhangjie FU"
56 条 记 录,以下是1-10 订阅
排序:
Semantic and secure search over encrypted outsourcing cloud based on BERT
收藏 引用
Frontiers of Computer Science 2022年 第2期16卷 152-159页
作者: zhangjie fu Yan WANG Xingming SUN Xiaosong ZHANG Engineering Research Center of Digital Forensice Ministry of EducationNanjing University of Information Science and TechnologyNanjing 210044China School of Computer and Software Nanjing University of Information Science and TechnologyNanjing 210044China School of Computer Science and Engineering University of Electronic Science and Technology of ChinaChengdu 611731China
Searchable encryption provides an effective way for data security and privacy in cloud *** can retrieve encrypted data in the cloud under the premise of protecting their own data security and ***,most of the current c... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Local Region Frequency Guided Dynamic Inconsistency Network for Deepfake Video Detection
收藏 引用
BIG DATA MINING AND ANALYTICS 2024年 第3期7卷 889-904页
作者: Yue, Pengfei Chen, Beijing fu, zhangjie Nanjing Univ Informat Sci & Technol Engn Res Ctr Digital Forens Minist Educ Nanjing 210044 Peoples R China Nanjing Univ Informat Sci & Technol Sch Comp Sci Nanjing 210044 Peoples R China Nanjing Univ Informat Sci & Technol Jiangsu Collaborat Innovat Centerof Atmospher Envi Nanjing 210044 Peoples R China
In recent years, with the rapid development of deepfake technology, a large number of deepfake videos have emerged on the Internet, which poses a huge threat to national politics, social stability, and personal privac... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Privacy-Preserving Content-Aware Search Based on Two-Level Index
收藏 引用
Computers, Materials & Continua 2019年 第5期59卷 473-491页
作者: zhangjie fu Lili Xia Yuling Liu Zuwei Tian School of Computer&Software Nanjing University of Information Science&TechnologyNanjing210044China College of Computer Science and Electronic Engineering Hunan UniversityChina School of Information Science and Engineering Hunan First Normal UniversityHunanChina
Nowadays,cloud computing is used more and more widely,more and more people prefer to using cloud server to store ***,how to encrypt the data efficiently is an important *** search efficiency of existed search schemes ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Privacy-Preserving Genetic Algorithm Outsourcing in Cloud Computing
收藏 引用
Journal of Cyber Security 2020年 第1期2卷 49-61页
作者: Leqi Jiang zhangjie fu College of Computer and Software Nanjing University of Information Science&TechnologyNanjing210044China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and TechnologyNanjing210044China
Genetic Algorithm(GA)has been widely used to solve various optimization *** the solving process of GA requires large storage and computing resources,it is well motivated to outsource the solving process of GA to the c... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Multi-UAV Cooperative GPS Spoofing Based on YOLO Nano
收藏 引用
Journal of Cyber Security 2021年 第2期3卷 69-78页
作者: Yongjie Ding zhangjie fu Engineering Research Center of Digital Forensics Ministry of EducationNanjing University of Information Science and TechnologyNanjing210044China College of Information Science and Technology College of Cyber SecurityJinan UniversityGuangzhou510632China
In recent years,with the rapid development of the drone industry,drones have been widely used in many fields such as aerial photography,plant protection,performance,and *** effectively control the unauthorized flight ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
High Visual Quality Image Steganography Based on Encoder-Decoder Model
收藏 引用
Journal of Cyber Security 2020年 第3期2卷 115-121页
作者: Yan Wang zhangjie fu Xingming Sun School of Computer and Software Nanjing University of Information Science and TechnologyNanjingChina
Nowadays,with the popularization of network technology,more and more people are concerned about the problem of cyber ***,a technique dedicated to protecting peoples’private data,has become a hot topic in the research... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Dynamic Resource Scheduling in Emergency Environment
收藏 引用
Journal of Information Hiding and Privacy Protection 2019年 第3期1卷 143-155页
作者: Yuankun Yan Yan Kong zhangjie fu School of Computer&Software Nanjing University of Information Science&TechnologyNanjingChina Jiangsu Engineering Center of Network Monitoring School of Computer and SoftwareNanjingChina
Nowadays,emergency accidents could happen at any *** accidents occur unpredictably and the accidents requirements are *** accidents happen in a dynamic environment and the resource should be cooperative to solve the *... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
An LSTM-Based Malware Detection Using Transfer Learning
收藏 引用
Journal of Cyber Security 2021年 第1期3卷 11-28页
作者: zhangjie fu Yongjie Ding Musaazi Godfrey School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China Guangxi Key Laboratory of Cryptography and Information Security Guilin541004China College of Information Science and Technology College of Cyber SecurityJinan UniversityGuangzhou510632China
Mobile malware occupies a considerable proportion of *** the update of mobile device operating systems and the development of software technology,more and more new malware keep *** emergence of new malware makes the i... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Two-Stage Highly Robust Text Steganalysis Model
收藏 引用
Journal of Cyber Security 2020年 第4期2卷 183-190页
作者: Enlu Li zhangjie fu Siyu Chen Junfu Chen School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China Guangxi Key Laboratory of Cryptography and Information Security Guilin541004China College of Information Science and Technology College of Cyber SecurityJinan UniversityGuangzhou510632China
With the development of natural language processing,deep learning,and other technologies,text steganography is rapidly ***,adversarial attack methods have emerged that gives text steganography the ability to actively ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Review of Object Detectors in Deep Learning
收藏 引用
Journal on Artificial Intelligence 2020年 第2期2卷 59-77页
作者: Chen Song Xu Cheng Yongxiang Gu Beijing Chen zhangjie fu School of Computer and Software Nanjing University of Information Science and TechnologyNanjingChina
Object detection is one of the most fundamental,longstanding and significant problems in the field of computer vision,where detection involves object classification and *** with the traditional object detection algori... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论