咨询与建议

限定检索结果

文献类型

  • 1,130 篇 期刊文献
  • 30 篇 会议

馆藏范围

  • 1,160 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,065 篇 工学
    • 531 篇 计算机科学与技术...
    • 269 篇 网络空间安全
    • 239 篇 电子科学与技术(可...
    • 214 篇 仪器科学与技术
    • 192 篇 控制科学与工程
    • 176 篇 软件工程
    • 158 篇 信息与通信工程
    • 74 篇 机械工程
    • 34 篇 电气工程
    • 15 篇 航空宇航科学与技...
    • 14 篇 公安技术
    • 12 篇 交通运输工程
    • 10 篇 动力工程及工程热...
    • 7 篇 材料科学与工程(可...
    • 7 篇 建筑学
    • 6 篇 光学工程
    • 5 篇 土木工程
    • 5 篇 测绘科学与技术
  • 251 篇 管理学
    • 238 篇 管理科学与工程(可...
    • 9 篇 公共管理
    • 5 篇 工商管理
  • 93 篇 艺术学
    • 93 篇 设计学(可授艺术学...
  • 67 篇 理学
    • 29 篇 物理学
    • 20 篇 数学
    • 7 篇 系统科学
  • 36 篇 军事学
    • 36 篇 军队指挥学
  • 26 篇 医学
    • 24 篇 临床医学
  • 22 篇 经济学
    • 21 篇 应用经济学
  • 10 篇 法学
    • 6 篇 法学
  • 6 篇 教育学
    • 6 篇 教育学
  • 5 篇 农学
  • 3 篇 文学
  • 1 篇 哲学

主题

  • 128 篇 internet of thin...
  • 119 篇 security
  • 114 篇 blockchain
  • 70 篇 iot
  • 64 篇 machine learning
  • 63 篇 deep learning
  • 41 篇 authentication
  • 37 篇 internet of thin...
  • 35 篇 intrusion detect...
  • 31 篇 cloud computing
  • 31 篇 privacy
  • 28 篇 edge computing
  • 27 篇 cybersecurity
  • 26 篇 encryption
  • 25 篇 network security
  • 24 篇 internet
  • 23 篇 anomaly detectio...
  • 21 篇 feature selectio...
  • 19 篇 cyber security
  • 19 篇 network

机构

  • 18 篇 department of co...
  • 18 篇 school of commun...
  • 14 篇 department of in...
  • 14 篇 school of cyber ...
  • 13 篇 state key labora...
  • 13 篇 faculty of infor...
  • 12 篇 information secu...
  • 9 篇 department of co...
  • 9 篇 school of cyber ...
  • 9 篇 college of compu...
  • 9 篇 school of commun...
  • 8 篇 college of compu...
  • 8 篇 department of co...
  • 8 篇 institute of inf...
  • 8 篇 school of inform...
  • 8 篇 department of co...
  • 7 篇 information tech...
  • 7 篇 school of comput...
  • 7 篇 school of comput...
  • 7 篇 department of co...

作者

  • 17 篇 mesfer al duhayy...
  • 12 篇 abdelwahed motwa...
  • 12 篇 anwer mustafa hi...
  • 10 篇 gang xu
  • 9 篇 manar ahmed hamz...
  • 9 篇 fahd n.al-wesabi
  • 8 篇 fatma s.alrayes
  • 8 篇 kim-kwang raymon...
  • 7 篇 mahmoud ragab
  • 6 篇 radwa marzouk
  • 6 篇 junwei cao
  • 6 篇 mehedi masud
  • 6 篇 xiu-bo chen
  • 6 篇 ahamed aljuhani
  • 6 篇 ishfaq yaseen
  • 6 篇 zhen chen
  • 6 篇 jaber s.alzahran...
  • 5 篇 bin cao
  • 5 篇 imran khan
  • 5 篇 jawad ahmad

语言

  • 1,088 篇 英文
  • 72 篇 中文
检索条件"机构=Chongqing Engineering Laboratory of Internet and Information Security"
1160 条 记 录,以下是1-10 订阅
排序:
An Enhanced Clustering-Based (k, t)-Anonymity Algorithm for Graphs
收藏 引用
Chinese Journal of Electronics 2025年 第1期34卷 365-372页
作者: Yuanyuan Wang Xing Zhang Zhiguang Chu Wei Shi Xiang Li School of Electronics and information engineering Liaoning University of Technology Key laboratory of security for Network and Data in Industrial internet of Liaoning Province Faculty of information Technology Beijing University of Technology
As people become increasingly reliant on the internet, securely storing and publishing private data has become an important issue. In real life, the release of graph data can lead to privacy breaches, which is a highl... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Joint communication and computation design for secure integrated sensing and semantic communication system
收藏 引用
Science China(information Sciences) 2025年
作者: Jianxin DAI Hui FAN Zhouxiang ZHAO Yongjun XU Zhaohui YANG Xu GAN Zhaoyang ZHANG School of Science Nanjing University of Posts and Telecommunications National Mobile Communications Research laboratory Southeast University College of information Science and Electronic engineering Zhejiang University Zhejiang Provincial laboratory of Multi-Modal Communication Networks and Intelligent information Processing School of Communications and information engineering Chongqing University of Posts and Telecommunications
As a new communication paradigm, semantic communication (SC) differs from conventional communication based on bit transmission by transmitting semantic information, which demonstrates enormous potential in improving c...
来源: 同方期刊数据库 同方期刊数据库 评论
Industrial Control Anomaly Detection Based on Distributed Linear Deep Learning
收藏 引用
Computers, Materials & Continua 2025年 第1期82卷 1129-1150页
作者: Shijie Tang Yong Ding Huiyong Wang School of Computer Science and information security Guilin University of Electronic TechnologyGuilin541004China School of Electronic engineering and Automation Guilin University of Electronic TechnologyGuilin541004China Guangxi engineering Research Center of Industrial internet security and Blockchain Guilin University of Electronic TechnologyGuilin541004China Institute of Cyberspace Technology HKCT Institute for Higher EducationHong Kong999077China School of Mathematics&Computing Science Guilin University of Electronic TechnologyGuilin541004China
As more and more devices in Cyber-Physical Systems(CPS)are connected to the internet,physical components such as programmable logic controller(PLC),sensors,and actuators are facing greater risks of network attacks,and... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Correlations multiplexing for link prediction in multidimensional network spaces
收藏 引用
Science China(information Sciences) 2018年 第11期61卷 48-66页
作者: Yunpeng XIAO Xixi LI Yuanni LIU Hong LIU Qian LI chongqing engineering laboratory of internet and information security Chongqing University of Posts and Telecommunications
In social networks, link establishment among users is affected by diversity correlations. In this paper, we study the formation of links, map correlations into multidimensional network spaces and apply their behaviora... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Prediction of gas concentration in the upper corner of mining working face based on the FEDformer-LGBM-AT architecture
收藏 引用
Meitan Xuebao/Journal of the China Coal Society 2025年 第1期50卷 360-378页
作者: Liang, Yunpei Li, Shang Li, Quangui Guo, Yabo Sun, Wanjie Zheng, Menghao Wang, Chengcheng National Key laboratory of Coal Mine Disaster Dynamics and Control Chongqing University Chongqing400044 China College of Resources and security Chongqing University Chongqing400044 China School of Safety Science and engineering Anhui University of Science and Technology Huainan232001 China
In the context of the intelligent upgrading of coal mines, mining high-quality information from massive monitoring data of working faces to construct scientific models that enhance prediction duration and accuracy is ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Who will retweet? A prediction method for social hotspots based on dynamic tensor decomposition
收藏 引用
Science China(information Sciences) 2018年 第9期61卷 297-299页
作者: Yunpeng XIAO Xiaojuan LI Shasha YANG Yanbing LIU chongqing engineering laboratory of internet and information security Chongqing University of Posts and Telecommunications
With the development of Web 2.0,the emergence of blogs,forums makes the internet to maintain substantial amounts of user behavioral *** data are rich and valuable,and mining useful information from massive data has be... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
SDSA: A Framework of a Software-Defi ned security Architecture
收藏 引用
China Communications 2016年 第2期13卷 178-188页
作者: LIU Yanbing LU Xingyu JIAN Yi XIAO Yunpeng chongqing engineering laboratory of Network and information security Chongqing University of Posts and Telecommunications
The fact that the security facilities within a system are closely coupled and the security facilities between systems are unconnected results in an isolated protection structure for systems, and gives rise to a seriou... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A User Participation Behavior Prediction Model of Social Hotspots Based on Influence and Markov Random Field
收藏 引用
China Communications 2017年 第5期14卷 145-159页
作者: Yunpeng Xiao Jiawei Lai Yanbing Liu chongqing engineering laboratory of Network and information security Chongqing University of Posts and TelecommunicationsChongqing 400065China
Hotspot topic trends can be captured by analyzing user attributes and historical behavior in social network. In this paper, we propose a user participation behavior prediction model for social hotspots, based on user ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
The internet of Things under Federated Learning:A Review of the Latest Advances and Applications
收藏 引用
Computers, Materials & Continua 2025年 第1期82卷 1-39页
作者: Jinlong Wang Zhenyu Liu Xingtao Yang Min Li Zhihan Lyu School of information and Control engineering Qingdao University of TechnologyQingdao260043China Anhui Province Key laboratory of Intelligent Building&Building Energy Saving Anhui Jianzhu UniversityHefei230000China Department of Game Design Uppsala UniversityUppsala75310Sweden
With the rapid development of artificial intelligence,the internet of Things(IoT)can deploy various machine learning algorithms for network and application *** the IoT environment,many sensors and devices generatemass... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
DDoS Attack Tracking Using Multi-Round Iterative Viterbi Algorithm in Satellite internet
收藏 引用
China Communications 2025年 第03期 148-163页
作者: Guo Wei Xu Jin Pei Yukui Yin Liuguo Feng Wei Department of Electronic engineering Tsinghua University China Telecom Cybersecurity Technology Co. Ltd Operation Center of Network security Products China Telecom Co. Ltd. Beijing National Research Center for information Science and Technology Research Institute of Tsinghua Pearl River Delta
Satellite internet(SI) provides broadband access as a critical information infrastructure in ***, with the integration of the terrestrial internet, the influx of massive terrestrial traffic will bring significant thre...
来源: 同方期刊数据库 同方期刊数据库 评论