咨询与建议

限定检索结果

文献类型

  • 362 篇 期刊文献
  • 13 篇 会议

馆藏范围

  • 375 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 343 篇 工学
    • 154 篇 计算机科学与技术...
    • 83 篇 网络空间安全
    • 81 篇 仪器科学与技术
    • 72 篇 电子科学与技术(可...
    • 65 篇 信息与通信工程
    • 51 篇 控制科学与工程
    • 44 篇 软件工程
    • 23 篇 机械工程
    • 16 篇 电气工程
    • 8 篇 材料科学与工程(可...
    • 6 篇 航空宇航科学与技...
    • 6 篇 公安技术
    • 5 篇 动力工程及工程热...
    • 4 篇 化学工程与技术
    • 3 篇 建筑学
    • 3 篇 测绘科学与技术
    • 3 篇 交通运输工程
    • 2 篇 土木工程
    • 2 篇 地质资源与地质工...
  • 68 篇 管理学
    • 65 篇 管理科学与工程(可...
  • 34 篇 艺术学
    • 34 篇 设计学(可授艺术学...
  • 33 篇 理学
    • 11 篇 数学
    • 11 篇 物理学
    • 4 篇 系统科学
    • 3 篇 化学
    • 2 篇 地球物理学
  • 12 篇 军事学
    • 12 篇 军队指挥学
  • 4 篇 医学
    • 3 篇 临床医学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 法学
  • 2 篇 教育学
    • 2 篇 心理学(可授教育学...
  • 1 篇 农学

主题

  • 37 篇 blockchain
  • 25 篇 internet of thin...
  • 18 篇 security
  • 10 篇 privacy protecti...
  • 10 篇 authentication
  • 10 篇 iot
  • 9 篇 deep learning
  • 8 篇 anomaly detectio...
  • 8 篇 internet
  • 8 篇 privacy
  • 7 篇 internet of thin...
  • 7 篇 machine learning
  • 7 篇 cloud computing
  • 6 篇 e-commerce
  • 6 篇 smart contract
  • 6 篇 deep reinforceme...
  • 5 篇 internet securit...
  • 5 篇 system
  • 5 篇 federated learni...
  • 5 篇 encryption

机构

  • 11 篇 information secu...
  • 10 篇 state key labora...
  • 6 篇 海南大学
  • 5 篇 institute for ne...
  • 5 篇 department of co...
  • 5 篇 school of inform...
  • 4 篇 tonghua normal u...
  • 4 篇 school of cybers...
  • 4 篇 tsinghua nationa...
  • 3 篇 department of el...
  • 3 篇 key laboratory o...
  • 3 篇 college of elect...
  • 3 篇 ieee
  • 3 篇 state key labora...
  • 3 篇 school of cyber ...
  • 3 篇 college of compu...
  • 3 篇 beijing key labo...
  • 3 篇 department of co...
  • 3 篇 information cent...
  • 3 篇 school of bioinf...

作者

  • 9 篇 gang xu
  • 5 篇 xiu-bo chen
  • 5 篇 xiubo chen
  • 5 篇 weijin jiang
  • 4 篇 xiangyang luo
  • 4 篇 junwei cao
  • 4 篇 yueting chai
  • 4 篇 yuhui xu
  • 4 篇 liu ying
  • 4 篇 wu jianping
  • 4 篇 jiahui chen
  • 4 篇 hui li
  • 4 篇 yixian yang
  • 4 篇 zhen chen
  • 4 篇 yi liu
  • 4 篇 yirong jiang
  • 3 篇 bin cao
  • 3 篇 wenbing zhao
  • 3 篇 chen chen
  • 3 篇 于天娇

语言

  • 347 篇 英文
  • 28 篇 中文
检索条件"机构=Internet Commerce Security Laboratory"
375 条 记 录,以下是111-120 订阅
排序:
LRChain:data protection and sharing method of learning archives based on consortium blockchain
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2024年 第4期31卷 28-42页
作者: Lan Lina Gao Yuhan Shi Ruisheng Wu Fenfen School of Humanities Beijing University of Posts and TelecommunicationsBeijing 100876China School of Cyberspace security Beijing University of Posts and TelecommunicationsBeijing 100876China Key laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and TelecommunicationsMinistry of EducationBeijing 100876China
Learning archives management in traditional systems faces challenges such as inadequate security,weak tamper resistance,and limited sharing *** address these issues,this paper proposes LRChain,a method based on consor... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Automated federated learning‐based adversarial attack and defence in industrial control systems
收藏 引用
IET Cyber-Systems and Robotics 2024年 第2期6卷 109-127页
作者: Guo-Qiang Zeng Jun-Min Shao Kang-Di Lu Guang-Gang Geng Jian Weng College of Cyber security Jinan UniversityGuangzhouChina National Joint Engineering Research Center of Network security Detection and Protection Technology Jinan UniversityGuangzhouChina College of Information Science and Technology Donghua UniversityShanghaiChina
With the development of deep learning and federated learning(FL),federated intrusion detection systems(IDSs)based on deep learning have played a significant role in securing industrial control systems(ICSs).However,ad... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A New Method Based on Evolutionary Algorithm for Symbolic Network Weak Unbalance
收藏 引用
Journal on internet of Things 2019年 第2期1卷 41-53页
作者: Yirong Jiang Weijin Jiang Jiahui Chen Yang Wang Yuhui Xu Lina Tan Liang Guo Tonghua Normal University Tonghua134002China Key laboratory of Hunan Province for New Retail Virtual Reality Technology Hunan University of CommerceChangsha410205China Institute of Big Data and internet Innovation Hunan University of CommerceChangsha410205China School of Computer Science and Technology Wuhan University of TechnologyWuhan430073China School of Bioinformatics University of MinnesotaTwin CitiesUSA
The symbolic network adds the emotional information of the relationship,that is,the“+”and“-”information of the edge,which greatly enhances the modeling ability and has wide application in many *** unbalance is an ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Lightweight IoT Malware Detection and Family Classification Method
收藏 引用
Journal of Computer and Communications 2024年 第4期12卷 201-227页
作者: Changguang Wang Ziqi Ma Qingru Li Dongmei Zhao Fangwei Wang College of Computer and Cyber security Hebei Normal University Shijiazhuang China Key laboratory of Network and Information security of Hebei Province Hebei Normal University Shijiazhuang China
A lightweight malware detection and family classification system for the internet of Things (IoT) was designed to solve the difficulty of deploying defense models caused by the limited computing and storage resources ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Privacy-preserving edge-assisted image retrieval and classification in IoT
收藏 引用
Frontiers of Computer Science 2019年 第5期13卷 1136-1147页
作者: Xuan LI Jin LI Siuming YIU Chongzhi GAO Jinbo XIONG College of Mathematics and Informatics Fujian Normal University Fuzhou 350117 China Department of Computer Science The University of Hong Kong Hong Kong 999077 China Fujian Provincial Key laboratory of Network security and Cryptology Fuzhou 350117 China School of Computational Science and Education Software Guangzhou University Guangzhou 510006 China
internet of Things (IoT) has drawn much attention in recent years. However, the image data captured by IoT terminal devices are closely related to users, personal information, which are sensitive and should be protect... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Research on the influence factors of consumer repurchase in Dutch auction
Research on the influence factors of consumer repurchase in ...
收藏 引用
2018中国信息通信大会(CICC2018)
作者: JIANG Wei-Jin JIANG Yi-Rong CHEN Jia-Hui XU Yu-Hui WANG Yang TAN Li-Na School of Computer Science and Technology Wuhan University of Technology Key laboratory of Hunan Province for New Retail Virtual Reality Technology Hunan University of Commerce Institute of Big Data and internet Innovation Mobile E-business Collaborative Innovation Center of Hunan Province Hunan University of Commerce Tonghua Normal University
With the rapid development of e-commerce,the online shopping market becomes more and more *** to design sales models to retain consumers and make them become continuous buying is the biggest concern of most e-commerce... 详细信息
来源: cnki会议 评论
Probabilistic and Hierarchical Quantum Information Splitting Based on the Non-Maximally Entangled Cluster State
收藏 引用
Computers, Materials & Continua 2021年 第10期69卷 339-349页
作者: Gang Xu Rui-Ting Shan Xiu-Bo Chen Mianxiong Dong Yu-Ling Chen School of Information Science and Technology North China University of TechnologyBeijing100144China Information security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijing100876China Muroran Institution of Technology Muroran050-8585Japan State Key laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang550025China
With the emergence of classical communication security problems,quantum communication has been studied more *** this paper,a novel probabilistic hierarchical quantum information splitting protocol is designed by using... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
On-chain is not enough:Ensuring pre-data on the chain credibility for blockchain-based source-tracing systems
收藏 引用
Digital Communications and Networks 2023年 第5期9卷 1053-1060页
作者: Yilei Wang Zhaojie Wang Guoyu Yang Shan Ai Xiaoyu Xiang Chang Chen Minghao Zhao School of Computer Science Qufu Normal UniversityRizhao276826China Guangxi Key laboratory of Cryptography and Information security Guilin University of Electronic TechnologyGuilin541004China Institute of Artificial Intelligence and Blockchain Guangzhou UniversityGuangzhou510006China School of Software Tsinghua UniversityTsinghua UniversityBeijing100191China
The blockchain provides a reliable and scalable method for enabling source-tracing functionality in large-scale internet of Things(IoT)*** blockchain-based source tracing applications are generally based on the hypoth... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
internet Web Trust System Based on Smart Contract
收藏 引用
国际计算机前沿大会会议论文集 2019年 第1期 309-311页
作者: Shaozhuo Li Na Wang Xuehui Du Aodi Liu He’nan Province Key laboratory of Information security Zhengzhou 450001 Henan China
The current internet web trust system is based on the traditional PKI system, to achieve the purpose of secure communication through the trusted third party. However, with the increase of network nodes, various proble... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
RAISE:A Resilient Anonymous Information Sharing Environment
收藏 引用
Computer Modeling in Engineering & Sciences 2023年 第12期137卷 2743-2759页
作者: Ning Hu Ling Liu Xin Liu Kaijun Wu Yue Zhao Cyberspace Institute of Advanced Technology Guangzhou UniversityGuangzhou510006China Science and Technology on Communication security laboratory The 30th Research Institute of China Electronics Technology Group CorporationChengdu610041China College of Computer Engineering and Applied Math Changsha UniversityChangsha410022China
With the widespread application of cloud computing and network virtualization technologies,more and more enterprise applications are directly deployed in the ***,the traditional TCP/IP network transmission model does ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论