咨询与建议

限定检索结果

文献类型

  • 532 篇 期刊文献
  • 17 篇 会议

馆藏范围

  • 549 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 531 篇 工学
    • 400 篇 计算机科学与技术...
    • 218 篇 电气工程
    • 206 篇 电子科学与技术(可...
    • 204 篇 信息与通信工程
    • 165 篇 网络空间安全
    • 130 篇 控制科学与工程
    • 120 篇 软件工程
    • 83 篇 仪器科学与技术
    • 78 篇 材料科学与工程(可...
    • 45 篇 机械工程
    • 37 篇 生物医学工程(可授...
    • 35 篇 力学(可授工学、理...
    • 26 篇 动力工程及工程热...
    • 12 篇 航空宇航科学与技...
    • 12 篇 环境科学与工程(可...
    • 10 篇 光学工程
    • 9 篇 交通运输工程
    • 8 篇 化学工程与技术
  • 188 篇 理学
    • 125 篇 数学
    • 39 篇 物理学
    • 17 篇 生物学
    • 15 篇 系统科学
    • 6 篇 天文学
  • 101 篇 管理学
    • 85 篇 管理科学与工程(可...
    • 17 篇 图书情报与档案管...
  • 18 篇 军事学
    • 17 篇 军队指挥学
  • 12 篇 法学
    • 6 篇 社会学
  • 12 篇 医学
    • 10 篇 临床医学
  • 12 篇 艺术学
    • 12 篇 设计学(可授艺术学...
  • 9 篇 教育学
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 1 篇 文学
  • 1 篇 农学

主题

  • 37 篇 blockchain
  • 27 篇 security
  • 25 篇 cloud computing
  • 24 篇 deep learning
  • 16 篇 network
  • 12 篇 internet of thin...
  • 12 篇 cryptography
  • 12 篇 network security
  • 12 篇 edge computing
  • 11 篇 authentication
  • 11 篇 machine learning
  • 10 篇 smart grid
  • 9 篇 mobile edge comp...
  • 9 篇 deep reinforceme...
  • 9 篇 cloud
  • 8 篇 iot
  • 8 篇 physical layer s...
  • 8 篇 anomaly detectio...
  • 7 篇 power
  • 7 篇 feature extracti...

机构

  • 7 篇 state key labora...
  • 7 篇 information secu...
  • 6 篇 university of ch...
  • 6 篇 state key labora...
  • 6 篇 trusted computin...
  • 6 篇 national compute...
  • 5 篇 faculty of infor...
  • 4 篇 key laboratory o...
  • 4 篇 china electric p...
  • 4 篇 information secu...
  • 4 篇 state key labora...
  • 4 篇 school of electr...
  • 4 篇 institute of com...
  • 4 篇 school of inform...
  • 4 篇 school of comput...
  • 4 篇 school of cyber ...
  • 3 篇 institute of inf...
  • 3 篇 state key labora...
  • 3 篇 school of inform...
  • 3 篇 state key labora...

作者

  • 6 篇 xiangyang luo
  • 6 篇 xiu-bo chen
  • 6 篇 gang xu
  • 6 篇 bo zhao
  • 5 篇 wei li
  • 4 篇 xin liu
  • 4 篇 chen chen
  • 4 篇 qingfeng cheng
  • 4 篇 changjun jiang
  • 4 篇 junwei cao
  • 4 篇 li yang
  • 4 篇 fuhui zhou
  • 4 篇 zhang huanguo
  • 4 篇 dengguo feng
  • 3 篇 jun’e li
  • 3 篇 cheng wang
  • 3 篇 yuhao wang
  • 3 篇 yuling chen
  • 3 篇 xiaodong liu
  • 3 篇 yu zhang

语言

  • 541 篇 英文
  • 8 篇 中文
检索条件"机构=Key Laboratory of Computing Power Network and Information Security"
549 条 记 录,以下是1-10 订阅
排序:
Efficient privacy-preserving federated learning under dishonest-majority setting
收藏 引用
Science China(information Sciences) 2024年 第5期67卷 323-324页
作者: Yinbin MIAO Da KUANG Xinghua LI Tao LENG Ximeng LIU Jianfeng MA School of Cyber Engineering Xidian University Intelligent Policing key laboratory of Sichuan Province Sichuan Police College Institute of information Engineering Chinese Academy of Sciences School of Cyber security University of Chinese Academy of Sciences key laboratory of information security of network Systems Fuzhou University
Federated learning(FL) is an emerging distributed learning paradigm that solves the problem of isolated data by jointly learning the global model through distributed ***, recent studies have shown that FL may not alwa...
来源: 同方期刊数据库 同方期刊数据库 评论
A Sharding Scheme Based on Graph Partitioning Algorithm for Public Blockchain
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第6期139卷 3311-3327页
作者: Shujiang Xu Ziye Wang Lianhai Wang Miodrag J.Mihaljevi′c Shuhui Zhang Wei Shao Qizheng Wang key laboratory of computing power network and information security Ministry of EducationShandong Computer Science CenterQilu University of Technology(Shandong Academy of Sciences)Jinan250014China Shandong Provincial key laboratory of Computer networks Shandong Fundamental Research Center for Computer ScienceJinan250014China Mathematical Institute The Serbian Academy of Sciences and ArtsBelgrade11000Serbia
Blockchain technology,with its attributes of decentralization,immutability,and traceability,has emerged as a powerful catalyst for enhancing traditional industries in terms of optimizing business ***,transaction perfo... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Fault-tolerant identity-based encryption from SM9
收藏 引用
Science China(information Sciences) 2024年 第2期67卷 104-117页
作者: Xiaohong LIU Xinyi HUANG Zhaohui CHENG Wei WU Fujian Provincial key laboratory of network security and Cryptology College of Computer and Cyber SecurityFujian Normal University Artificial Intelligence Thrust Information HubThe Hong Kong University of Science and Technology (Guangzhou) Olym information security Technology Ltd. Center for Applied Mathematics of Fujian Province School of Mathematics and StatisticsFujian Normal University
This paper initiates the formal study of attribute-based encryption within the framework of SM9,the Chinese National Cryptography Standard for Identity-Based Cryptography, by presenting two new faulttolerant identity-... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Multi-party privacy-preserving decision tree training with a privileged party
收藏 引用
Science China(information Sciences) 2024年 第8期67卷 253-268页
作者: Yiwen TONG Qi FENG Min LUO Debiao HE key laboratory of Aerospace information security and Trusted computing Ministry of Education School of Cyber Science and Engineering Wuhan University Shanghai Technology Innovation Centre of Distributed Privacy-Preserving Artificial Intelligence Matrix Elements Technologies key laboratory of computing power network and information security Ministry of EducationShandong Computer Science Center Qilu University of Technology(Shandong Academy of Sciences)
Currently, a decision tree is the most commonly used data mining algorithm for classification tasks. While a significant number of studies have investigated privacy-preserving decision trees, the methods proposed in t... 详细信息
来源: 同方期刊数据库 同方期刊数据库 同方期刊数据库 同方期刊数据库 评论
An End-To-End Hyperbolic Deep Graph Convolutional Neural network Framework
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第4期139卷 537-563页
作者: Yuchen Zhou Hongtao Huo Zhiwen Hou Lingbin Bu Yifan Wang Jingyi Mao Xiaojun Lv Fanliang Bu School of information network security People’s Public Security University of ChinaBeijing100038China Institute of computing Technology China Academy of Railway Sciences Corporation LimitedBeijing100081China
Graph Convolutional Neural networks(GCNs)have been widely used in various fields due to their powerful capabilities in processing graph-structured ***,GCNs encounter significant challenges when applied to scale-free g... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Policy network-Based Dual-Agent Deep Reinforcement Learning for Multi-Resource Task Offloading in Multi-Access Edge Cloud networks
收藏 引用
China Communications 2024年 第4期21卷 53-73页
作者: Feng Chuan Zhang Xu Han Pengchao Ma Tianchun Gong Xiaoxue School of Communications and information Engineering Chongqing University of Posts and TelecommunicationsChongqing 400065China Institute of Intelligent Communication and network security Chongqing University of Posts and TelecommunicationsChongqing 400065China key laboratory of Big Data Intelligent computing Chongqing University of Posts and TelecommunicationsChongqing 400065China School of information Engineering Guangdong University of TechnologyGuangzhou 510006China
The Multi-access Edge Cloud(MEC) networks extend cloud computing services and capabilities to the edge of the networks. By bringing computation and storage capabilities closer to end-users and connected devices, MEC n... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
An anonymous authentication and secure data transmission scheme for the Internet of Things based on blockchain
收藏 引用
Frontiers of Computer Science 2024年 第3期18卷 183-197页
作者: Xingxing CHEN Qingfeng CHENG Weidong YANG Xiangyang LUO State key laboratory of Mathematical Engineering and Advanced computing Zhengzhou Institute of Information Science and TechnologyZhengzhou 450001China Henan key laboratory of Grain Photoelectric Detection and Control Henan University of TechnologyZhengzhou 450001China Henan Province key laboratory of Cyberspace Situation Awareness Zhengzhou Institute of Information Science and TechnologyZhengzhou 450001China
With the widespread use of network infrastructures such as 5G and low-power wide-area networks,a large number of the Internet of Things(IoT)device nodes are connected to the network,generating massive amounts of ***,i... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Lightweight Multi-Resolution network for Human Pose Estimation
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第3期138卷 2239-2255页
作者: Pengxin Li Rong Wang Wenjing Zhang Yinuo Liu Chenyue Xu School of information and Cyber security People Public Security University of ChinaBeijing100038China key laboratory of security Prevention Technology and Risk Assessment of Ministry of Public security Beijing100038China
Human pose estimation aims to localize the body joints from image or video *** the development of deeplearning,pose estimation has become a hot research topic in the field of computer *** recent years,humanpose estima... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
CRBFT:A Byzantine Fault-Tolerant Consensus Protocol Based on Collaborative Filtering Recommendation for Blockchains
收藏 引用
Computers, Materials & Continua 2024年 第7期80卷 1491-1519页
作者: Xiangyu Wu Xuehui Du Qiantao Yang Aodi Liu Na Wang Wenjuan Wang He’nan Province key laboratory of information security Information Engineering UniversityZhengzhou450000China School of Cyber Science Engineering Zhengzhou UniversityZhengzhou450000China
Blockchain has been widely used in finance,the Internet of Things(IoT),supply chains,and other scenarios as a revolutionary *** protocol plays a vital role in blockchain,which helps all participants to maintain the st... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
E2E-MFERC:AMulti-Face Expression Recognition Model for Group Emotion Assessment
收藏 引用
Computers, Materials & Continua 2024年 第4期79卷 1105-1135页
作者: Lin Wang Juan Zhao Hu Song Xiaolong Xu Jiangsu key laboratory of Big Data security&Intelligent Processing Nanjing University of Posts and TelecommunicationsNanjing210042China School of network security Jinling Institute of TechnologyNanjing211169China State Grid Jiangsu Electric power Company Limited Nanjing210000China School of Computer Science Nanjing University of Posts and TelecommunicationsNanjing210042China
In smart classrooms, conducting multi-face expression recognition based on existing hardware devices to assessstudents’ group emotions can provide educators with more comprehensive and intuitive classroom effect anal... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论