咨询与建议

限定检索结果

文献类型

  • 306 篇 期刊文献
  • 6 篇 会议

馆藏范围

  • 312 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 263 篇 工学
    • 168 篇 计算机科学与技术...
    • 63 篇 电气工程
    • 58 篇 信息与通信工程
    • 55 篇 电子科学与技术(可...
    • 54 篇 控制科学与工程
    • 49 篇 网络空间安全
    • 43 篇 材料科学与工程(可...
    • 30 篇 机械工程
    • 24 篇 生物医学工程(可授...
    • 21 篇 仪器科学与技术
    • 18 篇 力学(可授工学、理...
    • 15 篇 测绘科学与技术
    • 14 篇 软件工程
    • 10 篇 地质资源与地质工...
    • 9 篇 航空宇航科学与技...
    • 9 篇 环境科学与工程(可...
    • 8 篇 动力工程及工程热...
    • 8 篇 建筑学
  • 160 篇 理学
    • 59 篇 数学
    • 40 篇 生物学
    • 36 篇 物理学
    • 17 篇 地球物理学
    • 14 篇 化学
    • 14 篇 天文学
    • 14 篇 大气科学
    • 12 篇 生态学
    • 7 篇 系统科学
  • 33 篇 医学
    • 29 篇 临床医学
    • 9 篇 基础医学(可授医学...
  • 12 篇 管理学
  • 9 篇 农学
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 6 篇 法学
  • 4 篇 教育学
  • 2 篇 文学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 17 篇 deep learning
  • 14 篇 blockchain
  • 9 篇 convolutional ne...
  • 9 篇 security
  • 7 篇 privacy protecti...
  • 6 篇 network
  • 6 篇 neural
  • 6 篇 machine learning
  • 6 篇 data
  • 5 篇 internet of thin...
  • 5 篇 feature extracti...
  • 5 篇 information secu...
  • 4 篇 phylogeny
  • 4 篇 image
  • 4 篇 认证协议
  • 4 篇 deep reinforceme...
  • 4 篇 big data
  • 4 篇 data mining
  • 4 篇 authentication
  • 4 篇 neural network

机构

  • 6 篇 university of ch...
  • 5 篇 school of cybers...
  • 5 篇 school of comput...
  • 5 篇 information secu...
  • 4 篇 advanced cryptog...
  • 4 篇 school of comput...
  • 4 篇 school of cybers...
  • 4 篇 school of inform...
  • 3 篇 school of inform...
  • 3 篇 network and data...
  • 3 篇 center of excell...
  • 3 篇 college of new m...
  • 3 篇 department of en...
  • 3 篇 school of scienc...
  • 3 篇 school of cybers...
  • 3 篇 earthquake admin...
  • 3 篇 state key labora...
  • 3 篇 college of intel...
  • 3 篇 department of co...
  • 3 篇 engineering rese...

作者

  • 8 篇 shibin zhang
  • 6 篇 gang xu
  • 5 篇 xiangyang luo
  • 5 篇 xiu-bo chen
  • 5 篇 yan chang
  • 4 篇 jianping jiang
  • 4 篇 jinyue xia
  • 4 篇 rui xu
  • 3 篇 cheng wang
  • 3 篇 lili yan
  • 3 篇 陈秀波
  • 3 篇 zhen qin
  • 3 篇 lei cai
  • 3 篇 dhanushka n.wana...
  • 3 篇 changjun jiang
  • 3 篇 sajeewa s.n.maha...
  • 3 篇 yi zhang
  • 3 篇 desheng zheng
  • 3 篇 kevin d.hyde
  • 3 篇 yang zhao

语言

  • 300 篇 英文
  • 12 篇 中文
检索条件"机构=Network and Data Security Key Laboratory of Sichuan Province"
312 条 记 录,以下是1-10 订阅
排序:
Efficient privacy-preserving federated learning under dishonest-majority setting
收藏 引用
Science China(Information Sciences) 2024年 第5期67卷 323-324页
作者: Yinbin MIAO Da KUANG Xinghua LI Tao LENG Ximeng LIU Jianfeng MA School of Cyber Engineering Xidian University Intelligent Policing key laboratory of sichuan province Sichuan Police College Institute of Information Engineering Chinese Academy of Sciences School of Cyber security University of Chinese Academy of Sciences key laboratory of Information security of network Systems Fuzhou University
Federated learning(FL) is an emerging distributed learning paradigm that solves the problem of isolated data by jointly learning the global model through distributed clients.However, recent studies have shown that FL ...
来源: 同方期刊数据库 同方期刊数据库 评论
A new quantum key distribution resource allocation and routing optimization scheme
收藏 引用
Chinese Physics B 2024年 第3期33卷 244-259页
作者: 毕琳 袁晓同 吴炜杰 林升熙 School of Computer Science and Technology Changchun University of Science and TechnologyChangchun 130012China key laboratory of network and Information security in Jilin province Changchun 130012China
Quantum key distribution(QKD)is a technology that can resist the threat of quantum computers to existing conventional cryptographic protocols.However,due to the stringent requirements of the quantum key generation env... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A New Encrypted Traffic Identification Model Based on VAE-LSTM-DRN
收藏 引用
Computers, Materials & Continua 2024年 第1期78卷 569-588页
作者: Haizhen Wang Jinying Yan Na Jia College of Computer and Control Engineering Qiqihar UniversityQiqihar161006China Heilongjiang key laboratory of Big data network security Detection and Analysis Qiqihar UniversityQiqiharChina
Encrypted traffic identification pertains to the precise acquisition and categorization of data from traffic datasets containing imbalanced and obscured content.The extraction of encrypted traffic attributes and their... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Big data Access Control Mechanism Based on Two-Layer Permission Decision Structure
收藏 引用
Computers, Materials & Continua 2024年 第4期79卷 1705-1726页
作者: Aodi Liu Na Wang Xuehui Du Dibin Shan Xiangyu Wu Wenjuan Wang He’nan province key laboratory of Information security Information Engineering UniversityZhengzhou450000China
Big data resources are characterized by large scale, wide sources, and strong dynamics. Existing access controlmechanisms based on manual policy formulation by security experts suffer from drawbacks such as low policy... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Artificial Immune Detection for network Intrusion data Based on Quantitative Matching Method
收藏 引用
Computers, Materials & Continua 2024年 第2期78卷 2361-2389页
作者: CaiMing Liu Yan Zhang Zhihui Hu Chunming Xie School of Electronic Information and Artificial Intelligence Leshan Normal UniversityLeshan614000China Intelligent network security Detection and Evaluation laboratory Leshan Normal UniversityLeshan614000China Internet Natural Language Intelligent Processing key laboratory of Education Department of sichuan province Leshan Normal UniversityLeshan614000China
Artificial immune detection can be used to detect network intrusions in an adaptive approach and proper matching methods can improve the accuracy of immune detection methods.This paper proposes an artificial immune de... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Enhanced Privacy-Preserving WiFi Fingerprint Localization from CL Encryption
收藏 引用
Chinese Journal of Electronics 2024年
作者: Zhiwei WANG Qiuchi ZHU Zhenqi ZHANG School of Computer Nanjing University of Posts and Telecommunications State key laboratory of Public Big data Guizhou University Advanced Cryptography and System security key laboratory of sichuan province Chengdu University of Information Engineering key laboratory of Computational Science and Application of Hainan province Hainan Normal University
The WiFi fingerprint-based localization method is considered one of the most popular techniques for indoor localization. In INFOCOM'14, Li et al. proposed a WiFi fingerprint localization system based on Paillier encry...
来源: 同方期刊数据库 同方期刊数据库 评论
An Enhanced Clustering-Based(k, t)-Anonymity Algorithm for Graphs
收藏 引用
Chinese Journal of Electronics 2024年
作者: Yuanyuan WANG Xing ZHANG Zhiguang CHU Wei SHI Xiang LI School of Electronics and Information Engineering Liaoning University of Technology key laboratory of security for network and data in Industrial Internet of Liaoning province Faculty of Information Technology Beijing University of Technology
As people become increasingly reliant on the Internet, securely storing and publishing private data has become an important issue. In real life, the release of graph data can lead to privacy breaches, which is a highl...
来源: 同方期刊数据库 同方期刊数据库 评论
Epileptic brain network mechanisms and neuroimaging techniques for the brain network
收藏 引用
Neural Regeneration Research 2024年 第12期19卷 2637-2648页
作者: Yi Guo Zhonghua Lin Zhen Fan Xin Tian Department of Neurology Sichuan Provincial People’s HospitalUniversity of Electronic Science and Technology of ChinaChengduSichuan ProvinceChina sichuan Provincial Center for Mental Health Sichuan Provincial People’s HospitalUniversity of Electronic Science and Technology of ChinaChengduSichuan ProvinceChina Department of Geriatrics Sichuan Provincial People’s HospitalUniversity of Electronic Science and Technology of ChinaChengduSichuan ProvinceChina Department of Neurology Chongqing Key Laboratory of NeurologyThe First Affiliated Hospital of Chongqing Medical UniversityChongqingChina
Epilepsy can be defined as a dysfunction of the brain network,and each type of epilepsy involves different brain-network changes that are implicated diffe rently in the control and propagation of interictal or ictal d... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Method and Practice of Trusted Embedded Computing and data Transmission Protection Architecture Based on Android
收藏 引用
Chinese Journal of Electronics 2024年 第3期33卷 623-634页
作者: Yichuan WANG Wen GAO Xinhong HEI Yanning DU School of Computer Science and Engineering Xi'an University of Technology Shaanxi key laboratory for network Computing and security Technology
In recent years,the rapid development of Internet technology has constantly enriched people's daily life and gradually changed from the traditional computer terminal to the mobile terminal.But with it comes the securi... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
An Efficient and Provably Secure SM2 key-Insulated Signature Scheme for Industrial Internet of Things
收藏 引用
工程与科学中的计算机建模(英文) 2024年 第1期138卷 903-915页
作者: Senshan Ouyang Xiang Liu Lei Liu Shangchao Wang Baichuan Shao Yang Zhao School of Mechanical Engineering Northwestern Polytechnical UniversityXi’anChina Department of Process and Information Technology Chengdu Aircraft Industrial(Group)Co.Ltd.ChengduChina School of Information and Software Engineering The Network and Data Security Key Laboratory of Sichuan ProvinceUniversity of Electronic Science and Technology of ChinaChengduChina
With the continuous expansion of the Industrial Internet of Things(IIoT),more andmore organisations are placing large amounts of data in the cloud to reduce overheads.However,the channel between cloud servers and smar... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论