咨询与建议

限定检索结果

文献类型

  • 276 篇 期刊文献
  • 17 篇 会议

馆藏范围

  • 293 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 269 篇 工学
    • 206 篇 计算机科学与技术...
    • 106 篇 电气工程
    • 93 篇 电子科学与技术(可...
    • 88 篇 网络空间安全
    • 85 篇 信息与通信工程
    • 68 篇 软件工程
    • 50 篇 控制科学与工程
    • 39 篇 材料科学与工程(可...
    • 35 篇 仪器科学与技术
    • 25 篇 生物医学工程(可授...
    • 22 篇 机械工程
    • 16 篇 力学(可授工学、理...
    • 9 篇 航空宇航科学与技...
    • 6 篇 光学工程
  • 140 篇 理学
    • 93 篇 数学
    • 25 篇 物理学
    • 21 篇 生物学
    • 17 篇 系统科学
    • 9 篇 统计学(可授理学、...
    • 5 篇 天文学
    • 5 篇 地球物理学
  • 51 篇 管理学
    • 46 篇 管理科学与工程(可...
  • 19 篇 军事学
    • 18 篇 军队指挥学
  • 11 篇 法学
    • 6 篇 法学
    • 5 篇 社会学
  • 11 篇 医学
    • 8 篇 基础医学(可授医学...
    • 8 篇 临床医学
  • 9 篇 教育学
    • 7 篇 教育学
  • 8 篇 艺术学
    • 8 篇 设计学(可授艺术学...
  • 6 篇 经济学
    • 6 篇 应用经济学
  • 4 篇 文学
  • 2 篇 农学

主题

  • 22 篇 blockchain
  • 18 篇 security
  • 11 篇 cryptography
  • 9 篇 authentication
  • 9 篇 data
  • 7 篇 access control
  • 7 篇 cloud computing
  • 6 篇 privacy
  • 6 篇 information secu...
  • 5 篇 deep learning
  • 5 篇 data security
  • 5 篇 cloud
  • 5 篇 encryption
  • 4 篇 image encryption
  • 4 篇 smart grid
  • 4 篇 signature
  • 4 篇 data privacy
  • 4 篇 learning
  • 4 篇 internet of thin...
  • 4 篇 electronic comme...

机构

  • 9 篇 school of comput...
  • 7 篇 school of comput...
  • 6 篇 school of comput...
  • 5 篇 genome institute...
  • 5 篇 school of comput...
  • 5 篇 school of inform...
  • 5 篇 school of automa...
  • 5 篇 department of el...
  • 5 篇 school of comput...
  • 5 篇 school of electr...
  • 4 篇 security enginee...
  • 4 篇 school of comput...
  • 4 篇 moe key lab for ...
  • 3 篇 school of comput...
  • 3 篇 jiangsu key labo...
  • 3 篇 ieee
  • 3 篇 college of compu...
  • 3 篇 precision medici...
  • 3 篇 center for cyber...
  • 3 篇 guangxi key labo...

作者

  • 7 篇 kai ye
  • 7 篇 xiaofei yang
  • 5 篇 yong ding
  • 5 篇 walid el-shafai
  • 5 篇 peng jia
  • 5 篇 bo yang
  • 4 篇 yujue wang
  • 4 篇 chunxiang xu
  • 4 篇 yongjun ren
  • 4 篇 wei li
  • 4 篇 tun xu
  • 4 篇 yang zhao
  • 3 篇 yunqing shi
  • 3 篇 qirong mao
  • 3 篇 xiaohong guan
  • 3 篇 mohamad khairi i...
  • 3 篇 junchao dong
  • 3 篇 chengsheng zhang
  • 3 篇 hu xiong
  • 3 篇 li guo

语言

  • 289 篇 英文
  • 4 篇 中文
检索条件"机构=School of Computer Science and Information Security Guilin University of Electronic Technology 1 Jinji Road"
293 条 记 录,以下是1-10 订阅
排序:
A Blockchain-Based Efficient Cross-Domain Authentication Scheme for Internet of Vehicles
收藏 引用
computers, Materials & Continua 2024年 第7期80卷 567-585页
作者: Feng Zhao Hongtao Ding Chunhai Li Zhaoyu Su Guoling Liang Changsong Yang Guangxi Engineering Research Center of Industrial Internet security and Blockchain Guilin University of Electronic TechnologyGuilin541004China school of information and Communication Guilin University of Electronic TechnologyGuilin541004China school of computer science and information security Guilin University of Electronic TechnologyGuilin541004China
The Internet of Vehicles(IoV)is extensively deployed in outdoor and open environments to effectively address traffic efficiency and safety issues by connecting vehicles to the ***,due to the open and variable nature o... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Optimal replication strategy for mitigating burst traffic in information-centric satellite networks: a focus on remote sensing image transmission
收藏 引用
Frontiers of information technology & electronic Engineering 2024年 第6期25卷 791-808页
作者: Ziyang XING Xiaoqiang DI Hui QI Jing CHEN Jinhui CAO Jinyao LIU Xusheng LI Zichu ZHANG Yuchen ZHU Lei CHEN Kai HUANG Xinghan HUO Jilin Key Laboratory of Network and information security Changchun 130022China school of computer science and technology Changchun University of Science and TechnologyChangchun 130022China information Center Changchun University of Science and TechnologyChangchun 130022China
information-centric satellite networks play a crucial role in remote sensing applications,particularly in the transmission of remote sensing ***,the occurrence of burst traffic poses significant challenges in meeting ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Color Image Compression and Encryption Algorithm Based on 2D Compressed Sensing and Hyperchaotic System
收藏 引用
computers, Materials & Continua 2024年 第2期78卷 1977-1993页
作者: Zhiqing Dong Zhao Zhang Hongyan Zhou Xuebo Chen school of computer science and Software Engineering University of Science and Technology LiaoningAnshan114051China school of electronic and information Engineering University of Science and Technology LiaoningAnshan114051China
With the advent of the information security era,it is necessary to guarantee the privacy,accuracy,and dependable transfer of *** study presents a new approach to the encryption and compression of color *** is predicat... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Voice Fence Wall:User-optional voice privacy transmission
收藏 引用
Journal of information and Intelligence 2024年 第2期2卷 116-129页
作者: Li Luo Yining Liu school of computer and information security Guilin University of Electronic TechnologyGuilin 541004China
Sensors are widely applied in the collection of voice *** many attributes of voice data are sensitive such as user emotions,identity,raw voice collection may lead serious privacy *** the past,traditional feature extra... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Binary Program Vulnerability Mining Based on Neural Network
收藏 引用
computers, Materials & Continua 2024年 第2期78卷 1861-1879页
作者: Zhenhui Li Shuangping Xing Lin Yu Huiping Li Fan Zhou Guangqiang Yin Xikai Tang Zhiguo Wang school of information and Software Engineering University of Electronic Science and Technology of ChinaChengdu611731China school of Electrical and computer Engineering University ofWaterlooWaterlooN2L 3G1Canada
Software security analysts typically only have access to the executable program and cannot directly access the source code of the *** poses significant challenges to security *** it is crucial to identify vulnerabilit... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Enhancing security and Privacy in Distributed Face Recognition Systems through Blockchain and GAN Technologies
收藏 引用
computers, Materials & Continua 2024年 第5期79卷 2609-2623页
作者: Muhammad Ahmad Nawaz Ul Ghani Kun She Muhammad Arslan Rauf Shumaila Khan Javed Ali Khan Eman Abdullah Aldakheel Doaa Sami Khafaga school of information and Software Engineering University of Electronic Science and Technology of ChinaChengdu611731China Department of computer science University of Science&TechnologyBannu28100Pakistan Department of computer science University of HertfordshireHatfieldAL109ABUK Department of computer sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh11671Saudi Arabia
The use of privacy-enhanced facial recognition has increased in response to growing concerns about data securityand privacy in the digital age. This trend is spurred by rising demand for face recognition technology in... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Pindel-TD:A Tandem Duplication Detector Based on A Pattern Growth Approach
收藏 引用
Genomics, Proteomics & Bioinformatics 2024年 第1期22卷 99-104页
作者: Xiaofei Yang Gaoyang Zheng Peng Jia Songbo Wang Kai Ye school of computer science and technology Faculty of Electronic and Information EngineeringXi’an Jiaotong UniversityXi’an 710049China Center for Mathematical Medical the First Affiliated Hospital of Xi’an Jiaotong UniversityXi’an 710061China Genome Institute the First Affiliated Hospital of Xi’an Jiaotong UniversityXi’an 710061China MOE Key Lab for Intelligent Networks&Networks security Faculty of Electronic and Information EngineeringXi’an Jiaotong UniversityXi’an 710049China school of Automation science and Engineering Faculty of Electronic and Information EngineeringXi’an Jiaotong UniversityXi’an 710049China school of Life science and technology Xi’an Jiaotong UniversityXi’an 710049China Faculty of science Leiden UniversityLeiden 2311 EZNetherland
Tandem duplication(TD)is a major type of structural variations(SVs)that plays an important role in novel gene formation and human ***,TDs are often missed or incorrectly classified as insertions by most modern SV dete... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
On Designs of Decentralized Reputation Management for Permissioned Blockchain Networks
收藏 引用
computer Modeling in Engineering & sciences 2024年 第5期139卷 1755-1773页
作者: Jinyu Chen Long Shi Qisheng Huang Taotao Wang Daojing He school of electronic and Optical Engineering Nanjing University of Science and TechnologyNanjing210094China school of Mechanical Engineering and Automation Harbin Institute of TechnologyShenzhen518055China College of electronics and information Engineering Shenzhen UniversityShenzhen518060China school of computer science and technology Harbin Institute of TechnologyShenzhen518055China
In permissioned blockchain networks,the Proof of Authority(PoA)consensus,which uses the election of authorized nodes to validate transactions and blocks,has beenwidely advocated thanks to its high transaction throughp... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
For LEO Satellite Networks: Intelligent Interference Sensing and Signal Reconstruction Based on Blind Separation technology
收藏 引用
China Communications 2024年 第2期21卷 85-95页
作者: Chengjie Li Lidong Zhu Zhen Zhang The Key Laboratory for computer Systems of State Ethnic Affairs Commission School of Computer Science and Technology(Southwest Minzu University)Chengdu 610000China National Key Laboratory of science and technology on Communications(university of electronic science and technology of China) Chengdu 610000China College of computer science(Sichuan university) Chengdu 610000China
In LEO satellite communication networks,the number of satellites has increased sharply, the relative velocity of satellites is very fast, then electronic signal aliasing occurs from time to time. Those aliasing signal... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
An efficient online histogram publication method for data streams with local differential privacy
收藏 引用
Frontiers of information technology & electronic Engineering 2024年 第8期25卷 1096-1109页
作者: Tao TAO Funan ZHANG Xiujun WANG Xiao ZHENG Xin ZHAO school of computer science and technology Anhui University of TechnologyMaanshan 243032China Anhui Engineering Research Center for Intelligent Applications and security of Industrial Internet Maanshan 243032China Engineering Research Institute Anhui University of TechnologyMaanshan 243032China Shengli No.1 Middle school of Dongying City Dongying 257000China
Many areas are now experiencing data streams that contain privacy-sensitive *** the sharing and release of these data are of great commercial value,if these data are released directly,the private user information in t... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论