咨询与建议

限定检索结果

文献类型

  • 74 篇 期刊文献
  • 29 篇 会议

馆藏范围

  • 103 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 78 篇 工学
    • 61 篇 计算机科学与技术...
    • 55 篇 软件工程
    • 25 篇 电气工程
    • 17 篇 信息与通信工程
    • 13 篇 生物工程
    • 12 篇 生物医学工程(可授...
    • 9 篇 控制科学与工程
    • 7 篇 光学工程
    • 5 篇 动力工程及工程热...
    • 4 篇 电子科学与技术(可...
    • 3 篇 机械工程
    • 3 篇 化学工程与技术
    • 3 篇 交通运输工程
    • 3 篇 环境科学与工程(可...
    • 2 篇 建筑学
    • 2 篇 土木工程
  • 45 篇 理学
    • 22 篇 数学
    • 15 篇 生物学
    • 7 篇 系统科学
    • 7 篇 统计学(可授理学、...
    • 4 篇 物理学
    • 3 篇 化学
  • 17 篇 管理学
    • 9 篇 图书情报与档案管...
    • 8 篇 管理科学与工程(可...
    • 4 篇 工商管理
  • 6 篇 医学
    • 6 篇 临床医学
    • 5 篇 基础医学(可授医学...
    • 3 篇 药学(可授医学、理...
  • 5 篇 法学
    • 4 篇 社会学
  • 3 篇 教育学
    • 3 篇 教育学
  • 1 篇 经济学
  • 1 篇 文学

主题

  • 4 篇 semantics
  • 4 篇 feature extracti...
  • 3 篇 image fusion
  • 3 篇 deep learning
  • 3 篇 speech processin...
  • 3 篇 convolution
  • 3 篇 authentication p...
  • 3 篇 encryption
  • 3 篇 forecasting
  • 3 篇 privacy
  • 3 篇 deep reinforceme...
  • 2 篇 image enhancemen...
  • 2 篇 conferences
  • 2 篇 object detection
  • 2 篇 knowledge manage...
  • 2 篇 lighting
  • 2 篇 servers
  • 2 篇 graph neural net...
  • 2 篇 benchmark testin...
  • 2 篇 blockchain

机构

  • 10 篇 engineering rese...
  • 10 篇 shanghai key lab...
  • 10 篇 key laboratory o...
  • 10 篇 school of comput...
  • 8 篇 key laboratory o...
  • 7 篇 school of cyber ...
  • 6 篇 cyberspace secur...
  • 5 篇 northeastern uni...
  • 5 篇 shandong provinc...
  • 5 篇 institute of inf...
  • 4 篇 northeastern uni...
  • 3 篇 shandong key lab...
  • 3 篇 shanghai institu...
  • 3 篇 school of comput...
  • 3 篇 national yunlin ...
  • 3 篇 school of inform...
  • 3 篇 school of cybers...
  • 3 篇 shandong fundame...
  • 3 篇 university of el...
  • 3 篇 school of artifi...

作者

  • 11 篇 fu chong
  • 8 篇 mahmood khalid
  • 7 篇 das ashok kumar
  • 6 篇 zou juan
  • 6 篇 zhenfu cao
  • 5 篇 wang xingwei
  • 5 篇 guohua lv
  • 5 篇 sham chiu-wing
  • 5 篇 jiachen shen
  • 4 篇 dong xiaolei
  • 4 篇 dong jing
  • 4 篇 wang wei
  • 4 篇 zhang wenchao
  • 4 篇 cao zhenfu
  • 4 篇 xu qianqian
  • 4 篇 xia yizhang
  • 3 篇 hou zhanglu
  • 3 篇 zhang lei
  • 3 篇 li xiong
  • 3 篇 yang shengxiang

语言

  • 86 篇 英文
  • 17 篇 其他
  • 1 篇 中文
检索条件"机构=Center of Intelligent Computing and Security Research"
103 条 记 录,以下是1-10 订阅
排序:
An Improved Reinforcement Learning for Path Optimization Problem  24
An Improved Reinforcement Learning for Path Optimization Pro...
收藏 引用
4th International Conference on Artificial Intelligence, Automation and High Performance computing, AIAHPC 2024
作者: Yu, Fahong Chen, Meijia Center of Intelligent Computing and Security Research Shanwei Institute of Technology China Shanwei Institute of Technology China
Path optimization problem is a classical issue in urban infrastructure. Heuristic strategies may not provide immediate qualitative solutions to complex problems instantly. This paper gave a novel reinforcement learnin... 详细信息
来源: 评论
research and Practice of Value-added Assessment for Cultivating Cybersecurity Talents in Higher Vocational Colleges  24
Research and Practice of Value-added Assessment for Cultivat...
收藏 引用
3rd International Conference on Artificial Intelligence and Education, ICAIE 2024
作者: Chen, Meijia Yu, Fahong Shanwei Institute of Technology Guangdong Shanwei China Center of Intelligent Computing and Security Research Shanwei Institute of Technology Guangdong Shanwei China
To achieve quality value added cultivation of network security professionals, the course 'Network security' in higher vocational education establishes a quality evaluation model that better cultivates network ... 详细信息
来源: 评论
A Systematic Review: The Utilization of Artificial Intelligence in Forensic Odontology  11
A Systematic Review: The Utilization of Artificial Intellige...
收藏 引用
11th International Conference on Computer, Control, Informatics and its Applications, IC3INA 2024
作者: Supriyadi, Muhamad Rodhi Samah, Azurah Bte A. Majid, Hairudin Abdul Muliadi, Jemie Universiti Teknologi Malaysia National Research and Innovation Agency Bandung Indonesia Faculty of Computing Universiti Teknologi Malaysia Johor Malaysia Research Center for Artificial Intelligent and Cyber Security National Research and Innovation Agency Bandung Indonesia
The use of Artificial Intelligence (AI) in forensic odontology signifies a significant change, with the potential to improve the precision, effectiveness, and dependability of forensic investigations mostly focused on... 详细信息
来源: 评论
Online Queue-Aware Service Migration and Resource Allocation in Mobile Edge computing
收藏 引用
IEEE Transactions on Vehicular Technology 2025年 第5期74卷 8063-8078页
作者: Du, An Jia, Jie Chen, Jian Wang, Xingwei Huang, Min Northeastern University School of Computer Science and Engineering The Engineering Research Center of Security Technology of Complex Network System Shenyang110819 China Northeastern University Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Shenyang110819 China Northeastern University College of Information Science and Engineering State Key Laboratory of Synthetical Automation for Process Industries Shenyang110819 China
Mobile edge computing (MEC) integrated with Network Functions Virtualization (NFV) helps run a wide range of services implemented by Virtual Network Functions (VNFs) deployed at MEC networks. This emerging paradigm of... 详细信息
来源: 评论
Leveraging Large Language Models for Enhanced Digital Twin Modeling: Trends, Methods, and Challenges
arXiv
收藏 引用
arXiv 2025年
作者: Yang, Linyao Luo, Shi Cheng, Xi Yu, Lei Research Center for Data Hub and Security Zhejiang Lab Hangzhou311121 China Research Center for Intelligent Manufacturing Computing Zhejiang Lab Hangzhou311121 China
Digital twin technology is a transformative innovation driving the digital transformation and intelligent optimization of manufacturing systems. By integrating real-time data with computational models, digital twins e... 详细信息
来源: 评论
A New Dual-Population Evolutionary Algorithm Leveraging Objective-Constraint Relationships for Constrained Multi-Objective Optimization
SSRN
收藏 引用
SSRN 2025年
作者: Ye, Jialu Tan, Chaogui Xia, Yizhang Hou, Zhanglu Liu, Yuan Zou, Juan Hunan Engineering Research Center of intelligent System Optimization and Security Key Laboratory of Intelligent Computing and Information Processing Ministry of Education Hunan National Applied Mathematics Center China Xiangtan University China
Population co-evolution strategies are widely used to handle constrained multi-objective optimization problems (CMOPs). However, existing coevolutionary algorithms oversimplify population collaboration and are rigid i... 详细信息
来源: 评论
Lightweight Authenticated Key Agreement Protocol for Smart Power Grid Systems Using PUF
IEEE Open Journal of the Communications Society
收藏 引用
IEEE Open Journal of the Communications Society 2024年 5卷 3568-3580页
作者: Zahoor, Amina Mahmood, Khalid Saleem, Muhammad Asad Badar, Hafiz Muhammad Sanaullah Le, Tuan-Vinh Das, Ashok Kumar Department of Computer Science Sahiwal57000 Pakistan National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Douliu64002 Taiwan University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China Emerson University Multan Department of Emerging Computing Technologies Multan61000 Pakistan Fu Jen Catholic University Bachelor's Program of Artificial Intelligence and Information Security New Taipei City24206 Taiwan International Institute of Information Technology Hyderabad Center for Security Theory and Algorithmic Research Hyderabad500032 India
The Smart Power Grid (SPG) is pivotal in orchestrating and managing demand response in contemporary smart cities, leveraging the prowess of Information and Communication Technologies (ICTs). Within the immersive SPG e... 详细信息
来源: 评论
Contrastive Learning for Robust Android Malware Familial Classification
收藏 引用
IEEE Transactions on Dependable and Secure computing 2022年 1-14页
作者: Wu, Yueming Dou, Shihan Zou, Deqing Yang, Wei Qiang, Weizhong Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Shanghai Key Laboratory of Intelligent Information Processing School of Computer Science Fudan University Shanghai China University of Texas at Dallas Dallas USA National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Due to its open-source nature, Android operating system has been the main target of attackers to exploit. Malware creators always perform different code obfuscations on their apps to hide malicious activities. Feature... 详细信息
来源: 评论
A Systematic Review: The Utilization of Artificial Intelligence in Forensic Odontology
A Systematic Review: The Utilization of Artificial Intellige...
收藏 引用
International Conference on Computer, Control, Informatics and Its Applications (IC3INA)
作者: Muhamad Rodhi Supriyadi Azurah Bte A Samah Hairudin Abdul Majid Jemie Muliadi National Research and Innovation Agency Universiti Teknologi Malaysia Bandung Indonesia Faculty of Computing Universiti Teknologi Malaysia Johor Malaysia Research Center for Artificial Intelligent and Cyber Security National Research and Innovation Agency Bandung Indonesia
The use of Artificial Intelligence (AI) in forensic odontology signifies a significant change, with the potential to improve the precision, effectiveness, and dependability of forensic investigations mostly focused on... 详细信息
来源: 评论
APT Adversarial Defence Mechanism for Industrial IoT Enabled Cyber-Physical System
收藏 引用
IEEE Access 2023年 11卷 74000-74020页
作者: Javed, Safdar Hussain Ahmad, Maaz Bin Asif, Muhammad Akram, Waseem Mahmood, Khalid Das, Ashok Kumar Shetty, Sachin College of Computing and Information Sciences Karachi75190 Pakistan Lahore Garrison University Department of Computer Science Lahore54810 Pakistan National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Douliu64002 Taiwan International Institute of Information Technology at Hyderabad Center for Security Theory and Algorithmic Research Hyderabad500032 India Old Dominion University Simulation and Visualization Engineering Virginia Modeling Analysis and Simulation Center Department of Modeling SuffolkVA23435 United States Old Dominion University Center for Cybersecurity Education and Research SuffolkVA23435 United States
The objective of Advanced Persistent Threat (APT) attacks is to exploit Cyber-Physical Systems (CPSs) in combination with the Industrial Internet of Things (I-IoT) by using fast attack methods. Machine learning (ML) t... 详细信息
来源: 评论