咨询与建议

限定检索结果

文献类型

  • 77 篇 会议
  • 52 篇 期刊文献

馆藏范围

  • 129 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 80 篇 工学
    • 62 篇 计算机科学与技术...
    • 50 篇 软件工程
    • 20 篇 信息与通信工程
    • 12 篇 电气工程
    • 8 篇 电子科学与技术(可...
    • 8 篇 控制科学与工程
    • 7 篇 生物工程
    • 5 篇 光学工程
    • 5 篇 航空宇航科学与技...
    • 5 篇 网络空间安全
    • 4 篇 机械工程
    • 4 篇 交通运输工程
    • 4 篇 生物医学工程(可授...
    • 3 篇 动力工程及工程热...
    • 2 篇 材料科学与工程(可...
    • 2 篇 冶金工程
    • 2 篇 化学工程与技术
    • 2 篇 石油与天然气工程
  • 45 篇 理学
    • 27 篇 数学
    • 14 篇 物理学
    • 10 篇 统计学(可授理学、...
    • 8 篇 生物学
    • 4 篇 系统科学
    • 2 篇 化学
  • 20 篇 管理学
    • 16 篇 管理科学与工程(可...
    • 9 篇 工商管理
    • 5 篇 图书情报与档案管...
  • 6 篇 法学
    • 4 篇 社会学
    • 2 篇 法学
  • 3 篇 医学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 教育学

主题

  • 6 篇 deep learning
  • 5 篇 computational mo...
  • 3 篇 conferences
  • 3 篇 support vector m...
  • 3 篇 public key crypt...
  • 3 篇 accuracy
  • 3 篇 quantum cryptogr...
  • 3 篇 privacy
  • 3 篇 cryptography
  • 2 篇 learning systems
  • 2 篇 scalability
  • 2 篇 sustainable deve...
  • 2 篇 telecommunicatio...
  • 2 篇 temperature meas...
  • 2 篇 genes
  • 2 篇 5g mobile commun...
  • 2 篇 medical services
  • 2 篇 quality of servi...
  • 2 篇 adversarial mach...
  • 2 篇 monitoring

机构

  • 7 篇 state key labora...
  • 6 篇 science and tech...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 care college of ...
  • 5 篇 institute of sys...
  • 5 篇 department of co...
  • 5 篇 saveetha institu...
  • 5 篇 saveetha institu...
  • 5 篇 tianjin key labo...
  • 4 篇 college of compu...
  • 4 篇 state key labora...
  • 4 篇 amrita vishwa vi...
  • 4 篇 research center ...
  • 3 篇 center for cyber...
  • 3 篇 shandong provinc...
  • 3 篇 state key labora...
  • 3 篇 center for intel...
  • 3 篇 department of mu...
  • 3 篇 school of comput...

作者

  • 6 篇 zhang yichen
  • 5 篇 guo hong
  • 5 篇 yu song
  • 5 篇 prabhakar krishn...
  • 5 篇 krishnan prabhak...
  • 5 篇 kharchenko vyach...
  • 5 篇 xu bingjie
  • 4 篇 lingjun pu
  • 4 篇 yang yang
  • 4 篇 chen ziyang
  • 4 篇 jingdong xu
  • 4 篇 fesenko herman
  • 4 篇 xinjing yuan
  • 4 篇 balakrishnan t. ...
  • 4 篇 u. samson ebenez...
  • 4 篇 ebenezar u. sams...
  • 4 篇 guan xiaohong
  • 4 篇 t. suresh balakr...
  • 3 篇 zeng bo
  • 3 篇 hongli zhang

语言

  • 115 篇 英文
  • 12 篇 其他
  • 2 篇 中文
检索条件"机构=Computer Networks and Systems Security"
129 条 记 录,以下是71-80 订阅
排序:
Are Dense Labels Always Necessary for 3D Object Detection from Point Cloud?
arXiv
收藏 引用
arXiv 2024年
作者: Gao, Chenqiang Liu, Chuandong Shu, Jun Liu, Fangcen Liu, Jiang Yang, Luyu Gao, Xinbo Meng, Deyu The School of Intelligent Systems Engineering The Shen-zhen Campus of Sun Yatsen University Sun Yat-sen University Guangdong Shenzhen518107 China The School of Computer Science Wuhan University Wuhan430072 China School of Mathematics and Statistics Ministry of Education Key Lab of Intelligent Networks and Network Security Xi’an Jiaotong University Shaanxi 710049 China School of Communication and Information Engineering Chongqing University of Posts and Telecommunications Chongqing400065 China Meta Menlo Park94025 United States University of Maryland College Park20742 United States
Current state-of-the-art (SOTA) 3D object detection methods often require a large amount of 3D bounding box annotations for training. However, collecting such large-scale densely-supervised datasets is notoriously cos... 详细信息
来源: 评论
A survey on security and privacy issues of UAVs
arXiv
收藏 引用
arXiv 2021年
作者: Mekdad, Yassine Aris, Ahmet Babun, Leonardo Fergougui, Abdeslam E.L. Conti, Mauro Lazzeretti, Riccardo Uluagac, A. Selcuk Laboratory of Computer Networks and Systems Moulay Ismail University of Meknes Zitoune Meknes11201 Morocco Cyber-Physical Systems Security Lab Department of Electrical and Computer Engineering Florida International University MiamiFL33174 United States Department of Mathematics University of Padua Padua35121 Italy Department of Computer Control and Management Engineering "Antonio Ruberti" Sapienza University of Rome Rome00185 Italy
In the 21st century, the industry of drones, also known as Unmanned Aerial Vehicles (UAVs), has witnessed a rapid increase with its large number of airspace users. The tremendous benefits of this technology in civilia... 详细信息
来源: 评论
Stochastic-Robust Planning of Networked Hydrogen-Electrical Microgrids: A Study on Induced Refueling Demand
arXiv
收藏 引用
arXiv 2024年
作者: Sun, Xunhang Cao, Xiaoyu Zeng, Bo Zhai, Qiaozhu Başar, Tamer Guan, Xiaohong School of Automation Science and Engineering The Ministry of Education Key Laboratory for Intelligent Networks and Network Security Xi’an Jiaotong University Shaanxi Xi’an710049 China Coordinated Science Laboratory University of Illinois Urbana-Champaign UrbanaIL61801 United States Smart Integrated Energy Department Sichuan Digital Economy Industry Development Research Institute Sichuan Chengdu610037 China Department of Industrial Engineering The Department of Electrical and Computer Engineering University of Pittsburgh PittsburghPA15106 United States Center for Intelligent and Networked Systems Department of Automation Tsinghua University Beijing100084 China
Hydrogen-electrical microgrids are increasingly assuming an important role on the pathway toward decarbonization of energy and transportation systems. This paper studies networked hydrogen-electrical microgrids planni... 详细信息
来源: 评论
Overview Of Vanet Network security
Overview Of Vanet Network Security
收藏 引用
International Conference on Information Science and Communications Technologies (ICISCT)
作者: Halimjon Khujamatov Amir Lazarev Nurshod Akhmedov Nurbek Asenbaev Aybek Bekturdiev faculty “Computer engineering” Tashkent University of Information Technologies named after Muhammad al-Khwarizmi Tashkent Uzbekistan Data communication networks and systems department Tashkent University of Information Technologies named after Muhammad al-Khwarizmi Tashkent Uzbekistan Information security department Nukus branch of the Tashkent University of Information Technologies named after Muhammad al-Khwarizmi Nukus Uzbekistan
This article provides an overview of the security of VANET, which is a vehicle network. When reviewing this topic, publications of various researchers were considered. The article provides information security require...
来源: 评论
Segment Anything Model is a Good Teacher for Local Feature Learning
arXiv
收藏 引用
arXiv 2023年
作者: Wu, Jingqian Xu, Rongtao Wood-Doughty, Zach Wang, Changwei Xu, Shibiao Lam, Edmund Y. The University of Hong Kong Pokfulam Hong Kong The State Key Laboratory of Multimodal Artificial Intelligence Systems Institute of Automation Chinese Academy of Sciences Beijing China School of Artificial Intelligence University of Chinese Academy of Sciences Beijing100190 China Northwestern University EvanstonIL60201 United States The Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan250013 China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China The School of Artificial Intelligence Beijing University of Posts and Telecommunications Beijing100876 China
Local feature detection and description play an important role in many computer vision tasks, which are designed to detect and describe keypoints in any scene and any downstream task. Data-driven local feature learnin... 详细信息
来源: 评论
SEMICON: A Learning-to-hash Solution for Large-scale Fine-grained Image Retrieval
arXiv
收藏 引用
arXiv 2022年
作者: Shen, Yang Sun, Xuhao Wei, Xiu-Shen Jiang, Qing-Yuan Yang, Jian School of Computer Science and Engineering Nanjing University of Science and Technology China State Key Laboratory of Integrated Services Networks Xidian University China State Key Laboratory for Novel Software Technology Nanjing University China Key Lab of Intelligent Perception and Systems for High-Dimensional Information of Ministry of Education Jiangsu Key Lab of Image and Video Understanding for Social Security Nanjing University of Science and Technology China
In this paper, we propose Suppression-Enhancing Mask based attention and Interactive Channel transformatiON (SEMICON) to learn binary hash codes for dealing with large-scale fine-grained image retrieval tasks. In SEMI... 详细信息
来源: 评论
Demystifying the Transferability of Adversarial Attacks in computer networks
arXiv
收藏 引用
arXiv 2021年
作者: Nowroozi, Ehsan Mekdad, Yassine Berenjestanaki, Mohammad Hajian Conti, Mauro Fergougui, Abdeslam E.L. Sabanci University Istanbul Turkey Sabanci University Istanbul34956 Turkey University of Padua Padua35121 Italy The Laboratory of Computer Networks and Systems Moulay Ismail University of Meknes Zitoune Meknes11201 Morocco The Cyber-Physical Systems Security Lab Department of Electrical and Computer Engineering Florida International University MiamiFL33174 United States The Department of Mathematics University of Padua Padua35121 Italy
Convolutional Neural networks (CNNs) models are one of the most frequently used deep learning networks, and extensively used in both academia and industry. Recent studies demonstrated that adversarial attacks against ... 详细信息
来源: 评论
Evaluating Reliability of a Multi-fleet with a Reserve Drone Fleet: : an Approach and Basic Model
Evaluating Reliability of a Multi-fleet with a Reserve Drone...
收藏 引用
2019 International Conference on Information and Digital Technologies, IDT 2019
作者: Fesenko, Herman Kharchenko, Vyacheslav Zaitseva, Elena Department of Computer Systems Networks and Cyber Security National Aerospace University KliAI Kharkiv Ukraine Faculty of Management Science and Informatics University of Zilina Zilina Slovakia
A matrix of drone fleet reliability assessment attributes is presented. Policies of failed drone recovery by redundant drones are formulated. A structure of a multi-fleet, consisting of main drone fleets and a reserve... 详细信息
来源: 评论
TraCemop: Towards Federated Learning with Traceable Contribution Evaluation and Model Ownership Protection
收藏 引用
IEEE Transactions on Mobile Computing 2025年
作者: Liu, Jingwei Zhou, Zihan Sun, Rong Liu, Lei Lu, Rongxing Dustdar, Schahram Niyato, Dusit Ministry of Education Engineering Research Center of Blockchain Technology Application and Evaluation China Xidian University Shaanxi Key Laboratory of Blockchain and Secure Computing Xi'an710071 China Xidian University State Key Laboratory of Integrated Services Networks Xi'an710071 China Xidian University Guangzhou Institute of Technology Guangzhou510555 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan250014 China Queen's University School of Computing KingstonONK7L 2N8 Canada TU Wien Distributed Systems Group Austria UPF ICREA Barcelona Spain Nanyang Technological University School of Computer Science and Engineering Singapore
Federated Learning (FL) allows multiple clients to collaboratively train machine learning models without the need to share their local private data. As a result, it can effectively address the issue of data fragmentat... 详细信息
来源: 评论
Tile-based Multi-source Adaptive Streaming for 360-degree Ultra-High-Definition Videos
Tile-based Multi-source Adaptive Streaming for 360-degree Ul...
收藏 引用
International Conference on Mobile Ad-hoc and Sensor networks, MSN
作者: Xinjing Yuan Lingjun Pu Ruilin Yun Jingdong Xu Institute of Systems and Networks College of Computer Science Nankai University Tianjin China State Key Laboratory of Integrated Services Networks (Xidian University) Xi’an China Tianjin Key Laboratory of Network and Data Security Technology Tianjin China
360° UHD videos have absorbed great attention in recent years. However, as they are of significant size and usually watched from a close range, they require extremely high bandwidth for a good immersive experienc... 详细信息
来源: 评论