咨询与建议

限定检索结果

文献类型

  • 77 篇 会议
  • 51 篇 期刊文献

馆藏范围

  • 128 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 79 篇 工学
    • 61 篇 计算机科学与技术...
    • 50 篇 软件工程
    • 20 篇 信息与通信工程
    • 11 篇 电气工程
    • 8 篇 控制科学与工程
    • 7 篇 电子科学与技术(可...
    • 7 篇 生物工程
    • 5 篇 机械工程
    • 5 篇 光学工程
    • 5 篇 航空宇航科学与技...
    • 5 篇 网络空间安全
    • 4 篇 交通运输工程
    • 4 篇 生物医学工程(可授...
    • 3 篇 动力工程及工程热...
    • 2 篇 材料科学与工程(可...
    • 2 篇 冶金工程
    • 2 篇 化学工程与技术
    • 2 篇 石油与天然气工程
  • 44 篇 理学
    • 26 篇 数学
    • 14 篇 物理学
    • 10 篇 统计学(可授理学、...
    • 8 篇 生物学
    • 4 篇 系统科学
    • 2 篇 化学
  • 20 篇 管理学
    • 16 篇 管理科学与工程(可...
    • 9 篇 工商管理
    • 5 篇 图书情报与档案管...
  • 6 篇 法学
    • 4 篇 社会学
    • 2 篇 法学
  • 3 篇 医学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 教育学

主题

  • 6 篇 deep learning
  • 5 篇 computational mo...
  • 3 篇 conferences
  • 3 篇 support vector m...
  • 3 篇 public key crypt...
  • 3 篇 accuracy
  • 3 篇 quantum cryptogr...
  • 3 篇 privacy
  • 3 篇 cryptography
  • 2 篇 learning systems
  • 2 篇 scalability
  • 2 篇 sustainable deve...
  • 2 篇 telecommunicatio...
  • 2 篇 temperature meas...
  • 2 篇 genes
  • 2 篇 5g mobile commun...
  • 2 篇 medical services
  • 2 篇 quality of servi...
  • 2 篇 adversarial mach...
  • 2 篇 monitoring

机构

  • 7 篇 state key labora...
  • 6 篇 science and tech...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 care college of ...
  • 5 篇 institute of sys...
  • 5 篇 department of co...
  • 5 篇 saveetha institu...
  • 5 篇 saveetha institu...
  • 5 篇 tianjin key labo...
  • 4 篇 college of compu...
  • 4 篇 state key labora...
  • 4 篇 amrita vishwa vi...
  • 4 篇 research center ...
  • 3 篇 center for cyber...
  • 3 篇 shandong provinc...
  • 3 篇 state key labora...
  • 3 篇 center for intel...
  • 3 篇 department of mu...
  • 3 篇 school of comput...

作者

  • 6 篇 zhang yichen
  • 5 篇 guo hong
  • 5 篇 yu song
  • 5 篇 prabhakar krishn...
  • 5 篇 krishnan prabhak...
  • 5 篇 kharchenko vyach...
  • 5 篇 xu bingjie
  • 4 篇 lingjun pu
  • 4 篇 yang yang
  • 4 篇 chen ziyang
  • 4 篇 jingdong xu
  • 4 篇 fesenko herman
  • 4 篇 xinjing yuan
  • 4 篇 balakrishnan t. ...
  • 4 篇 u. samson ebenez...
  • 4 篇 ebenezar u. sams...
  • 4 篇 guan xiaohong
  • 4 篇 t. suresh balakr...
  • 3 篇 zeng bo
  • 3 篇 hongli zhang

语言

  • 114 篇 英文
  • 12 篇 其他
  • 2 篇 中文
检索条件"机构=Computer Networks and Systems Security"
128 条 记 录,以下是81-90 订阅
排序:
Higher Education Perceived Stress and Physical Stress: Big Data Analysis
Research Square
收藏 引用
Research Square 2022年
作者: Zhang, Ruihua Zhou, Jincheng Hai, Tao Zhang, Shixue Osamor, Jude Iwendi, Marvellous GodsPraise Shah, Mohammad School of Computer and Information Key Laboratory of Complex Systems and Intelligent Optimization of Guizhou Qiannan Normal University for Nationalities Guizhou Duyun China UTM Skudai Johor Johor Bahru81310 Malaysia Faculty of Education Language and Psychology Postgraduate Department Segi University Malaysia Department of Cyber Security and Networks Glasgow Caledonian University Cowcaddens Road GlasgowG4 0BA United Kingdom University of Nigeria Nsukka Nigeria University of Westminster London United Kingdom
Like other countries, China has suffered severe consequences as a result of the COVID-19 outbreak and pandemic. The lockdown, physical distancing, social isolation has disrupted the day-to-day activities of its citize... 详细信息
来源: 评论
Infer-AVAE: An Attribute inference model based on adversarial variational autoencoder
arXiv
收藏 引用
arXiv 2020年
作者: Zhou, Yadong Ding, Zhihao Liu, Xiaoming Shen, Chao Tong, Lingling Guan, Xiaohong MOE Key Lab for Intelligent Networks and Network Security Xi'an Jiaotong University China National Computer network Emergency Response technical Team Center for Intelligent and Networked Systems and TNLIST Lab Tsinghua University
User attributes, such as gender and education, face severe incompleteness in social networks. In order to make this kind of valuable data usable for downstream tasks like user profiling and personalized recommendation... 详细信息
来源: 评论
Graph representation learning via graphical mutual information maximization
arXiv
收藏 引用
arXiv 2020年
作者: Peng, Zhen Huang, Wenbing Luo, Minnan Zheng, Qinghua Rong, Yu Xu, Tingyang Huang, Junzhou Ministry of Education Key Lab for Intelligent Networks and Network Security School of Computer Science and Technology Xi'an Jiaotong University China State Key Lab of Intelligent Technology and Systems Department of Computer Science and Technology Tsinghua University China Tencent AI Lab China
The richness in the content of various information networks such as social networks and communication networks provides the unprecedented potential for learning high-quality expressive representations without external... 详细信息
来源: 评论
Multi-task learning for object keypoints detection and classification
收藏 引用
Pattern Recognition Letters 2020年 130卷 182-188页
作者: Jie Xu Lin Zhao Shanshan Zhang Chen Gong Jian Yang PCA Lab Key Lab of Intelligent Perception and Systems for High-Dimensional Information of Ministry of Education and Jiangsu Key Lab of Image and Video Understanding for Social Security School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing 210094 China State Key Laboratory of Integrated Services Networks Xidian Univeristy Xi’an 710071 China
Object keypoints detection and classification are both central research topics in computer vision . Due to their wide range potential applications in the real world, substantial efforts have been taken to advance thei...
来源: 评论
衰亡链揭示互利共生生态系统中安全与崩溃的中间阶段(英文)
收藏 引用
Engineering 2024年 第12期 89-98页
作者: 王光炜 刘雪明 肖颖 袁烨 潘林强 管晓宏 高建喜 张海涛 The MOE Engineering Research Center of Autonomous Intelligent Unmanned Systems State Key Laboratory of Digital Manufacturing Equipment and Technology School of Artificial Intelligence and Automation Huazhong University of Science and Technology Guangdong HUST Industrial Technology Research Institute Huazhong University of Science and Technology Guangdong Provincial Engineering Technology Center of Autonomous Unmanned Vessels MOE Key Laboratory of Intelligent Networks and Network Security&State Key Laboratory of Manufacturing Systems Xi'an Jiaotong University Tsinghua National Laboratory of Information Science and Technology Department of Automation Tsinghua University Department of Computer Science Rensselaer Polytechnic Institute
Ecosystems are undergoing unprecedented persistent deterioration due to unsustainable anthropogenic human activities, such as overfishing and deforestation, and the effects of such damage on ecological stability are u...
来源: 评论
Implementation analysis of rectangle cipher and its variant  3
Implementation analysis of rectangle cipher and its variant
收藏 引用
3rd IEEE International Conference on Recent Trends in Electronics, Information and Communication Technology, RTEICT 2018
作者: Philip, Merly Annie Vaithiyanathan, V. Jain, Kurunandan Center for Cyber Security Systems and Networks Amrita Vishwa Vidyapeetham Amritapuri India Amrita Vishwa Vidyapeetham Department of Computer Science and Engineering Amritapuri India
Lightweight ciphers are symmetric cryptographic systems with lower area, lower power and lower cost than standard systems like AES and DES. They were designed to provide security in resource constrained devices like s... 详细信息
来源: 评论
Long-Distance Continuous-Variable Quantum Key Distribution over 202.81 km of Fiber
收藏 引用
Physical Review Letters 2020年 第1期125卷 010502-010502页
作者: Yichen Zhang Ziyang Chen Stefano Pirandola Xiangyu Wang Chao Zhou Binjie Chu Yijia Zhao Bingjie Xu Song Yu Hong Guo State Key Laboratory of Information Photonics and Optical Communications Beijing University of Posts and Telecommunications Beijing 100876 China State Key Laboratory of Advanced Optical Communication Systems and Networks Department of Electronics and Center for Quantum Information Technology Peking University Beijing 100871 China Department of Computer Science University of York York YO10 5GH United Kingdom Science and Technology on Security Communication Laboratory Institute of Southwestern Communication Chengdu 610041 China
Quantum key distribution provides secure keys resistant to code-breaking quantum computers. The continuous-variable version of quantum key distribution offers the advantages of higher secret key rates in metropolitan ... 详细信息
来源: 评论
Smart City Cybersecurity Projects Financing Model in Case of Description of Investors’ Resources With Fuzzy Sets
Smart City Cybersecurity Projects Financing Model in Case of...
收藏 引用
IEEE International Conference on Advanced Trends in Information Theory (ATIT)
作者: Valeriy Lakhno Yurii Matus Volodymyr Malyukov Alyona Desyatko Tetyana Hnatchenko Department of Computer systems and networks National University of Life and Environmental Sciences of Ukraine Kyiv Ukraine Department of Software Engineering and Cyber Security National University of Trade and Economics Kyiv Ukraine
The paper describes the model of choosing mutual investment strategies for Smart City cybersecurity projects with incomplete information on the financial resources of the second investor. The case when the financial r... 详细信息
来源: 评论
Triple layer data hiding mechanism using cryptography and steganography  3
Triple layer data hiding mechanism using cryptography and st...
收藏 引用
3rd IEEE International Conference on Recent Trends in Electronics, Information and Communication Technology, RTEICT 2018
作者: Menon, Nidhi Vaithiyanathan, V. Amrita Center for Cyber Security Systems and Networks Amrita University Amritapuri Kerala India Amrita University Department of Computer Science and Engineering Amritapuri Kerala India
In many areas security systems are well known as the advances are expanding step by step. Using encryption and steganography data security can be accomplished. Cryptography is the process of secure correspondence with... 详细信息
来源: 评论
Finite-size analysis of continuous variable source-independent quantum random number generation
arXiv
收藏 引用
arXiv 2020年
作者: Zhang, Junyu Zhang, Yichen Zheng, Ziyong Chen, Ziyang Xu, Bingjie Yu, Song State Key Laboratory of Information Photonics and Optical Communications Beijing University of Posts and Telecommunications Beijing100876 China State Key Laboratory of Advanced Optical Communication Systems and Networks School of Electronics Engineering and Computer Science Center for Quantum Information Technology Peking University Beijing100871 China Science and Technology on Security Communication Laboratory Institute of Southwestern Communication Chengdu610041 China
We study the impact of finite-size effect on continuous variable source-independent quantum random number generation. The central-limit theorem and maximum likelihood estimation theorem are used to derive the formula ... 详细信息
来源: 评论