咨询与建议

限定检索结果

文献类型

  • 47 篇 期刊文献
  • 32 篇 会议

馆藏范围

  • 79 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 50 篇 工学
    • 40 篇 计算机科学与技术...
    • 37 篇 软件工程
    • 11 篇 信息与通信工程
    • 9 篇 电气工程
    • 7 篇 生物工程
    • 5 篇 机械工程
    • 3 篇 光学工程
    • 3 篇 电子科学与技术(可...
    • 3 篇 生物医学工程(可授...
    • 2 篇 控制科学与工程
    • 2 篇 化学工程与技术
    • 2 篇 网络空间安全
    • 1 篇 仪器科学与技术
  • 19 篇 理学
    • 11 篇 数学
    • 8 篇 生物学
    • 6 篇 统计学(可授理学、...
    • 3 篇 物理学
    • 3 篇 化学
    • 1 篇 系统科学
  • 12 篇 管理学
    • 8 篇 管理科学与工程(可...
    • 5 篇 工商管理
    • 5 篇 图书情报与档案管...
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 医学
    • 2 篇 基础医学(可授医学...
    • 2 篇 临床医学
    • 2 篇 公共卫生与预防医...
  • 2 篇 法学
    • 1 篇 法学
    • 1 篇 社会学
  • 2 篇 军事学
    • 2 篇 军队指挥学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 5 篇 deep learning
  • 4 篇 neural networks
  • 3 篇 task analysis
  • 3 篇 genetic algorith...
  • 3 篇 feature extracti...
  • 3 篇 open source soft...
  • 3 篇 training
  • 2 篇 data privacy
  • 2 篇 public key crypt...
  • 2 篇 generative adver...
  • 2 篇 computational ef...
  • 2 篇 statistics
  • 2 篇 fingerprint reco...
  • 2 篇 optimization
  • 2 篇 contrastive lear...
  • 2 篇 semantics
  • 2 篇 federated learni...
  • 2 篇 accuracy
  • 2 篇 forecasting
  • 2 篇 privacy

机构

  • 9 篇 tianjin key labo...
  • 8 篇 haihe lab of ita...
  • 7 篇 zhejiang lab
  • 5 篇 college of compu...
  • 5 篇 college of compu...
  • 4 篇 hebei provincial...
  • 4 篇 key lab of netwo...
  • 3 篇 institute for ne...
  • 3 篇 school of comput...
  • 3 篇 school of data a...
  • 3 篇 school of cyber ...
  • 2 篇 college of cyber...
  • 2 篇 school of cyber ...
  • 2 篇 jiujiang key lab...
  • 2 篇 guangdong key la...
  • 2 篇 zhejiang univers...
  • 2 篇 fujian key labor...
  • 2 篇 jin yinhu labora...
  • 2 篇 key lab of infor...
  • 2 篇 faculty of infor...

作者

  • 7 篇 li tao
  • 6 篇 luo minnan
  • 5 篇 zheng qinghua
  • 4 篇 chang xiaojun
  • 4 篇 jalili rasool
  • 3 篇 chen dong
  • 3 篇 wu yanlin
  • 3 篇 ren xuebin
  • 3 篇 zhicheng wei
  • 3 篇 yang shusen
  • 3 篇 wei zhicheng
  • 3 篇 he along
  • 2 篇 hua fu
  • 2 篇 yang fei
  • 2 篇 wang yubo
  • 2 篇 jia chengyou
  • 2 篇 dai guang
  • 2 篇 sun ning
  • 2 篇 zhang chao
  • 2 篇 wang jihong

语言

  • 70 篇 英文
  • 6 篇 其他
  • 3 篇 中文
检索条件"机构=Data and Network Security Lab"
79 条 记 录,以下是1-10 订阅
排序:
security analysis and secured access design for networks of image remote sensing
收藏 引用
Digital Communications and networks 2025年 第1期11卷 136-144页
作者: Juan Zhao Haibo Dai Xiaolong Xu Hao Yan Zheng Zhang Chunguo Li School of Network Security Jinling Institute of TechnologyNanjing 211169China School of IoT Nanjing University of Posts and Telecommunications(NJUPT)Nanjing 210003China Jiangsu Key Lab.of Big Data Security and Intelligent Processing NJUPTNanJing 210003China School of Information Science and Engineering Southeast UniversityNanjing 210096China
The secured access is studied in this paper for the network of the image remote *** sensor in this network encounters the information security when uploading information of the images wirelessly from the sensor to the... 详细信息
来源: 评论
A Weighted Discrete Wavelet Transform-Based Capsule network for Malware Classification  27th
A Weighted Discrete Wavelet Transform-Based Capsule Network ...
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Qiao, Tonghua Cao, Chunjie Zou, Binghui Tao, Fangjian Cheng, Yinan Zhang, Qi Sun, Jingzhang Lab of Heterogeneous Network Security and Governance Haikou China School of Cyberspace Security Hainan University Haikou China Faculty of Data Science City University of Macau China
The rise of sophisticated malware poses a grave threat to computer security, challenging traditional detection methods. Traditional malware detection techniques, which primarily rely on feature engineering and definin... 详细信息
来源: 评论
AdaptFRCNet: Semi-supervised adaptation of pre-trained model with frequency and region consistency for medical image segmentation
收藏 引用
Medical Image Analysis 2025年 103卷 103626页
作者: He, Along Wu, Yanlin Wang, Zhihong Li, Tao Fu, Huazhu College of Computer Science Tianjin Key Laboratory of Network and Data Security Technology Nankai University Tianjin300350 China 138632 Singapore Haihe Lab of ITAI Tianjin300459 China
Recently, large pre-trained models (LPM) have achieved great success, which provides rich feature representation for downstream tasks. Pre-training and then fine-tuning is an effective way to utilize LPM. However, the... 详细信息
来源: 评论
Adversarial training via multi-guidance and historical memory enhancement
收藏 引用
Neurocomputing 2025年 619卷
作者: Zhao, Chenyu Qian, Yaguan Wang, Bin Gu, Zhaoquan Ji, Shouling Wang, Wei Zhang, Yanchun School of Science Zhejiang University of Science and Technology China Network and Data Security China China School of Computer Science and Technology Zhejiang University China Education Key Lab for Intelligent Networks and Network Security Xi'an Jiaotong University China Institute for Sustainable Industries and Liveable Cities Victoria University Australia
Deep neural networks (DNNs) are often susceptible to the influence of adversarial examples, potentially leading to severe security issues. Adversarial training stands out as one of the most effective defenses. In this... 详细信息
来源: 评论
OSE: On-Site State of Health Estimation for Li-ion Battery using Real-Time Field data
收藏 引用
IEEE Transactions on Transportation Electrification 2025年 第3期11卷 7452-7462页
作者: Chen, Yanwen Zhao, Cong Yang, Shusen Zhao, Peng Ren, Xuebin Han, Qing Yang, Yuqian Wu, Shuaijun Xi'an Jiaotong University National Engineering Laboratory for Big Data Analytics Shaanxi Xi'an710049 China Xi'an Jiaotong University National Engineering Laboratory for Big Data Analytics The Ministry of Education Key Lab for Intelligent Networks and Network Security Shaanxi Xi'an710049 China
On-site lithium-ion battery state of health (SoH) estimation is of crucial importance for reliable operations of electric vehicles (EVs). Yet, due to the low-quality of unlabeled real-time field data, diverse operatin... 详细信息
来源: 评论
EVPIR: Efficient and Verifiable Privacy-Preserving Image Retrieval in Cloud-assisted Internet of Things
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Li, Mingyue Li, Yuntao Du, Ruizhong Jia, Chunfu Shao, Wei Hebei University School of Cyber Security and Computer Baoding071000 China Key Lab on High Trusted Information Sys tem in Hebei Province Hebei China College of Cyber Sciences Nankai university Tianjin300350 China Tianjin Key Laboratory of Network and Data Security Technology Tianjin300350 China Jinan250014 China
With the proliferation of mobile devices and the advancement of cloud computing capabilities, cloud-assisted Internet of Things (IoT) attracts increased attention based on its computational and storage advantages. Upo... 详细信息
来源: 评论
Deep Learning-Driven Throughput Maximization in Covert Communication for UAV-RIS Cognitive Systems
IEEE Open Journal of the Communications Society
收藏 引用
IEEE Open Journal of the Communications Society 2025年 6卷 4140-4155页
作者: Nhan Vo, Van Quoc Long, Nguyen Dang, Viet-Hung Dac Ho, Tu Tran, Hung Chatzinotas, Symeon Tran, Dinh-Hieu Sanguanpong, Surasak So-In, Chakchai Duy Tan University Faculty of Information Technology Da Nang550000 Viet Nam Duy Tan University Institute of Research and Development Da Nang550000 Viet Nam Norwegian University of Science and Technology Faculty of Information Technology and Electrical Engineering Department of Information Security and Communication Technology Trondheim7034 Norway National Economics University DATCOM Lab Faculty of Data Science and Artificial Intelligence College of Technology Hanoi12116 Viet Nam University of Luxembourg Interdisciplinary Centre for Security Reliability and Trust Esch-sur-Alzette4365 Luxembourg Kasetsart University Faculty of Engineering Department of Computer Engineering Bangkok10900 Thailand Khon Kaen University Applied Network Technology College of Computing Khon Kaen40002 Thailand
This paper examines a cognitive radio (CR) nonorthogonal multiple access (NOMA) system in which an unmanned aerial vehicle equipped with a reconfigurable intelligent surface (UAV-RIS) plays two roles: relaying and fri... 详细信息
来源: 评论
Correctness verification in database outsourcing: A trust-based fake tuples approach
Correctness verification in database outsourcing: A trust-ba...
收藏 引用
8th International Conference on Information Systems security, ICISS 2012
作者: Ghasemi, Simin Noferesti, Morteza Hadavi, Mohammad Ali Nogoorani, Sadegh Dorri Jalili, Rasool Data and Network Security Lab Sharif University of Technology Tehran Iran
An important security challenge in database outsourcing scenarios is the correctness verification of query results. The proposed approaches in the literature, impose high overhead on both the service provider and spec... 详细信息
来源: 评论
A rejection sampling algorithm for off-centered discrete Gaussian distributions over the integers
收藏 引用
Science China(Information Sciences) 2019年 第3期62卷 196-198页
作者: Yusong DU Baodian WEI Huang ZHANG School of Data and Computer Science Sun Yat-sen University Guangdong Key Laboratory of Information Security Technology Chongqing Key Lab of Computer Network and Communication Technology
Dear editor,Discrete Gaussian sampling, that is, sampling from a discrete Gaussian distribution DΛ,σ,cwith parameter σ> 0 and center c∈R~n over an ndimensional lattice Λ, has been considered by the cryptograph... 详细信息
来源: 评论
Statistical disclosure: Improved, extended, and resisted
Statistical disclosure: Improved, extended, and resisted
收藏 引用
6th International Conference on Emerging security Information, Systems and Technologies, SECURWARE 2012
作者: Emamdoost, Navid Dousti, Mohammad Sadeq Jalili, Rasool Data and Network Security Lab Department of Computer Engineering Sharif University of Technology Tehran Iran
Traffic analysis is a type of attack on secure communications systems, in which the adversary extracts useful patterns and information from the observed traffic. This paper improves and extends an efficient traffic an... 详细信息
来源: 评论