咨询与建议

限定检索结果

文献类型

  • 47 篇 期刊文献
  • 32 篇 会议

馆藏范围

  • 79 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 50 篇 工学
    • 40 篇 计算机科学与技术...
    • 37 篇 软件工程
    • 11 篇 信息与通信工程
    • 9 篇 电气工程
    • 7 篇 生物工程
    • 5 篇 机械工程
    • 3 篇 光学工程
    • 3 篇 电子科学与技术(可...
    • 3 篇 生物医学工程(可授...
    • 2 篇 控制科学与工程
    • 2 篇 化学工程与技术
    • 2 篇 网络空间安全
    • 1 篇 仪器科学与技术
  • 19 篇 理学
    • 11 篇 数学
    • 8 篇 生物学
    • 6 篇 统计学(可授理学、...
    • 3 篇 物理学
    • 3 篇 化学
    • 1 篇 系统科学
  • 12 篇 管理学
    • 8 篇 管理科学与工程(可...
    • 5 篇 工商管理
    • 5 篇 图书情报与档案管...
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 医学
    • 2 篇 基础医学(可授医学...
    • 2 篇 临床医学
    • 2 篇 公共卫生与预防医...
  • 2 篇 法学
    • 1 篇 法学
    • 1 篇 社会学
  • 2 篇 军事学
    • 2 篇 军队指挥学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 5 篇 deep learning
  • 4 篇 neural networks
  • 3 篇 task analysis
  • 3 篇 genetic algorith...
  • 3 篇 feature extracti...
  • 3 篇 open source soft...
  • 3 篇 training
  • 2 篇 data privacy
  • 2 篇 public key crypt...
  • 2 篇 generative adver...
  • 2 篇 computational ef...
  • 2 篇 statistics
  • 2 篇 fingerprint reco...
  • 2 篇 optimization
  • 2 篇 contrastive lear...
  • 2 篇 semantics
  • 2 篇 federated learni...
  • 2 篇 accuracy
  • 2 篇 forecasting
  • 2 篇 privacy

机构

  • 9 篇 tianjin key labo...
  • 8 篇 haihe lab of ita...
  • 7 篇 zhejiang lab
  • 5 篇 college of compu...
  • 5 篇 college of compu...
  • 4 篇 hebei provincial...
  • 4 篇 key lab of netwo...
  • 3 篇 institute for ne...
  • 3 篇 school of comput...
  • 3 篇 school of data a...
  • 3 篇 school of cyber ...
  • 2 篇 college of cyber...
  • 2 篇 school of cyber ...
  • 2 篇 jiujiang key lab...
  • 2 篇 guangdong key la...
  • 2 篇 zhejiang univers...
  • 2 篇 fujian key labor...
  • 2 篇 jin yinhu labora...
  • 2 篇 key lab of infor...
  • 2 篇 faculty of infor...

作者

  • 7 篇 li tao
  • 6 篇 luo minnan
  • 5 篇 zheng qinghua
  • 4 篇 chang xiaojun
  • 4 篇 jalili rasool
  • 3 篇 chen dong
  • 3 篇 wu yanlin
  • 3 篇 ren xuebin
  • 3 篇 zhicheng wei
  • 3 篇 yang shusen
  • 3 篇 wei zhicheng
  • 3 篇 he along
  • 2 篇 hua fu
  • 2 篇 yang fei
  • 2 篇 wang yubo
  • 2 篇 jia chengyou
  • 2 篇 dai guang
  • 2 篇 sun ning
  • 2 篇 zhang chao
  • 2 篇 wang jihong

语言

  • 70 篇 英文
  • 6 篇 其他
  • 3 篇 中文
检索条件"机构=Data and Network Security Lab"
79 条 记 录,以下是11-20 订阅
排序:
VFGCN: A Vertical Federated Learning Framework With Privacy Preserving for Graph Convolutional network
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Wang, Gang Li, Qingming Liu, Ximeng Yan, Xiaoran Dong, Qingkuan Wu, Huiwen Kong, Xiangjie Zhou, Li Zhejiang Lab HangZhou 310000 China Zhejiang University College of Computer Science and Technology Hangzhou 310058 China Fuzhou University Key Laboratory of Information Security of Network Systems College of Computer and Big Data Fuzhou 350108 China Xidian University State Key Laboratory of Integrated Services Networks Xi'an 710071 China Zhejiang University of Technology College of Computer Science and Technology Hangzhou 310023 China Dalian University of Technology School of Software Dalian 116620 China
Due to the robust representational capabilities of graph data, employing graph neural networks for its processing has demonstrated superior performance over conventional deep learning algorithms. Graph data encompasse... 详细信息
来源: 评论
Low-rank tucker decomposition for multi-view outlier detection based on meta-learning
收藏 引用
Information Fusion 2025年 123卷
作者: Wei Lin Kun Xie Jiayin Li Shiping Wang Li Xu College of Computer and Cyber Security Fujian Normal University Fuzhou China Fujian Provincial Key Lab of Network Security and Cryptology Fujian Normal University Fuzhou China College of Computer Science and Electronics Engineering Hunan University Changsha China College of Computer and Data Science Fuzhou University Fuzhou China
The analysis and mining of multi-view data have gained widespread attention, making multi-view anomaly detection a prominent research area. Despite notable advancements in the performance of existing multi-view anomal...
来源: 评论
Semantic and Emotional Dual Channel for Emotion Recognition in Conversation
收藏 引用
IEEE Transactions on Affective Computing 2025年
作者: Yang, Zhenyu Zhang, Zhibo Cheng, Yuhu Zhang, Tong Wang, Xuesong Jinan250353 China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250353 China China University of Mining and Technology Engineering Research Center of Intelligent Control for Underground Space Ministry of Education Xuzhou Key Laboratory of Artificial Intelligence and Big Data School of Information and Control Engineering Xuzhou221116 China South China University of Technology Guangdong Provincial Key Laboratory of Computational Intelligence and Cyberspace Information School of Computer Science and Engineering Guangzhou510006 China Pazhou Lab Guangzhou510335 China Engineering Research Center Ministry of Education on Health Intelligent Perception and Paralleled Digital-Human Guangzhou China
Emotion recognition in conversation (ERC) aims at accurately identifying emotional states expressed in conversational content. Existing ERC methods, although relying on semantic understanding, often encounter challeng... 详细信息
来源: 评论
New results on quantum boomerang attacks
收藏 引用
Quantum Information Processing 2023年 第4期22卷 1-27页
作者: Zou, Hongkai Zou, Jian Luo, Yiyuan College of Computer and Data Science Fuzhou University Fuzhou China Key Lab of Information Security of Network Systems Fuzhou University Fuzhou China School of Information Sciences and Technology Huizhou University Huizhou China
At SAC 2021, Frixons et al. proposed quantum boomerang attacks that can effectively recover the keys of block ciphers in the quantum setting. Based on their work, we further consider how to quantize the generic boomer... 详细信息
来源: 评论
Ramp Scheme Based on CRT for Polynomial Ring over Finite Field
收藏 引用
Journal of Systems Science & Complexity 2023年 第1期36卷 129-150页
作者: DING Jian KE Pinhui LIN Changlu WANG Huaxiong College of Computer and Cyber Security Fujian Normal UniversityFuzhou 350007China School of Mathematics and Big Data Chaohu UniveristyHefei 238024China School of Mathematics and Statistics and Fujian Provincial Key Lab of Network Security and CryptologyFujian Normal UniversityFuzhou 350007China School of Physical and Mathematical Sciences Nanyang Technological UniversitySingapore 639798Singapore
Chinese Reminder Theorem(CRT)for integers has been widely used to construct secret sharing schemes for different scenarios,but these schemes have lower information rates than that of Lagrange interpolation-based *** A... 详细信息
来源: 评论
STGAT: A Spatio-Temporal Graph Attention network for Travel Demand Prediction
STGAT: A Spatio-Temporal Graph Attention Network for Travel ...
收藏 引用
2023 International Conference on networking and network Applications, NaNA 2023
作者: Zhang, Tao Yi Wang, YuBo Wei, ZhiCheng Key Lab of Network and Information Security China College of Computer and Cyberspace Security China Hebei Provincial Engineering Research Center for Supply Chain Big Data Analytics & Security Hebei Normal University Hebei Province Shijiazhuang China
Forecasting travel demand is a challenging task due to the complex spatial dependencies and dynamic temporal correlation of the traffic data. Furthermore, a limited representation of the given spatial graph structure ... 详细信息
来源: 评论
Community discovery method based on complex network of data fusion based on the super network perspective
收藏 引用
International Journal of Computers and Applications 2021年 第4期43卷 383-390页
作者: Pei, Li School of Computer Science & Technology Xi‘an University of Posts and Telecommunications Xi‘an China Shaanxi Key Laboratory of Network Data Intelligent Processing Xi‘an University of Posts and Telecommunications Xi‘an China Ministry of Education Key Lab For Intelligent Networks and Network Security Xi‘an Jiaotong University Xi‘an China
To enhance the computational efficiency and precision of community discovery, a community discovery algorithm with the mixed label based on the minimum description length (MDI) of information compression is proposed i... 详细信息
来源: 评论
A Deep Reinforcement Learning Approach for Online Taxi Dispatching
A Deep Reinforcement Learning Approach for Online Taxi Dispa...
收藏 引用
2023 International Conference on networking and network Applications, NaNA 2023
作者: Wang, YuBo Zhang, TaoYi Wei, ZhiCheng Key Lab of Network and Information Security China College of Computer and Cyber Security China Hebei Prov. Eng. Res. Center for Supply Chain Big Data Analytics Security Hebei Normal University Hebei Province Shijiazhuang China
With the development of smart city transportation systems, developing reasonable dispatching strategies for idle ride-hailing vehicles has become an urgent research problem. In this paper, we address the short-sighted... 详细信息
来源: 评论
A Novel Multi-Edge Cooperative Offloading Genetic Algorithm towards Environmental Monitoring System  5
A Novel Multi-Edge Cooperative Offloading Genetic Algorithm ...
收藏 引用
5th International Conference on Telecommunications and Communication Engineering, ICTCE 2022
作者: Fang, Jie Li, Wenzao Wang, Yue Sun, Xiulan College of Communication Engineering Chengdu University of Information Technology China Network and Data Security Key Lab of Sichuan Pro. University of Electronic Science and Technology of China China Institute of Data Application Research Educational Informalization and Big Data Center China
In environmental monitor architecture, the usual way of processing data is centralized. On the one hand, this leads to a long time of data processing, and with the increasing number of monitoring sensors, the pressure... 详细信息
来源: 评论
Robot and its living space:A roadmap for robot development based on the view of living space
收藏 引用
Digital Communications and networks 2021年 第4期7卷 505-517页
作者: Xiaofeng Cai Huansheng Ning Sahraoui Dhelim Rongjuan Zhou Tao Zhang Yang Xu Yueliang Wan School of Computer and Communication Engineering University of Science and Technology Beijing Beijing 100083China Beijing Engineering Research Center for Cyberspace Data Analysis and Applications Beijing 100083China School of Foreign Studies University of Science and Technology Beijing Beijing 100083China Key Lab of Information Network Security Ministry of Public SecurityChina Run Technologies Co. LidBeijing China
Robot’s living space Human-robot relationship Robot humanization Hybrid intelligence Human-robot integrated society Robots,as the creation of humans,became an irreplaceable component in human *** the advancement of t... 详细信息
来源: 评论