咨询与建议

限定检索结果

文献类型

  • 46 篇 期刊文献
  • 32 篇 会议

馆藏范围

  • 78 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 49 篇 工学
    • 39 篇 计算机科学与技术...
    • 36 篇 软件工程
    • 10 篇 信息与通信工程
    • 8 篇 电气工程
    • 7 篇 生物工程
    • 5 篇 机械工程
    • 3 篇 生物医学工程(可授...
    • 2 篇 光学工程
    • 2 篇 化学工程与技术
    • 2 篇 网络空间安全
    • 1 篇 仪器科学与技术
    • 1 篇 动力工程及工程热...
    • 1 篇 电子科学与技术(可...
  • 19 篇 理学
    • 11 篇 数学
    • 8 篇 生物学
    • 6 篇 统计学(可授理学、...
    • 3 篇 物理学
    • 3 篇 化学
    • 1 篇 系统科学
  • 12 篇 管理学
    • 8 篇 管理科学与工程(可...
    • 5 篇 工商管理
    • 5 篇 图书情报与档案管...
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 法学
    • 2 篇 法学
    • 1 篇 社会学
  • 2 篇 医学
    • 2 篇 基础医学(可授医学...
    • 2 篇 临床医学
    • 2 篇 公共卫生与预防医...
  • 2 篇 军事学
    • 2 篇 军队指挥学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 5 篇 deep learning
  • 4 篇 neural networks
  • 3 篇 task analysis
  • 3 篇 genetic algorith...
  • 3 篇 feature extracti...
  • 3 篇 open source soft...
  • 3 篇 training
  • 2 篇 data privacy
  • 2 篇 public key crypt...
  • 2 篇 generative adver...
  • 2 篇 computational ef...
  • 2 篇 statistics
  • 2 篇 fingerprint reco...
  • 2 篇 optimization
  • 2 篇 contrastive lear...
  • 2 篇 semantics
  • 2 篇 accuracy
  • 2 篇 forecasting
  • 2 篇 privacy
  • 2 篇 maximum likeliho...

机构

  • 9 篇 tianjin key labo...
  • 7 篇 haihe lab of ita...
  • 7 篇 zhejiang lab
  • 5 篇 college of compu...
  • 5 篇 college of compu...
  • 4 篇 hebei provincial...
  • 4 篇 key lab of netwo...
  • 3 篇 institute for ne...
  • 3 篇 school of comput...
  • 3 篇 school of data a...
  • 3 篇 school of cyber ...
  • 2 篇 college of cyber...
  • 2 篇 school of cyber ...
  • 2 篇 jiujiang key lab...
  • 2 篇 guangdong key la...
  • 2 篇 zhejiang univers...
  • 2 篇 fujian key labor...
  • 2 篇 jin yinhu labora...
  • 2 篇 key lab of infor...
  • 2 篇 faculty of infor...

作者

  • 6 篇 li tao
  • 6 篇 luo minnan
  • 5 篇 zheng qinghua
  • 4 篇 chang xiaojun
  • 4 篇 jalili rasool
  • 3 篇 chen dong
  • 3 篇 ren xuebin
  • 3 篇 zhicheng wei
  • 3 篇 yang shusen
  • 3 篇 wei zhicheng
  • 2 篇 hua fu
  • 2 篇 yang fei
  • 2 篇 wang yubo
  • 2 篇 jia chengyou
  • 2 篇 dai guang
  • 2 篇 sun ning
  • 2 篇 zhang chao
  • 2 篇 wang jihong
  • 2 篇 dousti mohammad ...
  • 2 篇 liu jun

语言

  • 69 篇 英文
  • 6 篇 其他
  • 3 篇 中文
检索条件"机构=Data and Network Security Lab"
78 条 记 录,以下是21-30 订阅
排序:
An enhanced genetic algorithm for computation task offloading in MEC scenario
收藏 引用
International Journal of Wireless and Mobile Computing 2023年 第2期25卷 118-127页
作者: Zhao, Jiacheng Li, Wenzao Liu, Hantao Yu, Peizhen Li, Hanyun Wen, Zhan School of Communication Engineering Chengdu University of Information Technology Sichuan Chengdu China Chengdu University of Information Technology Sichuan Chengdu China Network and Data Security Key Lab of Sichuan Pro. University of Electronic Science and Technology of China Sichuan Chengdu China Educational Informationisation and Big Data Centre Education Department of Sichuan Province Sichuan Chengdu China
The explosive growth of Internet of Things (IoT) and 5G communication technologies has driven the increasing computing demands for wireless devices. Mobile edge computing in the 5G scenario is a promising solution for... 详细信息
来源: 评论
Fair electronic voting via bitcoin deposits  5th
Fair electronic voting via bitcoin deposits
收藏 引用
5th International Conference on Geo-Spatial Knowledge and Intelligence, GSKI 2017
作者: Wu, Xijuan Wei, Baodian Tian, Haibo Du, Yusong Ma, Xiao School of Data and Computer Science Sun Yat-sen University Guangzhou China Guangdong Key Laboratory of Information Security Technology Guangzhou China Chongqing Key Lab of Computer Network and Communication Technology Chongqing China
Bitcoin is the most popular decentralized digital currency now in use. Block chain is the basic technology of Bitcoin, providing a trustable ledger that can be publicly verified. Research on distributed applications b... 详细信息
来源: 评论
Statistical disclosure: Improved, extended, and resisted
arXiv
收藏 引用
arXiv 2017年
作者: Emamdoost, Navid Dousti, Mohammad Sadeq Jalili, Rasool Data and Network Security Lab Department of Computer Engineering Sharif University of Technology Tehran Iran
Traffic analysis is a type of attack on secure communications systems, in which the adversary extracts useful patterns and information from the observed traffic. This paper improves and extends an efficient traffic an...
来源: 评论
Tamperproof IoT with Blockchain
arXiv
收藏 引用
arXiv 2022年
作者: Yu, Guangsheng Liu, Ren Ping Zhang, J. Andrew Guo, Y. Jay Network Security Lab Global Big Data Technologies Centre University of Technology Sydney Australia
We investigate the tamper-resistant property of Blockchain and its effectiveness for IoT systems. In particular, we implemented an IoT testbed, and built a Blockchain into the testbed. A number of tamper-resistance ex... 详细信息
来源: 评论
Novel way to research nonlinear feedback shift register
收藏 引用
Science China(Information Sciences) 2014年 第9期57卷 161-174页
作者: ZHAO DaWei PENG HaiPeng LI LiXiang HUI SiLi YANG YiXian Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and Telecommunications Zhejiang Provincial Key Lab of Data Storage and Transmission Technology Hangzhou Dianzi University National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Shandong Provincial Key Laboratory of Computer Network Shandong Computer Science Center
In this paper,we regard the nonlinear feedback shift register(NLFSR)as a special Boolean network,and use semi-tensor product of matrices and matrix expression of logic to convert the dynamic equations of NLFSR into an... 详细信息
来源: 评论
MAL2GCN: A ROBUST MALWARE DETECTION APPROACH USING DEEP GRAPH CONVOLUTIONAL networkS WITH NON-NEGATIVE WEIGHTS
arXiv
收藏 引用
arXiv 2021年
作者: Kargarnovin, Omid Sadeghzadeh, Amir Mahdi Jalili, Rasool Data and Network Security Lab Department of Computer Enginnering Sharif University of Technology Tehran Iran
With the growing pace of using Deep Learning (DL) to solve various problems, securing these models against adversaries has become one of the main concerns of researchers. Recent studies have shown that DL-based malwar... 详细信息
来源: 评论
Efficient Zero-Trust data Transmission for Consumer Electronic Using Holographic Counterparts in Internet of Things: Ciphertext-Policy Attribute-Based Signcryption With Equality Test
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Kuang, Ping Zhang, Xiyue Yang, Mengheng Xiong, Hu Feng, Chaosheng Wu, Deyan Wang, Weizheng Wahaballa, Abubaker University of Electronic Science and Technology of China Intelligent Information Technologies and Applications Lab Chengdu610054 China University of Electronic Science and Technology of China Network and Data Security Lab Chengdu610054 China Sichuan Normal University School of Computer Science Chengdu610101 China Sichuan Institute of Computer Sciences Chengdu610000 China City University of Hong Kong Department of Computer Science Hong Kong The University of Aizu Aizuwakamatsu Japan Arab East Colleges Department of Computer Science Riyadh53354 Saudi Arabia
Secure communication in consumer electronic devices, such as health monitoring systems, is essential as they process sensitive medical data. This paper proposes a Ciphertext-Policy Attribute-Based Signcryption with Eq... 详细信息
来源: 评论
PSI Protocol with Structured Encryption
收藏 引用
Jisuanji Xuebao/Chinese Journal of Computers 2022年 第12期45卷 2652-2666页
作者: Yang, Jia-Hui Chen, Lan-Xiang Mu, Yi Zeng, Ling-Fang Xue, Yu-Jie Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fujian Normal University Fuzhou350117 China Zhejiang Lab Hangzhou311121 China Faculty of Data Science City University of Macau Macau999078 China
With the advancement of information technology, local storage and computing capacity cannot well support massive data. The emergence of cloud computing makes data outsourcing a new trend. However, data outsourcing com... 详细信息
来源: 评论
STGAT: A Spatio-Temporal Graph Attention network for Travel Demand Prediction
STGAT: A Spatio-Temporal Graph Attention Network for Travel ...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Tao Yi Zhang YuBo Wang ZhiCheng Wei Key Lab of Network and Information Security College of Computer and Cyberspace Security Hebei Provincial Engineering Research Center for Supply Chain Big Data Analytics & Security Hebei Normal University Shijiazhuang Hebei Province China
Forecasting travel demand is a challenging task due to the complex spatial dependencies and dynamic temporal correlation of the traffic data. Furthermore, a limited representation of the given spatial graph structure ...
来源: 评论
A Deep Reinforcement Learning Approach for Online Taxi Dispatching
A Deep Reinforcement Learning Approach for Online Taxi Dispa...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: YuBo Wang TaoYi Zhang ZhiCheng Wei Key Lab of Network and Information Security College of Computer and Cyber Security Hebei Provincial Engineering Research Center for Supply Chain Big Data Analytics & Security Hebei Normal University Shijiazhuang Hebei Province China
With the development of smart city transportation systems, developing reasonable dispatching strategies for idle ride-hailing vehicles has become an urgent research problem. In this paper, we address the short-sighted...
来源: 评论