咨询与建议

限定检索结果

文献类型

  • 47 篇 期刊文献
  • 32 篇 会议

馆藏范围

  • 79 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 50 篇 工学
    • 40 篇 计算机科学与技术...
    • 37 篇 软件工程
    • 11 篇 信息与通信工程
    • 9 篇 电气工程
    • 7 篇 生物工程
    • 5 篇 机械工程
    • 3 篇 光学工程
    • 3 篇 电子科学与技术(可...
    • 3 篇 生物医学工程(可授...
    • 2 篇 控制科学与工程
    • 2 篇 化学工程与技术
    • 2 篇 网络空间安全
    • 1 篇 仪器科学与技术
  • 19 篇 理学
    • 11 篇 数学
    • 8 篇 生物学
    • 6 篇 统计学(可授理学、...
    • 3 篇 物理学
    • 3 篇 化学
    • 1 篇 系统科学
  • 12 篇 管理学
    • 8 篇 管理科学与工程(可...
    • 5 篇 工商管理
    • 5 篇 图书情报与档案管...
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 医学
    • 2 篇 基础医学(可授医学...
    • 2 篇 临床医学
    • 2 篇 公共卫生与预防医...
  • 2 篇 法学
    • 1 篇 法学
    • 1 篇 社会学
  • 2 篇 军事学
    • 2 篇 军队指挥学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 5 篇 deep learning
  • 4 篇 neural networks
  • 3 篇 task analysis
  • 3 篇 genetic algorith...
  • 3 篇 feature extracti...
  • 3 篇 open source soft...
  • 3 篇 training
  • 2 篇 data privacy
  • 2 篇 public key crypt...
  • 2 篇 generative adver...
  • 2 篇 computational ef...
  • 2 篇 statistics
  • 2 篇 fingerprint reco...
  • 2 篇 optimization
  • 2 篇 contrastive lear...
  • 2 篇 semantics
  • 2 篇 federated learni...
  • 2 篇 accuracy
  • 2 篇 forecasting
  • 2 篇 privacy

机构

  • 9 篇 tianjin key labo...
  • 8 篇 haihe lab of ita...
  • 7 篇 zhejiang lab
  • 5 篇 college of compu...
  • 5 篇 college of compu...
  • 4 篇 hebei provincial...
  • 4 篇 key lab of netwo...
  • 3 篇 institute for ne...
  • 3 篇 school of comput...
  • 3 篇 school of data a...
  • 3 篇 school of cyber ...
  • 2 篇 college of cyber...
  • 2 篇 school of cyber ...
  • 2 篇 jiujiang key lab...
  • 2 篇 guangdong key la...
  • 2 篇 zhejiang univers...
  • 2 篇 fujian key labor...
  • 2 篇 jin yinhu labora...
  • 2 篇 key lab of infor...
  • 2 篇 faculty of infor...

作者

  • 7 篇 li tao
  • 6 篇 luo minnan
  • 5 篇 zheng qinghua
  • 4 篇 chang xiaojun
  • 4 篇 jalili rasool
  • 3 篇 chen dong
  • 3 篇 wu yanlin
  • 3 篇 ren xuebin
  • 3 篇 zhicheng wei
  • 3 篇 yang shusen
  • 3 篇 wei zhicheng
  • 3 篇 he along
  • 2 篇 hua fu
  • 2 篇 yang fei
  • 2 篇 wang yubo
  • 2 篇 jia chengyou
  • 2 篇 dai guang
  • 2 篇 sun ning
  • 2 篇 zhang chao
  • 2 篇 wang jihong

语言

  • 70 篇 英文
  • 6 篇 其他
  • 3 篇 中文
检索条件"机构=Data and Network Security Lab"
79 条 记 录,以下是31-40 订阅
排序:
A Deep Reinforcement Learning Approach for Online Taxi Dispatching
A Deep Reinforcement Learning Approach for Online Taxi Dispa...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: YuBo Wang TaoYi Zhang ZhiCheng Wei Key Lab of Network and Information Security College of Computer and Cyber Security Hebei Provincial Engineering Research Center for Supply Chain Big Data Analytics & Security Hebei Normal University Shijiazhuang Hebei Province China
With the development of smart city transportation systems, developing reasonable dispatching strategies for idle ride-hailing vehicles has become an urgent research problem. In this paper, we address the short-sighted...
来源: 评论
A Lightening Fine-grained Access Control Scheme Supporting Full Policy Hiding in Cloud Storage  29
A Lightening Fine-grained Access Control Scheme Supporting F...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Shi, Jiaoli Hu, Chao Yao, Shimao Mei, Zhuolin Wu, Bin Li, Hui Jiujiang Univ. School of Computer and Big Data Jiujiang China Jiangxi Univ. of Finance and Economics School of Software IoT Engineering Nanchang China Jiujiang Key Lab. of Network and Information Security Jiujiang China Jiujiang University School of Computer and Big Data Jiujiang China Peking University School of Elec. and Comp. Engineering Shenzhen China
Efficiency, security, and flexibility are difficult to balance in a full policy hiding CP-ABE scheme. This paper creatively converts the privacy matching problem of access policy and a user's private key to the pr... 详细信息
来源: 评论
TransUKAN:Computing-Efficient Hybrid KAN-Transformer for Enhanced Medical Image Segmentation
arXiv
收藏 引用
arXiv 2024年
作者: Wu, Yanlin Li, Tao Wang, Zhihong Kang, Hong He, Along Tianjin Key Laboratory of Network and Data Security Technology College of Computer Science Nankai University Tianjin China Haihe Lab of ITAI China
U-Net is currently the most widely used architecture for medical image segmentation. Benefiting from its unique encoder-decoder architecture and skip connections, it can effectively extract features from input images ... 详细信息
来源: 评论
VUSphere: Visual Analysis of Video Utilization in Online Distance Education  13
VUSphere: Visual Analysis of Video Utilization in Online Dis...
收藏 引用
13th IEEE Conference on Visual Analytics Science and Technology, VAST 2018
作者: He, Huan Zheng, Oinghua Dong, Bo Key Laboratory of Intelligent Networks and Network Security Ministry of Education Xi'An Jiaotong University China School of Electronic and Information Engineering Xi'An Jiaotong University China School of Continuing Education Xi'An Jiaotong University China National Engineering Lab for Big Data Analytics Xi'An Jiaotong University China
Online Distance Education (ODE) provides massive course videos of various specialties for students across the country to learn professional knowledge anytime and anywhere. Analyzing the utilization of these videos fro... 详细信息
来源: 评论
LDPC Code based Pseudonym Scheme for Vehicular networks
LDPC Code based Pseudonym Scheme for Vehicular Networks
收藏 引用
Space-Air-Ground Computing (SAGC), International Conference on
作者: Jin Zhou Changsong Zheng Yuedi Li Hua Xu Zhiguang Qin Dajiang Chen Network and Data Security Key Lab of Sichuan Province UESTC Chengdu China Public Security Bureau of Sichuan Chengdu China School of Physics and Electronic Engineering Yancheng Teachers University Yancheng China
In this paper, an innovative pseudonym scheme based on Direct Anonymous Attestation (DAA) and Low-Density Parity-Check (LDPC) is proposed. For the sake of improving the efficiency of generating pseudonyms, the propose... 详细信息
来源: 评论
SFTA: Spiking Neural networks Vulnerable to Spiking Feature Transferable Attack
SFTA: Spiking Neural Networks Vulnerable to Spiking Feature ...
收藏 引用
IEEE International Symposium on Parallel and Distributed Processing with Applications and IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC)
作者: Xuanwei Lin Chen Dong Ximeng Liu College of Computer and Data Science Fuzhou University Fujian Key Laboratory of Network Computing and Intelligent Information Processing (Fuzhou University) Key Lab of Information Security of Network Systems (Fuzhou University)
Many recent works have shown that spiking neural networks (SNNs) are vulnerable to well-crafted adversarial attacks in the white-box setting, which may lead to misclassification of the trained model. However, the info... 详细信息
来源: 评论
An Ensemble of CapsNet and KSVM Using Feature Fusion: Application to COVID-19 Detection  3
An Ensemble of CapsNet and KSVM Using Feature Fusion: Applic...
收藏 引用
3rd International Conference on Pattern Recognition and Machine Learning, PRML 2022
作者: Aggrey, Esther Stacy E. B. Zhen, Qin Kodjiku, Seth Larweh Aidoo, Evans Fiasam, Linda Delali Mensah, Acheampong Edward University of Electronic Science & Technology of China School of Information & Software Engineering Chengdu China University of Electronic Science & Technology of China School of Information & Software Engineering Network and Data Security Key Lab of Sichuan Province Chengdu China Zhejiang Gongshang University School of Computer & Information Engineering Hangzhou China
COVID-19 virus is a major worldwide pandemic that is growing at a fast pace throughout the world. The usual approach for diagnosing COVID-19 is the use of a real-time polymerase chain reaction (RT-PCR) based nucleic a... 详细信息
来源: 评论
MEFold: Memory-Efficient Optimization for Protein Language Models via Chunk and Quantization
MEFold: Memory-Efficient Optimization for Protein Language M...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Yanfeng Jiang Ning Sun Zhengxian Lu Shuang Peng Yi Zhang Fei Yang Tao Li College of Computer Science Nankai University Tianjin China Tianjin Key Laboratory of Network and Data Security Technology Tianjin China Zhejiang Lab Hangzhou China Haihe Lab of ITAI Tianjin China
Protein language models are currently experiencing a surge in demand owing to their remarkable accuracy in protein structure prediction. Nevertheless, their applications are hindered by the significant computation and... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities  24
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
44th ACM/IEEE International Conference on Software Engineering, ICSE 2024
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hong Kong Jin YinHu Laboratory Wuhan China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China University of Colorado Colorado Springs Department of Computer Science Colorado Springs Colorado United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
Ciphertext-policy weighted attribute-based encryption scheme in cloud computing
收藏 引用
Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition) 2013年 第6期45卷 21-26页
作者: Liu, Xi-Meng Ma, Jian-Feng Xiong, Jin-Bo Li, Qi Zhang, Tao Zhu, Hui School of Telecommunications Eng. Xidian Univ. Xi'an 710071 China School of Computer Sci. and Technol. Xidian Univ. Xi'an 710071 China Network and Data Security Key Lab. of Sichuan Province Chengdu 611731 China
By analyzing existing ciphertext-policy attribute-based encryption scheme, ciphertext-policy weighted attribute-based encryption scheme was proposed. To solve the existing scheme without considering the attribute with... 详细信息
来源: 评论