咨询与建议

限定检索结果

文献类型

  • 47 篇 期刊文献
  • 32 篇 会议

馆藏范围

  • 79 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 50 篇 工学
    • 40 篇 计算机科学与技术...
    • 37 篇 软件工程
    • 11 篇 信息与通信工程
    • 9 篇 电气工程
    • 7 篇 生物工程
    • 5 篇 机械工程
    • 3 篇 光学工程
    • 3 篇 电子科学与技术(可...
    • 3 篇 生物医学工程(可授...
    • 2 篇 控制科学与工程
    • 2 篇 化学工程与技术
    • 2 篇 网络空间安全
    • 1 篇 仪器科学与技术
  • 19 篇 理学
    • 11 篇 数学
    • 8 篇 生物学
    • 6 篇 统计学(可授理学、...
    • 3 篇 物理学
    • 3 篇 化学
    • 1 篇 系统科学
  • 12 篇 管理学
    • 8 篇 管理科学与工程(可...
    • 5 篇 工商管理
    • 5 篇 图书情报与档案管...
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 医学
    • 2 篇 基础医学(可授医学...
    • 2 篇 临床医学
    • 2 篇 公共卫生与预防医...
  • 2 篇 法学
    • 1 篇 法学
    • 1 篇 社会学
  • 2 篇 军事学
    • 2 篇 军队指挥学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 5 篇 deep learning
  • 4 篇 neural networks
  • 3 篇 task analysis
  • 3 篇 genetic algorith...
  • 3 篇 feature extracti...
  • 3 篇 open source soft...
  • 3 篇 training
  • 2 篇 data privacy
  • 2 篇 public key crypt...
  • 2 篇 generative adver...
  • 2 篇 computational ef...
  • 2 篇 statistics
  • 2 篇 fingerprint reco...
  • 2 篇 optimization
  • 2 篇 contrastive lear...
  • 2 篇 semantics
  • 2 篇 federated learni...
  • 2 篇 accuracy
  • 2 篇 forecasting
  • 2 篇 privacy

机构

  • 9 篇 tianjin key labo...
  • 8 篇 haihe lab of ita...
  • 7 篇 zhejiang lab
  • 5 篇 college of compu...
  • 5 篇 college of compu...
  • 4 篇 hebei provincial...
  • 4 篇 key lab of netwo...
  • 3 篇 institute for ne...
  • 3 篇 school of comput...
  • 3 篇 school of data a...
  • 3 篇 school of cyber ...
  • 2 篇 college of cyber...
  • 2 篇 school of cyber ...
  • 2 篇 jiujiang key lab...
  • 2 篇 guangdong key la...
  • 2 篇 zhejiang univers...
  • 2 篇 fujian key labor...
  • 2 篇 jin yinhu labora...
  • 2 篇 key lab of infor...
  • 2 篇 faculty of infor...

作者

  • 7 篇 li tao
  • 6 篇 luo minnan
  • 5 篇 zheng qinghua
  • 4 篇 chang xiaojun
  • 4 篇 jalili rasool
  • 3 篇 chen dong
  • 3 篇 wu yanlin
  • 3 篇 ren xuebin
  • 3 篇 zhicheng wei
  • 3 篇 yang shusen
  • 3 篇 wei zhicheng
  • 3 篇 he along
  • 2 篇 hua fu
  • 2 篇 yang fei
  • 2 篇 wang yubo
  • 2 篇 jia chengyou
  • 2 篇 dai guang
  • 2 篇 sun ning
  • 2 篇 zhang chao
  • 2 篇 wang jihong

语言

  • 70 篇 英文
  • 6 篇 其他
  • 3 篇 中文
检索条件"机构=Data and Network Security Lab"
79 条 记 录,以下是41-50 订阅
排序:
ADFQ-ViT: Activation-Distribution-Friendly Post-Training Quantization for Vision Transformers
arXiv
收藏 引用
arXiv 2024年
作者: Jiang, Yanfeng Sun, Ning Xie, Xueshuo Yang, Fei Li, Tao College of Computer Science Nankai University Tianjin China Tianjin Key Laboratory of Network and Data Security Technology Tianjin China Zhejiang Lab Zhejiang Hangzhou China Haihe Lab of ITAI Tianjin China
Vision Transformers (ViTs) have exhibited exceptional performance across diverse computer vision tasks, while their substantial parameter size incurs significantly increased memory and computational demands, impeding ... 详细信息
来源: 评论
Taxi Station Location Model Based on Spatio-Temporal Demand Cube
Taxi Station Location Model Based on Spatio-Temporal Demand ...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: LuLu Gao XiaoNan Li ZhiCheng Wei Key Lab of Network and Information Security Shijiazhuang Hebei Province China College of Computer and Cyber Security Shijiazhuang Hebei Province China Hebei Provincial Engineering Research Center for Supply Chain Big Data Analytics & Security Hebei Normal University Shijiazhuang Hebei Province China
With the widespread use of mobile apps, empty taxis can easily receive new orders without having to roam around. Therefore, it is necessary to plan taxi stations where empty taxis can park. In the location selection p...
来源: 评论
Adfq-Vit: Activation-Distribution-Friendly Post-Training Quantization for Vision Transformers
SSRN
收藏 引用
SSRN 2024年
作者: Jiang, Yanfeng Sun, Ning Xie, Xueshuo Yang, Fei Li, Tao College of Computer Science Nankai University Tianjin China Tianjin Key Laboratory of Network and Data Security Technology Tianjin China Zhejiang Lab Zhejiang Hangzhou China Haihe Lab of ITAI Tianjin China
Vision Transformers (ViTs) have exhibited exceptional performance across diverse computer vision tasks, while their substantial parameter size incurs significantly increased memory and computational demands, impeding ... 详细信息
来源: 评论
CustomFair: A Customized Fairness Method for Federated Recommender Systems in Social Internet of Things
收藏 引用
IEEE Internet of Things Journal 2024年
作者: Chen, Guorong Li, Chao Du, Fei Yuan, Xiaohan Chi, Cheng Yin, Zihang Wang, Bin Li, Tao Bao, Xuhua Wang, Wei Beijing Jiaotong University Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing100044 China China Academy of Information and Communications Technology Beijing China Network and Data Security Hangzhou310053 China Nankai University College of Computer Science Tianjin300350 China LTD Sangfor Technologies Co Beijing China Xi'an Jiaotong University Ministry of Education Key Lab for Intelligent Networks and Network Security Xi'an China
In the Social Internet of Things (SIoT), edge computing integrates artificial intelligence to learn intricate relationships. The scale and complexity of SIoT cause a data explosion from diverse objects, hindering tail... 详细信息
来源: 评论
HTtext: A TextCNN-based pre-silicon detection for hardware Trojans
HTtext: A TextCNN-based pre-silicon detection for hardware T...
收藏 引用
IEEE International Conference on Big data and Cloud Computing (BdCloud)
作者: Yi Xu Zhenyi Chen Binhong Huang Ximeng Liu Chen Dong College of Computer and Data Science Fuzhou University Fuzhou China University of South Floride Tampa USA Key Lab of Information Security of Network Systems (Fuzhou University) Fujian Key Laboratory of Network Computing and Intelligent Information Processing (Fuzhou University)
With the advent of the intelligence era, the usage and investment for chips have risen year by year, causing the demand for chip security. Machine learning (ML) analysis has made progress as a pre-silicon hardware Tro... 详细信息
来源: 评论
A Dynamic Demand-driven Smart Manufacturing for Mass Individualization Production
A Dynamic Demand-driven Smart Manufacturing for Mass Individ...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Qiyu Hong Zhenyi Chen Chen Dong Qiancheng Xiong College of Computer and Data Science Fuzhou University Fuzhou China Key Lab of Information Security of Network Systems Fuzhou University Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University University of South Florida Tampa United States
Industry 4.0 intends to realize mass individualization production driven by customers’ demands, thus generating several advanced manufacturing modes. However, the existing modes have disadvantages such as low custome... 详细信息
来源: 评论
Contrastive Multi-view Hyperbolic Hierarchical Clustering
arXiv
收藏 引用
arXiv 2022年
作者: Lin, Fangfei Bai, Bing Bai, Kun Ren, Yazhou Zhao, Peng Xu, Zenglin University of Electronic Science and Technology of China Chengdu China Tencent Security Big Data Lab Tencent Inc. China Harbin Institute of Technology Shenzhen China Department of Network Intelligence Peng Cheng National Lab Shenzhen China
Hierarchical clustering recursively partitions data at an increasingly finer granularity. In real-world applications, multi-view data have become increasingly important. This raises a less investigated problem, i.e., ... 详细信息
来源: 评论
Secure Deduplication Against Frequency Analysis Attacks
Secure Deduplication Against Frequency Analysis Attacks
收藏 引用
International Conference on Mobile Ad-hoc and Sensor networks, MSN
作者: Hang Chen Guanxiong Ha Yuchen Chen Haoyu Ma Chunfu Jia College of Cyber Science Nankai University Tianjin China Tianjin Key Laboratory of Network and Data Security Technology Tianjin China Zhejiang Lab Hangzhou China The School of Cyber Engineering Xidian University Xi’an China
Message-locked Encryption (MLE) is the most common approach used in encrypted deduplication systems. However, the systems based on MLE are vulnerable to frequency analysis attacks, because MLE encrypts the identical p... 详细信息
来源: 评论
Deep Feature Surgery: Towards Accurate and Efficient Multi-Exit networks
arXiv
收藏 引用
arXiv 2024年
作者: Gong, Cheng Chen, Yao Luo, Qiuyang Lu, Ye Li, Tao Zhang, Yuzhi Sun, Yufei Zhang, Le College of Software Nankai University China College of Computer Science Nankai University China National University of Singapore Singapore School of Information and Communication Engineering University of Electronic Science and Technology of China China HAIHE Lab of ITAI China Tianjin Key Laboratory of Network and Data Security Technology China Key Laboratory of Data and Intelligent System Security Ministry of Education
Multi-exit network is a promising architecture for efficient model inference by sharing backbone networks and weights among multiple exits. However, the gradient conflict of the shared weights results in sub-optimal a... 详细信息
来源: 评论
Constructing a Science of Cyber-Resilience for Military Systems
Constructing a Science of Cyber-Resilience for Military Syst...
收藏 引用
2017 NATO IST-153/RWS-21 Workshop on Cyber Resilience, IST-153 2017
作者: Alexeev, Alexander Henshel, Diane S. Levitt, Karl McDaniel, Patrick Rivera, Brian Templeton, Steven Weisman, Mike Data Analysis and Modeling Indiana University School of Public and Environmental Affairs 1315 E 10th Street BlooomingtonIN47405 Indiana University School of Public and Environmental Affairs 1315 E 10th Street BloomingtonIN47405 Computer Science College of Engineering University of California Davis 1 Shields Ave. DavisCA05616 School of Electrical Engineering and Computer Science Pennsylvania State University Information Sciences and Technology Building University ParkPA16802-6823 Network Science Division Tactical Network Assurance Branch U.S. Army Research Laboratory 2800 Powder Mill Road AdelphiMD20783 Computer Security Research Lab Department of Computer Science University of California Davis One Shields Avenue DavisCA95616 Network Science Division Network Security Branch U.S. Army Research Laboratory ICF International 2800 Powder Mill Road AdelphiMD20783
来源: 评论