咨询与建议

限定检索结果

文献类型

  • 46 篇 期刊文献
  • 32 篇 会议

馆藏范围

  • 78 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 49 篇 工学
    • 39 篇 计算机科学与技术...
    • 36 篇 软件工程
    • 10 篇 信息与通信工程
    • 9 篇 电气工程
    • 7 篇 生物工程
    • 5 篇 机械工程
    • 3 篇 生物医学工程(可授...
    • 2 篇 光学工程
    • 2 篇 化学工程与技术
    • 2 篇 网络空间安全
    • 1 篇 仪器科学与技术
    • 1 篇 动力工程及工程热...
    • 1 篇 电子科学与技术(可...
  • 19 篇 理学
    • 11 篇 数学
    • 8 篇 生物学
    • 6 篇 统计学(可授理学、...
    • 3 篇 物理学
    • 3 篇 化学
    • 1 篇 系统科学
  • 12 篇 管理学
    • 8 篇 管理科学与工程(可...
    • 5 篇 工商管理
    • 5 篇 图书情报与档案管...
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 法学
    • 2 篇 法学
    • 1 篇 社会学
  • 2 篇 医学
    • 2 篇 基础医学(可授医学...
    • 2 篇 临床医学
    • 2 篇 公共卫生与预防医...
  • 2 篇 军事学
    • 2 篇 军队指挥学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 5 篇 deep learning
  • 4 篇 neural networks
  • 3 篇 task analysis
  • 3 篇 genetic algorith...
  • 3 篇 feature extracti...
  • 3 篇 open source soft...
  • 3 篇 training
  • 2 篇 data privacy
  • 2 篇 public key crypt...
  • 2 篇 generative adver...
  • 2 篇 computational ef...
  • 2 篇 statistics
  • 2 篇 fingerprint reco...
  • 2 篇 optimization
  • 2 篇 contrastive lear...
  • 2 篇 semantics
  • 2 篇 accuracy
  • 2 篇 forecasting
  • 2 篇 privacy
  • 2 篇 maximum likeliho...

机构

  • 9 篇 tianjin key labo...
  • 7 篇 haihe lab of ita...
  • 7 篇 zhejiang lab
  • 5 篇 college of compu...
  • 5 篇 college of compu...
  • 4 篇 hebei provincial...
  • 4 篇 key lab of netwo...
  • 3 篇 institute for ne...
  • 3 篇 school of comput...
  • 3 篇 school of data a...
  • 3 篇 school of cyber ...
  • 2 篇 college of cyber...
  • 2 篇 school of cyber ...
  • 2 篇 jiujiang key lab...
  • 2 篇 guangdong key la...
  • 2 篇 zhejiang univers...
  • 2 篇 fujian key labor...
  • 2 篇 jin yinhu labora...
  • 2 篇 key lab of infor...
  • 2 篇 faculty of infor...

作者

  • 6 篇 li tao
  • 6 篇 luo minnan
  • 5 篇 zheng qinghua
  • 4 篇 chang xiaojun
  • 4 篇 jalili rasool
  • 3 篇 chen dong
  • 3 篇 ren xuebin
  • 3 篇 zhicheng wei
  • 3 篇 yang shusen
  • 3 篇 wei zhicheng
  • 2 篇 hua fu
  • 2 篇 yang fei
  • 2 篇 wang yubo
  • 2 篇 jia chengyou
  • 2 篇 dai guang
  • 2 篇 sun ning
  • 2 篇 zhang chao
  • 2 篇 wang jihong
  • 2 篇 dousti mohammad ...
  • 2 篇 liu jun

语言

  • 69 篇 英文
  • 6 篇 其他
  • 3 篇 中文
检索条件"机构=Data and Network Security Lab"
78 条 记 录,以下是51-60 订阅
排序:
Semantic and Emotional Dual Channel for Emotion Recognition in Conversation
收藏 引用
IEEE Transactions on Affective Computing 2025年
作者: Yang, Zhenyu Zhang, Zhibo Cheng, Yuhu Zhang, Tong Wang, Xuesong Jinan250353 China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250353 China China University of Mining and Technology Engineering Research Center of Intelligent Control for Underground Space Ministry of Education Xuzhou Key Laboratory of Artificial Intelligence and Big Data School of Information and Control Engineering Xuzhou221116 China South China University of Technology Guangdong Provincial Key Laboratory of Computational Intelligence and Cyberspace Information School of Computer Science and Engineering Guangzhou510006 China Pazhou Lab Guangzhou510335 China Engineering Research Center Ministry of Education on Health Intelligent Perception and Paralleled Digital-Human Guangzhou China
Emotion recognition in conversation (ERC) aims at accurately identifying emotional states expressed in conversational content. Existing ERC methods, although relying on semantic understanding, often encounter challeng... 详细信息
来源: 评论
An enhanced MinHash encryption scheme for encrypted deduplication
An enhanced MinHash encryption scheme for encrypted deduplic...
收藏 引用
IEEE International Conference on Trust, security and Privacy in Computing and Communications (TrustCom)
作者: Qiaowen Jia Guanxiong Ha Hanwei Wang Haoyu Ma Hang Chen State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China College of Cyber Science Nankai University Tianjin China Tianjin Key Laboratory of Network and Data Security Technology Tianjin China Zhejiang Lab Hangzhou China The School of Cyber Engineering Xidian University Xi’an China
The encrypted deduplication can provide both storage savings and data confidentiality for cloud storage systems. Convergent encryption (CE) is a well-known solution for encrypted deduplication, but it brings huge comp... 详细信息
来源: 评论
Noise-Tolerant Learning for Audio-Visual Action Recognition
arXiv
收藏 引用
arXiv 2022年
作者: Han, Haochen Zheng, Qinghua Luo, Minnan Miao, Kaiyao Tian, Feng Chen, Yan The National Engineering Lab for Big Data Analytics Xi’an Jiaotong University Xi’an710049 China The School of Computer Science and Technology Xi’an Jiaotong University Xi’an710049 China The Key Laboratory of Intelligent Networks and Network Security Xi’an Jiaotong University Ministry of Education Xi’an710049 China The School of Cyber Science and Engineering Xi’an Jiaotong University Xi’an710049 China
Recently, video recognition is emerging with the help of multi-modal learning, which focuses on integrating distinct modalities to improve the performance or robustness of the model. Although various multi-modal learn... 详细信息
来源: 评论
Research on Knowledge Distillation of Generative Adversarial networks
Research on Knowledge Distillation of Generative Adversarial...
收藏 引用
data Compression Conference (DCC)
作者: Wei Wang Baohua Zhang Tao Cui Yimeng Chai Yue Li College of Computer Science KLMDASR Trusted AI System Lab Nankai University Tianjin China College of Computer Science Tianjin Key Lab of Network and Data Security Technology Nankai University Tianjin China NCMIS LSEC Academy of Mathematics and Systems Science Chinese Academy of Sciences Beijing China
The compression of Generative Adversarial networks (GANs) has been an emerging study in recent years. However, conventional compression methods can hardly be applied to GANs due to the training process and optimizatio... 详细信息
来源: 评论
Semantics-Guided Contrastive network for Zero-Shot Object Detection
arXiv
收藏 引用
arXiv 2021年
作者: Yan, Caixia Chang, Xiaojun Luo, Minnan Liu, Huan Zhang, Xiaoqin Zheng, Qinghua The Ministry of Education Key Lab of Intelligent Networks and Network Security National Engineering Lab for Big Data Analytics School of Electronic and Information Engineering Xi'an Jiaotong University Shaanxi710049 China The ReLER Lab AAAI Faculty of Engineering and Information Technology University of Technology Sydney Australia The College of Computer Science and Artificial Intelligence Wenzhou University China
Zero-shot object detection (ZSD), the task that extends conventional detection models to detecting objects from unseen categories, has emerged as a new challenge in computer vision. Most existing approaches tackle the... 详细信息
来源: 评论
LDPC Code based Pseudonym Scheme for Vehicular networks
LDPC Code based Pseudonym Scheme for Vehicular Networks
收藏 引用
Space-Air-Ground Computing (SAGC), International Conference on
作者: Jin Zhou Changsong Zheng Yuedi Li Hua Xu Zhiguang Qin Dajiang Chen Network and Data Security Key Lab of Sichuan Province UESTC Chengdu China Public Security Bureau of Sichuan Chengdu China School of Physics and Electronic Engineering Yancheng Teachers University Yancheng China
In this paper, an innovative pseudonym scheme based on Direct Anonymous Attestation (DAA) and Low-Density Parity-Check (LDPC) is proposed. For the sake of improving the efficiency of generating pseudonyms, the propose... 详细信息
来源: 评论
LTE Device Identification Based on RF Fingerprint with Multi-Channel Convolutional Neural network
LTE Device Identification Based on RF Fingerprint with Multi...
收藏 引用
2021 IEEE Global Communications Conference (GLOBECOM)
作者: Pengcheng Yin Linning Peng Junqing Zhang Ming Liu Hua Fu Aiqun Hu School of Cyber Science and Engineering Southeast University Nanjing China Purple Mountain Laboratories for Network and Communication Security Nanjing China University of Liverpool Liverpool United Kingdom Beijing Key Lab of Transportation Data Analysis and Mining Beijing Jiaotong University Beijing China School of Information Science and Engineering Southeast University Nanjing China
Radio frequency fingerprint (RFF) identification technique has drawn great attention to wireless terminal authentication. Long-Term Evolution (LTE) has been widely deployed all over the world. RFF-based LTE terminal i... 详细信息
来源: 评论
VFGCN: A Vertical Federated Learning Framework With Privacy Preserving for Graph Convolutional network
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Wang, Gang Li, Qingming Liu, Ximeng Yan, Xiaoran Dong, Qingkuan Wu, Huiwen Kong, Xiangjie Zhou, Li Zhejiang Lab HangZhou310000 China Zhejiang University College of Computer Science and Technology Hangzhou310058 China Fuzhou University Key Laboratory of Information Security of Network Systems College of Computer and Big Data Fuzhou350108 China Xidian University State Key Laboratory of Integrated Services Networks Xi'an710071 China Zhejiang University of Technology College of Computer Science and Technology Hangzhou310023 China Dalian University of Technology School of Software Dalian116620 China
Due to the robust representational capabilities of graph data, employing graph neural networks for its processing has demonstrated superior performance over conventional deep learning algorithms. Graph data encompasse... 详细信息
来源: 评论
Shattered chain of trust: understanding security risks in cross-cloud IoT access delegation  20
Shattered chain of trust: understanding security risks in cr...
收藏 引用
Proceedings of the 29th USENIX Conference on security Symposium
作者: Bin Yuan Yan Jia Luyi Xing Dongfang Zhao XiaoFeng Wang Deqing Zou Hai Jin Yuqing Zhang School of Cyber Science and Engineering Huazhong Univ. of Sci. & Tech. China and National Engineering Research Center for Big Data Technology and System Cluster and Grid Computing Lab Services Computing Technology and System Lab and Big Data Security Engineering Research Center and Indiana University Bloomington and Shenzhen Huazhong University of Science and Technology Research Institute China School of Cyber Engineering Xidian University China and National Computer Network Intrusion Protection Center University of Chinese Academy of Sciences China and Indiana University Bloomington Indiana University Bloomington School of Cyber Science and Engineering Huazhong Univ. of Sci. & Tech. China and National Engineering Research Center for Big Data Technology and System Cluster and Grid Computing Lab Services Computing Technology and System Lab and Big Data Security Engineering Research Center School of Computer Science and Technology Huazhong Univ. of Sci. & Tech. China and National Engineering Research Center for Big Data Technology and System Cluster and Grid Computing Lab Services Computing Technology and System Lab and Big Data Security Engineering Research Center Huazhong Univ. of Sci. & Tech. China National Computer Network Intrusion Protection Center University of Chinese Academy of Sciences China and School of Cyber Engineering Xidian University China
IoT clouds facilitate the communication between IoT devices and users, and authorize users' access to their devices. In this paradigm, an IoT device is usually managed under a particular IoT cloud designated by th...
来源: 评论
XTQA: Span-Level Explanations for Textbook Question Answering
arXiv
收藏 引用
arXiv 2020年
作者: Ma, Jie Chai, Qi Liu, Jun Yin, Qingyu Wang, Pinghui Zheng, Qinghua Ministry of Education of Key Lab for Intelligent Networks and Network Security School of Cyber Science and Engineering Xi’an Jiaotong University Shaanxi Xi’an710049 China Shaanxi Provincial Key Laboratory of Big Data Knowledge Engineering The School of Computer Science and Technology Xi’an Jiaotong University Shaanxi Xi’an710049 China Amazon United States
Textbook Question Answering (TQA) is the task of correctly answering diagram or non-diagram questions given large multi-modal contexts consisting of abundant essays and diagrams. In real-world scenarios, an explainabl... 详细信息
来源: 评论