咨询与建议

限定检索结果

文献类型

  • 68 篇 期刊文献
  • 30 篇 会议

馆藏范围

  • 98 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 67 篇 工学
    • 47 篇 计算机科学与技术...
    • 43 篇 软件工程
    • 27 篇 电气工程
    • 22 篇 信息与通信工程
    • 12 篇 控制科学与工程
    • 7 篇 生物医学工程(可授...
    • 7 篇 生物工程
    • 6 篇 电子科学与技术(可...
    • 5 篇 光学工程
    • 4 篇 动力工程及工程热...
    • 4 篇 土木工程
    • 3 篇 建筑学
    • 2 篇 机械工程
    • 2 篇 化学工程与技术
  • 32 篇 理学
    • 13 篇 数学
    • 8 篇 生物学
    • 6 篇 物理学
    • 4 篇 系统科学
    • 4 篇 统计学(可授理学、...
    • 2 篇 化学
  • 18 篇 管理学
    • 10 篇 管理科学与工程(可...
    • 7 篇 图书情报与档案管...
    • 6 篇 工商管理
  • 12 篇 医学
    • 10 篇 基础医学(可授医学...
    • 10 篇 临床医学
    • 3 篇 公共卫生与预防医...
    • 3 篇 药学(可授医学、理...
  • 6 篇 法学
    • 4 篇 法学
    • 2 篇 社会学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 军事学

主题

  • 5 篇 semantics
  • 3 篇 signal processin...
  • 3 篇 open source soft...
  • 2 篇 computer science
  • 2 篇 surveys
  • 2 篇 deep learning
  • 2 篇 internet protoco...
  • 2 篇 deep neural netw...
  • 2 篇 speech processin...
  • 2 篇 speech enhanceme...
  • 2 篇 vectors
  • 2 篇 contrastive lear...
  • 2 篇 graph neural net...
  • 2 篇 internet
  • 2 篇 pixels
  • 2 篇 fuses
  • 2 篇 security
  • 2 篇 blockchain
  • 2 篇 protocols
  • 2 篇 correlation

机构

  • 16 篇 engineering rese...
  • 16 篇 school of comput...
  • 10 篇 key laboratory o...
  • 8 篇 shandong provinc...
  • 6 篇 northeastern uni...
  • 6 篇 shandong fundame...
  • 5 篇 ministry of educ...
  • 5 篇 key laboratory o...
  • 4 篇 shaanxi key labo...
  • 4 篇 institute for ne...
  • 4 篇 northeastern uni...
  • 4 篇 school of cyber ...
  • 3 篇 shandong enginee...
  • 3 篇 school of softwa...
  • 3 篇 college of infor...
  • 3 篇 school of inform...
  • 3 篇 national yunlin ...
  • 3 篇 school of comput...
  • 3 篇 science and tech...
  • 2 篇 national mobile ...

作者

  • 12 篇 fu chong
  • 6 篇 wang xingwei
  • 5 篇 sham chiu-wing
  • 5 篇 shen yulong
  • 5 篇 wang guijuan
  • 4 篇 zhang wenchao
  • 4 篇 dong xuewen
  • 4 篇 chen junxin
  • 4 篇 chen jian
  • 3 篇 li xiong
  • 3 篇 tie ming
  • 3 篇 wen yingyou
  • 3 篇 mahmood khalid
  • 3 篇 tian xiang
  • 3 篇 wan zhiguo
  • 3 篇 peng xuena
  • 3 篇 jia jie
  • 3 篇 zhu mai
  • 3 篇 lu di
  • 3 篇 yang lingxiao

语言

  • 85 篇 英文
  • 13 篇 其他
检索条件"机构=Engineering Research Center of Security Technology of Complex Network System"
98 条 记 录,以下是61-70 订阅
排序:
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
International Conference on Software engineering (ICSE)
作者: Zhen Li Ning Wang Deqing Zou Yating Li Ruqian Zhang Shouhuai Xu Chao Zhang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jin YinHu Laboratory Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado Springs Colorado USA Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
Blockchain-Based Identity Authentication Oriented to Multi-Cluster UAV networking
arXiv
收藏 引用
arXiv 2023年
作者: Dong, Zesong Tong, Wei Zhang, Zhiwei Li, Jian Yang, Weidong Shen, Yulong The Hangzhou Institute of Technology Xidian University Hangzhou China The School of Computer Science and Technology Xidian University Xi’an China The Engineering Research Center of Blockchain Technology Application and Evaluation Ministry of Education Xi’an China Shaanxi Key Laboratory of Network and System Security Xi’an China
Unmanned Aerial Vehicle (UAV) networking is increasingly used in field environments such as power inspection, agricultural plant protection, and emergency rescue. To guarantee UAV networking security, UAV identity aut... 详细信息
来源: 评论
$k$k-TEVS: A $ k$k-Times E-Voting Scheme on Blockchain With Supervision
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2024年 第3期22卷 2326-2337页
作者: Yang Liu Debiao He Min Luo Lianhai Wang Cong Peng School of Cyber Science and Engineering Wuhan University Wuhan China Institute of Information Technology Shenzhen Institute of Information Technology Shenzhen China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shanghai Technology Innovation Centre of Distributed Privacy-Preserving Artificial Intelligence Matrix Elements Technologies Shanghai China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
The e-vote is regarded as a way to express the opinion that the voters ask for. Actually, the e-vote could be applied wildly like questionnaire, survey and feedback. Moreover, the coexistences of efficiency and securi... 详细信息
来源: 评论
Emotion Recognition Empowered Human-Computer Interaction with Domain Adaptation network
收藏 引用
IEEE Transactions on Consumer Electronics 2024年
作者: Xu, Xu Fu, Chong Chen, Junxin Northeastern University School of Computer Science and Engineering Shenyang110004 China Dalian University of Technology China The School of Software Dalian116621 China Northeastern University School of Computer Science and Engineering Shenyang110004 China Northeastern University Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Shenyang110819 China Ministry of Education Engineering Research Center of Security Technology of Complex Network System Shenyang110004 China Dalian University of Technology School of Software Dalian116621 China
Multi-modal emotion recognition plays a vital role in the human-computer interaction (HCI) for consumer electronics. Nowadays, many studies have developed multi-modal fusion algorithms for this ***, two challenging is... 详细信息
来源: 评论
An Auto-Parallel Method for Deep Learning Models Based on Genetic Algorithm  29
An Auto-Parallel Method for Deep Learning Models Based on Ge...
收藏 引用
29th IEEE International Conference on Parallel and Distributed systems, ICPADS 2023
作者: Zeng, Yan Huang, Chengchuang Ni, Yijie Zhou, Chunbao Zhang, Jilin Wang, Jue Zhou, Mingyao Xue, Meiting Zhang, Yunquan Hangzhou Dianzi University School of Computer Science and Technology Hangzhou310018 China Ministry of Education Key Laboratory for Modeling and Simulation of Complex Systems Hangzhou310018 China Data Security Governance Zhejiang Engineering Research Center Hangzhou310018 China Hangzhou Dianzi University School of ITMO Joint Institute Hangzhou310018 China Institute of Computer Network Information Center of the Chinese Academy of Sciences Beijing100086 China HuaWei China Institute of Computing Technology of the Chinese Academy of Sciences State Key Laboratory of Computer Architecture Beijing100086 China
As the size of datasets and neural network models increases, automatic parallelization methods for models have become a research hotspot in recent years. The existing auto-parallel methods based on machine learning or... 详细信息
来源: 评论
Global context aware RCNN for object detection
arXiv
收藏 引用
arXiv 2020年
作者: Zhang, Wenchao Fu, Chong Xie, Haoyu Zhu, Mai Tie, Ming Chen, Junxin School of Computer Science and Engineering Northeastern University Shenyang110819 China Engineering Research Center of Security Technology of Complex Network System Ministry of Education China Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Northeastern University Shenyang110819 China Science and Technology on Space Physics Laboratory Beijing100076 China College of Medicine and Biological Information Engineering Northeastern University Shenyang110819 China
RoIPool/RoIAlign is an indispensable process for the typical two-stage object detection algorithm, it is used to rescale the object proposal cropped from the feature pyramid to generate a fixed size feature map. Howev... 详细信息
来源: 评论
Tensor and Minimum Connected Dominating Set based Confident Information Coverage Reliability Evaluation for IoT
IEEE Transactions on Sustainable Computing
收藏 引用
IEEE Transactions on Sustainable Computing 2024年
作者: Xiao, Ziheng Zhu, Chenlu Feng, Wei Liu, Shenghao Deng, Xianjun Lu, Hongwei Yang, Laurence T. Park, Jong Hyuk Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Hubei Wuhan430074 China Artificial Intelligence and Intelligent Transportation Joint Technical Center of HUST and Hubei Chutian Intelligent Transportation Company Ltd United States Network and Industrial Control Information Security Technology Department China Nuclear Power Operation Technology Company Ltd. 1011 Xiongchu Avenue Hubei Wuhan430070 China The Department of Computer Science and Engineering Seoul National University of Science and Technology Seoul01811 Korea Republic of
Internet of Things (IoT) reliability evaluation contributes to the sustainable computing and enhanced stability of the network. Previous algorithms usually evaluate the reliability of IoT by enumenating the states of ... 详细信息
来源: 评论
Robust Imagined Speech Production from Electrocorticography with Adaptive Frequency Enhancement
Robust Imagined Speech Production from Electrocorticography ...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Xu Xu Chong Fu Junxin Chen Gwanggil Jeon David Camacho School of Computer Science and Engineering Northeastern University Shenyang China School of Software Dalian University of Technology Dalian China Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Northeastern University Shenyang China Engineering Research Center of Security Technology of Complex Network System Ministry of Education Shenyang China College of Information Technology Incheon National University Incheon Korea Department of Computer Systems Engineering Universidad Politécnica de Madrid Madrid Spain
Imagined speech production with electrocorticography (ECoG) plays a crucial role in brain-computer interface system. A challenging issue is the great variation underlying the frequency bands of the ECoG signals’ enco... 详细信息
来源: 评论
PrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Man Su, Shuao Wang, Qian Li, Qi Zhou, Yuting Ma, Xiaojing Li, Zhengxiong School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Cyber Science and Engineering Wuhan University China Institute for Network Sciences and Cyberspace Tsinghua University China Department of Computer Science and Engineering University of Colorado Denver United States Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology China
Fingerprint authentication has been extensively employed in contemporary identity verification systems owing to its rapidity and cost-effectiveness. Due to its widespread use, fingerprint leakage may cause sensitive i... 详细信息
来源: 评论
PCG: Mitigating Conflict-based Cache Side-channel Attacks with Prefetching
arXiv
收藏 引用
arXiv 2024年
作者: Jiang, Fang Tong, Fei Wang, Hongyu Cheng, Xiaoyu Zhou, Zhe Ling, Ming Mao, Yuxing The School of Cyber Science and Engineering Southeast University Jiangsu Nanjing China Jiangsu Province Engineering Research Center of Security for Ubiquitous Network China The Purple Mountain Laboratories Jiangsu Nanjing China The State Key Laboratory of Power Transmission Equipment & System Security and New Technology Chongqing University Wiscom System Co. LTD China The School of Integrated Circuits Southeast University Jiangsu Nanjing China
To defend against conflict-based cache side-channel attacks, cache partitioning or remapping techniques were proposed to prevent set conflicts between different security domains or obfuscate the locations of such conf... 详细信息
来源: 评论