咨询与建议

限定检索结果

文献类型

  • 11 篇 期刊文献
  • 1 篇 会议

馆藏范围

  • 12 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11 篇 工学
    • 7 篇 计算机科学与技术...
    • 5 篇 软件工程
    • 3 篇 光学工程
    • 2 篇 信息与通信工程
    • 2 篇 轻工技术与工程
    • 2 篇 生物医学工程(可授...
    • 2 篇 网络空间安全
    • 1 篇 冶金工程
    • 1 篇 电气工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 控制科学与工程
    • 1 篇 建筑学
    • 1 篇 土木工程
    • 1 篇 生物工程
  • 4 篇 理学
    • 1 篇 数学
    • 1 篇 物理学
    • 1 篇 生物学
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...

主题

  • 2 篇 convolution
  • 1 篇 reverse influenc...
  • 1 篇 ddos attack
  • 1 篇 lstm
  • 1 篇 computer archite...
  • 1 篇 transformers
  • 1 篇 image segmentati...
  • 1 篇 full space
  • 1 篇 positive influen...
  • 1 篇 multi-layer perc...
  • 1 篇 computed tomogra...
  • 1 篇 vae
  • 1 篇 efficient reflec...
  • 1 篇 computational mo...
  • 1 篇 multi-functional...
  • 1 篇 information deca...
  • 1 篇 broadband transm...
  • 1 篇 generating adver...
  • 1 篇 graph convolutio...
  • 1 篇 feature extracti...

机构

  • 9 篇 heilongjiang key...
  • 7 篇 college of compu...
  • 3 篇 school of comput...
  • 2 篇 1. school of com...
  • 2 篇 advanced microsc...
  • 2 篇 college of teach...
  • 2 篇 communication an...
  • 1 篇 innovation photo...
  • 1 篇 leme upl univ. p...
  • 1 篇 key laboratory o...
  • 1 篇 school of medica...
  • 1 篇 leme upl univers...
  • 1 篇 key laboratory o...
  • 1 篇 department of mi...
  • 1 篇 heilongjiang jia...
  • 1 篇 college of infor...

作者

  • 3 篇 haizhen wang
  • 2 篇 zuozheng lian
  • 2 篇 zhang fengshan
  • 2 篇 shuangshuang yan...
  • 2 篇 yang zixin
  • 2 篇 wenlong zhu
  • 2 篇 na jia
  • 2 篇 zhang guangda
  • 2 篇 yu miao
  • 2 篇 xi xiaotian
  • 2 篇 li jingyou
  • 1 篇 chongyuan peng
  • 1 篇 yu xiaokun
  • 1 篇 谢文静
  • 1 篇 rongle wei
  • 1 篇 尚关玉
  • 1 篇 wenjing xie
  • 1 篇 zifeng zhang
  • 1 篇 wei rongle
  • 1 篇 李绪胜

语言

  • 11 篇 英文
  • 1 篇 中文
检索条件"机构=Heilongjiang Key Laboratory of Big Data Network Security Detection and Analysis"
12 条 记 录,以下是1-10 订阅
排序:
Optimizing Indoor network Element Layout for Enhanced Signal Coverage and security in Location-Based Services  7th
Optimizing Indoor Network Element Layout for Enhanced Signa...
收藏 引用
7th International Conference on Attacks and Defenses for Internet-of-Things, ADIoT 2024
作者: Yu, Xiaomin Yu, Xiaokun College of Computer and Control Engineering Qiqihar University Qiqihar China Heilongjiang Key Laboratory of Big Data Network Security Detection and Analysis Qiqihar University Qiqihar China Heilongjiang Jiaotong Polytechnic Qiqihar China
Recently, with the rapid development of communication technology, location-based services (LBS) in indoor environments have penetrated into various aspects of people’s daily lives. Wireless local area networks (WLAN)... 详细信息
来源: 评论
MMEFU-Net: A Mamba-Guided Multi-Encoder Fusion U-Net for Tumor Segmentation in CT Images
收藏 引用
IEEE Access 2025年 13卷 76257-76270页
作者: Renzheng Xue Zifeng Zhang Yaxin Zhao Qing Zhang Minghui Liang School of Computer and Control Engineering Qiqihar University Qiqihar China Heilongjiang Key Laboratory of Big Data Network Security Detection and Analysis Qiqihar University Qiqihar China School of Medical Technology Qiqihar Medical University Qiqihar China
Tumor segmentation is crucial for cancer diagnosis, treatment planning, and surgical interventions. However, traditional manual delineation methods are time-consuming, labor-intensive, and prone to subjective variabil... 详细信息
来源: 评论
Multi-channel transmission meta-holograms enabled by a single-layer complex-amplitude metasurface
收藏 引用
Optics Letters 2025年 第8期50卷 2542-2545页
作者: Zhu, Lei Wang, Yiya Dong, Liang Shang, Guanyu Burokur, Shah Nawaz Ding, Xumin School of Computer and Control Engineering Qiqihar University Qiqihar161006 China Communication and Electronics Engineering Institute Qiqihar University Qiqihar161006 China Key Laboratory of Big Data Network Security Detection and Analysis in Heilongjiang Qiqihar University Qiqihar161006 China Innovation Photonics and Imaging Center Instrumentation Science and Engineering Harbin Institute of Technology Harbin150001 China LEME UPL Univ. Paris Nanterre Ville d'AvrayF92410 France Advanced Microscopy and Instrumentation Research Center Harbin Institute of Technology Harbin150080 China
With an increasing demand for wireless communications, it is difficult for traditional communication technologies to achieve high-quality multi-channel wireless transmissions. Complex-amplitude metasurfaces provide an... 详细信息
来源: 评论
A New Encrypted Traffic Identification Model Based on VAE-LSTM-DRN
收藏 引用
Computers, Materials & Continua 2024年 第1期78卷 569-588页
作者: Haizhen Wang Jinying Yan Na Jia College of Computer and Control Engineering Qiqihar UniversityQiqihar161006China Heilongjiang Key Laboratory of Big Data Network Security Detection and Analysis Qiqihar UniversityQiqiharChina
Encrypted traffic identification pertains to the precise acquisition and categorization of data from traffic datasets containing imbalanced and obscured *** extraction of encrypted traffic attributes and their subsequ... 详细信息
来源: 评论
Recommendation System Based on Perceptron and Graph Convolution network
收藏 引用
Computers, Materials & Continua 2024年 第6期79卷 3939-3954页
作者: Zuozheng Lian Yongchao Yin Haizhen Wang College of Computer and Control Engineering Qiqihar UniversityQiqihar161006China Heilongjiang Key Laboratory of Big Data Network Security Detection and Analysis Qiqihar UniversityQiqihar161006China
The relationship between users and items,which cannot be recovered by traditional techniques,can be extracted by the recommendation algorithm based on the graph convolution *** current simple linear combination of the... 详细信息
来源: 评论
A DDoS Identification Method for Unbalanced data CVWGG
收藏 引用
Computers, Materials & Continua 2024年 第12期81卷 3825-3851页
作者: Haizhen Wang Na Jia Yang He Pan Tan College of Computer and Control Engineering Qiqihar UniversityQiqihar161006China Heilongjiang Key Laboratory of Big Data Network Security Detection and Analysis Qiqihar UniversityQiqihar161006China
As the popularity and dependence on the Internet increase,DDoS(distributed denial of service)attacks seriously threaten network *** accurately distinguishing between different types of DDoS attacks,targeted defense st... 详细信息
来源: 评论
Multi-scale hierarchical cross fusion network for hyperspectral image and LiDAR classification
收藏 引用
Journal of the Franklin Institute 2025年 第9期362卷
作者: Haizhu Pan Xuehu Li Haimiao Ge Liguo Wang Xiaomin Yu College of Computer and Control Engineering Qiqihar University Qiqihar 161000 China Heilongjiang Key Laboratory of Big Data Network Security Detection and Analysis Qiqihar University Qiqihar 161000 China College of Information and Communication Engineering Dalian Nationalities University Dalian 116000 China
As the satellite sensor technology continues to advance, acquiring hyperspectral images (HSI) and Light detection and Ranging (LiDAR) data have become increasingly accessible. Consequently, the fusion of these two typ...
来源: 评论
Maximizing Influence in Temporal Social networks:A Node Feature-Aware Voting Algorithm
收藏 引用
Computers, Materials & Continua 2023年 第12期77卷 3095-3117页
作者: Wenlong Zhu Yu Miao Shuangshuang Yang Zuozheng Lian Lianhe Cui College of Computer and Control Engineering Qiqihar UniversityQiqihar161006China Heilongjiang Key Laboratory of Big Data Network Security Detection and Analysis Qiqihar UniversityQiqihar161006China College of Teacher Education Qiqihar UniversityQiqihar161006China
Influence Maximization(IM)aims to select a seed set of size k in a social network so that information can be spread most widely under a specific information propagation model through this set of ***,most existing stud... 详细信息
来源: 评论
A Positive Influence Maximization Algorithm in Signed Social networks
收藏 引用
Computers, Materials & Continua 2023年 第8期76卷 1977-1994页
作者: Wenlong Zhu Yang Huang Shuangshuang Yang Yu Miao Chongyuan Peng College of Computer and Control Engineering Qiqihar UniversityQiqihar161006China Heilongjiang Key Laboratory of Big Data Network Security Detection and Analysis Qiqihar UniversityQiqihar161006China College of Teacher Education Qiqihar UniversityQiqihar161006China
The influence maximization(IM)problem aims to find a set of seed nodes that maximizes the spread of their influence in a social *** positive influence maximization(PIM)problem is an extension of the IM problem,which c... 详细信息
来源: 评论
Enhanced Vgg16 for Medical Image Zero Watermarking: Integrating Attention, Skip Connections, Depth-Separated Convolution, and Dual-Logistic Encryption
SSRN
收藏 引用
SSRN 2024年
作者: Li, Jingyou Rongle, Wei Xi, Xiaotian Zhang, Guangda Yang, Zixin Zhang, Fengshan 1. School of Computer and Control Engineering Qiqihar University 2. Heilongjiang Key Laboratory of Big Data Network Security Detection and Analysis Qiqihar University
The paper proposes an enhanced VGG16 network((referred to as DS-ResVGG16 with CBAM)) that incorporates the attention mechanism CBAM, skip connections, and depth-separable convolution to solve the medical image content... 详细信息
来源: 评论