咨询与建议

限定检索结果

文献类型

  • 7 篇 期刊文献
  • 2 篇 会议

馆藏范围

  • 9 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8 篇 工学
    • 5 篇 计算机科学与技术...
    • 5 篇 软件工程
    • 3 篇 仪器科学与技术
    • 2 篇 机械工程
    • 2 篇 信息与通信工程
    • 2 篇 控制科学与工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 动力工程及工程热...
    • 1 篇 电气工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 环境科学与工程(可...
    • 1 篇 生物医学工程(可授...
  • 1 篇 理学
    • 1 篇 系统科学
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 临床医学
    • 1 篇 药学(可授医学、理...
  • 1 篇 艺术学
    • 1 篇 设计学(可授艺术学...

主题

  • 2 篇 internet of thin...
  • 1 篇 urban areas
  • 1 篇 object detection
  • 1 篇 neurons
  • 1 篇 predictive model...
  • 1 篇 websites
  • 1 篇 biological-drive...
  • 1 篇 human-robot inte...
  • 1 篇 human-robot rela...
  • 1 篇 analytical model...
  • 1 篇 hardware securit...
  • 1 篇 robot's living s...
  • 1 篇 hybrid intellige...
  • 1 篇 federated learni...
  • 1 篇 artificial intel...
  • 1 篇 backpropagation
  • 1 篇 robot humanizati...
  • 1 篇 data models
  • 1 篇 wireless body ar...
  • 1 篇 solid modeling

机构

  • 3 篇 cyberspace secur...
  • 2 篇 beijing engineer...
  • 1 篇 university of sc...
  • 1 篇 school of mathem...
  • 1 篇 school of cybers...
  • 1 篇 college of compu...
  • 1 篇 anhui university...
  • 1 篇 the college of c...
  • 1 篇 queensland unive...
  • 1 篇 faculty of infor...
  • 1 篇 anhui provincial...
  • 1 篇 key lab of infor...
  • 1 篇 school of cybers...
  • 1 篇 school of comput...
  • 1 篇 school of mechan...
  • 1 篇 beijing engineer...
  • 1 篇 the college of c...
  • 1 篇 guangxi key labo...
  • 1 篇 nanyang technolo...
  • 1 篇 school of comput...

作者

  • 2 篇 zhao wei
  • 2 篇 huansheng ning
  • 1 篇 niyato dusit
  • 1 篇 zhang tao
  • 1 篇 xiaofeng cai
  • 1 篇 yashen wang
  • 1 篇 xiaoling zhu
  • 1 篇 xiang chaocan
  • 1 篇 tian yu-chu
  • 1 篇 wang fangyan
  • 1 篇 fadi farha
  • 1 篇 xu minrui
  • 1 篇 huang lin
  • 1 篇 sahraoui dhelim
  • 1 篇 yue guowen
  • 1 篇 zhou pengyuan
  • 1 篇 xingwei wang
  • 1 篇 wang yujue
  • 1 篇 ding yong
  • 1 篇 liao yong

语言

  • 8 篇 英文
  • 1 篇 其他
检索条件"机构=Hunan Engineering Research Center of Cyberspace Security Technology and Applications"
9 条 记 录,以下是1-10 订阅
排序:
Artificial intelligence in physiological characteristics recognition for internet of things authentication
收藏 引用
Digital Communications and Networks 2024年 第3期10卷 740-755页
作者: Zhimin Zhang Huansheng Ning Fadi Farha Jianguo Ding Kim-Kwang Raymond Choo School of Computer and Communication Engineering University of Science and Technology BeijingBeijing100083China Beijing Engineering Research Center for Cyberspace Data Analysis and Applications Beijing100083China Faculty of Informatics Engineering Aleppo UniversityAleppoSyria Department of Computer Science Blekinge Institute of Technology37179KarlskronaSweden Department of Information Systems and Cyber Security University of Texas at San AntonioSan AntonioTX78249-0631USA
Effective user authentication is key to ensuring equipment security,data privacy,and personalized services in Internet of Things(IoT)***,conventional mode-based authentication methods(e.g.,passwords and smart cards)ma... 详细信息
来源: 评论
How Secure is Your Website? A Comprehensive Investigation on CAPTCHA Providers and Solving Services
arXiv
收藏 引用
arXiv 2023年
作者: Jin, Rui Huang, Lin Duan, Jikang Zhao, Wei Liao, Yong Zhou, Pengyuan University of Science and Technology of China China Research Center for Data to Cyberspace China Anhui Engineering Research Center for Intelligent Applications and Security of Industrial Internet China Anhui University of Technology China
Completely Automated Public Turing Test To Tell Computers and Humans Apart (CAPTCHA) has been implemented on many websites to identify between harmful automated bots and legitimate users. However, the revenue generate... 详细信息
来源: 评论
A PUF-Based and Cloud-Assisted Lightweight Authentication for Multi-Hop Body Area Network
收藏 引用
Tsinghua Science and technology 2021年 第1期26卷 36-47页
作者: Wang Xiao Tan Jiliang Zhang Yuanjing Zhang Zheng Qin Yong Ding Xingwei Wang the College of Computer Science and Electronic Engineering Hunan UniversityChangsha 410082China Cyberspace Security Research Center Peng Cheng LaboratoryShenzhen 518000China Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic TechnologyGuilin 541004China the College of Computer Science and Engineering Northeastern UniversityShenyang 110004China
Wireless sensor technology plays an important role in the military,medical,and commercial fields *** Body Area Network(WBAN)is a special application of the wireless sensor network in human health monitoring,through wh... 详细信息
来源: 评论
Robot and its living space:A roadmap for robot development based on the view of living space
收藏 引用
Digital Communications and Networks 2021年 第4期7卷 505-517页
作者: Xiaofeng Cai Huansheng Ning Sahraoui Dhelim Rongjuan Zhou Tao Zhang Yang Xu Yueliang Wan School of Computer and Communication Engineering University of Science and Technology Beijing Beijing 100083China Beijing Engineering Research Center for Cyberspace Data Analysis and Applications Beijing 100083China School of Foreign Studies University of Science and Technology Beijing Beijing 100083China Key Lab of Information Network Security Ministry of Public SecurityChina Run Technologies Co. LidBeijing China
Robot’s living space Human-robot relationship Robot humanization Hybrid intelligence Human-robot integrated society Robots,as the creation of humans,became an irreplaceable component in human *** the advancement of t... 详细信息
来源: 评论
More observation leads to more clarity: Multi-view collaboration network for camouflaged object detection
收藏 引用
Neurocomputing 2025年 645卷
作者: Wang, Fangyan Jiao, Ge Yue, Guowen College of Computer Science and Technology Hengyang Normal University Hengyang Hunan421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang Normal University Hengyang Hunan421002 China Hunan Engineering Research Center of Cyberspace Security Technology and Applications Hengyang Normal University Hengyang Hunan421002 China
Currently, Camouflaged Object Detection (COD) methods often rely on single-view feature perception, which struggles to fully capture camouflaged objects due to environmental interference such as background clutter, li... 详细信息
来源: 评论
pFedCal: Lightweight Personalized Federated Learning with Adaptive Calibration Strategy
收藏 引用
IEEE Transactions on Services Computing 2025年
作者: Deng, Dongshang Wu, Xuangou Zhang, Tao Xiang, Chaocan Zhao, Wei Xu, Minrui Kang, Jiawen Han, Zhu Niyato, Dusit Anhui University of Technology School of Computer Science and Technology Anhui Province Key Laboratory of Digital Twin Technology in Metallurgical Industry Anhui Engineering Research Center for Intelligent Applications and Security of Industrial Internet Ma'anshan243002 China Beijing Jiaotong University School of Cyberspace Science and Technology Beijing100044 China Anhui Provincial Key Laboratory of Digital Twin Technology in Metallurgical Industry Anhui243002 China Chongqing University College of Computer Science Chongqing400044 China Nanyang Technological University School of Computer Science and Engineering 639798 Singapore Guangdong University of Technology School of Automation Guangzhou510062 China University of Houston Department of Electrical and Computer Engineering HoustonTX77004 United States Kyung Hee University Department of Computer Science and Engineering Seoul446-701 Korea Republic of
Federated learning (FL) is a promising artificial intelligence framework that enables clients to collectively train models with data privacy. However, in real-world scenarios, to construct practical FL frameworks, sev... 详细信息
来源: 评论
Privacy-Preserving Multi-keyword Search over Outsourced Data for Resource-Constrained Devices  2nd
Privacy-Preserving Multi-keyword Search over Outsourced Data...
收藏 引用
2nd International Conference on Blockchain and Trustworthy Systems, Blocksys 2020
作者: Liu, Lin-Gang Zhao, Meng Ding, Yong Wang, Yujue Deng, Hua Wang, Huiyong Guangxi Key Laboratory of Cryptography and Information Security School of Computer Science and Information Security Guilin University of Electronic Technology Guilin541004 China School of Mechanical and Electrical Engineering Guilin University of Electronic Technology Guilin541004 China College of Computer Science and Electronic Engineering Hunan University Changsha410082 China School of Mathematics and Computing Science Guilin University of Electronic Technology Guilin541004 China Cyberspace Security Research Center Peng Cheng Laboratory Shenzhen518055 China
With the rapid development of cloud computing, a variety of cloud-based applications have been developed. Since cloud computing has the features of high capacity and flexible computing, more and more users are motivat... 详细信息
来源: 评论
Energy-Efficient Virtual Machine Placement in Data centers Via Accelerated Genetic Algorithm with Improved Fitness Computation
SSRN
收藏 引用
SSRN 2021年
作者: Hormozi, Elham Hu, Shuwen Ding, Zhe Tian, Yu-Chu Wang, You-Gan Yu, Zu-Guo Zhang, Weizhe School of Computer Science Queensland University of Technology GPO Box 2434 BrisbaneQLD4001 Australia School of Mathematical Sciences Queensland University of Technology GPO Box 2434 BrisbaneQLD4001 Australia Key Laboratory of Intelligent Computing and Information Processing of Ministry of Education Hunan Key Laboratory for Computation and Simulation in Science and Engineering Xiangtan University Hunan Xiangtan411105 China School of Cyberspace Science Harbin Institute of Technology Harbin China Cyberspace Security Research Center Peng Cheng Laboratory Shenzhen China Queensland University of Technology
Energy efficiency basically refers to how effectively energy can be utilised or consumed by any virtualised data centre giving cloud administrations. Since Genetic Algorithm (GA) is an acceptable method to solve ... 详细信息
来源: 评论
Group Daily Arrival Prediction Based on A Hybrid Model Combing Autoregressive Integrated Moving Average Model and Back Propagation Neural Network
Group Daily Arrival Prediction Based on A Hybrid Model Combi...
收藏 引用
IEEE International Conference on Unmanned Systems (ICUS)
作者: Xiaoling Zhu Xi Zhang Ge Shi Yashen Wang National Engineering Laboratory for Risk Perception and Prevention (RPP) China Academy of Electronics and Information Technology of CETC Beijing China School of Cyberspace Security Beijing University of Posts and Telecommunications Beijing China Beijing Engineering Research Center of High Volume Language Information Processing and Cloud Computing Applications School of Computer Beijing Institute of Technology Beijing China
To solve the problem of predicting daily arrival number of people belonging to a specific group, this paper proposes a hybrid model which integrates linear component (from ARIMA model) with non-linear component (from ... 详细信息
来源: 评论