咨询与建议

限定检索结果

文献类型

  • 2,397 篇 会议
  • 1,617 篇 期刊文献
  • 23 册 图书

馆藏范围

  • 4,037 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,396 篇 工学
    • 1,547 篇 计算机科学与技术...
    • 1,215 篇 软件工程
    • 606 篇 信息与通信工程
    • 310 篇 电子科学与技术(可...
    • 276 篇 电气工程
    • 270 篇 控制科学与工程
    • 229 篇 生物工程
    • 169 篇 光学工程
    • 154 篇 生物医学工程(可授...
    • 151 篇 机械工程
    • 111 篇 仪器科学与技术
    • 107 篇 化学工程与技术
    • 93 篇 网络空间安全
    • 83 篇 安全科学与工程
    • 81 篇 动力工程及工程热...
    • 81 篇 核科学与技术
    • 80 篇 材料科学与工程(可...
  • 1,286 篇 理学
    • 554 篇 数学
    • 461 篇 物理学
    • 262 篇 生物学
    • 187 篇 统计学(可授理学、...
    • 129 篇 系统科学
    • 116 篇 化学
  • 595 篇 管理学
    • 372 篇 管理科学与工程(可...
    • 237 篇 图书情报与档案管...
    • 154 篇 工商管理
  • 154 篇 医学
    • 129 篇 临床医学
    • 108 篇 基础医学(可授医学...
  • 88 篇 法学
    • 62 篇 社会学
  • 72 篇 教育学
    • 70 篇 教育学
  • 60 篇 经济学
  • 34 篇 农学
  • 15 篇 文学
  • 15 篇 军事学
  • 4 篇 艺术学

主题

  • 106 篇 hadron colliders
  • 86 篇 computer network...
  • 77 篇 computational mo...
  • 73 篇 computer science
  • 72 篇 feature extracti...
  • 72 篇 protocols
  • 66 篇 semantics
  • 65 篇 training
  • 64 篇 bandwidth
  • 57 篇 computer archite...
  • 56 篇 throughput
  • 56 篇 machine learning
  • 56 篇 accuracy
  • 53 篇 deep learning
  • 53 篇 security
  • 52 篇 optimization
  • 51 篇 routing
  • 51 篇 wireless communi...
  • 49 篇 quality of servi...
  • 47 篇 internet

机构

  • 150 篇 centro brasileir...
  • 149 篇 national and kap...
  • 149 篇 istanbul technic...
  • 148 篇 university of sp...
  • 148 篇 yerevan physics ...
  • 147 篇 universidad iber...
  • 146 篇 academy of scien...
  • 145 篇 brunel universit...
  • 145 篇 indian institute...
  • 145 篇 charles universi...
  • 145 篇 institute of inf...
  • 140 篇 university of de...
  • 139 篇 rwth aachen univ...
  • 139 篇 department of ph...
  • 138 篇 università di to...
  • 138 篇 imperial college...
  • 135 篇 infn sezione di ...
  • 133 篇 zhejiang univers...
  • 131 篇 department of ph...
  • 130 篇 indian institute...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 111 篇 e. migliore
  • 111 篇 p. avery
  • 111 篇 l. silvestris

语言

  • 3,797 篇 英文
  • 171 篇 其他
  • 69 篇 中文
  • 2 篇 日文
  • 1 篇 德文
检索条件"机构=Institute of Computer Network and Engineering"
4037 条 记 录,以下是131-140 订阅
排序:
Parameter Disparities Dissection for Backdoor Defense in Heterogeneous Federated Learning  38
Parameter Disparities Dissection for Backdoor Defense in Het...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Huang, Wenke Ye, Mang Shi, Zekun Wan, Guancheng Li, He Du, Bo National Engineering Research Center for Multimedia Software Institute of Artificial Intelligence Hubei Key Laboratory of Multimedia and Network Communication Engineering School of Computer Science Wuhan University Wuhan China Taikang Center for Life and Medical Sciences Wuhan University Wuhan China
Backdoor attacks pose a serious threat to federated systems, where malicious clients optimize on the triggered distribution to mislead the global model towards a predefined target. Existing backdoor defense methods ty...
来源: 评论
Zenith: Real-time Identification of DASH Encrypted Video Traffic with Distortion  24
Zenith: Real-time Identification of DASH Encrypted Video Tra...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Tang, Weitao Li, Jianqiang Du, Meijie Hu, Die Liu, Qingyun Institute of Information Engineering Chinese Academy of Sciences School of Cyber Security University of Chinese Academy of Sciences Beijing China National Computer Network Emergency Response Technical Team/Coordination Center of China Beijing China
Some video traffic carries harmful content, such as hate speech and child abuse, primarily encrypted and transmitted through Dynamic Adaptive Streaming over HTTP (DASH). Promptly identifying and intercepting traffic o... 详细信息
来源: 评论
FedSSP: Federated Graph Learning with Spectral Knowledge and Personalized Preference  38
FedSSP: Federated Graph Learning with Spectral Knowledge and...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Tan, Zihan Wan, Guancheng Huang, Wenke Ye, Mang National Engineering Research Center for Multimedia Software Institute of Artificial Intelligence Hubei Key Laboratory of Multimedia and Network Communication Engineering School of Computer Science Wuhan University Wuhan China Taikang Center for Life and Medical Sciences Wuhan University Wuhan China
Personalized Federated Graph Learning (pFGL) facilitates the decentralized training of Graph Neural networks (GNNs) without compromising privacy while accommodating personalized requirements for non-IID participants. ...
来源: 评论
Brain Tumor Detection Using Image Processing  5
Brain Tumor Detection Using Image Processing
收藏 引用
5th International Conference on Advancements in Computing, ICAC 2023
作者: Wijerathna, Udari Dissanayake, Nimavi Nimasha, Dinithi Senarathne, Udara Weerasinghe, Lokeesha Kahandawaarachchi, Chathurangika Sri Lanka Institute of Information Technology Faculty of Computing Dept of Computer System Engineering Malabe Sri Lanka Sri Lanka Institute of Information Technology Faculty of Computing Dept of Information Technology Malabe Sri Lanka Sri Lanka Institute of Information Technology Faculty of Computing Dept of Computer System Network Engineering Malabe Sri Lanka
Abnormal formation of cells in a layer. The brain is known as the brain cancer complex, and a brain cancer detection system is needed to detect cancer in its early stages Phase. As a result, the primary goal of this i... 详细信息
来源: 评论
Malware Variant Detection Based on Knowledge Transfer and Ensemble Learning  6th
Malware Variant Detection Based on Knowledge Transfer and ...
收藏 引用
6th International Conference on Science of Cyber Security, SciSec 2024
作者: Ding, Yu Sun, Haoliang Li, Binbin Qi, Zisen Jia, Siyu Wang, Haiping Tan, XingBang Institute of Information Engineering Chinese Academy of Sciences Beijing China National Computer Network Emergency Response Technical Team/Coordination Center of China Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China
In the realm of cybersecurity, malware adopts various evasion tactics, such as obfuscation and code rewriting, to evade detection by network security protection systems, perpetually evolving in sophistication. This pr... 详细信息
来源: 评论
Automatic Alert Categories Standardization for Heterogeneous Devices with Incomplete Semantic Knowledge Based on LSTM  6th
Automatic Alert Categories Standardization for Heterogeneou...
收藏 引用
6th International Conference on Science of Cyber Security, SciSec 2024
作者: Wang, Haiping Li, Jianqiang Li, Binbin Zang, Tianning Yang, Yifei Jia, Siyu Qi, Zisen Ding, Yu Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China National Computer Network Emergency Response Technical Team/Coordination Center of China Beijing China
In the realm of cybersecurity situational awareness, systems compile alert logs from diverse network monitors. These logs exhibit large-scale dimensions, numerous alert types, and autonomous alert categories. Ensuring... 详细信息
来源: 评论
Sorted Consecutive Occurrence Queries in Substrings
arXiv
收藏 引用
arXiv 2024年
作者: Akram, Waseem Mieno, Takuya Department of Computer Science and Engineering Indian Institute of Technology Kanpur India Department of Computer and Network Engineering University of Electro-Communications Chofu Japan
The string indexing problem is a fundamental computational problem with numerous applications, including information retrieval and bioinformatics. It aims to efficiently solve the pattern matching problem: given a tex... 详细信息
来源: 评论
Using GPT and authentic contextual recognition to generate math word problems with difficulty levels
收藏 引用
Education and Information Technologies 2024年 第13期29卷 1-29页
作者: Hwang, Wu-Yuin Utami, Ika Qutsiati Graduate Institute of Network Learning Technology National Central University Taoyuan 320317 Taiwan Department of Computer Science and Information Engineering National Dong Hwa University Hualien 974301 Taiwan Data Science Technology Engineering Department Faculty of Advanced Technology and Multidiscipline Universitas Airlangga Surabaya 60115 Indonesia
Automatic generation of math word problems (MWPs) is a challenging task in Natural Language Processing (NLP), particularly connecting it to real-life problems because it can benefit students in developing a higher lev... 详细信息
来源: 评论
An Efficient IOC-Driven BigData Tracing and Backtracking Model for Emergency Response  6th
An Efficient IOC-Driven BigData Tracing and Backtracking Mo...
收藏 引用
6th International Conference on Science of Cyber Security, SciSec 2024
作者: Wang, Haiping Li, Jianqiang Li, Binbin Zang, Tianning Qi, Zisen Jia, Siyu Ding, Yu Yang, Yifei Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China National Computer Network Emergency Response Technical Team/Coordination Center of China Beijing China
In the realm of intelligence-driven emergency response, utilizing Indicators of Compromise (IOCs) like IP addresses and domain names is crucial for the swift analysis of and response to cyber-attacks within vast netwo... 详细信息
来源: 评论
A Theory of Transfer-Based Black-Box Attacks: Explanation and Implications  37
A Theory of Transfer-Based Black-Box Attacks: Explanation an...
收藏 引用
37th Conference on Neural Information Processing Systems, NeurIPS 2023
作者: Chen, Yanbo Liu, Weiwei School of Computer Science Wuhan University National Engineering Research Center for Multimedia Software Wuhan University Institute of Artificial Intelligence Wuhan University Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University
Transfer-based attacks [1] are a practical method of black-box adversarial attacks in which the attacker aims to craft adversarial examples from a source model that is transferable to the target model. Many empirical ...
来源: 评论