咨询与建议

限定检索结果

文献类型

  • 18 篇 会议
  • 12 篇 期刊文献

馆藏范围

  • 30 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 23 篇 工学
    • 18 篇 计算机科学与技术...
    • 14 篇 软件工程
    • 6 篇 电气工程
    • 4 篇 电子科学与技术(可...
    • 3 篇 信息与通信工程
    • 2 篇 控制科学与工程
    • 2 篇 建筑学
    • 2 篇 生物工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 航空宇航科学与技...
    • 1 篇 城乡规划学
    • 1 篇 网络空间安全
  • 8 篇 管理学
    • 6 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
    • 2 篇 工商管理
    • 1 篇 公共管理
  • 7 篇 理学
    • 4 篇 数学
    • 3 篇 生物学
    • 1 篇 物理学
    • 1 篇 系统科学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 法学
    • 1 篇 法学

主题

  • 3 篇 authentication
  • 3 篇 protocols
  • 3 篇 open source soft...
  • 2 篇 deep learning
  • 2 篇 grid computing
  • 2 篇 costs
  • 2 篇 distributed comp...
  • 2 篇 federated learni...
  • 2 篇 blockchains
  • 2 篇 privacy
  • 1 篇 contribution eva...
  • 1 篇 computer science
  • 1 篇 surveys
  • 1 篇 file systems
  • 1 篇 parallel process...
  • 1 篇 learning systems
  • 1 篇 access control
  • 1 篇 antenna arrays
  • 1 篇 超级染色体
  • 1 篇 random forest

机构

  • 3 篇 institute for ne...
  • 3 篇 school of comput...
  • 3 篇 school of cyber ...
  • 2 篇 distributed comp...
  • 2 篇 jin yinhu labora...
  • 2 篇 national enginee...
  • 2 篇 key laboratory o...
  • 1 篇 university of sc...
  • 1 篇 key laboratory o...
  • 1 篇 jinan key labora...
  • 1 篇 key laboratory o...
  • 1 篇 school of inform...
  • 1 篇 school of big da...
  • 1 篇 computer systems...
  • 1 篇 qilu university ...
  • 1 篇 systems research...
  • 1 篇 china unicom net...
  • 1 篇 tsinghua univers...
  • 1 篇 shandong provinc...
  • 1 篇 school of comput...

作者

  • 2 篇 yang bo
  • 2 篇 zhang chao
  • 2 篇 li zhen
  • 2 篇 xu shouhuai
  • 2 篇 zou deqing
  • 2 篇 li yating
  • 2 篇 huang lican
  • 2 篇 zhang ruqian
  • 2 篇 wang lin
  • 2 篇 jin hai
  • 2 篇 wang ning
  • 1 篇 qin zhijin
  • 1 篇 孙毅
  • 1 篇 niyato dusit
  • 1 篇 ryu-seok bae
  • 1 篇 qin xiaoqi
  • 1 篇 wang lei
  • 1 篇 huang hai
  • 1 篇 bai wang
  • 1 篇 tao yu

语言

  • 25 篇 英文
  • 3 篇 中文
  • 2 篇 其他
检索条件"机构=Institute of Network and Distributed Computing"
30 条 记 录,以下是21-30 订阅
排序:
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities  24
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
44th ACM/IEEE International Conference on Software Engineering, ICSE 2024
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hong Kong Jin YinHu Laboratory Wuhan China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China University of Colorado Colorado Springs Department of Computer Science Colorado Springs Colorado United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
Modulation Recognition based on Incremental Deep Learning
Modulation Recognition based on Incremental Deep Learning
收藏 引用
International Conference on Mechanical, Control and Computer Engineering (ICMCCE)
作者: Yong Yang Menghan Chen XiaoYa Wang Piming Ma The 54th Research Institute of CETC Shijiazhuang China School of Information Science and Engineering Shandong University Qingdao China School of Information and Communication Engineering National Engineering Laboratory for Mobile Network Security Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications line Beijing China
Incremental learning has emerged to solve the problem of incrementally updating the classification model as the number of data classes grows. There are many challenges in incremental learning such as catastrophic forg... 详细信息
来源: 评论
$k$k-TEVS: A $ k$k-Times E-Voting Scheme on Blockchain With Supervision
收藏 引用
IEEE Transactions on Dependable and Secure computing 2024年 第3期22卷 2326-2337页
作者: Yang Liu Debiao He Min Luo Lianhai Wang Cong Peng School of Cyber Science and Engineering Wuhan University Wuhan China Institute of Information Technology Shenzhen Institute of Information Technology Shenzhen China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shanghai Technology Innovation Centre of Distributed Privacy-Preserving Artificial Intelligence Matrix Elements Technologies Shanghai China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
The e-vote is regarded as a way to express the opinion that the voters ask for. Actually, the e-vote could be applied wildly like questionnaire, survey and feedback. Moreover, the coexistences of efficiency and securi... 详细信息
来源: 评论
An Event-Driven Service-Oriented Architecture for the Internet of Things
An Event-Driven Service-Oriented Architecture for the Intern...
收藏 引用
IEEE Asia-Pacific Conference on Services computing (APSCC)
作者: Lina Lan Fei Li Bai Wang Lei Zhang Ruisheng Shi School of Network Education Beijing University of Posts and Telecommunications Beijing China Information Systems Institute Vienna University of Technology Vienna Austria Beijing University of Posts and Telecommunications Beijing Beijing CN School of Computer Beijing University of Posts and Telecommunications Beijing China Education Ministry Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Beijing China
IoT (Internet of Things) bridges the physical world and information space. IoT services are environment sensitive and event-driven. The new IoT service architecture should adapt to these features. This paper analyses ... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Zhen Li Ning Wang Deqing Zou Yating Li Ruqian Zhang Shouhuai Xu Chao Zhang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jin YinHu Laboratory Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado Springs Colorado USA Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
arXiv
收藏 引用
arXiv 2024年
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado SpringsCO United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab China JinYinHu Laboratory Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
Intellicise Wireless networks From Semantic Communications: A Survey, Research Issues, and Challenges
收藏 引用
IEEE Communications Surveys and Tutorials 2024年 1-1页
作者: Zhang, Ping Xu, Wenjun Liu, Yiming Qin, Xiaoqi Niu, Kai Cui, Shuguang Shi, Guangming Qin, Zhijin Xu, Xiaodong Wang, Fengyu Meng, Yue Dong, Chen Dai, Jincheng Yang, Qianqian Sun, Yaping Gao, Dahua Gao, Hui Han, Shujun Song, Xiaodan State Key Laboratory of Network and Switching Technology Beijing University of Posts and Telecommunications Beijing China Shenzhen China Peng Cheng Laboratory Shenzhen China Department of Electronic Engineering Tsinghua University Beijing China School of Artificial Intelligence Beijing University of Posts and Telecommunications Beijing China Ministry of Education Key Laboratory of Universal Wireless Communications Beijing University of Posts and Telecommunications Beijing China College of Information Science and Electronic Engineering Zhejiang University Hangzhou China School of Artificial Intelligence Xidian University Xi’an China Ministry of Education Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Beijing China Guangzhou Institute of Technology Xidian University Guangzhou China
Information and communication technology (ICT) has been an essential part of modern society. However, the current communication systems are not sufficient to meet the demands of emerging applications. Intellicise (int... 详细信息
来源: 评论
Blockchain-based Intelligent Hospital Security and Data Privacy Construction
收藏 引用
Journal of Physics: Conference Series 2019年 第5期1187卷
作者: Qiuzi Huang Shuyu Chen Hui Zhao Junhao Wen Network Distributed Computing Laboratory Big Data and Software Institute Huxi Campus of Chongqing University Chongqing China Huxi Campus of Chongqing University no. 55 Chengnan Road Shapingba District Chongqing China Chongqing University 174 Shazheng Street Shapingba District Chongqing China Service Computing Laboratory Big Data and Software Institute Huxi Campus of Chongqing University Chongqing China
With the rapid development of medical information services, the construction of intelligent hospitals is opening up a new mode of medical treatment in the health care industry. Medical data is gradually becoming more ...
来源: 评论
A Distance Similarity-based Genetic Optimization Algorithm for Satellite Ground network Planning Considering Feeding Mode
arXiv
收藏 引用
arXiv 2024年
作者: Ren, Yingying Li, Qiuli Guo, Yangyang Pedrycz, Witold Xing, Lining Liu, Anfeng Song, Yanjie School of Computer Electronics and Information Guangxi University Nanning China Guangxi Key Laboratory of Multimedia Communications and Network Technology China Key Laboratory of Parallel Distributed and Intelligent Computing Guangxi University China School of Systems Science Beijing Jiaotong University Beijing China Department of Electrical and Computer Engineering University of Alberta Edmonton Canada Systems Research Institute Polish Academy of Sciences Poland Faculty of Engineering and Natural Sciences Department of Computer Engineering Sariyer Istanbul Turkey School of Electronic Engineering Xidian University Xian China School of Electronic Engineering Central South University Changsha China National Engineering Research Center of Maritime Navigation System Dalian Maritime University Dalian China
With the rapid development of the satellite industry, the information transmission network based on communication satellites has gradually become a major and important part of the future satellite ground integration n... 详细信息
来源: 评论
M-MEP:基于多层染色体多基因表达式编程的遗传进化算法
M-MEP:基于多层染色体多基因表达式编程的遗传进化算法
收藏 引用
2012全国高性能计算学术年会
作者: ZHANG Qing-Ke 张庆科 Yang Bo 杨波 Wang Lin 王琳 Zhu Fu-Xiang 朱福祥 Shandong Provincial Key Laboratory of Network Based Intelligent Computing University of JinanJinan 济南大学 山东省网络环境智能计算技术重点实验室 中国 济南 250022 Computer Networks and distributed Systems Laboratory Beijing institute of technologyBeijing100081 北京理工大学 计算机学院 网络与分布式计算研究所 中国 北京 10081
本文提出了一种新的基于多层多基因表达式编程的进化算法M-MEP.本算法引入了多层超级染色体概念并采用多层染色体模型对个体进行并行表达,算法在解决函数发现和预测问题中取得了良好的效果.本文的主要贡献:(1)提出了基于多层染色体的... 详细信息
来源: 评论