咨询与建议

限定检索结果

文献类型

  • 254 篇 期刊文献
  • 215 篇 会议
  • 2 册 图书

馆藏范围

  • 471 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 337 篇 工学
    • 247 篇 计算机科学与技术...
    • 188 篇 软件工程
    • 86 篇 信息与通信工程
    • 63 篇 电气工程
    • 39 篇 电子科学与技术(可...
    • 28 篇 生物工程
    • 27 篇 控制科学与工程
    • 27 篇 网络空间安全
    • 23 篇 生物医学工程(可授...
    • 21 篇 机械工程
    • 15 篇 动力工程及工程热...
    • 12 篇 交通运输工程
    • 11 篇 光学工程
    • 11 篇 仪器科学与技术
    • 8 篇 安全科学与工程
    • 6 篇 建筑学
  • 138 篇 理学
    • 79 篇 数学
    • 32 篇 物理学
    • 29 篇 生物学
    • 26 篇 统计学(可授理学、...
    • 19 篇 系统科学
    • 6 篇 化学
  • 65 篇 管理学
    • 38 篇 管理科学与工程(可...
    • 27 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 24 篇 医学
    • 18 篇 临床医学
    • 16 篇 基础医学(可授医学...
    • 13 篇 药学(可授医学、理...
    • 8 篇 公共卫生与预防医...
  • 12 篇 法学
    • 6 篇 社会学
  • 7 篇 军事学
  • 5 篇 经济学
  • 5 篇 农学
  • 4 篇 文学
  • 3 篇 教育学

主题

  • 14 篇 computer network...
  • 12 篇 computer archite...
  • 12 篇 wireless sensor ...
  • 11 篇 computational mo...
  • 11 篇 protocols
  • 11 篇 ip networks
  • 11 篇 cryptography
  • 10 篇 servers
  • 10 篇 feature extracti...
  • 10 篇 security
  • 9 篇 application soft...
  • 9 篇 costs
  • 8 篇 machine learning
  • 8 篇 cloud computing
  • 8 篇 privacy
  • 8 篇 training
  • 7 篇 computer science
  • 7 篇 routing
  • 7 篇 deep learning
  • 7 篇 laboratories

机构

  • 15 篇 key laboratory o...
  • 11 篇 school of comput...
  • 11 篇 department of co...
  • 9 篇 school of comput...
  • 9 篇 school of cyber ...
  • 8 篇 school of cyber ...
  • 7 篇 peng cheng labor...
  • 7 篇 institute of inf...
  • 7 篇 state key labora...
  • 7 篇 key laboratory o...
  • 6 篇 shenzhen key lab...
  • 6 篇 internet and mob...
  • 6 篇 department of co...
  • 6 篇 university of ch...
  • 6 篇 robotics and int...
  • 6 篇 state key labora...
  • 6 篇 national enginee...
  • 6 篇 department of co...
  • 5 篇 information secu...
  • 5 篇 school of comput...

作者

  • 11 篇 eui-nam huh
  • 8 篇 zou juan
  • 8 篇 yang shuang-hua
  • 8 篇 cao xiaochun
  • 8 篇 jiannong cao
  • 7 篇 liu ming
  • 6 篇 mcdaniel patrick
  • 6 篇 ahmad jawad
  • 6 篇 xu qianqian
  • 6 篇 jin hai
  • 6 篇 chen guihai
  • 5 篇 song biao
  • 5 篇 wu yuan
  • 5 篇 yang shengxiang
  • 5 篇 hongxin hu
  • 5 篇 mohammad mehedi ...
  • 5 篇 huh eui-nam
  • 5 篇 yang zhiyong
  • 5 篇 huang qingming
  • 5 篇 guihai chen

语言

  • 440 篇 英文
  • 27 篇 其他
  • 4 篇 中文
检索条件"机构=Internet Computing & Security Laboratory Department of Computer Engineering"
471 条 记 录,以下是131-140 订阅
排序:
A dynamic multi-objective evolutionary algorithm based on Niche prediction strategy
收藏 引用
Applied Soft computing 2023年 142卷
作者: Zheng, Jinhua Zhang, Bo Zou, Juan Yang, Shengxiang Hu, Yaru Hunan Engineering Research Center of Intelligent System Optimization and Security Xiangtan University Hunan Province Xiangtan411105 China Key Laboratory of Intelligent Computing and Information Processing Ministry of Education of China Xiangtan University Hunan Province Xiangtan411105 China Key Laboratory of Hunan Province for Internet of Things and Information Security Xiangtan University Hunan Province Xiangtan411105 China School of Computer Science and Informatics De Montfort University LeicesterLE1 9BH United Kingdom
In reality, many multi-objective optimization problems are dynamic. The Pareto optimal front (PF) or Pareto optimal solution (PS) of these dynamic multi-objective problems (DMOPs) changes as the environment change. Th... 详细信息
来源: 评论
Ciphertext-only fault analysis on the Midori lightweight cryptosystem
收藏 引用
Science China(Information Sciences) 2020年 第3期63卷 288-292页
作者: Wei LI Linfeng LIAO Dawu GU Shan CAO Yixin WU Jiayao LI Zhihong ZHOU Zheng GUO Ya LIU Zhiqiang LIU School of Computer Science and Technology Donghua University Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Key Laboratory of Integrate Administration Technologies for Information Security School of Microelectronics Shanghai Jiao Tong University Department of Computer Science and Engineering University of Shanghai for Science and Technology
Dear editor,The Midori lightweight cipher can be applied in the RFID tags and other low-resource devices to protect information on the internet. This cipher was proposed by Banik et al. and presented at the ASIACRYPT ... 详细信息
来源: 评论
Stackelberg Game-Based Pricing and Offloading for the DVFS-Enabled MEC Systems
收藏 引用
IEEE Transactions on Network and Service Management 2025年 第3期22卷 2502-2515页
作者: Mei, Jing Zeng, Cuibin Tong, Zhao Yang, Zhibang Li, Keqin Hunan Normal University College of Information Science and Engineering Changsha410081 China Changsha University in Changsha Hunan Province Key Laboratory of Industrial Internet Technology and Security Hunan 410022 China Hunan University College of Information Science and Engineering Changsha410012 China National Supercomputing Center Hunan Changsha410082 China State University of New York Department of Computer Science New YorkNY12561 United States
Due to the limited computing resources of both mobile devices (MDs) and the mobile edge computing (MEC) server, devising reasonable strategies for MD task offloading, MEC server resource pricing, and resource allocati... 详细信息
来源: 评论
Power internet of Things security Evaluation Method Based on Fuzzy Set Theory  15th
Power Internet of Things Security Evaluation Method Based on...
收藏 引用
15th International Conference on Genetic and Evolutionary computing, ICGEC 2023
作者: Wang, Yuman Wu, Hongbin Wang, Yilei Wang, Zixiang Zhu, Xinyue Qian, Kexiang SGRI Power Grid Digitizing Technology Department State Grid Laboratory of Power Cyber-Security Protection and Monitoring Technology State Grid Smart Grid Research Institute Co. Ltd. Beijing102200 China Internet Technology Center State Grid Zhejiang Electric Power Co. Ltd. Research Institute Hangzhou310000 China School of Computer Science Northeast Electric Power University Jilin Jilin City132012 China School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing100000 China
Aiming at the problems of high fuzziness and low integrity of the current Power internet of Things network security evaluation index system, the fuzzy set theory is used to evaluate the security issues of Power IoT te... 详细信息
来源: 评论
Utilizing Lexicon-enhanced Approach to Sensitive Information Identification  27
Utilizing Lexicon-enhanced Approach to Sensitive Information...
收藏 引用
27th International Conference on Automation and computing, ICAC 2022
作者: Cai, Lihua Zhou, Yujue Ding, Yulong Jiang, Jie Yang, Shuang-Hua Institute of Risk Analysis Prediction & Management Southern University of Science and Technology Shenzhen China Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen China Shenzhen Key Laboratory of Future Industrial Internet Safety and Security Southern University of Science and Technology Shenzhen China Academy for Advanced Interdisciplinary Studies Southern University of Science and Technology Shenzhen China Department of Computer Science University of Warwick CoventryCV4 7AL United Kingdom
Large-scale sensitive information leakage incidents have occurred frequently, causing huge impacts and losses to individuals, enterprises, and society. Most sensitive information exists in unstructured data, making it... 详细信息
来源: 评论
Robin: A Novel Method to Produce Robust Interpreters for Deep Learning-Based Code Classifiers
Robin: A Novel Method to Produce Robust Interpreters for Dee...
收藏 引用
IEEE International Conference on Automated Software engineering (ASE)
作者: Zhen Li Ruqian Zhang Deqing Zou Ning Wang Yating Li Shouhuai Xu Chen Chen Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Hubei Engineering Research Center on Big Data Security Department of Computer Science University of Colorado Colorado Springs USA Center for Research in Computer Vision University of Central Florida USA School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Deep learning has been widely used in source code classification tasks, such as code classification according to their functionalities, code authorship attribution, and vulnerability detection. Unfortunately, the blac...
来源: 评论
Meet-in-the-Middle Statistical Fault Analysis of the PRESENT lightweight Cryptosystem
Meet-in-the-Middle Statistical Fault Analysis of the PRESENT...
收藏 引用
作者: Li, Wei Zhu, Xiao-Ming Gu, Da-Wu Li, Jia-Yao Cai, Tian-Pei School of Computer Science and Technology Donghua University Shanghai201620 China Department of Computer and Science and Engineering Shanghai Jiao Tong University Shanghai200240 China Shanghai Key Laboratory of Scalable Computing and System Shanghai200240 China Shanghai Key Laboratory of Integrate Administration Technologies for Information Security Shanghai200240 China
The lightweight block cipher PRESENT was presented at the International Conference on Cryptographic Hardware and Embedded Systems (CHES) in 2007, and it has become a standard of ISO/IEC-29192-2 for lightweight cryptos... 详细信息
来源: 评论
NEXT:a neural network framework for next POI recommendation
收藏 引用
Frontiers of computer Science 2020年 第2期14卷 314-333页
作者: Zhiqian ZHANG Chenliang LI Zhiyong WU Aixin SUN Dengpan YE Xiangyang LUO Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of EducationSchool of Cyber Science and EngineeringWuhan UniversityWuhan 430072China Department of Computer Science The University of Hong KongPokfulam RoadHong Kong 999077China School of Computer Science and Engineering Nanyang Technological UniversitySingapore 639798Singapore State Key Lab of Mathematical Engineering and Advanced Computing Zhengzhou 450001China
The task of next POI recommendations has been studied extensively in recent ***,developing a unified recommendation framework to incorporate multiple factors associated with both POIs and users remains challenging,bec... 详细信息
来源: 评论
Ensemble Learning-based Traffic Classification with Small-Scale Datasets for Wireless Networks
Ensemble Learning-based Traffic Classification with Small-Sc...
收藏 引用
IEEE Conference on computer Communications Workshops, INFOCOM Wksps
作者: Xiaorong Wang Wenting Wei Xiaoshan Yu Danyang Zheng Neeraj Kuma Lei Liu State Key Laboratory of Integrated Service Networks Xidian University Xi'an China School of Computing and Artificial Intelligence Southwest Jiaotong University China Department of Computer Science and Engineering Thapar Institute of Engineering and Technology India Guangzhou Institute of Technology Xidian University Xi'an China Shaanxi Key Laboratory of Information Communication Network and Security Xi'an University of Posts & Telecommunications Xi'an China
Traffic classification is an essential part of intelligent network management in Fifth generation (5G) networks, from quality of service guarantees to security monitoring. With the evolution of diverse services and ap... 详细信息
来源: 评论
Compression Meets security: Low-Complexity Linear Collaborative Federated Learning with Enhanced Accuracy
收藏 引用
IEEE Transactions on Mobile computing 2025年
作者: Wang, Tianshun Li, Peichun Feng, Panpan Wei, Xin Qian, Liping Wu, Yuan Nanjing University of Posts and Telecommunications School of Communication and Information Engineering Nanjing China University of Macau State Key Laboratory of Internet of Things for Smart City China University of Macau Department of Computer and Information Science China Zhejiang University of Technology Institute of Cyberspace Security Hangzhou310023 China
Federated learning (FL) has been regarded as a promising paradigm for enabling distributed model training over resource-limited edge devices. Although FL maintains data locality and enhances model generalization, it f... 详细信息
来源: 评论