咨询与建议

限定检索结果

文献类型

  • 74 篇 会议
  • 64 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 139 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 91 篇 工学
    • 65 篇 计算机科学与技术...
    • 51 篇 软件工程
    • 24 篇 电气工程
    • 24 篇 信息与通信工程
    • 9 篇 电子科学与技术(可...
    • 8 篇 生物医学工程(可授...
    • 6 篇 机械工程
    • 6 篇 生物工程
    • 5 篇 控制科学与工程
    • 4 篇 光学工程
    • 4 篇 仪器科学与技术
    • 4 篇 化学工程与技术
    • 4 篇 交通运输工程
    • 3 篇 材料科学与工程(可...
    • 2 篇 动力工程及工程热...
  • 45 篇 理学
    • 26 篇 数学
    • 10 篇 统计学(可授理学、...
    • 8 篇 物理学
    • 6 篇 生物学
    • 4 篇 化学
    • 3 篇 系统科学
  • 13 篇 管理学
    • 9 篇 管理科学与工程(可...
    • 4 篇 工商管理
    • 3 篇 图书情报与档案管...
  • 9 篇 医学
    • 7 篇 临床医学
    • 5 篇 基础医学(可授医学...
    • 4 篇 药学(可授医学、理...
    • 3 篇 公共卫生与预防医...
  • 4 篇 法学
    • 2 篇 社会学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 文学
  • 2 篇 农学
  • 1 篇 教育学

主题

  • 8 篇 computer network...
  • 7 篇 computational mo...
  • 7 篇 feature extracti...
  • 6 篇 accuracy
  • 5 篇 computer archite...
  • 5 篇 wireless sensor ...
  • 5 篇 ip networks
  • 4 篇 deep learning
  • 4 篇 application soft...
  • 4 篇 quality of servi...
  • 4 篇 servers
  • 4 篇 blockchain
  • 4 篇 cloud computing
  • 4 篇 privacy
  • 4 篇 training
  • 4 篇 attention mechan...
  • 3 篇 public key crypt...
  • 3 篇 ad hoc networks
  • 3 篇 grid computing
  • 3 篇 condition monito...

机构

  • 10 篇 key laboratory o...
  • 7 篇 state key labora...
  • 4 篇 school of comput...
  • 4 篇 the department o...
  • 4 篇 shandong fundame...
  • 4 篇 shandong provinc...
  • 3 篇 network and data...
  • 3 篇 department of co...
  • 3 篇 shandong provinc...
  • 3 篇 the institute of...
  • 3 篇 institute for ne...
  • 3 篇 xi'an university...
  • 3 篇 school of comput...
  • 3 篇 engineering rese...
  • 3 篇 robotics and int...
  • 3 篇 shandong fundame...
  • 3 篇 state key labora...
  • 3 篇 shaanxi key labo...
  • 3 篇 the department o...
  • 3 篇 school of cyber ...

作者

  • 11 篇 eui-nam huh
  • 7 篇 luo xiangyang
  • 6 篇 zhou jiantao
  • 6 篇 lu wei
  • 5 篇 song biao
  • 5 篇 mohammad mehedi ...
  • 4 篇 shi zhenghao
  • 4 篇 biao song
  • 4 篇 huh eui nam
  • 4 篇 jin haiyan
  • 4 篇 sheng ziqi
  • 3 篇 zhao minghua
  • 3 篇 eui nam huh
  • 3 篇 huh eui-nam
  • 3 篇 tang wei
  • 3 篇 yajun liu
  • 3 篇 li aimin
  • 3 篇 xinhong hei
  • 3 篇 fei rong
  • 3 篇 lin you

语言

  • 116 篇 英文
  • 22 篇 其他
  • 1 篇 中文
检索条件"机构=Internet Computing and Network Security Laboratory Department of Computer Engineering"
139 条 记 录,以下是41-50 订阅
SUMI-IFL: An Information-Theoretic Framework for Image Forgery Localization with Sufficiency and Minimality Constraints
arXiv
收藏 引用
arXiv 2024年
作者: Sheng, Ziqi Lu, Wei Luo, Xiangyang Zhou, Jiantao Cao, Xiaochun School of Computer Science and Engineering MoE Key Laboratory of Information Technology Guangdong Province Key Laboratory of Information Security Technology Sun Yat-sen University China State Key Laboratory of Mathematical Engineering and Advanced Computing China State Key Laboratory of Internet of Things for Smart City Department of Computer and Information Science University of Macau China School of Cyber Science and Technology Sun Yat-sen University Shenzhen Campus China
Image forgery localization (IFL) is a crucial technique for preventing tampered image misuse and protecting social safety. However, due to the rapid development of image tampering technologies, extracting more compreh... 详细信息
来源: 评论
GLCF: A Global-Local Multimodal Coherence Analysis Framework for Talking Face Generation Detection
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Xiaocan Yin, Qilin Liu, Jiarui Lu, Wei Luo, Xiangyang Zhou, Jiantao School of Computer Science and Engineering MoE Key Laboratory of Information Technology Guangdong Province Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou510006 China Alibaba Group Hangzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450002 China State Key Laboratory of Internet of Things for Smart City Department of Computer and Information Science Faculty of Science and Technology University of Macau 999078 China
Talking face generation (TFG) allows for producing lifelike talking videos of any character using only facial images and accompanying text. Abuse of this technology could pose significant risks to society, creating th... 详细信息
来源: 评论
A novel dual-stage algorithm for capacitated arc routing problems with time-dependent service costs
arXiv
收藏 引用
arXiv 2024年
作者: Li, Qingya Liu, Shengcai Zou, Juan Tang, Ke Guangdong Key Laboratory of Brain-Inspired Intelligent Computation Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen518055 China The Key Laboratory of Hunan Province for Internet of Things and Information Security Xiangtan University Xiangtan411105 China The Key Laboratory of Intelligent Computing and Information Processing Ministry of Education Xiangtan University Xiangtan411105 China
This paper focuses on solving the capacitated arc routing problem with time-dependent service costs (CARPTDSC), which is motivated by winter gritting applications. In the current literature, exact algorithms designed ... 详细信息
来源: 评论
A Novel Dual-Stage Algorithm for Capacitated Arc Routing Problems with Time-Dependent Service Costs
SSRN
收藏 引用
SSRN 2024年
作者: Li, Qingya Liu, Shengcai Zou, Juan Tang, Ke Guangdong Key Laboratory of Brain-Inspired Intelligent Computation Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen518055 China The Key Laboratory of Hunan Province for Internet of Things and Information Security Xiangtan University Xiangtan411105 China The Key Laboratory of Intelligent Computing and Information Processing Ministry of Education Xiangtan University Xiangtan411105 China
This paper focuses on solving the capacitated arc routing problem with time-dependent service costs (CARPTDSC), which is motivated by winter gritting applications. In the current literature, exact algorithms designed ... 详细信息
来源: 评论
SONICUMOS: An Enhanced Active Face Liveness Detection System via Ultrasonic and Video Signals
收藏 引用
IEEE Transactions on Mobile computing 2025年
作者: Wu, Yihao Jiang, Peipei Cheng, Jianhao Zhao, Lingchen Shen, Chao Wang, Cong Wang, Qian Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan430072 China Wuhan University School of Cyber Science and Engineering Hubei430072 China Laboratory for AI-Powered Financial Technologies Ltd. 999077 Hong Kong Xi'An Jiaotong University MOE Key Laboratory for Intelligent Networks and Network Security Xi'an710049 China Xi'An Jiaotong University School of Cyber Science and Engineering Xi'an710049 China City University of Hong Kong Department of Computer Science 999077 Hong Kong
SONICUMOS is an enhanced behavior-based face liveness detection system that combines ultrasonic and video signals to sense the 3D head gestures. As face authentication becomes increasingly prevalent, the need for a re... 详细信息
来源: 评论
FireXnet: an explainable AI-based tailored deep learning model for wildfire detection on resource-constrained devices
收藏 引用
Fire Ecology 2023年 第1期19卷 1-19页
作者: Ahmad, Khubab Khan, Muhammad Shahbaz Ahmed, Fawad Driss, Maha Boulila, Wadii Alazeb, Abdulwahab Alsulami, Mohammad Alshehri, Mohammed S. Ghadi, Yazeed Yasin Ahmad, Jawad Faculty of Engineering and Technology Multimedia University Melaka Malaysia School of Computing Engineering and the Built Environment Edinburgh Napier University Edinburgh UK Department of Cyber Security Pakistan Navy Engineering College NUST Karachi Pakistan Robotics and Internet of Things Laboratory Prince Sultan University Riyadh Saudi Arabia RIADI Laboratory National School of Computer Sciences University of Manouba Manouba Tunisia Department of Computer Science College of Computer Science and Information Systems Najran University Najran Saudi Arabia Department of Software Engineering Computer Science Al Ain University Abu Dhabi United Arab Emirates
Forests cover nearly one-third of the Earth’s land and are some of our most biodiverse ecosystems. Due to climate change, these essential habitats are endangered by increasing wildfires. Wildfires are not just a risk...
来源: 评论
ASDIA: An Adversarial Sample to Preserve Privacy Program in Federated Learning
收藏 引用
IEEE Transactions on Dependable and Secure computing 2025年
作者: Tian, Shujuan Tan, Yi Wang, Han Liu, Haolin Li, Zhetao Xiangtan University School of Computer Science School of Cyberspace Security Xiangtan China Xiangtan University Hunan International Scientific and Technological Cooperation Base of Intelligent network Xiangtan411105 China Xiangtan University Key Laboratory of Hunan Province for Internet of Things and Information Security Xiangtan411105 China Department of Electrical Engineering and Computer Science University of Kansas 1520 W 15th St LawrenceKS United States Jinan University College of Information Science and Technology Guangzhou510632 China
Federated learning enables training across multiple entities while ensuring data security and the effectiveness of knowledge dissemination. Despite its benefits, it remains susceptible to privacy breaches by both exte... 详细信息
来源: 评论
Secure Beamforming and Obstacle Avoidance Trajectory Design for UAV-Assisted ISAC  30
Secure Beamforming and Obstacle Avoidance Trajectory Design ...
收藏 引用
30th International Conference on Mobile computing and networking, ACM MobiCom 2024
作者: Xu, Xiaolong Ju, Ying Tu, Yulong Liu, Lei Gong, Yi Du, Jianbo Yau, Kok-Lim Alvin School of Telecommunications Engineering Xidian University Xi'an 60025578 China Guangzhou Institute of Technology Xidian University Guangzhou 60025578 China Shaanxi Key Laboratory of Information Communication Network and Security Xi'an University of Posts and Telecommunications Xi'an China School of Information and Communication Engineering Beijing Information Science and Technology University Beijing 60088567 China School of Communications and Information Engineering Xi'an University of Posts and Telecommunications Xi'an 60073708 China Department of Internet Engineering and Computer Science Universiti Tunku Abdul Rahman Selangor Kajang 60090708 Malaysia
Unmanned aerial vehicles (UAVs), known for their high flexibility and maneuverability, are regarded as the aerial platforms of future integrated sensing and communication (ISAC) networks. The communication and sensing... 详细信息
来源: 评论
GrayINT – Detection and Localization of Gray Failures via Hybrid In-band network Telemetry
GrayINT – Detection and Localization of Gray Failures via H...
收藏 引用
Asia-Pacific network Operations and Management Symposium (APNOMS)
作者: Kuichao Zhang Wei Su Huiling Shi Kai Zhang Wei Zhang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China National Engineering Laboratory for Next Generation Internet Interconnection Devices (NGIID) School of Electronics and Information Engineering Beijing Jiaotong University Beijing China
As the underlying infrastructure, data center networks (DCNs) provide an important platform for cloud computing and next-generation networks. However, due to the influence of many factors, such as network, hardware, a...
来源: 评论
A 3D Memristive Cubic Map with Dual Discrete Memristors: Design, Implementation, and Application in Image Encryption
收藏 引用
IEEE Transactions on Circuits and Systems for Video Technology 2025年
作者: Gao, Suo Iu, Herbert Ho-Ching Erkan, Ugur Simsek, Cemaleddin Toktas, Abdurrahim Cao, Yinghong Wu, Rui Mou, Jun Li, Qi Wang, Chunpeng Dalian Polytechnic University School of Information Science and Engineering Dalian116034 China The University of Western Australia School of Electrical Electronic and Computer Engineering Perth6009 Australia Faculty of Engineering Electrical and Electronics Engineering Respectively Karamanoglu Mehmetbey University Karaman70200 Turkey Ankara University Engineering Faculty Department of Artificial Intelligence and Data Engineering Ankara06830 Turkey Harbin Institute of Technology School of Computer Science and Technology Harbin150001 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan250000 China
Discrete chaotic systems based on memristors exhibit excellent dynamical properties and are more straightforward to implement in hardware, making them highly suitable for generating cryptographic keystreams. However, ... 详细信息
来源: 评论