咨询与建议

限定检索结果

文献类型

  • 74 篇 会议
  • 61 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 136 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 88 篇 工学
    • 64 篇 计算机科学与技术...
    • 50 篇 软件工程
    • 23 篇 信息与通信工程
    • 20 篇 电气工程
    • 8 篇 电子科学与技术(可...
    • 8 篇 生物医学工程(可授...
    • 6 篇 机械工程
    • 6 篇 生物工程
    • 4 篇 光学工程
    • 4 篇 仪器科学与技术
    • 4 篇 控制科学与工程
    • 4 篇 化学工程与技术
    • 4 篇 交通运输工程
    • 3 篇 材料科学与工程(可...
    • 2 篇 动力工程及工程热...
  • 46 篇 理学
    • 27 篇 数学
    • 10 篇 统计学(可授理学、...
    • 8 篇 物理学
    • 6 篇 生物学
    • 4 篇 化学
    • 3 篇 系统科学
  • 13 篇 管理学
    • 9 篇 管理科学与工程(可...
    • 4 篇 工商管理
    • 3 篇 图书情报与档案管...
  • 9 篇 医学
    • 7 篇 临床医学
    • 5 篇 基础医学(可授医学...
    • 4 篇 药学(可授医学、理...
    • 3 篇 公共卫生与预防医...
  • 4 篇 法学
    • 2 篇 社会学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 文学
  • 2 篇 农学
  • 1 篇 教育学

主题

  • 8 篇 computer network...
  • 7 篇 computational mo...
  • 7 篇 feature extracti...
  • 6 篇 accuracy
  • 5 篇 computer archite...
  • 5 篇 wireless sensor ...
  • 5 篇 ip networks
  • 4 篇 deep learning
  • 4 篇 application soft...
  • 4 篇 quality of servi...
  • 4 篇 servers
  • 4 篇 blockchain
  • 4 篇 cloud computing
  • 4 篇 privacy
  • 4 篇 training
  • 4 篇 attention mechan...
  • 3 篇 public key crypt...
  • 3 篇 ad hoc networks
  • 3 篇 grid computing
  • 3 篇 condition monito...

机构

  • 10 篇 key laboratory o...
  • 7 篇 state key labora...
  • 4 篇 school of comput...
  • 4 篇 the department o...
  • 4 篇 shandong fundame...
  • 4 篇 shandong provinc...
  • 3 篇 network and data...
  • 3 篇 department of co...
  • 3 篇 shandong provinc...
  • 3 篇 the institute of...
  • 3 篇 institute for ne...
  • 3 篇 xi'an university...
  • 3 篇 school of comput...
  • 3 篇 engineering rese...
  • 3 篇 robotics and int...
  • 3 篇 state key labora...
  • 3 篇 shaanxi key labo...
  • 3 篇 the department o...
  • 3 篇 school of cyber ...
  • 3 篇 key laboratory o...

作者

  • 11 篇 eui-nam huh
  • 7 篇 luo xiangyang
  • 6 篇 zhou jiantao
  • 6 篇 lu wei
  • 5 篇 song biao
  • 5 篇 mohammad mehedi ...
  • 4 篇 shi zhenghao
  • 4 篇 biao song
  • 4 篇 huh eui nam
  • 4 篇 jin haiyan
  • 4 篇 sheng ziqi
  • 3 篇 zhao minghua
  • 3 篇 eui nam huh
  • 3 篇 huh eui-nam
  • 3 篇 tang wei
  • 3 篇 yajun liu
  • 3 篇 li aimin
  • 3 篇 xinhong hei
  • 3 篇 fei rong
  • 3 篇 lin you

语言

  • 114 篇 英文
  • 21 篇 其他
  • 1 篇 中文
检索条件"机构=Internet Computing and Network Security Laboratory Department of Computer Engineering"
136 条 记 录,以下是51-60 订阅
Distributed Twins in Edge computing: Blockchain and IOTA
Distributed Twins in Edge Computing: Blockchain and IOTA
收藏 引用
International Wireless Communications and Mobile computing Conference, IWCMC
作者: Anwar Sadad Muazzam A. Khan Baraq Ghaleb Fadia Ali Khan Maha Driss Wadii Boulila Jawad Ahmad Department of Computer Science Quaid-i-Azam University Islamabad Pakistan School of Computing Engineering & The Built Environment Edinburgh Napier University Edinburgh UK Department of Mechatronics Engineering Wah Engineering College University of Wah Wah Pakistan Security Engineering Laboratory CCIS Prince Sultan University Riyadh Saudi Arabia Robotics and Internet-of-Things Laboratory Prince Sultan University Riyadh Saudi Arabia
Blockchain (BC) and Information for Operational and Tactical Analysis (IOTA) are distributed ledgers that record a huge number of transactions in multiple places at the same time using decentralized databases. Both BC...
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
arXiv
收藏 引用
arXiv 2024年
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado SpringsCO United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab China JinYinHu Laboratory Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
Ensemble Learning-based Traffic Classification with Small-Scale Datasets for Wireless networks
Ensemble Learning-based Traffic Classification with Small-Sc...
收藏 引用
IEEE Conference on computer Communications Workshops, INFOCOM Wksps
作者: Xiaorong Wang Wenting Wei Xiaoshan Yu Danyang Zheng Neeraj Kuma Lei Liu State Key Laboratory of Integrated Service Networks Xidian University Xi'an China School of Computing and Artificial Intelligence Southwest Jiaotong University China Department of Computer Science and Engineering Thapar Institute of Engineering and Technology India Guangzhou Institute of Technology Xidian University Xi'an China Shaanxi Key Laboratory of Information Communication Network and Security Xi'an University of Posts & Telecommunications Xi'an China
Traffic classification is an essential part of intelligent network management in Fifth generation (5G) networks, from quality of service guarantees to security monitoring. With the evolution of diverse services and ap... 详细信息
来源: 评论
The security and Privacy of Mobile Edge computing: An Artificial Intelligence Perspective
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Cheng Yuan, Zenghui Zhou, Pan Xu, Zichuan Li, Ruixuan Wu, Dapeng Oliver Hubei Engineering Research Center on Big Data Security Key Laboratory of Distributed System Security of Hubei Province School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China School of Software The Key Laboratory for Ubiquitous Network Service Software of Liaoning Province Dalian University of Technology Dalian116024 China Intelligent and Distributed Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Department of Computer Science City University of Hong Kong Kowloon999077 Hong Kong
Mobile Edge computing (MEC) is a new computing paradigm that enables cloud computing and information technology (IT) services to be delivered at the network’s edge. By shifting the load of cloud computing to individu... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
International Conference on Software engineering (ICSE)
作者: Zhen Li Ning Wang Deqing Zou Yating Li Ruqian Zhang Shouhuai Xu Chao Zhang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jin YinHu Laboratory Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado Springs Colorado USA Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
Map2Schedule: An End-to-End Link Scheduling Method for Urban V2V Communications
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Lihao Sun, Haijian Sun, Jin Parasuraman, Ramviyas Ye, Yinghui Hu, Rose Qingyang The School of Electrical and Computer Engineering University of Georgia AthensGA United States The School of Computing University of Georgia AthensGA United States Shanxi Key Laboratory of Information Communication Network and Security Xi’an University of Posts & Telecommunications China The Electrical and Computer Engineering Department Utah State University LoganUT United States
Urban vehicle-to-vehicle (V2V) link scheduling with shared spectrum is a challenging problem. Its main goal is to find the scheduling policy that can maximize system performance (usually the sum capacity of each link ... 详细信息
来源: 评论
computing Power in the Sky: Digital Twin-assisted Collaborative computing with Multi-UAV networks
收藏 引用
IEEE Transactions on Vehicular Technology 2025年
作者: Wang, Chao Han, Yu Zhang, Long Jia, Ziye Zhang, Hongliang Hong, Choong Seon Han, Zhu Hebei University of Engineering School of Information and Electrical Engineering Handan056038 China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan250014 China Nanjing University of Aeronautics and Astronautics College of Electronic and Information Engineering Nanjing211106 China Southeast University National Mobile Communications Research Laboratory Jiangsu Nanjing211111 China Peking University State Key Laboratory of Advanced Optical Communication Systems and Networks School of Electronics Beijing100871 China Kyung Hee University Department of Computer Science and Engineering Gyeonggi-do Yongin-si17104 Korea Republic of University of Houston Department of Electrical and Computer Engineering HoustonTX77004 United States Kyung Hee University Department of Computer Science and Engineering Seoul446-701 Korea Republic of
The collaboration of computing powers (CPs) among unmanned aerial vehicles (UAVs)-mounted edge servers is essential to handle data-intensive tasks of user equipments (UEs). This paper presents a multi-UAV computing po... 详细信息
来源: 评论
Distributed Twins in Edge computing: Blockchain and IOTA
arXiv
收藏 引用
arXiv 2023年
作者: Sadad, Anwar Khan, Muazzam A. Ghaleb, Baraq Ali Khan, Fadia Driss, Maha Boulila, Wadii Ahmad, Jawad Department of Computer Science Quaid-i-Azam University Islamabad Pakistan School of Computing Engineering & the Built Environment Edinburgh Napier University Edinburgh United Kingdom Department of Mechatronics Engineering Wah Engineering College University of Wah Wah Pakistan Security Engineering Laboratory Ccis Prince Sultan University Riyadh Saudi Arabia Robotics and Internet-of-Things Laboratory Prince Sultan University Riyadh Saudi Arabia
Blockchain (BC) and Information for Operational and Tactical Analysis (IOTA) are distributed ledgers that record a huge number of transactions in multiple places at the same time using decentralized databases. Both BC... 详细信息
来源: 评论
A Secure and Reliable Blockchain-based Audit Log System
A Secure and Reliable Blockchain-based Audit Log System
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Zhonghao Liu Xinwei Zhang Guyue Li Helei Cui Jiaheng Wang Bin Xiao Department of Computing The Hong Kong Polytechnic University Hong Kong School of Cyber Science and Engineering Southeast University Nanjing China Purple Mountain Laboratories for Network and Communication Security Nanjing China School of Computer Science Northwestern Polytechnical University Xi'an China National Mobile Communications Reseach Laboratory Southeast University Nanjing China
The use of log files in digital forensics highlights the importance of ensuring their data integrity for auditing purposes. However, traditional centralized audit log systems face challenges in maintaining data integr... 详细信息
来源: 评论
A Multimodal Medical Image Fusion Method Incorporating an Adaptive Attention Mechanism
A Multimodal Medical Image Fusion Method Incorporating an Ad...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Yingxian Zhang Yushui Geng Hu Liang Hai Zhong Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China Graduate School Qilu University of Technology (Shandong Academy of Sciences) Jinan China Department of Radiology The Second Hospital of Shandong University Jinan China
Multimodal medical image fusion technology provides more comprehensive and accurate image support for clinical diagnosis and treatment by integrating complementary information from different imaging modalities. Aiming... 详细信息
来源: 评论