咨询与建议

限定检索结果

文献类型

  • 487 篇 期刊文献
  • 430 篇 会议
  • 1 册 图书

馆藏范围

  • 918 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 660 篇 工学
    • 424 篇 计算机科学与技术...
    • 347 篇 软件工程
    • 162 篇 信息与通信工程
    • 75 篇 电子科学与技术(可...
    • 74 篇 生物工程
    • 66 篇 控制科学与工程
    • 53 篇 光学工程
    • 52 篇 电气工程
    • 41 篇 机械工程
    • 30 篇 网络空间安全
    • 29 篇 仪器科学与技术
    • 28 篇 生物医学工程(可授...
    • 22 篇 化学工程与技术
    • 21 篇 安全科学与工程
    • 19 篇 动力工程及工程热...
    • 19 篇 交通运输工程
    • 15 篇 材料科学与工程(可...
    • 15 篇 航空宇航科学与技...
  • 364 篇 理学
    • 181 篇 数学
    • 119 篇 物理学
    • 83 篇 生物学
    • 59 篇 统计学(可授理学、...
    • 26 篇 系统科学
    • 24 篇 化学
  • 183 篇 管理学
    • 101 篇 图书情报与档案管...
    • 80 篇 管理科学与工程(可...
    • 30 篇 工商管理
  • 31 篇 医学
    • 25 篇 临床医学
    • 17 篇 基础医学(可授医学...
  • 20 篇 法学
    • 14 篇 社会学
  • 12 篇 经济学
  • 9 篇 军事学
  • 6 篇 农学
  • 4 篇 文学
  • 2 篇 教育学
  • 1 篇 艺术学

主题

  • 28 篇 deep learning
  • 28 篇 semantics
  • 15 篇 wireless sensor ...
  • 13 篇 feature extracti...
  • 12 篇 information retr...
  • 12 篇 training
  • 11 篇 reinforcement le...
  • 11 篇 authentication
  • 10 篇 throughput
  • 10 篇 image segmentati...
  • 10 篇 optimization
  • 10 篇 computational mo...
  • 10 篇 machine learning
  • 10 篇 privacy
  • 9 篇 wireless communi...
  • 9 篇 security
  • 9 篇 network security
  • 9 篇 federated learni...
  • 8 篇 learning systems
  • 8 篇 big data

机构

  • 92 篇 university of ch...
  • 81 篇 cas key lab of n...
  • 29 篇 key lab of infor...
  • 28 篇 cas key lab of n...
  • 22 篇 cas key lab of n...
  • 22 篇 university of am...
  • 21 篇 beijing electron...
  • 19 篇 key lab of broad...
  • 18 篇 institute of qua...
  • 18 篇 state informatio...
  • 13 篇 zhejiang lab
  • 11 篇 key lab of broad...
  • 11 篇 key lab of broad...
  • 10 篇 moe key lab for ...
  • 9 篇 faculty of educa...
  • 9 篇 shonan institute...
  • 9 篇 faculty of engin...
  • 9 篇 faculty of syste...
  • 9 篇 center of space ...
  • 9 篇 department of ph...

作者

  • 117 篇 guo jiafeng
  • 111 篇 cheng xueqi
  • 53 篇 zhang ruqing
  • 53 篇 fan yixing
  • 41 篇 lan yanyan
  • 26 篇 pang liang
  • 26 篇 meng deyu
  • 21 篇 bi keping
  • 20 篇 de rijke maarten
  • 16 篇 shen huawei
  • 16 篇 xu jun
  • 13 篇 cao xiangyong
  • 13 篇 wang zhiqiang
  • 13 篇 zheng qinghua
  • 13 篇 chen wei
  • 13 篇 sun xiaoming
  • 11 篇 liu yu-an
  • 11 篇 yang tao
  • 10 篇 tao yang
  • 9 篇 feng c.f.

语言

  • 843 篇 英文
  • 57 篇 其他
  • 18 篇 中文
检索条件"机构=Key Lab of Network Science and Technology"
918 条 记 录,以下是241-250 订阅
排序:
FedDLM: A Fine-Grained Assessment Scheme for Risk of Sensitive Information Leakage in Federated Learning-based Android Malware Classifier
FedDLM: A Fine-Grained Assessment Scheme for Risk of Sensiti...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Changnan Jiang Chunhe Xia Chen Chen Huacheng Li Tianbo Wang Xiaojian Li Beijing Key Lab. of Network Technology Beihang University Beijing China Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin China School of Cyber Science and Technology Beihang University Beijing China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China College of Computer Science and Information Technology Guangxi Normal University Guilin China
In the traditional centralized Android malware classification framework, privacy concerns arise as it requires collecting users’ app samples containing sensitive information directly. To address this problem, new cla... 详细信息
来源: 评论
HF-Mid: A Hybrid Framework of network Intrusion Detection for Multi-type and Imbalanced Data
HF-Mid: A Hybrid Framework of Network Intrusion Detection fo...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Weidong Zhou Tianbo Wang Guotao Huang Xiaopeng Liang Chunhe Xia Xiaojian Li Beijing Key Lab. of Network Technology Beihang University Beijing China School of Cyber Science and Technology Beihang University Beijing China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China Guangxi Collaborative Innovation Center of Multi-source Information Integration and Intelligent Processing Guangxi Normal University Guilin China College of Computer Science and Information Technology Guangxi Normal University Guilin China
The data-driven deep learning methods have brought significant progress and potential to intrusion detection. However, there are two thorny problems caused by the characteristics of intrusion data: "multi-type fe... 详细信息
来源: 评论
PSNAS-Net: Hybrid gradient-physical optimizationfor efficient neural architecture search in customized medical imaging analysis
收藏 引用
Expert Systems with Applications 2025年 288卷
作者: Zechen, Zheng Xuelei, He Fengjun, Zhao Xiaowei, He School of Information Science and Technology Northwest University No.1 Xuexue Avenue Shaanxi Xi'an710127 China Xi'an Key Lab of Radiomics and Intelligent Perception Northwest University No.1 Xuexue Avenue Shaanxi Xi'an710127 China School of Network and Data Center Northwest University No.1 Xuexue Avenue Shaanxi Xi'an710127 China
Neural architecture search (NAS) facilitates the automated construction of neural networks tailored to specific tasks and requirements, resulting in models that are more closely aligned with the target task's dema... 详细信息
来源: 评论
EFwork: An Efficient Framework for Constructing a Malware Knowledge Graph
EFwork: An Efficient Framework for Constructing a Malware Kn...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Chen Chen Chunhe Xia Tianbo Wang Wanshuang Lin Yuan Zhao Yang Li Beijing Key Lab. of Network Technology Beihang University Beijing China Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin China School of Cyber Science and Technology Beihang University Beijing China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China
Malware Knowledge Graph (MKG) serves as an essential auxiliary tool for malware detection and analysis. However, the construction of MKG faces several challenges, such as inadequate dataset quality, incomplete entity ... 详细信息
来源: 评论
REDA: Malicious Traffic Detection Based on Record Length and Frequency Domain Analysis
REDA: Malicious Traffic Detection Based on Record Length and...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Wanshuang Lin Chunhe Xia Tianbo Wang Chen Chen Yuan Zhao Weidong Zhou School of Cyber Science and Technology Beihang University Beijing China Beijing Key Lab. of Network Technology Beihang University Beijing China Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China
The TLS encryption protocol plays a vital role in securing data transmission, but it also presents challenges for payload-based network Intrusion Detection Systems (NIDS). Existing methods utilize statistical characte... 详细信息
来源: 评论
Popularity Debiasing from Exposure to Interaction in Collaborative Filtering
arXiv
收藏 引用
arXiv 2023年
作者: Liu, Yuanhao Cao, Qi Shen, Huawei Wu, Yunfan Tao, Shuchang Cheng, Xueqi Data Intelligence System Research Center Institute of Computing Technology CAS University of Chinese Academy of Sciences Beijing China Data Intelligence System Research Center Institute of Computing Technology CAS China CAS Key Lab of Network Data Science and Technology Institute of Computing Technology CAS University of Chinese Academy of Sciences Beijing China
Recommender systems often suffer from popularity bias, where popular items are overly recommended while sacrificing unpopular items. Existing researches generally focus on ensuring the number of recommendations (expos... 详细信息
来源: 评论
Energy Localization in Spherical Non-Hermitian Topolectrical Circuits
arXiv
收藏 引用
arXiv 2024年
作者: Shen, Xizhou Wang, Xiumei Guo, Haotian Zhou, Xingping College of Integrated Circuit Science and Engineering Nanjing University of Posts and Telecommunications Nanjing210003 China College of Electronic and Optical Engineering Nanjing University of Posts and Telecommunications Nanjing210003 China School of Design Arts and Media Nanjing University of Science and Technology Nanjing China Institute of Quantum Information and Technology Key Lab of Broadband Wireless Communication and Sensor Network Technology Ministry of Education Nanjing University of Posts and Telecommunications Nanjing210003 China
This work delves into the energy localization in non-Hermitian systems, particularly focusing on the effects of topological defects in spherical models. We analyze the mode distribution changes in non-Hermitian Su-Sch... 详细信息
来源: 评论
FedDRC: A Robust Federated Learning-based Android Malware Classifier under Heterogeneous Distribution
FedDRC: A Robust Federated Learning-based Android Malware Cl...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Changnan Jiang Chunhe Xia Mengyao Liu Chen Chen Huacheng Li Tianbo Wang Pengfei Li Beijing Key Lab. of Network Technology Beihang University Beijing China Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin China School of Cyber Science and Technology Beihang University Beijing China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China SNationa Innovation Center of Intelligent and Connected Vehicles Beijing China
In the traditional centralized Android malware classification framework, privacy concerns exist due to collected users’ apps containing sensitive information. A new classification framework based on Federated Learnin... 详细信息
来源: 评论
BiKT: Unleashing the potential of GNNs via Bi-directional Knowledge Transfer
arXiv
收藏 引用
arXiv 2023年
作者: Zheng, Shuai Liu, Zhizhe Zhu, Zhenfeng Zhang, Xingxing Li, Jianxin Zhao, Yao The Institute of Information Science Beijing Jiaotong University Beijing100044 China The Beijing Key Laboratory of Advanced Information Science and Network Technology Beijing100044 China Qiyuan Lab Beijing China The Beijing Advanced Innovation Center for Big Data and Brain Computing School of Computer Science and Engineering Beihang University Beijing100083 China
Based on the message-passing paradigm, there has been an amount of research proposing diverse and impressive feature propagation mechanisms to improve the performance of GNNs. However, less focus has been put on featu... 详细信息
来源: 评论
Continuous Distributed Processing of Software Defined Radar
Continuous Distributed Processing of Software Defined Radar
收藏 引用
2021 CIE International Conference on Radar, Radar 2021
作者: Li, Bing Qiu, Qiang Gong, Shiqi Liu, Yongjun Lei, Yu Institute of Computing Technology CAS Key Lab of Network Data Science and Technology Chinese Academy of Sciences Beijing China State Key Laboratory of Internet of Things for Smart City University of Macau Macau China Xidian University National Laboratory of Radar Signal Processing Xi'an China Golaxy Data Technology Co. Ltd. Beijing China
Software-defined radar has been an active research field for more than ten years. However, the low performance and low scalability of the traditional processing techniques of SDR make it hard to deal with complex rada... 详细信息
来源: 评论