咨询与建议

限定检索结果

文献类型

  • 104 篇 会议
  • 67 篇 期刊文献

馆藏范围

  • 171 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 124 篇 工学
    • 101 篇 计算机科学与技术...
    • 83 篇 软件工程
    • 35 篇 信息与通信工程
    • 14 篇 控制科学与工程
    • 10 篇 机械工程
    • 8 篇 电气工程
    • 7 篇 电子科学与技术(可...
    • 7 篇 生物工程
    • 6 篇 交通运输工程
    • 6 篇 生物医学工程(可授...
    • 5 篇 安全科学与工程
    • 4 篇 网络空间安全
    • 3 篇 光学工程
    • 3 篇 仪器科学与技术
    • 3 篇 材料科学与工程(可...
    • 3 篇 动力工程及工程热...
  • 57 篇 理学
    • 41 篇 数学
    • 12 篇 物理学
    • 7 篇 生物学
    • 6 篇 统计学(可授理学、...
  • 38 篇 管理学
    • 22 篇 图书情报与档案管...
    • 15 篇 管理科学与工程(可...
    • 7 篇 工商管理
  • 8 篇 法学
    • 7 篇 社会学
  • 8 篇 医学
    • 6 篇 基础医学(可授医学...
    • 6 篇 临床医学
    • 3 篇 公共卫生与预防医...
    • 3 篇 药学(可授医学、理...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 农学
    • 3 篇 作物学

主题

  • 9 篇 cryptography
  • 8 篇 privacy
  • 6 篇 semantics
  • 6 篇 training
  • 5 篇 wireless sensor ...
  • 5 篇 feature extracti...
  • 4 篇 deep learning
  • 4 篇 computational mo...
  • 4 篇 security
  • 4 篇 accuracy
  • 4 篇 adaptation model...
  • 3 篇 image segmentati...
  • 3 篇 optimization
  • 3 篇 authentication
  • 3 篇 real-time system...
  • 3 篇 blockchain
  • 3 篇 protocols
  • 3 篇 malware
  • 3 篇 federated learni...
  • 3 篇 cloud computing

机构

  • 8 篇 school of comput...
  • 8 篇 school of cyber ...
  • 8 篇 beijing key lab....
  • 8 篇 guangxi collabor...
  • 6 篇 school of comput...
  • 5 篇 shanghai key lab...
  • 5 篇 nanjing fenghuo ...
  • 4 篇 school of comput...
  • 4 篇 ministry of edu....
  • 4 篇 school of cyber ...
  • 4 篇 college of compu...
  • 4 篇 key lab. of comp...
  • 4 篇 school of comput...
  • 4 篇 key lab of compu...
  • 4 篇 college of infor...
  • 4 篇 purple mountain ...
  • 4 篇 key laboratory o...
  • 4 篇 key lab. of comp...
  • 4 篇 guangxi key lab ...
  • 4 篇 jiangsu high tec...

作者

  • 11 篇 wang yun
  • 9 篇 li hui
  • 8 篇 chunhe xia
  • 8 篇 tianbo wang
  • 8 篇 he jieyue
  • 7 篇 yun wang
  • 6 篇 chen chen
  • 6 篇 zhang min-ling
  • 5 篇 mi jiacong
  • 5 篇 feng yu
  • 5 篇 liu yongshan
  • 5 篇 zhang yu
  • 4 篇 fan kai
  • 4 篇 jinbin tu
  • 4 篇 xin geng
  • 4 篇 tu jinbin
  • 4 篇 ma wenping
  • 4 篇 wang yue
  • 4 篇 hu yupu
  • 4 篇 yu zhang

语言

  • 149 篇 英文
  • 12 篇 中文
  • 10 篇 其他
检索条件"机构=Key Lab. of Computer Network and Information Integration"
171 条 记 录,以下是141-150 订阅
排序:
FedDLM: A Fine-Grained Assessment Scheme for Risk of Sensitive information Leakage in Federated Learning-based Android Malware Classifier
FedDLM: A Fine-Grained Assessment Scheme for Risk of Sensiti...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Changnan Jiang Chunhe Xia Chen Chen Huacheng Li Tianbo Wang Xiaojian Li Beijing Key Lab. of Network Technology Beihang University Beijing China Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin China School of Cyber Science and Technology Beihang University Beijing China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China College of Computer Science and Information Technology Guangxi Normal University Guilin China
In the traditional centralized Android malware classification framework, privacy concerns arise as it requires collecting users’ app samples containing sensitive information directly. To address this problem, new cla... 详细信息
来源: 评论
Quantitative Measurement of Coronary Artery Stenosis in CCTA Images Using a 2D Parametric Intensity Model
Quantitative Measurement of Coronary Artery Stenosis in CCTA...
收藏 引用
Annual International Conference of the IEEE Engineering in Medicine and Biology Society
作者: Guanyu YANG Xinglou ZHAO Lijun TANG Huzhong SHU Christine TOUMOULIN Lab of Image Science and Technology Key Laboratory of Computer Network and Information Integration (Southeast University) Dept. of Radiology the First Affiliated Hospital of Nanjing Medical University INSERM-U1099 LTSI Universite de Rennes 1
In this paper, we propose an approach based on 2D vessel model to segment the vessel lumen in three-dimensional coronary computed tomographic angiography (CCTA) images. The 2D parametric intensity model is introduced ... 详细信息
来源: 评论
Event-based Video Frame Interpolation with Edge Guided Motion Refinement
arXiv
收藏 引用
arXiv 2024年
作者: Liu, Yuhan Deng, Yongjian Chen, Hao Xie, Bochen Li, Youfu Yang, Zhen The College of Computer Science Beijing University of Technology Beijing100124 China Department of Mechanical Engineering City University of Hong Kong Kowloon Hong Kong Hong Kong Key Lab of Computer Network and Information Integration Southeast University Ministry of Education Nanjing211189 China
Video frame interpolation, the process of synthesizing intermediate frames between sequential video frames, has made remarkable progress with the use of event cameras. These sensors, with microsecond-level temporal re... 详细信息
来源: 评论
Deep Video Cascade Clustering from Video Structures
SSRN
收藏 引用
SSRN 2024年
作者: Wang, Zihua Zhu, Hongyuan Mi, Siya Zhang, Yu Geng, Xin School of Computer Science and Engineering The Key Lab of Computer Network and Information Integration Ministry of Education Southeast University Nanjing211189 China A*STAR Singapore School of Cyber Science and Engineering Southeast University Nanjing211189 China Purple Mountain Laboratories Nanjing211189 China
Video clustering is a critical unsupervised learning task where, unlike in supervised video classification, category lab.ls are not *** main challenge lies in learning an effective video representation without annotat... 详细信息
来源: 评论
Image-Text Retrieval with Intra-Modal Soft lab.ls
SSRN
收藏 引用
SSRN 2022年
作者: Zhang, Yu Liu, Haoliang Xiong, Wei Mi, Siya Bian, Yali School of Computer Science and Engineering The Key Lab of Computer Network and Information Integration Ministry of Education Southeast University Nanjing211189 China School of Cyber Science and Engineering Southeast University Nanjing211189 China Purple Mountain Laboratories Nanjing China Intel Labs United States
Image-text retrieval attempts to find relevant images from a huge corpus of images given a textual description, and vice versa. Existing works usually denote the negative/positive image-text pair with a binary lab.l. ... 详细信息
来源: 评论
HL-DPoS: An Enhanced Anti-Long-Range Attack DPoS Algorithm
arXiv
收藏 引用
arXiv 2023年
作者: Li, Yang Xia, Chunhe Li, Chunyan Zhao, Yuan Chen, Chen Wang, Tianbo School of Computer Science and Engineering Beihang University Beijing China Beijing Key Lab. of Network Technology Beihang University Beijing China Guangxi Collaborative Innovation Center of Multi-source Information Integration and Intelligent Processing Guangxi Normal University Guilin China School of Cyber Science and Technology Beihang University Beijing China
The consensus algorithm is crucial in blockchain for ensuring the validity and security of transactions across the decentralized network. However, achieving consensus among nodes and packaging blocks in blockchain net... 详细信息
来源: 评论
Research on network malicious code dendritic cell immune algorithm based on fuzzy weighted support vector machine
Research on network malicious code dendritic cell immune alg...
收藏 引用
6th China Conference of Wireless Sensor networks, CWSN 2012
作者: Li, Peng Wang, Ruchuan Zhou, Yanting Dai, Qiuyu College of Computer Nanjing University of Posts and Telecommunications Nanjing Jiangsu 210003 China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing Jiangsu 210003 China Key Lab. of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education Jiangsu Province Nanjing Jiangsu 210003 China College of Telecommunications and Information Engineering Nanjing University of Posts and Telecommunications Nanjing Jiangsu 210003 China
According to the significant impact on the accuracy rate of detection of current immune algorithms brought by incorrect classification of signal, it proposes network malicious code dendritic cell immune algorithm base... 详细信息
来源: 评论
Few-shot Encrypted Malicious Traffic Classification via Hierarchical Semantics and Adaptive Prototype Learning
Few-shot Encrypted Malicious Traffic Classification via Hier...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Yuan Zhao Chunhe Xia Tianbo Wang Mengyao Liu Yang Li Beijing Key Lab. of Network Technology Beihang University Beijing China Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin China School of Cyber Science and Technology Beihang University Beijing China
While encrypted traffic improves security, it is also used by attackers to hide the transmission content to evade detection. Currently, traffic side-channel features combined with Deep Learning (DL) are widely used fo... 详细信息
来源: 评论
MutexMatch: Semi-Supervised Learning with Mutex-Based Consistency Regularization
arXiv
收藏 引用
arXiv 2022年
作者: Duan, Yue Zhao, Zhen Qi, Lei Wang, Lei Zhou, Luping Shi, Yinghuan Gao, Yang The National Key Laboratory for Novel Software Technology The National Institute of Healthcare Data Science Nanjing University Nanjing210023 China The School of Electrical and Information Engineering The University of Sydney SydneyNSW2006 Australia The School of Computer Science and Engineering The Key Lab of Computer Network and Information Integration Ministry of Education Southeast University Nanjing211189 China The School of Computing and Information Technology University of Wollongong WollongongNSW2522 Australia
The core issue in semi-supervised learning (SSL) lies in how to effectively leverage unlab.led data, whereas most existing methods tend to put a great emphasis on the utilization of high-confidence samples yet seldom ... 详细信息
来源: 评论
FedDADP: A Privacy-Risk-Adaptive Differential Privacy Protection Method for Federated Android Malware Classifier
FedDADP: A Privacy-Risk-Adaptive Differential Privacy Protec...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Changnan Jiang Chunhe Xia Mengyao Liu Rui Fang Pengfei Li Huacheng Li Tianbo Wang Beijing Key Lab. of Network Technology Beihang University Beijing China Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin China School of Cyber Science and Technology Beihang University Beijing China SNationa Innovation Center of Intelligent and Connected Vehicles Beijing China Shanghai Key Laboratory of Computer Software Evaluating and Testing China
The federated Android malware classifier has attracted much attention owing to its advantages of privacy protection and multi-party joint modeling. However, the research indicates that the gradient transmitted within ... 详细信息
来源: 评论