咨询与建议

限定检索结果

文献类型

  • 104 篇 会议
  • 67 篇 期刊文献

馆藏范围

  • 171 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 124 篇 工学
    • 101 篇 计算机科学与技术...
    • 83 篇 软件工程
    • 35 篇 信息与通信工程
    • 14 篇 控制科学与工程
    • 10 篇 机械工程
    • 8 篇 电气工程
    • 7 篇 电子科学与技术(可...
    • 7 篇 生物工程
    • 6 篇 交通运输工程
    • 6 篇 生物医学工程(可授...
    • 5 篇 安全科学与工程
    • 4 篇 网络空间安全
    • 3 篇 光学工程
    • 3 篇 仪器科学与技术
    • 3 篇 材料科学与工程(可...
    • 3 篇 动力工程及工程热...
  • 57 篇 理学
    • 41 篇 数学
    • 12 篇 物理学
    • 7 篇 生物学
    • 6 篇 统计学(可授理学、...
  • 38 篇 管理学
    • 22 篇 图书情报与档案管...
    • 15 篇 管理科学与工程(可...
    • 7 篇 工商管理
  • 8 篇 法学
    • 7 篇 社会学
  • 8 篇 医学
    • 6 篇 基础医学(可授医学...
    • 6 篇 临床医学
    • 3 篇 公共卫生与预防医...
    • 3 篇 药学(可授医学、理...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 农学
    • 3 篇 作物学

主题

  • 9 篇 cryptography
  • 8 篇 privacy
  • 6 篇 semantics
  • 6 篇 training
  • 5 篇 wireless sensor ...
  • 5 篇 feature extracti...
  • 4 篇 deep learning
  • 4 篇 computational mo...
  • 4 篇 security
  • 4 篇 accuracy
  • 4 篇 adaptation model...
  • 3 篇 image segmentati...
  • 3 篇 optimization
  • 3 篇 authentication
  • 3 篇 real-time system...
  • 3 篇 blockchain
  • 3 篇 protocols
  • 3 篇 malware
  • 3 篇 federated learni...
  • 3 篇 cloud computing

机构

  • 8 篇 school of comput...
  • 8 篇 school of cyber ...
  • 8 篇 beijing key lab....
  • 8 篇 guangxi collabor...
  • 6 篇 school of comput...
  • 5 篇 shanghai key lab...
  • 5 篇 nanjing fenghuo ...
  • 4 篇 school of comput...
  • 4 篇 ministry of edu....
  • 4 篇 school of cyber ...
  • 4 篇 college of compu...
  • 4 篇 key lab. of comp...
  • 4 篇 school of comput...
  • 4 篇 key lab of compu...
  • 4 篇 college of infor...
  • 4 篇 purple mountain ...
  • 4 篇 key laboratory o...
  • 4 篇 key lab. of comp...
  • 4 篇 guangxi key lab ...
  • 4 篇 jiangsu high tec...

作者

  • 11 篇 wang yun
  • 9 篇 li hui
  • 8 篇 chunhe xia
  • 8 篇 tianbo wang
  • 8 篇 he jieyue
  • 7 篇 yun wang
  • 6 篇 chen chen
  • 6 篇 zhang min-ling
  • 5 篇 mi jiacong
  • 5 篇 feng yu
  • 5 篇 liu yongshan
  • 5 篇 zhang yu
  • 4 篇 fan kai
  • 4 篇 jinbin tu
  • 4 篇 xin geng
  • 4 篇 tu jinbin
  • 4 篇 ma wenping
  • 4 篇 wang yue
  • 4 篇 hu yupu
  • 4 篇 yu zhang

语言

  • 149 篇 英文
  • 12 篇 中文
  • 10 篇 其他
检索条件"机构=Key Lab. of Computer Network and Information Integration"
171 条 记 录,以下是151-160 订阅
排序:
A Novel Meta-Hierarchical Active Inference Reinforcement Learning Approach for QoS-Driven Resource Allocation in Dynamic Clouds
A Novel Meta-Hierarchical Active Inference Reinforcement Lea...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Peijie Xian Ying He F. Richard Yu Jianbo Du College of Computer Science and Software Engineering Shenzhen Univ. Shenzhen China Shaanxi Key Lab. of Information Comm. Network and Security Xi’an Univ. of Posts & Telecomm. Xi’an China School of Information Technology Carleton Univ. Ottawa Canada
The cloud computing environment is highly dynamic due to a variety of external factors such as seasonal changes, market trends, and social events. In this case, tenant behavior patterns exhibit significant variability... 详细信息
来源: 评论
Autonomous distributed trust mode
收藏 引用
Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University 2008年 第3期35卷 469-473页
作者: Zhan, Yang Pang, Liao-Jun Zhu, Xiao-Yan Wang, Yu-Min Key Lab. of Computer Network and Information Security Xidian Univ. Xi'an 710071 China State Key Lab. of Integrated Service Networks Xidian Univ. Xi'an 710071 China
To estimate the trust value in P2P networks, an autonomous trust mode based on both direct experiences and recommendations is proposed, in which the recommendation synthetic coefficients are decided by the trustor'... 详细信息
来源: 评论
Attack-tolerant node localization in wireless sensor networks
收藏 引用
Wuhan Ligong Daxue Xuebao/Journal of Wuhan University of Technology 2008年 第7期30卷 111-115页
作者: Ye, A-Yong Ma, Jian-Feng Key Lab. of the Ministry of Education for Computer Networks and Information Security Xidian University Xi'an 710071 China Key Lab. of the Network Security and Cryptology Fujian Normal University Fuzhou 350007 China
It is essential to ensure that sensors can determine their location for wireless sensor networks. However, most of existing location discovery protocols became vulnerable in the presence of malicious attacks. So the a... 详细信息
来源: 评论
FedDRC: A Robust Federated Learning-based Android Malware Classifier under Heterogeneous Distribution
FedDRC: A Robust Federated Learning-based Android Malware Cl...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Changnan Jiang Chunhe Xia Mengyao Liu Chen Chen Huacheng Li Tianbo Wang Pengfei Li Beijing Key Lab. of Network Technology Beihang University Beijing China Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin China School of Cyber Science and Technology Beihang University Beijing China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China SNationa Innovation Center of Intelligent and Connected Vehicles Beijing China
In the traditional centralized Android malware classification framework, privacy concerns exist due to collected users’ apps containing sensitive information. A new classification framework based on Federated Learnin... 详细信息
来源: 评论
Specifying safety and liveness of semi-algebraic transition systems
收藏 引用
Journal of Computational information Systems 2015年 第2期11卷 457-465页
作者: Fu, Jun Wu, Jinzhao Tan, Hongyan Zhou, Ning School of Computer and Information Technology Beijing Jiaotong University Beijing China Guangxi Key Laboratory of Hybrid Computation and IC Design Analysis Guangxi University for Nationalities Nanning China High Performance Network Lab. Institute of Acoustics Chinese Academy of Sciences Beijing China School of Electronic and Information Engineering Lanzhou Jiaotong University Lanzhou China
We present an approach to specification of properties of semi-algebraic transition systems which are introduced as mathematical structures for modeling complex physical systems. We extend dynamic logic to the semi-alg... 详细信息
来源: 评论
AIDE: Attack Inference Based on Heterogeneous Dependency Graphs with MITRE ATT&CK
AIDE: Attack Inference Based on Heterogeneous Dependency Gra...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Weidong Zhou Chunhe Xia Nan Feng Xinyi Pan Tianbo Wang Xiaojian Li Beijing Key Lab. of Network Technology Beihang University Beijing China Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin China School of Software & Microelectronics Peking University Beijing China School of Cyber Science and Technology Beihang University Beijing China School of Computer Science and Engineering Guangxi Normal University Guilin China
The MITRE ATT&CK Framework provides a rich and actionable repository of adversarial tactics, techniques, and procedures (TTPs). By leveraging the associations among these techniques, we can infer unobserved techni... 详细信息
来源: 评论
Performance Evaluation of Modified IEEE 802.11 MAC for Multi-Channel Multi-Hop Ad Hoc networks
收藏 引用
Journal of Interconnection networks 2003年 第3期4卷 345-359页
作者: Jiandong Li Zygmunt J. Haas Min Sheng Yanhui Chen Xidian University State Key Lab. of Integrated Service Network Xi'an Shaanxi 710071 P. R. China Cornell University School of Electrical and Computer Engineering Wireless Networks Laboratory Ithaca NY 14853 USA Xidian University Information Science Institute Xi'an Shaanxi 710071 P. R. China
In this paper, the IEEE 802.11 multiple access control (MAC) protocol was modified for use in multi-channel, multi-hop ad hoc networks through the use of a new channel-status indicator. In particular, in the modified ... 详细信息
来源: 评论
Survivable storage networks and Quorum system
收藏 引用
Tongxin Xuebao/Journal on Communications 2007年 第SUPPL.期28卷 121-124页
作者: Zhang, Wei Ma, Jian-Feng Liu, Shu-Guang Wang, Chao Key Lab. of Computer Network and Information Security Xidian Univ. Xi'an 710071 China Engineering Institute of the Armed Police Xi'an 710086 China
A survivable storage architecture was provided based on an overall study of storage service survivability. It contains storage nodes, users, access control system, reliability analysis module, intrusion and fault dete... 详细信息
来源: 评论
A simulator for swarm AUVs acoustic communication networking  11
A simulator for swarm AUVs acoustic communication networking
收藏 引用
11th ACM International Conference on Underwater networks and Systems, WUWNet 2016
作者: Li, Guannan Liu, Jun Wang, Xue Xu, Hongli Cui, Jun-Hong Shenyang Institute of Automation CAS University of Chinese Academy of Sciences No. 114 Nanta Street Shenhe District Shenyang China College of Computer Science and Technology Jilin University State Key Laboratory of Robotics Key Laboratory of System Control and Information Processing Ministry of Education of China Changchun China Shenyang Institute of Automation CAS Northeast University No. 114 Nanta Street Shenhe District Shenyang China Shenyang Institute of Automation CAS No. 114 Nanta Street Shenhe District Shenyang China College of Computer Science and Technology Jilin University Changchun China Underwater Sensor Network Lab. University of Connecticut StorrsCT06269 United States
This paper presents a simulator for swarm operations designed to verify algorithms for a swarm of autonomous underwater robots (AUVs), specifically for constructing an underwater communication network with AUVs carryi... 详细信息
来源: 评论
Study on high-speed network intrusion detection based on network processor
收藏 引用
Zhongshan Daxue Xuebao/Acta Scientiarum Natralium Universitatis Sunyatseni 2006年 第SUPPL.期45卷 31-34页
作者: Li, Jia-Chun Chen, Qi-Yu Zhang, Ling Liu, Lan Computer Network Key Lab. South China University of Technology Guangzhou 510640 China Department of Electronics and Information Guangdong Polytechnic Normal University Guangzhou 510665 China
In order to improve attack detection rate and processing capability of intrusion detection system on high-speed environment, NP-NIDS: a high-speed intrusion detection system based on IXP2400 network processor is studi... 详细信息
来源: 评论