咨询与建议

限定检索结果

文献类型

  • 109 篇 会议
  • 84 篇 期刊文献

馆藏范围

  • 193 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 134 篇 工学
    • 85 篇 计算机科学与技术...
    • 67 篇 软件工程
    • 45 篇 信息与通信工程
    • 20 篇 电气工程
    • 19 篇 电子科学与技术(可...
    • 16 篇 控制科学与工程
    • 15 篇 仪器科学与技术
    • 12 篇 船舶与海洋工程
    • 10 篇 网络空间安全
    • 9 篇 机械工程
    • 7 篇 生物工程
    • 4 篇 动力工程及工程热...
    • 4 篇 安全科学与工程
    • 3 篇 光学工程
    • 3 篇 材料科学与工程(可...
    • 3 篇 交通运输工程
    • 3 篇 环境科学与工程(可...
    • 3 篇 生物医学工程(可授...
  • 59 篇 理学
    • 32 篇 数学
    • 30 篇 物理学
    • 12 篇 统计学(可授理学、...
    • 8 篇 生物学
    • 7 篇 系统科学
    • 4 篇 海洋科学
  • 33 篇 管理学
    • 26 篇 管理科学与工程(可...
    • 11 篇 图书情报与档案管...
    • 7 篇 工商管理
  • 9 篇 法学
    • 5 篇 社会学
    • 4 篇 法学
  • 3 篇 文学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 医学
  • 1 篇 哲学
  • 1 篇 艺术学

主题

  • 7 篇 data privacy
  • 7 篇 costs
  • 7 篇 blockchain
  • 6 篇 oceans
  • 6 篇 signal to noise ...
  • 6 篇 time-frequency a...
  • 6 篇 semantics
  • 6 篇 feature extracti...
  • 6 篇 security
  • 6 篇 federated learni...
  • 6 篇 accuracy
  • 6 篇 privacy
  • 5 篇 underwater acous...
  • 5 篇 protocols
  • 5 篇 cryptography
  • 4 篇 simulation
  • 4 篇 target tracking
  • 4 篇 wireless sensor ...
  • 4 篇 computational mo...
  • 4 篇 estimation

机构

  • 48 篇 college of under...
  • 23 篇 acoustic science...
  • 19 篇 the state key la...
  • 19 篇 key laboratory o...
  • 18 篇 national key lab...
  • 8 篇 state key labora...
  • 8 篇 key laboratory o...
  • 8 篇 key laboratory o...
  • 7 篇 institute of blo...
  • 7 篇 state key labora...
  • 6 篇 guilin universit...
  • 6 篇 harbin engineeri...
  • 6 篇 guizhou universi...
  • 5 篇 school of comput...
  • 5 篇 weifang universi...
  • 5 篇 college of compu...
  • 5 篇 harbin engineeri...
  • 5 篇 state key labora...
  • 4 篇 school of comput...
  • 4 篇 beijing key labo...

作者

  • 11 篇 chen yuling
  • 9 篇 qiao gang
  • 5 篇 liu zhenguang
  • 5 篇 wu yongtang
  • 5 篇 jiao yingying
  • 4 篇 yin yifang
  • 4 篇 liu songzuo
  • 4 篇 wu sifan
  • 4 篇 chen haipeng
  • 4 篇 yao yanqing
  • 3 篇 yin jingwei
  • 3 篇 yang ziqi
  • 3 篇 liu xin
  • 3 篇 li yong
  • 3 篇 xiao han
  • 3 篇 xie jinhuai
  • 3 篇 xia xin
  • 3 篇 shang zhigang
  • 3 篇 zhang haigang
  • 3 篇 qin zhan

语言

  • 183 篇 英文
  • 8 篇 其他
  • 2 篇 中文
检索条件"机构=Key Laboratory in Blockchain and Data Security by Ministry of Industry and Information Technology"
193 条 记 录,以下是91-100 订阅
排序:
Adaptive TDMA Protocol Based on LSTM Network for Underwater Acoustic Networks
Adaptive TDMA Protocol Based on LSTM Network for Underwater ...
收藏 引用
2022 IEEE International Conference on Signal Processing, Communications and Computing, ICSPCC 2022
作者: Zhang, Jucheng Xu, Jiaye Ming, Wanting Sun, Dajun Acoustic Science and Technology Laboratory Harbin Engineering University Harbin150001 China Key Laboratory of Marine Information Acquisition and Security Harbin Engineering University Ministry of Industry and Information Technology Harbin150001 China College of Underwater Acoustic Engineering Harbin Engineering University Harbin150001 China
data collision or low communication efficiency exist in communication between nodes with the long delay of data transmission in an underwater acoustic network. Therefore, a stable and efficient MAC protocol is a valua... 详细信息
来源: 评论
Passive Sonar Multi-Target Frequency Feature-Aided data Association Algorithm Based On DPGMM  11
Passive Sonar Multi-Target Frequency Feature-Aided Data Asso...
收藏 引用
11th IEEE International Conference on Computer Science and Network technology, ICCSNT 2023
作者: Wang, Zechong Teng, Tingting Harbin Engineering University Acoustic Science and Technology Laboratory Harbin150001 China Harbin Engineering University Ministry of Industry and Information Technology Key Laboratory of Marine Information Acquisition and Security Harbin150001 China College of Underwater Acoustic Engineering Harbin Engineering University Harbin150001 China
In passive sonar system, it's always a challenge to accomplish multi-target data association. We propose a remedy for this problem by using a frequency feature-aided data association algorithm to track targets'... 详细信息
来源: 评论
Ppt4j: Patch Presence Test for Java Binaries  24
Ppt4j: Patch Presence Test for Java Binaries
收藏 引用
44th ACM/IEEE International Conference on Software Engineering, ICSE 2024
作者: Pan, Zhiyuan Hu, Xing Xia, Xin Zhan, Xian Lo, David Yang, Xiaohu Zhejiang University The State Key Laboratory of Blockchain and Data Security Hangzhou China Huawei Software Engineering Application Technology Lab Hangzhou China The Hong Kong Polytechnic University Hong Kong School of Computing and Information Systems Singapore Management University Singapore
The number of vulnerabilities reported in open source software has increased substantially in recent years. security patches provide the necessary measures to protect software from attacks and vulnerabilities. In prac... 详细信息
来源: 评论
Multi-Label Text Classification for Judicial Texts via Dual Graph and Label Feature Fusion  10
Multi-Label Text Classification for Judicial Texts via Dual ...
收藏 引用
10th IEEE Smart World Congress, SWC 2024
作者: Gu, Qiliang Lu, Qin Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
The legal judgement prediction (LJP) of judicial texts represents a multi-label text classification (MLTC) problem, which in turn involves three distinct tasks: the prediction of charges, legal articles, and terms of ... 详细信息
来源: 评论
What's the Real: A Novel Design Philosophy for Robust AI-Synthesized Voice Detection  24
What's the Real: A Novel Design Philosophy for Robust AI-Syn...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Hai, Xuan Liu, Xin Tan, Yuan Liu, Gang Li, Song Niu, Weina Zhou, Rui Zhou, Xiaokang School of Information Science and Engineering Lanzhou University Lanzhou China The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China Faculty of Business Data Science Kansai University Osaka Japan
Voice is one of the most widely used media for information transmission in human society. While high-quality synthetic voices are extensively utilized in various applications, they pose significant risks to content se... 详细信息
来源: 评论
A multiple sensitive attributes data publishing method with guaranteed information utility
收藏 引用
CAAI Transactions on Intelligence technology 2023年 第2期8卷 288-296页
作者: Haibin Zhu Tong Yi Songtao Shang Minyong Shi Zhucheng Li Wenqian Shang Department of Computer Science and Mathematics Nipissing UniversityNorth BayOntarioCanada Key Lab of Education Blockchain and Intelligent Technology Ministry of EducationGuangxi Normal UniversityGuilinChina Guangxi Key Lab of Multi‐Source Information Mining and Security Guangxi Normal UniversityGuilinChina School of Computer and Communication Engineering Zhengzhou University of Light IndustryZhengzhouChina School of Computer Science Communication University of ChinaBeijingChina Business College Beijing Union UniversityBeijingChina
data publishing methods can provide available information for analysis while preserving *** multiple sensitive attributes data publishing,which preserves the relationship between sensitive attributes,may keep many rec... 详细信息
来源: 评论
Differentially Private Generative Model with Ratio-Based Gradient Clipping  4th
Differentially Private Generative Model with Ratio-Based Gr...
收藏 引用
4th International Conference on Machine Learning for Cyber security, ML4CS 2022
作者: Lin, Jianchen Yao, Yanqing State Key Laboratory of Software Development Environment Beihang University Beijing100191 China State Key Laboratory of Cryptology Beijing100878 China Key Laboratory of Aerospace Network Security Ministry of Industry and Information Technology School of Cyber Science and Technology Beihang University Beijing100191 China State Grid Fujian Fuzhou350100 China
As a branch of deep learning, conditional Generative Adversarial Net (cGAN) has achieved remarkable results in target-oriented image generation, but the process of training the model lacks privacy guarantee. Different... 详细信息
来源: 评论
Improved Density-Based data Association Method Under Azimuth Rate Constraint
Improved Density-Based Data Association Method Under Azimuth...
收藏 引用
2024 OES China Ocean Acoustics, COA 2024
作者: Qi, Bin Hui, Chenxin Hao, Yu Li, Xiang Mathiopoulos, P. Takis Harbin Engineering University National Key Laboratory of Underwater Acoustic Technology Harbin150001 China Ministry of Industry and Information Technology Key Laboratory of Marine Information Acquisition and Security Harbin150001 China College of Underwater Acoustic Engineering Harbin Engineering University Harbin150001 China National and Kapodistrian University of Athens Department of Informatics and Telecommunications Greece
Passive sonar has been extensively researched in recent years. However, bearing-only tracking faces significant challenges because passive detection only provides target information. Traditional algorithms estimate ta... 详细信息
来源: 评论
Cross-modality information Check for Detecting Jailbreaking in Multimodal Large Language Models
arXiv
收藏 引用
arXiv 2024年
作者: Xu, Yue Qi, Xiuyuan Qin, Zhan Wang, Wenjie School of Information Science and Technology ShanghaiTech University China The State Key Laboratory of Blockchain and Data Security Zhejiang University China
Multimodal Large Language Models (MLLMs) extend the capacity of LLMs to understand multimodal information comprehensively, achieving remarkable performance in many vision-centric tasks. Despite that, recent studies ha... 详细信息
来源: 评论
Semisupervised Encrypted Traffic Identification Based on Auxiliary Classification Generative Adversarial Network
收藏 引用
Computer Systems Science & Engineering 2021年 第12期39卷 373-390页
作者: Jiaming Mao Mingming Zhang Mu Chen Lu Chen Fei Xia Lei Fan ZiXuan Wang Wenbing Zhao State Grid Jiangsu Electric Power Co. Ltd.Information and Telecommunication BranchNanJing210003China Institute of Information and Communication Global Energy Interconnection Research InstituteState Grid Key Laboratory of Information and Network SecurityNanjing210003China Engineering Research Center of Post Big Data Technology and Application of Jiangsu Province Research and Development Center of Post Industry Technology of the State Posts Bureau(Internet of Things Technology)Broadband Wireless Communication Technology Engineering Research Center of the Ministry of EducationNanjing University of Posts and TelecommunicationsNanjing210003China Department of Electrical Engineering and Computer Science Cleveland State UniversityCleveland44115USA
The rapidly increasing popularity of mobile devices has changed the methods with which people access various network services and increased net-work traffic *** the past few decades,network traffic identification has ... 详细信息
来源: 评论