咨询与建议

限定检索结果

文献类型

  • 12 篇 期刊文献
  • 1 篇 会议

馆藏范围

  • 13 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11 篇 工学
    • 9 篇 计算机科学与技术...
    • 7 篇 软件工程
    • 2 篇 光学工程
    • 2 篇 信息与通信工程
    • 2 篇 轻工技术与工程
    • 2 篇 生物医学工程(可授...
    • 2 篇 网络空间安全
    • 1 篇 冶金工程
    • 1 篇 电气工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 控制科学与工程
    • 1 篇 建筑学
    • 1 篇 土木工程
    • 1 篇 生物工程
  • 3 篇 理学
    • 2 篇 数学
    • 1 篇 生物学
    • 1 篇 统计学(可授理学、...
  • 3 篇 管理学
    • 2 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...

主题

  • 2 篇 feature selectio...
  • 1 篇 reverse influenc...
  • 1 篇 adaptive autoenc...
  • 1 篇 ddos attack
  • 1 篇 lstm
  • 1 篇 dynamic subgraph
  • 1 篇 full space
  • 1 篇 positive influen...
  • 1 篇 multi-layer perc...
  • 1 篇 convolution
  • 1 篇 metabolites
  • 1 篇 vae
  • 1 篇 efficient reflec...
  • 1 篇 multi-functional...
  • 1 篇 information deca...
  • 1 篇 cnn
  • 1 篇 broadband transm...
  • 1 篇 generating adver...
  • 1 篇 graph convolutio...
  • 1 篇 hash functions

机构

  • 8 篇 heilongjiang key...
  • 7 篇 college of compu...
  • 2 篇 1. school of com...
  • 2 篇 college of teach...
  • 1 篇 state key labora...
  • 1 篇 school of comput...
  • 1 篇 institute for cr...
  • 1 篇 school of comput...
  • 1 篇 school of comput...
  • 1 篇 school of mathem...
  • 1 篇 leme upl univers...
  • 1 篇 advanced microsc...
  • 1 篇 school of china ...
  • 1 篇 qiqihar universi...
  • 1 篇 key laboratory o...
  • 1 篇 college of infor...
  • 1 篇 heilongjiang key...
  • 1 篇 xi'an jiaotong u...
  • 1 篇 huzhou universit...
  • 1 篇 department of mi...

作者

  • 3 篇 haizhen wang
  • 2 篇 zuozheng lian
  • 2 篇 zhang fengshan
  • 2 篇 shuangshuang yan...
  • 2 篇 pan haizhu
  • 2 篇 yu xiaomin
  • 2 篇 yang zixin
  • 2 篇 wenlong zhu
  • 2 篇 na jia
  • 2 篇 zhang guangda
  • 2 篇 yu miao
  • 2 篇 xi xiaotian
  • 2 篇 ge haimiao
  • 2 篇 li jingyou
  • 1 篇 chongyuan peng
  • 1 篇 yu xiaokun
  • 1 篇 谢文静
  • 1 篇 wang liguo
  • 1 篇 liu hongyan
  • 1 篇 zhang chunyu

语言

  • 12 篇 英文
  • 1 篇 中文
检索条件"机构=Key Laboratory of Big Data Network Security Detection and Analysis in Heilongjiang"
13 条 记 录,以下是1-10 订阅
排序:
Optimizing Indoor network Element Layout for Enhanced Signal Coverage and security in Location-Based Services  7th
Optimizing Indoor Network Element Layout for Enhanced Signa...
收藏 引用
7th International Conference on Attacks and Defenses for Internet-of-Things, ADIoT 2024
作者: Yu, Xiaomin Yu, Xiaokun College of Computer and Control Engineering Qiqihar University Qiqihar China Heilongjiang Key Laboratory of Big Data Network Security Detection and Analysis Qiqihar University Qiqihar China Heilongjiang Jiaotong Polytechnic Qiqihar China
Recently, with the rapid development of communication technology, location-based services (LBS) in indoor environments have penetrated into various aspects of people’s daily lives. Wireless local area networks (WLAN)... 详细信息
来源: 评论
PyionNet: Pyramid Progressive Cross-Fusion network for Joint Classification of Hyperspectral and LiDAR data
收藏 引用
IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing 2025年 18卷 12042-12058页
作者: Pan, Haizhu Zhang, Quanxiu Ge, Haimiao Liu, Moqi Shi, Cuiping Qiqihar University College of Computer and Control Engineering Qiqihar161000 China Qiqihar University Heilongjiang Key Laboratory of Big Data Network Security Detection and Analysis Qiqihar161000 China Xi'an Jiaotong University School of Information and Communications Engineering Shanxi Xi'an710049 China Huzhou University College of Information Engineering Huzhou313000 China
Joint hyperspectral (HS) and Light detection and Ranging (LiDAR) data for land cover classification have received widespread attention. Nevertheless, existing methods often struggle with multi-scale feature extraction... 详细信息
来源: 评论
A novel quantum multiparty summation protocol based on a cooperative random number mechanism
收藏 引用
EPJ Quantum Technology 2025年 第1期12卷 1-19页
作者: Zhang, Kejia Zhang, Yu Zhang, Xue Liu, Hongyan Song, Tingting Du, Gang School of Computer Science and Big Data (School of Cybersecurity) Heilongjiang University Harbin China State Key Laboratory of Public Big Data Guizhou University Guiyang China School of Mathematical Science Heilongjiang University Harbin China Institute for Cryptology and Network Security Heilongjiang University Harbin China School of China Construction Bank University Northeastern Institute Harbin China College of Information Science and Technology Jinan University Guangzhou China
As a particular area of quantum security multiparty computation, quantum secure multiparty summation plays a critical role in modern cryptography. It is widely known that most of the existing quantum summation protoco...
来源: 评论
Predicting metabolite-disease associations based on dynamic adaptive feature learning architecture
收藏 引用
Computer Methods and Programs in Biomedicine 2025年 268卷 108867-108867页
作者: Wang, Bo Liu, Shiyu Du, Xiaoxin Zang, Jianfei Zhang, Chunyu Yang, Xue He, Yang School of Computer and Control Engineering Qiqihar University Qiqihar 161006 PR China Heilongjiang Key Laboratory of Big Data Network Security Detection and Analysis Qiqihar University Qiqihar 161006 PR China
AbstractBackground and ObjectiveIn recent years, the association between metabolites and complex human diseases has increasingly been recognized as a major research focus. Traditional wet-lab experiments are considere... 详细信息
来源: 评论
A New Encrypted Traffic Identification Model Based on VAE-LSTM-DRN
收藏 引用
Computers, Materials & Continua 2024年 第1期78卷 569-588页
作者: Haizhen Wang Jinying Yan Na Jia College of Computer and Control Engineering Qiqihar UniversityQiqihar161006China Heilongjiang Key Laboratory of Big Data Network Security Detection and Analysis Qiqihar UniversityQiqiharChina
Encrypted traffic identification pertains to the precise acquisition and categorization of data from traffic datasets containing imbalanced and obscured *** extraction of encrypted traffic attributes and their subsequ... 详细信息
来源: 评论
Recommendation System Based on Perceptron and Graph Convolution network
收藏 引用
Computers, Materials & Continua 2024年 第6期79卷 3939-3954页
作者: Zuozheng Lian Yongchao Yin Haizhen Wang College of Computer and Control Engineering Qiqihar UniversityQiqihar161006China Heilongjiang Key Laboratory of Big Data Network Security Detection and Analysis Qiqihar UniversityQiqihar161006China
The relationship between users and items,which cannot be recovered by traditional techniques,can be extracted by the recommendation algorithm based on the graph convolution *** current simple linear combination of the... 详细信息
来源: 评论
A DDoS Identification Method for Unbalanced data CVWGG
收藏 引用
Computers, Materials & Continua 2024年 第12期81卷 3825-3851页
作者: Haizhen Wang Na Jia Yang He Pan Tan College of Computer and Control Engineering Qiqihar UniversityQiqihar161006China Heilongjiang Key Laboratory of Big Data Network Security Detection and Analysis Qiqihar UniversityQiqihar161006China
As the popularity and dependence on the Internet increase,DDoS(distributed denial of service)attacks seriously threaten network *** accurately distinguishing between different types of DDoS attacks,targeted defense st... 详细信息
来源: 评论
Multi-scale hierarchical cross fusion network for hyperspectral image and LiDAR classification
收藏 引用
Journal of the Franklin Institute 2025年 第9期362卷
作者: Pan, Haizhu Li, Xuehu Ge, Haimiao Wang, Liguo Yu, Xiaomin College of Computer and Control Engineering Qiqihar University Qiqihar161000 China Heilongjiang Key Laboratory of Big Data Network Security Detection and Analysis Qiqihar University Qiqihar161000 China College of Information and Communication Engineering Dalian Nationalities University Dalian116000 China
As the satellite sensor technology continues to advance, acquiring hyperspectral images (HSI) and Light detection and Ranging (LiDAR) data have become increasingly accessible. Consequently, the fusion of these two typ... 详细信息
来源: 评论
Maximizing Influence in Temporal Social networks:A Node Feature-Aware Voting Algorithm
收藏 引用
Computers, Materials & Continua 2023年 第12期77卷 3095-3117页
作者: Wenlong Zhu Yu Miao Shuangshuang Yang Zuozheng Lian Lianhe Cui College of Computer and Control Engineering Qiqihar UniversityQiqihar161006China Heilongjiang Key Laboratory of Big Data Network Security Detection and Analysis Qiqihar UniversityQiqihar161006China College of Teacher Education Qiqihar UniversityQiqihar161006China
Influence Maximization(IM)aims to select a seed set of size k in a social network so that information can be spread most widely under a specific information propagation model through this set of ***,most existing stud... 详细信息
来源: 评论
A Positive Influence Maximization Algorithm in Signed Social networks
收藏 引用
Computers, Materials & Continua 2023年 第8期76卷 1977-1994页
作者: Wenlong Zhu Yang Huang Shuangshuang Yang Yu Miao Chongyuan Peng College of Computer and Control Engineering Qiqihar UniversityQiqihar161006China Heilongjiang Key Laboratory of Big Data Network Security Detection and Analysis Qiqihar UniversityQiqihar161006China College of Teacher Education Qiqihar UniversityQiqihar161006China
The influence maximization(IM)problem aims to find a set of seed nodes that maximizes the spread of their influence in a social *** positive influence maximization(PIM)problem is an extension of the IM problem,which c... 详细信息
来源: 评论