咨询与建议

限定检索结果

文献类型

  • 223 篇 会议
  • 209 篇 期刊文献

馆藏范围

  • 432 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 295 篇 工学
    • 238 篇 计算机科学与技术...
    • 187 篇 软件工程
    • 78 篇 信息与通信工程
    • 55 篇 电气工程
    • 43 篇 控制科学与工程
    • 34 篇 生物工程
    • 22 篇 电子科学与技术(可...
    • 15 篇 机械工程
    • 15 篇 光学工程
    • 12 篇 交通运输工程
    • 11 篇 化学工程与技术
    • 11 篇 生物医学工程(可授...
    • 11 篇 网络空间安全
    • 9 篇 建筑学
    • 7 篇 仪器科学与技术
    • 7 篇 动力工程及工程热...
    • 7 篇 土木工程
    • 7 篇 安全科学与工程
  • 128 篇 理学
    • 70 篇 数学
    • 36 篇 生物学
    • 27 篇 物理学
    • 24 篇 统计学(可授理学、...
    • 11 篇 系统科学
    • 10 篇 化学
  • 74 篇 管理学
    • 40 篇 管理科学与工程(可...
    • 37 篇 图书情报与档案管...
    • 11 篇 工商管理
  • 14 篇 法学
    • 10 篇 社会学
  • 9 篇 医学
    • 8 篇 临床医学
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 2 篇 军事学
  • 1 篇 教育学

主题

  • 19 篇 feature extracti...
  • 17 篇 semantics
  • 15 篇 machine learning
  • 13 篇 contrastive lear...
  • 12 篇 privacy
  • 11 篇 graph neural net...
  • 11 篇 training
  • 10 篇 deep learning
  • 10 篇 optimization
  • 8 篇 task analysis
  • 8 篇 anomaly detectio...
  • 8 篇 federated learni...
  • 7 篇 conferences
  • 7 篇 sensors
  • 7 篇 forecasting
  • 6 篇 data privacy
  • 6 篇 speech processin...
  • 6 篇 neural networks
  • 6 篇 data mining
  • 6 篇 computational mo...

机构

  • 54 篇 school of comput...
  • 39 篇 jiangsu key labo...
  • 37 篇 jiangsu key labo...
  • 30 篇 jiangsu key labo...
  • 20 篇 key laboratory o...
  • 16 篇 jiangsu key labo...
  • 15 篇 school of cyber ...
  • 13 篇 chongqing key la...
  • 11 篇 school of comput...
  • 10 篇 nanjing universi...
  • 10 篇 key laboratory o...
  • 9 篇 key lab. of inte...
  • 9 篇 south china univ...
  • 9 篇 nanjing universi...
  • 9 篇 school of cybers...
  • 9 篇 state key labora...
  • 9 篇 peng cheng labor...
  • 8 篇 key laboratory o...
  • 8 篇 school of comput...
  • 8 篇 chongqing key la...

作者

  • 36 篇 xu xiaolong
  • 26 篇 xiaolong xu
  • 20 篇 wang guoyin
  • 16 篇 huang qingming
  • 16 篇 xu qianqian
  • 11 篇 yang zhiyong
  • 11 篇 tao li
  • 10 篇 xia shuyin
  • 10 篇 liu jun
  • 10 篇 cao xiaochun
  • 8 篇 xiao bin
  • 8 篇 jia xu
  • 8 篇 yun li
  • 7 篇 chen ke-jia
  • 7 篇 zou zhiqiang
  • 7 篇 xuemiao xu
  • 7 篇 shengfeng he
  • 7 篇 xu jia
  • 7 篇 lijie xu
  • 6 篇 lei wang

语言

  • 372 篇 英文
  • 58 篇 其他
  • 2 篇 中文
检索条件"机构=Key Laboratory of Cyberspace Big Data Intelligent Security"
432 条 记 录,以下是331-340 订阅
排序:
CABAC: A content-driven attribute-based access control model for big data  5th
CABAC: A content-driven attribute-based access control model...
收藏 引用
5th International Conference on Artificial Intelligence and security, ICAIS 2019
作者: Ma, Ke Yang, Geng Nanjing University of Posts and Telecommunications Nanjing210023 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing210023 China
In recent years, attribute-based access control (ABAC) models have been widely used in big data and cloud computing. However, with the growing importance of data content, using data content to assist authorization for... 详细信息
来源: 评论
FortisAVQA and MAVEN: a Benchmark dataset and Debiasing Framework for Robust Multimodal Reasoning
arXiv
收藏 引用
arXiv 2025年
作者: Ma, Jie Gao, Zhitao Chai, Qi Liu, Jun Wang, Pinghui Tao, Jing Su, Zhou Ministry of Education of Key Laboratory for Intelligent Networks and Network Security School of Cyber Science and Engineering Xi’an Jiaotong University Shaanxi Xi’an710049 China Shannxi Provincial Key Laboratory of Big Data Knowledge Engineering School of Computer Science and Technology Xi’an Jiaotong University Shaanxi Xi’an710049 China Guangdong Guangzhou510000 China
Audio-Visual Question Answering (AVQA) is a challenging multimodal reasoning task requiring intelligent systems to answer natural language queries based on paired audio-video inputs accurately. However, existing AVQA ...
来源: 评论
ABlockchain-enabled Efficient and Fair Energy Trading Schemes in Industrial Internet of Things
ABlockchain-enabled Efficient and Fair Energy Trading Scheme...
收藏 引用
IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC)
作者: Jianwen Hu Yuling Chen Xiaoiun Ren Yixian Yang Xiaobin Qian State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang China Blockchain Laboratory of Agricultural Vegetables Weifang University of Science and Technology Weifang China School of Cyberspace Security Beijing University of Posts and Telecommnuications Beijing China Guizhou CoVision Science & Technology Co. Ltd Guiyang China
As the technical support of the Industrial Internet of Things, blockchain technology has been widely used in energy trading, data transactions, and Internet of Vehicles. However, among the existing energy trading mode... 详细信息
来源: 评论
MTSS: multi-path traffic scheduling mechanism based on SDN
收藏 引用
Journal of Systems Engineering and Electronics 2019年 第5期30卷 974-984页
作者: XU Xiaolong CHEN Yun HU Liuyun KUMAR Anup Jiangsu Key Laboratory of Big Data Security&Intelligent Processing Nanjing University of Posts and TelecommunicationsNanjing 210023China Institute of Big Data Research at Yancheng Nanjing University of Posts and TelecommunicationsYancheng 224000China School of Computer Science Nanjing University of Posts and TelecommunicationsNanjing 210023China Department of Computer Engineering and Computer Science University of LouisvilleLouisville KY40292USA
Large-scale and diverse businesses based on the cloud computing platform bring the heavy network traffic to cloud data ***,the unbalanced workload of cloud data center network easily leads to the network congestion,th... 详细信息
来源: 评论
Attribute-Based Searchable Encryption Scheme Supporting Efficient Range Search in Cloud Computing
Attribute-Based Searchable Encryption Scheme Supporting Effi...
收藏 引用
IEEE Conference on Dependable and Secure Computing
作者: Yuan Li Haiyan Wang Shulan Wang Yong Ding College of Computer Science and Software Engineering Shenzhen University Shenzhen P. R. China Peng Cheng Laboratory Cyberspace Security Research Center Shenzhen P. R. China College of Big Data and Internet Shenzhen Technology University Shenzhen P. R. China Guangxi Key Laboratory of Cryptography Information Security Guilin P. R. China
With the widespread application of cloud computing technology, data privacy security problem becomes more serious. The recent studies related to searchable encryption (SE) area have shown that the data owners can shar... 详细信息
来源: 评论
Software Defect Prediction via Deep Belief Network
收藏 引用
Chinese Journal of Electronics 2019年 第5期28卷 925-932页
作者: WEI Hua SHAN Chun HU Changzhen ZHANG Yu YU Xiao School of Computer Science and Technology Beijing Institute of Technology China Information Technology Security Evaluation Center Beijing Key Laboratory of Software Security Engineering Technology Beijing Institute of Technology School of Electrical and Information Engineering and Beijing Key Laboratory of Intelligent Processing for Building Big Data Beijing University of Civil Engineering and Architecture State Key Laboratory in China for Geomechanics and Deep Underground Engineering (Beijing) China University of Mining and Technology School of Computer Science and Technology Shandong University of Technology
Defect distribution prediction is a meaningful topic because software defects are the fundamental cause of many attacks and data loss. Building accurate prediction models can help developers find bugs and prioritize t... 详细信息
来源: 评论
A location data protection protocol based on differential privacy
A location data protection protocol based on differential pr...
收藏 引用
IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC)
作者: Ping Guo Baopeng Ye Yuling Chen Tao Li Yixian Yang Xiaobin Qian State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang China Information Technology Innovation Service Center of Guizhou Province Guiyang China School of Cyberspace Security Beijing University of Posts and Telecommnuications Beijing China Guizhou CoVision Science &Technology Co. Ltd Guiyang China
Location-based services (LBS) is geo-location-based a mobile information service based on spatial location that adopts wireless positioning, GIS, Internet, wireless communication, database and other related technologi... 详细信息
来源: 评论
A Tutorial on Movable Antennas for Wireless Networks
arXiv
收藏 引用
arXiv 2025年
作者: Zhu, Lipeng Ma, Wenyan Mei, Weidong Zeng, Yong Wu, Qingqing Ning, Boyu Xiao, Zhenyu Shao, Xiaodan Zhang, Jun Zhang, Rui Department of Electrical and Computer Engineering National University of Singapore Singapore117583 Singapore Chengdu611731 China National Mobile Communications Research Laboratory Frontiers Science Center for Mobile Information Communication and Security Southeast University Nanjing210096 China Purple Mountain Laboratories Nanjing211111 China Department of Electronic Engineering Shanghai Jiao Tong University Shanghai200240 China School of Electronic and Information Engineering Beihang University Beijing100191 China Department of Electrical and Computer Engineering University of Waterloo WaterlooONN2L 3G1 Canada State Key Laboratory of CNS/ATM MIIT Key Laboratory of Complex-field Intelligent Sensing Beijing Institute of Technology Beijing100081 China School of Science and Engineering Shenzhen Research Institute of Big Data The Chinese University of Hong Kong Guangdong Shenzhen518172 China
Movable antenna (MA) has been recognized as a promising technology to enhance the performance of wireless communication and sensing by enabling antenna movement. Such a significant paradigm shift from conventional fix... 详细信息
来源: 评论
A De-swinging Scheme in Location Privacy Protection via Smart Contract
A De-swinging Scheme in Location Privacy Protection via Smar...
收藏 引用
IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC)
作者: Manxiang Yang Baopeng Ye Yuling Chen Tao Li Yixian Yang Xiaobin Qian State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang China Information Technology Innovation Service Center of Guizhou Province Guiyang China School of Cyberspace Security Beijing University of Posts and Telecommnuications Beijing China Guizhou CoVision Science & Technology Co. Ltd Guiyang China
There are some problems such as behavior deception and service swing while utilizing distributed k-anonymity technology to construct an anonymous domain. If the malicious nodes submit a false location coordinate to ta... 详细信息
来源: 评论
Community-based message forwarding in mobile social networks
Community-based message forwarding in mobile social networks
收藏 引用
2019 International Conference on Advances in Computer Technology, Information Science and Communications, CTISC 2019
作者: Chen, Zhiming Xiang, Yang School of Computer Nanjing University of Posts and Telecommunications Nanjing210023 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing210023 China
With the popularity of various smart devices and the application of sensor network technology, message transmission using mobile devices is becoming widespread. This paper focuses on the forwarding in mobile social ne... 详细信息
来源: 评论