咨询与建议

限定检索结果

文献类型

  • 70 篇 会议
  • 62 篇 期刊文献

馆藏范围

  • 132 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 97 篇 工学
    • 80 篇 计算机科学与技术...
    • 65 篇 软件工程
    • 22 篇 信息与通信工程
    • 17 篇 电气工程
    • 15 篇 控制科学与工程
    • 8 篇 电子科学与技术(可...
    • 7 篇 生物工程
    • 5 篇 光学工程
    • 5 篇 建筑学
    • 5 篇 生物医学工程(可授...
    • 4 篇 土木工程
    • 4 篇 安全科学与工程
    • 4 篇 网络空间安全
    • 3 篇 机械工程
    • 3 篇 化学工程与技术
    • 3 篇 交通运输工程
  • 32 篇 理学
    • 19 篇 数学
    • 9 篇 统计学(可授理学、...
    • 8 篇 生物学
    • 7 篇 物理学
    • 3 篇 系统科学
  • 24 篇 管理学
    • 17 篇 管理科学与工程(可...
    • 8 篇 图书情报与档案管...
    • 4 篇 工商管理
  • 8 篇 法学
    • 6 篇 法学
    • 2 篇 社会学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 4 篇 医学
    • 4 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 公共卫生与预防医...
  • 1 篇 军事学

主题

  • 7 篇 federated learni...
  • 6 篇 optimization
  • 5 篇 data privacy
  • 5 篇 speech processin...
  • 5 篇 blockchain
  • 5 篇 sensors
  • 5 篇 privacy
  • 4 篇 compressed sensi...
  • 4 篇 deep learning
  • 4 篇 magnetic resonan...
  • 4 篇 anomaly detectio...
  • 4 篇 signal processin...
  • 4 篇 contrastive lear...
  • 4 篇 smart contract
  • 4 篇 differential pri...
  • 4 篇 granular computi...
  • 4 篇 data models
  • 4 篇 deep reinforceme...
  • 3 篇 simulation
  • 3 篇 wireless communi...

机构

  • 14 篇 key laboratory o...
  • 11 篇 school of cybers...
  • 9 篇 state key labora...
  • 8 篇 key laboratory o...
  • 8 篇 chongqing key la...
  • 6 篇 school of data s...
  • 6 篇 school of cybers...
  • 6 篇 chongqing key la...
  • 5 篇 state key labora...
  • 5 篇 school of comput...
  • 5 篇 inner mongolia k...
  • 4 篇 institute for ne...
  • 4 篇 key laboratory o...
  • 4 篇 chongqing key la...
  • 4 篇 college of compu...
  • 4 篇 college of compu...
  • 4 篇 school of cyber ...
  • 4 篇 college of compu...
  • 3 篇 zhejiang univers...
  • 3 篇 key laboratory o...

作者

  • 15 篇 wang guoyin
  • 8 篇 xia shuyin
  • 8 篇 xiao bin
  • 6 篇 yuling chen
  • 6 篇 yixian yang
  • 6 篇 li weisheng
  • 6 篇 chen yuling
  • 6 篇 tao li
  • 5 篇 li leixiao
  • 5 篇 qiao xiaoyu
  • 5 篇 weisheng li
  • 5 篇 wan jianxiong
  • 5 篇 huang yuping
  • 4 篇 guoyin wang
  • 4 篇 yang lijian
  • 4 篇 xiaobin qian
  • 4 篇 bin xiao
  • 4 篇 zhang qinghua
  • 4 篇 liu chuyi
  • 3 篇 yuping huang

语言

  • 119 篇 英文
  • 12 篇 其他
  • 1 篇 中文
检索条件"机构=Key Laboratory of Cyberspace and Data Security"
132 条 记 录,以下是91-100 订阅
排序:
Violence Detection In Videos via Motion-Guided Global and Local Views
Violence Detection In Videos via Motion-Guided Global and Lo...
收藏 引用
IEEE International Conference on data Science in cyberspace (DSC)
作者: Ning Su Lijuan Sun Yutong Gao Jingchen Wu Xu Wu Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education School of Cyberspace Security BUPT School of Economics and Management Beijing University of Posts and Telecommunications Beijing China Beijing Key Lab of Traffic Data Analysis and Mining Beijing Jiaotong University Beijing China School of Computer Science (National Pilot Software Engineering School) BUPT
Video violence detection aims to locate the time window in which violent behavior occurs. Most methods focus on utilizing RGB features directly or only fusing RGB and audio features, ignoring the effective exploitatio...
来源: 评论
Exfiltration-resistant Proxy Re-Encryption for IoT data Sharing in Unreliable Clouds
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Zhou, Yuyang Zhao, Liang Li, Fagen Takagi, Tsuyoshi School of Cyberspace Security Hainan University Haikou570000 China Department of Mathematical Informatics Graduate School of Information Science and Technology The university of Tokyo Tokyo113-8656 Japan School of Cyber Science and Engineering Sichuan University Chengdu610065 China Key Laboratory of Data Protection and Intelligent Management [Sichuan University Ministry of Education China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu611731 China
The sharing of Internet of Things (IoT) data plays an extensive role in our everyday lives. Exploring secure and efficient methods for data sharing is a prominent area of research. Proxy re-encryption (PRE) in the clo... 详细信息
来源: 评论
A SCATC-Based Blockchain Index Structure  14th
A SCATC-Based Blockchain Index Structure
收藏 引用
14th EAI International Conference on Mobile Multimedia Communications, Mobimedia 2021
作者: Xing, Xiaogang Chen, Yuling Li, Tao Xin, Yang Sun, Hongwei State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang550025 China School of Cyberspace Security Beijing University of Posts and Telecommunications Beijing100876 China National Engineering Laboratory for Disaster Backup Recovery Beijing100876 China Blockchain Laboratory of Agricultural Vegetables Weifang University of Science and Technology WeiFang262700 China
Blockchain technology has the characteristics of decentralization and tamper resistance, which can store data safely and reduce the cost of trust effectively. However, the existing blockchain system has weak performan... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Zhen Li Ning Wang Deqing Zou Yating Li Ruqian Zhang Shouhuai Xu Chao Zhang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jin YinHu Laboratory Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado Springs Colorado USA Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
arXiv
收藏 引用
arXiv 2024年
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado SpringsCO United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab China JinYinHu Laboratory Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
Semantic and Emotional Dual Channel for Emotion Recognition in Conversation
收藏 引用
IEEE Transactions on Affective Computing 2025年
作者: Yang, Zhenyu Zhang, Zhibo Cheng, Yuhu Zhang, Tong Wang, Xuesong Jinan250353 China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250353 China China University of Mining and Technology Engineering Research Center of Intelligent Control for Underground Space Ministry of Education Xuzhou Key Laboratory of Artificial Intelligence and Big Data School of Information and Control Engineering Xuzhou221116 China South China University of Technology Guangdong Provincial Key Laboratory of Computational Intelligence and Cyberspace Information School of Computer Science and Engineering Guangzhou510006 China Pazhou Lab Guangzhou510335 China Engineering Research Center Ministry of Education on Health Intelligent Perception and Paralleled Digital-Human Guangzhou China
Emotion recognition in conversation (ERC) aims at accurately identifying emotional states expressed in conversational content. Existing ERC methods, although relying on semantic understanding, often encounter challeng... 详细信息
来源: 评论
Cloud-assisted Road Condition Monitoring with Privacy Protection in VANETs
Cloud-assisted Road Condition Monitoring with Privacy Protec...
收藏 引用
International Conference on Mobile Ad-hoc and Sensor Networks, MSN
作者: Lemei Da Yujue Wang Yong Ding Bo Qin Xiaochun Zhou Hai Liang Huiyong Wang Guangxi Key Laboratory of Cryptography and Information Security School of Computer Science and Information Security Guilin University of Electronic Technology Guilin China Pengcheng Laboratory Cyberspace Security Research Center Shenzhen China Key Laboratory of Data Engineering and Knowledge Engineering Ministry of Education School of Information Renmin University of China Beijing China Shenzhen Olym Information Security Technology Co. Ltd. Shenzhen China School of Mathematics and Computing Science Guilin University of Electronic Technology Guilin China
Vehicular ad hoc network (VANET) is one of the fastest developing technologies in intelligent transportation systems (ITS), which has made great contributions to improving traffic congestion and reducing traffic accid... 详细信息
来源: 评论
Which DGA family does a malicious domain name belong to  5
Which DGA family does a malicious domain name belong to
收藏 引用
5th IEEE International Conference on data Science in cyberspace, DSC 2020
作者: Zhang, Yunyi Wu, Yuelong Jin, Shuyuan Yat-sen University School of Data and Computer Science Sun Guangzhou China Cyberspace Security Research Center Peng Cheng Laboratory Shenzhen China GuangDong Key Laboratory of Information Security Technology Sun Yat-set University Guangzhou China
The Domain Generation Algorithm (DGA) is a technology that generates a large amount of domains in a short time, commonly applied to malware by malicious attackers to circumvent the security mechanisms, such as domain ... 详细信息
来源: 评论
Mixed Attention Densely Residual Network for Single Image Super-Resolution
收藏 引用
Computer Systems Science & Engineering 2021年 第10期39卷 133-146页
作者: Jingjun Zhou Jing Liu Jingbing Li Mengxing Huang Jieren Cheng Yen-Wei Chen Yingying Xu Saqib Ali Nawaz School of Information and Communication Engineering Hainan UniversityHaikou570228China State Key Laboratory of Marine Resource Utilization in the South China Sea Hainan UniversityHaikou570228China Research Center for Healthcare Data Science Zhejiang LabHangzhou311121China School of Computer Science and Cyberspace Security Hainan UniversityHaikou570228China Graduate School of Information Science and Engineering Ritsumeikan University5258577Japan College of Computer Science and Technology Zhejiang UniversityHangzhou311100China
Recent applications of convolutional neural networks(CNNs)in single image super-resolution(SISR)have achieved unprecedented ***,existing CNN-based SISR network structure design consider mostly only channel or spatial ... 详细信息
来源: 评论
Traffic Engineering in Dynamic Hybrid Segment Routing Networks
收藏 引用
Computers, Materials & Continua 2021年 第7期68卷 655-670页
作者: Yingya Guo Kai Huang Cheng Hu Jiangyuan Yao Siyu Zhou College of Mathematics and Computer Science Fuzhou UniversityFuzhou350000China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou UniversityFuzhou350000China Key Laboratory of Spatial Data Mining&Information Sharing Ministry of EducationFuzhou350003China School of Information Science and Technology Guangdong University of Foreign StudiesGuangzhou510006China School of Computer Science and Cyberspace Security Hainan UniversityHaiKou570228China Tandon School of Engineering New York UniversityNew York10012USA Department of Computing Hong Kong Polytechnic UniversityHong Hom999077Hong Kong
The emergence of Segment Routing(SR)provides a novel routing paradigm that uses a routing technique called source packet *** SR architecture,the paths that the packets choose to route on are indicated at the ingress *... 详细信息
来源: 评论