咨询与建议

限定检索结果

文献类型

  • 713 篇 会议
  • 485 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,199 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 719 篇 工学
    • 466 篇 计算机科学与技术...
    • 395 篇 软件工程
    • 236 篇 信息与通信工程
    • 129 篇 电气工程
    • 110 篇 控制科学与工程
    • 89 篇 电子科学与技术(可...
    • 64 篇 生物工程
    • 41 篇 机械工程
    • 39 篇 仪器科学与技术
    • 35 篇 光学工程
    • 32 篇 生物医学工程(可授...
    • 30 篇 动力工程及工程热...
    • 30 篇 建筑学
    • 30 篇 网络空间安全
    • 23 篇 土木工程
    • 21 篇 交通运输工程
    • 19 篇 安全科学与工程
    • 17 篇 化学工程与技术
  • 321 篇 理学
    • 196 篇 数学
    • 71 篇 生物学
    • 67 篇 统计学(可授理学、...
    • 56 篇 系统科学
    • 50 篇 物理学
    • 19 篇 化学
  • 156 篇 管理学
    • 106 篇 管理科学与工程(可...
    • 58 篇 图书情报与档案管...
    • 27 篇 工商管理
  • 25 篇 医学
    • 21 篇 临床医学
    • 16 篇 基础医学(可授医学...
  • 24 篇 法学
    • 17 篇 社会学
  • 11 篇 经济学
  • 5 篇 教育学
  • 5 篇 农学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 87 篇 feature extracti...
  • 58 篇 accuracy
  • 52 篇 semantics
  • 41 篇 computational mo...
  • 37 篇 deep learning
  • 37 篇 security
  • 35 篇 training
  • 30 篇 data models
  • 29 篇 federated learni...
  • 27 篇 robustness
  • 26 篇 neural networks
  • 21 篇 wireless communi...
  • 21 篇 interference
  • 21 篇 data mining
  • 19 篇 noise
  • 19 篇 predictive model...
  • 19 篇 visualization
  • 18 篇 object detection
  • 18 篇 signal to noise ...
  • 18 篇 transformers

机构

  • 201 篇 shandong provinc...
  • 163 篇 key laboratory o...
  • 54 篇 ministry of educ...
  • 51 篇 shandong fundame...
  • 41 篇 shandong enginee...
  • 33 篇 moe key lab for ...
  • 19 篇 moe key laborato...
  • 17 篇 state key labora...
  • 17 篇 qilu university ...
  • 17 篇 ministry of educ...
  • 13 篇 qilu university ...
  • 12 篇 key laboratory o...
  • 11 篇 ministry of educ...
  • 11 篇 ministry of educ...
  • 11 篇 state key labora...
  • 11 篇 key laboratory o...
  • 11 篇 school of electr...
  • 11 篇 tianjin key labo...
  • 10 篇 shandong enginee...
  • 10 篇 key laboratory o...

作者

  • 58 篇 meng deyu
  • 46 篇 xiaohong guan
  • 46 篇 guan xiaohong
  • 46 篇 wang hui-ming
  • 40 篇 qinye yin
  • 30 篇 wenjie wang
  • 30 篇 hui-ming wang
  • 24 篇 cao xiangyong
  • 22 篇 pengcheng mu
  • 18 篇 shen chao
  • 17 篇 qian xueming
  • 17 篇 jiang wu
  • 16 篇 wang pinghui
  • 16 篇 yin qinye
  • 16 篇 tao qin
  • 16 篇 zheng qinghua
  • 16 篇 feng gao
  • 15 篇 xu zongben
  • 15 篇 weile zhang
  • 14 篇 xinman zhang

语言

  • 1,119 篇 英文
  • 55 篇 其他
  • 26 篇 中文
检索条件"机构=Key Laboratory of Intelligent Networks and Network Security"
1199 条 记 录,以下是1-10 订阅
排序:
Optimal Linear Codes With Few Weights From Simplicial Complexes
收藏 引用
IEEE Transactions on Information Theory 2025年 第5期71卷 3531-3543页
作者: Chen, Bing Xu, Yunge Hu, Zhao Li, Nian Zeng, Xiangyong Hubei University Hubei Key Laboratory of Applied Mathematics Faculty of Mathematics and Statistics Wuhan430062 China Hubei University Key Laboratory of Intelligent Sensing System and Security Ministry of Education Hubei Provincial Engineering Research Center of Intelligent Connected Vehicle Network Security School of Cyber Science and Technology Wuhan430062 China State Key Laboratory of Integrated Service Networks Xi’an710071 China Hubei University Hubei Key Laboratory of Applied Mathematics Faculty of Mathematics and Statistics Key Laboratory of Intelligent Sensing System and Security Ministry of Education Wuhan430062 China
Recently, constructions of optimal linear codes from simplicial complexes have attracted much attention and some related nice works were presented. Let q be a prime power. In this paper, by using the simplicial comple... 详细信息
来源: 评论
Enabling intelligent Connectivity: A Survey of Secure ISAC in 6G networks
收藏 引用
IEEE Communications Surveys and Tutorials 2025年 第2期27卷 748-781页
作者: Zhu, Xiaoqiang Liu, Jiqiang Lu, Lingyun Zhang, Tao Qiu, Tie Wang, Chunpeng Liu, Yuan Beijing Jiaotong University School of Software Engineering Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing100044 China Tianjin University College of Intelligence and Computing Tianjin300350 China Qilu University of Technology School of Cyber Security and the Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan250353 China
The rapid growth of intelligent sensing capabilities and super computation power in 6G mobile communication systems has facilitated their application in diverse domains such as smart health, smart factories, and the i... 详细信息
来源: 评论
C-privacy: A social relationship-driven image customization sharing method in cyber-physical networks
收藏 引用
Digital Communications and networks 2025年 第2期11卷 563-573页
作者: Dapeng Wu Jian Liu Yangliang Wan Zhigang Yang Ruyan Wang Xinqi Lin School of Communications and Information Engineering Chongqing University of Posts and Telecommunications The Advanced Network and Intelligent Connection Technology Key Laboratory Key Laboratory of Ubiquitous Sensing and Networking Aerospace Tianmu Satellite Technology Company Limited School of Cyber Security and Information Law Chongqing University of Posts and Telecommunications College of Computer and Cyber Security Fujian Normal University
Cyber-Physical networks(CPN) are comprehensive systems that integrate information and physical domains, and are widely used in various fields such as online social networking, smart grids, and the Internet of Vehicles... 详细信息
来源: 评论
Lip-Audio Modality Fusion for Deep Forgery Video Detection
收藏 引用
Computers, Materials & Continua 2025年 第2期82卷 3499-3515页
作者: Yong Liu Zhiyu Wang Shouling Ji Daofu Gong Lanxin Cheng Ruosi Cheng College of Cyberspace Security Information Engineering UniversityZhengzhou450001China Research Institute of Intelligent Networks Zhejiang LabHangzhou311121China College of Computer Science and Technology Zhejiang UniversityHangzhou310027China Henan Key Laboratory of Cyberspace Situation Awareness Zhengzhou450001China Key Laboratory of Cyberspace Security Ministry of EducationZhengzhou450001China
In response to the problem of traditional methods ignoring audio modality tampering, this study aims to explore an effective deep forgery video detection technique that improves detection precision and reliability by ... 详细信息
来源: 评论
Fusion of Time-Frequency Features in Contrastive Learning for Shipboard Wind Speed Correction
收藏 引用
Journal of Ocean University of China 2025年 第2期24卷 377-386页
作者: SONG Jian HUANG Meng LI Xiang ZHANG Zhenqiang WANG Chunxiao ZHAO Zhigang Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science Center(National Supercomputer Center in Jinan)Qilu University of Technology(Shandong Academy of Sciences)Jinan 250000China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer ScienceJinan 250000China
Accurate wind speed measurements on maritime vessels are crucial for weather forecasting,sea state prediction,and safe ***,vessel motion and challenging environmental conditions often affect measurement *** address th... 详细信息
来源: 评论
DSDIR: A Two-Stage Method for Addressing Noisy Long-Tailed Problems in Malicious Traffic Detection
DSDIR: A Two-Stage Method for Addressing Noisy Long-Tailed P...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Li, Guoliang Zhang, Ruiqi Sun, Zhe Xing, Lingkai Zhang, Yu College of Cyber Science Nankai University Tianjin China College of Computer Science Nankai University Tianjin China Tianjin Key Laboratory of Network and Data Security Technology Tianjin China Key Laboratory of Data and Intelligent System Security Ministry of Education Tianjin China
In recent years, deep learning based malicious traffic detection (MTD) systems have demonstrated remarkable success. However, their effectiveness tend to decrease because most malicious traffic datasets are suffered f... 详细信息
来源: 评论
Secure Multi-way Join Query and Its Bench-Marking with Trusted Execution Environments  2nd
Secure Multi-way Join Query and Its Bench-Marking with Tru...
收藏 引用
2nd International Conference on Data security and Privacy Protection, DSPP 2024
作者: Zhao, Yi Zhao, Sen Lv, Siyi School of Cyber Engineering Xidian University Xi’an China State Key Laboratory of Integrated Service Networks Xidian University Xi’an China Key Laboratory of Data and Intelligent System Security Ministry of Education Nankai University Tianjin China
Because of server-untrustable model in outsourcing encrypted database system, it’s fatal for data owners to keep their data confidential under complex query operations performed by database servers. Trusted... 详细信息
来源: 评论
EvolGCN: A Co-evolutionary Graph Convolutional network Model for Dynamically Spatio-Temporal Anomaly Event Inference
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Liu, Xiaoming Pu, Hang Chen, Zhuo Zhang, Zhanwei Lan, Yu Shen, Chao Xi'an Jiaotong University Ministry of Education Key Lab for Intelligent Networks and Network Security Shaanxi Xi'an710049 China
Accurately spatio-temporal anomaly event inference is significant to enhance society's safety, such as crime prevention and traffic collision reduction, etc. However, it is hard to achieve good performance for its... 详细信息
来源: 评论
Online Queue-Aware Service Migration and Resource Allocation in Mobile Edge Computing
收藏 引用
IEEE Transactions on Vehicular Technology 2025年 第5期74卷 8063-8078页
作者: Du, An Jia, Jie Chen, Jian Wang, Xingwei Huang, Ming Northeastern University School of Computer Science and Engineering Engineering Research Center of Security Technology of Complex Network System Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Shenyang110819 China Northeastern University School of Computer Science and Engineering Shenyang110819 China
Mobile edge computing (MEC) integrated with network Functions Virtualization (NFV) helps run a wide range of services implemented by Virtual network Functions (VNFs) deployed at MEC networks. This emerging paradigm of... 详细信息
来源: 评论
T³Planner: Multi-Phase Planning Across Structure-Constrained Optical, IP, and Routing Topologies
收藏 引用
IEEE Journal on Selected Areas in Communications 2025年 第5期43卷 1823-1839页
作者: Hao, Yijun Yang, Shusen Li, Fang Zhang, Yifan Zhao, Cong Ren, Xuebin Zhao, Peng Xu, Chenren Wang, Shibo Xi’an Jiaotong University National Engineering Laboratory for Big Data Analytics Xi’an710049 China Xi’an Jiaotong University National Engineering Laboratory for Big Data Analytics Ministry of Education Key Laboratory for Intelligent Networks and Network Security Xi’an710049 China Peking University School of Computer Science Beijing100871 China The Chinese University of Hong Kong Department of Computer Science and Engineering Hong Kong National Engineering Laboratory for Big Data Analytics Xi'an Jiaotong University Xi'an710049 China
network topology planning is an essential multi-phase process to build and jointly optimize the multi-layer network topologies in wide-area networks (WANs). Most existing practices target single-phase/layer planning, ... 详细信息
来源: 评论