咨询与建议

限定检索结果

文献类型

  • 8 篇 期刊文献

馆藏范围

  • 8 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7 篇 工学
    • 4 篇 电气工程
    • 4 篇 信息与通信工程
    • 4 篇 计算机科学与技术...
    • 4 篇 软件工程
    • 2 篇 航空宇航科学与技...
    • 1 篇 控制科学与工程
    • 1 篇 化学工程与技术
    • 1 篇 交通运输工程
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 1 篇 reinforcement le...
  • 1 篇 distribution cen...
  • 1 篇 deep learning
  • 1 篇 http
  • 1 篇 tactical communi...
  • 1 篇 learnable distri...
  • 1 篇 aircraft communi...
  • 1 篇 differentiated s...
  • 1 篇 feature space
  • 1 篇 frame generation...
  • 1 篇 websites
  • 1 篇 unmanned aerial ...
  • 1 篇 adversarial trai...

机构

  • 3 篇 key laboratory o...
  • 3 篇 school of electr...
  • 2 篇 key laboratory o...
  • 2 篇 nanjing universi...
  • 2 篇 school of automa...
  • 2 篇 nanjing universi...
  • 1 篇 nanjing universi...
  • 1 篇 nanyang technolo...
  • 1 篇 ministry of educ...
  • 1 篇 school of comput...
  • 1 篇 southeat univers...
  • 1 篇 nanyang technolo...
  • 1 篇 kyung hee univer...
  • 1 篇 southeast univer...
  • 1 篇 nanjing center f...
  • 1 篇 university of ho...
  • 1 篇 nanjing universi...
  • 1 篇 nanjing universi...

作者

  • 4 篇 liu guangjie
  • 3 篇 nie fengyuan
  • 3 篇 huang jianan
  • 3 篇 liu weiwei
  • 3 篇 gao bo
  • 2 篇 niyato dusit
  • 2 篇 tian wen
  • 2 篇 liu yinqiu
  • 2 篇 guangjie liu
  • 1 篇 huaifeng shi
  • 1 篇 lishang qin
  • 1 篇 fengyuan nie
  • 1 篇 yingzhi wang
  • 1 篇 han zhu
  • 1 篇 chengsheng pan
  • 1 篇 li yunxiang
  • 1 篇 yuewei dai
  • 1 篇 dai yuewei
  • 1 篇 jinwei wang
  • 1 篇 wang jie

语言

  • 7 篇 英文
  • 1 篇 其他
检索条件"机构=Key Laboratory of Intelligent Support Technology for Complex Environments"
8 条 记 录,以下是1-10 订阅
排序:
Frame Generation Algorithm for Differentiated Services in Tactical Communication Networks
收藏 引用
Journal of Communications and Information Networks 2025年 第1期10卷 15-25页
作者: Huaifeng Shi Chengsheng Pan Lishang Qin Yingzhi Wang Huangjie Lu Key Laboratory of Intelligent Support Technology for Complex Environments Ministry of EducationNanjing University of Information Science and TechnologyNanjing 210044China
In response to the complex and multidimensional nature of converged traffic on heterogeneous links in tactical communication networks,which leads to the difficulty in ensuring the quality of service(QoS)requirements f... 详细信息
来源: 评论
WF-A2D: Enhancing Privacy with Asymmetric Adversarial Defense Against Website Fingerprinting
收藏 引用
IEEE Transactions on Information Forensics and Security 2025年 20卷 4739-4754页
作者: Huang, Jianan Liu, Weiwei Liu, Guangjie Gao, Bo Nie, Fengyuan Nanjing University of Science and Technology School of Automation Nanjing210094 China Nanjing University of Information Science and Technology School of Electronics and Information Engineering Nanjing210044 China Key Laboratory of Intelligent Support Technology for Complex Environments Ministry of Education Nanjing210044 China
Despite the end-to-end encryption capabilities provided by network protocols such as QUIC in HTTP/3 and the additional tunneling functions offered by proxy tools like virtual private networks (VPNs) and the onion rout... 详细信息
来源: 评论
QuicCourier: Leveraging the Dynamics of QUIC-Based Website Browsing Behaviors Through Proxy for Covert Communication
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Huang, Jianan Liu, Weiwei Liu, Guangjie Gao, Bo Nie, Fengyuan Nanjing University of Science and Technology School of Automation Nanjing210094 China Nanjing University of Information Science and Technology School of Electronics and Information Engineering Nanjing210044 China Ministry of Education Key Laboratory of Intelligent Support Technology for Complex Environments Nanjing China
Network covert channels transmit secret messages by manipulating network traffic, including packet headers, timing intervals, and communication patterns. The growth of network services has spurred interest in explorin... 详细信息
来源: 评论
Contract-Based Incentive Mechanisms for UAV Networks in Covert Communications
收藏 引用
IEEE Transactions on Vehicular technology 2025年 第5期74卷 7378-7391页
作者: Tian, Wen Fan, Hao Liu, Guangjie Du, Miao Liu, Yinqiu Niyato, Dusit Han, Zhu Nanjing University of Information Science and Technology School of Electronic and Information Engineering Nanjing University of Information Science and Technology Key Laboratory of Intelligent Support Technology In Complex Environment Ministry of Education Nanjing210044 China Southeat University School of Computer Science and Engineering China Southeast University Key Laboratory of Computer Network and Information Integration Ministry of Education Nanjing China Nanyang Technological University School of Computer Science and Engineering 639798 Singapore University of Houston Department of Electrical and Computer Engineering HoustonTX77004 United States Kyung Hee University Department of Computer Science and Engineering Seoul446-701 Korea Republic of
Covert communication is considered a promising technology for hiding transmission processes and activities from malicious eavesdropping. With the development of detection technology, the traditional point-to-point cov... 详细信息
来源: 评论
IoT-AMLHP: Aligned Multimodal Learning of Header-Payload Representations for Resource-Efficient Malicious IoT Traffic Classification
arXiv
收藏 引用
arXiv 2025年
作者: Nie, Fengyuan Liu, Guangjie Liu, Weiwei Huang, Jianan Gao, Bo School of Automation Nanjing University of Science and Technology Nanjing210094 China School of Electronics and information engineering Nanjing University of Information Science and Technology Nanjing210044 China Key Laboratory of Intelligent Support Technology for Complex Environments Ministry of Education Nanjing University of Information Science and Technology Jiangsu Nanjing210044 China
Traffic classification is crucial for securing Internet of Things (IoT) networks. Deep learning-based methods can autonomously extract latent patterns from massive network traffic, demonstrating significant potential ... 详细信息
来源: 评论
Optimal Flying Location for Unmanned Aerial Vehicle Equipped with MF-RIS assisted Covert Wireless on Communication
收藏 引用
IEEE Transactions on Vehicular technology 2025年
作者: Wang, Jie Li, Yunxiang Tian, Wen Dai, Yuewei Liu, Yinqiu Niyato, Dusit Nanjing University of Posts and Telecommunications School of Communications and Information Engineering Nanjing China Nanjing University of Information Science and Technology School of Electronic and Information Engineering Key Laboratory of Intelligent Support Technology In Complex Environment Ministry of Education Nanjing210044 China Nanyang Technological University College of Computing and Data Science Singapore
In the current information age, covert communication holds significant value owing to its advantages, such as heightened security, enhanced flexibility, and improved concealment, surpassing those of traditional commun... 详细信息
来源: 评论
IoT-AMLHP: Aligned multimodal learning of header-payload representations for resource-efficient malicious IoT traffic classification
收藏 引用
Ad Hoc Networks 2025年
作者: Fengyuan Nie Guangjie Liu Weiwei Liu Jianan Huang Bo Gao School of Automation Nanjing University of Science and Technology Nanjing 210094 China School of Electronics and information engineering Nanjing University of Information Science and Technology Nanjing 210044 China Key Laboratory of Intelligent Support Technology for Complex Environments Ministry of Education Nanjing University of Information Science and Technology Nanjing 210044 Jiangsu China
Traffic classification is crucial for securing Internet of Things (IoT) networks. Deep learning-based methods can autonomously extract latent patterns from massive network traffic, demonstrating significant potential ...
来源: 评论
Boosting Adversarial Training with Learnable Distribution
收藏 引用
Computers, Materials & Continua 2024年 第3期78卷 3247-3265页
作者: Kai Chen Jinwei Wang James Msughter Adeke Guangjie Liu Yuewei Dai School of Electronics and Information Engineering Nanjing University of Information Science and TechnologyNanjing210044China Key Laboratory of Intelligent Support Technology for Complex Environments Ministry of EducationNanjing210044China School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China Nanjing Center for Applied Mathematics Nanjing211135China
In recent years,various adversarial defense methods have been proposed to improve the robustness of deep neural *** training is one of the most potent methods to defend against adversarial ***,the difference in the fe... 详细信息
来源: 评论