咨询与建议

限定检索结果

文献类型

  • 2,101 篇 会议
  • 1,612 篇 期刊文献

馆藏范围

  • 3,713 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,413 篇 工学
    • 1,834 篇 计算机科学与技术...
    • 1,467 篇 软件工程
    • 603 篇 信息与通信工程
    • 346 篇 电气工程
    • 275 篇 控制科学与工程
    • 240 篇 电子科学与技术(可...
    • 232 篇 生物工程
    • 182 篇 网络空间安全
    • 141 篇 机械工程
    • 113 篇 光学工程
    • 94 篇 生物医学工程(可授...
    • 94 篇 安全科学与工程
    • 89 篇 交通运输工程
    • 88 篇 化学工程与技术
    • 83 篇 仪器科学与技术
    • 66 篇 材料科学与工程(可...
    • 61 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,089 篇 理学
    • 623 篇 数学
    • 263 篇 物理学
    • 250 篇 生物学
    • 207 篇 统计学(可授理学、...
    • 101 篇 系统科学
    • 90 篇 化学
  • 606 篇 管理学
    • 336 篇 管理科学与工程(可...
    • 306 篇 图书情报与档案管...
    • 100 篇 工商管理
  • 118 篇 法学
    • 72 篇 社会学
  • 80 篇 医学
    • 70 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 43 篇 经济学
  • 31 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 165 篇 feature extracti...
  • 129 篇 semantics
  • 125 篇 accuracy
  • 109 篇 training
  • 106 篇 computational mo...
  • 102 篇 federated learni...
  • 98 篇 deep learning
  • 80 篇 privacy
  • 72 篇 data models
  • 68 篇 cryptography
  • 62 篇 authentication
  • 61 篇 security
  • 59 篇 data privacy
  • 59 篇 robustness
  • 58 篇 protocols
  • 53 篇 object detection
  • 52 篇 neural networks
  • 52 篇 cloud computing
  • 50 篇 adaptation model...
  • 47 篇 optimization

机构

  • 271 篇 key laboratory o...
  • 206 篇 shandong provinc...
  • 97 篇 university of ch...
  • 83 篇 school of comput...
  • 83 篇 key laboratory o...
  • 66 篇 school of cyber ...
  • 65 篇 shandong provinc...
  • 64 篇 cas key laborato...
  • 64 篇 information secu...
  • 60 篇 guangdong provin...
  • 52 篇 shandong enginee...
  • 52 篇 tianjin key labo...
  • 50 篇 network and data...
  • 50 篇 shandong fundame...
  • 49 篇 state key labora...
  • 47 篇 peng cheng labor...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 46 篇 school of comput...
  • 44 篇 institute of inf...

作者

  • 100 篇 cheng xueqi
  • 49 篇 guo jiafeng
  • 47 篇 shen huawei
  • 43 篇 zheng wei-shi
  • 34 篇 xie xiaohua
  • 33 篇 huang qingming
  • 33 篇 yixian yang
  • 33 篇 cao xiaochun
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 25 篇 jin hai
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 21 篇 hu shengshan
  • 21 篇 lai jianhuang
  • 21 篇 wang yichuan
  • 20 篇 yang zhiyong

语言

  • 2,977 篇 英文
  • 661 篇 其他
  • 87 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3713 条 记 录,以下是2331-2340 订阅
排序:
ACQ: Improving Generative Data-free Quantization Via Attention Correction
arXiv
收藏 引用
arXiv 2023年
作者: Li, Jixing Guo, Xiaozhou Dai, Benzhe Gong, Guoliang Jin, Min Chen, Gang Mao, Wenyu Lu, Huaxiang Institute of Semiconductors Chinese Academy of Sciences Beijing100083 China University of Chinese Academy of Sciences Beijing100049 China Semiconductor Neural Network Intelligent Perception and Computing Technology Beijing Key Laboratory Beijing100083 China Materials and Optoelectronics Research Center University of Chinese Academy of Sciences Beijing100049 China College of Microelectronics University of Chinese Academy of Sciences Beijing100049 China
Data-free quantization aims to achieve model quantization without accessing any authentic sample. It is significant in an application-oriented context involving data privacy. Converting noise vectors into synthetic sa... 详细信息
来源: 评论
One Step Further: Investigating Problematic Files of Architecture Anti-patterns
One Step Further: Investigating Problematic Files of Archite...
收藏 引用
International Symposium on Software Reliability Engineering (ISSRE)
作者: Jingwen Liu Wuxia Jin Qiong Feng Xinyu Zhang Yitong Dai Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi'an Jiaotong University School of Software Engineering Xi'an Jiaotong University Xi'an China Nanjing University of Science and Technology Nanjing China
Architecture anti-patterns violate design principles and negatively impact software internal quality. Both academia and industry have designed methods and tools to detect anti-patterns. However, these tools tend to re... 详细信息
来源: 评论
DQ-RM: Deep Reinforcement Learning-based Route Mutation Scheme for Multimedia Services  16
DQ-RM: Deep Reinforcement Learning-based Route Mutation Sche...
收藏 引用
16th IEEE International Wireless Communications and Mobile computing Conference, IWCMC 2020
作者: Zhang, Tao Xu, Changqiao Zhang, Bingchi Kuang, Xiaohui Wang, Yue Yang, Shujie Muntean, Gabriel-Miro State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China School of International Beijing University of Posts and Telecommunications Beijing China State Key Laboratory of Science and Technology on Information System Security Beijing China Beijing Key Laboratory of Network System Architecture and Convergence Beijing China Performance Engineering Lab. School of Electronic Engineering Dublin City University Dublin Ireland
Increasingly growing various multimedia services (e.g., interactive live video and so on) have brought tremendous pressure on existing static defense techniques. To cope with inherent drawback of static defense techni... 详细信息
来源: 评论
Spatio-Temporal meets Wavelet: Disentangled Traffic Flow Forecasting via Efficient Spectral Graph Attention network
arXiv
收藏 引用
arXiv 2021年
作者: Fang, Yuchen Qin, Yanjun Luo, Haiyong Zhao, Fang Xu, Bingbing Wang, Chenxing Zeng, Liang School of Computer Science National Pilot Software Engineering School Beijing University of Posts and Telecommunications China Research Center for Ubiquitous Computing Systems Institute of Computing Technology Chinese Academy of Sciences China CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China Tsinghua University China
Traffic forecasting is crucial for public safety and resource optimization, yet is very challenging due to three aspects: i) current existing works mostly exploit intricate temporal patterns (e.g., the short-term thun... 详细信息
来源: 评论
Edge computing-enabled energy efficiency prediction of immersion cooling system for supercomputing centers
Cleaner Engineering and Technology
收藏 引用
Cleaner Engineering and technology 2025年 27卷
作者: Ma, Shuaiyin Cao, Yichun Liu, Yang School of Computer Science and Technology Xi'an University of Posts and Telecommunications Xi'an 710121 China Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi'an University of Posts and Telecommunications Xi'an 710121 China Xi'an Key Laboratory of Big Data and Intelligent Computing Xi'an 710121 China Shaanxi Union Research Centre of University and Enterprise for 5G+ Industrial Internet Communication Terminal Technology Xi'an University of Posts and Telecommunications Xi'an 710121 China Department of Management and Engineering Linköping University Linköping SE-581 83 Sweden Industrial Engineering and Management University of Oulu Oulu 90570 Finland
Within the context of cleaner production, enhancing energy efficiency and sustainability has emerged as a central focus in supercomputing center development. To address the challenges in predicting energy consumption,... 详细信息
来源: 评论
CLSDRL:A routing optimization method for traffic feature extraction
CLSDRL:A routing optimization method for traffic feature ext...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Hong Xia Jianguo Li Yanping Chen Ning Lv ZhongMin Wang Qingyi Dong School of Computer Science and Technology Xi’an University of Posts and Telecommunications Xi’an Shaanxi China Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi’an Shaanxi China Xi’an Key Laboratory of Big Data and Intelligent Computing Xi’an Shaanxi China
In order to solve the impact of the temporal and spatial characteristics of traffic on network routing optimization, this paper proposes convolution long-short memory neural network deep reinforcement learning (CLSDRL... 详细信息
来源: 评论
Opportunistic Wiretapping/Jamming: A New Attack Model in Millimeter-Wave Wireless networks
TechRxiv
收藏 引用
TechRxiv 2022年
作者: Zhang, Yuanyu Zheng, Zhumeng He, Ji Zhao, Shuangrui Qu, Qianyue Shen, Yulong Jiang, Xiaohong School of Computer Science and Technology Xidian University Shaanxi Xi’an China Shannxi Key Laboratory of Network and System Security China The Beijing Sunwise Information Technology Ltd Beijing Institute of Control Engineering Beijing China The Division of Information Science Graduate School of Science and Technology Nara Institute of Science and Technology Nara Ikoma Japan School of Systems Information Science Future University Hakodate Hokkaido Hakodate Japan
While the millimeter-wave (mmWave) communication is robust against the conventional wiretapping attack due to its short transmission range and directivity, this paper proposes a new opportunistic wiretapping and jammi... 详细信息
来源: 评论
PPA: Preference Profiling Attack Against Federated Learning
arXiv
收藏 引用
arXiv 2022年
作者: Zhou, Chunyi Gao, Yansong Fu, Anmin Chen, Kai Dai, Zhiyang Zhang, Zhi Xue, Minhui Zhang, Yuqing School of Computer Science and Engineering Nanjing University of Science and Technology China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Science China Data61 CSIRO Sydney Australia National Computer Network Intrusion Protection Center University of Chinese Academy of Science China
Federated learning (FL) trains a global model across a number of decentralized users, each with a local dataset. Compared to traditional centralized learning, FL does not require direct access to local datasets and th... 详细信息
来源: 评论
Opportunistic Wiretapping/Jamming: A New Attack Model in Millimeter-Wave Wireless networks
arXiv
收藏 引用
arXiv 2022年
作者: Zhang, Yuanyu Zheng, Zhumeng He, Ji Zhao, Shuangrui Qu, Qianyue Shen, Yulong Jiang, Xiaohong School of Computer Science and Technology Xidian University Shaanxi Xi’an China Shannxi Key Laboratory of Network and System Security China Beijing Sunwise Information Technology Ltd Beijing Institute of Control Engineering Beijing China Division of Information Science Graduate School of Science and Technology Nara Institute of Science and Technology Nara Ikoma Japan School of Systems Information Science Future University Hakodate Hokkaido Hakodate Japan
While the millimeter-wave (mmWave) communication is robust against the conventional wiretapping attack due to its short transmission range and directivity, this paper proposes a new opportunistic wiretapping and jammi... 详细信息
来源: 评论
Federated Learning over Coupled Graphs
arXiv
收藏 引用
arXiv 2023年
作者: Lei, Runze Wang, Pinghui Zhao, Junzhou Lan, Lin Tao, Jing Deng, Chao Feng, Junlan Wang, Xidian Guan, Xiaohong The MOE Key Laboratory for Intelligent Networks and Network Security Xi’an Jiaotong University P.O. Box 1088 No. 28 Xianning West Road Shaanxi Xi’an710049 China China Mobile Research Institute China China Mobile Group Design Institute China The Center for Intelligent and Networked Systems Tsinghua National Lab for Information Science and Technology Tsinghua University Beijing100084 China
Graphs are widely used to represent the relations among entities. When one owns the complete data, an entire graph can be easily built, therefore performing analysis on the graph is straightforward. However, in many s... 详细信息
来源: 评论