咨询与建议

限定检索结果

文献类型

  • 2,101 篇 会议
  • 1,612 篇 期刊文献

馆藏范围

  • 3,713 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,413 篇 工学
    • 1,834 篇 计算机科学与技术...
    • 1,467 篇 软件工程
    • 603 篇 信息与通信工程
    • 346 篇 电气工程
    • 275 篇 控制科学与工程
    • 240 篇 电子科学与技术(可...
    • 232 篇 生物工程
    • 182 篇 网络空间安全
    • 141 篇 机械工程
    • 113 篇 光学工程
    • 94 篇 生物医学工程(可授...
    • 94 篇 安全科学与工程
    • 89 篇 交通运输工程
    • 88 篇 化学工程与技术
    • 83 篇 仪器科学与技术
    • 66 篇 材料科学与工程(可...
    • 61 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,089 篇 理学
    • 623 篇 数学
    • 263 篇 物理学
    • 250 篇 生物学
    • 207 篇 统计学(可授理学、...
    • 101 篇 系统科学
    • 90 篇 化学
  • 606 篇 管理学
    • 336 篇 管理科学与工程(可...
    • 306 篇 图书情报与档案管...
    • 100 篇 工商管理
  • 118 篇 法学
    • 72 篇 社会学
  • 80 篇 医学
    • 70 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 43 篇 经济学
  • 31 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 165 篇 feature extracti...
  • 129 篇 semantics
  • 125 篇 accuracy
  • 109 篇 training
  • 106 篇 computational mo...
  • 102 篇 federated learni...
  • 98 篇 deep learning
  • 80 篇 privacy
  • 72 篇 data models
  • 68 篇 cryptography
  • 62 篇 authentication
  • 61 篇 security
  • 59 篇 data privacy
  • 59 篇 robustness
  • 58 篇 protocols
  • 53 篇 object detection
  • 52 篇 neural networks
  • 52 篇 cloud computing
  • 50 篇 adaptation model...
  • 47 篇 optimization

机构

  • 271 篇 key laboratory o...
  • 206 篇 shandong provinc...
  • 97 篇 university of ch...
  • 83 篇 school of comput...
  • 83 篇 key laboratory o...
  • 66 篇 school of cyber ...
  • 65 篇 shandong provinc...
  • 64 篇 cas key laborato...
  • 64 篇 information secu...
  • 60 篇 guangdong provin...
  • 52 篇 shandong enginee...
  • 52 篇 tianjin key labo...
  • 50 篇 network and data...
  • 50 篇 shandong fundame...
  • 49 篇 state key labora...
  • 47 篇 peng cheng labor...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 46 篇 school of comput...
  • 44 篇 institute of inf...

作者

  • 100 篇 cheng xueqi
  • 49 篇 guo jiafeng
  • 47 篇 shen huawei
  • 43 篇 zheng wei-shi
  • 34 篇 xie xiaohua
  • 33 篇 huang qingming
  • 33 篇 yixian yang
  • 33 篇 cao xiaochun
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 25 篇 jin hai
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 21 篇 hu shengshan
  • 21 篇 lai jianhuang
  • 21 篇 wang yichuan
  • 20 篇 yang zhiyong

语言

  • 2,977 篇 英文
  • 661 篇 其他
  • 87 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3713 条 记 录,以下是2521-2530 订阅
排序:
Contrastive Learning for Robust Android Malware Familial Classification
arXiv
收藏 引用
arXiv 2021年
作者: Wu, Yueming Dou, Shihan Zou, Deqing Yang, Wei Qiang, Weizhong Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Shanghai Key Laboratory of Intelligent Information Processing School of Computer Science Fudan University Shanghai200433 China University of Texas at Dallas Dallas United States National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
Due to its open-source nature, Android operating system has been the main target of attackers to exploit. Malware creators always perform different code obfuscations on their apps to hide malicious activities. Feature... 详细信息
来源: 评论
An improved deep convolutionary neural network for bone marrow cancer detection using image processing
收藏 引用
Informatics in Medicine Unlocked 2023年 38卷
作者: Ramasamy, Manjula Devi Dhanaraj, Rajesh Kumar Pani, Subhendu Kumar Das, Rashmi Prava Movassagh, Ali Akbar Gheisari, Mehdi Liu, Yang Porkar, P. Banu, Sabitha Department of Computer Science and Engineering KPR Institute of Engineering and Technology India School of Computing Science and Engineering Galgotias University India Krupajal Engineering College Biju Patnaik University of Technology Odisha India Department of Computer Science and Engineering CV Raman Global University Bhubaneswar India Department of Biomedical Engineering School of Medicine Tehran University of medical sciences Tehran Iran Department of Computer Engineering Science and Research Branch Islamic Azad University Tehran Iran School of Computer Science and Technology Harbin Institute of Technology Shenzhen China Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies China Department of Cognitive Computing Institute of Computer Science and Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Chennai India Young researchers and elite club Islamic Azad University Parand Iran
Bone Marrow Cancer is a type of cancer that develops in the stem cells of the bone marrow that are responsible for blood formation. AML(Acute Myeloid Leukaemia) and MM(Multiple Myeloma) are both types of malignancy th... 详细信息
来源: 评论
On pure MDS asymmetric entanglement-assisted quantum error-correcting codes
arXiv
收藏 引用
arXiv 2021年
作者: Huang, Ziteng Fang, Weijun Fu, Fang-Wei Chern Institute of Mathematics and LPMC Nankai University Tianjin300071 China Shenzhen International Graduate School Tsinghua University PCL Research Center of Networks and Communications Peng Cheng Laboratory Shenzhen518055 China Chern Institute of Mathematics and LPMC Tianjin Key Laboratory of Network and Data Security Technology Nankai University Tianjin300071 China
Recently, Galindo et al. introduced the concept of asymmetric entanglement- assisted quantum error-correcting codes (AEAQECCs) from Calderbank- Shor-Steane (CSS) construction. In general, it's difficult to determi... 详细信息
来源: 评论
Evaluation Method of Node Importance in Temporal Satellite networks Based on Time Slot Correlation
Research Square
收藏 引用
Research Square 2021年
作者: Xu, Rui Di, Xiaoqiang He, Xiongwen Qi, Hui School of Computer Science and Technology Changchun University of Science and Technology Changchun130022 China School of Computer Science and Technology Changchun University of Science and Technology Changchun130022 China Jilin Province Key Laboratory of Network and Information Security Changchun University of Science and Technology Changchun130022 China Information Center Changchun University of Science and Technology Changchun130022 China Beijing Institute of Spacecraft System Engineering Beijing100094 China
Temporal satellite networks can accurately describe the dynamic process of satellite networks by considering the interaction relationship and interaction sequence between satellite nodes. In addition, the measurement ... 详细信息
来源: 评论
A conditional-probability zone transformation coding method for categorical features  19
A conditional-probability zone transformation coding method ...
收藏 引用
2019 ACM Turing Celebration Conference - China, ACM TURC 2019
作者: He, Liang Shen, Chao Li, Yun National Key Laboratory of Science and Technology on Blind Signal Processing Chengdu Sichuan China MOE Key Lab for Intelligent Networks and Network Security Xi'an Jiaotong University Shaanxi Xi'an China
It has been a key issue for solving problems efficiently by machine learning models with code categorical features. The state-of-the-art one-hot coding is a widely accepted method to convert the categorical features i... 详细信息
来源: 评论
Velocity-driven particle swarm optimization  8
Velocity-driven particle swarm optimization
收藏 引用
8th International Conference on computing and Pattern Recognition, ICCPR 2019
作者: Li, Wei Fan, Yaochi Jiang, Qiaoyong Xu, Qingzheng School of Computer Science and Engineering Xi'An University of Technology China Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an710048 China School of Computer Science and Engineering Xi'An University of Technology Xi'an710048 China College of Information and Communication National University of Defense Technology Xi'an710106 China
Particle swarm optimization (PSO) is an efficient nature-inspired optimization algorithm, which has been widely applied in many engineering fields. The performance of particle swarm optimization (PSO) has been signifi... 详细信息
来源: 评论
Defence Against Adversarial Attacks Using Clustering Algorithm  5th
Defence Against Adversarial Attacks Using Clustering Algorit...
收藏 引用
5th International Conference of Pioneer Computer Scientists, Engineers and Educators, ICPCSEE 2019
作者: Zheng, Yanbin Yun, Hongxu Wang, Fu Ding, Yong Huang, Yongzhong Liu, Wenfen Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology Guilin China School of Computer Science and Engineering South China University of Technology Guangzhou China School of Computer Science and Network Security Dongguan University of Technology Dongguan China
Deep learning model is vulnerable to adversarial examples in the task of image classification. In this paper, a cluster-based method for defending against adversarial examples is proposed. Each adversarial example bef... 详细信息
来源: 评论
Controlled Secure Direct Communication Protocol via the Three-Qubit Partially Entangled Set of States
收藏 引用
Computers, Materials & Continua 2019年 第3期58卷 809-827页
作者: Gang Xu Ke Xiao Zongpeng Li Xin-Xin Niu Michael Ryan School of Information Science and Technology North China University of TechnologyBeijing100144China Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijing100876China School of Computer Science Wuhan UniversityHubei430072China Guizhou Provincial Key Laboratory of Public Big Data GuiZhou UniversityGuiyangGuizhou550025China School of Computing Dublin City UniversityDublin 9Ireland.
In this paper,we first re-examine the previous protocol of controlled quantum secure direct communication of Zhang et al.’s scheme,which was found insecure under two kinds of attacks,fake entangled particles attack a... 详细信息
来源: 评论
Metric Learning-based Few-Shot Malicious Node Detection for IoT Backhaul/Fronthaul networks
Metric Learning-based Few-Shot Malicious Node Detection for ...
收藏 引用
GLOBECOM 2022 - 2022 IEEE Global Communications Conference
作者: Ke Zhou Xi Lin Jun Wu Ali Kashif Bashir Jianhua Li Muhammad Imran School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University Shanghai China Shanghai Key Laboratory of Integrated Administration Technologies for Information Security Shanghai China Collaborative Innovation Center of Shanghai Industrial Internet Shanghai China Faculty of Science and Engineering Waseda University Japan Department of Computing and Mathematics Manchester Metropolitan University Manchester U.K. School of Engineering Information Technology and Physical Sciences Federation University Australia
The development of backhaul/fronthaul networks can enable low latency and high reliability, but nodes in future networks like Internet of Things (IoT) can conduct malicious activities like flooding attack and DDoS att... 详细信息
来源: 评论
In-situ experiment investigations of hydrothermal process of highway in deep seasonal frozen soil regions of Inner Mongolia, China
收藏 引用
Journal of Central South University 2020年 第7期27卷 2082-2093页
作者: ZHANG Hong-wei WANG Xue-ying ZHAO Xin LIU Peng-fei Key Laboratory of Transport Industry of Management Control and Cycle Repair Technology for Traffic Network Facilities in Ecological Security Barrier AreaHohhot 010051China Inner Mongolia Transport Construction Engineering Quality Supervision Bureau Hohhot 010051China Institute of Highway Engineering RWTH Aachen UniversityAachen 52074Germany
To reveal the influencing factors and changing rules for the hydrothermal interaction process of highway subgrade, the field measurements of Shiwei-Labudalin Highway in Inner Mongolia, China was conducted for 3 years,... 详细信息
来源: 评论