咨询与建议

限定检索结果

文献类型

  • 13 篇 会议
  • 7 篇 期刊文献

馆藏范围

  • 20 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 15 篇 工学
    • 9 篇 计算机科学与技术...
    • 8 篇 软件工程
    • 4 篇 信息与通信工程
    • 3 篇 控制科学与工程
    • 2 篇 机械工程
    • 2 篇 电子科学与技术(可...
    • 2 篇 生物工程
    • 2 篇 安全科学与工程
    • 1 篇 光学工程
    • 1 篇 电气工程
    • 1 篇 化学工程与技术
    • 1 篇 交通运输工程
  • 5 篇 法学
    • 4 篇 社会学
    • 1 篇 公安学
  • 5 篇 管理学
    • 3 篇 管理科学与工程(可...
    • 1 篇 公共管理
    • 1 篇 图书情报与档案管...
  • 4 篇 理学
    • 2 篇 生物学
    • 1 篇 数学
    • 1 篇 物理学

主题

  • 2 篇 deep learning
  • 2 篇 face recognition
  • 2 篇 computer crime
  • 2 篇 crime
  • 2 篇 sentiment analys...
  • 2 篇 digital forensic...
  • 1 篇 knowledge based ...
  • 1 篇 cross-domain lea...
  • 1 篇 strips
  • 1 篇 safety
  • 1 篇 generative adver...
  • 1 篇 automation
  • 1 篇 biological neura...
  • 1 篇 transformer bloc...
  • 1 篇 information mana...
  • 1 篇 search engines
  • 1 篇 convolution
  • 1 篇 fld
  • 1 篇 blind materials
  • 1 篇 data mining

机构

  • 8 篇 key laboratory o...
  • 3 篇 zhejiang police ...
  • 2 篇 key laboratory o...
  • 2 篇 zhejiang police ...
  • 2 篇 school of comput...
  • 2 篇 college of infor...
  • 2 篇 wenzhou public s...
  • 2 篇 faculty of artif...
  • 2 篇 big-data and net...
  • 2 篇 henan polytechni...
  • 1 篇 department of fo...
  • 1 篇 key laboratory o...
  • 1 篇 college of compu...
  • 1 篇 universidad carl...
  • 1 篇 joint logistics ...
  • 1 篇 zhejiang dahua t...
  • 1 篇 department of co...
  • 1 篇 jiangsu yuchi bl...
  • 1 篇 the people’s pro...
  • 1 篇 institute for cy...

作者

  • 4 篇 liu qiang
  • 4 篇 chen guangxuan
  • 3 篇 zhang lei
  • 3 篇 guangxuan chen
  • 3 篇 chen cui
  • 3 篇 qiang liu
  • 2 篇 li yao
  • 2 篇 jing zhang
  • 2 篇 ye fangyi
  • 2 篇 qin panke
  • 2 篇 yao li
  • 2 篇 weijie ding
  • 2 篇 qi qinhui
  • 2 篇 mahmoud emam
  • 2 篇 jianfeng lu
  • 1 篇 ding weijie
  • 1 篇 yingying xu
  • 1 篇 li li
  • 1 篇 caijin li
  • 1 篇 liao bozheng

语言

  • 20 篇 英文
检索条件"机构=Key Laboratory of Public Security Informatization Application Based on Big-Data Architecture"
20 条 记 录,以下是11-20 订阅
排序:
A Research on application Server-Oriented Digital Forensics in New Types of Network Crime
A Research on Application Server-Oriented Digital Forensics ...
收藏 引用
IEEE Advanced Information Management,Communicates,Electronic and Automation Control Conference (IMCEC)
作者: Bozheng Liao Guangxuan Chen Jiajian Wu Yingying Xu Qiang Liu Key Laboratory of Public Security Information Application Based on Big-data Architecture Ministry of Public Security Zhejiang Police College Hangzhou China
In the process of application server investigation and evidence collection of new types of network crime, this paper summarizes the analysis of common server clusters, virtual private network servers and IP-based voic... 详细信息
来源: 评论
Intelligence Analysis of Crime of Helping Cybercrime Delinquency based on Knowledge Ggraph
Intelligence Analysis of Crime of Helping Cybercrime Delinqu...
收藏 引用
IEEE Advanced Information Management,Communicates,Electronic and Automation Control Conference (IMCEC)
作者: Qinhui Qi Guangxuan Chen Fangyi Ye Zihao Lin Qiang Liu Key Laboratory of Public Security Information Application Based on Big-data Architecture Ministry of Public Security Zhejiang Police College Hangzhou China
This paper studies the crime of helping cybercrime delinquency (CHCD) from two aspects: theoretical literature research and case empirical research. First of all, clarify the basic concept, development trend and case ... 详细信息
来源: 评论
A Spam Classification Method based on Naive Bayes  6
A Spam Classification Method Based on Naive Bayes
收藏 引用
6th IEEE Information Technology and Mechatronics Engineering Conference, ITOEC 2022
作者: Ye, Fangyi Chen, Guanxuan Liu, Qiang Zhang, Lei Qi, Qinhui Hu, Bo Fan, Xiaoshi Institute for Cyberspace Intelligence and Crime Governance Zhejiang Police College Hangzhou China Key Laboratory of Public Security Informatization Application Based on Big-Data Architecture MPS Zhejiang Police College Hangzhou China Joint Logistics College of National Defence University Beijing China Cadet Brigade 4 Joint Operations College of National Defence University Shijiazhuang China
Currently, spam will do everything possible to bypass or destroy the spam classifier. This paper proposes a naive Bayesian spam classification method, and designs Bernoulli naive Bayes algorithm and polynomial naive B... 详细信息
来源: 评论
A novel high-fidelity reversible data hiding scheme based on multi-classification pixel value ordering
收藏 引用
Journal of Visual Communication and Image Representation 2025年 110卷
作者: Cui, Chen Li, Li Lu, Jianfeng Zhang, Shanqing Chang, Chin-Chen College of Computer Science and Technology Hangzhou Dianzi University Hangzhou310018 China Key Laboratory of Public Security Information Application Based on Big-Data Architecture Zhejiang Police College Hangzhou310018 China Department of Information Engineering and Computer Science Feng Chia University Taichung407 Taiwan
Pixel value ordering (PVO) is a highly effective technique that employs a pixel block partitioning and sorting for reversible data hiding (RDH). However, its embedding performance is significantly impacted by block si... 详细信息
来源: 评论
High-speed and long-reach PON employing PM-DQPSK signal and coherent receiver
收藏 引用
Journal of Optical Communications 2023年 第s1期44卷 S97-S105页
作者: Qin, Panke Meng, Hui Zhang, Lei Chen, Guangxuan College of Computer Science and Technology Henan Polytechnic University Henan Jiaozuo454000 China Joint Logistics College National Defence University Beijing100858 China Key Laboratory of Public Security Information Application Based on Big-Data Architecture Ministry of Public Security Zhejiang Police College Zhejiang Hangzhou310053 China
The development of communication technology requires a new type of passive optical network (PON) architecture. The architecture needs to be based on time division multiplexing (TDM) of 40 Gbit/s downstream and 10 Gbit... 详细信息
来源: 评论
Long Text Classification based on BERT  5
Long Text Classification Based on BERT
收藏 引用
5th IEEE Information Technology, Networking, Electronic and Automation Control Conference, ITNEC 2021
作者: Weijie, DIng Yunyi, Li Jing, Zhang Xuchen, Shen Big-data and Network Security Research Institute Zhejiang Police College Hangzhou310053 China College of Information Engineering Zhejiang University of Technology Hangzhou310023 China Key Laboratory of Public Security Information Application Based on Big-data Architecture Ministry of Public Security Hangzhou310053 China Zhejiang Police College Department of Investigation Hangzhou310053 China Zhejiang Police College Department of Computer and Information Security Hangzhou310053 China Science and Technology Management Section Hangzhou311203 China
Existing text classification algorithms generally have limitations in terms of text length and yield poor classification results for long texts. To address this problem, we propose a BERT-based long text classificatio... 详细信息
来源: 评论
A Compressed Deep Convolutional Neural Networks for Face Recognition  5
A Compressed Deep Convolutional Neural Networks for Face Rec...
收藏 引用
5th IEEE International Conference on Cloud Computing and big data Analytics, ICCCBDA 2020
作者: Yao, Li Key Lab. of Pub. Secty. Info. Application Based on Big-data Architecture Ministry of Public Security Zhejiang Police College Hangzhou China
Recent years, deep convolutional neural network has led to significant improvements in face recognition and becomes one of the most popular techniques in computer vision community. However, deep CNN model requires vas... 详细信息
来源: 评论
A Compressed Deep Convolutional Neural Networks for Face Recognition
A Compressed Deep Convolutional Neural Networks for Face Rec...
收藏 引用
IEEE International Conference on Cloud Computing and big data Analysis (ICCCBDA)
作者: Li Yao Key Laboratory of Public Security Information Application Based on Big-data Architecture Ministry of Public Security Zhejiang Police College Hangzhou China
Recent years, deep convolutional neural network has led to significant improvements in face recognition and becomes one of the most popular techniques in computer vision community. However, deep CNN model requires vas... 详细信息
来源: 评论
Research on Digital Forensics Framework for Malicious Behavior in Cloud  4
Research on Digital Forensics Framework for Malicious Behavi...
收藏 引用
4th IEEE Advanced Information Technology, Electronic and Automation Control Conference, IAEAC 2019
作者: Chen, Guangxuan Wu, Di Chen, Guangxiao Qin, Panke Zhang, Lei Liu, Qiang Zhejiang Police College Key Laboratory of Public Security Information Application Based on Big Data Architecture MPS Hangzhou China People's Procuratorate of Hangzhou Hangzhou China Wenzhou Public Security Bureau Wenzhou China Universidad Carlos III de Madrid Madrid Spain Henan Polytechnic University Jiaozuo China National Defence University Joint Services Academy Beijing China
The difficult of detecting, response, tracing the malicious behavior in cloud has brought great challenges to the law enforcement in combating cybercrimes. This paper presents a malicious behavior oriented framework o... 详细信息
来源: 评论
Research on Digital Forensics Framework for Malicious Behavior in Cloud
Research on Digital Forensics Framework for Malicious Behavi...
收藏 引用
IEEE Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)
作者: Guangxuan Chen Di Wu Guangxiao Chen Panke Qin Lei Zhang Qiang Liu Key Laboratory of Public Security Information Application Based on Big Data Architecture MPS Zhejiang Police College Hangzhou China The People’s Procuratorate of Hangzhou Hangzhou China Wenzhou Public Security Bureau Wenzhou China Henan Polytechnic University Jiaozuo China Joint Services Academy National Defence University Beijing China
The difficult of detecting, response, tracing the malicious behavior in cloud has brought great challenges to the law enforcement in combating cybercrimes. This paper presents a malicious behavior oriented framework o... 详细信息
来源: 评论