咨询与建议

限定检索结果

文献类型

  • 355 篇 会议
  • 253 篇 期刊文献

馆藏范围

  • 608 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 397 篇 工学
    • 321 篇 计算机科学与技术...
    • 262 篇 软件工程
    • 101 篇 信息与通信工程
    • 41 篇 控制科学与工程
    • 36 篇 生物工程
    • 26 篇 机械工程
    • 23 篇 生物医学工程(可授...
    • 20 篇 电气工程
    • 19 篇 电子科学与技术(可...
    • 16 篇 光学工程
    • 16 篇 仪器科学与技术
    • 14 篇 网络空间安全
    • 12 篇 动力工程及工程热...
    • 10 篇 交通运输工程
    • 7 篇 建筑学
    • 7 篇 土木工程
    • 7 篇 化学工程与技术
  • 161 篇 理学
    • 104 篇 数学
    • 36 篇 生物学
    • 25 篇 统计学(可授理学、...
    • 22 篇 物理学
    • 13 篇 系统科学
    • 9 篇 化学
  • 132 篇 管理学
    • 70 篇 管理科学与工程(可...
    • 63 篇 图书情报与档案管...
    • 24 篇 工商管理
  • 16 篇 医学
    • 14 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 15 篇 法学
    • 14 篇 社会学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 6 篇 农学
  • 3 篇 文学
  • 3 篇 艺术学
  • 2 篇 军事学
  • 1 篇 教育学

主题

  • 31 篇 semantics
  • 19 篇 training
  • 16 篇 routing
  • 16 篇 machine learning
  • 16 篇 protocols
  • 15 篇 feature extracti...
  • 13 篇 clustering algor...
  • 11 篇 privacy
  • 10 篇 deep learning
  • 10 篇 network topology
  • 10 篇 educational inst...
  • 10 篇 estimation
  • 9 篇 peer to peer com...
  • 9 篇 big data
  • 9 篇 optimization
  • 9 篇 contrastive lear...
  • 9 篇 wireless sensor ...
  • 9 篇 benchmark testin...
  • 9 篇 accuracy
  • 9 篇 cloud computing

机构

  • 162 篇 school of comput...
  • 86 篇 key laboratory o...
  • 61 篇 key laboratory o...
  • 40 篇 school of comput...
  • 39 篇 key laboratory o...
  • 35 篇 key laboratory o...
  • 34 篇 school of cyber ...
  • 19 篇 key laboratory o...
  • 15 篇 ministry of educ...
  • 12 篇 school of cyber ...
  • 11 篇 school of comput...
  • 10 篇 guangxi collabor...
  • 10 篇 the school of co...
  • 10 篇 college of softw...
  • 9 篇 southeast univer...
  • 9 篇 purple mountain ...
  • 9 篇 national key lab...
  • 8 篇 the key laborato...
  • 8 篇 moe key laborato...
  • 8 篇 department of co...

作者

  • 36 篇 zhou deyu
  • 32 篇 zhang min-ling
  • 28 篇 min-ling zhang
  • 21 篇 guang cheng
  • 18 篇 geng xin
  • 18 篇 wang yun
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 15 篇 sanfeng zhang
  • 13 篇 cheng guang
  • 12 篇 shu huazhong
  • 12 篇 qi guilin
  • 11 篇 jia yuheng
  • 11 篇 li xiaoping
  • 11 篇 kong youyong
  • 10 篇 wei tong
  • 10 篇 yang guanyu
  • 10 篇 yang peng
  • 9 篇 xiaoyan hu
  • 9 篇 gao zhiqiang

语言

  • 481 篇 英文
  • 101 篇 其他
  • 29 篇 中文
检索条件"机构=Key Library of Computer Network and Information Integration"
608 条 记 录,以下是231-240 订阅
排序:
FedDLM: A Fine-Grained Assessment Scheme for Risk of Sensitive information Leakage in Federated Learning-based Android Malware Classifier
FedDLM: A Fine-Grained Assessment Scheme for Risk of Sensiti...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Changnan Jiang Chunhe Xia Chen Chen Huacheng Li Tianbo Wang Xiaojian Li Beijing Key Lab. of Network Technology Beihang University Beijing China Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin China School of Cyber Science and Technology Beihang University Beijing China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China College of Computer Science and Information Technology Guangxi Normal University Guilin China
In the traditional centralized Android malware classification framework, privacy concerns arise as it requires collecting users’ app samples containing sensitive information directly. To address this problem, new cla... 详细信息
来源: 评论
Detecting Slow Port Scans of Long Duration in High-Speed networks
Detecting Slow Port Scans of Long Duration in High-Speed Net...
收藏 引用
GLOBECOM 2022 - 2022 IEEE Global Communications Conference
作者: Hua Wu Ziling Shao Guang Cheng Xiaoyan Hu Jing Ren Wei Wang School of Cyber Science and Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration Southeast University Nanjing China Peng Cheng Laboratory University of Electronic Science and Technology of China
Port scanning is an extensively used technique by attackers to probe for vulnerabilities in network systems. Since fast port scans can be effectively detected by many existing methods, some advanced attackers perform ... 详细信息
来源: 评论
CHESS: Learning User Correlation from Semantic-related Cascades for Diffusion Prediction
CHESS: Learning User Correlation from Semantic-related Casca...
收藏 引用
Smart World Congress (SWC), IEEE
作者: Huacheng Li Chunhe Xia Tianbo Wang Haopeng Zhao Key Laboratory of Beijing Network Technology Beihang University Beijing China Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin China School of Cyber Science and Technology Beihang University Beijing China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China
Understanding the information diffusion trajectory in online social networks has become an ever-growing prominent research direction in the information era. Users interact with social information they are interested i...
来源: 评论
FedDADP: A Privacy-Risk-Adaptive Differential Privacy Protection Method for Federated Android Malware Classifier
FedDADP: A Privacy-Risk-Adaptive Differential Privacy Protec...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Changnan Jiang Chunhe Xia Mengyao Liu Rui Fang Pengfei Li Huacheng Li Tianbo Wang Beijing Key Lab. of Network Technology Beihang University Beijing China Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin China School of Cyber Science and Technology Beihang University Beijing China SNationa Innovation Center of Intelligent and Connected Vehicles Beijing China Shanghai Key Laboratory of Computer Software Evaluating and Testing China
The federated Android malware classifier has attracted much attention owing to its advantages of privacy protection and multi-party joint modeling. However, the research indicates that the gradient transmitted within ... 详细信息
来源: 评论
Partial Vessels Annotation-based Coronary Artery Segmentation with Self-training and Prototype Learning
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Zheng Zhang, Xiaolei Qi, Yaolei Yang, Guanyu LIST Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Nanjing210096 China Dept. of Diagnostic Radiology Jinling Hospital Medical School of Nanjing University Nanjing China Jiangsu Provincial Joint International Research Laboratory of Medical Information Processing Southeast University Nanjing210096 China Strasbourg France
Coronary artery segmentation on coronary-computed tomography angiography (CCTA) images is crucial for clinical use. Due to the expertise-required and labor-intensive annotation process, there is a growing demand for t... 详细信息
来源: 评论
A DDoS protection method based on traffic scheduling and scrubbing in SDN
A DDoS protection method based on traffic scheduling and scr...
收藏 引用
International Conference on Mobile Ad-hoc and Sensor networks, MSN
作者: Yiwei Yu Guang Cheng Zihan Chen Haoxuan Ding School of Cyber Science and Engineering Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University Nanjing China
DDoS attacks have emerged as one of the most serious network security threats in 5G, IoT, multi-cloud, and other emerging technology scenarios. The bandwidth of DDoS attacks is increasing in the new scenario, but the ... 详细信息
来源: 评论
BaKer-nets: Bayesian random kernel mapping networks  29
BaKer-nets: Bayesian random kernel mapping networks
收藏 引用
29th International Joint Conference on Artificial Intelligence, IJCAI 2020
作者: Xue, Hui Wu, Zheng-Fan School of Computer Science and Engineering Southeast University Nanjing210096 China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Nanjing210096 China
Recently, deep spectral kernel networks (DSKNs) have attracted wide attention. They consist of periodic computational elements that can be activated across the whole feature spaces. In theory, DSKNs have the potential... 详细信息
来源: 评论
Instance-dependent partial label learning
arXiv
收藏 引用
arXiv 2021年
作者: Xu, Ning Qiao, Congyu Geng, Xin Zhang, Min-Ling School of Computer Science and Engineering Southeast University Nanjing210096 China MOE Key Laboratory of Computer Network and Information Integration Ministry of Education China
Partial label learning (PLL) is a typical weakly supervised learning problem, where each training example is associated with a set of candidate labels among which only one is true. Most existing PLL approaches assume ... 详细信息
来源: 评论
EFwork: An Efficient Framework for Constructing a Malware Knowledge Graph
EFwork: An Efficient Framework for Constructing a Malware Kn...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Chen Chen Chunhe Xia Tianbo Wang Wanshuang Lin Yuan Zhao Yang Li Beijing Key Lab. of Network Technology Beihang University Beijing China Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin China School of Cyber Science and Technology Beihang University Beijing China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China
Malware Knowledge Graph (MKG) serves as an essential auxiliary tool for malware detection and analysis. However, the construction of MKG faces several challenges, such as inadequate dataset quality, incomplete entity ... 详细信息
来源: 评论
Enhancing Self-Supervised Fine-Grained Video Object Tracking with Dynamic Memory Prediction
arXiv
收藏 引用
arXiv 2025年
作者: Zhou, Zihan Dai, Changrui Song, Aibo Fang, Xiaolin School of Computer Science and Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Nanjing China
Successful video analysis relies on accurate recognition of pixels across frames, and frame reconstruction methods based on video correspondence learning are popular due to their efficiency. Existing frame reconstruct... 详细信息
来源: 评论