咨询与建议

限定检索结果

文献类型

  • 154 篇 会议
  • 113 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 268 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 193 篇 工学
    • 153 篇 计算机科学与技术...
    • 128 篇 软件工程
    • 43 篇 信息与通信工程
    • 24 篇 控制科学与工程
    • 21 篇 网络空间安全
    • 19 篇 电气工程
    • 16 篇 电子科学与技术(可...
    • 12 篇 生物工程
    • 11 篇 机械工程
    • 9 篇 生物医学工程(可授...
    • 6 篇 交通运输工程
    • 5 篇 仪器科学与技术
    • 4 篇 光学工程
    • 4 篇 化学工程与技术
    • 4 篇 安全科学与工程
  • 85 篇 理学
    • 55 篇 数学
    • 15 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 13 篇 生物学
    • 10 篇 系统科学
    • 5 篇 化学
  • 45 篇 管理学
    • 28 篇 管理科学与工程(可...
    • 18 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 10 篇 法学
    • 6 篇 社会学
    • 4 篇 法学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 8 篇 医学
    • 7 篇 临床医学
    • 6 篇 基础医学(可授医学...
    • 5 篇 药学(可授医学、理...
  • 4 篇 军事学
  • 2 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 17 篇 authentication
  • 12 篇 cryptography
  • 8 篇 deep learning
  • 8 篇 security
  • 8 篇 cloud computing
  • 6 篇 protocols
  • 6 篇 training
  • 5 篇 feature extracti...
  • 5 篇 malware
  • 4 篇 internet of thin...
  • 4 篇 access control
  • 4 篇 reinforcement le...
  • 4 篇 optimization
  • 4 篇 servers
  • 4 篇 internet
  • 4 篇 computers
  • 4 篇 semantics
  • 4 篇 blockchain
  • 4 篇 peer to peer net...
  • 4 篇 trusted computin...

机构

  • 21 篇 key lab of infor...
  • 7 篇 key lab of netwo...
  • 6 篇 guangxi key labo...
  • 6 篇 national compute...
  • 5 篇 network informat...
  • 5 篇 computer departm...
  • 5 篇 institute of inf...
  • 5 篇 key lab. of comp...
  • 4 篇 ministry of edu....
  • 4 篇 key lab. of comp...
  • 4 篇 hebei provincial...
  • 4 篇 key lab of netwo...
  • 4 篇 college of compu...
  • 4 篇 college of mathe...
  • 4 篇 national languag...
  • 4 篇 national compute...
  • 4 篇 school of cyber ...
  • 4 篇 hubei provincial...
  • 4 篇 school of comput...
  • 4 篇 key laboratory o...

作者

  • 9 篇 meng deyu
  • 9 篇 tan zuowen
  • 9 篇 li hui
  • 7 篇 cao xiangyong
  • 6 篇 lopez javier
  • 5 篇 zhang yuqing
  • 5 篇 wang fangwei
  • 5 篇 javier lopez
  • 5 篇 feng yu
  • 5 篇 sun jin
  • 4 篇 fan kai
  • 4 篇 yong-zhen li
  • 4 篇 weizhong zhao
  • 4 篇 yong zhao
  • 4 篇 ma wenping
  • 4 篇 tingting he
  • 4 篇 wang yue
  • 4 篇 hu yupu
  • 4 篇 xingpeng jiang
  • 4 篇 hu yu-pu

语言

  • 247 篇 英文
  • 15 篇 中文
  • 6 篇 其他
检索条件"机构=Lab of Computer Network and Information Security"
268 条 记 录,以下是111-120 订阅
排序:
Is AI Robust Enough for Scientific Research?
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Jun-Jie Song, Jiahao Wang, Xiu-Cheng Li, Fu-Peng Liu, Zehan Chen, Jian-Nan Dang, Haoning Wang, Shiyao Zhang, Yiyan Xu, Jianhui Shi, Chunxiang Wang, Fei Pang, Long-Gang Cheng, Nan Zhang, Weiwei Zhang, Duo Meng, Deyu Northwest Institute of Nuclear Technology No. 28 Pingyu Road Shaanxi Xi’an710024 China School of Telecommunications Engineering Xidian University No. 2 South Taibai Road Shaanxi Xi’an710071 China State Key Laboratory of ISN No. 2 South Taibai Road Shaanxi Xi’an710071 China Institute of Particle Physics Central China Normal University No. 152 Luoyu Road Hubei Wuhan30079 China School of Computer Science and Technology Xi’an Jiaotong University No. 28 Xianning West Road Shaanxi Xi’an710049 China Ministry of Education Key Lab of Intelligent Networks and Network Security Xi’an Jiaotong University No. 28 Xianning West Road Shaanxi Xi’an710049 China Guangzhou Institute of Geography Academy of Sciences No. 100 Xianlie Road Guangdong Guangzhou510070 China National Meteorological Information Center Beijing100044 China MDX Research Center for Element Strategy Institute of Integrated Research Institute of Science Tokyo Midori-ku Yokohama226-8503 Japan School of Physics and Information Technology Shaanxi Normal University No. 620 West Chang’an Avenue Shaanxi Xi’an710119 China School of Aeronautics Northwestern Polytechnical University No. 127 West Youyi Road Shaanxi Xi’an710072 China AI for Science Institute Beijing100080 China DP Technology Beijing100080 China Academy for Advanced Interdisciplinary Studies Peking University Beijing100871 China School of Mathematics and Statistics Xi’an Jiaotong University No. 28 Xianning West Road Shaanxi Xi’an710049 China
We uncover a phenomenon largely overlooked by the scientific community utilizing AI: neural networks exhibit high susceptibility to minute perturbations, resulting in significant deviations in their outputs. Through a... 详细信息
来源: 评论
A survey of gene selection and classification techniques based on cancer microarray data analysis  4
A survey of gene selection and classification techniques bas...
收藏 引用
4th IEEE International Conference on computer and Communications, ICCC 2018
作者: Zhang, Xinman He, Tingting Ouyang, Liwei Xu, Xuebin Chen, Sushing School of Electronics and Information Engineering MOE Key Lab for Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an China Guangdong xi'An Jiaotong University Academy Foshan China CISE Department for Computer Information Science Engineering University of Florida Systems Biology Lab Gainesville United States
A growing number of cancer deaths draws attractions in the areas of bioinformatics worldwide. It is worth noting that cancer microarray data is composed of tens of thousands of genes, but there are only a few dozens o... 详细信息
来源: 评论
LPD communication: A sequential change-point detection perspective
arXiv
收藏 引用
arXiv 2019年
作者: Huang, Ke-Wen Wang, Hui-Ming Towsley, Don Vincent Poor, H. School of Electronics and Information Engineering Ministry of Education Key Lab for Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an Shaanxi710049 China College of Information and Computer Sciences University of Massachusetts AmherstMA01002 United States Department of Electrical Engineering Princeton University PrincetonNJ08544 United States
In this paper, we establish a framework for low probability of detection (LPD) communication from a sequential change-point detection (SCPD) perspective, where a transmitter, Alice, wants to hide her signal transmissi... 详细信息
来源: 评论
Knowledge-aware Few-shot Learning Framework for Biomedical Event Trigger Identification
Knowledge-aware Few-shot Learning Framework for Biomedical E...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Shujuan Yin Weizhong Zhao Xingpeng Jiang Tingting He Hubei Provincial Key Laboratory of Artificial Intelligence and Smart Learning Central China Normal University Wuhan Hubei PR China School of Computer Central China Normal University Wuhan Hubei PR China National Language Resources Monitoring & Research Center for Network Media Central China Normal University Wuhan Hubei PR China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin China Guangxi Key Lab of Multi-source Information Mining & Security Guangxi Normal University Guilin China
Biomedical event extraction aims to detect fine-grained interactions between biomedical entities in biomedical texts, and has become a research hotspot for researchers in the biomedical field. As the first step in bio... 详细信息
来源: 评论
An Effective Framework for Document-level Chemical-induced Disease Relation Extraction via Fine-grained Interaction between Contexts
An Effective Framework for Document-level Chemical-induced D...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Jinyong Zhang Weizhong Zhao Jincai Yang Xingpeng Jiang Tingting He Hubei Provincial Key Laboratory of Artificial Intelligence and Smart Learning Central China Normal University Wuhan Hubei PR China School of Computer Central China Normal University Wuhan Hubei PR China National Language Resources Monitoring & Research Center for Network Media Central China Normal University Wuhan Hubei PR China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin China Guangxi Key Lab of Multi-source Information Mining & Security Guangxi Normal University Guilin China
In recent years, Chemical-induced Disease (CID) relations are the most searched topics by PubMed users worldwide, reflecting its extensive applications in biomedical research and public health field. However, for CID ... 详细信息
来源: 评论
Analyzing Cross-Platform Attacks: Towards a Three-Actor Approach
Analyzing Cross-Platform Attacks: Towards a Three-Actor Appr...
收藏 引用
IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC)
作者: Antonio Acien Ana Nieto Javier Lopez Network Information and Computer Security (NICS)Lab Lenguajes y Ciencias de la Computación Universidad de Málaga Spain
In the current telecommunications landscape, different devices, systems and platforms are constantly communicating with each other. This heterogeneous environment creates the perfect situation for attacks to pass from... 详细信息
来源: 评论
Time-varying massive MIMO channel estimation: Capturing, reconstruction and restoration
arXiv
收藏 引用
arXiv 2019年
作者: Li, Muye Zhang, Shun Zhao, Nan Zhang, Weile Wang, Xianbin State Key Laboratory of Integrated Services Networks Xidian University Xian710071 China School of Information and Communication Engineering Dalian University of Technology Dalian116024 China MOE Key Lab for Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an710049 China Department of Electrical and Computer Engineering Western University LondonON Canada
On the time-varying channel estimation, the traditional downlink (DL) channel restoration schemes usually require the reconstruction for the covariance of downlink process noise vector, which is dependent on DL channe... 详细信息
来源: 评论
network anomaly detection in critical infrastructure based on mininet network simulator  1
Network anomaly detection in critical infrastructure based o...
收藏 引用
1st Italian Conference on Cybersecurity, ITASEC 2017
作者: Bernieri, Giuseppe Pascucci, Federica Lopez, Javier Department of Engineering University Roma Tre Italy Network Information and Computer Security Lab. University of Malaga Malaga29071 Spain
In this paper, a highly-configurable network anomaly detection system for Critical Infrastructure scenarios is presented. The Mininet virtual machine environment has been used in this framework to simulate an Industri... 详细信息
来源: 评论
Towards Incentive Mechanism for Taxi Services Allocation with Privacy Guarantee
Towards Incentive Mechanism for Taxi Services Allocation wit...
收藏 引用
IEEE International Performance Computing and Communications Conference
作者: Donghe Li Qingyu Yang Wei Yu Dou An Xinwen Fu MOE Key Laboratory for Intelligent Networks and Network Security Xi'an Jiaotong University China SKLMSE lab Xi'an Jiaotong University China Department of Computer and Information Sciences Towson University USA Department of Computer Science University of Central Florida Orlando FL USA
With the development of online taxi-hailing systems (DiDi, Uber Lyft, etc.), how to effectively allocate taxis has attracted great attention in the recent past. Meanwhile, with the rapid increase of taxi-related crime... 详细信息
来源: 评论
Achieving Secure and Effective Search Services in Cloud Computing
Achieving Secure and Effective Search Services in Cloud Comp...
收藏 引用
IEEE International Conference on Trust, security and Privacy in Computing and Communications (TrustCom)
作者: Qin Liu Shuyu Pei Kang Xie Jie Wu Tao Peng Guojun Wang College of Computer Science and Electronic Engineering Hunan University P. R. China Key Lab of Information Network Security Ministry of Public Security P. R. China Center for Networked Computing Temple University Philadelphia PA USA School of Computer Science and Educational Software Guangzhou University P. R. China
One critical challenge of today's cloud services is how to provide an effective search service while preserving user privacy. In this paper, we propose a wildcard-based multi-keyword fuzzy search (WMFS) scheme ove... 详细信息
来源: 评论