咨询与建议

限定检索结果

文献类型

  • 154 篇 会议
  • 113 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 268 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 193 篇 工学
    • 153 篇 计算机科学与技术...
    • 128 篇 软件工程
    • 43 篇 信息与通信工程
    • 24 篇 控制科学与工程
    • 21 篇 网络空间安全
    • 19 篇 电气工程
    • 16 篇 电子科学与技术(可...
    • 12 篇 生物工程
    • 11 篇 机械工程
    • 9 篇 生物医学工程(可授...
    • 6 篇 交通运输工程
    • 5 篇 仪器科学与技术
    • 4 篇 光学工程
    • 4 篇 化学工程与技术
    • 4 篇 安全科学与工程
  • 85 篇 理学
    • 55 篇 数学
    • 15 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 13 篇 生物学
    • 10 篇 系统科学
    • 5 篇 化学
  • 45 篇 管理学
    • 28 篇 管理科学与工程(可...
    • 18 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 10 篇 法学
    • 6 篇 社会学
    • 4 篇 法学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 8 篇 医学
    • 7 篇 临床医学
    • 6 篇 基础医学(可授医学...
    • 5 篇 药学(可授医学、理...
  • 4 篇 军事学
  • 2 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 17 篇 authentication
  • 12 篇 cryptography
  • 8 篇 deep learning
  • 8 篇 security
  • 8 篇 cloud computing
  • 6 篇 protocols
  • 6 篇 training
  • 5 篇 feature extracti...
  • 5 篇 malware
  • 4 篇 internet of thin...
  • 4 篇 access control
  • 4 篇 reinforcement le...
  • 4 篇 optimization
  • 4 篇 servers
  • 4 篇 internet
  • 4 篇 computers
  • 4 篇 semantics
  • 4 篇 blockchain
  • 4 篇 peer to peer net...
  • 4 篇 trusted computin...

机构

  • 21 篇 key lab of infor...
  • 7 篇 key lab of netwo...
  • 6 篇 guangxi key labo...
  • 6 篇 national compute...
  • 5 篇 network informat...
  • 5 篇 computer departm...
  • 5 篇 institute of inf...
  • 5 篇 key lab. of comp...
  • 4 篇 ministry of edu....
  • 4 篇 key lab. of comp...
  • 4 篇 hebei provincial...
  • 4 篇 key lab of netwo...
  • 4 篇 college of compu...
  • 4 篇 college of mathe...
  • 4 篇 national languag...
  • 4 篇 national compute...
  • 4 篇 school of cyber ...
  • 4 篇 hubei provincial...
  • 4 篇 school of comput...
  • 4 篇 key laboratory o...

作者

  • 9 篇 meng deyu
  • 9 篇 tan zuowen
  • 9 篇 li hui
  • 7 篇 cao xiangyong
  • 6 篇 lopez javier
  • 5 篇 zhang yuqing
  • 5 篇 wang fangwei
  • 5 篇 javier lopez
  • 5 篇 feng yu
  • 5 篇 sun jin
  • 4 篇 fan kai
  • 4 篇 yong-zhen li
  • 4 篇 weizhong zhao
  • 4 篇 yong zhao
  • 4 篇 ma wenping
  • 4 篇 tingting he
  • 4 篇 wang yue
  • 4 篇 hu yupu
  • 4 篇 xingpeng jiang
  • 4 篇 hu yu-pu

语言

  • 247 篇 英文
  • 15 篇 中文
  • 6 篇 其他
检索条件"机构=Lab of Computer Network and Information Security"
268 条 记 录,以下是11-20 订阅
排序:
A Deep Reinforcement Learning Approach for Online Taxi Dispatching
A Deep Reinforcement Learning Approach for Online Taxi Dispa...
收藏 引用
2023 International Conference on networking and network Applications, NaNA 2023
作者: Wang, YuBo Zhang, TaoYi Wei, ZhiCheng Key Lab of Network and Information Security China College of Computer and Cyber Security China Hebei Prov. Eng. Res. Center for Supply Chain Big Data Analytics Security Hebei Normal University Hebei Province Shijiazhuang China
With the development of smart city transportation systems, developing reasonable dispatching strategies for idle ride-hailing vehicles has become an urgent research problem. In this paper, we address the short-sighted... 详细信息
来源: 评论
Taxi Station Location Model Based on Spatio-Temporal Demand Cube
Taxi Station Location Model Based on Spatio-Temporal Demand ...
收藏 引用
2023 International Conference on networking and network Applications, NaNA 2023
作者: Gao, LuLu Li, XiaoNan Wei, ZhiCheng Key Lab of Network and Information Security Hebei Province Shijiazhuang China College of Computer and Cyber Security Hebei Province Shijiazhuang China Hebei Normal University Hebei Provincial Engineering Research Center for Supply Chain Big Data Analytics & Security Hebei Province Shijiazhuang China
With the widespread use of mobile apps, empty taxis can easily receive new orders without having to roam around. Therefore, it is necessary to plan taxi stations where empty taxis can park. In the location selection p... 详细信息
来源: 评论
A Novel Meta-Hierarchical Active Inference Reinforcement Learning Approach for QoS-Driven Resource Allocation in Dynamic Clouds
A Novel Meta-Hierarchical Active Inference Reinforcement Lea...
收藏 引用
2024 IEEE Global Communications Conference, GLOBECOM 2024
作者: Xian, Peijie He, Ying Yu, F. Richard Du, Jianbo Shenzhen Univ. College of Computer Science and Software Engineering Shenzhen China Xi'an Univ. of Posts & Telecomm. Shaanxi Key Lab. of Information Comm. Network and Security Shaanxi Xi'an China Carleton Univ. School of Information Technology OttawaON Canada
The cloud computing environment is highly dynamic due to a variety of external factors such as seasonal changes, market trends, and social events. In this case, tenant behavior patterns exhibit significant variability... 详细信息
来源: 评论
An Efficient Unsupervised Domain Adaptation Deep Learning Model for Unknown Malware Detection  1
收藏 引用
4th EAI International Conference on security and Privacy in New Computing Environments, SPNCE 2021
作者: Wang, Fangwei Chai, Guofang Li, Qingru Wang, Changguang Key Lab of Network and Information Security of Hebei Province Hebei Normal University Shijiazhuang050024 China College of Computer and Cyberspace Security Hebei Normal University Shijiazhuang050024 China
Emerging malware and zero-day vulnerabilities present new challenges to malware detection. Currently, numerous proposed malware detection approaches are based on supervised learning. However, these methods rely on a l... 详细信息
来源: 评论
An IoMT based Ensemble Classification Framework to Predict Treatment Response in Hepatitis C Patients
An IoMT based Ensemble Classification Framework to Predict T...
收藏 引用
2022 International Conference on Business Analytics for Technology and security, ICBATS 2022
作者: Ghazal, Taher M. Abbas, Sagheer Ahmad, Munir Aftab, Shabib Faculty of Information Science and Technology Ukm Center for Cyber Security Network and Communication Technology Lab Malaysia NCBAandE School of Computer Science Lahore Pakistan
Hepatitis C is considered a deadly disease as mortality rate in the patients suffering from this disease is very high, if not properly treated. This research proposes an IOMT based ensemble classification framework fo... 详细信息
来源: 评论
Uplink Control information Based Clustered Access and Discontinuous Reception Management for mMTC
收藏 引用
IEEE Communications Letters 2025年 第6期29卷 1380-1384页
作者: Wang, Shao-Di Wang, Chang-Long Wang, Hui-Ming Zhou, Feng Leung, Victor C. M. Xidian University Key Laboratory of Electronic Information Countermeasure and Simulation Technology of Ministry of Education Xi’an710071 China Xi’an Jiaotong University School of Information and Communication Engineering Ministry of Education Key Lab for Intelligent Networks and Network Security Xi’an710049 China Shenzhen MSU BIT University Artificial Intelligence Research Institute Shenzhen518172 China Shenzhen University College of Computer Science and Software Engineering Shenzhen518060 China The University of British Columbia Department of Electrical and Computer Engineering VancouverBCV6T 1Z4 Canada
Uplink control information (UCI) and discontinuous reception (DRX) play important roles for massive machine type communication (mMTC). Despite their standalone significance, a conspicuous gap exists in comprehensively... 详细信息
来源: 评论
Early Detection of Autism in Children Using Transfer Learning
收藏 引用
Intelligent Automation & Soft Computing 2023年 第4期36卷 11-22页
作者: Taher M.Ghazal Sundus Munir Sagheer Abbas Atifa Athar Hamza Alrababah Muhammad Adnan Khan School of Information Technology Skyline University CollegeSharjah1797UAE Network and Communication Technology Lab Center for Cyber SecurityFaculty of Information Science and Technology Universiti Kebangsaan Malaysia43600Malaysia School of Computer Science National College of Business Administration&EconomicsLahore54000Pakistan Lahore Garrison University Lahore54000Pakistan Department of Computer Science COMSATS University Islamabad–Lahore CampusLahore54000Pakistan Department of Software Pattern Recognition and Machine Learning LabGachon UniversitySeongnamGyeonggido13120Korea
Autism spectrum disorder(ASD)is a challenging and complex neurodevelopment syndrome that affects the child’s language,speech,social skills,communication skills,and logical thinking *** early detection of ASD is essen... 详细信息
来源: 评论
Evading IoT Intrusion Detection Systems with GAN
Evading IoT Intrusion Detection Systems with GAN
收藏 引用
Asia Joint Conference on information security (Asia JCIS)
作者: Mariama Mbow Rodrigo Roman Takeshi Takahashi Kouichi Sakurai Department of Informatics Kyushu University Japan Network Information and Computer Security (NICS) Lab University of Malaga Spain National Institute of Information and Communications Technology Tokyo Japan
network intrusion detection systems are essential tools used in cybersecurity to detect malicious traffic. They are used in the Internet of Things (IoT) to monitor the network traffic and identify infected IoT devices... 详细信息
来源: 评论
Integration of MPC into Besu through an extended private transaction model
Integration of MPC into Besu through an extended private tra...
收藏 引用
Metaverse Computing, networking and Applications (MetaCom), IEEE International Conference on
作者: Daniel Morales Isaac Agudo Javier Lopez Department of Computer Science Network Information and Computer Security Lab ITIS Software Universidad de Málaga Málaga Spain
In the last few years we have seen many different approaches to incorporate privacy features to blockchains. In the area of cryptocurrencies that would normally mean protecting the identity of the owner of some funds,...
来源: 评论
CYBERSHIELD: A Competitive Simulation Environment for Training AI in Cybersecurity
CYBERSHIELD: A Competitive Simulation Environment for Traini...
收藏 引用
International Conference on Internet of Things: Systems, Management and security
作者: José Álvaro Fernández Carrasco Iñigo Amonarriz Pagola Raúl Orduna Urrutia Rodrigo Román Vicomtech Basque Research and Technology Alliance (BRTA) Donostia San Sebastian Spain Network Information and Computer Security Lab University of Malaga Malaga Spain
Simulation environments are crucial in cybersecurity for training AI algorithms, providing a secure and controlled space to explore the impact derived from diverse cyber threads. They offer a flexible platform for acc... 详细信息
来源: 评论