咨询与建议

限定检索结果

文献类型

  • 155 篇 会议
  • 109 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 265 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 189 篇 工学
    • 149 篇 计算机科学与技术...
    • 124 篇 软件工程
    • 41 篇 信息与通信工程
    • 24 篇 控制科学与工程
    • 21 篇 网络空间安全
    • 19 篇 电气工程
    • 16 篇 电子科学与技术(可...
    • 12 篇 生物工程
    • 11 篇 机械工程
    • 9 篇 生物医学工程(可授...
    • 6 篇 交通运输工程
    • 5 篇 仪器科学与技术
    • 4 篇 光学工程
    • 4 篇 化学工程与技术
    • 4 篇 安全科学与工程
  • 84 篇 理学
    • 54 篇 数学
    • 15 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 13 篇 生物学
    • 10 篇 系统科学
    • 5 篇 化学
  • 43 篇 管理学
    • 28 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 9 篇 法学
    • 6 篇 社会学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 8 篇 医学
    • 7 篇 临床医学
    • 6 篇 基础医学(可授医学...
    • 5 篇 药学(可授医学、理...
  • 4 篇 军事学
    • 4 篇 军队指挥学
  • 2 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 17 篇 authentication
  • 11 篇 cryptography
  • 9 篇 cloud computing
  • 8 篇 deep learning
  • 8 篇 security
  • 7 篇 training
  • 6 篇 protocols
  • 5 篇 feature extracti...
  • 5 篇 malware
  • 5 篇 heuristic algori...
  • 4 篇 internet of thin...
  • 4 篇 access control
  • 4 篇 reinforcement le...
  • 4 篇 optimization
  • 4 篇 servers
  • 4 篇 internet
  • 4 篇 computers
  • 4 篇 semantics
  • 4 篇 blockchain
  • 4 篇 trusted computin...

机构

  • 21 篇 key lab of infor...
  • 7 篇 key lab of netwo...
  • 6 篇 guangxi key labo...
  • 6 篇 national compute...
  • 5 篇 network informat...
  • 5 篇 computer departm...
  • 5 篇 institute of inf...
  • 4 篇 ministry of edu....
  • 4 篇 key lab. of comp...
  • 4 篇 hebei provincial...
  • 4 篇 key lab of netwo...
  • 4 篇 college of compu...
  • 4 篇 college of mathe...
  • 4 篇 national languag...
  • 4 篇 national compute...
  • 4 篇 school of cyber ...
  • 4 篇 hubei provincial...
  • 4 篇 school of comput...
  • 4 篇 key laboratory o...
  • 4 篇 guangxi key lab ...

作者

  • 9 篇 meng deyu
  • 9 篇 tan zuowen
  • 9 篇 li hui
  • 7 篇 cao xiangyong
  • 6 篇 lopez javier
  • 5 篇 zhang yuqing
  • 5 篇 wang fangwei
  • 5 篇 javier lopez
  • 5 篇 feng yu
  • 5 篇 sun jin
  • 4 篇 fan kai
  • 4 篇 yong-zhen li
  • 4 篇 weizhong zhao
  • 4 篇 yong zhao
  • 4 篇 ma wenping
  • 4 篇 tingting he
  • 4 篇 wang yue
  • 4 篇 hu yupu
  • 4 篇 xingpeng jiang
  • 4 篇 guo shu

语言

  • 237 篇 英文
  • 17 篇 其他
  • 11 篇 中文
检索条件"机构=Lab of Computer Network and Information Security"
265 条 记 录,以下是41-50 订阅
排序:
An Improved iBAT-COOP Protocol for Cooperative Diversity in FANETs
收藏 引用
computers, Materials & Continua 2021年 第5期67卷 2527-2546页
作者: Shahzad Hameed Qurratul-Ain Minhas Sheeraz Ahmed Shabana Habib Mohammad Kamrul Hasan Muhammad Islam Sheroz Khan Quaid-i-Azam University IslamabadPakistan Iqra National University PeshawarPakistan Network and Communication Technology Lab Center for Cyber SecurityUKMBangiMalaysia Department of Information Technology College of ComputerQassim UniversityBuraydahSaudi Arabia Department of Electrical Engineering Onaizah College of Engineering&Information TechnologyAl-QassimSaudi Arabia
Flying ad hoc networks(FANETs)present a challenging environment due to the dynamic and highly mobile nature of the *** network topology and uncertain node mobility structure of FANETs do not aim to consider only one p... 详细信息
来源: 评论
A Novel Meta-Hierarchical Active Inference Reinforcement Learning Approach for QoS-Driven Resource Allocation in Dynamic Clouds
A Novel Meta-Hierarchical Active Inference Reinforcement Lea...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Peijie Xian Ying He F. Richard Yu Jianbo Du College of Computer Science and Software Engineering Shenzhen Univ. Shenzhen China Shaanxi Key Lab. of Information Comm. Network and Security Xi’an Univ. of Posts & Telecomm. Xi’an China School of Information Technology Carleton Univ. Ottawa Canada
The cloud computing environment is highly dynamic due to a variety of external factors such as seasonal changes, market trends, and social events. In this case, tenant behavior patterns exhibit significant variability... 详细信息
来源: 评论
Robot and its living space:A roadmap for robot development based on the view of living space
收藏 引用
Digital Communications and networks 2021年 第4期7卷 505-517页
作者: Xiaofeng Cai Huansheng Ning Sahraoui Dhelim Rongjuan Zhou Tao Zhang Yang Xu Yueliang Wan School of Computer and Communication Engineering University of Science and Technology Beijing Beijing 100083China Beijing Engineering Research Center for Cyberspace Data Analysis and Applications Beijing 100083China School of Foreign Studies University of Science and Technology Beijing Beijing 100083China Key Lab of Information Network Security Ministry of Public SecurityChina Run Technologies Co. LidBeijing China
Robot’s living space Human-robot relationship Robot humanization Hybrid intelligence Human-robot integrated society Robots,as the creation of humans,became an irreplaceable component in human *** the advancement of t... 详细信息
来源: 评论
SemiCD-VL: Visual-Language Model Guidance Makes Better Semi-supervised Change Detector
arXiv
收藏 引用
arXiv 2024年
作者: Li, Kaiyu Cao, Xiangyong Deng, Yupeng Song, Jiayi Liu, Junmin Meng, Deyu Wang, Zhi School of Software Engineering Xi’an Jiaotong University Xi’an710049 China School of Computer Science and Technology Ministry of Education Key Lab For Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an710049 China Aerospace Information Research Institute Chinese Academy of Sciences Beijing100094 China School of Mathematics and Statistics Ministry of Education Key Lab of Intelligent Networks and Network Security Xi’an Jiaotong University Shaanxi Xi’an China Guangdong Guangzhou China
Change Detection (CD) aims to identify pixels with semantic changes between images. However, annotating massive numbers of pixel-level images is labor-intensive and costly, especially for multi-temporal images, which ... 详细信息
来源: 评论
An Efficient and Accurate Encrypted Image Retrieval Scheme via Ball Tree
An Efficient and Accurate Encrypted Image Retrieval Scheme v...
收藏 引用
International Conference on Big Data Computing and Communications (BIGCOM)
作者: Xianxian Li Jie Lei Zhenkui Shi Feng Yu College of computer science Guangxi Normal University Guilin China Guangxi Key Lab of Multi-source Information Mining & Security Guilin China Key Laboratory of Computer Network Information Integration Southeast University Nanjing China
With the rise and development of cloud computing, more and more companies try to outsource computing and storage to cloud in order to save storage and computing cost. Due to the rich information contained in images, t... 详细信息
来源: 评论
Deep Feature Surgery: Towards Accurate and Efficient Multi-Exit networks
arXiv
收藏 引用
arXiv 2024年
作者: Gong, Cheng Chen, Yao Luo, Qiuyang Lu, Ye Li, Tao Zhang, Yuzhi Sun, Yufei Zhang, Le College of Software Nankai University China College of Computer Science Nankai University China National University of Singapore Singapore School of Information and Communication Engineering University of Electronic Science and Technology of China China HAIHE Lab of ITAI China Tianjin Key Laboratory of Network and Data Security Technology China Key Laboratory of Data and Intelligent System Security Ministry of Education
Multi-exit network is a promising architecture for efficient model inference by sharing backbone networks and weights among multiple exits. However, the gradient conflict of the shared weights results in sub-optimal a... 详细信息
来源: 评论
A Lightweight Sparse Focus Transformer for Remote Sensing Image Change Captioning
arXiv
收藏 引用
arXiv 2024年
作者: Sun, Dongwei Bao, Yajie Liu, Junmin Cao, Xiangyong School of Computer Science and Technology the Ministry of Education Key Lab for Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an710049 China Department of Information Science School of Mathematics and Statistics Xi’an Jiaotong University No.28 Xianning West Road Shaanxi Xi’an710049 China
Remote sensing image change captioning (RSICC) aims to automatically generate sentences that describe content differences in remote sensing bitemporal images. Recently, attention-based transformers have become a preva... 详细信息
来源: 评论
A Natural Language Processing Approach for Instruction Set Architecture Identification
arXiv
收藏 引用
arXiv 2022年
作者: Sahabandu, Dinuka Mertoguno, Sukarno Poovendran, Radha The Network Security Lab Department of Electrical and Computer Engineering University of Washington SeattleWA98195-2500 United States The Institute for Information Security & Privacy Georgia Institute of Technology North Avenue AtlantaGA30332 United States
Binary analysis of software is a critical step in cyber forensics applications such as program vulnerability assessment and malware detection. This involves interpreting instructions executed by software and often nec... 详细信息
来源: 评论
New Identity Based Proxy Re-Encryption Scheme from Lattices
收藏 引用
China Communications 2019年 第10期16卷 174-190页
作者: Liqiang Wu Xiaoyuan Yang Minqing Zhang Longfei Liu Key Lab of Network and Information Security Engineering University of Chinese Armed Police ForceXi’an 710086China Key Lab of Computer Network and Information Security Xi Dian UniversityXi’an 710071China
Identity-Based Proxy Re-Encryption (IB-PRE) allows a semi-trusted proxy to convert the ciphertext encrypted under Alice’s identity into Bob’s ciphertext of the same message without leaking plaintext. Lattice-based c... 详细信息
来源: 评论
Splicer+: Secure Hub Placement and Deadlock-Free Routing for Payment Channel network Scalability
arXiv
收藏 引用
arXiv 2025年
作者: Yang, Lingxiao Dong, Xuewen Wang, Wei Gao, Sheng Qu, Qiang Tian, Wensheng Shen, Yulong The School of Computer Science and Technology Xidian University Xi’an710071 China The Shaanxi Key Laboratory of Network and System Security Xi’an710071 China The Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing Jiaotong University Beijing100044 China The School of Information Central University of Finance and Economics Beijing100081 China The Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Shenzhen518055 China The Huawei Blockchain Lab Huawei Cloud Tech Co. Ltd. Shenzhen518055 China The Nanhu Lab Jiaxing314001 China The Cryptology and Computer Security Laboratory Shanghai Jiao Tong University Shanghai200240 China
Payment channel hub (PCH) is a promising approach for payment channel networks (PCNs) to improve efficiency by deploying robust hubs to steadily process off-chain transactions. However, existing PCHs, often preplaced ... 详细信息
来源: 评论