咨询与建议

限定检索结果

文献类型

  • 154 篇 会议
  • 113 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 268 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 193 篇 工学
    • 153 篇 计算机科学与技术...
    • 128 篇 软件工程
    • 43 篇 信息与通信工程
    • 24 篇 控制科学与工程
    • 21 篇 网络空间安全
    • 19 篇 电气工程
    • 16 篇 电子科学与技术(可...
    • 12 篇 生物工程
    • 11 篇 机械工程
    • 9 篇 生物医学工程(可授...
    • 6 篇 交通运输工程
    • 5 篇 仪器科学与技术
    • 4 篇 光学工程
    • 4 篇 化学工程与技术
    • 4 篇 安全科学与工程
  • 85 篇 理学
    • 55 篇 数学
    • 15 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 13 篇 生物学
    • 10 篇 系统科学
    • 5 篇 化学
  • 45 篇 管理学
    • 28 篇 管理科学与工程(可...
    • 18 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 10 篇 法学
    • 6 篇 社会学
    • 4 篇 法学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 8 篇 医学
    • 7 篇 临床医学
    • 6 篇 基础医学(可授医学...
    • 5 篇 药学(可授医学、理...
  • 4 篇 军事学
  • 2 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 17 篇 authentication
  • 12 篇 cryptography
  • 8 篇 deep learning
  • 8 篇 security
  • 8 篇 cloud computing
  • 6 篇 protocols
  • 6 篇 training
  • 5 篇 feature extracti...
  • 5 篇 malware
  • 4 篇 internet of thin...
  • 4 篇 access control
  • 4 篇 reinforcement le...
  • 4 篇 optimization
  • 4 篇 servers
  • 4 篇 internet
  • 4 篇 computers
  • 4 篇 semantics
  • 4 篇 blockchain
  • 4 篇 peer to peer net...
  • 4 篇 trusted computin...

机构

  • 21 篇 key lab of infor...
  • 7 篇 key lab of netwo...
  • 6 篇 guangxi key labo...
  • 6 篇 national compute...
  • 5 篇 network informat...
  • 5 篇 computer departm...
  • 5 篇 institute of inf...
  • 5 篇 key lab. of comp...
  • 4 篇 ministry of edu....
  • 4 篇 key lab. of comp...
  • 4 篇 hebei provincial...
  • 4 篇 key lab of netwo...
  • 4 篇 college of compu...
  • 4 篇 college of mathe...
  • 4 篇 national languag...
  • 4 篇 national compute...
  • 4 篇 school of cyber ...
  • 4 篇 hubei provincial...
  • 4 篇 school of comput...
  • 4 篇 key laboratory o...

作者

  • 9 篇 meng deyu
  • 9 篇 tan zuowen
  • 9 篇 li hui
  • 7 篇 cao xiangyong
  • 6 篇 lopez javier
  • 5 篇 zhang yuqing
  • 5 篇 wang fangwei
  • 5 篇 javier lopez
  • 5 篇 feng yu
  • 5 篇 sun jin
  • 4 篇 fan kai
  • 4 篇 yong-zhen li
  • 4 篇 weizhong zhao
  • 4 篇 yong zhao
  • 4 篇 ma wenping
  • 4 篇 tingting he
  • 4 篇 wang yue
  • 4 篇 hu yupu
  • 4 篇 xingpeng jiang
  • 4 篇 hu yu-pu

语言

  • 247 篇 英文
  • 15 篇 中文
  • 6 篇 其他
检索条件"机构=Lab of Computer Network and Information Security"
268 条 记 录,以下是81-90 订阅
排序:
Threat-Based Declassification and Endorsement for Mobile Computing
收藏 引用
Chinese Journal of Electronics 2019年 第5期28卷 1041-1052页
作者: YIN Lihua GUO Yunchuan ZHANG Huibing HUANG Wenting FANG Binxing Cyberspace Institute of Advanced Technology Guangzhou University The State Key Laboratory of Information Security Institute of Information Engineering CAS Guangxi Key Lab of Trusted Software Guilin University of Electronic Technology The National Computer Network Emergency Response Technical Team/Coordination Center of China
Declassification and endorsement can efficiently improve the usability of mobile ***, both declassify and endorse operations in practice are often ad-hoc and nondeterministic, thus, being insecure. From a new perspect... 详细信息
来源: 评论
security of Medical Cyber-physical Systems: An Empirical Study on Imaging Devices
Security of Medical Cyber-physical Systems: An Empirical Stu...
收藏 引用
IEEE Conference on computer Communications Workshops, INFOCOM Wksps
作者: Zhiqiang Wang Pingchuan Ma Xiaoxiang Zou Jianyi Zhang Tao Yang Beijing Electronic Science and Technology Institute State Information Center National Computer Network Emergency Response Technical Team/Coordination Center of China Key Lab of Information Network Security Ministry of Public Security
Recent years have witnessed a boom of connected medical devices, which brings security issues in the meantime. Medical imaging devices, an essential part of medical cyber-physical systems, play a vital role in modern ... 详细信息
来源: 评论
Neural Gradient Regularizer
arXiv
收藏 引用
arXiv 2023年
作者: Xu, Shuang Wang, Yifan Zhao, Zixiang Peng, Jiangjun Cao, Xiangyong Meng, Deyu Zhang, Yulun Timofte, Radu Van Gool, Luc School of Mathematics and Statistics Northwestern Polytechnical University Xi’an710021 China Research and Development Institute Northwestern Polytechnical University in Shenzhen Shenzhen518063 China School of Electronic and Information Engineering The Key Laboratory for Intelligent Networks and Network Security Ministry of Education Xi’an Jiaotong University Xi’an710049 China School of Mathematics and Statistics Xi’an Jiaotong University Xi’an710049 China Computer Vision Lab ETH Zurich Zürich8092 Switzerland
Owing to its significant success, the prior imposed on gradient maps has consistently been a subject of great interest in the field of image processing. Total variation (TV), one of the most representative regularizer... 详细信息
来源: 评论
Are Dense labels Always Necessary for 3D Object Detection from Point Cloud?
arXiv
收藏 引用
arXiv 2024年
作者: Gao, Chenqiang Liu, Chuandong Shu, Jun Liu, Fangcen Liu, Jiang Yang, Luyu Gao, Xinbo Meng, Deyu The School of Intelligent Systems Engineering The Shen-zhen Campus of Sun Yatsen University Sun Yat-sen University Guangdong Shenzhen518107 China The School of Computer Science Wuhan University Wuhan430072 China School of Mathematics and Statistics Ministry of Education Key Lab of Intelligent Networks and Network Security Xi’an Jiaotong University Shaanxi 710049 China School of Communication and Information Engineering Chongqing University of Posts and Telecommunications Chongqing400065 China Meta Menlo Park94025 United States University of Maryland College Park20742 United States
Current state-of-the-art (SOTA) 3D object detection methods often require a large amount of 3D bounding box annotations for training. However, collecting such large-scale densely-supervised datasets is notoriously cos... 详细信息
来源: 评论
Semantics-Guided Contrastive network for Zero-Shot Object Detection
arXiv
收藏 引用
arXiv 2021年
作者: Yan, Caixia Chang, Xiaojun Luo, Minnan Liu, Huan Zhang, Xiaoqin Zheng, Qinghua The Ministry of Education Key Lab of Intelligent Networks and Network Security National Engineering Lab for Big Data Analytics School of Electronic and Information Engineering Xi'an Jiaotong University Shaanxi710049 China The ReLER Lab AAAI Faculty of Engineering and Information Technology University of Technology Sydney Australia The College of Computer Science and Artificial Intelligence Wenzhou University China
Zero-shot object detection (ZSD), the task that extends conventional detection models to detecting objects from unseen categories, has emerged as a new challenge in computer vision. Most existing approaches tackle the... 详细信息
来源: 评论
Deep structural point process for learning temporal interaction networks
arXiv
收藏 引用
arXiv 2021年
作者: Cao, Jiangxia Lin, Xixun Cong, Xin Guo, Shu Tang, Hengzhu Liu, Tingwen Wang, Bin Institute of Information Engineering Chinese Academy of Sciences School of Cyber Security University of Chinese Academy of Sciences China National Computer Network Emergency Response Technical Team Coordination Center of China Xiaomi AI Lab Xiaomi Inc.
This work investigates the problem of learning temporal interaction networks. A temporal interaction network consists of a series of chronological interactions between users and items. Previous methods tackle this pro... 详细信息
来源: 评论
Blockchain-Based Secure Authentication Scheme for Medical Data Sharing  5th
Blockchain-Based Secure Authentication Scheme for Medical Da...
收藏 引用
5th International Conference of Pioneer computer Scientists, Engineers and Educators, ICPCSEE 2019
作者: Cheng, Xu Chen, Fulong Xie, Dong Sun, Hui Huang, Cheng Qi, Zhuyun School of Computer and Information Anhui Normal University Wuhu241002 China Anhui Provincial Key Lab of Network and Information Security Wuhu241002 China School of Electronic and Computer Engineering Peking University Shenzhen518000 China
Data security is vital for medical cyber physical system (MCPS). The decentralization feature of blockchain is helpful to solve the problem that the secure authentication process is highly dependent on the trusted thi... 详细信息
来源: 评论
Triple-view Learning for Predicting Antibiotic Resistance Genes
Triple-view Learning for Predicting Antibiotic Resistance Ge...
收藏 引用
2021 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2021
作者: Luo, Shujie Wu, Haifang Zhao, Weizhong Jiang, Xingpeng He, Tingting Central China Normal University Hubei Provincial Key Laboratory of Artificial Intelligence and Smart Learning Wuhan430079 China School of Computer Central China Normal University Hubei Wuhan430079 China National Language Resources Monitoring and Research Center for Network Media Central China Normal University Hubei Wuhan430079 China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin541004 China Guangxi Key Lab of Multi-source Information Mining and Security Guangxi Normal University Guilin541004 China
With the increasing resistance of bacteria to antibiotics, the problem of antibiotic resistance has become a major challenge in healthcare. Therefore, the accurate identification of antibiotic resistance genes (ARGs) ... 详细信息
来源: 评论
An improved RL-based framework for multiple biomedical event extraction via self-supervised learning
An improved RL-based framework for multiple biomedical event...
收藏 引用
2021 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2021
作者: Zhao, Yao Zhao, Weizhong Jiang, Xingpeng He, Tingting Su, Bianping Central China Normal University Hubei Provincial Key Laboratory of Artificial Intelligence and Smart Learning Hubei Wuhan430079 China School of Computer Central China Normal University Hubei Wuhan430079 China National Language Resources Monitoring and Research Center for Network Media Central China Normal University Hubei Wuhan430079 China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin541004 China Guangxi Key Lab of Multi-source Information Mining and Security Guangxi Normal University Guilin541004 China Xi'An University of Architecture and Technology Shanxi Xi'an China
The main goal of biomedical event extraction is to structurally extract biomedical events from texts, however, the specificity of the domain makes both text modeling and data annotation very difficult. We propose a se... 详细信息
来源: 评论
FANS: fuzzing android native system services via automated interface analysis  20
FANS: fuzzing android native system services via automated i...
收藏 引用
Proceedings of the 29th USENIX Conference on security Symposium
作者: Baozheng Liu Chao Zhang Guang Gong Yishun Zeng Haifeng Ruan Jianwei Zhuge Institute of Network Science and Cyberspace Tsinghua University and Beijing National Research Center for Information Science and Technology Alpha Lab 360 Internet Security Center Department of Computer Science and Technology Tsinghua University
Android native system services provide essential supports and fundamental functionalities for user apps. Finding vulnerabilities in them is crucial for Android security. Fuzzing is one of the most popular vulnerabilit...
来源: 评论