咨询与建议

限定检索结果

文献类型

  • 148 篇 会议
  • 78 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 227 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 170 篇 工学
    • 138 篇 计算机科学与技术...
    • 114 篇 软件工程
    • 50 篇 信息与通信工程
    • 18 篇 控制科学与工程
    • 14 篇 机械工程
    • 12 篇 电气工程
    • 12 篇 电子科学与技术(可...
    • 9 篇 生物工程
    • 7 篇 生物医学工程(可授...
    • 7 篇 网络空间安全
    • 6 篇 交通运输工程
    • 5 篇 光学工程
    • 5 篇 仪器科学与技术
    • 5 篇 动力工程及工程热...
    • 5 篇 安全科学与工程
    • 3 篇 材料科学与工程(可...
  • 78 篇 理学
    • 57 篇 数学
    • 16 篇 物理学
    • 13 篇 统计学(可授理学、...
    • 9 篇 生物学
    • 5 篇 系统科学
  • 52 篇 管理学
    • 32 篇 图书情报与档案管...
    • 22 篇 管理科学与工程(可...
    • 12 篇 工商管理
  • 11 篇 法学
    • 10 篇 社会学
  • 9 篇 医学
    • 7 篇 临床医学
    • 6 篇 基础医学(可授医学...
    • 3 篇 公共卫生与预防医...
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 3 篇 农学
    • 3 篇 作物学
  • 2 篇 教育学
  • 1 篇 艺术学

主题

  • 9 篇 privacy
  • 9 篇 cryptography
  • 6 篇 authentication
  • 6 篇 semantics
  • 6 篇 training
  • 5 篇 wireless sensor ...
  • 5 篇 feature extracti...
  • 4 篇 deep learning
  • 4 篇 computational mo...
  • 4 篇 security
  • 4 篇 protocols
  • 4 篇 accuracy
  • 4 篇 adaptation model...
  • 3 篇 access control
  • 3 篇 support vector m...
  • 3 篇 big data
  • 3 篇 image segmentati...
  • 3 篇 ad hoc networks
  • 3 篇 optimization
  • 3 篇 real-time system...

机构

  • 8 篇 school of comput...
  • 8 篇 school of cyber ...
  • 8 篇 beijing key lab....
  • 8 篇 guangxi collabor...
  • 7 篇 college of infor...
  • 6 篇 school of comput...
  • 5 篇 shanghai key lab...
  • 5 篇 nanjing fenghuo ...
  • 4 篇 school of comput...
  • 4 篇 ministry of edu....
  • 4 篇 school of cyber ...
  • 4 篇 college of compu...
  • 4 篇 key lab. of comp...
  • 4 篇 school of comput...
  • 4 篇 key lab of compu...
  • 4 篇 purple mountain ...
  • 4 篇 key laboratory o...
  • 4 篇 key lab. of comp...
  • 4 篇 guangxi key lab ...
  • 4 篇 jiangsu high tec...

作者

  • 11 篇 wang yun
  • 9 篇 li hui
  • 8 篇 chunhe xia
  • 8 篇 tianbo wang
  • 8 篇 he jieyue
  • 7 篇 yun wang
  • 7 篇 shih timothy k.
  • 6 篇 chen chen
  • 6 篇 zhang min-ling
  • 5 篇 mi jiacong
  • 5 篇 feng yu
  • 5 篇 liu yongshan
  • 5 篇 zhang yu
  • 4 篇 fan kai
  • 4 篇 yong-zhen li
  • 4 篇 jinbin tu
  • 4 篇 xin geng
  • 4 篇 tu jinbin
  • 4 篇 ma wenping
  • 4 篇 wang yue

语言

  • 203 篇 英文
  • 13 篇 中文
  • 11 篇 其他
检索条件"机构=Lab. of Computer Network and Information Integration"
227 条 记 录,以下是51-60 订阅
排序:
FedDADP: A Privacy-Risk-Adaptive Differential Privacy Protection Method for Federated Android Malware Classifier
FedDADP: A Privacy-Risk-Adaptive Differential Privacy Protec...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Changnan Jiang Chunhe Xia Mengyao Liu Rui Fang Pengfei Li Huacheng Li Tianbo Wang Beijing Key Lab. of Network Technology Beihang University Beijing China Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin China School of Cyber Science and Technology Beihang University Beijing China SNationa Innovation Center of Intelligent and Connected Vehicles Beijing China Shanghai Key Laboratory of Computer Software Evaluating and Testing China
The federated Android malware classifier has attracted much attention owing to its advantages of privacy protection and multi-party joint modeling. However, the research indicates that the gradient transmitted within ... 详细信息
来源: 评论
FedDLM: A Fine-Grained Assessment Scheme for Risk of Sensitive information Leakage in Federated Learning-based Android Malware Classifier
FedDLM: A Fine-Grained Assessment Scheme for Risk of Sensiti...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Changnan Jiang Chunhe Xia Chen Chen Huacheng Li Tianbo Wang Xiaojian Li Beijing Key Lab. of Network Technology Beihang University Beijing China Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin China School of Cyber Science and Technology Beihang University Beijing China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China College of Computer Science and Information Technology Guangxi Normal University Guilin China
In the traditional centralized Android malware classification framework, privacy concerns arise as it requires collecting users’ app samples containing sensitive information directly. To address this problem, new cla... 详细信息
来源: 评论
AIDE: Attack Inference Based on Heterogeneous Dependency Graphs with MITRE ATT&CK
AIDE: Attack Inference Based on Heterogeneous Dependency Gra...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Weidong Zhou Chunhe Xia Nan Feng Xinyi Pan Tianbo Wang Xiaojian Li Beijing Key Lab. of Network Technology Beihang University Beijing China Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin China School of Software & Microelectronics Peking University Beijing China School of Cyber Science and Technology Beihang University Beijing China School of Computer Science and Engineering Guangxi Normal University Guilin China
The MITRE ATT&CK Framework provides a rich and actionable repository of adversarial tactics, techniques, and procedures (TTPs). By leveraging the associations among these techniques, we can infer unobserved techni... 详细信息
来源: 评论
EFwork: An Efficient Framework for Constructing a Malware Knowledge Graph
EFwork: An Efficient Framework for Constructing a Malware Kn...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Chen Chen Chunhe Xia Tianbo Wang Wanshuang Lin Yuan Zhao Yang Li Beijing Key Lab. of Network Technology Beihang University Beijing China Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin China School of Cyber Science and Technology Beihang University Beijing China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China
Malware Knowledge Graph (MKG) serves as an essential auxiliary tool for malware detection and analysis. However, the construction of MKG faces several challenges, such as inadequate dataset quality, incomplete entity ... 详细信息
来源: 评论
REDA: Malicious Traffic Detection Based on Record Length and Frequency Domain Analysis
REDA: Malicious Traffic Detection Based on Record Length and...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Wanshuang Lin Chunhe Xia Tianbo Wang Chen Chen Yuan Zhao Weidong Zhou School of Cyber Science and Technology Beihang University Beijing China Beijing Key Lab. of Network Technology Beihang University Beijing China Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China
The TLS encryption protocol plays a vital role in securing data transmission, but it also presents challenges for payload-based network Intrusion Detection Systems (NIDS). Existing methods utilize statistical characte... 详细信息
来源: 评论
FedDRC: A Robust Federated Learning-based Android Malware Classifier under Heterogeneous Distribution
FedDRC: A Robust Federated Learning-based Android Malware Cl...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Changnan Jiang Chunhe Xia Mengyao Liu Chen Chen Huacheng Li Tianbo Wang Pengfei Li Beijing Key Lab. of Network Technology Beihang University Beijing China Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin China School of Cyber Science and Technology Beihang University Beijing China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China SNationa Innovation Center of Intelligent and Connected Vehicles Beijing China
In the traditional centralized Android malware classification framework, privacy concerns exist due to collected users’ apps containing sensitive information. A new classification framework based on Federated Learnin... 详细信息
来源: 评论
Disentangled high quality salient object detection
arXiv
收藏 引用
arXiv 2021年
作者: Tang, Lv Li, Bo Ding, Shouhong Song, Mofei Youtu Lab Tencent Shanghai China School of Computer Science and Engineering Key Lab of Computer Network and Information Integration Ministry of Education Southeast University Nanjing China
Aiming at discovering and locating most distinctive objects from visual scenes, salient object detection (SOD) plays an essential role in various computer vision systems. Coming to the era of high resolution, SOD meth... 详细信息
来源: 评论
A Private Statistic Query Scheme for Encrypted Electronic Medical Record System *
A Private Statistic Query Scheme for Encrypted Electronic Me...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Xianxian Li Xuemei Fu Feng Yu Zhenkui Shi Jie Li Junhao Yang Guangxi Key Lab of Multi-source Information Mining & Security Guilin China Key Laboratory of Computer Network and Information Integration Southeast University Nanjing China
In this paper, we propose a scheme that supports statistic query and authorized access control on an Encrypted Electronic Medical Records Databases(EMDB). Different from other schemes, it is based on Differential-Priv... 详细信息
来源: 评论
BEIR:A Blockchain-based Encrypted Image Retrieval Scheme
BEIR:A Blockchain-based Encrypted Image Retrieval Scheme
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Xianxian Li Jie Li Feng Yu Xuemei Fu JunHao Yang Yue Chen Guangxi Key Lab of Multi-source Information Mining & Security Guilin China Key Laboratory of Computer Network and Information Integration Southeast University Nanjing China
Encrypted image retrieval may return incorrect or incomplete results due to threats from malicious cloud servers. Most of the existing solutions focus on the efficiency and accuracy of retrieval, lack of verification ... 详细信息
来源: 评论
Funny words detection via Contrastive Representations and Pre-trained Language Model
Funny words detection via Contrastive Representations and Pr...
收藏 引用
Artificial Intelligence, networking and information Technology (AINIT), International Seminar on
作者: Yiming Du Zelin Tian Key Lab of Computer Network and Information Integration School of Computer Science and Engineering- Southeast University (SEU) Nanjing China University of British Columbia Vancouver Canada
Funniness detection of news headlines is a challenging task in computational linguistics. However, most existing works on funniness detection mainly tackle the scenario by simply judging whether a sentence is humorous... 详细信息
来源: 评论