咨询与建议

限定检索结果

文献类型

  • 163 篇 会议
  • 115 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 279 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 199 篇 工学
    • 151 篇 计算机科学与技术...
    • 126 篇 软件工程
    • 44 篇 信息与通信工程
    • 25 篇 控制科学与工程
    • 25 篇 网络空间安全
    • 19 篇 电气工程
    • 17 篇 电子科学与技术(可...
    • 12 篇 机械工程
    • 12 篇 生物工程
    • 9 篇 生物医学工程(可授...
    • 7 篇 仪器科学与技术
    • 6 篇 交通运输工程
    • 4 篇 光学工程
    • 4 篇 化学工程与技术
    • 4 篇 安全科学与工程
  • 85 篇 理学
    • 55 篇 数学
    • 15 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 13 篇 生物学
    • 10 篇 系统科学
    • 5 篇 化学
  • 44 篇 管理学
    • 29 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 9 篇 法学
    • 6 篇 社会学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 8 篇 医学
    • 7 篇 临床医学
    • 6 篇 基础医学(可授医学...
    • 5 篇 药学(可授医学、理...
  • 5 篇 军事学
    • 5 篇 军队指挥学
  • 2 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 17 篇 authentication
  • 12 篇 cryptography
  • 9 篇 security
  • 8 篇 deep learning
  • 8 篇 cloud computing
  • 7 篇 training
  • 6 篇 protocols
  • 5 篇 feature extracti...
  • 5 篇 malware
  • 5 篇 heuristic algori...
  • 4 篇 internet of thin...
  • 4 篇 access control
  • 4 篇 reinforcement le...
  • 4 篇 optimization
  • 4 篇 servers
  • 4 篇 internet
  • 4 篇 computers
  • 4 篇 semantics
  • 4 篇 blockchain
  • 4 篇 network security

机构

  • 21 篇 key lab of infor...
  • 7 篇 key lab of netwo...
  • 6 篇 guangxi key labo...
  • 6 篇 national compute...
  • 5 篇 network informat...
  • 5 篇 computer departm...
  • 5 篇 institute of inf...
  • 4 篇 ministry of edu....
  • 4 篇 key lab. of comp...
  • 4 篇 hebei provincial...
  • 4 篇 key lab of netwo...
  • 4 篇 college of compu...
  • 4 篇 school of inform...
  • 4 篇 college of mathe...
  • 4 篇 national languag...
  • 4 篇 national compute...
  • 4 篇 school of cyber ...
  • 4 篇 hubei provincial...
  • 4 篇 school of comput...
  • 4 篇 key laboratory o...

作者

  • 9 篇 meng deyu
  • 9 篇 tan zuowen
  • 9 篇 li hui
  • 7 篇 cao xiangyong
  • 6 篇 lopez javier
  • 5 篇 zhang yuqing
  • 5 篇 wang fangwei
  • 5 篇 javier lopez
  • 5 篇 feng yu
  • 5 篇 sun jin
  • 4 篇 fan kai
  • 4 篇 yong-zhen li
  • 4 篇 weizhong zhao
  • 4 篇 yong zhao
  • 4 篇 ma wenping
  • 4 篇 tingting he
  • 4 篇 wang yue
  • 4 篇 hu yupu
  • 4 篇 xingpeng jiang
  • 4 篇 hu yu-pu

语言

  • 236 篇 英文
  • 28 篇 其他
  • 15 篇 中文
检索条件"机构=Lab.of Computer Network and Information Security"
279 条 记 录,以下是11-20 订阅
排序:
A study on the Application of Multilevel Secure Hash Function in Blockchain  2
A study on the Application of Multilevel Secure Hash Functio...
收藏 引用
2022 2nd Conference on High Performance Computing and Communication Engineering, HPCCE 2022
作者: Jin, Shi-Mei Wang, Yi-Han Li, Yongzhen Yanbian University Information Technology Education Yanji133000 China Yanbian University Network Communication and Information Security Lab. Dept. of Computer Science and Technology Yanji133000 China
With the rapid development and upgrade of the social network and IT, information security has become increasingly significant. Hash function has become a research key-point in the field of information security. To mee... 详细信息
来源: 评论
Speed Master: Quick or Slow Play to Attack Speaker Recognition  39
Speed Master: Quick or Slow Play to Attack Speaker Recogniti...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Ye, Zhe Zhang, Wenjie Ren, Ying Kang, Xiangui Yan, Diqun Ma, Bin Wang, Shiqi Guangdong Key Lab of Information Security School of Computer Science and Engineering Sun Yat-sen University Guangzhou China Faculty of Electrical Engineering and Computer Science Ningbo University Ningbo China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology Shandong Academy of Sciences Jinan China Department of Computer Science City University of Hong Kong Hong Kong
Backdoor attacks pose a significant threat during the model’s training phase. Attackers craft pre-defined triggers to break deep neural networks, ensuring the model accurately classifies clean samples during inferenc... 详细信息
来源: 评论
network Intrusion Detection in Internet of Blended Environment Using Ensemble of Heterogeneous Autoencoders(E-HAE)
收藏 引用
computer Systems Science & Engineering 2023年 第9期46卷 3261-3284页
作者: Lelisa Adeba Jilcha Deuk-Hun Kim Julian Jang-Jaccard Jin Kwak ISAA Lab. Department of AI Convergence NetworkAjou UniversitySuwon16499Korea ISAA Lab. Institute for Information and CommunicationAjou UniversitySuwon16499Korea Department of Computer Science and Information Technology Massey UniversityAuckland0745New Zealand Department of Cyber Security Ajou UniversitySuwon16499Korea
Contemporary attackers,mainly motivated by financial gain,consistently devise sophisticated penetration techniques to access important information or *** growing use of Internet of Things(IoT)technology in the contemp... 详细信息
来源: 评论
Secure fusion of encrypted remote sensing images based on Brovey
收藏 引用
Science China(information Sciences) 2021年 第2期64卷 243-245页
作者: Junzhi YANG Guohua CHENG Meng SHEN School of Information and Electronics Beijing Institute of Technology School of Computer Science Beijing Institute of Technology Key Lab of Information Network Security of Ministry of Public Security (The Third Research Institute of Ministry of Public Security)
Dear editor,In the field of image fusion, panchromatic images captured by the Satellite Pour l'Observation de la Terre(SPOT) [1]have high spatial resolutions, whereas their spectral resolutions are relatively low.... 详细信息
来源: 评论
A Deep Reinforcement Learning Approach for Online Taxi Dispatching
A Deep Reinforcement Learning Approach for Online Taxi Dispa...
收藏 引用
2023 International Conference on networking and network Applications, NaNA 2023
作者: Wang, YuBo Zhang, TaoYi Wei, ZhiCheng Key Lab of Network and Information Security China College of Computer and Cyber Security China Hebei Prov. Eng. Res. Center for Supply Chain Big Data Analytics Security Hebei Normal University Hebei Province Shijiazhuang China
With the development of smart city transportation systems, developing reasonable dispatching strategies for idle ride-hailing vehicles has become an urgent research problem. In this paper, we address the short-sighted... 详细信息
来源: 评论
Taxi Station Location Model Based on Spatio-Temporal Demand Cube
Taxi Station Location Model Based on Spatio-Temporal Demand ...
收藏 引用
2023 International Conference on networking and network Applications, NaNA 2023
作者: Gao, LuLu Li, XiaoNan Wei, ZhiCheng Key Lab of Network and Information Security Hebei Province Shijiazhuang China College of Computer and Cyber Security Hebei Province Shijiazhuang China Hebei Normal University Hebei Provincial Engineering Research Center for Supply Chain Big Data Analytics & Security Hebei Province Shijiazhuang China
With the widespread use of mobile apps, empty taxis can easily receive new orders without having to roam around. Therefore, it is necessary to plan taxi stations where empty taxis can park. In the location selection p... 详细信息
来源: 评论
A Novel Meta-Hierarchical Active Inference Reinforcement Learning Approach for QoS-Driven Resource Allocation in Dynamic Clouds
A Novel Meta-Hierarchical Active Inference Reinforcement Lea...
收藏 引用
2024 IEEE Global Communications Conference, GLOBECOM 2024
作者: Xian, Peijie He, Ying Yu, F. Richard Du, Jianbo Shenzhen Univ. College of Computer Science and Software Engineering Shenzhen China Xi'an Univ. of Posts & Telecomm. Shaanxi Key Lab. of Information Comm. Network and Security Shaanxi Xi'an China Carleton Univ. School of Information Technology OttawaON Canada
The cloud computing environment is highly dynamic due to a variety of external factors such as seasonal changes, market trends, and social events. In this case, tenant behavior patterns exhibit significant variability... 详细信息
来源: 评论
An Efficient Unsupervised Domain Adaptation Deep Learning Model for Unknown Malware Detection  1
收藏 引用
4th EAI International Conference on security and Privacy in New Computing Environments, SPNCE 2021
作者: Wang, Fangwei Chai, Guofang Li, Qingru Wang, Changguang Key Lab of Network and Information Security of Hebei Province Hebei Normal University Shijiazhuang050024 China College of Computer and Cyberspace Security Hebei Normal University Shijiazhuang050024 China
Emerging malware and zero-day vulnerabilities present new challenges to malware detection. Currently, numerous proposed malware detection approaches are based on supervised learning. However, these methods rely on a l... 详细信息
来源: 评论
An IoMT based Ensemble Classification Framework to Predict Treatment Response in Hepatitis C Patients
An IoMT based Ensemble Classification Framework to Predict T...
收藏 引用
2022 International Conference on Business Analytics for Technology and security, ICBATS 2022
作者: Ghazal, Taher M. Abbas, Sagheer Ahmad, Munir Aftab, Shabib Faculty of Information Science and Technology Ukm Center for Cyber Security Network and Communication Technology Lab Malaysia NCBAandE School of Computer Science Lahore Pakistan
Hepatitis C is considered a deadly disease as mortality rate in the patients suffering from this disease is very high, if not properly treated. This research proposes an IOMT based ensemble classification framework fo... 详细信息
来源: 评论
Uplink Control information Based Clustered Access and Discontinuous Reception Management for mMTC
收藏 引用
IEEE Communications Letters 2025年 第6期29卷 1380-1384页
作者: Wang, Shao-Di Wang, Chang-Long Wang, Hui-Ming Zhou, Feng Leung, Victor C. M. Xidian University Key Laboratory of Electronic Information Countermeasure and Simulation Technology of Ministry of Education Xi’an710071 China Xi’an Jiaotong University School of Information and Communication Engineering Ministry of Education Key Lab for Intelligent Networks and Network Security Xi’an710049 China Shenzhen MSU BIT University Artificial Intelligence Research Institute Shenzhen518172 China Shenzhen University College of Computer Science and Software Engineering Shenzhen518060 China The University of British Columbia Department of Electrical and Computer Engineering VancouverBCV6T 1Z4 Canada
Uplink control information (UCI) and discontinuous reception (DRX) play important roles for massive machine type communication (mMTC). Despite their standalone significance, a conspicuous gap exists in comprehensively... 详细信息
来源: 评论