咨询与建议

限定检索结果

文献类型

  • 163 篇 会议
  • 115 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 279 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 199 篇 工学
    • 151 篇 计算机科学与技术...
    • 126 篇 软件工程
    • 44 篇 信息与通信工程
    • 25 篇 控制科学与工程
    • 25 篇 网络空间安全
    • 19 篇 电气工程
    • 17 篇 电子科学与技术(可...
    • 12 篇 机械工程
    • 12 篇 生物工程
    • 9 篇 生物医学工程(可授...
    • 7 篇 仪器科学与技术
    • 6 篇 交通运输工程
    • 4 篇 光学工程
    • 4 篇 化学工程与技术
    • 4 篇 安全科学与工程
  • 85 篇 理学
    • 55 篇 数学
    • 15 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 13 篇 生物学
    • 10 篇 系统科学
    • 5 篇 化学
  • 44 篇 管理学
    • 29 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 9 篇 法学
    • 6 篇 社会学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 8 篇 医学
    • 7 篇 临床医学
    • 6 篇 基础医学(可授医学...
    • 5 篇 药学(可授医学、理...
  • 5 篇 军事学
    • 5 篇 军队指挥学
  • 2 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 17 篇 authentication
  • 12 篇 cryptography
  • 9 篇 security
  • 9 篇 cloud computing
  • 8 篇 deep learning
  • 7 篇 training
  • 6 篇 protocols
  • 5 篇 feature extracti...
  • 5 篇 malware
  • 5 篇 heuristic algori...
  • 4 篇 internet of thin...
  • 4 篇 access control
  • 4 篇 reinforcement le...
  • 4 篇 optimization
  • 4 篇 servers
  • 4 篇 internet
  • 4 篇 computers
  • 4 篇 semantics
  • 4 篇 blockchain
  • 4 篇 network security

机构

  • 21 篇 key lab of infor...
  • 7 篇 key lab of netwo...
  • 6 篇 guangxi key labo...
  • 6 篇 national compute...
  • 5 篇 network informat...
  • 5 篇 computer departm...
  • 5 篇 institute of inf...
  • 4 篇 ministry of edu....
  • 4 篇 key lab. of comp...
  • 4 篇 hebei provincial...
  • 4 篇 key lab of netwo...
  • 4 篇 college of compu...
  • 4 篇 school of inform...
  • 4 篇 college of mathe...
  • 4 篇 national languag...
  • 4 篇 national compute...
  • 4 篇 school of cyber ...
  • 4 篇 hubei provincial...
  • 4 篇 school of comput...
  • 4 篇 key laboratory o...

作者

  • 9 篇 meng deyu
  • 9 篇 tan zuowen
  • 9 篇 li hui
  • 7 篇 cao xiangyong
  • 6 篇 lopez javier
  • 5 篇 zhang yuqing
  • 5 篇 wang fangwei
  • 5 篇 javier lopez
  • 5 篇 feng yu
  • 5 篇 sun jin
  • 4 篇 fan kai
  • 4 篇 yong-zhen li
  • 4 篇 weizhong zhao
  • 4 篇 yong zhao
  • 4 篇 ma wenping
  • 4 篇 tingting he
  • 4 篇 wang yue
  • 4 篇 hu yupu
  • 4 篇 xingpeng jiang
  • 4 篇 hu yu-pu

语言

  • 247 篇 英文
  • 17 篇 其他
  • 15 篇 中文
检索条件"机构=Lab.of Computer Network and Information Security"
279 条 记 录,以下是21-30 订阅
排序:
Evading IoT Intrusion Detection Systems with GAN
Evading IoT Intrusion Detection Systems with GAN
收藏 引用
Asia Joint Conference on information security (Asia JCIS)
作者: Mariama Mbow Rodrigo Roman Takeshi Takahashi Kouichi Sakurai Department of Informatics Kyushu University Japan Network Information and Computer Security (NICS) Lab University of Malaga Spain National Institute of Information and Communications Technology Tokyo Japan
network intrusion detection systems are essential tools used in cybersecurity to detect malicious traffic. They are used in the Internet of Things (IoT) to monitor the network traffic and identify infected IoT devices... 详细信息
来源: 评论
Integration of MPC into Besu through an extended private transaction model
Integration of MPC into Besu through an extended private tra...
收藏 引用
Metaverse Computing, networking and Applications (MetaCom), IEEE International Conference on
作者: Daniel Morales Isaac Agudo Javier Lopez Department of Computer Science Network Information and Computer Security Lab ITIS Software Universidad de Málaga Málaga Spain
In the last few years we have seen many different approaches to incorporate privacy features to blockchains. In the area of cryptocurrencies that would normally mean protecting the identity of the owner of some funds,...
来源: 评论
CYBERSHIELD: A Competitive Simulation Environment for Training AI in Cybersecurity
CYBERSHIELD: A Competitive Simulation Environment for Traini...
收藏 引用
International Conference on Internet of Things: Systems, Management and security
作者: José Álvaro Fernández Carrasco Iñigo Amonarriz Pagola Raúl Orduna Urrutia Rodrigo Román Vicomtech Basque Research and Technology Alliance (BRTA) Donostia San Sebastian Spain Network Information and Computer Security Lab University of Malaga Malaga Spain
Simulation environments are crucial in cybersecurity for training AI algorithms, providing a secure and controlled space to explore the impact derived from diverse cyber threads. They offer a flexible platform for acc... 详细信息
来源: 评论
Improved Design of des Algorithm Based on Symmetric Encryption Algorithm
Improved Design of des Algorithm Based on Symmetric Encrypti...
收藏 引用
2021 IEEE International Conference on Power Electronics, computer Applications, ICPECA 2021
作者: Yihan, Wang Yongzhen, Li Yanbian University Network Communication and Information Security Lab Dept. of Computer Science and Technology Yanji China
To address issues in security the threat posed to the DES algorithm by brute force cracking, as well as the low efficiency of the 3DES algorithm, I propose extending the length of the DES algorithm's key. First, c... 详细信息
来源: 评论
Smart Energy Management System Using Machine Learning
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 959-973页
作者: Ali Sheraz Akram Sagheer Abbas Muhammad Adnan Khan Atifa Athar Taher M.Ghazal Hussam Al Hamadi School of Computer Science National College of Business Administration&EconomicsLahore54000Pakistan Riphah School of Computing&Innovation Faculty of ComputingRiphah International UniversityLahore CampusLahore54000Pakistan Pattern Recognition and Machine Learning Lab Department of SoftwareGachon UniversitySeongnamGyeonggido13120Korea Department of Computer Science COMSATS University IslamabadLahore CampusLahore54000Pakistan School of Information Technology Skyline University CollegeSharjah1797United Arab Emirates Network and Communication Technology Lab Center for Cyber SecurityFaculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangiSelangor43600Malaysia College of Engineering and IT University of DubaiDubaiUnited Arab Emirates
Energy management is an inspiring domain in developing of renewable energy ***,the growth of decentralized energy production is revealing an increased complexity for power grid managers,inferring more quality and reli... 详细信息
来源: 评论
Attribute-Consistent Knowledge Graph Representation Learning for Multi-Modal Entity Alignment  23
Attribute-Consistent Knowledge Graph Representation Learning...
收藏 引用
32nd ACM World Wide Web Conference, WWW 2023
作者: Li, Qian Guo, Shu Luo, Yangyifei Ji, Cheng Wang, Lihong Sheng, Jiawei Li, Jianxin School of Computer Science and Engineering Bdbc Beihang University Beijing China National Computer Network Emergency Response Technical Team/Coordination Center of China Beijing China Institute of Information Engineering Chinese Academy of Sciences School of Cyber Security Ucas Beijing China Scse Beihang University Zhongguancun Lab Beijing China
The multi-modal entity alignment (MMEA) aims to find all equivalent entity pairs between multi-modal knowledge graphs (MMKGs). Rich attributes and neighboring entities are valuable for the alignment task, but existing... 详细信息
来源: 评论
An Efficient Multi-Dimensional Adaptive Federated Learning Algorithm
An Efficient Multi-Dimensional Adaptive Federated Learning A...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Shujiang Xu Dehua Li Lianhai Wang Shuhui Zhang Wei Shao Qizheng Wang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan PR China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan PR China Quancheng Prov Lab Jinan Peoples R China
With the rapid development of the Internet of Vehicles (IoV),Nevertheless, Federated Learning (FL) plays an increasingly crucial role in the secure data sharing within this field. Nevertheless, data in IoV settings fr... 详细信息
来源: 评论
Double-Blockchain Assisted Secure and Anonymous Data Aggregation for Fog-Enabled Smart Grid
收藏 引用
Engineering 2022年 第1期8卷 159-169页
作者: Siguang Chen Li Yang Chuanxin Zhao Vijayakumar Varadarajan Kun Wang Jiangsu Key Lab of Broadband Wireless Communication and Internet of Things Nanjing University of Posts and TelecommunicationsNanjing 210003China Jiangsu Engineering Research Center of Communication and Network Technology Nanjing University of Posts and TelecommunicationsNanjing 210003China Anhui Provincial Key Laboratory of Network and Information Security Anhui Normal UniversityWuhu 241000China School of Computer Science and Engineering Vellore Institute of TechnologyChennai 600127India Department of Electrical and Computer Engineering University of CaliforniaLos AngelesCA 90095USA
As a future energy system,the smart grid is designed to improve the efficiency of traditional power systems while providing more stable and reliable ***,this efficient and reliable service relies on collecting and ana... 详细信息
来源: 评论
STGAT: A Spatio-Temporal Graph Attention network for Travel Demand Prediction
STGAT: A Spatio-Temporal Graph Attention Network for Travel ...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Tao Yi Zhang YuBo Wang ZhiCheng Wei Key Lab of Network and Information Security College of Computer and Cyberspace Security Hebei Provincial Engineering Research Center for Supply Chain Big Data Analytics & Security Hebei Normal University Shijiazhuang Hebei Province China
Forecasting travel demand is a challenging task due to the complex spatial dependencies and dynamic temporal correlation of the traffic data. Furthermore, a limited representation of the given spatial graph structure ...
来源: 评论
A Deep Reinforcement Learning Approach for Online Taxi Dispatching
A Deep Reinforcement Learning Approach for Online Taxi Dispa...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: YuBo Wang TaoYi Zhang ZhiCheng Wei Key Lab of Network and Information Security College of Computer and Cyber Security Hebei Provincial Engineering Research Center for Supply Chain Big Data Analytics & Security Hebei Normal University Shijiazhuang Hebei Province China
With the development of smart city transportation systems, developing reasonable dispatching strategies for idle ride-hailing vehicles has become an urgent research problem. In this paper, we address the short-sighted...
来源: 评论