咨询与建议

限定检索结果

文献类型

  • 163 篇 会议
  • 115 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 279 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 199 篇 工学
    • 151 篇 计算机科学与技术...
    • 126 篇 软件工程
    • 44 篇 信息与通信工程
    • 25 篇 控制科学与工程
    • 25 篇 网络空间安全
    • 19 篇 电气工程
    • 17 篇 电子科学与技术(可...
    • 12 篇 机械工程
    • 12 篇 生物工程
    • 9 篇 生物医学工程(可授...
    • 7 篇 仪器科学与技术
    • 6 篇 交通运输工程
    • 4 篇 光学工程
    • 4 篇 化学工程与技术
    • 4 篇 安全科学与工程
  • 85 篇 理学
    • 55 篇 数学
    • 15 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 13 篇 生物学
    • 10 篇 系统科学
    • 5 篇 化学
  • 44 篇 管理学
    • 29 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 9 篇 法学
    • 6 篇 社会学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 8 篇 医学
    • 7 篇 临床医学
    • 6 篇 基础医学(可授医学...
    • 5 篇 药学(可授医学、理...
  • 5 篇 军事学
    • 5 篇 军队指挥学
  • 2 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 17 篇 authentication
  • 12 篇 cryptography
  • 9 篇 security
  • 8 篇 deep learning
  • 8 篇 cloud computing
  • 7 篇 training
  • 6 篇 protocols
  • 5 篇 feature extracti...
  • 5 篇 malware
  • 5 篇 heuristic algori...
  • 4 篇 internet of thin...
  • 4 篇 access control
  • 4 篇 reinforcement le...
  • 4 篇 optimization
  • 4 篇 servers
  • 4 篇 internet
  • 4 篇 computers
  • 4 篇 semantics
  • 4 篇 blockchain
  • 4 篇 network security

机构

  • 21 篇 key lab of infor...
  • 7 篇 key lab of netwo...
  • 6 篇 guangxi key labo...
  • 6 篇 national compute...
  • 5 篇 network informat...
  • 5 篇 computer departm...
  • 5 篇 institute of inf...
  • 4 篇 ministry of edu....
  • 4 篇 key lab. of comp...
  • 4 篇 hebei provincial...
  • 4 篇 key lab of netwo...
  • 4 篇 college of compu...
  • 4 篇 school of inform...
  • 4 篇 college of mathe...
  • 4 篇 national languag...
  • 4 篇 national compute...
  • 4 篇 school of cyber ...
  • 4 篇 hubei provincial...
  • 4 篇 school of comput...
  • 4 篇 key laboratory o...

作者

  • 9 篇 meng deyu
  • 9 篇 tan zuowen
  • 9 篇 li hui
  • 7 篇 cao xiangyong
  • 6 篇 lopez javier
  • 5 篇 zhang yuqing
  • 5 篇 wang fangwei
  • 5 篇 javier lopez
  • 5 篇 feng yu
  • 5 篇 sun jin
  • 4 篇 fan kai
  • 4 篇 yong-zhen li
  • 4 篇 weizhong zhao
  • 4 篇 yong zhao
  • 4 篇 ma wenping
  • 4 篇 tingting he
  • 4 篇 wang yue
  • 4 篇 hu yupu
  • 4 篇 xingpeng jiang
  • 4 篇 hu yu-pu

语言

  • 236 篇 英文
  • 28 篇 其他
  • 15 篇 中文
检索条件"机构=Lab.of Computer Network and Information Security"
279 条 记 录,以下是41-50 订阅
排序:
Taxi Station Location Model Based on Spatio-Temporal Demand Cube
Taxi Station Location Model Based on Spatio-Temporal Demand ...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: LuLu Gao XiaoNan Li ZhiCheng Wei Key Lab of Network and Information Security Shijiazhuang Hebei Province China College of Computer and Cyber Security Shijiazhuang Hebei Province China Hebei Provincial Engineering Research Center for Supply Chain Big Data Analytics & Security Hebei Normal University Shijiazhuang Hebei Province China
With the widespread use of mobile apps, empty taxis can easily receive new orders without having to roam around. Therefore, it is necessary to plan taxi stations where empty taxis can park. In the location selection p...
来源: 评论
An Improved iBAT-COOP Protocol for Cooperative Diversity in FANETs
收藏 引用
computers, Materials & Continua 2021年 第5期67卷 2527-2546页
作者: Shahzad Hameed Qurratul-Ain Minhas Sheeraz Ahmed Shabana Habib Mohammad Kamrul Hasan Muhammad Islam Sheroz Khan Quaid-i-Azam University IslamabadPakistan Iqra National University PeshawarPakistan Network and Communication Technology Lab Center for Cyber SecurityUKMBangiMalaysia Department of Information Technology College of ComputerQassim UniversityBuraydahSaudi Arabia Department of Electrical Engineering Onaizah College of Engineering&Information TechnologyAl-QassimSaudi Arabia
Flying ad hoc networks(FANETs)present a challenging environment due to the dynamic and highly mobile nature of the *** network topology and uncertain node mobility structure of FANETs do not aim to consider only one p... 详细信息
来源: 评论
A Novel Meta-Hierarchical Active Inference Reinforcement Learning Approach for QoS-Driven Resource Allocation in Dynamic Clouds
A Novel Meta-Hierarchical Active Inference Reinforcement Lea...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Peijie Xian Ying He F. Richard Yu Jianbo Du College of Computer Science and Software Engineering Shenzhen Univ. Shenzhen China Shaanxi Key Lab. of Information Comm. Network and Security Xi’an Univ. of Posts & Telecomm. Xi’an China School of Information Technology Carleton Univ. Ottawa Canada
The cloud computing environment is highly dynamic due to a variety of external factors such as seasonal changes, market trends, and social events. In this case, tenant behavior patterns exhibit significant variability... 详细信息
来源: 评论
Robot and its living space:A roadmap for robot development based on the view of living space
收藏 引用
Digital Communications and networks 2021年 第4期7卷 505-517页
作者: Xiaofeng Cai Huansheng Ning Sahraoui Dhelim Rongjuan Zhou Tao Zhang Yang Xu Yueliang Wan School of Computer and Communication Engineering University of Science and Technology Beijing Beijing 100083China Beijing Engineering Research Center for Cyberspace Data Analysis and Applications Beijing 100083China School of Foreign Studies University of Science and Technology Beijing Beijing 100083China Key Lab of Information Network Security Ministry of Public SecurityChina Run Technologies Co. LidBeijing China
Robot’s living space Human-robot relationship Robot humanization Hybrid intelligence Human-robot integrated society Robots,as the creation of humans,became an irreplaceable component in human *** the advancement of t... 详细信息
来源: 评论
SemiCD-VL: Visual-Language Model Guidance Makes Better Semi-supervised Change Detector
arXiv
收藏 引用
arXiv 2024年
作者: Li, Kaiyu Cao, Xiangyong Deng, Yupeng Song, Jiayi Liu, Junmin Meng, Deyu Wang, Zhi School of Software Engineering Xi’an Jiaotong University Xi’an710049 China School of Computer Science and Technology Ministry of Education Key Lab For Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an710049 China Aerospace Information Research Institute Chinese Academy of Sciences Beijing100094 China School of Mathematics and Statistics Ministry of Education Key Lab of Intelligent Networks and Network Security Xi’an Jiaotong University Shaanxi Xi’an China Guangdong Guangzhou China
Change Detection (CD) aims to identify pixels with semantic changes between images. However, annotating massive numbers of pixel-level images is labor-intensive and costly, especially for multi-temporal images, which ... 详细信息
来源: 评论
Efficient Zero-Trust Data Transmission for Consumer Electronic Using Holographic Counterparts in Internet of Things: Ciphertext-Policy Attribute-Based Signcryption With Equality Test
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Kuang, Ping Zhang, Xiyue Yang, Mengheng Xiong, Hu Feng, Chaosheng Wu, Deyan Wang, Weizheng Wahaballa, Abubaker University of Electronic Science and Technology of China Intelligent Information Technologies and Applications Lab Chengdu610054 China University of Electronic Science and Technology of China Network and Data Security Lab Chengdu610054 China Sichuan Normal University School of Computer Science Chengdu610101 China Sichuan Institute of Computer Sciences Chengdu610000 China City University of Hong Kong Department of Computer Science Hong Kong The University of Aizu Aizuwakamatsu Japan Arab East Colleges Department of Computer Science Riyadh53354 Saudi Arabia
Secure communication in consumer electronic devices, such as health monitoring systems, is essential as they process sensitive medical data. This paper proposes a Ciphertext-Policy Attribute-Based Signcryption with Eq... 详细信息
来源: 评论
An Efficient and Accurate Encrypted Image Retrieval Scheme via Ball Tree
An Efficient and Accurate Encrypted Image Retrieval Scheme v...
收藏 引用
International Conference on Big Data Computing and Communications (BIGCOM)
作者: Xianxian Li Jie Lei Zhenkui Shi Feng Yu College of computer science Guangxi Normal University Guilin China Guangxi Key Lab of Multi-source Information Mining & Security Guilin China Key Laboratory of Computer Network Information Integration Southeast University Nanjing China
With the rise and development of cloud computing, more and more companies try to outsource computing and storage to cloud in order to save storage and computing cost. Due to the rich information contained in images, t... 详细信息
来源: 评论
Deep Feature Surgery: Towards Accurate and Efficient Multi-Exit networks
arXiv
收藏 引用
arXiv 2024年
作者: Gong, Cheng Chen, Yao Luo, Qiuyang Lu, Ye Li, Tao Zhang, Yuzhi Sun, Yufei Zhang, Le College of Software Nankai University China College of Computer Science Nankai University China National University of Singapore Singapore School of Information and Communication Engineering University of Electronic Science and Technology of China China HAIHE Lab of ITAI China Tianjin Key Laboratory of Network and Data Security Technology China Key Laboratory of Data and Intelligent System Security Ministry of Education
Multi-exit network is a promising architecture for efficient model inference by sharing backbone networks and weights among multiple exits. However, the gradient conflict of the shared weights results in sub-optimal a... 详细信息
来源: 评论
VFGCN: A Vertical Federated Learning Framework With Privacy Preserving for Graph Convolutional network
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Wang, Gang Li, Qingming Liu, Ximeng Yan, Xiaoran Dong, Qingkuan Wu, Huiwen Kong, Xiangjie Zhou, Li Zhejiang Lab HangZhou310000 China Zhejiang University College of Computer Science and Technology Hangzhou310058 China Fuzhou University Key Laboratory of Information Security of Network Systems College of Computer and Big Data Fuzhou350108 China Xidian University State Key Laboratory of Integrated Services Networks Xi'an710071 China Zhejiang University of Technology College of Computer Science and Technology Hangzhou310023 China Dalian University of Technology School of Software Dalian116620 China
Due to the robust representational capabilities of graph data, employing graph neural networks for its processing has demonstrated superior performance over conventional deep learning algorithms. Graph data encompasse... 详细信息
来源: 评论
A Lightweight Sparse Focus Transformer for Remote Sensing Image Change Captioning
arXiv
收藏 引用
arXiv 2024年
作者: Sun, Dongwei Bao, Yajie Liu, Junmin Cao, Xiangyong School of Computer Science and Technology the Ministry of Education Key Lab for Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an710049 China Department of Information Science School of Mathematics and Statistics Xi’an Jiaotong University No.28 Xianning West Road Shaanxi Xi’an710049 China
Remote sensing image change captioning (RSICC) aims to automatically generate sentences that describe content differences in remote sensing bitemporal images. Recently, attention-based transformers have become a preva... 详细信息
来源: 评论