咨询与建议

限定检索结果

文献类型

  • 606 篇 会议
  • 179 篇 期刊文献

馆藏范围

  • 785 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 345 篇 工学
    • 272 篇 计算机科学与技术...
    • 230 篇 软件工程
    • 82 篇 信息与通信工程
    • 72 篇 电气工程
    • 42 篇 控制科学与工程
    • 27 篇 电子科学与技术(可...
    • 26 篇 生物工程
    • 26 篇 网络空间安全
    • 23 篇 机械工程
    • 20 篇 光学工程
    • 19 篇 交通运输工程
    • 17 篇 安全科学与工程
    • 15 篇 生物医学工程(可授...
    • 12 篇 化学工程与技术
    • 11 篇 仪器科学与技术
    • 9 篇 土木工程
    • 8 篇 建筑学
  • 159 篇 理学
    • 97 篇 数学
    • 39 篇 物理学
    • 27 篇 统计学(可授理学、...
    • 25 篇 生物学
    • 10 篇 化学
    • 10 篇 系统科学
  • 81 篇 管理学
    • 50 篇 管理科学与工程(可...
    • 45 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 25 篇 法学
    • 15 篇 社会学
    • 12 篇 法学
  • 13 篇 医学
    • 12 篇 临床医学
    • 9 篇 基础医学(可授医学...
  • 5 篇 教育学
  • 4 篇 经济学
  • 4 篇 军事学
  • 2 篇 农学
  • 1 篇 文学

主题

  • 99 篇 feature extracti...
  • 93 篇 accuracy
  • 61 篇 federated learni...
  • 59 篇 computational mo...
  • 58 篇 semantics
  • 50 篇 data models
  • 44 篇 training
  • 35 篇 transformers
  • 33 篇 neural networks
  • 30 篇 deep learning
  • 30 篇 adaptation model...
  • 28 篇 robustness
  • 24 篇 privacy
  • 23 篇 data mining
  • 23 篇 predictive model...
  • 23 篇 attention mechan...
  • 21 篇 optimization
  • 21 篇 visualization
  • 21 篇 measurement
  • 20 篇 real-time system...

机构

  • 265 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 56 篇 shandong provinc...
  • 51 篇 shandong enginee...
  • 43 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 37 篇 school of comput...
  • 36 篇 shandong fundame...
  • 32 篇 shandong provinc...
  • 32 篇 shaanxi key labo...
  • 27 篇 qilu university ...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 faculty of data ...
  • 14 篇 tianjin key labo...
  • 14 篇 qilu university ...
  • 13 篇 key laboratory o...
  • 13 篇 key laboratory o...
  • 11 篇 xi'an university...

作者

  • 29 篇 yichuan wang
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 24 篇 wang yichuan
  • 19 篇 hei xinhong
  • 18 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 14 篇 li wei
  • 14 篇 aimin li
  • 13 篇 guohua lv
  • 13 篇 lianhai wang
  • 13 篇 xiaohui han
  • 13 篇 mingle zhou
  • 13 篇 jin haiyan
  • 12 篇 lu wenpeng
  • 12 篇 jing zhao
  • 12 篇 delong han
  • 12 篇 chunxiao wang
  • 12 篇 zhenyu yang
  • 12 篇 lei zhu

语言

  • 676 篇 英文
  • 107 篇 其他
  • 8 篇 中文
检索条件"机构=Laboratory for Network Computing and Security Technology"
785 条 记 录,以下是91-100 订阅
排序:
Probability analysis of system vulnerability distribution based on the matroid theory
Probability analysis of system vulnerability distribution ba...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Yichuan Wang Peipei Li Xin Song Yeqiu Xiao Xiaoxue Liu School of computer science and engineering Xi’an University of technology Xi’an China Shanxi Key Laboratory for Network Computing and Security Technology
In recent years, system vulnerability mining techniques have emerged in an endless stream. At present, the existing vulnerability mining techniques are mainly to analyze the source code or monitor and analyze the beha... 详细信息
来源: 评论
A Novel Multipath Data Transmission Method with Traffic Obfuscation
A Novel Multipath Data Transmission Method with Traffic Obfu...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Xinhong Hei Jianfeng Chen Yichuan Wang Xin Song Lei Zhu School of Computer Science and Engineering Xi’an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China
With the rapid progress of network communication technology, the issues of user identity and privacy are critical. However, there are many disadvantages in traditional single-path data transmission, for example, the l... 详细信息
来源: 评论
Hyperspectral Band Selection Based on Classification Reward Adjustment
Hyperspectral Band Selection Based on Classification Reward ...
收藏 引用
IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems (MASS)
作者: Jing Hu Jiawei Liang Yunfei Ju Minghua Zhao Shaanxi Key Laboratory for Network Computing and Security Technology School of Computer Science and Engineering Xi'an University of Technology Xi'an China
Hyperspectral image band selection is a crucial link in image processing. It is necessary to screen out bands with rich information and low correlation, to achieve data dimensionality reduction and retain key informat... 详细信息
来源: 评论
Compiler Differentiation Detection Method for Binary Similarity
Compiler Differentiation Detection Method for Binary Similar...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Xiaoxue Liu Xinwei Duan Xinhong Hei Yichuan Wang Xin Song School of computer science and engineering Xi’an University of technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology
Compiler differential detection can be performed by detecting the similarity between the binary compiled by the compiler and the ideal compiled file. This article proposes a javac compiler differentiation detection sy... 详细信息
来源: 评论
Research on Code Virtualization Methods for Cloud Applications
Research on Code Virtualization Methods for Cloud Applicatio...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Zhoukai Wang Zuoyan Xu Yaling Zhang Xin Song Yichuan Wang School of computer science and engineering Xi’an University of technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology
With the vigorous development of technologies such as the Internet, mobile devices, and the Internet of Things, cloud services have gained a crucial position in our life and have become an essential part of daily oper... 详细信息
来源: 评论
Formal Modeling and Defense Methods for 5G network Endpoint Access Denial of Service Attacks
Formal Modeling and Defense Methods for 5G Network Endpoint ...
收藏 引用
2023 International Conference on networking and network Applications, NaNA 2023
作者: Zhang, Tong Wei, Wei Wang, Yichuan Deng, Xi Zhu, Lei Ji, Wenjiang School of Computer Science and Engineering Xi'an University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technolog Xi'an China School of Computer Science Xi'an Shiyou University Xi'an China
5G terminal access denial-of-service attack is one of the more common types of 5G signaling network attacks. It manifests itself as a large number of abnormal access requests occupying core network resources. Normal r... 详细信息
来源: 评论
Deep Reinforcement-Learning-Based Adaptive Traffic Signal Control with Real-Time Queue Lengths
Deep Reinforcement-Learning-Based Adaptive Traffic Signal Co...
收藏 引用
2022 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2022
作者: Sun, Qi-Wei Han, Shi-Yuan Zhou, Jin Chen, Yue-Hui Yao, Kang University of Jinan Shandong Provincial Key Laboratory of Network Based Intelligent Computing Jinan250022 China Shandong Provincial Network Security and Infomationization Technology Center Jinan250002 China
The reinforcement learning (RL) with deep neural network, as a data-driven approach, is promising for adaptive traffic signal control (ATSC) in traffic scenarios. The majority of the existing studies focus on designin... 详细信息
来源: 评论
Riemannian Complex Matrix Convolution network for PolSAR Image Classification
arXiv
收藏 引用
arXiv 2023年
作者: Shi, Junfei Wang, Wei Jin, Haiyan Nie, Mengmeng Ji, Shanshan Department of Computer Science and Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an University of Technology Xi’an China The Department of Computer Science and Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an University of Technology Xi’an China
Recently, deep learning methods have achieved superior performance for Polarimetric Synthetic Aperture Radar(PolSAR) image classification. Existing deep learning methods learn PolSAR data by converting the covariance ... 详细信息
来源: 评论
Wrong-of-Thought: An Integrated Reasoning Framework with Multi-Perspective Verification and Wrong Information
Wrong-of-Thought: An Integrated Reasoning Framework with Mul...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Zhang, Yongheng Chen, Qiguang Zhou, Jingxuan Wang, Peng Si, Jiasheng Wang, Jin Lu, Wenpeng Qin, Libo School of Computer Science and Engineering Central South University China Research Center for SCIR Harbin Institute of Technology Harbin China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology Shandong Academy of Sciences China Yunnan University Kunming China
Chain-of-Thought (CoT) has become a vital technique for enhancing the performance of Large Language Models (LLMs), attracting increasing attention from researchers. One stream of approaches focuses on the iterative en...
来源: 评论
Unleashing the Potential of Decentralized Federated Learning in Healthcare: A Comprehensive Survey on Insights and Challenges  9
Unleashing the Potential of Decentralized Federated Learning...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Cheng, Haibo Liu, Wenjian Qu, Youyang Fu, Kexue Wang, Qinyuan City University of Macau Faculty of Data Science China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China
Federated learning (FL) is a distributed learning method that reduces data transmission and privacy risks. However, the existence of a central server may become a target of attackers, resulting in an increased risk of... 详细信息
来源: 评论