咨询与建议

限定检索结果

文献类型

  • 606 篇 会议
  • 182 篇 期刊文献

馆藏范围

  • 788 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 345 篇 工学
    • 272 篇 计算机科学与技术...
    • 230 篇 软件工程
    • 82 篇 信息与通信工程
    • 72 篇 电气工程
    • 42 篇 控制科学与工程
    • 27 篇 电子科学与技术(可...
    • 26 篇 生物工程
    • 26 篇 网络空间安全
    • 23 篇 机械工程
    • 20 篇 光学工程
    • 19 篇 交通运输工程
    • 17 篇 安全科学与工程
    • 15 篇 生物医学工程(可授...
    • 12 篇 化学工程与技术
    • 11 篇 仪器科学与技术
    • 9 篇 土木工程
    • 8 篇 建筑学
  • 159 篇 理学
    • 97 篇 数学
    • 39 篇 物理学
    • 27 篇 统计学(可授理学、...
    • 25 篇 生物学
    • 10 篇 化学
    • 10 篇 系统科学
  • 81 篇 管理学
    • 50 篇 管理科学与工程(可...
    • 45 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 25 篇 法学
    • 15 篇 社会学
    • 12 篇 法学
  • 13 篇 医学
    • 12 篇 临床医学
    • 9 篇 基础医学(可授医学...
  • 5 篇 教育学
  • 4 篇 经济学
  • 4 篇 军事学
  • 2 篇 农学
  • 1 篇 文学

主题

  • 99 篇 feature extracti...
  • 93 篇 accuracy
  • 61 篇 federated learni...
  • 59 篇 computational mo...
  • 58 篇 semantics
  • 50 篇 data models
  • 44 篇 training
  • 35 篇 transformers
  • 33 篇 neural networks
  • 30 篇 deep learning
  • 30 篇 adaptation model...
  • 28 篇 robustness
  • 24 篇 privacy
  • 23 篇 data mining
  • 23 篇 predictive model...
  • 23 篇 attention mechan...
  • 21 篇 optimization
  • 21 篇 visualization
  • 21 篇 measurement
  • 20 篇 real-time system...

机构

  • 267 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 56 篇 shandong provinc...
  • 51 篇 shandong enginee...
  • 43 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 37 篇 school of comput...
  • 36 篇 shandong fundame...
  • 33 篇 shandong provinc...
  • 32 篇 shaanxi key labo...
  • 27 篇 qilu university ...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 faculty of data ...
  • 14 篇 tianjin key labo...
  • 14 篇 qilu university ...
  • 13 篇 key laboratory o...
  • 13 篇 key laboratory o...
  • 11 篇 xi'an university...

作者

  • 29 篇 yichuan wang
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 24 篇 wang yichuan
  • 19 篇 hei xinhong
  • 18 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 14 篇 li wei
  • 14 篇 aimin li
  • 13 篇 guohua lv
  • 13 篇 lianhai wang
  • 13 篇 xiaohui han
  • 13 篇 mingle zhou
  • 13 篇 jin haiyan
  • 12 篇 lu wenpeng
  • 12 篇 jing zhao
  • 12 篇 delong han
  • 12 篇 chunxiao wang
  • 12 篇 zhenyu yang
  • 12 篇 lei zhu

语言

  • 679 篇 英文
  • 107 篇 其他
  • 8 篇 中文
检索条件"机构=Laboratory for Network Computing and Security Technology"
788 条 记 录,以下是251-260 订阅
排序:
Dynamic detection technology of encryption algorithm based on Pin
Dynamic detection technology of encryption algorithm based o...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Junpeng Qu Gaolei Du Yunge Sun Yong Fu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Quan Cheng Laboratory Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
Aiming at the problem that malicious software uses encryption algorithm to hide its own malicious code and avoid detection, a dynamic detection technology based on Pin encryption algorithm is proposed. Use Pin to get ... 详细信息
来源: 评论
An Encryption Algorithm Cycle Identification Method Based on Bit Execution
An Encryption Algorithm Cycle Identification Method Based on...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Yunge Sun Gaolei Du Junpeng Qu Yong Fu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology(Shandong Academy of Sciences) Jinan China Quan Cheng Laboratory Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
Ransomware uses symmetric encryption algorithms to lock user files to extort money. This paper proposes a cryptographic algorithm loop identification method based on bit-precise execution, aiming to solve the problem ... 详细信息
来源: 评论
DBE-SwinUNet: A Novel Dual-Branch SwinUNet for Accurate Cancer Pathology Image Segmentation
DBE-SwinUNet: A Novel Dual-Branch SwinUNet for Accurate Canc...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Tao Hu Jingshan Pan Na Li Tangbin Tian Shengyu Liu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center(National Supercomputer Center in Jinan) Shandong Academy of Sciences Qilu University of Technology Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China
In the field of medical image analysis, precise cancer pathology image segmentation is crucial for assisting clinicians in identifying lesion areas. This paper proposes an innovative dual-branch architecture, DBE-Swin... 详细信息
来源: 评论
Time Series Anomaly Detection Based on Normalized Flow and Bayesian networks  9
Time Series Anomaly Detection Based on Normalized Flow and B...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Yao, Honglei Liu, Donglan Chang, Yingxian Liu, Xin Tang, Chaofan State Grid Shandong Electric Power Research Institute Jinan China State Grid Shandong Electric Power Company Jinan China Qilu University of Technology Shandong Academy of Sciences Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China
Time series anomaly detection often faces significant challenges due to the high dimensionality, interdependence, and label sparsity of the data. Traditional methods struggle to model the intricate relationships betwe... 详细信息
来源: 评论
An automated construction method for symmetric encryption round function models based on dynamic analysis
An automated construction method for symmetric encryption ro...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Gaolei Du Yunge Sun Junpeng Qu Yong Fu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Quan Cheng Laboratory Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
With the deepening of informatization, the incidence of cybercrimes utilizing malicious software for attacks is on the rise. This paper addresses the detection issue of symmetric encryption in malicious software from ... 详细信息
来源: 评论
Multimodal Dialogue Emotion Recognition Based on Label Optimization and Coarse-Grained Assisted Fine-Grained
Multimodal Dialogue Emotion Recognition Based on Label Optim...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Zhibo Zhang Zhenyu Yang Yan Huang Baojie Xu Wenyue Hu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science China
Multimodal dialogue emotion recognition integrates data from multiple modalities to accurately identify emotional states in conversations. However, differences in expression and information density across modalities c... 详细信息
来源: 评论
Provably Secure Authenticated Key-Management Mechanism for e-Healthcare Environment
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Saleem, Muhammad Asad Li, Xiong Mahmood, Khalid Ghaffar, Zahid Xie, Yong Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu611731 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan National Yunlin University of Science and Technology Graduate School of Engineering Science and Technology Douliu64002 Taiwan Qinghai Institute of Technology School of Computer and Information Science China Qinghai Provincial Laboratory for Intelligent Computing and Application China Key Laboratory of Computing Power Network and Information Security Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security China Shandong Fundamental Research Center for Computer Science Jinan250353 China
The Internet of Things (IoT) is rapidly permeating all aspects of human life, involving a network of devices that share sensitive data. A notable application is the e-healthcare systems, which employ connected sensors... 详细信息
来源: 评论
Visible Light Positioning Method for Indoor Line-of-Sight Scene Based on Time Series Coding  9
Visible Light Positioning Method for Indoor Line-of-Sight Sc...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Yu, Yonghao Guo, Yongde Zhao, Dawei Fu, Kexue Tang, Yongwei Wang, Qinyuan City University of Macau Faculty of Data Science China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Shandong University School of Mechanical Engineering Key Laboratory of High Efficiency and Clean Mechanical Manufacture Ministry of Education Jinan China
Existing indoor visible light positioning methods, such as those based on fingerprint database algorithms, are complex to construct and consume significant resources. In response to this issue, the text proposes an en... 详细信息
来源: 评论
A Federated Learning network Intrusion Detection System for Multiple Imbalances
A Federated Learning Network Intrusion Detection System for ...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Yifan Zeng Peijia Zheng Jian Li School of Computer Science and Engineering Sun Yat-sen University Guangzhou China Yunnan Key Laboratory of Service Computing Yunnan University of Finance and Economics Kunming China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology (Shandong Academy of Sciences) Jinan China
Centralized training of deep learning-based network intrusion detection systems (DLNIDS) raises privacy concerns and incurs huge overhead. Federated learning (FL), while preserving privacy, confronts challenges includ... 详细信息
来源: 评论
An Efficient Multi-Dimensional Adaptive Federated Learning Algorithm
An Efficient Multi-Dimensional Adaptive Federated Learning A...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Shujiang Xu Dehua Li Lianhai Wang Shuhui Zhang Wei Shao Qizheng Wang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan PR China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan PR China Quancheng Prov Lab Jinan Peoples R China
With the rapid development of the Internet of Vehicles (IoV),Nevertheless, Federated Learning (FL) plays an increasingly crucial role in the secure data sharing within this field. Nevertheless, data in IoV settings fr... 详细信息
来源: 评论