咨询与建议

限定检索结果

文献类型

  • 622 篇 会议
  • 190 篇 期刊文献

馆藏范围

  • 812 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 362 篇 工学
    • 287 篇 计算机科学与技术...
    • 239 篇 软件工程
    • 88 篇 信息与通信工程
    • 84 篇 电气工程
    • 49 篇 控制科学与工程
    • 33 篇 电子科学与技术(可...
    • 29 篇 网络空间安全
    • 26 篇 生物工程
    • 25 篇 机械工程
    • 20 篇 光学工程
    • 20 篇 交通运输工程
    • 18 篇 安全科学与工程
    • 15 篇 生物医学工程(可授...
    • 12 篇 化学工程与技术
    • 11 篇 仪器科学与技术
    • 9 篇 土木工程
    • 8 篇 材料科学与工程(可...
  • 163 篇 理学
    • 101 篇 数学
    • 43 篇 物理学
    • 27 篇 统计学(可授理学、...
    • 25 篇 生物学
    • 11 篇 化学
    • 10 篇 系统科学
  • 84 篇 管理学
    • 53 篇 管理科学与工程(可...
    • 46 篇 图书情报与档案管...
    • 15 篇 工商管理
  • 25 篇 法学
    • 15 篇 社会学
    • 12 篇 法学
  • 14 篇 医学
    • 13 篇 临床医学
    • 9 篇 基础医学(可授医学...
  • 5 篇 教育学
  • 4 篇 经济学
  • 4 篇 军事学
  • 2 篇 农学
  • 1 篇 文学

主题

  • 100 篇 feature extracti...
  • 95 篇 accuracy
  • 65 篇 federated learni...
  • 59 篇 computational mo...
  • 58 篇 semantics
  • 52 篇 data models
  • 45 篇 training
  • 35 篇 transformers
  • 33 篇 neural networks
  • 32 篇 deep learning
  • 30 篇 robustness
  • 30 篇 adaptation model...
  • 25 篇 privacy
  • 24 篇 optimization
  • 24 篇 attention mechan...
  • 23 篇 data mining
  • 23 篇 predictive model...
  • 22 篇 measurement
  • 21 篇 real-time system...
  • 21 篇 visualization

机构

  • 274 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 60 篇 shandong provinc...
  • 51 篇 shandong enginee...
  • 43 篇 shaanxi key labo...
  • 40 篇 shandong provinc...
  • 38 篇 school of comput...
  • 37 篇 school of comput...
  • 36 篇 shandong fundame...
  • 32 篇 shaanxi key labo...
  • 27 篇 qilu university ...
  • 16 篇 quan cheng labor...
  • 15 篇 key laboratory o...
  • 15 篇 key laboratory o...
  • 15 篇 key laboratory o...
  • 14 篇 key laboratory o...
  • 14 篇 faculty of data ...
  • 14 篇 tianjin key labo...
  • 14 篇 qilu university ...
  • 13 篇 xi'an university...

作者

  • 29 篇 yichuan wang
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 24 篇 wang yichuan
  • 19 篇 hei xinhong
  • 18 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 15 篇 wei zhang
  • 14 篇 li wei
  • 14 篇 aimin li
  • 13 篇 guohua lv
  • 13 篇 lianhai wang
  • 13 篇 xiaohui han
  • 13 篇 chunxiao wang
  • 13 篇 mingle zhou
  • 13 篇 jin haiyan
  • 13 篇 wenpeng lu
  • 12 篇 lu wenpeng
  • 12 篇 jing zhao
  • 12 篇 delong han

语言

  • 660 篇 英文
  • 150 篇 其他
  • 10 篇 中文
检索条件"机构=Laboratory for Network Computing and Security Technology"
812 条 记 录,以下是571-580 订阅
排序:
Efficient Batch Verification and Privacy-Preserving Data Aggregation Scheme in V2G networks
收藏 引用
IEEE Transactions on Vehicular technology 2025年
作者: Wang, Congcong Wang, Chen Shen, Jian Vasilakos, Athanasios V. Wang, Bin Wang, Weizheng Department of Software Engineering Nanjing University of Information Science and Technology Nanjing210044 China the Zhejiang Key Laboratory of Digital Fashion and Data Governance the Zhejiang Provincial International Cooperation Base for Science and Technology on Cloud Computing Security and Data Aggregation Zhejiang Sci-Tech University Hangzhou310018 China Zhejiang Provincial Innovation Center of Advanced Textile Technology Shaoxing312000 China College of Computer Science and Information Technology IAU Saudi Arabia Grimstad4879 Norway Network and Data Security Hangzhou310053 China Computer Science Department City University of Hong Kong Hong Kong the Division of Computer Science University of Aizu Fukushima965–8580 Japan
In recent years, against the backdrop of smart grids, vehicle-to-grid (V2G) interaction has become a hot topic. With the increasing number of new energy vehicles, handling massive amounts of electricity transaction da... 详细信息
来源: 评论
FusionNet: An Effective network Phishing Website Detection Framework Based on Multi-Modal Fusion
FusionNet: An Effective Network Phishing Website Detection F...
收藏 引用
IEEE International Conference on High Performance computing and Communications (HPCC)
作者: Yu Sun Guangqi Liu Xiaohui Han Wenbo Zuo Weihua Liu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) (Shandong Academy of Sciences) Qilu University of Technology Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Quancheng Provincial Laboratory Jinan China
Recently, the rapid advancement of communication technology has undoubtedly improved people's lives. Unfortunately, this progress has also given rise to a significant issue: the proliferation of phishing websites....
来源: 评论
Construction and Application of the SMART Model for Adaptive Industrial Data Collection Based on Knowledge Graphs
Construction and Application of the SMART Model for Adaptive...
收藏 引用
IEEE International Conference on Big Data
作者: Wendan Cheng Zhen Zhang Heng Qian Qiuyue Wang Guanqun Su Lingge Meng Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China Shu Ju (Shandong) Intelligent Technology Co. Ltd. Jinan China Shandong Standard Institute of Emerging Technologies and Innovations Co. Ltd. Jinan China Shandong Qingniao IIoT Co. Ltd. Jinan China
Industrial data collection is the foundation for implementing enterprise digitization, which is of great significance to the development of intelligent manufacturing. However, Industrial Data Collection Standards (IDC... 详细信息
来源: 评论
Communication-Efficient Federated Learning for network Traffic Anomaly Detection
Communication-Efficient Federated Learning for Network Traff...
收藏 引用
International Conference on Mobile Ad-hoc and Sensor networks, MSN
作者: Xiao Cui Xiaohui Han Guangqi Liu Wenbo Zuo Zhiwen Wang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China Quancheng Provincial Laboratory Jinan China
As an emerging machine learning method, Federated Learning is widely used in network anomaly detection scenarios. However, many current federated learning-based network anomaly detection works ignore the communication... 详细信息
来源: 评论
Generalization Boosted Adapter for Open-Vocabulary Segmentation
arXiv
收藏 引用
arXiv 2024年
作者: Xu, Wenhao Wang, Changwei Feng, Xuxiang Xu, Rongtao Huang, Longzhao Zhang, Zherui Guo, Li Xu, Shibiao School of Artificial Intelligence Beijing University of Posts and Telecommunications Beijing100876 China The Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan250013 China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China The Aerospace Information Research Institute Chinese Academy of Sciences China The State Key Laboratory of Multimodal Artificial Intelligence Systems Institute of Automation Chinese Academy of Sciences Beijing China
Vision-language models (VLMs) have demonstrated remarkable open-vocabulary object recognition capabilities, motivating their adaptation for dense prediction tasks like segmentation. However, directly applying VLMs to ... 详细信息
来源: 评论
A fine-grained petri model for SQL time-blind injection
A fine-grained petri model for SQL time-blind injection
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Guiling Zhang Yaling Zhang Yichuan Wang Lei Zhu Wenjiang Ji School of computer science and engineering Xi’an University of technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China
With the background of severe SQL injection attacks, the existing SQL injection modeling methods cannot reflect the process of SQL injection attacks in a fine-grained manner. Based on the discussion of attack technolo... 详细信息
来源: 评论
ConvCatb: An Attention-based CNN-CATBOOST Risk Prediction Model for Driving Safety
ConvCatb: An Attention-based CNN-CATBOOST Risk Prediction Mo...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Xinhong Hei Hao Zhang Wenjiang Ji Yichuan Wang Lei Zhu Yuan Qiu College of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China
Risk prediction is one of the most important tasks in assistant and automatic driving. In recent years, by the help of VANET and various sensors in the cars, the status of cars and roads can be collected in real time ... 详细信息
来源: 评论
Deep Learning Enabled Bandpass Electromagnetic Metasurface Inverse Design
Deep Learning Enabled Bandpass Electromagnetic Metasurface I...
收藏 引用
Cross Strait Quad-Regional Radio Science and Wireless technology Conference (CSRWTC)
作者: Shenghui Zhao Ruizhi Zhang Meng Guo Xuewei Zhang Lifeng Nie Xiaoyu Pang The Research Institute for Special Structures of Aeronautical Composite AVIC Jinan Shandong P.R.China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputing Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan Shandong P. R. China
Conditional variational autoencoders (cVAE) is proposed to automate and optimize the design of band-pass electromagnetic metasurfaces. Electromagnetic responses curves and metasurface structural parameters are used as... 详细信息
来源: 评论
A Scientific Workflow Engine Design and Implementation
A Scientific Workflow Engine Design and Implementation
收藏 引用
第四届公共管理与智能社会国际学术会议
作者: Zhichao Zhang Meng Guo Tingting Guo Key Laboratory of' Computing Power Network and Information Security of Ministry of Education Shandong Computer Science Center (National Supercomputing Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Inspur General Software Co.Ltd. Shandong Carbon Manager Group Co.Ltd.
This paper designs and implements a scientific workflow engine that follows the BPMN 2.0, enriching existing research on scientific workflow engine specification and theory. The engine is implemented using the Java la... 详细信息
来源: 评论
A Driving Risk Prediction Approach Based on Generative Adversarial networks and VANET for Autonomous Trams
A Driving Risk Prediction Approach Based on Generative Adver...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Wenjiang Ji Jiangcheng Yang Yichuan Wang Lei Zhu Yuan Qiu Xinhong Hei College of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China
Driving safety is an essential prerequisite to the rapid development of autonomous trams. However, the relationship of driving risk factors is nonlinear, which makes modeling difficult. To improve the accuracy of driv... 详细信息
来源: 评论