咨询与建议

限定检索结果

文献类型

  • 606 篇 会议
  • 179 篇 期刊文献

馆藏范围

  • 785 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 345 篇 工学
    • 272 篇 计算机科学与技术...
    • 230 篇 软件工程
    • 82 篇 信息与通信工程
    • 72 篇 电气工程
    • 42 篇 控制科学与工程
    • 27 篇 电子科学与技术(可...
    • 26 篇 生物工程
    • 26 篇 网络空间安全
    • 23 篇 机械工程
    • 20 篇 光学工程
    • 19 篇 交通运输工程
    • 17 篇 安全科学与工程
    • 15 篇 生物医学工程(可授...
    • 12 篇 化学工程与技术
    • 11 篇 仪器科学与技术
    • 9 篇 土木工程
    • 8 篇 建筑学
  • 159 篇 理学
    • 97 篇 数学
    • 39 篇 物理学
    • 27 篇 统计学(可授理学、...
    • 25 篇 生物学
    • 10 篇 化学
    • 10 篇 系统科学
  • 81 篇 管理学
    • 50 篇 管理科学与工程(可...
    • 45 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 25 篇 法学
    • 15 篇 社会学
    • 12 篇 法学
  • 13 篇 医学
    • 12 篇 临床医学
    • 9 篇 基础医学(可授医学...
  • 5 篇 教育学
  • 4 篇 经济学
  • 4 篇 军事学
  • 2 篇 农学
  • 1 篇 文学

主题

  • 99 篇 feature extracti...
  • 93 篇 accuracy
  • 61 篇 federated learni...
  • 59 篇 computational mo...
  • 58 篇 semantics
  • 50 篇 data models
  • 44 篇 training
  • 35 篇 transformers
  • 33 篇 neural networks
  • 30 篇 deep learning
  • 30 篇 adaptation model...
  • 28 篇 robustness
  • 24 篇 privacy
  • 23 篇 data mining
  • 23 篇 predictive model...
  • 23 篇 attention mechan...
  • 21 篇 optimization
  • 21 篇 visualization
  • 21 篇 measurement
  • 20 篇 real-time system...

机构

  • 265 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 56 篇 shandong provinc...
  • 51 篇 shandong enginee...
  • 43 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 37 篇 school of comput...
  • 36 篇 shandong fundame...
  • 32 篇 shandong provinc...
  • 32 篇 shaanxi key labo...
  • 27 篇 qilu university ...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 faculty of data ...
  • 14 篇 tianjin key labo...
  • 14 篇 qilu university ...
  • 13 篇 key laboratory o...
  • 13 篇 key laboratory o...
  • 11 篇 xi'an university...

作者

  • 29 篇 yichuan wang
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 24 篇 wang yichuan
  • 19 篇 hei xinhong
  • 18 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 14 篇 li wei
  • 14 篇 aimin li
  • 13 篇 guohua lv
  • 13 篇 lianhai wang
  • 13 篇 xiaohui han
  • 13 篇 mingle zhou
  • 13 篇 jin haiyan
  • 12 篇 lu wenpeng
  • 12 篇 jing zhao
  • 12 篇 delong han
  • 12 篇 chunxiao wang
  • 12 篇 zhenyu yang
  • 12 篇 lei zhu

语言

  • 676 篇 英文
  • 107 篇 其他
  • 8 篇 中文
检索条件"机构=Laboratory for Network Computing and Security Technology"
785 条 记 录,以下是711-720 订阅
排序:
Revisiting Recent and Current Anomaly Detection based on Machine Learning in Ad-Hoc networks  5
Revisiting Recent and Current Anomaly Detection based on Mac...
收藏 引用
5th Annual International Conference on network and Information Systems for Computers, ICNISC 2019
作者: Wang, Zhixiao Chen, Mingyu Yan, Wenyao Wang, Wendong Gao, Ang Nie, Gaoyang Wang, Feng Yang, Shaobo Xi'An University of Technology Xi'an710048 China Goettingen University Goettingen37077 Germany Xi'An Jiaotong University Xi'an710049 China Shaanxi Provincial Key Laboratory of Network Computing and Security Technology Xi'an710048 China College of xi'An Innovation Yan'An University Xi'an710100 China Yan'An University Yan'an716000 China National Satellite Meteorological Center China Meteorological Administration Beijing100081 China
Ad-Hoc network which is one kind of self-organized networks is much more vulnerable than the infrastructural network with the properties of highly changeable linkage, dynamic structure, and wireless connections so tha... 详细信息
来源: 评论
Transferring knowledge distillation for multilingual social event detection
arXiv
收藏 引用
arXiv 2021年
作者: Ren, Jiaqian Peng, Hao Jiang, Lei Wu, Jia Tong, Yongxin Wang, Lihong Bai, Xu Wang, Bo Yang, Qiang Institute of Information Engineering Chinese Academy of Sciences The School of Cyber Security University of Chinese Academy of Sciences Beijing100041 China Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University Beijing100083 China The School of Cyber Science and Technology Beihang University Beijing100083 China Institute of Information Engineering Chinese Academy of Sciences Beijing100041 China The Department of Computing Macquarie University Sydney Australia The State Key Laboratory of Software Development Environment The School of Computer Science and Engineering Beihang University Beijing100083 China The National Computer Network Emergency Response Technical Team Coordination Center of China Beijing100029 China The Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong AI Group WeBank Co. Ltd. China
Recently published graph neural networks (GNNs) show promising performance at social event detection tasks. However, most studies are oriented toward monolingual data in languages with abundant training samples. This ... 详细信息
来源: 评论
STR: Secure computation on additive shares using the share-transform-reveal strategy
arXiv
收藏 引用
arXiv 2020年
作者: Xia, Zhihua Gu, Qi Zhou, Wenhao Xiong, Lizhi Weng, Jian Xiong, Naixue N. College of Cyber Security Jinan University Guangzhou510632 China Engineering Research Center of Digital Forensics Ministry of Education School of Computer and Software Jiangsu Engineering Center of Network Monitoring Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology Nanjing University of Information Science & Technology Nanjing210044 China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin541004 China The College of Intelligence and Computing Tianjin University Tianjin300350 China
The rapid development of cloud computing probably benefits many of us while the privacy risks brought by semi-honest cloud servers have aroused the attention of more and more people and legislatures. In the last two d... 详细信息
来源: 评论
Optimizing network resource allocation with graph pointer neural network in large-scale AI systems
收藏 引用
Digital Communications and networks 2024年
作者: Peiying Zhang Yilin Li Athanasios V. Vasilakos Konstantin Igorevich Kostromitin Jianyong Zhang Mohsen Guizani Qingdao Institute of Software College of Computer Science and Technology China University of Petroleum (East China) Qingdao 266580 China State Key Laboratory of Integrated Services Networks Xidian University Xi'an 710071 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan 250013 China Department of Networks and Communications College of Computer Science and Information Technology Imam Abdulrahman Bin Faisal University P.O. Box 1982 Dammam 31441 Saudi Arabia Department of Physics of Nanoscale Systems South Ural State University Chelyabinsk 454080 the Russian Federation Institute of Lightwave Technology Beijing Jiaotong University Beijing 100044 China Key Lab of All Optical Network and Advanced Telecommunication of EMC Institute of Lightwave Technology Beijing Jiaotong University Beijing 100044 China Machine Learning Department Mohamed Bin Zayed University of Artificial Intelligence (MBZUAI) Abu Dhabi 999041 United Arab Emirates
For increasingly complex communication demands of large-scale AI communication systems, the Space-Air-Ground Integrated network (SAGIN) better caters to demands but also raises concerns about resource scarcity and div... 详细信息
来源: 评论
Enhancing Collaborative Inference on Heterogeneous Edge Devices via Adaptive Ensemble Knowledge Distillation
收藏 引用
IEEE Journal on Selected Areas in Communications 2025年
作者: Wu, Shangrui Li, Yupeng Wang, Wenhua Guo, Jianxiong Fan, Wentao Liu, Qin Jia, Weijia Yu, Shui Cao, Jiannong Wang, Tian Beijing Normal-Hong Kong Baptist University Guangdong Provincial/Zhuhai Key Laboratory of IRADS Department of Computer Science Zhuhai China Hong Kong Baptist University Hong Kong Hong Kong Hong Kong Baptist University Department of Interactive Media Hong Kong Hong Kong Beijing Normal University Institute of Artificial Intelligence and Future Networks Zhuhai China Xi'an University of Posts and Telecommunications Shaanxi Key Laboratory of Information Communication Network and Security Shaanxi Xi'an China Hunan University College of Computer Science and Electronic Engineering Changsha China University of Technology Sydney School of Computer Science Sydney Australia The Hong Kong Polytechnic University Department of Computing Hong Kong Hong Kong
The integration of edge computing with deep neural networks (DNNs) is crucial for intelligent industrial cyber-physical systems. Typically, deploying DNNs on heterogeneous edge devices relies on methods like model com... 详细信息
来源: 评论
Android Malicious Code Detection Based on Secondary Pruning Optimization
Android Malicious Code Detection Based on Secondary Pruning ...
收藏 引用
International Congress on Image and Signal Processing, BioMedical Engineering and Informatics
作者: Qing Yu Kuolang Ma Zuohua Wang Tianjin Key Laboratory of Intelligence Computing and Network Security Tianjin University of Technology Tianjin China Tianjin Times Shengshi Technology Co. Ltd. No. 216 Hongqi Road Nankai District Tianjin China
In this paper, we propose a detection algorithm for Android malicious code based on integrated multi-feature. By decompiling and processing APK files, the multi-class behavior features of Android application are extra... 详细信息
来源: 评论
A Hole Repairing Method Based on Edge-Preserving Projection  12th
A Hole Repairing Method Based on Edge-Preserving Projection
收藏 引用
12th International Conference on e-Learning and Games, Edutainment 2018
作者: Wang, Yinghui Zhao, Yanni Wang, Ningna Ning, Xiaojuan Shi, Zhenghao Zhao, Minghua Lv, Ke Huang, Liangyi Institute of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory of Network Computing and Security Technology Xi’an China Department of Computer Science Shannxi Vocational and Technical College Xi’an China Booking B.V. Herengracht 597 Amsterdam1017 CE Netherlands Institute of Automation Chinese Academy of Sciences Beijing China School of Engineering and Applied Science George Washington University Washington D.C. United States
A point cloud hole repairing method based on edge-preserving projection is proposed in order to maintain sharp features of holes. First, the hole boundary points are acquired by quadrants and angles, then connections ... 详细信息
来源: 评论
A Hole Repairing Method Based on Slicing  12th
A Hole Repairing Method Based on Slicing
收藏 引用
12th International Conference on e-Learning and Games, Edutainment 2018
作者: Zhao, Yanni Wang, Yinghui Wang, Ningna Ning, Xiaojuan Shi, Zhenghao Zhao, Minghua Lv, Ke Huang, Liangyi Institute of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory of Network Computing and Security Technology Xi’an China Department of Computer Science Shannxi Vocational and Technical College Xi’an China Booking B.V. Herengracht 597 Amsterdam1017 CE Netherlands Institute of Automation Chinese Academy of Sciences Beijing China School of Engineering and Applied Science George Washington University Washington D.C. United States
The repairing of 3D point cloud holes has an important meaning to ensure the integrity of cloud data. We present a slice-based repairing method for 3D point cloud in this paper. Firstly, the model is horizontal sliced... 详细信息
来源: 评论
A Slice-Guided Method of Indoor Scene Structure Retrieving  12th
A Slice-Guided Method of Indoor Scene Structure Retrieving
收藏 引用
12th International Conference on e-Learning and Games, Edutainment 2018
作者: Wang, Lijuan Wang, Yinghui Wang, Ningna Ning, Xiaojuan Lv, Ke Huang, Liangyi Xi’an University of Technology South Jinhua Road no. 5 Xi’an710032 China Xi’an Technology University Mid Xuefu Road no. 2 Xi’an710021 China Shaanxi Key Laboratory of Network Computing and Security Technology South Jinhua Road no. 5 Xi’an710032 China *** B.V. Vijzelstraat 66-80 Amsterdam1017HL Netherlands Institute of Automation Chinese Academy of Sciences Beijing China School of Engineering and Applied Science George Washington University Washington DC20052 United States
The structure information of indoor scene is necessary for a robot who works in a room. In order to achieve structure of an indoor scene, a slice-guided method of indoor scene structure retrieving is proposed in this ... 详细信息
来源: 评论
Beam-Domain Secret Key Generation for Multi-User Massive MIMO networks
arXiv
收藏 引用
arXiv 2020年
作者: Chen, You Li, Guyue Sun, Chen Zhang, Junqing Jorswieck, Eduard Xiao, Bin School of Cyber Science and Engineering Southeast University Nanjing210096 China National Mobile Communications Research Laboratory Southeast University Nanjing210096 China Purple Mountain Laboratories for Network and Communication Security Nanjing210096 China Department of Electrical Engineering and Electronics University of Liverpool LiverpoolL69 3GJ United Kingdom Institute for Communications Technology Technische Universität Braunschweig Germany Department of Computing Hong Kong Polytechnic University Hong Kong
Physical-layer key generation (PKG) in multi-user massive MIMO networks faces great challenges due to the large length of pilots and the high dimension of channel matrix. To tackle these problems, we propose a novel m... 详细信息
来源: 评论