咨询与建议

限定检索结果

文献类型

  • 29 篇 期刊文献
  • 12 篇 会议

馆藏范围

  • 41 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 29 篇 工学
    • 27 篇 计算机科学与技术...
    • 24 篇 软件工程
    • 12 篇 信息与通信工程
    • 6 篇 生物工程
    • 4 篇 电气工程
    • 2 篇 光学工程
    • 2 篇 动力工程及工程热...
    • 2 篇 电子科学与技术(可...
    • 2 篇 控制科学与工程
    • 2 篇 生物医学工程(可授...
    • 1 篇 仪器科学与技术
  • 15 篇 理学
    • 9 篇 数学
    • 6 篇 生物学
    • 3 篇 统计学(可授理学、...
    • 2 篇 物理学
    • 2 篇 系统科学
  • 4 篇 管理学
    • 3 篇 管理科学与工程(可...
    • 1 篇 工商管理
    • 1 篇 图书情报与档案管...
  • 2 篇 医学
    • 2 篇 临床医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 药学(可授医学、理...
    • 1 篇 特种医学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 4 篇 deep learning
  • 3 篇 wireless sensor ...
  • 3 篇 open source soft...
  • 1 篇 conferences
  • 1 篇 content security
  • 1 篇 learning systems
  • 1 篇 scalability
  • 1 篇 head
  • 1 篇 routing
  • 1 篇 reinforcement le...
  • 1 篇 semantic segment...
  • 1 篇 service function...
  • 1 篇 flow graphs
  • 1 篇 generative adver...
  • 1 篇 weakly supervise...
  • 1 篇 graph pointer ne...
  • 1 篇 information rate...
  • 1 篇 prototypes
  • 1 篇 software enginee...
  • 1 篇 electric lines

机构

  • 3 篇 institute for ne...
  • 3 篇 school of comput...
  • 3 篇 school of cyber ...
  • 3 篇 school of comput...
  • 3 篇 network computin...
  • 2 篇 jin yinhu labora...
  • 2 篇 shaanxi key labo...
  • 2 篇 school of comput...
  • 2 篇 school of comput...
  • 2 篇 international co...
  • 2 篇 software center ...
  • 2 篇 school of comput...
  • 2 篇 national enginee...
  • 2 篇 school of comput...
  • 2 篇 shaanxi key labo...
  • 2 篇 school of mathem...
  • 2 篇 zhejiang lab
  • 2 篇 department of co...
  • 2 篇 research center ...
  • 1 篇 department of ne...

作者

  • 5 篇 wang qian
  • 5 篇 meng deyu
  • 5 篇 sun qindong
  • 4 篇 zhang lei
  • 4 篇 shen yulong
  • 4 篇 dong xuewen
  • 3 篇 wan zhiguo
  • 3 篇 lu di
  • 3 篇 yang lingxiao
  • 3 篇 zuo wangmeng
  • 3 篇 xia feng
  • 3 篇 yong hongwei
  • 2 篇 zhang chao
  • 2 篇 guo quan
  • 2 篇 li zhen
  • 2 篇 yan xiaoran
  • 2 篇 li tao
  • 2 篇 xu shouhuai
  • 2 篇 xiaoying song
  • 2 篇 zou deqing

语言

  • 35 篇 英文
  • 6 篇 其他
检索条件"机构=Liaoning Key Lab of Network Security and Computing Technology"
41 条 记 录,以下是1-10 订阅
排序:
RobustPFL: Robust Personalized Federated Learning
收藏 引用
IEEE Transactions on Dependable and Secure computing 2025年
作者: Chen, Guorong Wang, Wei Wu, Yufang Li, Chao Xu, Guangquan Ji, Shouling Li, Tao Shen, Meng Han, Yufei Xi'an Jiaotong University Ministry of Education Key Lab for Intelligent Networks and Network Security Xi'an China Beijing Jiaotong University 3 Shangyuancun Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing100044 China Tianjin University Tianjin Key Laboratory of Advanced Networking College of Intelligence and Computing Tianjin300350 China Zhejiang University College of Computer Science and Technology Hangzhou310027 China ITAI Haihe Lab Tianjin China Nankai University College of Computer Science Tianjin300350 China Beijing Institute of Technology School of Cyberspace Security Beijing100081 China Peng Cheng Laboratory Cyberspace Security Research Center Shenzhen518066 China INRIA Bretagne Rennes35042 France
Conventional federated learning (FL) coordinated by a central server focuses on training a global model and protecting the privacy of clients' training data by storing it locally. However, the statistical heteroge... 详细信息
来源: 评论
HiCoCS: High Concurrency Cross-Sharding on Permissioned Blockchains
arXiv
收藏 引用
arXiv 2025年
作者: Yang, Lingxiao Dong, Xuewen Wan, Zhiguo Lu, Di Zhang, Yushu Shen, Yulong School of Computer Science and Technology Xidian University The Engineering Research Center of Blockchain Technology Application and Evaluation Ministry of Education China Shaanxi Key Laboratory of Blockchain and Secure Computing Xi’an710071 China Zhejiang Lab Zhejiang Hangzhou311121 China School of Computer Science and Technology Xidian University China Shaanxi Key Laboratory of Network and System Security Xi’an710071 China College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Jiangsu Nanjing210016 China
As the foundation of the Web3 trust system, blockchain technology faces increasing demands for scalability. Sharding emerges as a promising solution, but it struggles to handle highly concurrent cross-shard transactio... 详细信息
来源: 评论
HiCoCS: High Concurrency Cross-Sharding on Permissioned Blockchains
收藏 引用
IEEE Transactions on Computers 2025年
作者: Yang, Lingxiao Dong, Xuewen Wan, Zhiguo Lu, Di Zhang, Yushu Shen, Yulong Xidian University School of Computer Science and Technology China Ministry of Education Engineering Research Center of Blockchain Technology Application and Evaluation China Shaanxi Key Laboratory of Blockchain and Secure Computing Xi’an710071 China Zhejiang Lab Zhejiang Hangzhou311121 China Shaanxi Key Laboratory of Network and System Security Xi’an710071 China Jiangxi University of Finance and Economics School of Computing Nanchang330013 China Jiangxi University of Finance and Economics Nanchang330013 China
As the foundation of the Web3 trust system, blockchain technology faces increasing demands for scalability. Sharding emerges as a promising solution, but it struggles to handle highly concurrent cross-shard transactio... 详细信息
来源: 评论
A strategy for avoiding energy holes based on data fusion in wireless sensor network
A strategy for avoiding energy holes based on data fusion in...
收藏 引用
2012 International Conference on Electrical Insulating Materials and Electrical Engineering, EIMEE 2012
作者: Song, Xiaoying Wen, Tao Guo, Quan Wu, Di China Liaoning Key Lab of Neusoft Security and Computing Technology Dalian Neusoft Information Institute Dalian Liaoning China
Energy holes problem is one of key issues for wireless sensor networks (WSN). At present, the resolved strategies mainly focus on non-uniform node distribution and adjusting transmission power. However, some costs are... 详细信息
来源: 评论
The Algorithm of Short Message Hot Topic Detection Based on Feature Association
收藏 引用
Information technology Journal 2009年 第2期8卷 236-240页
作者: Sun, Qindong Wang, Qian Qiao, Hongli School of Computer Science and Engineering Xi'an University of Technology Xi'an 710048 China Network Computing and Security Key Lab of Shaanxi Xi'an University of Technology Xi'an 710048 China
Aiming at the mobile short message (SMS) hot topic extraction, the text features and statistical regularity of SMS are analyzed in this study. The formal description of SMS hot topic is given and an algorithm of SMS h... 详细信息
来源: 评论
PosFuzz:augmenting greybox fuzzing with effective position distribution
收藏 引用
Cybersecurity 2023年 第4期6卷 123-143页
作者: Yanyan Zou Wei Zou JiaCheng Zhao Nanyu Zhong Yu Zhang Ji Shi Wei Huo Institute of Information Engineering Chinese Academy of SciencesBeijingChina School of Cyber Security University of Chinese Academy of SciencesBeijingChina State Key Lab of Processors Institute of Computing TechnologyChinese Academy of SciencesBeijingChina Key Laboratory of Network Assessment Technology Chinese Academy of SciencesBeijingChina Beijing Key Laboratory of Network Security and Protection Technology BeijingChina Zhongguancun Laboratory BeijingChina
Mutation-based greybox fuzzing has been one of the most prevalent techniques for security vulnerability discovery and a great deal of research work has been proposed to improve both its efficiency and ***-based greybo... 详细信息
来源: 评论
A prior embedding-driven architecture for long distance blind iris recognition
收藏 引用
Biomedical Signal Processing and Control 2025年 109卷
作者: Qi Xiong Xinman Zhang Jun Shen International College Hunan University of Arts and Sciences Changde 415000 China School of Automation Science and Engineering Faculty of Electronic and Information Engineering MOE Key Lab for Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an 710049 Shaanxi China School of Computing and Information Technology University of Wollongong Wollongong NSW 2522 Australia
Blind iris images, caused by unknown degradation during the process of iris recognition at long distances, often lead to decreased iris recognition rates. Currently, limited literature addresses this issue. To tackle ...
来源: 评论
Design of distribution transformer monitoring system based on LPC2103
收藏 引用
Journal of Convergence Information technology 2012年 第21期7卷 120-126页
作者: Sun, Qindong Wang, Qian Wang, Nan Network Computing and Security Key Lab of Shaanxi Xi'an University of Technology Xi'an 710048 China
Aimed at satisfying the monitoring requirement of distribution transformer, a kind of distribution transformer monitoring system based on LPC2103 is designed. Hardware module and data processing program of the monitor... 详细信息
来源: 评论
An algorithm for automatic photo typesetting based on kinship
收藏 引用
Journal of Information and Computational Science 2014年 第13期11卷 4727-4736页
作者: Sun, Qindong Wang, Yan Tian, Minying Wang, Qian Zhang, Jingpeng Key Lab for Network Computing and Security of Shaanxi Province Xi'an University of Technology Xi'an China
Photo typesetting belongs to the rectangular packing problems, currently the algorithms of rectangular packing problems can be divided into two categories: heuristic methods and modern intelligent based methods. For b... 详细信息
来源: 评论
Modeling and analysis of the proactive worm in unstructured Peer-to-Peer network
收藏 引用
Journal of Convergence Information technology 2010年 第5期5卷 111-117页
作者: Sun, Qindong Wang, Qian Ren, Jie Network Computing and Security Key Lab of Shaanxi Xi'an University of Technology Xi'an 710048 China
With the popularity of P2P (Peer-to-Peer) network applications, active P2P worms become one of the most important newly threat of the network security. In this paper, the propagation process of active P2P worms are st... 详细信息
来源: 评论