咨询与建议

限定检索结果

文献类型

  • 29 篇 期刊文献
  • 12 篇 会议

馆藏范围

  • 41 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 30 篇 工学
    • 28 篇 计算机科学与技术...
    • 25 篇 软件工程
    • 12 篇 信息与通信工程
    • 6 篇 生物工程
    • 4 篇 电气工程
    • 3 篇 光学工程
    • 2 篇 动力工程及工程热...
    • 2 篇 电子科学与技术(可...
    • 2 篇 控制科学与工程
    • 2 篇 生物医学工程(可授...
    • 1 篇 仪器科学与技术
  • 15 篇 理学
    • 9 篇 数学
    • 6 篇 生物学
    • 3 篇 统计学(可授理学、...
    • 2 篇 物理学
    • 2 篇 系统科学
  • 4 篇 管理学
    • 3 篇 管理科学与工程(可...
    • 1 篇 工商管理
    • 1 篇 图书情报与档案管...
  • 3 篇 医学
    • 2 篇 临床医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 药学(可授医学、理...
    • 1 篇 特种医学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 4 篇 deep learning
  • 3 篇 wireless sensor ...
  • 3 篇 open source soft...
  • 1 篇 conferences
  • 1 篇 content security
  • 1 篇 learning systems
  • 1 篇 scalability
  • 1 篇 head
  • 1 篇 routing
  • 1 篇 reinforcement le...
  • 1 篇 semantic segment...
  • 1 篇 service function...
  • 1 篇 deep neural netw...
  • 1 篇 flow graphs
  • 1 篇 generative adver...
  • 1 篇 weakly supervise...
  • 1 篇 graph pointer ne...
  • 1 篇 information rate...
  • 1 篇 prototypes
  • 1 篇 software enginee...

机构

  • 3 篇 institute for ne...
  • 3 篇 school of comput...
  • 3 篇 school of cyber ...
  • 3 篇 school of comput...
  • 3 篇 network computin...
  • 2 篇 jin yinhu labora...
  • 2 篇 school of comput...
  • 2 篇 international co...
  • 2 篇 software center ...
  • 2 篇 school of comput...
  • 2 篇 national enginee...
  • 2 篇 school of mathem...
  • 2 篇 school of automa...
  • 2 篇 zhejiang lab
  • 2 篇 department of co...
  • 2 篇 research center ...
  • 1 篇 department of ne...
  • 1 篇 college of compu...
  • 1 篇 department of co...
  • 1 篇 key laboratory f...

作者

  • 5 篇 wang qian
  • 5 篇 meng deyu
  • 5 篇 sun qindong
  • 4 篇 zhang lei
  • 4 篇 shen yulong
  • 4 篇 dong xuewen
  • 3 篇 wan zhiguo
  • 3 篇 lu di
  • 3 篇 yang lingxiao
  • 3 篇 zuo wangmeng
  • 3 篇 xia feng
  • 3 篇 yong hongwei
  • 2 篇 shen jun
  • 2 篇 zhang chao
  • 2 篇 guo quan
  • 2 篇 li zhen
  • 2 篇 yan xiaoran
  • 2 篇 li tao
  • 2 篇 xu shouhuai
  • 2 篇 xiaoying song

语言

  • 35 篇 英文
  • 6 篇 其他
检索条件"机构=Liaoning Key Lab of Network Security and Computing Technology"
41 条 记 录,以下是11-20 订阅
Distributed energy balanced routing for wireless sensor network using energy prediction metric
Distributed energy balanced routing for wireless sensor netw...
收藏 引用
International Conference on Information Science and Control Engineering
作者: Quan Guo Xiaoying Song Liaoning Key Lab of Network Security and Computing Technology Dalian Neusoft Information Institute College of Computer Science and Engineering Northeastern University
A considerable amount of energy efficient routing algorithms have been proposed to save energy and prolong network lifetime. Those algorithms mainly focus on forwarding packets along the minimum energy path to the sin... 详细信息
来源: 评论
The cross-layer design of wireless mesh networks based on multimedia services
收藏 引用
Journal of Computational Information Systems 2013年 第11期9卷 4495-4504页
作者: Sun, Qindong Zhang, Benliang Yang, Min Wang, Qian Key Lab. for Network Computing and Security of Shaanxi Province Xi'an University of Technology Xi'an 710048 China
In this paper, we have introduced a cross-layer design model which is based on multimedia services in order to favor the QoS demand in wireless mesh networks. By means of this model the relevant parameters in each lay... 详细信息
来源: 评论
Energy-balanced clustering routing protocol based on task separation in wireless sensor networks
Energy-balanced clustering routing protocol based on task se...
收藏 引用
International Conference on BioMedical Engineering and Informatics (BMEI)
作者: Wei Sun Xiaoying Song Fasheng Wang Software Center Northeastern University Shenyang China Liaoning Key Lab of Network Security and Computing Technology Dalian Neusoft University Information Dalian China
Clustering protocol for data gathering is one of the effective ways to solve the energy hole problem in wireless sensor networks. However, most of the existing clustering protocols focus on the network model with unif... 详细信息
来源: 评论
Reversible Data Hiding Simultaneously Using Substitution of MSB and Compression of LSB of Encrypted Image  14
Reversible Data Hiding Simultaneously Using Substitution of ...
收藏 引用
14th International Conference on Digital Image Processing, ICDIP 2022
作者: Sui, Liansheng Liu, Jie Cheng, Ying Xiao, Zhaolin Tian, Ailing School of Computer Science and Engineering Xi’an University of Technology Xi’an710048 China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an710048 China Student’s Affairs Division Xi’an University of Technology Xi’an710048 China Shaanxi Province Key Lab of Thin Film Technology and Optical Test Xi’an Technological University Xi’an710048 China
With the development of privacy protection, reversible data hiding methods in encrypted image have drawn extensive research interest. Among them, a new method is proposed based on embedding prediction errors, i.e., EP... 详细信息
来源: 评论
The Algorithm of Short Message Hot Topic Detection Based on Feature Association
收藏 引用
Information technology Journal 2009年 第2期8卷 236-240页
作者: Sun, Qindong Wang, Qian Qiao, Hongli School of Computer Science and Engineering Xi'an University of Technology Xi'an 710048 China Network Computing and Security Key Lab of Shaanxi Xi'an University of Technology Xi'an 710048 China
Aiming at the mobile short message (SMS) hot topic extraction, the text features and statistical regularity of SMS are analyzed in this study. The formal description of SMS hot topic is given and an algorithm of SMS h... 详细信息
来源: 评论
AN ADULT SHORT MESSAGE RECOGNITION ALGORITHM BASED ON RESTRICTED CLOSE TEST OPTIMIZATION
AN ADULT SHORT MESSAGE RECOGNITION ALGORITHM BASED ON RESTRI...
收藏 引用
2008 International Conference on Machine Learning and Cybernetics(2008机器学习与控制论国际会议)
作者: QIN-DONG SUN XIN-BO HUANG JIU-LONG ZHANG Network Computing and Security Tech.Key Lab.of Shaanxi Province Xi'an University of Technology Xi' College of Electronics and Information Xi'an Polytechnic University Xi'an 710048 China Network Computing and Security Tech.Key Lab.of Shaanxi Province Xi'an University of Technology Xi'
The flooding of adult short message has become an urgent problem of safety of message content. Existing researches on short message filtering pay much attention to rubbish and advertising short messages, and the granu... 详细信息
来源: 评论
Linear (k, n) Secret Sharing Scheme with Cheating Detection
Linear (k, n) Secret Sharing Scheme with Cheating Detection
收藏 引用
International Conference on Computer and Information technology (CIT)
作者: Yan-xiao Liu Zhi-xiao Wang Wen-yao Yan Shaanxi Key Lab for Network Computing and Security Xian University of Technology Xian China Xian Innovation College Yanan University Xian China
Linear (k,n) secret sharing scheme is a class of (k,n) secret sharing, where all the n shares of a secret satisfy a linear relationship. It plays an important role in other cryptographic systems, such as multi-party c... 详细信息
来源: 评论
Addressing the energy hole problem based on heterogeneous clustering size for wireless sensor networks
收藏 引用
Journal of Computational Information Systems 2014年 第9期10卷 3973-3980页
作者: Song, Xiaoying Wen, Tao Guo, Quan Ma, Fengming Zhang, Dongqing Software Center Northeastern University Shenyang 110819 China Liaoning Key Lab. of Network Security and Computing Technology Dalian Neusoft Information Institute Dalian 116023 China School of Management Science Qufu Normal University Rizhao Shandong 276800 China
Clustering is one of the effective ways to solve energy hole problem for Wireless Sensor network. So far, the approaches of heterogeneous cluster size mainly have concentrated on the design of unequal cluster protocol... 详细信息
来源: 评论
Modeling for user interaction by influence transfer effect in online social networks
Modeling for user interaction by influence transfer effect i...
收藏 引用
Conference on Local Computer networks (LCN)
作者: Qindong Sun Nan Wang Yadong Zhou Hanqin Wang Liansheng Sui Shaanxi Key Laboratory of Network Computing and Security Xi'an University of Technology Xi'an China MOE KLINNS Lab Xi'an Jiaotong University Xi'an China
User interaction is one of the most important features of online social networks, and is the basis of research of user behavior analysis, information spreading model, etc. However, existing approaches focus on the int... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities  24
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
44th ACM/IEEE International Conference on Software Engineering, ICSE 2024
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hong Kong Jin YinHu Laboratory Wuhan China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China University of Colorado Colorado Springs Department of Computer Science Colorado Springs Colorado United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论