咨询与建议

限定检索结果

文献类型

  • 30 篇 期刊文献
  • 12 篇 会议

馆藏范围

  • 42 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 29 篇 工学
    • 27 篇 计算机科学与技术...
    • 24 篇 软件工程
    • 12 篇 信息与通信工程
    • 6 篇 生物工程
    • 4 篇 电气工程
    • 2 篇 光学工程
    • 2 篇 动力工程及工程热...
    • 2 篇 电子科学与技术(可...
    • 2 篇 控制科学与工程
    • 2 篇 生物医学工程(可授...
    • 1 篇 仪器科学与技术
  • 15 篇 理学
    • 9 篇 数学
    • 6 篇 生物学
    • 3 篇 统计学(可授理学、...
    • 2 篇 物理学
    • 2 篇 系统科学
  • 4 篇 管理学
    • 3 篇 管理科学与工程(可...
    • 1 篇 工商管理
    • 1 篇 图书情报与档案管...
  • 3 篇 医学
    • 2 篇 临床医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 药学(可授医学、理...
    • 1 篇 特种医学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 4 篇 deep learning
  • 3 篇 wireless sensor ...
  • 3 篇 open source soft...
  • 1 篇 conferences
  • 1 篇 content security
  • 1 篇 learning systems
  • 1 篇 scalability
  • 1 篇 head
  • 1 篇 routing
  • 1 篇 reinforcement le...
  • 1 篇 semantic segment...
  • 1 篇 service function...
  • 1 篇 deep neural netw...
  • 1 篇 flow graphs
  • 1 篇 generative adver...
  • 1 篇 weakly supervise...
  • 1 篇 graph pointer ne...
  • 1 篇 information rate...
  • 1 篇 prototypes
  • 1 篇 software enginee...

机构

  • 3 篇 institute for ne...
  • 3 篇 school of comput...
  • 3 篇 school of cyber ...
  • 3 篇 school of comput...
  • 3 篇 network computin...
  • 2 篇 jin yinhu labora...
  • 2 篇 shaanxi key labo...
  • 2 篇 school of comput...
  • 2 篇 school of comput...
  • 2 篇 international co...
  • 2 篇 software center ...
  • 2 篇 institute of hig...
  • 2 篇 haihe lab of ita...
  • 2 篇 school of comput...
  • 2 篇 national enginee...
  • 2 篇 school of comput...
  • 2 篇 shaanxi key labo...
  • 2 篇 school of mathem...
  • 2 篇 zhejiang lab
  • 2 篇 department of co...

作者

  • 5 篇 wang qian
  • 5 篇 meng deyu
  • 5 篇 sun qindong
  • 4 篇 zhang lei
  • 4 篇 shen yulong
  • 4 篇 dong xuewen
  • 3 篇 wan zhiguo
  • 3 篇 lu di
  • 3 篇 yang lingxiao
  • 3 篇 zuo wangmeng
  • 3 篇 xia feng
  • 3 篇 yong hongwei
  • 2 篇 zhang chao
  • 2 篇 guo quan
  • 2 篇 li zhen
  • 2 篇 yan xiaoran
  • 2 篇 li tao
  • 2 篇 xu shouhuai
  • 2 篇 xiaoying song
  • 2 篇 zou deqing

语言

  • 36 篇 英文
  • 6 篇 其他
检索条件"机构=Liaoning Key Lab of Network Security and Computing Technology"
42 条 记 录,以下是11-20 订阅
排序:
AdaptFRCNet: Semi-supervised adaptation of pre-trained model with frequency and region consistency for medical image segmentation
收藏 引用
Medical Image Analysis 2025年 103卷
作者: Along He Yanlin Wu Zhihong Wang Tao Li Huazhu Fu College of Computer Science Tianjin Key Laboratory of Network and Data Security Technology Nankai University Tianjin 300350 China Haihe Lab of ITAI Tianjin 300459 China Institute of High Performance Computing (IHPC) Agency for Science Technology and Research (A*STAR) 138632 Singapore
Recently, large pre-trained models (LPM) have achieved great success, which provides rich feature representation for downstream tasks. Pre-training and then fine-tuning is an effective way to utilize LPM. However, the...
来源: 评论
PosFuzz:augmenting greybox fuzzing with effective position distribution
收藏 引用
Cybersecurity 2023年 第4期6卷 123-143页
作者: Yanyan Zou Wei Zou JiaCheng Zhao Nanyu Zhong Yu Zhang Ji Shi Wei Huo Institute of Information Engineering Chinese Academy of SciencesBeijingChina School of Cyber Security University of Chinese Academy of SciencesBeijingChina State Key Lab of Processors Institute of Computing TechnologyChinese Academy of SciencesBeijingChina Key Laboratory of Network Assessment Technology Chinese Academy of SciencesBeijingChina Beijing Key Laboratory of Network Security and Protection Technology BeijingChina Zhongguancun Laboratory BeijingChina
Mutation-based greybox fuzzing has been one of the most prevalent techniques for security vulnerability discovery and a great deal of research work has been proposed to improve both its efficiency and ***-based greybo... 详细信息
来源: 评论
A prior embedding-driven architecture for long distance blind iris recognition
收藏 引用
Biomedical Signal Processing and Control 2025年 109卷
作者: Qi Xiong Xinman Zhang Jun Shen International College Hunan University of Arts and Sciences Changde 415000 China School of Automation Science and Engineering Faculty of Electronic and Information Engineering MOE Key Lab for Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an 710049 Shaanxi China School of Computing and Information Technology University of Wollongong Wollongong NSW 2522 Australia
Blind iris images, caused by unknown degradation during the process of iris recognition at long distances, often lead to decreased iris recognition rates. Currently, limited literature addresses this issue. To tackle ... 详细信息
来源: 评论
Distributed energy balanced routing for wireless sensor network using energy prediction metric
Distributed energy balanced routing for wireless sensor netw...
收藏 引用
International Conference on Information Science and Control Engineering
作者: Quan Guo Xiaoying Song Liaoning Key Lab of Network Security and Computing Technology Dalian Neusoft Information Institute College of Computer Science and Engineering Northeastern University
A considerable amount of energy efficient routing algorithms have been proposed to save energy and prolong network lifetime. Those algorithms mainly focus on forwarding packets along the minimum energy path to the sin... 详细信息
来源: 评论
Energy-balanced clustering routing protocol based on task separation in wireless sensor networks
Energy-balanced clustering routing protocol based on task se...
收藏 引用
International Conference on BioMedical Engineering and Informatics (BMEI)
作者: Wei Sun Xiaoying Song Fasheng Wang Software Center Northeastern University Shenyang China Liaoning Key Lab of Network Security and Computing Technology Dalian Neusoft University Information Dalian China
Clustering protocol for data gathering is one of the effective ways to solve the energy hole problem in wireless sensor networks. However, most of the existing clustering protocols focus on the network model with unif... 详细信息
来源: 评论
Reversible Data Hiding Simultaneously Using Substitution of MSB and Compression of LSB of Encrypted Image  14
Reversible Data Hiding Simultaneously Using Substitution of ...
收藏 引用
14th International Conference on Digital Image Processing, ICDIP 2022
作者: Sui, Liansheng Liu, Jie Cheng, Ying Xiao, Zhaolin Tian, Ailing School of Computer Science and Engineering Xi’an University of Technology Xi’an710048 China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an710048 China Student’s Affairs Division Xi’an University of Technology Xi’an710048 China Shaanxi Province Key Lab of Thin Film Technology and Optical Test Xi’an Technological University Xi’an710048 China
With the development of privacy protection, reversible data hiding methods in encrypted image have drawn extensive research interest. Among them, a new method is proposed based on embedding prediction errors, i.e., EP... 详细信息
来源: 评论
AN ADULT SHORT MESSAGE RECOGNITION ALGORITHM BASED ON RESTRICTED CLOSE TEST OPTIMIZATION
AN ADULT SHORT MESSAGE RECOGNITION ALGORITHM BASED ON RESTRI...
收藏 引用
2008 International Conference on Machine Learning and Cybernetics(2008机器学习与控制论国际会议)
作者: QIN-DONG SUN XIN-BO HUANG JIU-LONG ZHANG Network Computing and Security Tech.Key Lab.of Shaanxi Province Xi'an University of Technology Xi' College of Electronics and Information Xi'an Polytechnic University Xi'an 710048 China Network Computing and Security Tech.Key Lab.of Shaanxi Province Xi'an University of Technology Xi'
The flooding of adult short message has become an urgent problem of safety of message content. Existing researches on short message filtering pay much attention to rubbish and advertising short messages, and the granu... 详细信息
来源: 评论
Linear (k, n) Secret Sharing Scheme with Cheating Detection
Linear (k, n) Secret Sharing Scheme with Cheating Detection
收藏 引用
International Conference on Computer and Information technology (CIT)
作者: Yan-xiao Liu Zhi-xiao Wang Wen-yao Yan Shaanxi Key Lab for Network Computing and Security Xian University of Technology Xian China Xian Innovation College Yanan University Xian China
Linear (k,n) secret sharing scheme is a class of (k,n) secret sharing, where all the n shares of a secret satisfy a linear relationship. It plays an important role in other cryptographic systems, such as multi-party c... 详细信息
来源: 评论
Addressing the energy hole problem based on heterogeneous clustering size for wireless sensor networks
收藏 引用
Journal of Computational Information Systems 2014年 第9期10卷 3973-3980页
作者: Song, Xiaoying Wen, Tao Guo, Quan Ma, Fengming Zhang, Dongqing Software Center Northeastern University Shenyang 110819 China Liaoning Key Lab. of Network Security and Computing Technology Dalian Neusoft Information Institute Dalian 116023 China School of Management Science Qufu Normal University Rizhao Shandong 276800 China
Clustering is one of the effective ways to solve energy hole problem for Wireless Sensor network. So far, the approaches of heterogeneous cluster size mainly have concentrated on the design of unequal cluster protocol... 详细信息
来源: 评论
Modeling for user interaction by influence transfer effect in online social networks
Modeling for user interaction by influence transfer effect i...
收藏 引用
Conference on Local Computer networks (LCN)
作者: Qindong Sun Nan Wang Yadong Zhou Hanqin Wang Liansheng Sui Shaanxi Key Laboratory of Network Computing and Security Xi'an University of Technology Xi'an China MOE KLINNS Lab Xi'an Jiaotong University Xi'an China
User interaction is one of the most important features of online social networks, and is the basis of research of user behavior analysis, information spreading model, etc. However, existing approaches focus on the int... 详细信息
来源: 评论