咨询与建议

限定检索结果

文献类型

  • 30 篇 期刊文献
  • 12 篇 会议

馆藏范围

  • 42 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 29 篇 工学
    • 27 篇 计算机科学与技术...
    • 24 篇 软件工程
    • 12 篇 信息与通信工程
    • 6 篇 生物工程
    • 4 篇 电气工程
    • 2 篇 光学工程
    • 2 篇 动力工程及工程热...
    • 2 篇 电子科学与技术(可...
    • 2 篇 控制科学与工程
    • 2 篇 生物医学工程(可授...
    • 1 篇 仪器科学与技术
  • 15 篇 理学
    • 9 篇 数学
    • 6 篇 生物学
    • 3 篇 统计学(可授理学、...
    • 2 篇 物理学
    • 2 篇 系统科学
  • 4 篇 管理学
    • 3 篇 管理科学与工程(可...
    • 1 篇 工商管理
    • 1 篇 图书情报与档案管...
  • 3 篇 医学
    • 2 篇 临床医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 药学(可授医学、理...
    • 1 篇 特种医学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 4 篇 deep learning
  • 3 篇 wireless sensor ...
  • 3 篇 open source soft...
  • 1 篇 conferences
  • 1 篇 content security
  • 1 篇 learning systems
  • 1 篇 scalability
  • 1 篇 head
  • 1 篇 routing
  • 1 篇 reinforcement le...
  • 1 篇 semantic segment...
  • 1 篇 service function...
  • 1 篇 deep neural netw...
  • 1 篇 flow graphs
  • 1 篇 generative adver...
  • 1 篇 weakly supervise...
  • 1 篇 graph pointer ne...
  • 1 篇 information rate...
  • 1 篇 prototypes
  • 1 篇 software enginee...

机构

  • 3 篇 institute for ne...
  • 3 篇 school of comput...
  • 3 篇 school of cyber ...
  • 3 篇 school of comput...
  • 3 篇 network computin...
  • 2 篇 jin yinhu labora...
  • 2 篇 shaanxi key labo...
  • 2 篇 school of comput...
  • 2 篇 school of comput...
  • 2 篇 international co...
  • 2 篇 software center ...
  • 2 篇 institute of hig...
  • 2 篇 haihe lab of ita...
  • 2 篇 school of comput...
  • 2 篇 national enginee...
  • 2 篇 school of comput...
  • 2 篇 shaanxi key labo...
  • 2 篇 school of mathem...
  • 2 篇 zhejiang lab
  • 2 篇 department of co...

作者

  • 5 篇 wang qian
  • 5 篇 meng deyu
  • 5 篇 sun qindong
  • 4 篇 zhang lei
  • 4 篇 shen yulong
  • 4 篇 dong xuewen
  • 3 篇 wan zhiguo
  • 3 篇 lu di
  • 3 篇 yang lingxiao
  • 3 篇 zuo wangmeng
  • 3 篇 xia feng
  • 3 篇 yong hongwei
  • 2 篇 zhang chao
  • 2 篇 guo quan
  • 2 篇 li zhen
  • 2 篇 yan xiaoran
  • 2 篇 li tao
  • 2 篇 xu shouhuai
  • 2 篇 xiaoying song
  • 2 篇 zou deqing

语言

  • 36 篇 英文
  • 6 篇 其他
检索条件"机构=Liaoning Key Lab of Network Security and Computing Technology"
42 条 记 录,以下是31-40 订阅
排序:
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
arXiv
收藏 引用
arXiv 2024年
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado SpringsCO United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab China JinYinHu Laboratory Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Zhen Li Ning Wang Deqing Zou Yating Li Ruqian Zhang Shouhuai Xu Chao Zhang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jin YinHu Laboratory Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado Springs Colorado USA Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
MedSteGAN: Medical Embedding-Optimized Steganography with Improved GAN
SSRN
收藏 引用
SSRN 2023年
作者: Peng, Yuxiang Fu, Chong Zheng, Yu Tian, Yunjia Cao, Guixing Chen, Junxin School of Computer Science and Engineering Northeastern University Liaoning Shenyang110819 China Engineering Research Center of Security Technology of Complex Network System Ministry of Education China Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Northeastern University Liaoning Shenyang110819 China Department of Information Engineering The Chinese University of Hong Kong Ma Liu Shui Shatin New Territories Hong Kong Institute of Telecommunication Satellite China Academy of Space Technology Beijing100094 China School of Software Dalian University of Technology Liaoning Dalian116621 China
Medical diagnosing systems contain sensitive information, especially the resulting certificate of diagnosis that involves the patient’s privacy, required to be protected carefully. An effective way is to secretly emb... 详细信息
来源: 评论
Active self-paced learning for cost-effective and progressive face identification
arXiv
收藏 引用
arXiv 2017年
作者: Lin, Liang Wang, Keze Meng, Deyu Zuo, Wangmeng Zhang, Lei School of Data and Computer Science Sun Yat-sen University Guangzhou China Engineering Research Center Advanced Computing Engineering Software of Ministry of Education China School of Mathematics and Statistics Ministry of Education Key Lab of Intelligent Networks and Network Security Xi'an Jiaotong University China School of Computer Science and Technology Harbin Institute of Technology Harbin China Dept. of Computing Hong Kong Polytechnic University Hong Kong
This paper aims to develop a novel cost-effective framework for face identification, which progressively maintains a batch of classifiers with the increasing face images of different individuals. By naturally combinin... 详细信息
来源: 评论
A Prior Embedding-Driven Architecture for Long Distance Blind Iris Recognition
arXiv
收藏 引用
arXiv 2024年
作者: Xiong, Qi Zhang, Xinman Shen, Jun International College Hunan University of Arts and Sciences Changde415000 China School of Automation Science and Engineering Faculty of Electronic and Information Engineering MOE Key Lab for Intelligent Networks and Network Security Xi'an Jiaotong University Shaanxi Xi'An710049 China School of Computing and Information Technology University of Wollongong WollongongNSW2522 Australia
Blind iris images, which result from unknown degradation during the process of iris recognition at long distances, often lead to decreased iris recognition rates. Currently, little existing literature offers a solutio... 详细信息
来源: 评论
Investigating Bi-level optimization for learning and vision from a unified perspective: A survey and beyond
arXiv
收藏 引用
arXiv 2021年
作者: Liu, Risheng Gao, Jiaxin Zhang, Jin Meng, Deyu Lin, Zhouchen DUT-RU International School of Information Science & Engineering Dalian University of Technology Key Laboratory for Ubiquitous Network Service Software of Liaoning Province Dalian116024 China Department of Mathematics Southern University of Science and Technology National Center for Applied Mathematics Shenzhen China School of Mathematics and Statistics Ministry of Education Key Lab of Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an Shaanxi China School of Electronics Engineering and Computer Science Peking University Beijing100871 China Cooperative Medianet Innovation Center Shanghai Jiao Tong University Shanghai200240 China
Bi-Level Optimization (BLO) is originated from the area of economic game theory and then introduced into the optimization community. BLO is able to handle problems with a hierarchical structure, involving two levels o... 详细信息
来源: 评论
Deep Variational network Toward Blind Image Restoration
arXiv
收藏 引用
arXiv 2020年
作者: Yue, Zongsheng Yong, Hongwei Zhao, Qian Zhang, Lei Meng, Deyu Wong, Kwan-Yee K. The School of Mathematics and Statistics Xi’an Jiaotong University Xi’an China The Department of Computer Science The University of Hong Kong Hong Kong The Department of Computing The Hong Kong Polytechnic University Hong Kong The School of Mathematics and Statistics Ministry of Education Key Lab of Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an China The Macau Institute of Systems Engineering Macau University of Science and Technology Taipa China
Blind image restoration (IR) is a common yet challenging problem in computer vision. Classical model-based methods and recent deep learning (DL)-based methods represent two different methodologies for this problem, ea... 详细信息
来源: 评论
Graduate employment prediction with bias
arXiv
收藏 引用
arXiv 2019年
作者: Guo, Teng Xia, Feng Zhen, Shihao Bai, Xiaomei Zhang, Dongyu Liu, Zitao Tang, Jiliang Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province Dalian University of Technology Dalian116620 China School of Science Engineering and Information Technology Federation University Australia BallaratVIC3353 Australia Computing Center Anshan Normal University Anshan114007 China TAL AI Lab TAL Education Group Beijing100080 China Department of Computer Science and Engineering Michigan State University East LansingMI48824 United States
The failure of landing a job for college students could cause serious social consequences such as drunkenness and suicide. In addition to academic performance, unconscious biases can become one key obstacle for huntin... 详细信息
来源: 评论
AsyncSC: An Asynchronous Sidechain for Multi-Domain Data Exchange in Internet of Things
arXiv
收藏 引用
arXiv 2024年
作者: Yang, Lingxiao Dong, Xuewen Wan, Zhiguo Gao, Sheng Tong, Wei Lu, Di Shen, Yulong Du, Xiaojiang The School of Computer Science and Technology Xidian University The Engineering Research Center of Blockchain Technology Application and Evaluation Ministry of Education China The Shaanxi Key Laboratory of Blockchain and Secure Computing Xi'An710071 China The Zhejiang Lab Hangzhou311121 China The School of Information Central University of Finance and Economics Beijing100081 China The School of Information Science and Engineering Zhejiang Sci-Tech University Hangzhou310018 China The School of Computer Science and Technology Xidian University China The Shaanxi Key Laboratory of Network and System Security Xi'An710071 China The School of Engineering and Science Stevens Institute of Technology Hoboken07030 United States
Sidechain techniques improve blockchain scalability and interoperability, providing decentralized exchange and cross-chain collaboration solutions for Internet of Things (IoT) data across various domains. However, cur...
来源: 评论
Dynamics and Resonance Fluorescence from a Superconducting Artificial Atom Doubly Driven by Quantized and Classical Fields
arXiv
收藏 引用
arXiv 2024年
作者: Ruan, Xinhui Wang, Jia-Heng He, Dong Song, Pengtao Li, Shengyong Zhao, Qianchuan Kuang, L.M. Tsai, Jaw-Shen Zou, Chang-Ling Zhang, Jing Zheng, Dongning Astafiev, O.V. Liu, Yu-Xi Peng, Zhihui Department of Automation Tsinghua University Beijing100084 China Key Laboratory of Low-Dimensional Quantum Structures and Quantum Control of Ministry of Education Department of Physics and Synergetic Innovation Center of Quantum Effects and Applications Hunan Normal University Changsha410081 China School of Integrated Circuits Tsinghua University Beijing100084 China Institute of Physics Chinese Academy of Sciences Beijing100190 China School of Physical Sciences University of Chinese Academy of Sciences Beijing100190 China Center for Quantum Computing RIKEN Saitama351-0198 Japan Graduate School of Science Tokyo University of Science 1-3 Kagurazaka Shinjuku Tokyo162-0825 Japan CAS Key Laboratory of Quantum Information University of Science and Technology of China Hefei Anhui230026 China Hefei National Laboratory Hefei230088 China School of Automation Science and Engineering Xi'an Jiaotong University Xi’an710049 China MOE Key Lab for Intelligent Networks and Network Security Xi'an Jiaotong University Xi’an710049 China Skolkovo Institute of Science and Technology Nobel str. 3 Moscow143026 Russia Moscow Institute of Physics and Technology Institutskiy Pereulok 9 Dolgoprudny141701 Russia Royal Holloway University of London Surrey EghamTW20 0EX United Kingdom
We report an experimental demonstration of resonance fluorescence in a two-level superconducting artificial atom under two driving fields coupled to a detuned cavity. One of the fields is classical and the other is va... 详细信息
来源: 评论