咨询与建议

限定检索结果

文献类型

  • 99 篇 会议
  • 63 篇 期刊文献

馆藏范围

  • 162 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 110 篇 工学
    • 51 篇 计算机科学与技术...
    • 48 篇 软件工程
    • 36 篇 信息与通信工程
    • 22 篇 控制科学与工程
    • 16 篇 生物工程
    • 13 篇 电子科学与技术(可...
    • 13 篇 生物医学工程(可授...
    • 11 篇 机械工程
    • 11 篇 电气工程
    • 5 篇 光学工程
    • 5 篇 仪器科学与技术
    • 4 篇 化学工程与技术
    • 4 篇 网络空间安全
    • 3 篇 动力工程及工程热...
    • 3 篇 交通运输工程
    • 2 篇 材料科学与工程(可...
    • 2 篇 建筑学
    • 2 篇 石油与天然气工程
  • 58 篇 理学
    • 23 篇 数学
    • 18 篇 系统科学
    • 17 篇 生物学
    • 11 篇 物理学
    • 8 篇 统计学(可授理学、...
    • 4 篇 化学
  • 24 篇 管理学
    • 14 篇 管理科学与工程(可...
    • 10 篇 图书情报与档案管...
  • 5 篇 医学
    • 4 篇 临床医学
  • 4 篇 法学
    • 2 篇 法学
    • 2 篇 社会学
  • 2 篇 农学
    • 2 篇 作物学
  • 1 篇 经济学
  • 1 篇 历史学
  • 1 篇 艺术学

主题

  • 14 篇 feature extracti...
  • 6 篇 security
  • 5 篇 ip networks
  • 4 篇 model predictive...
  • 4 篇 deep learning
  • 4 篇 databases
  • 4 篇 machine learning
  • 3 篇 learning systems
  • 3 篇 reinforcement le...
  • 3 篇 support vector m...
  • 3 篇 frequency synchr...
  • 3 篇 smart grids
  • 3 篇 neural networks
  • 3 篇 radio transceive...
  • 3 篇 educational inst...
  • 3 篇 noise
  • 3 篇 monitoring
  • 3 篇 wireless sensor ...
  • 3 篇 speech recogniti...
  • 3 篇 uncertain system...

机构

  • 33 篇 moe key lab for ...
  • 10 篇 moe key lab for ...
  • 8 篇 school of electr...
  • 8 篇 xi'an jiaotong u...
  • 7 篇 school of automa...
  • 7 篇 school of comput...
  • 7 篇 guangdong xi'an ...
  • 6 篇 department of au...
  • 6 篇 school of electr...
  • 6 篇 genome institute...
  • 5 篇 faculty of elect...
  • 5 篇 moe key lab for ...
  • 5 篇 school of automa...
  • 4 篇 ministry of educ...
  • 4 篇 moe key lab for ...
  • 4 篇 department of au...
  • 4 篇 school of automa...
  • 4 篇 moe key laborato...
  • 4 篇 huawei noah's ar...
  • 4 篇 school of automa...

作者

  • 18 篇 guan xiaohong
  • 14 篇 xiaohong guan
  • 13 篇 kai ye
  • 12 篇 xinman zhang
  • 11 篇 qingyu yang
  • 10 篇 zhang weile
  • 10 篇 wang pinghui
  • 10 篇 tao qin
  • 9 篇 xiaofei yang
  • 9 篇 xuebin xu
  • 8 篇 ma xiaobo
  • 8 篇 zhang xinman
  • 7 篇 weile zhang
  • 7 篇 qinye yin
  • 7 篇 dou an
  • 6 篇 wenjie wang
  • 6 篇 zhao junzhou
  • 5 篇 gao feifei
  • 5 篇 tao jing
  • 5 篇 peng jia

语言

  • 153 篇 英文
  • 5 篇 中文
  • 4 篇 其他
检索条件"机构=MOE Key Lab for Intelligent Networks&Networks Security"
162 条 记 录,以下是1-10 订阅
排序:
OACR2: Online Admission Control and Resource Reservation for 5G Slice networks With Deep Reinforcement Learning
收藏 引用
IEEE Transactions on Mobile Computing 2025年
作者: Li, Fang Hao, Yijun Yang, Shusen Zhao, Peng China China Xi'an Jiaotong University Ministry of Education Key Lab for Intelligent Networks and Network Security MOE KLINNS Lab China
Network slicing architecture is expected to fulfill network applications with heterogeneous requirements through efficient slice admission control (SAC) policies. Existing SAC approaches entirely rely on current limit... 详细信息
来源: 评论
Poisoning Attacks and Defenses to Learned Bloom Filters for Malicious URL Detection
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Dong, Fangming Wang, Pinghui Li, Rundong Cui, Xueyao Zhao, Junzhou Tao, Jing Zhang, Chen Guan, Xiaohong Zhejiang CreateLink Technology Co. Ltd Guangdong Guangzhou China Xi'an Jiaotong University MOE Key Laboratory for Intelligent Networks and Network Security Shaanxi Xi'an710049 China Tsinghua University Center for Intelligent and Networked Systems Tsinghua National Lab for Information Science and Technology Beijing China
Approximate membership query (AMQ) structures represented by the Bloom Filter and its variants have been popularly researched in recent years. Researchers have recently combined machine learning with this type of stru... 详细信息
来源: 评论
Autonomy on intelligent home network
收藏 引用
Information Technology Journal 2010年 第2期9卷 282-289页
作者: Liu, Liguo MOE Key Lab. for Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an 710049 China
Autonomy is an effective approach to cracking some hard nuts in an intelligent system. In this study on intelligent home network, the focus is placed on the implementation of autonomy of a device. For this reason, som... 详细信息
来源: 评论
Robust Quantum Control using Reinforcement Learning from Demonstration
arXiv
收藏 引用
arXiv 2025年
作者: Li, Shengyong Fan, Yidian Li, Xiang Ruan, Xinhui Zhao, Qianchuan Peng, Zhihui Wu, Re-Bing Zhang, Jing Song, Pengtao Department of Automation Tsinghua University Beijing100084 China Institute of Physics Chinese Academy of Sciences Beijing100190 China Department of Physics Synergetic Innovation Center for Quantum Effects and Applications Hunan Normal University Changsha410081 China School of Automation Science and Engineering Xi’an Jiaotong University Xi’an710049 China MOE Key Lab for Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an710049 China
Quantum control requires high-precision and robust control pulses to ensure optimal system performance. However, control sequences generated with a system model may suffer from model bias, leading to low fidelity. Whi... 详细信息
来源: 评论
AOD estimation in WSN localization system with synthetic aperture technique
收藏 引用
Science China(Information Sciences) 2012年 第10期55卷 2216-2225页
作者: WANG WenJie,YAO BoBin & YIN QinYe moe key lab for intelligent networks and Network security,School of Electronic and Information Engineering,Xi’an Jiaotong University,Xi’an 710049,China 1. MOE Key Lab for Intelligent Networks and Network Security School of Electronic and Information Engineering Xi’an Jiaotong University Xi’an 710049 China
Angel of departure(AOD) based distributed localization scheme in wireless sensor networks allows the single antenna sensor node to estimate its own AOD information by an equivalent antenna array for further position *... 详细信息
来源: 评论
Exploiting Bitcoin Mining Pool for Stealthy and Flexible Botnet Channels  8
Exploiting Bitcoin Mining Pool for Stealthy and Flexible Bot...
收藏 引用
8th International Conference on Dependable Systems and Their Applications, DSA 2021
作者: Pan, Pengyu Ma, Xiaobo Bian, Huafeng Xi'an Jiaotong University MOE Key Lab for Intelligent Networks and Network Security Xi'an China
Botnets are used by hackers to conduct cyber attacks and pose a huge threat to Internet users. The key of botnets is the command and control (CC) channels. security researchers can keep track of a botnet by capturing ... 详细信息
来源: 评论
Effectively and Efficiently Defending Shadowsocks against Website Fingerprinting Attacks  8
Effectively and Efficiently Defending Shadowsocks against We...
收藏 引用
8th International Conference on Dependable Systems and Their Applications, DSA 2021
作者: Huang, Shuangshuang Ma, Xiaobo Bian, Huafeng Xi'an Jiaotong University MOE Key Lab for Intelligent Networks and Network Security Xi'an China
Shadowsocks is one of the most popular encryption proxies. It is designed with few defense methods against website fingerprinting attack (WFP). WFP can identify user accessed websites by analyzing Shadowsocks traffic.... 详细信息
来源: 评论
A Link Flooding Attack Detection Method based on Non-Cooperative Active Measurement  8
A Link Flooding Attack Detection Method based on Non-Coopera...
收藏 引用
8th International Conference on Dependable Systems and Their Applications, DSA 2021
作者: Wang, Xin Ma, Xiaobo Qu, Jian Xi'an Jiaotong University MOE Key Lab for Intelligent Networks and Network Security Xi'an China
In recent years, a new type of DDoS attacks against backbone routing links have appeared. They paralyze the communication network of a large area by directly congesting the key routing links concerning the network acc... 详细信息
来源: 评论
On the Performance Evaluation of Congestion Control Algorithms against DDoS Attacks  8
On the Performance Evaluation of Congestion Control Algorith...
收藏 引用
8th International Conference on Dependable Systems and Their Applications, DSA 2021
作者: Bian, Huafeng Ma, Xiaobo Pan, Pengyu Xi'an Jiaotong University MOE Key Lab for Intelligent Networks and Network Security Xi'an China
DoS attacks are currently one of the main security issues threatening the Internet. The harm caused by DDoS attacks and effective countermeasures have been research hot topics in the field of network security. However... 详细信息
来源: 评论
In-depth measurement and analysis on densification power law of software execution  5
In-depth measurement and analysis on densification power law...
收藏 引用
5th International Workshop on Emerging Trends in Software Metrics, WETSoM 2014
作者: Qu, Yu Zheng, Qinghua Liu, Ting Li, Jian Guan, Xiaohong MOE Key Lab for Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an China
Measuring software execution is important for many software engineering tasks. In this paper, Densification Power Law (DPL) of software execution is measured and studied as a feature of growing software complexity. De... 详细信息
来源: 评论