咨询与建议

限定检索结果

文献类型

  • 446 篇 期刊文献
  • 376 篇 会议
  • 4 册 图书

馆藏范围

  • 826 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 611 篇 工学
    • 460 篇 计算机科学与技术...
    • 382 篇 软件工程
    • 159 篇 信息与通信工程
    • 77 篇 控制科学与工程
    • 75 篇 电气工程
    • 68 篇 生物工程
    • 59 篇 电子科学与技术(可...
    • 45 篇 生物医学工程(可授...
    • 42 篇 网络空间安全
    • 41 篇 机械工程
    • 29 篇 光学工程
    • 24 篇 动力工程及工程热...
    • 21 篇 仪器科学与技术
    • 19 篇 化学工程与技术
    • 18 篇 安全科学与工程
  • 305 篇 理学
    • 176 篇 数学
    • 77 篇 生物学
    • 58 篇 物理学
    • 52 篇 统计学(可授理学、...
    • 36 篇 系统科学
    • 22 篇 化学
  • 158 篇 管理学
    • 96 篇 管理科学与工程(可...
    • 62 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 49 篇 医学
    • 44 篇 临床医学
    • 32 篇 基础医学(可授医学...
    • 18 篇 公共卫生与预防医...
    • 17 篇 药学(可授医学、理...
  • 33 篇 法学
    • 22 篇 社会学
  • 16 篇 经济学
    • 16 篇 应用经济学
  • 11 篇 军事学
  • 8 篇 教育学
  • 6 篇 农学
  • 3 篇 文学
  • 3 篇 艺术学

主题

  • 26 篇 authentication
  • 24 篇 deep learning
  • 23 篇 cryptography
  • 15 篇 internet of thin...
  • 14 篇 feature extracti...
  • 13 篇 security
  • 13 篇 training
  • 12 篇 image segmentati...
  • 12 篇 machine learning
  • 11 篇 blockchain
  • 10 篇 object detection
  • 10 篇 accuracy
  • 10 篇 cloud computing
  • 10 篇 privacy
  • 9 篇 computational mo...
  • 9 篇 protocols
  • 9 篇 federated learni...
  • 9 篇 encryption
  • 8 篇 security of data
  • 8 篇 optimization

机构

  • 26 篇 security enginee...
  • 20 篇 key lab of infor...
  • 18 篇 department of el...
  • 14 篇 state key labora...
  • 10 篇 department of co...
  • 10 篇 cyber security d...
  • 9 篇 guangxi key lab ...
  • 8 篇 department of in...
  • 8 篇 department of co...
  • 8 篇 computer network...
  • 8 篇 lab-sticc umr cn...
  • 8 篇 department of co...
  • 8 篇 department of in...
  • 8 篇 computer science...
  • 8 篇 key laboratory o...
  • 7 篇 peng cheng labor...
  • 7 篇 key lab. of netw...
  • 7 篇 riphah school of...
  • 7 篇 key lab of netwo...
  • 6 篇 royal stoke univ...

作者

  • 17 篇 walid el-shafai
  • 12 篇 el-shafai walid
  • 10 篇 naglaa f.soliman
  • 9 篇 zheng qinghua
  • 9 篇 tan zuowen
  • 8 篇 el-samie fathi e...
  • 8 篇 yang jian
  • 8 篇 meng deyu
  • 8 篇 muhammad adnan k...
  • 8 篇 taher m.ghazal
  • 7 篇 zhang lei
  • 7 篇 wang wei
  • 7 篇 hu yupu
  • 7 篇 abeer d.algarni
  • 7 篇 pais alwyn r.
  • 6 篇 li yang
  • 6 篇 quist-aphetsi ke...
  • 6 篇 xiaohong guan
  • 6 篇 sagheer abbas
  • 6 篇 nana laurent

语言

  • 739 篇 英文
  • 67 篇 其他
  • 21 篇 中文
检索条件"机构=Network & Information Security Lab. Department of Computer Science and Technology"
826 条 记 录,以下是61-70 订阅
排序:
Intelligent Model to Predict Early Liver Disease using Machine Learning Technique
Intelligent Model to Predict Early Liver Disease using Machi...
收藏 引用
2022 International Conference on Business Analytics for technology and security, ICBATS 2022
作者: Ghazal, Taher M. Rehman, Aziz Ur Saleem, Muhammad Ahmad, Munir Ahmad, Shabir Mehmood, Faisal Faculty of Information Science and Technology Ukm Network and Communication Technology Lab Center for Cyber Security Malaysia School of Computer Science NCBAandE Lahore Pakistan Gachon University Department of Computer Engineering Korea Republic of Gachon University Department of It Convergence Engineering Korea Republic of
Liver Disease (LD) is the main cause of death worldwide, affecting a large number of people. A variety of factors affect the liver, resulting in this disease. The diagnosis of this condition is both expensive and time... 详细信息
来源: 评论
Improving Method of Anomaly Detection Performance for Industrial IoT Environment
收藏 引用
computers, Materials & Continua 2022年 第9期72卷 5377-5394页
作者: Junwon Kim Jiho Shin Ki-Woong Park Jung Taek Seo Department of Information Security Engineering Gachon UniversitySeongnam13120Korea Police Science Institute Korea National Police UniversityAsan31539Korea SysCore Lab. Sejong UniversitySeoul05006Korea Department of Computer Engineering Gachon UniversitySeongnam13120Korea
Industrial Control System(ICS),which is based on Industrial IoT(IIoT),has an intelligent mobile environment that supports various mobility,but there is a limit to relying only on the physical security of the ICS *** t... 详细信息
来源: 评论
Uplink Control information Based Clustered Access and Discontinuous Reception Management for mMTC
收藏 引用
IEEE Communications Letters 2025年 第6期29卷 1380-1384页
作者: Wang, Shao-Di Wang, Chang-Long Wang, Hui-Ming Zhou, Feng Leung, Victor C. M. Xidian University Key Laboratory of Electronic Information Countermeasure and Simulation Technology of Ministry of Education Xi’an710071 China Xi’an Jiaotong University School of Information and Communication Engineering Ministry of Education Key Lab for Intelligent Networks and Network Security Xi’an710049 China Shenzhen MSU BIT University Artificial Intelligence Research Institute Shenzhen518172 China Shenzhen University College of Computer Science and Software Engineering Shenzhen518060 China The University of British Columbia Department of Electrical and Computer Engineering VancouverBCV6T 1Z4 Canada
Uplink control information (UCI) and discontinuous reception (DRX) play important roles for massive machine type communication (mMTC). Despite their standalone significance, a conspicuous gap exists in comprehensively... 详细信息
来源: 评论
On the MDS Condition of Generalized Expanded-Blaum-Roth Codes  18
On the MDS Condition of Generalized Expanded-Blaum-Roth Code...
收藏 引用
18th International Symposium on Problems of Redundancy in information and Control Systems, REDUNDANCY 2023
作者: Hou, Hanxu Song, Linqi Dongguan University of Technology Dongguan Key Lab of Artificial Information Network School of Electrical Engineering & Intelligentization China City University of Hong Kong Department of Computer Science Hong Kong
Generalized Expanded-Blaum-Roth (GEBR) codes [You et al. 2020] are designed for large-scale distributed storage systems that have larger recoverability for single-symbol failures, multi-column failures and multi-row f... 详细信息
来源: 评论
Triple-Fault-Tolerant Binary MDS Array Codes with Lower Encoding Complexity  18
Triple-Fault-Tolerant Binary MDS Array Codes with Lower Enco...
收藏 引用
18th International Symposium on Problems of Redundancy in information and Control Systems, REDUNDANCY 2023
作者: Hou, Hanxu Song, Linqi Dongguan University of Technology Dongguan Key Lab of Artificial Information Network School of Electrical Engineering & Intelligentization China City University of Hong Kong Department of Computer Science Hong Kong
In this paper, we present a new construction of maximal distance separable (MDS) array codes with three parity columns. We present an efficient encoding algorithm for our new codes and show that our new codes have low... 详细信息
来源: 评论
A multiple sensitive attributes data publishing method with guaranteed information utility
收藏 引用
CAAI Transactions on Intelligence technology 2023年 第2期8卷 288-296页
作者: Haibin Zhu Tong Yi Songtao Shang Minyong Shi Zhucheng Li Wenqian Shang Department of Computer Science and Mathematics Nipissing UniversityNorth BayOntarioCanada Key Lab of Education Blockchain and Intelligent Technology Ministry of EducationGuangxi Normal UniversityGuilinChina Guangxi Key Lab of Multi‐Source Information Mining and Security Guangxi Normal UniversityGuilinChina School of Computer and Communication Engineering Zhengzhou University of Light IndustryZhengzhouChina School of Computer Science Communication University of ChinaBeijingChina Business College Beijing Union UniversityBeijingChina
Data publishing methods can provide availab.e information for analysis while preserving *** multiple sensitive attributes data publishing,which preserves the relationship between sensitive attributes,may keep many rec... 详细信息
来源: 评论
Multi-Classification Segmentation Method of Gastric Cancer Pathological Images Based on Deep Learning
Multi-Classification Segmentation Method of Gastric Cancer P...
收藏 引用
2024 lEEE International Conference on Advanced information, Mechanical Engineering, Robotics and Automation, AIMERA 2024
作者: Zhou, Hehu Pan, Jingshan Na, Li Ding, Qingyan Zhou, Chengjun Du, Wantong Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China The Second Hospital of Shandong University Department of Pathology Jinan China
Gastric cancer is a serious health threat, and pathological imaging is important in detecting it. These images can assist doctors in accurately determining the location of the cancer, thereby providing an important re... 详细信息
来源: 评论
Efficient Federated Learning Using Dynamic Update and Adaptive Pruning with Momentum on Shared Server Data
收藏 引用
ACM Transactions on Intelligent Systems and technology 2024年 第6期15卷 1-28页
作者: Liu, Ji Jia, Juncheng Zhang, Hong Yun, Yuhui Wang, Leye Zhou, Yang Dai, Huaiyu Dou, Dejing Hithink RoyalFlush Information Network Co. Ltd. Hangzhou China School of Computer Science and Technology Soochow University Suzhou China Collaborative Innovation Center of Novel Software Technology and Industrialization Nanjing China Baidu Research Beijing China Key Lab of High Confidence Software Technologies Ministry of Education and Software Institute Peking University Beijing China Department of Computer Science and Software Engineering Auburn University AuburnAL United States Department of Electrical and Computer Engineering North Carolina State University RaleighNC United States Bedi Cloud and School of Computer Science Fudan University Beijing China
Despite achieving remarkable performance, Federated Learning (FL) encounters two important problems, i.e., low training efficiency and limited computational resources. In this article, we propose a new FL framework, i... 详细信息
来源: 评论
ICSGD-Momentum: SGD Momentum based on Inter-gradient Collision  22
ICSGD-Momentum: SGD Momentum based on Inter-gradient Collisi...
收藏 引用
22nd IEEE International Conference on Industrial Informatics, INDIN 2024
作者: Zou, Weidong Cao, Weipeng Xia, Yuanqing Zhong, Bineng Li, Dachuan School of Automation Beijing Institute of Technology Beijing China Shenzhen China Guangxi Key Lab of Multi-source Information Mining & Security Guangxi Normal University Guilin China Research Institute of Trustworthy Autonomous Systems Southern University of Science and Technology Shenzhen China Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen China
Deep neural networks (DNNs) are widely used in fields like computer vision and natural language processing. A key component of DNN training is the optimizer. SGD-Momentum is popular in many DNN methodologies, such as ... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities  24
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
44th ACM/IEEE International Conference on Software Engineering, ICSE 2024
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hong Kong Jin YinHu Laboratory Wuhan China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China University of Colorado Colorado Springs Department of Computer Science Colorado Springs Colorado United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论