咨询与建议

限定检索结果

文献类型

  • 154 篇 会议
  • 113 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 268 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 193 篇 工学
    • 153 篇 计算机科学与技术...
    • 128 篇 软件工程
    • 43 篇 信息与通信工程
    • 24 篇 控制科学与工程
    • 21 篇 网络空间安全
    • 19 篇 电气工程
    • 16 篇 电子科学与技术(可...
    • 12 篇 生物工程
    • 11 篇 机械工程
    • 9 篇 生物医学工程(可授...
    • 6 篇 交通运输工程
    • 5 篇 仪器科学与技术
    • 4 篇 光学工程
    • 4 篇 化学工程与技术
    • 4 篇 安全科学与工程
  • 85 篇 理学
    • 55 篇 数学
    • 15 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 13 篇 生物学
    • 10 篇 系统科学
    • 5 篇 化学
  • 45 篇 管理学
    • 28 篇 管理科学与工程(可...
    • 18 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 10 篇 法学
    • 6 篇 社会学
    • 4 篇 法学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 8 篇 医学
    • 7 篇 临床医学
    • 6 篇 基础医学(可授医学...
    • 5 篇 药学(可授医学、理...
  • 4 篇 军事学
  • 2 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 17 篇 authentication
  • 12 篇 cryptography
  • 8 篇 deep learning
  • 8 篇 security
  • 8 篇 cloud computing
  • 6 篇 protocols
  • 6 篇 training
  • 5 篇 feature extracti...
  • 5 篇 malware
  • 4 篇 internet of thin...
  • 4 篇 access control
  • 4 篇 reinforcement le...
  • 4 篇 optimization
  • 4 篇 servers
  • 4 篇 internet
  • 4 篇 computers
  • 4 篇 semantics
  • 4 篇 blockchain
  • 4 篇 peer to peer net...
  • 4 篇 trusted computin...

机构

  • 21 篇 key lab of infor...
  • 7 篇 key lab of netwo...
  • 6 篇 guangxi key labo...
  • 6 篇 national compute...
  • 5 篇 network informat...
  • 5 篇 computer departm...
  • 5 篇 institute of inf...
  • 5 篇 key lab. of comp...
  • 4 篇 ministry of edu....
  • 4 篇 key lab. of comp...
  • 4 篇 hebei provincial...
  • 4 篇 key lab of netwo...
  • 4 篇 college of compu...
  • 4 篇 college of mathe...
  • 4 篇 national languag...
  • 4 篇 national compute...
  • 4 篇 school of cyber ...
  • 4 篇 hubei provincial...
  • 4 篇 school of comput...
  • 4 篇 key laboratory o...

作者

  • 9 篇 meng deyu
  • 9 篇 tan zuowen
  • 9 篇 li hui
  • 7 篇 cao xiangyong
  • 6 篇 lopez javier
  • 5 篇 zhang yuqing
  • 5 篇 wang fangwei
  • 5 篇 javier lopez
  • 5 篇 feng yu
  • 5 篇 sun jin
  • 4 篇 fan kai
  • 4 篇 yong-zhen li
  • 4 篇 weizhong zhao
  • 4 篇 yong zhao
  • 4 篇 ma wenping
  • 4 篇 tingting he
  • 4 篇 wang yue
  • 4 篇 hu yupu
  • 4 篇 xingpeng jiang
  • 4 篇 hu yu-pu

语言

  • 247 篇 英文
  • 15 篇 中文
  • 6 篇 其他
检索条件"机构=Network Information and Computer Security Lab"
268 条 记 录,以下是51-60 订阅
排序:
CRS-Diff: Controllable Remote Sensing Image Generation with Diffusion Model
arXiv
收藏 引用
arXiv 2024年
作者: Tang, Datao Cao, Xiangyong Hou, Xingsong Jiang, Zhongyuan Liu, Junmin Meng, Deyu The School of Computer Science and Technology the Ministry of Education Key Lab for Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an710049 China The School of Information and Communications Engineering Xi’an Jiaotong University Shaanxi Xi’an710049 China The School of Cyber Engineering Xidian University Shaanxi Xi’an710049 China The School of Mathematics and Statistics the Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi’an Jiaotong University Shaanxi Xi’an710049 China Guangdong Guangzhou510555 China
The emergence of generative models has revolutionized the field of remote sensing (RS) image generation. Despite generating high-quality images, existing methods are limited in relying mainly on text control condition... 详细信息
来源: 评论
A Feature-Based Detection System of Adversarial Sample Attack  3rd
A Feature-Based Detection System of Adversarial Sample Attac...
收藏 引用
3rd International Conference on Machine Learning for Cyber security, ML4CS 2020
作者: Wang, Fangwei Lu, Yuanyuan Li, Qingru Wang, Changguang Lab of Network and Information Security of Hebei Province Hebei Normal University Shijiazhuang050024 China College of Computer and Cyber Security Hebei Normal University Shijiazhuang050024 China
With the increase of malware, traditional malicious detection methods are not suitable to high-intensity detection work. In response to this question, many malware detection methods based on Machine Learning (ML-based... 详细信息
来源: 评论
Improving Complex Knowledge Base Question Answering with Relation-Aware Subgraph Retrieval and Reasoning network
Improving Complex Knowledge Base Question Answering with Rel...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Dan Luo Jiawei Sheng Hongbo Xu Lihong Wang Bin Wang Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Xiaomi AI Lab Beijing China National Computer Network Emergency Response Technical Team Coordination Center of China Beijing China
Complex Knowledge Base Question Answering aims to answer a complex question over a Knowledge Base. A mainstream solution is based on information retrieval, which usually extracts a pivotal subgraph from entire Knowled...
来源: 评论
A Novel Intrusion Detection System for Malware Based on Time-Series Meta-learning  1
收藏 引用
3rd International Conference on Machine Learning for Cyber security, ML4CS 2020
作者: Wang, Fangwei Yang, Shaojie Wang, Changguang Li, Qingru Lab of Network and Information Security of Hebei Province Hebei Normal University Shijiazhuang050024 China College of Computer and Cyber Security Hebei Normal University Shijiazhuang050024 China
In recent years, frequent occurrence of network security incidents indicates that host security is more and more fragile. However, current protection tools leads to reduce the efficiency of CPU or GPU. Meanwhile, they... 详细信息
来源: 评论
Attribute-Consistent Knowledge Graph Representation Learning for Multi-Modal Entity Alignment
arXiv
收藏 引用
arXiv 2023年
作者: Li, Qian Guo, Shu Luo, Yangyifei Ji, Cheng Wang, Lihong Sheng, Jiawei Li, Jianxin School of Computer Science and Engineering BDBC Beihang University Beijing China National Computer Network Emergency Response Technical Team Coordination Center of China Beijing China Institute of Information Engineering Chinese Academy of Sciences School of Cyber Security UCAS Beijing China SCSE Beihang University Zhongguancun Lab Beijing China
The multi-modal entity alignment (MMEA) aims to find all equivalent entity pairs between multi-modal knowledge graphs (MMKGs). Rich attributes and neighboring entities are valuable for the alignment task, but existing... 详细信息
来源: 评论
VFGCN: A Vertical Federated Learning Framework With Privacy Preserving for Graph Convolutional network
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Wang, Gang Li, Qingming Liu, Ximeng Yan, Xiaoran Dong, Qingkuan Wu, Huiwen Kong, Xiangjie Zhou, Li Zhejiang Lab HangZhou310000 China Zhejiang University College of Computer Science and Technology Hangzhou310058 China Fuzhou University Key Laboratory of Information Security of Network Systems College of Computer and Big Data Fuzhou350108 China Xidian University State Key Laboratory of Integrated Services Networks Xi'an710071 China Zhejiang University of Technology College of Computer Science and Technology Hangzhou310023 China Dalian University of Technology School of Software Dalian116620 China
Due to the robust representational capabilities of graph data, employing graph neural networks for its processing has demonstrated superior performance over conventional deep learning algorithms. Graph data encompasse... 详细信息
来源: 评论
Dynamic Pseudonym Semantic-location Privacy Protection Based on Continuous Query for Road network
收藏 引用
International Journal of network security 2021年 第4期23卷 642-649页
作者: Wang, Yonglu Zuo, Kaizhong Liu, Rui Zhao, Jun School of Computer and Information Anhui Normal University Anhui Provincial Key Lab of Network and Information Security Anhui Normal University Wuhu241002 China
Continuous queries are one of the most common queries in location-based services, although particularly useful, such queries raise serious privacy concerns. Due to frequently updated continuous locations, continuous q... 详细信息
来源: 评论
Joint Space-Time Sparsity Based Jamming Detection for Mission-Critical mMTC networks
arXiv
收藏 引用
arXiv 2023年
作者: Wang, Shao-Di Wang, Hui-Ming Li, Zhetao Leung, Victor C.M. The School of Information and Communication Engineering Xi'an Jiaotong University Shaanxi Xi'An710049 China The Ministry of Education Key Lab for Intelligent Networks and Network Security Xi'an Jiaotong University Shaanxi Xi'An710049 China The Key Laboratory of Hunnan Province for Internet of Things and Information Security Hunan International Scientific and Technological Cooperation Base of Intelligent Network School of Computer Science Xiangtan University Xiangtan411105 China The College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China The Department of Electrical and Computer Engineering The University of British Columbia VancouverBCV6T 1Z4 Canada
For mission-critical massive machine-type communications (mMTC) applications, the messages are required to be delivered in real-time. However, due to the weak security protection capabilities of the low-cost and low-c... 详细信息
来源: 评论
TPM, a pattern for an architecture for trusted computing  20
TPM, a pattern for an architecture for trusted computing
收藏 引用
2020 European Conference on Pattern Languages of Programs, EuroPLoP 2020
作者: Muñoz, Antonio Fernandez, Eduardo B. Network Information and Computer Security Lab University of Malaga Malaga Spain Dept. of Computer and Electrical Eng. and Computer Science Florida Atlantic University Boca RatonFL United States
Trusted Computing (TC) is a valuable technology to use when we need to process highly sensitive data and several variants of it are now available. We present here a pattern that describes the architecture of a standar... 详细信息
来源: 评论
BEIR:A Blockchain-based Encrypted Image Retrieval Scheme
BEIR:A Blockchain-based Encrypted Image Retrieval Scheme
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Xianxian Li Jie Li Feng Yu Xuemei Fu JunHao Yang Yue Chen Guangxi Key Lab of Multi-source Information Mining & Security Guilin China Key Laboratory of Computer Network and Information Integration Southeast University Nanjing China
Encrypted image retrieval may return incorrect or incomplete results due to threats from malicious cloud servers. Most of the existing solutions focus on the efficiency and accuracy of retrieval, lack of verification ... 详细信息
来源: 评论