咨询与建议

限定检索结果

文献类型

  • 154 篇 会议
  • 113 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 268 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 193 篇 工学
    • 153 篇 计算机科学与技术...
    • 128 篇 软件工程
    • 43 篇 信息与通信工程
    • 24 篇 控制科学与工程
    • 21 篇 网络空间安全
    • 19 篇 电气工程
    • 16 篇 电子科学与技术(可...
    • 12 篇 生物工程
    • 11 篇 机械工程
    • 9 篇 生物医学工程(可授...
    • 6 篇 交通运输工程
    • 5 篇 仪器科学与技术
    • 4 篇 光学工程
    • 4 篇 化学工程与技术
    • 4 篇 安全科学与工程
  • 85 篇 理学
    • 55 篇 数学
    • 15 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 13 篇 生物学
    • 10 篇 系统科学
    • 5 篇 化学
  • 45 篇 管理学
    • 28 篇 管理科学与工程(可...
    • 18 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 10 篇 法学
    • 6 篇 社会学
    • 4 篇 法学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 8 篇 医学
    • 7 篇 临床医学
    • 6 篇 基础医学(可授医学...
    • 5 篇 药学(可授医学、理...
  • 4 篇 军事学
  • 2 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 17 篇 authentication
  • 12 篇 cryptography
  • 8 篇 deep learning
  • 8 篇 security
  • 8 篇 cloud computing
  • 6 篇 protocols
  • 6 篇 training
  • 5 篇 feature extracti...
  • 5 篇 malware
  • 4 篇 internet of thin...
  • 4 篇 access control
  • 4 篇 reinforcement le...
  • 4 篇 optimization
  • 4 篇 servers
  • 4 篇 internet
  • 4 篇 computers
  • 4 篇 semantics
  • 4 篇 blockchain
  • 4 篇 peer to peer net...
  • 4 篇 trusted computin...

机构

  • 21 篇 key lab of infor...
  • 7 篇 key lab of netwo...
  • 6 篇 guangxi key labo...
  • 6 篇 national compute...
  • 5 篇 network informat...
  • 5 篇 computer departm...
  • 5 篇 institute of inf...
  • 5 篇 key lab. of comp...
  • 4 篇 ministry of edu....
  • 4 篇 key lab. of comp...
  • 4 篇 hebei provincial...
  • 4 篇 key lab of netwo...
  • 4 篇 college of compu...
  • 4 篇 college of mathe...
  • 4 篇 national languag...
  • 4 篇 national compute...
  • 4 篇 school of cyber ...
  • 4 篇 hubei provincial...
  • 4 篇 school of comput...
  • 4 篇 key laboratory o...

作者

  • 9 篇 meng deyu
  • 9 篇 tan zuowen
  • 9 篇 li hui
  • 7 篇 cao xiangyong
  • 6 篇 lopez javier
  • 5 篇 zhang yuqing
  • 5 篇 wang fangwei
  • 5 篇 javier lopez
  • 5 篇 feng yu
  • 5 篇 sun jin
  • 4 篇 fan kai
  • 4 篇 yong-zhen li
  • 4 篇 weizhong zhao
  • 4 篇 yong zhao
  • 4 篇 ma wenping
  • 4 篇 tingting he
  • 4 篇 wang yue
  • 4 篇 hu yupu
  • 4 篇 xingpeng jiang
  • 4 篇 hu yu-pu

语言

  • 247 篇 英文
  • 15 篇 中文
  • 6 篇 其他
检索条件"机构=Network Information and Computer Security Lab"
268 条 记 录,以下是71-80 订阅
排序:
Simulating Cyber Attacks and Designing Malware using Python
Simulating Cyber Attacks and Designing Malware using Python
收藏 引用
International Conference on Signal Processing and Integrated networks (SPIN)
作者: Akash Ankit Shubham Inder Anuj Sharma Rahul Johari Deo Prakash Vidyarthi SWINGER: Security Wireless IoT Network Group of Engineering and Research University School of Information Communication and Technology Guru Gobind Singh Indraprastha University Dwarka New Delhi India Royal Melbourne Institute of Technology (RMIT University) Melboume Victoria Australia Parallel and Distributed System Lab School of Computer and Systems Sciences Jawaharlal Nehru University New Delhi India
In this Internet era, we have become heavily dependent on the World Wide Web and it has become a basic amenity for humans. A normal user can be trapped easily in this vicious web if not careful enough. It is a field t... 详细信息
来源: 评论
Density-aware and Depth-aware Visual Representation for Zero-Shot Object Counting
Density-aware and Depth-aware Visual Representation for Zero...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Fang Nan Feng Tian Ni Zhang Nian Liu Haonan Miao Guang Dai Mengmeng Wang Faculty of Electronic and Information Engineering Xi’an Jiaotong University Xi’an China Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an China School of Automation Northwestern Polytechnical University Xi’an China Computer Vision Department Mohamed bin Zayed University of Artificial Intelligence Abu Dhabi UAE SGIT AI Lab State Grid Corporation of China Zhejiang University of Technology Hang Zhou China
Previous methods often utilize CLIP semantic classifiers with class names for zero-shot object counting. However, they ignore crucial density and depth knowledge for counting tasks. Thus, we propose a density-aware an... 详细信息
来源: 评论
HTtext: A TextCNN-based pre-silicon detection for hardware Trojans
HTtext: A TextCNN-based pre-silicon detection for hardware T...
收藏 引用
IEEE International Conference on Big Data and Cloud Computing (BdCloud)
作者: Yi Xu Zhenyi Chen Binhong Huang Ximeng Liu Chen Dong College of Computer and Data Science Fuzhou University Fuzhou China University of South Floride Tampa USA Key Lab of Information Security of Network Systems (Fuzhou University) Fujian Key Laboratory of Network Computing and Intelligent Information Processing (Fuzhou University)
With the advent of the intelligence era, the usage and investment for chips have risen year by year, causing the demand for chip security. Machine learning (ML) analysis has made progress as a pre-silicon hardware Tro... 详细信息
来源: 评论
A Compositional Approach to Safety-Critical Resilient Control for Systems with Coupled Dynamics
arXiv
收藏 引用
arXiv 2022年
作者: Al Maruf, Abdullah Niu, Luyao Clark, Andrew Mertoguno, J. Sukarno Poovendran, Radha The Network Security Lab Department of Electrical and Computer Engineering University of Washington SeattleWA98195-2500 United States The Department of Electrical and Computer Engineering Worcester Polytechnic Institute WorcesterMA01609 United States Information and Cyber Sciences Georgia Tech Research Institute AtlantaGA30332 United States
Complex, interconnected Cyber-physical Systems (CPS) are increasingly common in applications including smart grids and transportation. Ensuring safety of interconnected systems whose dynamics are coupled is challengin... 详细信息
来源: 评论
A Dynamic Demand-driven Smart Manufacturing for Mass Individualization Production
A Dynamic Demand-driven Smart Manufacturing for Mass Individ...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Qiyu Hong Zhenyi Chen Chen Dong Qiancheng Xiong College of Computer and Data Science Fuzhou University Fuzhou China Key Lab of Information Security of Network Systems Fuzhou University Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University University of South Florida Tampa United States
Industry 4.0 intends to realize mass individualization production driven by customers’ demands, thus generating several advanced manufacturing modes. However, the existing modes have disadvantages such as low custome... 详细信息
来源: 评论
Zero-pole cancellation for identity-based aggregators:a constant-size designated verifier-set signature
收藏 引用
Frontiers of computer Science 2020年 第4期14卷 197-210页
作者: E CHEN Yan ZHU Changlu LIN Kewei LV School of Computer and Communication Engineering University of Science and Technology BeijingBeijing100083China College of Mathematics and Informatics Fujian Normal UniversityFuzhou350117China Fujian Provincial Key Lab of Network Security&Cryptology Fujian Normal UniversityFuzhou350007China Institute of Information Engineering DCS Research CenterChinese Academy of SciencesBeijing100093China
In this paper we present a designated verifier-set signature(DVSS),in which the signer allows to designate many verifiers rather than one verifier,and each designated verifier can verify the validity of signature by *... 详细信息
来源: 评论
AsyncSC: An Asynchronous Sidechain for Multi-Domain Data Exchange in Internet of Things
arXiv
收藏 引用
arXiv 2024年
作者: Yang, Lingxiao Dong, Xuewen Wan, Zhiguo Gao, Sheng Tong, Wei Lu, Di Shen, Yulong Du, Xiaojiang The School of Computer Science and Technology Xidian University The Engineering Research Center of Blockchain Technology Application and Evaluation Ministry of Education China The Shaanxi Key Laboratory of Blockchain and Secure Computing Xi'An710071 China The Zhejiang Lab Hangzhou311121 China The School of Information Central University of Finance and Economics Beijing100081 China The School of Information Science and Engineering Zhejiang Sci-Tech University Hangzhou310018 China The School of Computer Science and Technology Xidian University China The Shaanxi Key Laboratory of Network and System Security Xi'An710071 China The School of Engineering and Science Stevens Institute of Technology Hoboken07030 United States
Sidechain techniques improve blockchain scalability and interoperability, providing decentralized exchange and cross-chain collaboration solutions for Internet of Things (IoT) data across various domains. However, cur...
来源: 评论
Mask Approximation Net: A Novel Diffusion Model Approach for Remote Sensing Change Captioning
arXiv
收藏 引用
arXiv 2024年
作者: Sun, Dongwei Yao, Jing Zhou, Changsheng Cao, Xiangyong Ghamisi, Pedram School of Computer Science and Technology the Ministry of Education Key Lab for Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an710049 China Aerospace Information Research Institute Chinese Academy of Sciences Beijing100094 China School of Mathematics and Statistics Guangdong University of Technology Guangzhou China Helmholtz-Zentrum Dresden-Rossendorf Freiberg09599 Germany Lancaster Environment Centre Lancaster University LancasterLA1 4YR United Kingdom
Remote sensing image change description represents an innovative multimodal task within the realm of remote sensing processing. This task not only facilitates the detection of alterations in surface conditions, but al... 详细信息
来源: 评论
Disentangled Noisy Correspondence Learning
arXiv
收藏 引用
arXiv 2024年
作者: Dang, Zhuohang Luo, Minnan Wang, Jihong Jia, Chengyou Han, Haochen Wan, Herun Dai, Guang Chang, Xiaojun Wang, Jingdong The School of Computer Science and Technology The Ministry of Education Key Laboratory of Intelligent Networks and Network Security The Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Xi'an Jiaotong University Shaanxi Xi'An710049 China SGIT AI Lab State Grid Shaanxi Electric Power Company Limited State Grid Corporation of China Shaanxi China The School of Information Science and Technology University of Science and Technology China United Arab Emirates The Baidu Inc China
Cross-modal retrieval is crucial in understanding latent correspondences across modalities. However, existing methods implicitly assume well-matched training data, which is impractical as real-world data inevitably in... 详细信息
来源: 评论
Enhancing Deep Paraphrase Identification via Leveraging Word Alignment information
Enhancing Deep Paraphrase Identification via Leveraging Word...
收藏 引用
IEEE International Conference on Acoustics, Speech and Signal Processing
作者: Boxin Li Tingwen Liu Bin Wang Lihong Wang Institute of Information Engineering Chinese Academy of Sciences School of Cyber Security University of Chinese Academy of Sciences Xiaomi AI Lab National Computer Network Emergency Response Technical Team Coordination Center of China
Recent deep learning based methods have achieved impressive performance on paraphrase identification (PI), a fundamental NLP task, judging whether two sentences are semantically equivalent or not. However, their succe... 详细信息
来源: 评论