咨询与建议

限定检索结果

文献类型

  • 577 篇 会议
  • 402 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 980 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 626 篇 工学
    • 474 篇 计算机科学与技术...
    • 389 篇 软件工程
    • 158 篇 信息与通信工程
    • 122 篇 电气工程
    • 60 篇 网络空间安全
    • 58 篇 电子科学与技术(可...
    • 52 篇 控制科学与工程
    • 52 篇 生物工程
    • 28 篇 生物医学工程(可授...
    • 28 篇 安全科学与工程
    • 26 篇 机械工程
    • 23 篇 仪器科学与技术
    • 21 篇 光学工程
    • 17 篇 交通运输工程
    • 16 篇 动力工程及工程热...
    • 16 篇 建筑学
  • 270 篇 理学
    • 167 篇 数学
    • 55 篇 生物学
    • 50 篇 统计学(可授理学、...
    • 46 篇 物理学
    • 28 篇 系统科学
    • 15 篇 化学
  • 162 篇 管理学
    • 92 篇 管理科学与工程(可...
    • 76 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 39 篇 法学
    • 23 篇 法学
    • 17 篇 社会学
  • 21 篇 医学
    • 18 篇 临床医学
    • 16 篇 基础医学(可授医学...
  • 15 篇 经济学
    • 15 篇 应用经济学
  • 14 篇 军事学
  • 6 篇 农学
  • 3 篇 文学
  • 2 篇 教育学

主题

  • 38 篇 feature extracti...
  • 35 篇 semantics
  • 34 篇 cryptography
  • 28 篇 protocols
  • 27 篇 computational mo...
  • 26 篇 security
  • 26 篇 accuracy
  • 26 篇 cloud computing
  • 24 篇 privacy
  • 23 篇 authentication
  • 20 篇 deep learning
  • 20 篇 network security
  • 19 篇 encryption
  • 19 篇 computer network...
  • 18 篇 training
  • 17 篇 data privacy
  • 17 篇 data models
  • 16 篇 neural networks
  • 15 篇 servers
  • 15 篇 federated learni...

机构

  • 64 篇 shandong provinc...
  • 64 篇 key laboratory o...
  • 45 篇 shandong enginee...
  • 40 篇 school of comput...
  • 37 篇 shaanxi key labo...
  • 36 篇 school of comput...
  • 30 篇 shaanxi key labo...
  • 29 篇 school of cyber ...
  • 27 篇 institute of inf...
  • 22 篇 state key labora...
  • 18 篇 national enginee...
  • 16 篇 shandong fundame...
  • 15 篇 school of comput...
  • 15 篇 college of compu...
  • 15 篇 school of comput...
  • 13 篇 key laboratory o...
  • 13 篇 national compute...
  • 12 篇 shaanxi key labo...
  • 11 篇 shandong enginee...
  • 11 篇 xi'an university...

作者

  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 21 篇 wang yichuan
  • 19 篇 baojiang cui
  • 17 篇 hei xinhong
  • 13 篇 li wei
  • 13 篇 yang xiaoyuan
  • 12 篇 jianfeng ma
  • 12 篇 xu li
  • 11 篇 jing zhao
  • 11 篇 fu chong
  • 11 篇 wei wei
  • 10 篇 zhang yuqing
  • 10 篇 chen zhong
  • 10 篇 xiaoxue liu
  • 10 篇 li qi
  • 10 篇 lei zhu
  • 9 篇 wang lei
  • 9 篇 liu jun
  • 9 篇 shen yulong

语言

  • 902 篇 英文
  • 50 篇 其他
  • 30 篇 中文
检索条件"机构=Network Security Laboratory Computer Engineering"
980 条 记 录,以下是121-130 订阅
排序:
Responding to News Sensitively in Stock Attention networks via Prompt-Adaptive Trimodal Model
收藏 引用
IEEE Transactions on Neural networks and Learning Systems 2025年 第6期36卷 10099-10113页
作者: Haotian Liu Bowen Hu Yadong Zhou Yuxun Zhou Ministry of Education Key Laboratory for Intelligent Networks and Network Security Faculty of Electronic and Information Engineering Xi’an Jiaotong University Xi’an Shaanxi China Department of Electrical Engineering and Computer Sciences University of California at Berkeley Berkeley CA USA
Modern quantitative finance and portfolio-based investment hinge on multimedia news and historical price trends for stock movement prediction. However, prior studies overlook the long tail effect in the feature distri... 详细信息
来源: 评论
Innovations in Machine Learning for Flight Delay Prediction: A Targeted Overview
Innovations in Machine Learning for Flight Delay Prediction:...
收藏 引用
computers and Artificial Intelligence Technologies (CAIT), International Conference on
作者: Wei Wei Chenchen Yu Zhao Yang Fu Bo School of Computer Science and Engineering and the Shaanxi Key Laboratory for Network Computing and Security Xi'an University Of Technology Xi’an China School of Computer Science and Engineering Xi'an University Of Technology Xi’an China
Artificial intelligence technology is increasingly being applied to air traffic flow forecasting. Based on the core data of Web of Science, this study uses bibliometrics and content review methods to investigate the c... 详细信息
来源: 评论
Verifiable and Forward-Secure Multi-Keyword Query in Internet of Medical Things
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Li, Hongjun He, Debiao Feng, Qi Luo, Min Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan China Wuhan University School of Cyber Science and Engineering Wuhan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250014 China National Key Laboratory of Security Communication Chengdu China
The Internet of Medical Things (IoMT) plays a pivotal role in modern healthcare systems, enhancing patients' medical experiences and improving the efficiency of public medical services. However, concerns regarding... 详细信息
来源: 评论
Visible Light Positioning Method for Indoor Line-of-Sight Scene Based on Time Series Coding  9
Visible Light Positioning Method for Indoor Line-of-Sight Sc...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Yu, Yonghao Guo, Yongde Zhao, Dawei Fu, Kexue Tang, Yongwei Wang, Qinyuan City University of Macau Faculty of Data Science China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Shandong University School of Mechanical Engineering Key Laboratory of High Efficiency and Clean Mechanical Manufacture Ministry of Education Jinan China
Existing indoor visible light positioning methods, such as those based on fingerprint database algorithms, are complex to construct and consume significant resources. In response to this issue, the text proposes an en... 详细信息
来源: 评论
A Web Attack Detection Method Based on DistilBERT and Feature Fusion for Power Micro-Application Server  2
A Web Attack Detection Method Based on DistilBERT and Featur...
收藏 引用
2nd International Conference on Advanced Electronics, Electrical and Green Energy, AEEGE 2023
作者: Nige, Li Lu, Chen Lei, Zhao Zhenning, Teng Zhiqiang, Wang Yiyang, Shao Xiaolin, Gui State Grid Laboratory of Power Cyber-Security Protection and Monitoring Technology State Grid Smart Grid Research Institute Co.Ltd. Nanjing China Xi'an Jiaotong University Faculty of Electronic and Information Engineering Shaanxi Province Key Laboratory of Computer Network Xi'an China
The widespread use of power micro-applications has significantly expanded the attack surface of their server side, thus increasing the risk of vulnerability attacks such as SQL injection, XSS, and CRLF injection. To e... 详细信息
来源: 评论
Petri Net Model of MITM Attack Based on NDP Protocol
Petri Net Model of MITM Attack Based on NDP Protocol
收藏 引用
2022 International Conference on networking and network Applications, NaNA 2022
作者: Zhang, Liumei Han, Yu Wang, Yichuan Quan, Ruiqin School of Computer Science Xi’an Shiyou University Xi’an China School of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China Xinjiang Institute of Engineering China
Neighbor Discovery Protocol (NDP) is one of the core protocols of IPv6 networks. Since NDP messages are an unauthenticated stateless protocol, they are vulnerable to various types of attacks, and Man-In-The-Middle (MI... 详细信息
来源: 评论
MISP: An Efficient Quantum-resistant Misbehavior Preventing Scheme with Self-enforcement for Vehicle-to-Everything
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Chen, Ying He, Debiao Bao, Zijian Wang, Huaqun Luo, Min Wuhan University School of Cyber Science and Engineering Wuhan430072 China Key Laboratory of Computing Power Network & Information Security Ministry of Education Shandong Computer Science Center Jinan250014 China Nanjing University of Posts and Telecommunications College of Computer Nanjing210023 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network & Information System Security Jinan250014 China
In the Vehicle-to-Everything (V2X) communication system, the presence of ambiguous warnings significantly increases the risk of severe accidents, posing a substantial threat to the safety of autonomous driving. It is ... 详细信息
来源: 评论
Privacy-Preserving Interactive Semantic Codec Training for IoT-Based Holographic Counterparts
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Xu, Jinpeng Chen, Liang Lin, Limei Wang, Xiaoding Huang, Yanze Xu, Li Piran, Md. Jalil Fujian Normal University College of Computer and Cyber Security Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Fuzhou350117 China Fujian University of Technology School of Computer Science and Mathematics Fujian Fuzhou350118 China Sejong University Department of Computer Science and Engineering Seoul05006 Korea Republic of
The use of IoT-based semantic codecs to process complex contextual semantic information in holographic counterparts introduces significant privacy risks, as it may expose sensitive data, thereby increasing the likelih... 详细信息
来源: 评论
Key Management and Authentication Scheme Forward Trusted Pervasive Container Computing
Key Management and Authentication Scheme Forward Trusted Per...
收藏 引用
Big Data and Privacy Computing (BDPC), International Conference on
作者: XinHong Hei YuZhan Xue YiChuan Wang YiFan Liu Chen Peng Xiang Sun School of computer science and engineering Xi'an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology School of computer science and engineering Xi'an University of Technology Xi’an China
Cloud computing technology is an internet-based computing model that provides high reliability and security measures, including data backup, secure access control, etc. As Docker containers play a increasingly importa... 详细信息
来源: 评论
NI-GDBA: Non-Intrusive Distributed Backdoor Attack Based on Adaptive Perturbation on Federated Graph Learning  25
NI-GDBA: Non-Intrusive Distributed Backdoor Attack Based on ...
收藏 引用
34th ACM Web Conference, WWW 2025
作者: Li, Ken Shi, Bin Wei, Jiazhe Dong, Bo School of Computer Science and Technology Xi’an Jiaotong University Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi’an China School of Computer Science and Technology Xi’an Jiaotong University Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Xi’an China School of Distance Education Xi’an Jiaotong University Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Xi’an China
Federated Graph Learning (FedGL) is an emerging Federated Learning (FL) framework that learns the graph data from various clients to train better Graph Neural networks(GNNs) model. Owing to concerns regarding the secu... 详细信息
来源: 评论