咨询与建议

限定检索结果

文献类型

  • 589 篇 会议
  • 420 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,010 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 651 篇 工学
    • 494 篇 计算机科学与技术...
    • 400 篇 软件工程
    • 165 篇 信息与通信工程
    • 127 篇 电气工程
    • 62 篇 网络空间安全
    • 61 篇 电子科学与技术(可...
    • 60 篇 控制科学与工程
    • 52 篇 生物工程
    • 28 篇 生物医学工程(可授...
    • 28 篇 安全科学与工程
    • 26 篇 机械工程
    • 24 篇 仪器科学与技术
    • 21 篇 光学工程
    • 17 篇 建筑学
    • 17 篇 交通运输工程
    • 16 篇 动力工程及工程热...
    • 16 篇 化学工程与技术
  • 278 篇 理学
    • 170 篇 数学
    • 56 篇 生物学
    • 50 篇 统计学(可授理学、...
    • 49 篇 物理学
    • 29 篇 系统科学
    • 18 篇 化学
  • 166 篇 管理学
    • 94 篇 管理科学与工程(可...
    • 78 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 40 篇 法学
    • 24 篇 法学
    • 17 篇 社会学
  • 22 篇 医学
    • 19 篇 临床医学
    • 16 篇 基础医学(可授医学...
  • 15 篇 经济学
  • 14 篇 军事学
  • 6 篇 农学
  • 3 篇 教育学
  • 3 篇 文学

主题

  • 38 篇 feature extracti...
  • 35 篇 semantics
  • 34 篇 cryptography
  • 28 篇 protocols
  • 27 篇 computational mo...
  • 27 篇 security
  • 27 篇 accuracy
  • 27 篇 cloud computing
  • 25 篇 privacy
  • 24 篇 authentication
  • 21 篇 deep learning
  • 20 篇 network security
  • 19 篇 encryption
  • 19 篇 computer network...
  • 18 篇 federated learni...
  • 18 篇 training
  • 17 篇 data privacy
  • 17 篇 data models
  • 16 篇 neural networks
  • 15 篇 servers

机构

  • 67 篇 key laboratory o...
  • 65 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 31 篇 school of cyber ...
  • 31 篇 shaanxi key labo...
  • 29 篇 institute of inf...
  • 22 篇 state key labora...
  • 18 篇 national enginee...
  • 18 篇 shandong fundame...
  • 15 篇 school of comput...
  • 15 篇 college of compu...
  • 15 篇 school of comput...
  • 13 篇 key laboratory o...
  • 13 篇 national compute...
  • 12 篇 heilongjiang key...
  • 12 篇 shaanxi key labo...
  • 12 篇 national compute...

作者

  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 19 篇 baojiang cui
  • 18 篇 hei xinhong
  • 13 篇 li wei
  • 13 篇 yang xiaoyuan
  • 12 篇 jianfeng ma
  • 12 篇 xu li
  • 11 篇 jing zhao
  • 11 篇 fu chong
  • 11 篇 lei zhu
  • 11 篇 wei wei
  • 10 篇 zhang yuqing
  • 10 篇 chen zhong
  • 10 篇 liu jun
  • 10 篇 xiaoxue liu
  • 10 篇 li qi
  • 9 篇 wang lei
  • 9 篇 ma jianfeng

语言

  • 907 篇 英文
  • 75 篇 其他
  • 30 篇 中文
检索条件"机构=Network Security Laboratory Computer Engineering"
1010 条 记 录,以下是141-150 订阅
排序:
Multi-party privacy-preserving decision tree training with a privileged party
收藏 引用
Science China(Information Sciences) 2024年 第8期67卷 253-268页
作者: Yiwen TONG Qi FENG Min LUO Debiao HE Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Shanghai Technology Innovation Centre of Distributed Privacy-Preserving Artificial Intelligence Matrix Elements Technologies Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science Center Qilu University of Technology(Shandong Academy of Sciences)
Currently, a decision tree is the most commonly used data mining algorithm for classification tasks. While a significant number of studies have investigated privacy-preserving decision trees, the methods proposed in t... 详细信息
来源: 评论
Timo: In-memory temporal query processing for big temporal data
Timo: In-memory temporal query processing for big temporal d...
收藏 引用
作者: Zheng, Xiao Liu, Houkai Wang, Xiujun Wu, Xuangou Yu, Feng School of Computer Science and Technology Anhui University of Technology Maanshan China Institute for Artificial Intelligence Hefei Comprehensive National Science Center Hefei China Anhui Engineering Laboratory for Intelligent Applications and Security of Industrial Internet Anhui University of Technology Anhui Maanshan China School of Computer Science and Engineering & School of Software Guangxi Normal University Guilin China Key Laboratory of Computer Network and Information Integration Southeast University Nanjing China
Today's internet applications generate massive temporal data anywhere and anytime. Although some disk-based temporal systems are currently available, they suffer from poor I/O performance, especially when applied ... 详细信息
来源: 评论
Low-light Stereo Image Enhancement and De-noising in the Low-frequency Information Enhanced Image Space
arXiv
收藏 引用
arXiv 2024年
作者: Zhao, Minghua Qin, Xiangdong Du, Shuangli Bai, Xuefei Lyu, Jiahao Liu, Yiguang Shaanxi Key Laboratory for Network Computing and Security Technology School of Computer Science and Engineering Xi'an University of Technology Xi'An China College of Computer Science Sichuan University Chengdu China
Unlike single image task, stereo image enhancement can use another view information, and its key stage is how to perform cross-view feature interaction to extract useful information from another view. However, complex... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities  24
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
44th ACM/IEEE International Conference on Software engineering, ICSE 2024
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hong Kong Jin YinHu Laboratory Wuhan China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China University of Colorado Colorado Springs Department of Computer Science Colorado Springs Colorado United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
Att-TCN: An Advertising Attribution Method Based on Temporal Convolutional network with Attention Mechanism  8
Att-TCN: An Advertising Attribution Method Based on Temporal...
收藏 引用
8th IEEE International Conference on computer and Communications, ICCC 2022
作者: Xie, Bowen Sun, Yi Lin, Zhaowen Ma, Baoquan Beijing University of Posts and Telecommunications Beijing China National Engineering Laboratory for Mobile Network Technologies Beijing China National Engineering Laboratory for Industry Control System Information Security Technology Beijing China National Computer System Engineering Research Institute of China Beijing China
Advertising attribution is an effective method to measure the effect of various advertisements in the era of Internet advertising. It enables scientific tracking back and refined operation of advertising by quantitati... 详细信息
来源: 评论
An Ecg Signal Synthesis Approach Based on the Synergy of Wgan and Attention Mechanisms
SSRN
收藏 引用
SSRN 2024年
作者: Zhou, Hongfang Li, Yijie Guo, Yifan Xue, Haolin School of Computer Science and Engineering Xi’an University of Technology Xi’an710048 China Shaanxi Key Laboratory of Network Computing and Security Technology Xi’an710048 China
Electrocardiogram (ECG) synthesis plays a key role in the diagnosis of heart diseases. However, ECG data involves patient privacy and has obvious imbalance issue. This leads to a disconnect between theoretical researc... 详细信息
来源: 评论
DDoS Attack Detection Based on Information Entropy Feature Extraction in Software Defined networks
DDoS Attack Detection Based on Information Entropy Feature E...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Wenjiang Ji Yixin Yang Yaling Zhang Yichuan Wang Mengjie Tian Yuan Qiu School of computer science and engineering Xi'an University of technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology
Distributed Denial of Service(DDoS) attacks target the forwarding-control separation feature of Software-Defined networking(SDN) to launch attacks, causing network disruptions. Therefore security against DDoS attack d...
来源: 评论
VCFL: Verifiable and communication-efficient federated learning against collusion attack for secure aggregation
收藏 引用
Information Sciences 2025年 717卷
作者: Xie, Huiyu Zhou, Tanping Chen, Shuo Li, Yu Yang, Xiaoyuan College of Cryptography Engineering Engineering University of People's Armed Police Xi'an710086 China TCA Laboratory State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing100080 China Key Laboratory Of Network and Information Security of PAP Engineering University of PAP Xi'an710086 China
Federated Learning (FL) is a paradigm that allows users to collaboratively train machine learning models by sharing gradients during the training process without sharing the original data. In practical application sce... 详细信息
来源: 评论
A Pseudonym Exchange-Based Traceable Location Privacy Protection Scheme for IoV
A Pseudonym Exchange-Based Traceable Location Privacy Protec...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Weigang Ma Yaping Yu Yichuan Wang Xiaoxue Liu Zhoukai Wang School of Computer Science and Engineering Xi'an University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology
Internet of Vehicles (IoV) is a network built by communicating entities such as vehicles and roadside infrastructure, etc. The entities can communicate with each other, sharing data and providing services. However, th...
来源: 评论
A Novel On-Demand Service Architecture for Efficient Cloud-Edge Collaboration
A Novel On-Demand Service Architecture for Efficient Cloud-E...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Yaling Zhang Jingjing Chen Yichuan Wang Yeqiu Xiao Xiaoxue Liu School of computer science and engineering Xi'an University of technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology
With the advent of 5G era, the model of cloud-edge collaboration is used to handle massive data computing tasks with significant superiority. However, this architecture still uses the traditional web service model, wh...
来源: 评论