咨询与建议

限定检索结果

文献类型

  • 589 篇 会议
  • 420 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,010 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 651 篇 工学
    • 494 篇 计算机科学与技术...
    • 400 篇 软件工程
    • 165 篇 信息与通信工程
    • 127 篇 电气工程
    • 62 篇 网络空间安全
    • 61 篇 电子科学与技术(可...
    • 60 篇 控制科学与工程
    • 52 篇 生物工程
    • 28 篇 生物医学工程(可授...
    • 28 篇 安全科学与工程
    • 26 篇 机械工程
    • 24 篇 仪器科学与技术
    • 21 篇 光学工程
    • 17 篇 建筑学
    • 17 篇 交通运输工程
    • 16 篇 动力工程及工程热...
    • 16 篇 化学工程与技术
  • 278 篇 理学
    • 170 篇 数学
    • 56 篇 生物学
    • 50 篇 统计学(可授理学、...
    • 49 篇 物理学
    • 29 篇 系统科学
    • 18 篇 化学
  • 166 篇 管理学
    • 94 篇 管理科学与工程(可...
    • 78 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 40 篇 法学
    • 24 篇 法学
    • 17 篇 社会学
  • 22 篇 医学
    • 19 篇 临床医学
    • 16 篇 基础医学(可授医学...
  • 15 篇 经济学
  • 14 篇 军事学
  • 6 篇 农学
  • 3 篇 教育学
  • 3 篇 文学

主题

  • 38 篇 feature extracti...
  • 35 篇 semantics
  • 34 篇 cryptography
  • 28 篇 protocols
  • 27 篇 computational mo...
  • 27 篇 security
  • 27 篇 accuracy
  • 27 篇 cloud computing
  • 25 篇 privacy
  • 24 篇 authentication
  • 21 篇 deep learning
  • 20 篇 network security
  • 19 篇 encryption
  • 19 篇 computer network...
  • 18 篇 federated learni...
  • 18 篇 training
  • 17 篇 data privacy
  • 17 篇 data models
  • 16 篇 neural networks
  • 15 篇 servers

机构

  • 67 篇 key laboratory o...
  • 65 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 31 篇 school of cyber ...
  • 31 篇 shaanxi key labo...
  • 29 篇 institute of inf...
  • 22 篇 state key labora...
  • 18 篇 national enginee...
  • 18 篇 shandong fundame...
  • 15 篇 school of comput...
  • 15 篇 college of compu...
  • 15 篇 school of comput...
  • 13 篇 key laboratory o...
  • 13 篇 national compute...
  • 12 篇 heilongjiang key...
  • 12 篇 shaanxi key labo...
  • 12 篇 national compute...

作者

  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 19 篇 baojiang cui
  • 18 篇 hei xinhong
  • 13 篇 li wei
  • 13 篇 yang xiaoyuan
  • 12 篇 jianfeng ma
  • 12 篇 xu li
  • 11 篇 jing zhao
  • 11 篇 fu chong
  • 11 篇 lei zhu
  • 11 篇 wei wei
  • 10 篇 zhang yuqing
  • 10 篇 chen zhong
  • 10 篇 liu jun
  • 10 篇 xiaoxue liu
  • 10 篇 li qi
  • 9 篇 wang lei
  • 9 篇 ma jianfeng

语言

  • 907 篇 英文
  • 75 篇 其他
  • 30 篇 中文
检索条件"机构=Network Security Laboratory Computer Engineering"
1010 条 记 录,以下是181-190 订阅
排序:
Competitive Swarm Optimizer Based on Individual Learning Mechanism
Competitive Swarm Optimizer Based on Individual Learning Mec...
收藏 引用
High Performance Big Data and Intelligent Systems (HPBD&IS)
作者: JingQi Tang Wei Li Lei Wang School of Computer Science and Engineering Xi'an University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China
In view of the disadvantages of the traditional competitive swarm optimizer (CSO), such as falling into local minimization or poor convergence accuracy, this paper proposed an enhanced CSO algorithm called competitive...
来源: 评论
Rapid Maize Seedling Detection Based on Receptive-Field and Cross-Dimensional Information Interaction
Rapid Maize Seedling Detection Based on Receptive-Field and ...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Hao, Fengqi Zhu, Shulei Ma, Dexin Dong, Xiangjun Kong, Hoiio Liu, Xia Mu, Chunhua Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan250014 China City University of Macau Faculty of Data Science 999078 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan250014 China Communication College Qingdao Agricultural University Qingdao266109 China Maize Research Institute Shandong Academy of Agricultural Sciences National Engineering Laboratory of Wheat and Maize Key Laboratory of Biology and Genetic Improvement of Maize in Northern Yellow-huai River Plain Ministry of Agriculture Jinan250100 China
The seedling stage is important in the growth and development of maize, and it is also a critical period that affects maize yield and quality. Accurately recognizing this stage of maize is challenging, as current maiz... 详细信息
来源: 评论
Petri net modeling and vulnerability analysis of the Heartbleed
Petri net modeling and vulnerability analysis of the Heartbl...
收藏 引用
2021 International Conference on networking and network Applications, NaNA 2021
作者: Wang, Yichuan Wang, He Hei, Xinhong Ji, Wenjiang Zhu, Lei Xi'an University of technology School of computer science and engineering Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology China
In recent years, a variety of network attacks emerge in an endless stream, and network attacks gradually show the characteristics of higher secrecy and greater harm. At present, the analysis of system vulnerabilities ... 详细信息
来源: 评论
PathReasoner: Modeling Reasoning Path with Equivalent Extension for Logical Question Answering
arXiv
收藏 引用
arXiv 2024年
作者: Xu, Fangzhi Lin, Qika Zhao, Tianzhe Han, Jiawei Liu, Jun School of Computer Science and Technology Xi’an Jiaotong University China Ministry of Education Key Laboratory of Intelligent Networks and Network Security China Shaanxi Province Key Laboratory of Big Data Knowledge Engineering China
Logical reasoning task has attracted great interest since it was proposed. Faced with such a task, current competitive models, even large language models (e.g., ChatGPT and PaLM 2), still perform badly. Previous promi... 详细信息
来源: 评论
Automatic recognition of depression based on audio and video:A review
收藏 引用
World Journal of Psychiatry 2024年 第2期14卷 225-233页
作者: Meng-Meng Han Xing-Yun Li Xin-Yu Yi Yun-Shao Zheng Wei-Li Xia Ya-Fei Liu Qing-Xiang Wang Shandong Mental Health Center Shandong UniversityJinan 250014Shandong ProvinceChina Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science Center(National Supercomputer Center in Jinan)Qilu University of Technology(Shandong Academy of Sciences)Jinan 250353Shandong ProvinceChina Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and TechnologyQilu University of Technology(Shandong Academy of Sciences)Jinan 250353Shandong ProvinceChina Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer ScienceJinan 250353Shandong ProvinceChina Department of Ward Two Shandong Mental Health CenterShandong UniversityJinan 250014Shandong ProvinceChina
Depression is a common mental health *** current depression detection methods,specialized physicians often engage in conversations and physiological examinations based on standardized scales as auxiliary measures for ... 详细信息
来源: 评论
MEAT: Median-Ensemble Adversarial Training for Improving Robustness and Generalization
MEAT: Median-Ensemble Adversarial Training for Improving Rob...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Zhaozhe Hu Jia-Li Yin Bin Chen Luojun Lin Bo-Hao Chen Ximeng Liu Fujian Province Key Laboratory of Information Security and Network Systems Fuzhou China College of Computer Science and Big Data Fuzhou University Fuzhou China Department of Computer Science and Engineering Yuan Ze University Taiwan
Self-ensemble adversarial training methods improve model robustness by ensembling models at different training epochs, such as model weight averaging (WA). However, previous research has shown that self-ensemble defen...
来源: 评论
Volume Hiding Conjunctive Searchable Symmetric Encryption over Cloud
Volume Hiding Conjunctive Searchable Symmetric Encryption ov...
收藏 引用
International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC
作者: Qinghua Deng Lanxiang Chen Yizhao Zhu Yi Mu Faculty of Data Science City University of Macau Macau Macau China School of Computer and Information Engineering Hanshan Normal University Chaozhou China College of Computer and Cyber Security Fujian Normal University Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou China
Symmetric searchable encryption (SSE) is crucial for promoting cloud storage. It enables users to encrypt private data and outsource it to untrusted servers while retaining query capabilities. To prevent the cloud fro... 详细信息
来源: 评论
RDGFuzz: A directed greybox fuzzing optimization method based on Rich-Branch nodes  22
RDGFuzz: A directed greybox fuzzing optimization method base...
收藏 引用
Proceedings of the 2022 6th International Conference on Electronic Information Technology and computer engineering
作者: Zejun Wu Li Lu Qiong Jia Zhihao Chen State Key Laboratory of Mathematical Engineering and advanced Computing China National Local Joint Engineering Laboratory of Network Space Security Technology China Beijing Institute of Computer Technology and Application China
Directed fuzzing technology is one of the key technologies to quickly reach a specific location of software, and to conduct targeted testing or bug recurrence. However, directed fuzzing technology has some problems, s... 详细信息
来源: 评论
Age of Information Analysis for CR-NOMA Aided Uplink Systems with Randomly Arrived Packets
收藏 引用
IEEE Transactions on Communications 2024年
作者: Sun, Yanshi Ye, Yanglin Ding, Zhiguo Zhou, Momiao Liu, Lei Hefei University of Technology School of Computer Science and Information Engineering Hefei230009 China Khalifa University Department of Computer and Information Engineering Abu Dhabi United Arab Emirates Xi'an University of Posts and Telecommunications Shaanxi Key Laboratory of Information Communication Network and Security Xi'an710121 China
This paper studies the application of cognitive radio inspired non-orthogonal multiple access (CR-NOMA) to reduce age of information (AoI) for uplink transmission. In particular, a time division multiple access (TDMA)... 详细信息
来源: 评论
Discrete Jaya algorithm to solve the police resource deployment problem in emergency traffic accident  10
Discrete Jaya algorithm to solve the police resource deploym...
收藏 引用
10th IEEE Joint International Information Technology and Artificial Intelligence Conference, ITAIC 2022
作者: Jing, Zhang Weijie, Ding Zhejiang Police College Department of Computer and Information Security Hangzhou310053 China Big-data and Network Security Research Institute Zhejiang Police College Hangzhou310053 China College of Information Engineering Zhejiang University of Technology Hangzhou310023 China Key Laboratory of Public Security Information Application Based on Big-data Architecture Ministry of Public Security Hangzhou310053 China
Aiming at the high frequency of urban traffic accidents and the relative shortage of police resources, a multi-objective discrete Jaya algorithm is proposed to solve the problem of police resource deployment in emerge... 详细信息
来源: 评论