咨询与建议

限定检索结果

文献类型

  • 589 篇 会议
  • 420 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,010 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 651 篇 工学
    • 494 篇 计算机科学与技术...
    • 400 篇 软件工程
    • 165 篇 信息与通信工程
    • 127 篇 电气工程
    • 62 篇 网络空间安全
    • 61 篇 电子科学与技术(可...
    • 60 篇 控制科学与工程
    • 52 篇 生物工程
    • 28 篇 生物医学工程(可授...
    • 28 篇 安全科学与工程
    • 26 篇 机械工程
    • 24 篇 仪器科学与技术
    • 21 篇 光学工程
    • 17 篇 建筑学
    • 17 篇 交通运输工程
    • 16 篇 动力工程及工程热...
    • 16 篇 化学工程与技术
  • 278 篇 理学
    • 170 篇 数学
    • 56 篇 生物学
    • 50 篇 统计学(可授理学、...
    • 49 篇 物理学
    • 29 篇 系统科学
    • 18 篇 化学
  • 166 篇 管理学
    • 94 篇 管理科学与工程(可...
    • 78 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 40 篇 法学
    • 24 篇 法学
    • 17 篇 社会学
  • 22 篇 医学
    • 19 篇 临床医学
    • 16 篇 基础医学(可授医学...
  • 15 篇 经济学
  • 14 篇 军事学
  • 6 篇 农学
  • 3 篇 教育学
  • 3 篇 文学

主题

  • 38 篇 feature extracti...
  • 35 篇 semantics
  • 34 篇 cryptography
  • 28 篇 protocols
  • 27 篇 computational mo...
  • 27 篇 security
  • 27 篇 accuracy
  • 27 篇 cloud computing
  • 25 篇 privacy
  • 24 篇 authentication
  • 21 篇 deep learning
  • 20 篇 network security
  • 19 篇 encryption
  • 19 篇 computer network...
  • 18 篇 federated learni...
  • 18 篇 training
  • 17 篇 data privacy
  • 17 篇 data models
  • 16 篇 neural networks
  • 15 篇 servers

机构

  • 67 篇 key laboratory o...
  • 65 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 31 篇 school of cyber ...
  • 31 篇 shaanxi key labo...
  • 29 篇 institute of inf...
  • 22 篇 state key labora...
  • 18 篇 national enginee...
  • 18 篇 shandong fundame...
  • 15 篇 school of comput...
  • 15 篇 college of compu...
  • 15 篇 school of comput...
  • 13 篇 key laboratory o...
  • 13 篇 national compute...
  • 12 篇 heilongjiang key...
  • 12 篇 shaanxi key labo...
  • 12 篇 national compute...

作者

  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 19 篇 baojiang cui
  • 18 篇 hei xinhong
  • 13 篇 li wei
  • 13 篇 yang xiaoyuan
  • 12 篇 jianfeng ma
  • 12 篇 xu li
  • 11 篇 jing zhao
  • 11 篇 fu chong
  • 11 篇 lei zhu
  • 11 篇 wei wei
  • 10 篇 zhang yuqing
  • 10 篇 chen zhong
  • 10 篇 liu jun
  • 10 篇 xiaoxue liu
  • 10 篇 li qi
  • 9 篇 wang lei
  • 9 篇 ma jianfeng

语言

  • 907 篇 英文
  • 75 篇 其他
  • 30 篇 中文
检索条件"机构=Network Security Laboratory Computer Engineering"
1010 条 记 录,以下是251-260 订阅
排序:
DHD: Double Hard Decision Decoding Scheme for NAND Flash Memory
DHD: Double Hard Decision Decoding Scheme for NAND Flash Mem...
收藏 引用
2025 Design, Automation and Test in Europe Conference, DATE 2025
作者: Cui, Lanlan Wang, Yichuan Xiao, Renzhi Li, Miao Liu, Xiaoxue Hei, Xinhong School of Computer Science and Engineering XI'AN University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China School of Software Engineering Jiangxi University of Science and Technology Nanchang China School of Information Engineering Zhongnan University of Economics and Law Wuhan China
With the advancement of NAND flash technology, the increased storage density leads to intensified interference, which in turn raises the error rate during data retrieval. To ensure data reliability, low-density parity... 详细信息
来源: 评论
Prediction of exosomal piRNAs based on deep learning for sequence embedding with attention mechanism
Prediction of exosomal piRNAs based on deep learning for seq...
收藏 引用
2022 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2022
作者: Liu, Yajun Ding, Yulian Li, Aimin Fei, Rong Guo, Xie Wu, Fangxiang Xi'an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China University of Saskatchewan Division of Biomedical Engineering Saskatoon Canada Xi'an University of Technology Shaanxi Key Laboratory of Complex System Control and Intelligent Information Processing Xi'an China University of Saskatchewan Division of Biomedical Engineering Department of Computer Science Department of Mechanical Engineering Saskatoon Canada
PIWI-interacting RNAs (piRNAs) are a type of small non-coding RNAs which bind with the PIWI proteins to exert biological effects in various regulatory mechanisms. A growing amount of evidence reveals that exosomal piR... 详细信息
来源: 评论
FISHFUZZ: catch deeper bugs by throwing larger nets  23
FISHFUZZ: catch deeper bugs by throwing larger nets
收藏 引用
Proceedings of the 32nd USENIX Conference on security Symposium
作者: Han Zheng Jiayuan Zhang Yuhang Huang Zezhong Ren He Wang Chunjie Cao Yuqing Zhang Flavio Toffalini Mathias Payer National Computer Network Intrusion Protection Center University of Chinese Academy of Science and School of Computer and Communication Sciences EPFL National Computer Network Intrusion Protection Center University of Chinese Academy of Science and School of Computer and Communication Lanzhou University of Technology National Computer Network Intrusion Protection Center University of Chinese Academy of Science National Computer Network Intrusion Protection Center University of Chinese Academy of Science and Zhongguancun Laboratory School of Cyber Engineering Xidian University School of Cyberspace Security Hainan University National Computer Network Intrusion Protection Center University of Chinese Academy of Science and Zhongguancun Laboratory and School of Cyberspace Security Hainan University and School of Cyber Engineering Xidian University School of Computer and Communication Sciences EPFL
Fuzzers effectively explore programs to discover bugs. Greybox fuzzers mutate seed inputs and observe their execution. Whenever a seed reaches new behavior (e.g., new code or higher execution frequency), it is stored ...
来源: 评论
MICABAC: Multidimensional Industrial Control Attribute-Based Access Control Model
MICABAC: Multidimensional Industrial Control Attribute-Based...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Hangyu Wang Fei Lv Yuqi Chen Shuaizong Si Zhiwen Pan Degang Sun Limin Sun Beijing Key Laboratory of IOT Information Security Technology Institute of Information Engineering CAS Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Shanghai Tech University Shanghai China Computer Network Information Center Chinese Academy of Sciences Beijing China
As the Industrial Control System (ICS) increasingly merges with the Internet, the security threats have been increasing from internal users and external hackers. These challenges are further intensified by the facts: ... 详细信息
来源: 评论
Cyber Deception System based on Monte Carlo Simulation in the Mobile Edge Computing (MEC)
Cyber Deception System based on Monte Carlo Simulation in th...
收藏 引用
International Conference on computer, Information and Telecommunication Systems (CITS)
作者: Joelle Kabdjou Elie Fute Tagne Danda B. Rawat Jaime Acosta Charles Kamhoua Department of Mathematics and Computer Science University of Dschang Dschang Cameroon Department of Computer Engineering University of Buea Buea Dschang Cameroon Department of Electrical Engineering and Computer Science Howard University Washington USA DEVCOM Army Research Laboratory Network Security Branch Adelphi US
The frequency of malicious activities by cyber attackers is on the rise, posing a significant challenge to counter cyber attacks in the Mobile Edge Computing (MEC) environment. The vulnerability of wireless networks, ...
来源: 评论
On the Effectiveness of Distillation in Mitigating Backdoors in Pre-trained Encoder
arXiv
收藏 引用
arXiv 2024年
作者: Han, Tingxu Huang, Shenghan Ding, Ziqi Sun, Weisong Feng, Yebo Fang, Chunrong Li, Jun Qian, Hanwei Wu, Cong Zhang, Quanjun Liu, Yang Chen, Zhenyu The State Key Laboratory for Novel Software Technology Nanjing University Jiangsu210093 China The School of Computer Science University of New South Wales NSW2052 Australia The School of Computer Science and Engineering Nanyang Technological University Nanyang639798 Singapore The Department of Computer Science The Director of the Network & Security Research Laboratory The University of Oregon United States
With the development of deep learning, self-supervised learning (SSL) has become particularly popular. SSL pre-trains an encoder (e.g., an image encoder) to learn generic features from a large amount of unlabeled data... 详细信息
来源: 评论
Multi-Channel Hypergraph Convolution Group Recommendation with Member Information Enhancement  25
Multi-Channel Hypergraph Convolution Group Recommendation wi...
收藏 引用
25th IEEE International Conferences on High Performance Computing and Communications, 9th International Conference on Data Science and Systems, 21st IEEE International Conference on Smart City and 9th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC/DSS/SmartCity/DependSys 2023
作者: Chen, Tianhao Gao, Qian Fan, Jun Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Shandong Jinan250014 China Qilu University of Technology Shandong Academy of Sciences Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Shandong Jinan250353 China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Shandong Jinan250014 China China Telecom Digital Intelligence Techonology Co Ltd Shandong Jinan250101 China
Group recommendation involves comprehensively considering various aspects, including members and items, to predict the overall interests of a group and recommend suitable items through a recommendation system. With th... 详细信息
来源: 评论
Adaptive Compression-Encryption Scheme for Medical Image Based on Improved Compressive Sensing and Deoxyribonucleic Acid Coding-Compression
Adaptive Compression-Encryption Scheme for Medical Image Bas...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Xianglian Xue Haiyan Jin Changjun Zhou School of Computer Science and Engineering Xi’an University of Technology Xi’an China Section of Computer Teaching and Research Shaanxi University of Chinese Medicine Xianyang China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China School of Computer Science and Technology Zhejiang Normal University Jinhua China
Medical images often occupy large storage space and contain patient privacy or sensitive information, which makes them difficult and unsafe to be transmitted through the network. This paper proposed an adaptive compre... 详细信息
来源: 评论
Social-enhanced recommendation using graph-based contrastive learning  25
Social-enhanced recommendation using graph-based contrastive...
收藏 引用
25th IEEE International Conferences on High Performance Computing and Communications, 9th International Conference on Data Science and Systems, 21st IEEE International Conference on Smart City and 9th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC/DSS/SmartCity/DependSys 2023
作者: Xue, Peng Gao, Qian Fan, Jun Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Shandong Jinan250014 China Qilu University of Technology Shandong Academy of Sciences Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Shandong Jinan250353 China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Shandong Jinan250014 China China Telecom Digital Intelligence Techonology Co Ltd Shandong Jinan250101 China
The social network-based recommendation model use social network information to mitigate data sparsity issues and improve the accuracy of recommendation models. However, In most social network-based recommendation alg... 详细信息
来源: 评论
Shellshock Bash Vulnerability Modeling Analysis Based on Petri Net
Shellshock Bash Vulnerability Modeling Analysis Based on Pet...
收藏 引用
2021 International Conference on networking and network Applications, NaNA 2021
作者: Zhang, Liumei Deng, Xi Wang, Yichuan Xi'an Shiyou University School of Computer Science Xi'an China Xi'an University of Technology School of Computer Science and Engineering Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technolog Xi'an China
The enhancement of Internet connectivity and the increase of information transmission speed yield the increasing frequency of network attacks. The Shellshock attackers often exploit bash vulnerability to read the cont... 详细信息
来源: 评论