咨询与建议

限定检索结果

文献类型

  • 589 篇 会议
  • 420 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,010 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 651 篇 工学
    • 494 篇 计算机科学与技术...
    • 400 篇 软件工程
    • 165 篇 信息与通信工程
    • 127 篇 电气工程
    • 62 篇 网络空间安全
    • 61 篇 电子科学与技术(可...
    • 60 篇 控制科学与工程
    • 52 篇 生物工程
    • 28 篇 生物医学工程(可授...
    • 28 篇 安全科学与工程
    • 26 篇 机械工程
    • 24 篇 仪器科学与技术
    • 21 篇 光学工程
    • 17 篇 建筑学
    • 17 篇 交通运输工程
    • 16 篇 动力工程及工程热...
    • 16 篇 化学工程与技术
  • 278 篇 理学
    • 170 篇 数学
    • 56 篇 生物学
    • 50 篇 统计学(可授理学、...
    • 49 篇 物理学
    • 29 篇 系统科学
    • 18 篇 化学
  • 166 篇 管理学
    • 94 篇 管理科学与工程(可...
    • 78 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 40 篇 法学
    • 24 篇 法学
    • 17 篇 社会学
  • 22 篇 医学
    • 19 篇 临床医学
    • 16 篇 基础医学(可授医学...
  • 15 篇 经济学
  • 14 篇 军事学
  • 6 篇 农学
  • 3 篇 教育学
  • 3 篇 文学

主题

  • 38 篇 feature extracti...
  • 35 篇 semantics
  • 34 篇 cryptography
  • 28 篇 protocols
  • 27 篇 computational mo...
  • 27 篇 security
  • 27 篇 accuracy
  • 27 篇 cloud computing
  • 25 篇 privacy
  • 24 篇 authentication
  • 21 篇 deep learning
  • 20 篇 network security
  • 19 篇 encryption
  • 19 篇 computer network...
  • 18 篇 federated learni...
  • 18 篇 training
  • 17 篇 data privacy
  • 17 篇 data models
  • 16 篇 neural networks
  • 15 篇 servers

机构

  • 67 篇 key laboratory o...
  • 65 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 31 篇 school of cyber ...
  • 31 篇 shaanxi key labo...
  • 29 篇 institute of inf...
  • 22 篇 state key labora...
  • 18 篇 national enginee...
  • 18 篇 shandong fundame...
  • 15 篇 school of comput...
  • 15 篇 college of compu...
  • 15 篇 school of comput...
  • 13 篇 key laboratory o...
  • 13 篇 national compute...
  • 12 篇 heilongjiang key...
  • 12 篇 shaanxi key labo...
  • 12 篇 national compute...

作者

  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 19 篇 baojiang cui
  • 18 篇 hei xinhong
  • 13 篇 li wei
  • 13 篇 yang xiaoyuan
  • 12 篇 jianfeng ma
  • 12 篇 xu li
  • 11 篇 jing zhao
  • 11 篇 fu chong
  • 11 篇 lei zhu
  • 11 篇 wei wei
  • 10 篇 zhang yuqing
  • 10 篇 chen zhong
  • 10 篇 liu jun
  • 10 篇 xiaoxue liu
  • 10 篇 li qi
  • 9 篇 wang lei
  • 9 篇 ma jianfeng

语言

  • 907 篇 英文
  • 75 篇 其他
  • 30 篇 中文
检索条件"机构=Network Security Laboratory Computer Engineering"
1010 条 记 录,以下是261-270 订阅
排序:
From Scarcity to Clarity: Few-Shot Learning for DoH Tunnel Detection Through Prototypical network
From Scarcity to Clarity: Few-Shot Learning for DoH Tunnel D...
收藏 引用
IEEE International Conference on Trust, security and Privacy in Computing and Communications (TrustCom)
作者: Beibei Feng Qi Wang Xiaolin Xu Yijing Wang Tianning Zang Jingrun Ma Institute of Information Engineering Chinese Academy of Sciences China School of Cyber Security University of Chinese Academy of Sciences China National Computer Network Emergency Response Technical Team Coordination Center of China China Zhongguancun Laboratory China
The widespread adoption of DNS over HTTPS (DoH) has introduced significant challenges in network security, particularly the emergence of DoH tunnels. Existing methods, reliant on large labeled datasets, struggle to ad... 详细信息
来源: 评论
A Quantum Temporal Difference Learning Method Based on Quantum World Model
A Quantum Temporal Difference Learning Method Based on Quant...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Peigen Zeng Ying He F. Richard Yu Jianbo Du College of Computer Science and Software Engineering Shenzhen University Shenzhen China Shaanxi Key Laboratory of Information Communication Network and Security Xi’an University of Posts and Telecommunications Xi’an China School of Information Technology Carleton University Ottawa Canada
Based on quantum parallelism theory and quantum phenomena such as superposition and entanglement, quantum reinforcement learning (QRL) has the potential to surpass classical reinforcement learning (RL). Although some ... 详细信息
来源: 评论
Map2Schedule: An End-to-End Link Scheduling Method for Urban V2V Communications
Map2Schedule: An End-to-End Link Scheduling Method for Urban...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Lihao Zhang Haijian Sun Jin Sun Ramviyas Parasuraman Yinghui Ye Rose Qingyang Hu School of Electrical and Computer Engineering University of Georgia Athens GA USA School of Computing University of Georgia Athens GA USA Shanxi Key Laboratory of Information Communication Network and Security Xi'an University of Posts & Telecommunications China Electrical and Computer Engineering Department at Utah State University Logan UT USA
Urban vehicle-to-vehicle (V2V) link scheduling with shared spectrum is a challenging problem. Its main goal is to find the scheduling policy that can maximize system performance (usually the sum capacity of each link ... 详细信息
来源: 评论
SML: A Backdoor Defense for Non-Intrusive Speech Quality Assessment via Semi-Supervised and Multi-Task Learning
SML: A Backdoor Defense for Non-Intrusive Speech Quality Ass...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Ying Ren Wenjie Zhang Jiahong Ye Jie Li Diqun Yan Bin Ma Faculty of Electrical Engineering and Computer Science Ningbo University Ningbo China College of Digital Technology and Engineering Ningbo University of Finance and Economics Ningbo China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology (Shandong Academy of Sciences) China
Non-intrusive speech quality assessment (NISQA) is widely used in speech downstream tasks due to its ability to predict the quality of speech without a reference speech. However, few researchers have focused on the ba... 详细信息
来源: 评论
Fault Diagnosis for Rolling Bearing Based on RF-LSTM
Fault Diagnosis for Rolling Bearing Based on RF-LSTM
收藏 引用
2021 CAA Symposium on Fault Detection, Supervision, and Safety for Technical Processes, SAFEPROCESS 2021
作者: Li, Qiuting Wang, Xiuqing Yang, Yunpeng Wang, Ruiyi Lv, Feng Hebei Normal University College of Computer and Cyber Security Shijiazhuang050024 China Hebei Provincial Key Laboratory of Network & Information Security Shijiazhuang China Hebei Provincial Engineering Research Center for Supply Chain Big Data Analytics & Data Security Shijiazhuang China
In the era of big data, it is of great significance to study data-driven fault diagnostic methods for equipment in complex industrial environments. In this paper, a data-driven fault diagnostic method for rolling bear... 详细信息
来源: 评论
An Auto-Parallel Method for Deep Learning Models Based on Genetic Algorithm  29
An Auto-Parallel Method for Deep Learning Models Based on Ge...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Zeng, Yan Huang, Chengchuang Ni, Yijie Zhou, Chunbao Zhang, Jilin Wang, Jue Zhou, Mingyao Xue, Meiting Zhang, Yunquan Hangzhou Dianzi University School of Computer Science and Technology Hangzhou310018 China Ministry of Education Key Laboratory for Modeling and Simulation of Complex Systems Hangzhou310018 China Data Security Governance Zhejiang Engineering Research Center Hangzhou310018 China Hangzhou Dianzi University School of ITMO Joint Institute Hangzhou310018 China Institute of Computer Network Information Center of the Chinese Academy of Sciences Beijing100086 China HuaWei China Institute of Computing Technology of the Chinese Academy of Sciences State Key Laboratory of Computer Architecture Beijing100086 China
As the size of datasets and neural network models increases, automatic parallelization methods for models have become a research hotspot in recent years. The existing auto-parallel methods based on machine learning or... 详细信息
来源: 评论
A Novel Lightweight Dynamic Trust Evaluation Model for Edge Computing
收藏 引用
IEEE Transactions on network and Service Management 2025年
作者: Yang, Hao Guo, Liangmin Wang, Taochun Lv, Chengmei Anhui Technical College of Mechanical and Electrical Engineering School of Internet and Communication Wuhu241003 China Anhui Normal University School of Computer and Information Wuhu241003 China Anhui Provincial Key Laboratory of Network and Information Security Wuhu241003 China
The temporal decay of trust data in dynamic edge computing environments leads to inaccurate evaluation, and the recommended trust values from heterogeneous nodes are affected by subjective bias and are vulnerable to m... 详细信息
来源: 评论
Cerebrovascular segmentation from mesoscopic optical images using Swin Transformer
收藏 引用
Journal of Innovative Optical Health Sciences 2023年 第4期16卷 120-133页
作者: Yuxin Li Qianlong Zhang Hang Zhou Junhuai Li Xiangning Li Anan Li Shaanxi Key Laboratory for Network Computing and Security Technology School of Computer Science and Engineering Xi'an University of Technology Xi'an 710048P.R.China School of Computer Science Chengdu University of Information Technology Chengdu 610225P.R.China Britton Chance Center for Biomedical Photonics Wuhan National Laboratory for Optoelectronics MoE Key Laboratory for Biomedical Photonics Huazhong University of Science and Technology Wuhan 430074 P.R.China HUST-Suzhou Institute for Brainsmatics Suzhou 215123 P.R.China
Vascular segmentation is a crucial task in biomedical image processing,which is significant for analyzing and modeling vascular networks under physiological and pathological *** advances in fluorescent labeling and me... 详细信息
来源: 评论
A 3D Memristive Cubic Map with Dual Discrete Memristors: Design, Implementation, and Application in Image Encryption
收藏 引用
IEEE Transactions on Circuits and Systems for Video Technology 2025年
作者: Gao, Suo Iu, Herbert Ho-Ching Erkan, Ugur Simsek, Cemaleddin Toktas, Abdurrahim Cao, Yinghong Wu, Rui Mou, Jun Li, Qi Wang, Chunpeng Dalian Polytechnic University School of Information Science and Engineering Dalian116034 China The University of Western Australia School of Electrical Electronic and Computer Engineering Perth6009 Australia Faculty of Engineering Electrical and Electronics Engineering Respectively Karamanoglu Mehmetbey University Karaman70200 Turkey Ankara University Engineering Faculty Department of Artificial Intelligence and Data Engineering Ankara06830 Turkey Harbin Institute of Technology School of Computer Science and Technology Harbin150001 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan250000 China
Discrete chaotic systems based on memristors exhibit excellent dynamical properties and are more straightforward to implement in hardware, making them highly suitable for generating cryptographic keystreams. However, ... 详细信息
来源: 评论
A Fault Diagnostic Method for Rolling Bearings Based on CAR-SNN Model
A Fault Diagnostic Method for Rolling Bearings Based on CAR-...
收藏 引用
Fault Detection, Supervision and Safety for Technical Processes (SAFEPROCESS), CAA Symposium on
作者: Qiuting Li Xiuqing Wang Wenxia Du College of Computer and Cyber Security Hebei Normal University Shijiazhuang China Hebei Provincial Key Laboratory of Network & Information Security Shijiazhuang China Hebei Provincial Engineering Research Center for Supply Chain Big Data Analytics & Data Security Shijiazhuang China College of China Combustion Engineering Hebei Normal University Shijiazhuang China
In the era of big data, high-performance rolling bearing fault diagnostic methods are of great significance to ensure manufacturing smoothly and avoid mass economic losses. A rolling bearing fault diagnostic CAR-SNN m...
来源: 评论