咨询与建议

限定检索结果

文献类型

  • 589 篇 会议
  • 420 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,010 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 651 篇 工学
    • 494 篇 计算机科学与技术...
    • 400 篇 软件工程
    • 165 篇 信息与通信工程
    • 127 篇 电气工程
    • 62 篇 网络空间安全
    • 61 篇 电子科学与技术(可...
    • 60 篇 控制科学与工程
    • 52 篇 生物工程
    • 28 篇 生物医学工程(可授...
    • 28 篇 安全科学与工程
    • 26 篇 机械工程
    • 24 篇 仪器科学与技术
    • 21 篇 光学工程
    • 17 篇 建筑学
    • 17 篇 交通运输工程
    • 16 篇 动力工程及工程热...
    • 16 篇 化学工程与技术
  • 278 篇 理学
    • 170 篇 数学
    • 56 篇 生物学
    • 50 篇 统计学(可授理学、...
    • 49 篇 物理学
    • 29 篇 系统科学
    • 18 篇 化学
  • 166 篇 管理学
    • 94 篇 管理科学与工程(可...
    • 78 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 40 篇 法学
    • 24 篇 法学
    • 17 篇 社会学
  • 22 篇 医学
    • 19 篇 临床医学
    • 16 篇 基础医学(可授医学...
  • 15 篇 经济学
  • 14 篇 军事学
  • 6 篇 农学
  • 3 篇 教育学
  • 3 篇 文学

主题

  • 38 篇 feature extracti...
  • 35 篇 semantics
  • 34 篇 cryptography
  • 28 篇 protocols
  • 27 篇 computational mo...
  • 27 篇 security
  • 27 篇 accuracy
  • 27 篇 cloud computing
  • 25 篇 privacy
  • 24 篇 authentication
  • 21 篇 deep learning
  • 20 篇 network security
  • 19 篇 encryption
  • 19 篇 computer network...
  • 18 篇 federated learni...
  • 18 篇 training
  • 17 篇 data privacy
  • 17 篇 data models
  • 16 篇 neural networks
  • 15 篇 servers

机构

  • 67 篇 key laboratory o...
  • 65 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 31 篇 school of cyber ...
  • 31 篇 shaanxi key labo...
  • 29 篇 institute of inf...
  • 22 篇 state key labora...
  • 18 篇 national enginee...
  • 18 篇 shandong fundame...
  • 15 篇 school of comput...
  • 15 篇 college of compu...
  • 15 篇 school of comput...
  • 13 篇 key laboratory o...
  • 13 篇 national compute...
  • 12 篇 heilongjiang key...
  • 12 篇 shaanxi key labo...
  • 12 篇 national compute...

作者

  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 19 篇 baojiang cui
  • 18 篇 hei xinhong
  • 13 篇 li wei
  • 13 篇 yang xiaoyuan
  • 12 篇 jianfeng ma
  • 12 篇 xu li
  • 11 篇 jing zhao
  • 11 篇 fu chong
  • 11 篇 lei zhu
  • 11 篇 wei wei
  • 10 篇 zhang yuqing
  • 10 篇 chen zhong
  • 10 篇 liu jun
  • 10 篇 xiaoxue liu
  • 10 篇 li qi
  • 9 篇 wang lei
  • 9 篇 ma jianfeng

语言

  • 907 篇 英文
  • 75 篇 其他
  • 30 篇 中文
检索条件"机构=Network Security Laboratory Computer Engineering"
1010 条 记 录,以下是311-320 订阅
排序:
Risk Modeling and Traceability of Boundary Attacks on Internet of Power Systems Based on Complex networks  9
Risk Modeling and Traceability of Boundary Attacks on Intern...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Li, Xin Qu, Zhaoyang Yu, Tong Xie, Ming Yu, Fu Ding, Wei Northeast Electric Power University School of Electrical Engineering Jilin132012 China People's Bank of China Qinghai Provincial Branch Xining810000 China China Southern Power Grid Guangxi Power Grid Co. Ltd. Research Institute Nanning530023 China China Guizhou Power Grid Co. Ltd. Bijie Power Supply Bureau Bijie551700 China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan250014 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan250014 China
With the increasing intelligence of power IoT terminal devices, the massive volume of data transmission, and the widespread adoption of shared services, traditional terminal boundary security mechanisms are unable to ... 详细信息
来源: 评论
Few-shot Open Relation Extraction with Gaussian Prototype and Adaptive Margin
arXiv
收藏 引用
arXiv 2024年
作者: Guo, Tianlin Zhang, Lingling Wang, Jiaxin Lei, Yunkuo Li, Yifei Wang, Haofen Liu, Jun School of Computer Science and Technology Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi'an Jiaotong University Xi’an710049 China School of Computer Science and Technology Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Xi'an Jiaotong University Xi’an710049 China College of Design and Innovation Tongji University Shanghai200092 China
Few-shot relation extraction with none-of-the-above (FsRE with NOTA) aims at predicting labels in few-shot scenarios with unknown classes. FsRE with NOTA is more challenging than the conventional few-shot relation ext... 详细信息
来源: 评论
EventTrojan: Manipulating Non-Intrusive Speech Quality Assessment via Imperceptible Events
EventTrojan: Manipulating Non-Intrusive Speech Quality Asses...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Ying Ren Kailai Shen Zhe Ye Diqun Yan Faculty of Electrical Engineering and Computer Science Ningbo University Ningbo China Juphoon System Software Co. Ltd Ningbo China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology (Shandong Academy of Sciences) China
Non-Intrusive speech quality assessment (NISQA) has gained significant attention for predicting speech’s mean opinion score (MOS) without requiring the reference speech. Researchers have gradually started to apply NI... 详细信息
来源: 评论
Learning Together Securely: Prototype-Based Federated Multi-Modal Hashing for Safe and Efficient Multi-Modal Retrieval  39
Learning Together Securely: Prototype-Based Federated Multi-...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Zuo, Ruifan Zheng, Chaoqun Zhu, Lei Lu, Wenpeng Xiang, Yuanyuan Li, Zhao Qu, Xiaofeng Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology Shandong Academy of Sciences China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science China School of Electronic and Information Engineering Tongji University China Shandong Branch of National Computer Network Emergency Response Technical Team Coordination Center (CNCERT/SD) China Evay Info China School of Information Science and Engineering University of Jinan China
With the proliferation of multi-modal data, safe and efficient multi-modal hashing retrieval has become a pressing research challenge, particularly due to concerns over data privacy during centralized processing. To a... 详细信息
来源: 评论
A Targeted Adversarial Attack Method for Multi-Classification Malicious Traffic Detection
A Targeted Adversarial Attack Method for Multi-Classificatio...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Peishuai Sun Chengxiang Si Shuhao Li Zhenyu Cheng Shuyuan Zhao Qingyun Liu Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China National Computer Network Emergency Response Technical Team Coordination Center of China Beijing China Zhongguancun Laboratory Beijing China
Leveraging deep learning to detect malicious network traffic is a crucial technology in network management and network security. However, deep learning security has raised concerns among scholars. In this work, we exp...
来源: 评论
Impact of Hardware Impairments on Covert Cooperative Backscatter Communications
Impact of Hardware Impairments on Covert Cooperative Backsca...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Huan Li Yinghui Ye Lu Lv Guangyue Lu Naofal Al-Dhahir Shaanxi information communication network and security Laboratory Xi'an University of Posts and Telecommunications Xi'an China State Key Laboratory of Integrated Services Networks Xidian University Xi'an China Department of Electrical and Computer Engineering The University of Texas at Dallas Richardson TX USA
In this paper, we investigate a covert cooperative backscatter communication (BackCom) network under residual hardware impairments (RHIs) that are unavoidable in practical radio frequency transceivers and may have an ...
来源: 评论
Long and Recent Preference Learning with Recent-k Items Distribution for Recommender System
收藏 引用
IEEE Transactions on Multimedia 2025年
作者: Gao, Yongbiao Niu, Sijie Lv, Guohua Ling, Miaogen Geng, Xin Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Jinan China Southeast University Ministry of Education Key Laboratory of New Generation Artificial Intelligence Technology and Its Interdisciplinary Application China University of Jinan Shandong Provincial Key Laboratory of Ubiquitous Intelligent Computing School of Information Science and Engineering China Nanjing University of Information Science and Technology School of Computer Science China Southeast University School of Computer Science and Engineering China
Reinforcement learning (RL) aims to formulate the recommendation task as a Markov decision process (MDP) and trains an agent to automatically learn the optimal recommendation policy from interaction trajectories throu... 详细信息
来源: 评论
Research on security Assessment of Cross Border Data Flow  1
收藏 引用
4th International Conference on Frontiers in Cyber security, FCS 2021
作者: Na, Wang Gaofei, Wu Qiuling, Yue Jinglu, Hu Zhang, Yuqing Guangzhou Research Institute of Technology Xidian University Xi’an China Guangxi Key Laboratory of Cryptography and Information Security Guilin China School of Cyberspace Security Hainan University Haikou China Graduate School of Information Production and Systems Waseda University Honjo China National Computer Network Intrusion Prevention Center University of Chinese Academy of Sciences Beijing China School of Cyber Engineering Xidian University Xi’an China
At present, the trend of cross-border data flow is inevitable. Therefore, as the liquidity demand for cross-border data increases, the issues related to national security and the protection of personal data are gradua... 详细信息
来源: 评论
Vulnerable Smart Contract Function Locating Based on Multi-Relational Nested Graph Convolutional network
arXiv
收藏 引用
arXiv 2023年
作者: Liu, Haiyang Fan, Yuqi Feng, Lin Wei, Zhenchun School of Computer Science and Information Engineering Anhui Province Key Laboratory of Industry Safety and Emergency Technology Hefei University of Technology Hefei230601 China Anhui Provincial Key Laboratory of Network and Information Security Anhui Normal Unviersity Wuhu241002 China
The immutable and trustable characteristics of blockchain enable smart contracts to be applied in various fields. Unfortunately, smart contracts are subject to various vulnerabilities, which are frequently exploited b... 详细信息
来源: 评论
Generating Action-conditioned Prompts for Open-vocabulary Video Action Recognition  24
Generating Action-conditioned Prompts for Open-vocabulary Vi...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Jia, Chengyou Luo, Minnan Chang, Xiaojun Dang, Zhuohang Han, Mingfei Wang, Mengmeng Dai, Guang Dang, Sizhe Wang, Jingdong School of Computer Science and Technology MOEKLINNS Lab Xi'an Jiaotong University Shaanxi Xi'an China University of Science and Technology of China Anhui Hefei China School of Computer Science and Technology Xi'an Jiaotong University Shaanxi Xi'an China ReLER Lab AAII University of Technology Sydney SydneyNSW Australia Zhejiang University of Technology College of Computer Science and Technology China SGIT AI Lab State Grid Corporation of China Beijing China Baidu Inc Beijing China United Arab Emirates Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Xi'an Jiaotong University Xi'an710049 China SGIT AI Lab State Grid Corporation of China China School of Computer Science and Technology Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an710049 China
Exploring open-vocabulary video action recognition is a promising venture, which aims to recognize previously unseen actions within any arbitrary set of categories. Existing methods typically adapt pretrained image-te... 详细信息
来源: 评论