咨询与建议

限定检索结果

文献类型

  • 588 篇 会议
  • 412 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,001 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 641 篇 工学
    • 486 篇 计算机科学与技术...
    • 396 篇 软件工程
    • 160 篇 信息与通信工程
    • 125 篇 电气工程
    • 61 篇 网络空间安全
    • 59 篇 电子科学与技术(可...
    • 55 篇 控制科学与工程
    • 52 篇 生物工程
    • 29 篇 安全科学与工程
    • 28 篇 生物医学工程(可授...
    • 26 篇 机械工程
    • 23 篇 仪器科学与技术
    • 22 篇 光学工程
    • 18 篇 交通运输工程
    • 16 篇 动力工程及工程热...
    • 16 篇 建筑学
    • 16 篇 化学工程与技术
  • 275 篇 理学
    • 168 篇 数学
    • 55 篇 生物学
    • 49 篇 物理学
    • 49 篇 统计学(可授理学、...
    • 28 篇 系统科学
    • 16 篇 化学
  • 162 篇 管理学
    • 92 篇 管理科学与工程(可...
    • 76 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 40 篇 法学
    • 24 篇 法学
    • 17 篇 社会学
  • 21 篇 医学
    • 18 篇 临床医学
    • 16 篇 基础医学(可授医学...
  • 15 篇 经济学
  • 14 篇 军事学
  • 6 篇 农学
  • 3 篇 教育学
  • 3 篇 文学

主题

  • 39 篇 feature extracti...
  • 35 篇 semantics
  • 34 篇 cryptography
  • 28 篇 protocols
  • 27 篇 computational mo...
  • 27 篇 security
  • 27 篇 accuracy
  • 26 篇 cloud computing
  • 25 篇 privacy
  • 24 篇 authentication
  • 20 篇 deep learning
  • 20 篇 network security
  • 19 篇 encryption
  • 19 篇 computer network...
  • 18 篇 training
  • 17 篇 data privacy
  • 17 篇 data models
  • 16 篇 neural networks
  • 15 篇 servers
  • 15 篇 federated learni...

机构

  • 67 篇 key laboratory o...
  • 65 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 shaanxi key labo...
  • 37 篇 school of comput...
  • 31 篇 school of cyber ...
  • 30 篇 shaanxi key labo...
  • 29 篇 institute of inf...
  • 22 篇 state key labora...
  • 18 篇 national enginee...
  • 18 篇 shandong fundame...
  • 15 篇 school of comput...
  • 15 篇 college of compu...
  • 15 篇 school of comput...
  • 13 篇 key laboratory o...
  • 13 篇 national compute...
  • 12 篇 shaanxi key labo...
  • 12 篇 national compute...
  • 11 篇 shandong enginee...

作者

  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 19 篇 baojiang cui
  • 18 篇 hei xinhong
  • 13 篇 li wei
  • 12 篇 jianfeng ma
  • 12 篇 xu li
  • 12 篇 yang xiaoyuan
  • 11 篇 jing zhao
  • 11 篇 fu chong
  • 11 篇 wei wei
  • 10 篇 zhang yuqing
  • 10 篇 chen zhong
  • 10 篇 liu jun
  • 10 篇 xiaoxue liu
  • 10 篇 li qi
  • 10 篇 lei zhu
  • 9 篇 wang lei
  • 9 篇 ma jianfeng

语言

  • 902 篇 英文
  • 71 篇 其他
  • 30 篇 中文
检索条件"机构=Network Security Laboratory Computer Engineering"
1001 条 记 录,以下是371-380 订阅
排序:
Emotion Recognition Empowered Human-computer Interaction with Domain Adaptation network
收藏 引用
IEEE Transactions on Consumer Electronics 2024年
作者: Xu, Xu Fu, Chong Chen, Junxin Northeastern University School of Computer Science and Engineering Shenyang110004 China Dalian University of Technology China The School of Software Dalian116621 China Northeastern University School of Computer Science and Engineering Shenyang110004 China Northeastern University Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Shenyang110819 China Ministry of Education Engineering Research Center of Security Technology of Complex Network System Shenyang110004 China Dalian University of Technology School of Software Dalian116621 China
Multi-modal emotion recognition plays a vital role in the human-computer interaction (HCI) for consumer electronics. Nowadays, many studies have developed multi-modal fusion algorithms for this ***, two challenging is... 详细信息
来源: 评论
LEGNN: A Label Ensemble Perspective for Training a Label-Noise-Resistant GNN with Reduced Complexity
arXiv
收藏 引用
arXiv 2024年
作者: Zhao, Rui Shi, Bin Liang, Zhiming Ruan, Jianfei Dong, Bo Lin, Lu School of Computer Science and Technology Xi'an Jiaotong University China Ministry of Education Key Laboratory of Intelligent Networks and Network Security China Shaanxi Province Key Laboratory of Big Data Knowledge Engineering China School of Distance Education Xi'an Jiaotong University China College of Information Sciences and Technology Penn State University United States
Graph Neural networks (GNNs) have been widely employed for semi-supervised node classification tasks on graphs. However, the performance of GNNs is significantly affected by label noise, that is, a small amount of inc... 详细信息
来源: 评论
A Method Based on Hierarchical Spatiotemporal Features for Trojan Traffic Detection
arXiv
收藏 引用
arXiv 2023年
作者: Xie, Jiang Li, Shuhao Zhang, Yongzheng Yun, Xiaochun Li, Jia Institute of Information Engineering Chinese Academy of Sciences Beijing China Key Laboratory of Network Assessment Technology IIE CAS Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China National Computer Network Emergency Response Technical Team Coordination Center of China Beijing China
Trojans are one of the most threatening network attacks currently. HTTP-based Trojan, in particular, accounts for a considerable proportion of them. Moreover, as the network environment becomes more complex, HTTP-base... 详细信息
来源: 评论
An Interactive Attention Mechanism Fusion network for Aspect-Based Multimodal Sentiment Analysis
An Interactive Attention Mechanism Fusion Network for Aspect...
收藏 引用
International Conference on Machine Learning and Cybernetics (ICMLC)
作者: Jinghong Wang Yuan Gao Haokang Li College of Computer and Cyber Security Hebei Normal University Shijiazhuang China Hebei Key Laboratory of Network and Information Security Hebei Normal University Shijiazhuang China Hebei Provincial Engineering Research Center for Supply Chain Big Data Analytics & Data Security Hebei Normal University Shijiazhuang China Hebei Polytechnic Institute College of Artificial Intelligence and Big Data Shijiazhuang China
The goal of aspect-based multimodal sentiment analysis (ABMSA) is to classify the sentiment associated with aspect words in a given context. Most current ABMSA models focus only on general inter-modal information inte...
来源: 评论
Semantic Location Privacy Protection Method Based on Differential Privacy and Temporal Association Under Continuous Query
收藏 引用
International Journal of network security 2023年 第5期25卷 841-848页
作者: Wang, Yonglu Zuo, Kaizhong Pan, Tao Huang, Zhongchun Anhui Technical College Of Mechanical and Electrical Engineering Wuhu241002 China School of Computer and Information Anhui Normal University Wuhu241002 China Anhui Provincial Key Laboratory of Network and Information Security Anhui Normal University Wuhu241002 China
Aiming at problems that the existing location privacy protection methods for continuous query ignore the time distribution of semantic locations and the transfer of semantic locations in the constructed dummy trajecto... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
arXiv
收藏 引用
arXiv 2024年
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado SpringsCO United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab China JinYinHu Laboratory Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
Motion compensation and object detection for neuromorphic camera
Motion compensation and object detection for neuromorphic ca...
收藏 引用
2021 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2021
作者: Wan, Yuxin Fei, Rong Tang, Yu Bai, Xueru Xie, Guo Li, Aimin Xi'An University of Technology School of Computer Science and Engineering Xi'an China Xi'An University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology School of Computer Science and Engineering Xi'an China Xidian University Guangzhou Institute Guangzhou China Xi'An University of Technology School of Computer Science and Engineering Xi'an China Xi'An University of Technology School of Automation and Information Engineering Xi'an China
Compared to conventional cameras, the new type of vision camera-neuromorphic cameras, which can avoid motion blur and have the advantages of high spatiotemporal resolution, high dynamic range, low latency, etc. In thi... 详细信息
来源: 评论
Semantic and Emotional Dual Channel for Emotion Recognition in Conversation
收藏 引用
IEEE Transactions on Affective Computing 2025年
作者: Yang, Zhenyu Zhang, Zhibo Cheng, Yuhu Zhang, Tong Wang, Xuesong Jinan250353 China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250353 China China University of Mining and Technology Engineering Research Center of Intelligent Control for Underground Space Ministry of Education Xuzhou Key Laboratory of Artificial Intelligence and Big Data School of Information and Control Engineering Xuzhou221116 China South China University of Technology Guangdong Provincial Key Laboratory of Computational Intelligence and Cyberspace Information School of Computer Science and Engineering Guangzhou510006 China Pazhou Lab Guangzhou510335 China Engineering Research Center Ministry of Education on Health Intelligent Perception and Paralleled Digital-Human Guangzhou China
Emotion recognition in conversation (ERC) aims at accurately identifying emotional states expressed in conversational content. Existing ERC methods, although relying on semantic understanding, often encounter challeng... 详细信息
来源: 评论
A Web Attack Detection Method Based on DistilBERT and Feature Fusion for Power Micro-Application Server
A Web Attack Detection Method Based on DistilBERT and Featur...
收藏 引用
Advanced Electronics, Electrical and Green Energy (AEEGE), International Conference on
作者: Li Nige Chen Lu Zhao Lei Teng Zhenning Wang Zhiqiang Shao Yiyang Gui Xiaolin State Grid Smart Grid Research Institute Co. Ltd. State Grid Laboratory of Power cyber-Security Protection and Monitoring Technology Nanjing China Shaanxi Province Key Laboratory of Computer Network Faculty of Electronic and Information Engineering Xi’an Jiaotong University Xi’an China
The widespread use of power micro-applications has significantly expanded the attack surface of their server side, thus increasing the risk of vulnerability attacks such as SQL injection, XSS, and CRLF injection. To e...
来源: 评论
Relay-Enabled Backscatter Communications: Linear Mapping and Resource Allocation
arXiv
收藏 引用
arXiv 2023年
作者: Xu, Rui Shi, Liqin Ye, Yinghui Sun, Haijian Zheng, Gan The Shaanxi Key Laboratory of Information Communication Network and Security Xi’an University of Posts & Telecommunications China The School of Electrical and Computer Engineering The University of Georgia AthensGA United States The School of Engineering University of Warwick CoventryCV4 7AL United Kingdom
Relay-enabled backscatter communication (BC) is an intriguing paradigm to alleviate energy shortage and improve throughput of Internet-of-Things (IoT) devices. Most of the existing works focus on the resource allocati... 详细信息
来源: 评论