咨询与建议

限定检索结果

文献类型

  • 589 篇 会议
  • 420 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,010 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 651 篇 工学
    • 494 篇 计算机科学与技术...
    • 400 篇 软件工程
    • 165 篇 信息与通信工程
    • 127 篇 电气工程
    • 62 篇 网络空间安全
    • 61 篇 电子科学与技术(可...
    • 60 篇 控制科学与工程
    • 52 篇 生物工程
    • 28 篇 生物医学工程(可授...
    • 28 篇 安全科学与工程
    • 26 篇 机械工程
    • 24 篇 仪器科学与技术
    • 21 篇 光学工程
    • 17 篇 建筑学
    • 17 篇 交通运输工程
    • 16 篇 动力工程及工程热...
    • 16 篇 化学工程与技术
  • 278 篇 理学
    • 170 篇 数学
    • 56 篇 生物学
    • 50 篇 统计学(可授理学、...
    • 49 篇 物理学
    • 29 篇 系统科学
    • 18 篇 化学
  • 166 篇 管理学
    • 94 篇 管理科学与工程(可...
    • 78 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 40 篇 法学
    • 24 篇 法学
    • 17 篇 社会学
  • 22 篇 医学
    • 19 篇 临床医学
    • 16 篇 基础医学(可授医学...
  • 15 篇 经济学
  • 14 篇 军事学
  • 6 篇 农学
  • 3 篇 教育学
  • 3 篇 文学

主题

  • 38 篇 feature extracti...
  • 35 篇 semantics
  • 34 篇 cryptography
  • 28 篇 protocols
  • 27 篇 computational mo...
  • 27 篇 security
  • 27 篇 accuracy
  • 27 篇 cloud computing
  • 25 篇 privacy
  • 24 篇 authentication
  • 21 篇 deep learning
  • 20 篇 network security
  • 19 篇 encryption
  • 19 篇 computer network...
  • 18 篇 federated learni...
  • 18 篇 training
  • 17 篇 data privacy
  • 17 篇 data models
  • 16 篇 neural networks
  • 15 篇 servers

机构

  • 67 篇 key laboratory o...
  • 65 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 31 篇 school of cyber ...
  • 31 篇 shaanxi key labo...
  • 29 篇 institute of inf...
  • 22 篇 state key labora...
  • 18 篇 national enginee...
  • 18 篇 shandong fundame...
  • 15 篇 school of comput...
  • 15 篇 college of compu...
  • 15 篇 school of comput...
  • 13 篇 key laboratory o...
  • 13 篇 national compute...
  • 12 篇 heilongjiang key...
  • 12 篇 shaanxi key labo...
  • 12 篇 national compute...

作者

  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 19 篇 baojiang cui
  • 18 篇 hei xinhong
  • 13 篇 li wei
  • 13 篇 yang xiaoyuan
  • 12 篇 jianfeng ma
  • 12 篇 xu li
  • 11 篇 jing zhao
  • 11 篇 fu chong
  • 11 篇 lei zhu
  • 11 篇 wei wei
  • 10 篇 zhang yuqing
  • 10 篇 chen zhong
  • 10 篇 liu jun
  • 10 篇 xiaoxue liu
  • 10 篇 li qi
  • 9 篇 wang lei
  • 9 篇 ma jianfeng

语言

  • 907 篇 英文
  • 75 篇 其他
  • 30 篇 中文
检索条件"机构=Network Security Laboratory Computer Engineering"
1010 条 记 录,以下是391-400 订阅
排序:
Neighbor similarity and multimodal alignment based product recommendation study  24
Neighbor similarity and multimodal alignment based product r...
收藏 引用
Proceedings of the Fortieth Conference on Uncertainty in Artificial Intelligence
作者: Zhiqiang Zhang Yongqiang Jiang Qian Gao Zhipeng Wang Key Laboratory of Computing Power Network and information Security Ministry of Eaucation Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China and Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China and Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China China Telecom Digital Intelligence Techonology Co Jinan China
Existing multimodal recommendation research still faces some challenges, such as not being able to fully mine the implicit relevance information of neighbor nodes, and the unreasonable weight allocation to imbalanced ...
来源: 评论
Cross Modal Sentiment Classification of Social Media Based on Meta Heuristic Algorithm
Cross Modal Sentiment Classification of Social Media Based o...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Wantong Du Wanli Min Yushui Geng Hu Liang Hehu Zhou Ministry of Education Shandong Computer Science Center Key Laboratory of Computing Power Network and Information Security Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Synthesis Electronic Technology Co. Ltd
The evolution of online social media has reshaped public behaviors, and social data infused with emotions provides crucial decision support for sentiment analysis tasks. Conventional multimodal approaches, influenced ... 详细信息
来源: 评论
Similarity Algorithm Based on Minimum Tilt Outer Rectangle Clustering of UAV Videos
Similarity Algorithm Based on Minimum Tilt Outer Rectangle C...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Wei Ding Luyao Wang Wei Zhang Myung Jin Lee Ling Wang Kwang Woo Nam Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Industry-University Cooperstion Foundation Chungbuk National University Cheongju Korea School of Computer Science Northeast Electric Power University Jilin China School of Computer Science and Engineering Kunsan National University Gunsan Korea
In this paper, we propose a new UAV video similarity measurement algorithm to cluster and analyze UAV videos by measuring the similarity between UAV videos and train them in sub-groups, which in turn improves the effi... 详细信息
来源: 评论
ATEDU-NET: An Attention-Embedded Deep Unet for multi-disease diagnosis in chest X-ray images, breast ultrasound, and retina fundus
收藏 引用
computers in Biology and Medicine 2025年 186卷 109708-109708页
作者: Ejiyi, Chukwuebuka Joseph Qin, Zhen Agbesi, Victor K. Ejiyi, Makuachukwu Bennedith Chikwendu, Ijeoma A. Bamisile, Oluwatoyosi F. Onyekwere, Favour Ezinne Bamisile, Olusola O. College of Nuclear Technology and Automation Engineering Chengdu University of Technology Sichuan 610059 China Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Sichuan Chengdu China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China Pharmacy Department University of Nigeria Nsukka Enugu State Nsukka Nigeria School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu China
In image segmentation for medical image analysis, effective upsampling is crucial for recovering spatial information lost during downsampling. This challenge becomes more pronounced when dealing with diverse medical i... 详细信息
来源: 评论
A Heterogeneous Graph Attention network-Based Web Service Link Prediction  3
A Heterogeneous Graph Attention Network-Based Web Service Li...
收藏 引用
3rd International Conference on computer Communication and the Internet, ICCCI 2021
作者: He, Wenhui Xia, Chunhe Li, Zhong Liu, Xiaochen Wang, Tianbo Beijing Key Laboratory of Network Technology Beijing China School of Computer Science and Engineering Beihang University Beijing China Guangxi Key Laboratory of Multi-Source Information Mining and Security School of Computer Science and Information Technology Guangxi Normal University Guilin China School of Cyber Science and Technology Beihang University Beijing China
With the rise of service computing, the increasing number and diversity of web services make it an intractable task to search for suitable services. Service composition, service selection and recommendation have becom... 详细信息
来源: 评论
MSONoC: A Metasurface-assisted Hybrid Waveguide/FSO network-on-Chip Architecture
IEEE Transactions on Green Communications and Networking
收藏 引用
IEEE Transactions on Green Communications and networking 2024年
作者: Sun, Wei Li, Jingsi Guo, Pengxing He, Xiangyu Wang, Zimo Hu, Cong Liu, Weichen Hou, Weigang Guo, Lei School of Communications and Information Engineering Chongqing University of Posts and Telecommunications Chongqing400065 China Institute of Intelligent Communications and Network Security Chongqing University of Posts and Telecommunications Chongqing400065 China Key Laboratory of Big Data Intelligent Computing Chongqing University of Posts and Telecommunications Chongqing400065 China Guangxi Key Laboratory of Automatic Detecting Technology and Instruments Guilin University of Electronic Technology Guilin541004 China School of Computer Science and Engineering Nanyang Technological University Singapore
Optical networks-on-chips (ONoCs) have emerged as the most promising solution for on-chip interconnection networks, offering distinct advantages such as high bandwidth and low latency. However, traditional wired-based... 详细信息
来源: 评论
FusionTC: Encrypted App Traffic Classification Using Decision-Level Multimodal Fusion Learning of Flow Sequence
收藏 引用
Wireless Communications and Mobile Computing 2023年 第1期2023卷
作者: Li, Shengbao Huang, Yuchuan Gao, Tianye Yang, Lanqi Chen, Yige Pan, Quanbo Zang, Tianning Chen, Fei Institute of Information Engineering Chinese Academy of Sciences Beijing100045 China School of Cyber Security University of Chinese Academy of Sciences Beijing101408 China National Computer Network Emergency Response Technical Team/Coordination Center of China Shandong Branch Jinan250004 China Ministry of Emergency Management Big Data Center Beijing100010 China Anhui Provincial Key Laboratory of Network and Information Security Anhui Normal University Anhui Wuhu240002 China College of Computer Science and Artificial Intelligence Wenzhou University Wenzhou325000 China National Computer Network Emergency Response Technical Team/Coordination Center of China Xinjiang Branch Urumqi830000 China
In recent years, an increasing number of mobile platforms and applications have adopted traffic encryption protocol technology to ensure privacy and security. Existing researches on encrypted traffic identification ap... 详细信息
来源: 评论
Several new classes of optimal ternary cyclic codes with two or three zeros
arXiv
收藏 引用
arXiv 2024年
作者: Wu, Gaofei You, Zhuohui Zha, Zhengbang Zhang, Yuqing The State Key Laboratory of Integrated Service Networks School of Cyber Engineering Xidian University Xi’an710071 China The Advanced Cryptography System Security Key Laboratory of Sichuan Province China The College of Mathematics and System Sciences Xinjiang University Urumqi830046 China The National Computer Network Intrusion Protection Center University of Chinese Academy of Sciences Beijing101408 China
Cyclic codes are a subclass of linear codes and have wide applications in data storage systems, communication systems and consumer electronics due to their efficient encoding and decoding algorithms. Let α be a gener... 详细信息
来源: 评论
Detecting Unknown HTTP-based Malicious Communication Behavior via Generated Adversarial Flows and Hierarchical Traffic Features
arXiv
收藏 引用
arXiv 2023年
作者: Yun, Xiaochun Xie, Jiang Li, Shuhao Zhang, Yongzheng Sun, Peishuai National Computer Network Emergency Response Technical Team Coordination Center of China Beijing China Institute of Information Engineering Chinese Academy of Sciences Beijing China Key Laboratory of Network Assessment Technology University of Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China
Malicious communication behavior is the network communication behavior generated by malware (botnet, spyware, etc.) after victim devices are infected. Experienced adversaries often hide malicious information in HTTP t... 详细信息
来源: 评论
HSTF-Model: an HTTP-based Trojan Detection Model via the Hierarchical Spatio-Temporal Features of Traffics
arXiv
收藏 引用
arXiv 2023年
作者: Xie, Jiang Li, Shuhao Yun, Xiaochun Zhang, Yongzheng Chang, Peng Institute of Information Engineering Chinese Academy of Sciences Beijing China Key Laboratory of Network Assessment Technology University of Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China National Computer Network Emergency Response Technical Team/Coordination Center of China Beijing China
HTTP-based Trojan is extremely threatening, and it is difficult to be effectively detected because of its concealment and confusion. Previous detection methods usually are with poor generalization ability due to outda... 详细信息
来源: 评论