咨询与建议

限定检索结果

文献类型

  • 588 篇 会议
  • 412 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,001 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 641 篇 工学
    • 486 篇 计算机科学与技术...
    • 396 篇 软件工程
    • 160 篇 信息与通信工程
    • 125 篇 电气工程
    • 61 篇 网络空间安全
    • 59 篇 电子科学与技术(可...
    • 55 篇 控制科学与工程
    • 52 篇 生物工程
    • 29 篇 安全科学与工程
    • 28 篇 生物医学工程(可授...
    • 26 篇 机械工程
    • 23 篇 仪器科学与技术
    • 22 篇 光学工程
    • 18 篇 交通运输工程
    • 16 篇 动力工程及工程热...
    • 16 篇 建筑学
    • 16 篇 化学工程与技术
  • 275 篇 理学
    • 168 篇 数学
    • 55 篇 生物学
    • 49 篇 物理学
    • 49 篇 统计学(可授理学、...
    • 28 篇 系统科学
    • 16 篇 化学
  • 162 篇 管理学
    • 92 篇 管理科学与工程(可...
    • 76 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 40 篇 法学
    • 24 篇 法学
    • 17 篇 社会学
  • 21 篇 医学
    • 18 篇 临床医学
    • 16 篇 基础医学(可授医学...
  • 15 篇 经济学
  • 14 篇 军事学
  • 6 篇 农学
  • 3 篇 教育学
  • 3 篇 文学

主题

  • 39 篇 feature extracti...
  • 35 篇 semantics
  • 34 篇 cryptography
  • 28 篇 protocols
  • 27 篇 computational mo...
  • 27 篇 security
  • 27 篇 accuracy
  • 26 篇 cloud computing
  • 25 篇 privacy
  • 24 篇 authentication
  • 20 篇 deep learning
  • 20 篇 network security
  • 19 篇 encryption
  • 19 篇 computer network...
  • 18 篇 training
  • 17 篇 data privacy
  • 17 篇 data models
  • 16 篇 neural networks
  • 15 篇 servers
  • 15 篇 federated learni...

机构

  • 67 篇 key laboratory o...
  • 65 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 shaanxi key labo...
  • 37 篇 school of comput...
  • 31 篇 school of cyber ...
  • 30 篇 shaanxi key labo...
  • 29 篇 institute of inf...
  • 22 篇 state key labora...
  • 18 篇 national enginee...
  • 18 篇 shandong fundame...
  • 15 篇 school of comput...
  • 15 篇 college of compu...
  • 15 篇 school of comput...
  • 13 篇 key laboratory o...
  • 13 篇 national compute...
  • 12 篇 shaanxi key labo...
  • 12 篇 national compute...
  • 11 篇 shandong enginee...

作者

  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 19 篇 baojiang cui
  • 18 篇 hei xinhong
  • 13 篇 li wei
  • 12 篇 jianfeng ma
  • 12 篇 xu li
  • 12 篇 yang xiaoyuan
  • 11 篇 jing zhao
  • 11 篇 fu chong
  • 11 篇 wei wei
  • 10 篇 zhang yuqing
  • 10 篇 chen zhong
  • 10 篇 liu jun
  • 10 篇 xiaoxue liu
  • 10 篇 li qi
  • 10 篇 lei zhu
  • 9 篇 wang lei
  • 9 篇 ma jianfeng

语言

  • 902 篇 英文
  • 71 篇 其他
  • 30 篇 中文
检索条件"机构=Network Security Laboratory Computer Engineering"
1001 条 记 录,以下是431-440 订阅
排序:
GAF-GAN: Gated Attention Feature Fusion Image Inpainting network Based on Generative Adversarial network
GAF-GAN: Gated Attention Feature Fusion Image Inpainting Net...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Ran Qiu Hu Liang Yuchen Liu Shengrong Zhao Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Image inpainting, which aims to reconstruct reasonably clear and realistic images from known pixel information, is one of the core problems in computer vision. However, due to the complexity and variability of the und...
来源: 评论
Joint Beamforming Design for Integrated Sensing and Communication Systems with Hybrid-Colluding Eavesdroppers
收藏 引用
IEEE Transactions on Communications 2025年
作者: Liu, Meiding Zhou, Zhengchun Shi, Qiao Li, Guyue Liu, Zilong Fan, Pingzhi Lee, Inkyu Southwest Jiaotong University School of Information Science and Technology Chengdu611756 China Key Laboratory of Analytical Mathematics and Applications China Southeast University School of Cyber Science and Engineering Nanjing210096 China Purple Mountain Laboratories for Network and Communication Security Nanjing210096 China University of Essex School of Computer Science and Electronics Engineering ColchesterCO4 3SQ United Kingdom Southwest Jiaotong University Key Laboratory of Information Coding and Transmission Chengdu611756 China Korea University School of Electrical Engineering Seoul02841 Korea Republic of
In this paper, we consider the physical layer security (PLS) problem for integrated sensing and communication (ISAC) systems in the presence of hybrid-colluding eavesdroppers, where an active eavesdropper (AE) and a p... 详细信息
来源: 评论
Towards Efficient Fine-Grained Access Control and Data Privacy Protection for Smart Home  14th
Towards Efficient Fine-Grained Access Control and Data Priva...
收藏 引用
14th EAI International Conference on Mobile Multimedia Communications, Mobimedia 2021
作者: Shen, Shuaiyong Yang, Yang Ying, Zuobin Liu, Ximeng College of Mathematics and Computer Science Fuzhou University Fuzhou350108 China Fujian Provincial Key Laboratory of Information Security of Network Systems Fuzhou University Fuzhou350108 China School of Electrical and Electronic Engineering Nanyang Technological University Nanyang639798 Singapore
Fine-grained access control become a research spotlight in the scenario of the smart home with Internet-of-Things (IoTs). However, most of the existing works could only realize ciphertext outsourcing with an unchangea... 详细信息
来源: 评论
Semantic-Enhanced Attention network for Image-Text Matching
Semantic-Enhanced Attention Network for Image-Text Matching
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Huanxiao Zhou Yushui Geng Jing Zhao Xishan Ma Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Graduate School Qilu University of Technology (Shandong Academy of Sciences) Jinan China
Image-text matching is an important task in cross-modal information processing, which consists of evaluating the similarity between images and text. However, the data of the two modalities have different distributions... 详细信息
来源: 评论
EventTrojan: Manipulating Non-Intrusive Speech Quality Assessment via Imperceptible Events
arXiv
收藏 引用
arXiv 2023年
作者: Ren, Ying Shen, Kailai Ye, Zhe Yan, Diqun Faculty of Electrical Engineering and Computer Science Ningbo University Ningbo China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology Shandong Academy of Sciences Shandong China Juphoon System Software Co. Ltd Ningbo China
Non-Intrusive speech quality assessment (NISQA) has gained significant attention for predicting speech’s mean opinion score (MOS) without requiring the reference speech. Researchers have gradually started to apply NI... 详细信息
来源: 评论
Blockchain-Based Identity Authentication Oriented to Multi-Cluster UAV networking
Blockchain-Based Identity Authentication Oriented to Multi-C...
收藏 引用
IEEE International Conference on Blockchain (Blockchain)
作者: Zesong Dong Wei Tong Zhiwei Zhang Jian Li Weidong Yang Yulong Shen Hangzhou Institute of Technology Xidian University Hangzhou China Shaanxi Key Laboratory of Network and System Security Xi’an China Engineering Research Center of Blockchain Technology Application and Evaluation Ministry of Education Xi’an China School of Computer Science and Technology Xidian University Xi’an China
Unmanned Aerial Vehicle (UAV) networking is increasingly used in field environments such as power inspection, agricultural plant protection, and emergency rescue. To guarantee UAV networking security, UAV identity aut...
来源: 评论
MOAFL: Potential Seed Selection with Multi-Objective Particle Swarm Optimization  21
MOAFL: Potential Seed Selection with Multi-Objective Particl...
收藏 引用
Proceedings of the 7th International Conference on Communication and Information Processing
作者: Jinman Jiang Rui Ma Xiajing Wang Jinyuan He Donghai Tian Jiating Li Beijing Key Laboratory of Software Security Engineering Technology School of Computer Science&Technology Beijing Institute of Technology China CASIC General Department of Network&Information China and CASIC Network&Information Development Corporation Limited China
Fuzzing has become one of the most widely used technology for discovering software vulnerabilities thanks to its effectiveness. However, even the state-of-the-art fuzzers are not very efficient at identifying promisin... 详细信息
来源: 评论
Joint Space-Time Sparsity Based Jamming Detection for Mission-Critical mMTC networks
arXiv
收藏 引用
arXiv 2023年
作者: Wang, Shao-Di Wang, Hui-Ming Li, Zhetao Leung, Victor C.M. The School of Information and Communication Engineering Xi'an Jiaotong University Shaanxi Xi'An710049 China The Ministry of Education Key Lab for Intelligent Networks and Network Security Xi'an Jiaotong University Shaanxi Xi'An710049 China The Key Laboratory of Hunnan Province for Internet of Things and Information Security Hunan International Scientific and Technological Cooperation Base of Intelligent Network School of Computer Science Xiangtan University Xiangtan411105 China The College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China The Department of Electrical and Computer Engineering The University of British Columbia VancouverBCV6T 1Z4 Canada
For mission-critical massive machine-type communications (mMTC) applications, the messages are required to be delivered in real-time. However, due to the weak security protection capabilities of the low-cost and low-c... 详细信息
来源: 评论
Research on long and short-term social recommendation based on convolutional and gated recurrent units
Research on long and short-term social recommendation based ...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Zihe Jia Peng Xue Zhiqiang Dai Qian Gao Xiaomeng Zhang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
The development of the Internet has made people more closely related and has put forward higher requirements for recommendation models. Most recommendation models are studied only for the long-term interests of users....
来源: 评论
SONICUMOS: An Enhanced Active Face Liveness Detection System via Ultrasonic and Video Signals
收藏 引用
IEEE Transactions on Mobile Computing 2025年
作者: Wu, Yihao Jiang, Peipei Cheng, Jianhao Zhao, Lingchen Shen, Chao Wang, Cong Wang, Qian Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan430072 China Wuhan University School of Cyber Science and Engineering Hubei430072 China Laboratory for AI-Powered Financial Technologies Ltd. 999077 Hong Kong Xi'An Jiaotong University MOE Key Laboratory for Intelligent Networks and Network Security Xi'an710049 China Xi'An Jiaotong University School of Cyber Science and Engineering Xi'an710049 China City University of Hong Kong Department of Computer Science 999077 Hong Kong
SONICUMOS is an enhanced behavior-based face liveness detection system that combines ultrasonic and video signals to sense the 3D head gestures. As face authentication becomes increasingly prevalent, the need for a re... 详细信息
来源: 评论