咨询与建议

限定检索结果

文献类型

  • 606 篇 会议
  • 414 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,021 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 641 篇 工学
    • 488 篇 计算机科学与技术...
    • 395 篇 软件工程
    • 158 篇 信息与通信工程
    • 123 篇 电气工程
    • 61 篇 网络空间安全
    • 59 篇 电子科学与技术(可...
    • 56 篇 控制科学与工程
    • 52 篇 生物工程
    • 30 篇 安全科学与工程
    • 28 篇 生物医学工程(可授...
    • 26 篇 机械工程
    • 23 篇 仪器科学与技术
    • 22 篇 光学工程
    • 18 篇 交通运输工程
    • 17 篇 化学工程与技术
    • 16 篇 动力工程及工程热...
    • 16 篇 建筑学
  • 277 篇 理学
    • 170 篇 数学
    • 54 篇 生物学
    • 50 篇 统计学(可授理学、...
    • 49 篇 物理学
    • 29 篇 系统科学
    • 17 篇 化学
  • 163 篇 管理学
    • 93 篇 管理科学与工程(可...
    • 76 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 38 篇 法学
    • 22 篇 法学
    • 17 篇 社会学
  • 20 篇 医学
    • 18 篇 临床医学
  • 15 篇 经济学
    • 15 篇 应用经济学
  • 14 篇 军事学
  • 6 篇 农学
  • 3 篇 教育学
  • 3 篇 文学

主题

  • 42 篇 feature extracti...
  • 39 篇 semantics
  • 36 篇 accuracy
  • 35 篇 cryptography
  • 31 篇 computational mo...
  • 29 篇 protocols
  • 28 篇 security
  • 27 篇 cloud computing
  • 26 篇 federated learni...
  • 26 篇 privacy
  • 25 篇 authentication
  • 23 篇 training
  • 21 篇 network security
  • 21 篇 encryption
  • 20 篇 deep learning
  • 19 篇 data privacy
  • 19 篇 computer network...
  • 18 篇 servers
  • 18 篇 data models
  • 17 篇 neural networks

机构

  • 82 篇 key laboratory o...
  • 66 篇 shandong provinc...
  • 51 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 shaanxi key labo...
  • 37 篇 school of comput...
  • 33 篇 school of cyber ...
  • 31 篇 institute of inf...
  • 30 篇 shaanxi key labo...
  • 22 篇 state key labora...
  • 21 篇 shandong provinc...
  • 18 篇 national enginee...
  • 18 篇 shandong fundame...
  • 17 篇 school of comput...
  • 17 篇 college of compu...
  • 15 篇 school of comput...
  • 14 篇 national compute...
  • 13 篇 key laboratory o...
  • 13 篇 shaanxi key labo...
  • 13 篇 national compute...

作者

  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 19 篇 baojiang cui
  • 18 篇 hei xinhong
  • 13 篇 jianfeng ma
  • 13 篇 li wei
  • 12 篇 jing zhao
  • 12 篇 xu li
  • 12 篇 zhenyu yang
  • 12 篇 yang xiaoyuan
  • 11 篇 fu chong
  • 11 篇 lei zhu
  • 11 篇 wei wei
  • 10 篇 zhang yuqing
  • 10 篇 chen zhong
  • 10 篇 liu jun
  • 10 篇 xiaoxue liu
  • 10 篇 li qi
  • 9 篇 wang lei

语言

  • 875 篇 英文
  • 117 篇 其他
  • 33 篇 中文
检索条件"机构=Network Security Laboratory Computer Engineering"
1021 条 记 录,以下是491-500 订阅
排序:
A Multi-Channel Composite Recommendation Method in Federated Learning
A Multi-Channel Composite Recommendation Method in Federated...
收藏 引用
IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC)
作者: Shi Chen Qianmu Li Qi Wang Xinjian Zhao Hao Ge Nianzhe Li State Grid Jiangsu Information & Telecommunication Company Nanjing China School of Computer Science ana Engineering Nanjing University of Science and Technology Nanjing China Ltd. State Grid Key Laboratory of Information & Network Security State Grid Smart Grid Research Institute Co. Nanjing China
There are various data security risks in power grid systems, and recommendation systems are a good solution to the selection of security strategies. Federated learning is a machine learning framework that can protect ...
来源: 评论
Long Text Classification Based on BERT  5
Long Text Classification Based on BERT
收藏 引用
5th IEEE Information Technology, networking, Electronic and Automation Control Conference, ITNEC 2021
作者: Weijie, DIng Yunyi, Li Jing, Zhang Xuchen, Shen Big-data and Network Security Research Institute Zhejiang Police College Hangzhou310053 China College of Information Engineering Zhejiang University of Technology Hangzhou310023 China Key Laboratory of Public Security Information Application Based on Big-data Architecture Ministry of Public Security Hangzhou310053 China Zhejiang Police College Department of Investigation Hangzhou310053 China Zhejiang Police College Department of Computer and Information Security Hangzhou310053 China Science and Technology Management Section Hangzhou311203 China
Existing text classification algorithms generally have limitations in terms of text length and yield poor classification results for long texts. To address this problem, we propose a BERT-based long text classificatio... 详细信息
来源: 评论
A fine-grained petri model for SQL time-blind injection
A fine-grained petri model for SQL time-blind injection
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Guiling Zhang Yaling Zhang Yichuan Wang Lei Zhu Wenjiang Ji School of computer science and engineering Xi’an University of technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China
With the background of severe SQL injection attacks, the existing SQL injection modeling methods cannot reflect the process of SQL injection attacks in a fine-grained manner. Based on the discussion of attack technolo... 详细信息
来源: 评论
ConvCatb: An Attention-based CNN-CATBOOST Risk Prediction Model for Driving Safety
ConvCatb: An Attention-based CNN-CATBOOST Risk Prediction Mo...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Xinhong Hei Hao Zhang Wenjiang Ji Yichuan Wang Lei Zhu Yuan Qiu College of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China
Risk prediction is one of the most important tasks in assistant and automatic driving. In recent years, by the help of VANET and various sensors in the cars, the status of cars and roads can be collected in real time ... 详细信息
来源: 评论
Safeguarding Next Generation Multiple Access Using Physical Layer security Techniques: A Tutorial
arXiv
收藏 引用
arXiv 2024年
作者: Lv, Lu Xu, Dongyang Hu, Rose Qingyang Ye, Yinghui Yang, Long Lei, Xianfu Wang, Xianbin Kim, Dong In Nallanathan, Arumugam The State Key Laboratory of Integrated Services Networks Xidian University Xi’an710071 China The School of Information and Communications Engineering Xi’an Jiaotong University Xi’an710049 China The Department of Electrical and Computer Engineering Utah State University LoganUT84322 United States The Shaanxi Key Laboratory of Information Communication Network and Security Xi’an University of Posts & Telecommunications Xi’an710121 China The School of Information Science and Technology Southwest Jiaotong University Chengdu610031 China The Department of Electrical and Computer Engineering Western University LondonONN6A 5B9 Canada The Department of Electrical and Computer Engineering Sungkyunkwan University Suwon16419 Korea Republic of School of Electronic Engineering and Computer Science Queen Mary University of London E1 4NS United Kingdom
Driven by the ever-increasing requirements of ultrahigh spectral efficiency, ultra-low latency, and massive connectivity, the forefront of wireless research calls for the design of advanced next generation multiple ac... 详细信息
来源: 评论
A Driving Risk Prediction Approach Based on Generative Adversarial networks and VANET for Autonomous Trams
A Driving Risk Prediction Approach Based on Generative Adver...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Wenjiang Ji Jiangcheng Yang Yichuan Wang Lei Zhu Yuan Qiu Xinhong Hei College of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China
Driving safety is an essential prerequisite to the rapid development of autonomous trams. However, the relationship of driving risk factors is nonlinear, which makes modeling difficult. To improve the accuracy of driv... 详细信息
来源: 评论
Smart Contract Vulnerability Detection Based on Dual Attention Graph Convolutional network  17th
Smart Contract Vulnerability Detection Based on Dual Attent...
收藏 引用
17th EAI International Conference on Collaborative Computing: networking, Applications, and Worksharing, CollaborateCom 2021
作者: Fan, Yuqi Shang, Siyuan Ding, Xu School of Computer Science and Information Engineering Hefei University of Technology Anhui Hefei230601 China Anhui Provincial Key Laboratory of Network and Information Security Anhui Normal Unviersity Anhui Wuhu241002 China Institute of Industry and Equipment Technology Hefei University of Technology Anhui Hefei230009 China
Smart contracts on blockchains have received increasing attention due to the decentralized, transparent, and immutable characteristics of blockchain. However, smart contracts are prone to security problems caused by c... 详细信息
来源: 评论
PPA: Preference Profiling Attack Against Federated Learning
arXiv
收藏 引用
arXiv 2022年
作者: Zhou, Chunyi Gao, Yansong Fu, Anmin Chen, Kai Dai, Zhiyang Zhang, Zhi Xue, Minhui Zhang, Yuqing School of Computer Science and Engineering Nanjing University of Science and Technology China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Science China Data61 CSIRO Sydney Australia National Computer Network Intrusion Protection Center University of Chinese Academy of Science China
Federated learning (FL) trains a global model across a number of decentralized users, each with a local dataset. Compared to traditional centralized learning, FL does not require direct access to local datasets and th... 详细信息
来源: 评论
Rapid Maize Seedling Detection Based on Receptive-Field and Cross-Dimensional Information Interaction
Rapid Maize Seedling Detection Based on Receptive-Field and ...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Fengqi Hao Shulei Zhu Dexin Ma Xiangjun Dong Hoiio Kong Xia Liu Chunhua Mu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Faculty of Data Science City University of Macau Macau China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Communication College Qingdao Agricultural University Qingdao China National Engineering Laboratory of Wheat and Maize/Key Laboratory of Biology and Genetic Improvement of Maize in Northern Yellow-huai River Plain Ministry of Agriculture Maize Research Institute Shandong Academy of Agricultural Sciences Jinan China
The seedling stage is important in the growth and development of maize, and it is also a critical period that affects maize yield and quality. Accurately recognizing this stage of maize is challenging, as current maiz... 详细信息
来源: 评论
Task Offloading and Primary Node Selection in Blockchain, Digital Twin, and MEC Enabled Internet of Vehicles
Task Offloading and Primary Node Selection in Blockchain, Di...
收藏 引用
IEEE Conference on Vehicular Technology (VTC)
作者: Jianbo Du Huifang Fang Shulei Li Pengfei Du Ziwen Kong Jiawen Kang Dusit Niyato Shaanxi Key Laboratory of Information Communication Network and Security School of Communications and Information Engineering Xi’an University of Posts and Telecommunications Xi’an China School of Communications Engineering Xidian University Xi’an China Tianyuan Ruixin Communication Technology Co. LTD. Xi’an China Engineering Research Center of Intelligent Airground Integrated Vehicle and Traffic Control Ministry of Education Xihua University Chengdu China School of Automation Guangdong University of Technology China School of Computer Science and Engineering Nanyang Technological University Singapore
In this paper, we investigate the safe task offloading and primary node selection in blockchain, digital twin (DT) and Multi-access Edge Computing (MEC) enabled Internet of Vehicles (IoV). Edge servers centers provide... 详细信息
来源: 评论