咨询与建议

限定检索结果

文献类型

  • 606 篇 会议
  • 414 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,021 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 641 篇 工学
    • 488 篇 计算机科学与技术...
    • 395 篇 软件工程
    • 158 篇 信息与通信工程
    • 123 篇 电气工程
    • 61 篇 网络空间安全
    • 59 篇 电子科学与技术(可...
    • 56 篇 控制科学与工程
    • 52 篇 生物工程
    • 30 篇 安全科学与工程
    • 28 篇 生物医学工程(可授...
    • 26 篇 机械工程
    • 23 篇 仪器科学与技术
    • 22 篇 光学工程
    • 18 篇 交通运输工程
    • 17 篇 化学工程与技术
    • 16 篇 动力工程及工程热...
    • 16 篇 建筑学
  • 277 篇 理学
    • 170 篇 数学
    • 54 篇 生物学
    • 50 篇 统计学(可授理学、...
    • 49 篇 物理学
    • 29 篇 系统科学
    • 17 篇 化学
  • 163 篇 管理学
    • 93 篇 管理科学与工程(可...
    • 76 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 38 篇 法学
    • 22 篇 法学
    • 17 篇 社会学
  • 20 篇 医学
    • 18 篇 临床医学
  • 15 篇 经济学
    • 15 篇 应用经济学
  • 14 篇 军事学
  • 6 篇 农学
  • 3 篇 教育学
  • 3 篇 文学

主题

  • 42 篇 feature extracti...
  • 39 篇 semantics
  • 36 篇 accuracy
  • 35 篇 cryptography
  • 31 篇 computational mo...
  • 29 篇 protocols
  • 28 篇 security
  • 27 篇 cloud computing
  • 26 篇 federated learni...
  • 26 篇 privacy
  • 25 篇 authentication
  • 23 篇 training
  • 21 篇 network security
  • 21 篇 encryption
  • 20 篇 deep learning
  • 19 篇 data privacy
  • 19 篇 computer network...
  • 18 篇 servers
  • 18 篇 data models
  • 17 篇 neural networks

机构

  • 82 篇 key laboratory o...
  • 66 篇 shandong provinc...
  • 51 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 shaanxi key labo...
  • 37 篇 school of comput...
  • 33 篇 school of cyber ...
  • 31 篇 institute of inf...
  • 30 篇 shaanxi key labo...
  • 22 篇 state key labora...
  • 21 篇 shandong provinc...
  • 18 篇 national enginee...
  • 18 篇 shandong fundame...
  • 17 篇 school of comput...
  • 17 篇 college of compu...
  • 15 篇 school of comput...
  • 14 篇 national compute...
  • 13 篇 key laboratory o...
  • 13 篇 shaanxi key labo...
  • 13 篇 national compute...

作者

  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 19 篇 baojiang cui
  • 18 篇 hei xinhong
  • 13 篇 jianfeng ma
  • 13 篇 li wei
  • 12 篇 jing zhao
  • 12 篇 xu li
  • 12 篇 zhenyu yang
  • 12 篇 yang xiaoyuan
  • 11 篇 fu chong
  • 11 篇 lei zhu
  • 11 篇 wei wei
  • 10 篇 zhang yuqing
  • 10 篇 chen zhong
  • 10 篇 liu jun
  • 10 篇 xiaoxue liu
  • 10 篇 li qi
  • 9 篇 wang lei

语言

  • 875 篇 英文
  • 117 篇 其他
  • 33 篇 中文
检索条件"机构=Network Security Laboratory Computer Engineering"
1021 条 记 录,以下是501-510 订阅
排序:
Deepfake Detection: A Comprehensive Survey from the Reliability Perspective
arXiv
收藏 引用
arXiv 2022年
作者: Wang, Tianyi Liao, Xin Chow, Kam Pui Lin, Xiaodong Wang, Yinglong Department of Computer Science The University of Hong Kong Hong Kong College of Computer Science and Electronic Engineering Hunan University China School of Computer Science University of Guelph Canada Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology Shandong Academy of Sciences China
The mushroomed Deepfake synthetic materials circulated on the internet have raised a profound social impact on politicians, celebrities, and individuals worldwide. In this survey, we provide a thorough review of the e... 详细信息
来源: 评论
ER-ERT:A Method of Ensemble Representation Learning of Encrypted RAT Traffic
ER-ERT:A Method of Ensemble Representation Learning of Encry...
收藏 引用
IFIP networking Conference
作者: Yijing Zhang Hui Xue Jianjun Lin Xiaoyu Liu Weilin Gai Xiaodu Yang Anqi Wang Yinliang Yue Bo Sun Institute of Information Engineering Chinese Academy of Sciences School of Cyber Security University of Chinese Academy of Sciences Institute of Software Chinese Academy of Sciences School of computer science and technology University of Chinese Academy of Sciences Coordination Center of China National Computer Network Emergency Response Technical Team Liaoning University of Technology Zhongguancun Laboratory Beijing P.R.China
Remote Access Trojan (RAT) is one of the major threats to today's network environment. It is a class of malware frequently used by hacking collectives to monitor victims' actions and steal personal information...
来源: 评论
Traffic engineering in Dynamic Hybrid Segment Routing networks
收藏 引用
computers, Materials & Continua 2021年 第7期68卷 655-670页
作者: Yingya Guo Kai Huang Cheng Hu Jiangyuan Yao Siyu Zhou College of Mathematics and Computer Science Fuzhou UniversityFuzhou350000China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou UniversityFuzhou350000China Key Laboratory of Spatial Data Mining&Information Sharing Ministry of EducationFuzhou350003China School of Information Science and Technology Guangdong University of Foreign StudiesGuangzhou510006China School of Computer Science and Cyberspace Security Hainan UniversityHaiKou570228China Tandon School of Engineering New York UniversityNew York10012USA Department of Computing Hong Kong Polytechnic UniversityHong Hom999077Hong Kong
The emergence of Segment Routing(SR)provides a novel routing paradigm that uses a routing technique called source packet *** SR architecture,the paths that the packets choose to route on are indicated at the ingress *... 详细信息
来源: 评论
On the ADEP and DOR Analysis of RIS-aided URLLC Systems with Partial CSI in Smart Factory
On the ADEP and DOR Analysis of RIS-aided URLLC Systems with...
收藏 引用
2021 IEEE Globecom Workshops, GC Wkshps 2021
作者: Bao, Tingnan Wang, Haiming Yang, Hong-Chuan Wang, Wen-Jing Hasna, Mazen O. Lenovo Research + Institute of Computing Technology Chinese Academy of Sciences Beijing China Lenovo Reseach Lenovo Group Limited Beijing China University of Victoria Department of Electrical and Computer Engineering Victoria Canada Shaanxi Key Laboratory of Information Communication Network and Security XUPT Xi'an China Qatar University Department of Electrical Engineering Doha Qatar
Factory automation applications impose stringent quality of service (QoS) over ultra-reliable and low-latency communication (URLLC) system. However, the existing wireless systems cannot meet the requirement for these ... 详细信息
来源: 评论
MACCoM: A multiple attention and convolutional cross-mixer framework for detailed 2D biomedical image segmentation
收藏 引用
computers in Biology and Medicine 2024年 179卷 108847-108847页
作者: Ejiyi, Chukwuebuka Joseph Qin, Zhen Ejiyi, Makuachukwu Bennedith Ukwuoma, Chiagoziem Ejiyi, Thomas Ugochukwu Muoka, Gladys Wavinya Gyarteng, Emmanuel S.A. Bamisile, Olusola O. Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Sichuan Chengdu China Pharmacy Department University of Nigeria Nsukka Enugu State Nsukka Nigeria Department of Pure and Industrial Chemistry University of Nigeria Nsukka Enugu State Nsukka Nigeria School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China Sichuan Industrial Internet Intelligent Monitoring and Application Engineering Research Center Chengdu University of Technology Chengdu China
The UNet architecture, which is widely used for biomedical image segmentation, has limitations like blurred feature maps and over- or under-segmented regions. To overcome these limitations, we propose a novel network ... 详细信息
来源: 评论
Auction Theory and Game Theory Based Pricing of Edge Computing Resources: A Survey
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Yu, Jiguo Liu, Shun Zou, Yifei Wang, Guijuan Hu, Chunqiang University of Electronic Science and Technology of China School of Information and Software Engineering Chengdu610054 China Qilu University of Technology Big Data Institute Jinan250353 China Qufu Normal University School of Computer Science Shandong Rizhao China Shandong University School of Computer Science and Technology Shandong Qingdao266237 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan250353 China Chongqing University School of Big Data and Software Engineering Chongqing400044 China
The proliferation of Internet of Things (IoT) devices and edge computing applications has heightened the demand for efficient resource allocation and pricing mechanisms. Effective pricing strategies play a crucial rol... 详细信息
来源: 评论
AsyncSC: An Asynchronous Sidechain for Multi-Domain Data Exchange in Internet of Things
arXiv
收藏 引用
arXiv 2024年
作者: Yang, Lingxiao Dong, Xuewen Wan, Zhiguo Gao, Sheng Tong, Wei Lu, Di Shen, Yulong Du, Xiaojiang The School of Computer Science and Technology Xidian University The Engineering Research Center of Blockchain Technology Application and Evaluation Ministry of Education China The Shaanxi Key Laboratory of Blockchain and Secure Computing Xi'An710071 China The Zhejiang Lab Hangzhou311121 China The School of Information Central University of Finance and Economics Beijing100081 China The School of Information Science and Engineering Zhejiang Sci-Tech University Hangzhou310018 China The School of Computer Science and Technology Xidian University China The Shaanxi Key Laboratory of Network and System Security Xi'An710071 China The School of Engineering and Science Stevens Institute of Technology Hoboken07030 United States
Sidechain techniques improve blockchain scalability and interoperability, providing decentralized exchange and cross-chain collaboration solutions for Internet of Things (IoT) data across various domains. However, cur...
来源: 评论
An Auto-Parallel Method for Deep Learning Models Based on Genetic Algorithm
An Auto-Parallel Method for Deep Learning Models Based on Ge...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Yan Zeng ChengChuang Huang YiJie Ni ChunBao Zhou JiLin Zhang Jue Wang MingYao Zhou MeiTing Xue YunQuan Zhang School of Computer Science and Technology Hangzhou Dianzi University Hangzhou China Key Laboratory for Modeling and Simulation of Complex Systems Ministry of Education Hangzhou China Data Security Governance Zhejiang Engineering Research Center Hangzhou China School of ITMO Joint Institute Hangzhou Dianzi University Hangzhou China Institute of Computer Network Information Center of the Chinese Academy of Sciences Beijing China HuaWei State Key Laboratory of Computer Architecture Institute of Computing Technology of the Chinese Academy of Sciences Beijing China
As the size of datasets and neural network models increases, automatic parallelization methods for models have become a research hotspot in recent years. The existing auto-parallel methods based on machine learning or...
来源: 评论
Mind the Gap: Towards Generalizable Autonomous Penetration Testing via Domain Randomization and Meta-Reinforcement Learning
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Shicheng Liu, Jingju Lu, Yuliang Yang, Jiahai Zhang, Yue Chen, Jie College of Electronic Engineering National University of Defense Technology Hefei230037 China Key Laboratory of Cyberspace Security Situation Awareness and Evaluation Anhui Province Hefei230037 China Institute for Network Sciences and Cyberspace The Beijing National Research Center for Information Science and Technology Tsinghua University Beijing10084 China College of Computer Science and Technology National University of Defense Technology Changsha410073 China
With increasing numbers of vulnerabilities exposed on the internet, autonomous penetration testing (pentesting) has emerged as a promising research area. Reinforcement learning (RL) is a natural fit for studying this ... 详细信息
来源: 评论
Revocable Registered Attribute-Based Encryption With User Deregistration
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Li, Jiguo Chen, Shaobo Lu, Yang Ning, Jianting Shen, Jian Zhang, Yichen Fujian Normal University College of Computer and Cyber Security Fuzhou350117 China Fuzhou350117 China Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou350117 China Nanjing Normal University School of Computer and Electronic Information Nanjing210023 China Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fuzhou350117 China Zhejiang Sci-Tech University School of Information Science and Engineering Hangzhou310018 China
Many businesses are putting their sensitive data in the cloud with the fast growth of cloud computing and storage. To ensure user privacy, it is necessary to keep encrypted data only in the cloud. Attribute-based encr... 详细信息
来源: 评论