咨询与建议

限定检索结果

文献类型

  • 606 篇 会议
  • 414 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,021 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 641 篇 工学
    • 488 篇 计算机科学与技术...
    • 395 篇 软件工程
    • 158 篇 信息与通信工程
    • 123 篇 电气工程
    • 61 篇 网络空间安全
    • 59 篇 电子科学与技术(可...
    • 56 篇 控制科学与工程
    • 52 篇 生物工程
    • 30 篇 安全科学与工程
    • 28 篇 生物医学工程(可授...
    • 26 篇 机械工程
    • 23 篇 仪器科学与技术
    • 22 篇 光学工程
    • 18 篇 交通运输工程
    • 17 篇 化学工程与技术
    • 16 篇 动力工程及工程热...
    • 16 篇 建筑学
  • 277 篇 理学
    • 170 篇 数学
    • 54 篇 生物学
    • 50 篇 统计学(可授理学、...
    • 49 篇 物理学
    • 29 篇 系统科学
    • 17 篇 化学
  • 163 篇 管理学
    • 93 篇 管理科学与工程(可...
    • 76 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 38 篇 法学
    • 22 篇 法学
    • 17 篇 社会学
  • 20 篇 医学
    • 18 篇 临床医学
  • 15 篇 经济学
    • 15 篇 应用经济学
  • 14 篇 军事学
  • 6 篇 农学
  • 3 篇 教育学
  • 3 篇 文学

主题

  • 42 篇 feature extracti...
  • 39 篇 semantics
  • 36 篇 accuracy
  • 35 篇 cryptography
  • 31 篇 computational mo...
  • 29 篇 protocols
  • 28 篇 security
  • 27 篇 cloud computing
  • 26 篇 federated learni...
  • 26 篇 privacy
  • 25 篇 authentication
  • 23 篇 training
  • 21 篇 network security
  • 21 篇 encryption
  • 20 篇 deep learning
  • 19 篇 data privacy
  • 19 篇 computer network...
  • 18 篇 servers
  • 18 篇 data models
  • 17 篇 neural networks

机构

  • 82 篇 key laboratory o...
  • 66 篇 shandong provinc...
  • 51 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 shaanxi key labo...
  • 37 篇 school of comput...
  • 33 篇 school of cyber ...
  • 31 篇 institute of inf...
  • 30 篇 shaanxi key labo...
  • 22 篇 state key labora...
  • 21 篇 shandong provinc...
  • 18 篇 national enginee...
  • 18 篇 shandong fundame...
  • 17 篇 school of comput...
  • 17 篇 college of compu...
  • 15 篇 school of comput...
  • 14 篇 national compute...
  • 13 篇 key laboratory o...
  • 13 篇 shaanxi key labo...
  • 13 篇 national compute...

作者

  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 19 篇 baojiang cui
  • 18 篇 hei xinhong
  • 13 篇 jianfeng ma
  • 13 篇 li wei
  • 12 篇 jing zhao
  • 12 篇 xu li
  • 12 篇 zhenyu yang
  • 12 篇 yang xiaoyuan
  • 11 篇 fu chong
  • 11 篇 lei zhu
  • 11 篇 wei wei
  • 10 篇 zhang yuqing
  • 10 篇 chen zhong
  • 10 篇 liu jun
  • 10 篇 xiaoxue liu
  • 10 篇 li qi
  • 9 篇 wang lei

语言

  • 875 篇 英文
  • 117 篇 其他
  • 33 篇 中文
检索条件"机构=Network Security Laboratory Computer Engineering"
1021 条 记 录,以下是531-540 订阅
排序:
Density-aware and Depth-aware Visual Representation for Zero-Shot Object Counting
Density-aware and Depth-aware Visual Representation for Zero...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Fang Nan Feng Tian Ni Zhang Nian Liu Haonan Miao Guang Dai Mengmeng Wang Faculty of Electronic and Information Engineering Xi’an Jiaotong University Xi’an China Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an China School of Automation Northwestern Polytechnical University Xi’an China Computer Vision Department Mohamed bin Zayed University of Artificial Intelligence Abu Dhabi UAE SGIT AI Lab State Grid Corporation of China Zhejiang University of Technology Hang Zhou China
Previous methods often utilize CLIP semantic classifiers with class names for zero-shot object counting. However, they ignore crucial density and depth knowledge for counting tasks. Thus, we propose a density-aware an... 详细信息
来源: 评论
A Review of Multimodal Explainable Artificial Intelligence: Past, Present and Future
arXiv
收藏 引用
arXiv 2024年
作者: Sun, Shilin An, Wenbin Tian, Feng Nan, Fang Liu, Qidong Liu, Jun Shah, Nazaraf Chen, Ping School of Computer Science and Technology Xi’an Jiaotong University Xi’an710049 China Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an710049 China Faculty of Electronic and Information Engineering Xi’an Jiaotong University Xi’an710049 China Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Xi’an Jiaotong University Xi’an710049 China Institute for Future Transport and Cities Coventry University Priory Street CoventryCV1 5FB United Kingdom Department of Engineering University of Massachusetts Boston BostonMA02125 United States
Artificial intelligence (AI) has rapidly developed through advancements in computational power and the growth of massive datasets. However, this progress has also heightened challenges in interpreting the "black-... 详细信息
来源: 评论
Cell Manipulation Attack Against Onion Services
Cell Manipulation Attack Against Onion Services
收藏 引用
IEEE International Conference on High Performance Computing and Communications (HPCC)
作者: Jianjun Lin Yinliang Yue Yijing Zhang Xiaoyu Liu XiaoDu Yang Weilin Gai Bo Sun Chinese Academy of Sciences Institute of Information Engineering Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Zhongguancun Laboratory Beijing China Chinese Academy of Sciences Institute of Software Beijing China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China National Computer Network Emergency Response Technical Team/Coordination Center of China (CNCERT/CC) Beijing China
In this study, we proposed OREA-OS, a cell manipulation attack devised to compromise Onion Services. Through the manipulation of cells, two collaborating nodes within a circuit exchange information to unveil the anony...
来源: 评论
A Lightweight Authentication Protocol for Mobile RFID
收藏 引用
International Journal of network security 2024年 第2期26卷 190-199页
作者: Pan, Tao Zuo, Kai-Zhong Wang, Tao-Chun Deng, Chun-Hong College of Internet and Communication Anhui Technical College of Mechanical and Electrical Engineering No.16 Wenjin West Rd. Yijiang Dist. Anhui Province Wuhu City241002 China College of Computer and Information Anhui Normal University China Anhui Key Laboratory of Network and Information Security No.1 Beijing East Rd. Jinghu Dist. Anhui Province Wuhu City241000 China
Recently, Radio Frequency Identification (RFID) has been widely used. A lightweight security authentication protocol for mobile RFID is proposed to aim at the problems of high complexity and system security in existin... 详细信息
来源: 评论
Robust Resource Allocation for STAR-RIS Assisted SWIPT Systems
arXiv
收藏 引用
arXiv 2024年
作者: Zhu, Guangyu Mu, Xidong Guo, Li Huang, Ao Xu, Shibiao The Key Laboratory of Universal Wireless Communications Ministry of Education Beijing University of Posts and Telecommunications Beijing100876 China The School of Artificial Intelligence Beijing University of Posts and Telecommunications Beijing100876 China The Engineering Research Center Ministry of Education for Chain Network Convergence Technology China The National Engineering Research Center for Mobile Internet Security Technology Beijing University of Posts and Telecommunications Beijing100876 China The School of Electronic Engineering and Computer Science Queen Mary University of London LondonE1 4NS United Kingdom
A simultaneously transmitting and reflecting reconfigurable intelligent surface (STAR-RIS) assisted simultaneous wireless information and power transfer (SWIPT) system is proposed. More particularly, an STAR-RIS is de... 详细信息
来源: 评论
Backdoor Defense with Machine Unlearning
arXiv
收藏 引用
arXiv 2022年
作者: Liu, Yang Fan, Mingyuan Chen, Cen Liu, Ximeng Ma, Zhuo Wang, Li Ma, Jianfeng Xi'An China Shaanxi Key Laboratory of Network and System Security Xidian University Xi'An China College of Computer and Data Science Fuzhou University Fuzhou China School of Data Science and Engineering East China Normal University Shanghai China Ant Group Hangzhou China
Backdoor injection attack is an emerging threat to the security of neural networks, however, there still exist limited effective defense methods against the attack. In this paper, we propose BAERASER, a novel method t... 详细信息
来源: 评论
Fault Diagnosis for Rolling Bearing Based on RF-LSTM
Fault Diagnosis for Rolling Bearing Based on RF-LSTM
收藏 引用
Fault Detection, Supervision and Safety for Technical Processes (SAFEPROCESS), CAA Symposium on
作者: Qiuting Li Xiuqing Wang Yunpeng Yang Ruiyi Wang Feng Lv College of Computer and Cyber Security Hebei Normal University Shijiazhuang China Hebei Provincial Key Laboratory of Network & Information Security Shijiazhuang China Hebei Provincial Engineering Research Center for Supply Chain Big Data Analytics & Data Security Shijiazhuang China
In the era of big data, it is of great significance to study data-driven fault diagnostic methods for equipment in complex industrial environments. In this paper, a data-driven fault diagnostic method for rolling bear... 详细信息
来源: 评论
Fault-Tolerant Differential Privacy Routing of Human-Cyber-Physical Fusion Systems for Large Language Models security
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Lin, Limei Huang, Yanze Wang, Xiaoding Garg, Sahil Moussa, Sherif Alrashoud, Mubarak Fujian Normal University College of Computer and Cyber Security Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou350117 China Fujian University of Technology School of Computer Science and Mathematics Fuzhou350118 China École de technologie supérieure Electrical Engineering Department MontréalQCH3C 1K3 Canada Canadian University School of Engineering Applied Science and Technology Dubai United Arab Emirates Chitkara University Institute of Engineering and Technology Chitkara University Centre for Research Impact and Outcome Punjab Rajpura140401 India Canadian University School of Engineering Applied Science and Technology Dubai United Arab Emirates Riyadh11543 Saudi Arabia
The rapid proliferation of Internet of Things (IoT) systems has introduced complex networks of interconnected devices, computational resources, and web-based communication infrastructure. Privacy protection in IoT dat... 详细信息
来源: 评论
High-Dimensional Quantum Secure Multiparty Summation with Random Decoy Particles
SSRN
收藏 引用
SSRN 2022年
作者: Song, Xiuli Yang, Shuai Deng, Hongyao Liao, Jinwei Wu, Tao School of Cyber Security and Information Law Chongqing University of Posts and Telecommunications Chongqing400065 China Henan Key Laboratory of Network Cryptography Technology Henan450001 China School of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing400065 China College of Computer Engineering Yangtze Normal University Chongqing408100 China
Quantum secure multiparty summation (QSMS) calculates the sum of the privacy inputs of multiple participants without exposing these inputs. The current QSMS protocols mostly employ the fixed bases of decoy particles t... 详细信息
来源: 评论
Shellshock Bash Vulnerability Modeling Analysis Based on Petri Net
Shellshock Bash Vulnerability Modeling Analysis Based on Pet...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Liumei Zhang Xi Deng Yichuan Wang School of Computer Science Xi’an Shiyou University Xi’an China School of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technolog Xi’an China
The enhancement of Internet connectivity and the increase of information transmission speed yield the increasing frequency of network attacks. The Shellshock attackers often exploit bash vulnerability to read the cont... 详细信息
来源: 评论