咨询与建议

限定检索结果

文献类型

  • 606 篇 会议
  • 417 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,024 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 641 篇 工学
    • 488 篇 计算机科学与技术...
    • 395 篇 软件工程
    • 158 篇 信息与通信工程
    • 123 篇 电气工程
    • 61 篇 网络空间安全
    • 59 篇 电子科学与技术(可...
    • 56 篇 控制科学与工程
    • 52 篇 生物工程
    • 30 篇 安全科学与工程
    • 28 篇 生物医学工程(可授...
    • 26 篇 机械工程
    • 23 篇 仪器科学与技术
    • 22 篇 光学工程
    • 18 篇 交通运输工程
    • 17 篇 化学工程与技术
    • 16 篇 动力工程及工程热...
    • 16 篇 建筑学
  • 277 篇 理学
    • 170 篇 数学
    • 54 篇 生物学
    • 50 篇 统计学(可授理学、...
    • 49 篇 物理学
    • 29 篇 系统科学
    • 17 篇 化学
  • 163 篇 管理学
    • 93 篇 管理科学与工程(可...
    • 76 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 38 篇 法学
    • 22 篇 法学
    • 17 篇 社会学
  • 20 篇 医学
    • 18 篇 临床医学
  • 15 篇 经济学
    • 15 篇 应用经济学
  • 14 篇 军事学
  • 6 篇 农学
  • 3 篇 教育学
  • 3 篇 文学

主题

  • 42 篇 feature extracti...
  • 39 篇 semantics
  • 36 篇 accuracy
  • 35 篇 cryptography
  • 31 篇 computational mo...
  • 28 篇 security
  • 28 篇 protocols
  • 27 篇 cloud computing
  • 26 篇 federated learni...
  • 26 篇 privacy
  • 25 篇 authentication
  • 23 篇 training
  • 21 篇 network security
  • 20 篇 deep learning
  • 20 篇 encryption
  • 19 篇 data privacy
  • 19 篇 computer network...
  • 18 篇 servers
  • 18 篇 data models
  • 17 篇 neural networks

机构

  • 82 篇 key laboratory o...
  • 66 篇 shandong provinc...
  • 51 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 shaanxi key labo...
  • 37 篇 school of comput...
  • 33 篇 school of cyber ...
  • 31 篇 institute of inf...
  • 30 篇 shaanxi key labo...
  • 22 篇 state key labora...
  • 21 篇 shandong provinc...
  • 18 篇 college of compu...
  • 18 篇 national enginee...
  • 18 篇 shandong fundame...
  • 17 篇 school of comput...
  • 15 篇 school of comput...
  • 14 篇 national compute...
  • 13 篇 key laboratory o...
  • 13 篇 shaanxi key labo...
  • 13 篇 national compute...

作者

  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 19 篇 baojiang cui
  • 18 篇 hei xinhong
  • 13 篇 jianfeng ma
  • 13 篇 li wei
  • 12 篇 jing zhao
  • 12 篇 xu li
  • 12 篇 zhenyu yang
  • 12 篇 yang xiaoyuan
  • 11 篇 fu chong
  • 11 篇 lei zhu
  • 11 篇 wei wei
  • 10 篇 zhang yuqing
  • 10 篇 chen zhong
  • 10 篇 liu jun
  • 10 篇 xiaoxue liu
  • 10 篇 li qi
  • 9 篇 wang lei

语言

  • 878 篇 英文
  • 117 篇 其他
  • 33 篇 中文
检索条件"机构=Network Security Laboratory Computer Engineering"
1024 条 记 录,以下是541-550 订阅
排序:
Backdoor Defense with Machine Unlearning
arXiv
收藏 引用
arXiv 2022年
作者: Liu, Yang Fan, Mingyuan Chen, Cen Liu, Ximeng Ma, Zhuo Wang, Li Ma, Jianfeng Xi'An China Shaanxi Key Laboratory of Network and System Security Xidian University Xi'An China College of Computer and Data Science Fuzhou University Fuzhou China School of Data Science and Engineering East China Normal University Shanghai China Ant Group Hangzhou China
Backdoor injection attack is an emerging threat to the security of neural networks, however, there still exist limited effective defense methods against the attack. In this paper, we propose BAERASER, a novel method t... 详细信息
来源: 评论
Fault Diagnosis for Rolling Bearing Based on RF-LSTM
Fault Diagnosis for Rolling Bearing Based on RF-LSTM
收藏 引用
Fault Detection, Supervision and Safety for Technical Processes (SAFEPROCESS), CAA Symposium on
作者: Qiuting Li Xiuqing Wang Yunpeng Yang Ruiyi Wang Feng Lv College of Computer and Cyber Security Hebei Normal University Shijiazhuang China Hebei Provincial Key Laboratory of Network & Information Security Shijiazhuang China Hebei Provincial Engineering Research Center for Supply Chain Big Data Analytics & Data Security Shijiazhuang China
In the era of big data, it is of great significance to study data-driven fault diagnostic methods for equipment in complex industrial environments. In this paper, a data-driven fault diagnostic method for rolling bear... 详细信息
来源: 评论
Fault-Tolerant Differential Privacy Routing of Human-Cyber-Physical Fusion Systems for Large Language Models security
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Lin, Limei Huang, Yanze Wang, Xiaoding Garg, Sahil Moussa, Sherif Alrashoud, Mubarak Fujian Normal University College of Computer and Cyber Security Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou350117 China Fujian University of Technology School of Computer Science and Mathematics Fuzhou350118 China École de technologie supérieure Electrical Engineering Department MontréalQCH3C 1K3 Canada Canadian University School of Engineering Applied Science and Technology Dubai United Arab Emirates Chitkara University Institute of Engineering and Technology Chitkara University Centre for Research Impact and Outcome Punjab Rajpura140401 India Canadian University School of Engineering Applied Science and Technology Dubai United Arab Emirates Riyadh11543 Saudi Arabia
The rapid proliferation of Internet of Things (IoT) systems has introduced complex networks of interconnected devices, computational resources, and web-based communication infrastructure. Privacy protection in IoT dat... 详细信息
来源: 评论
High-Dimensional Quantum Secure Multiparty Summation with Random Decoy Particles
SSRN
收藏 引用
SSRN 2022年
作者: Song, Xiuli Yang, Shuai Deng, Hongyao Liao, Jinwei Wu, Tao School of Cyber Security and Information Law Chongqing University of Posts and Telecommunications Chongqing400065 China Henan Key Laboratory of Network Cryptography Technology Henan450001 China School of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing400065 China College of Computer Engineering Yangtze Normal University Chongqing408100 China
Quantum secure multiparty summation (QSMS) calculates the sum of the privacy inputs of multiple participants without exposing these inputs. The current QSMS protocols mostly employ the fixed bases of decoy particles t... 详细信息
来源: 评论
Shellshock Bash Vulnerability Modeling Analysis Based on Petri Net
Shellshock Bash Vulnerability Modeling Analysis Based on Pet...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Liumei Zhang Xi Deng Yichuan Wang School of Computer Science Xi’an Shiyou University Xi’an China School of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technolog Xi’an China
The enhancement of Internet connectivity and the increase of information transmission speed yield the increasing frequency of network attacks. The Shellshock attackers often exploit bash vulnerability to read the cont... 详细信息
来源: 评论
VAE-GANMDA: A microbe-drug association prediction model integrating variational autoencoders and generative adversarial networks
收藏 引用
Artificial Intelligence in Medicine 2025年 167卷
作者: Bo Wang Yang He Xiaoxin Du Lei Zhu Junqi Wang Tongxuan Wang School of Computer and Control Engineering Qiqihar University Qiqihar 161006 China Qiqihar University Heilongjiang Key Laboratory of Big Data Network Security Detection and Analysis Qiqihar 161006 China
Traditional biological experimental methods typically require weeks or even months of experimentation, and the cost of each experiment can reach hundreds or even thousands of dollars, which is quite expensive and time... 详细信息
来源: 评论
Semisupervised Encrypted Traffic Identification Based on Auxiliary Classification Generative Adversarial network
收藏 引用
computer Systems Science & engineering 2021年 第12期39卷 373-390页
作者: Jiaming Mao Mingming Zhang Mu Chen Lu Chen Fei Xia Lei Fan ZiXuan Wang Wenbing Zhao State Grid Jiangsu Electric Power Co. Ltd.Information and Telecommunication BranchNanJing210003China Institute of Information and Communication Global Energy Interconnection Research InstituteState Grid Key Laboratory of Information and Network SecurityNanjing210003China Engineering Research Center of Post Big Data Technology and Application of Jiangsu Province Research and Development Center of Post Industry Technology of the State Posts Bureau(Internet of Things Technology)Broadband Wireless Communication Technology Engineering Research Center of the Ministry of EducationNanjing University of Posts and TelecommunicationsNanjing210003China Department of Electrical Engineering and Computer Science Cleveland State UniversityCleveland44115USA
The rapidly increasing popularity of mobile devices has changed the methods with which people access various network services and increased net-work traffic *** the past few decades,network traffic identification has ... 详细信息
来源: 评论
Cross-heterogeneous Domain Authentication Scheme Based on Blockchain
收藏 引用
Journal of Artificial Intelligence and Technology 2021年 第2期1卷 92-100页
作者: Jing Liu Yixin Liu Yingxu Lai Rongchen Li Siyu Wu Sami Mian College of Computer Science Faculty of Information TechnologyBeijing University of TechnologyBeijing 100124China Shaanxi Key Laboratory of Network and System Security Xi’an 710071China Science and Technology on Information Assurance Laboratory Beijing 100072China Engineering Research Center of Intelligent Perception and Autonomous Control Ministry of EducationBeijing 100124China Fan Gongxiu Honors College Beijing University of TechnologyBeijing 100124China University of Pittsburgh PittsburghPA 15260USA
With the rising popularity of the Internet and the development of big data technology,an increasing number of organizations are opting to cooperate across domains to maximize their *** organizations use public key inf... 详细信息
来源: 评论
SS-GNN: A Simple-Structured Graph Neural network for Affinity Prediction
arXiv
收藏 引用
arXiv 2022年
作者: Zhang, Shuke Jin, Yanzhao Liu, Tianmeng Wang, Qi Zhang, Zhaohui Zhao, Shuliang Shan, Bo Software College Hebei Normal University Shijiazhuang050024 China Shijiazhuang Xianyu Digital Biotechnology Co. Ltd Shijiazhuang050024 China College of Computer and Cyber Security Hebei Normal University Shijiazhuang050024 China Hebei Provincial Key Laboratory of Network and Information Security Shijiazhuang050024 China Hebei Provincial Engineering Research Center for Supply Chain Big Data Analytics & Data Security Shijiazhuang050024 China
Efficient and effective drug-target binding affinity (DTBA) prediction is a challenging task due to the limited computational resources in practical applications and is a crucial basis for drug screening. Inspired by ... 详细信息
来源: 评论
Accurate and Fast Detection of DDoS Attacks in High-Speed network with Asymmetric Routing
Accurate and Fast Detection of DDoS Attacks in High-Speed Ne...
收藏 引用
2021 IEEE Global Communications Conference (GLOBECOM)
作者: Hua Wu Tingzheng Chen Ziling Shao Guang Cheng Xiaoyan Hu School of Cyber Science and Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University Nanjing China Purple Mountain Laboratories for Network and Communication Security Nanjing China
The existing DDoS attack detection methods based on a single monitoring point only consider symmetric routing scenarios, which may not be practical. Such schemes will produce high false positives when facing the asymm... 详细信息
来源: 评论