咨询与建议

限定检索结果

文献类型

  • 614 篇 会议
  • 428 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,043 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 664 篇 工学
    • 508 篇 计算机科学与技术...
    • 410 篇 软件工程
    • 171 篇 信息与通信工程
    • 141 篇 电气工程
    • 70 篇 网络空间安全
    • 67 篇 控制科学与工程
    • 63 篇 电子科学与技术(可...
    • 52 篇 生物工程
    • 37 篇 安全科学与工程
    • 28 篇 机械工程
    • 28 篇 生物医学工程(可授...
    • 25 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 23 篇 光学工程
    • 18 篇 化学工程与技术
    • 17 篇 建筑学
    • 16 篇 动力工程及工程热...
  • 280 篇 理学
    • 173 篇 数学
    • 54 篇 生物学
    • 51 篇 统计学(可授理学、...
    • 50 篇 物理学
    • 29 篇 系统科学
    • 19 篇 化学
  • 171 篇 管理学
    • 101 篇 管理科学与工程(可...
    • 76 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 38 篇 法学
    • 22 篇 法学
    • 17 篇 社会学
  • 23 篇 医学
    • 20 篇 临床医学
  • 15 篇 经济学
    • 15 篇 应用经济学
  • 14 篇 军事学
  • 6 篇 农学
  • 3 篇 教育学
  • 3 篇 文学

主题

  • 42 篇 feature extracti...
  • 39 篇 semantics
  • 36 篇 accuracy
  • 35 篇 cryptography
  • 31 篇 computational mo...
  • 28 篇 security
  • 28 篇 protocols
  • 27 篇 federated learni...
  • 27 篇 cloud computing
  • 26 篇 privacy
  • 25 篇 authentication
  • 23 篇 training
  • 22 篇 network security
  • 21 篇 deep learning
  • 20 篇 encryption
  • 19 篇 data privacy
  • 19 篇 computer network...
  • 18 篇 servers
  • 18 篇 data models
  • 17 篇 neural networks

机构

  • 82 篇 key laboratory o...
  • 66 篇 shandong provinc...
  • 51 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 shaanxi key labo...
  • 37 篇 school of comput...
  • 33 篇 school of cyber ...
  • 31 篇 institute of inf...
  • 30 篇 shaanxi key labo...
  • 22 篇 state key labora...
  • 21 篇 shandong provinc...
  • 18 篇 national enginee...
  • 18 篇 shandong fundame...
  • 17 篇 school of comput...
  • 17 篇 college of compu...
  • 15 篇 school of comput...
  • 14 篇 national compute...
  • 13 篇 xi'an university...
  • 13 篇 key laboratory o...
  • 13 篇 shaanxi key labo...

作者

  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 19 篇 baojiang cui
  • 18 篇 hei xinhong
  • 13 篇 jianfeng ma
  • 13 篇 li wei
  • 13 篇 wei wei
  • 12 篇 jing zhao
  • 12 篇 xu li
  • 12 篇 zhenyu yang
  • 12 篇 yang xiaoyuan
  • 11 篇 fu chong
  • 11 篇 li qi
  • 11 篇 lei zhu
  • 10 篇 zhang yuqing
  • 10 篇 chen zhong
  • 10 篇 liu jun
  • 10 篇 xiaoxue liu
  • 9 篇 wang lei

语言

  • 854 篇 英文
  • 160 篇 其他
  • 34 篇 中文
检索条件"机构=Network Security Laboratory Computer Engineering"
1043 条 记 录,以下是591-600 订阅
排序:
A quantitative framework for network resilience evaluation using dynamic bayesian network
arXiv
收藏 引用
arXiv 2021年
作者: Jiang, Shanqing Yang, Lin Cheng, Guang Gao, Xianming Feng, Tao Zhou, Yuyang School of Cyber Science and Engineering Southeast University Nanjing China National Key Laboratory of Science and Technology on Information System Security Beijing China Key Laboratory of Computer Network and Information Integration Ministry of Education Nanjing China
Measuring and evaluating network resilience has become an important aspect since the network is vulnerable to both uncertain disturbances and malicious attacks. networked systems are often composed of many dynamic com... 详细信息
来源: 评论
Enhancing Microbe-Disease Association Prediction via Multi-View Graph Convolution and Latent Feature Learning
收藏 引用
Computational Biology and Chemistry 2025年
作者: Bo Wang Peilong Wu Xiaoxin Du Chunyu Zhang Shanshan Fu Tang Sun Xue Yang School of Computer and Control Engineering Qiqihar University Qiqihar 161006 Heilongjiang China Heilongjiang Key Laboratory of Big Data Network Security Detection and Analysis Qiqihar University Qiqihar 161006 Heilongjiang China
Microbes play a crucial role in the onset, progression, and treatment of diseases. To address the challenges of missing information and insufficient feature fusion in microbe-disease association prediction, this paper...
来源: 评论
Risk Modeling and Traceability of Boundary Attacks on Internet of Power Systems Based on Complex networks
Risk Modeling and Traceability of Boundary Attacks on Intern...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Xin Li Zhaoyang Qu Tong Yu Ming Xie Fu Yu Wei Ding School of Electrical Engineering Northeast Electric Power University Jilin China People’s Bank of China Qinghai Provincial Branch Xining China China Southern Power Grid Guangxi Power Grid Co. Ltd. Research Institute Nanning China Bijie Power Supply Bureau China Guizhou Power Grid Co. Ltd. Bijie China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
With the increasing intelligence of power IoT terminal devices, the massive volume of data transmission, and the widespread adoption of shared services, traditional terminal boundary security mechanisms are unable to ... 详细信息
来源: 评论
Regenerative Particle Thompson Sampling
arXiv
收藏 引用
arXiv 2022年
作者: Zhou, Zeyu Hajek, Bruce Choi, Nakjung Walid, Anwar Department of Radiology Mayo Clinic RochesterMN United States Department of Electrical and Computer Engineering The Coordinated Science Laboratory University of Illinois at Urbana-Champaign United States Network System and Security Research Nokia Bell Labs Murray HillNJ United States Amazon New York United States
This paper proposes regenerative particle Thompson sampling (RPTS), a flexible variation of Thompson sampling. Thompson sampling itself is a Bayesian heuristic for solving stochastic bandit problems, but it is hard to... 详细信息
来源: 评论
An enhanced MinHash encryption scheme for encrypted deduplication
An enhanced MinHash encryption scheme for encrypted deduplic...
收藏 引用
IEEE International Conference on Trust, security and Privacy in Computing and Communications (TrustCom)
作者: Qiaowen Jia Guanxiong Ha Hanwei Wang Haoyu Ma Hang Chen State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China College of Cyber Science Nankai University Tianjin China Tianjin Key Laboratory of Network and Data Security Technology Tianjin China Zhejiang Lab Hangzhou China The School of Cyber Engineering Xidian University Xi’an China
The encrypted deduplication can provide both storage savings and data confidentiality for cloud storage systems. Convergent encryption (CE) is a well-known solution for encrypted deduplication, but it brings huge comp... 详细信息
来源: 评论
Outlier-resistant Multi-hop Localization Based on Weighted Bounding-Box with the Virtual Anchor
收藏 引用
Journal of computers (Taiwan) 2021年 第5期32卷 184-191页
作者: Yan, Hao Yan, Xiao-Yong Mo, Xiao-Hui School of Network Security Jinling Institute of Technology Nanjing China Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Normal University Fuzhou China School of Modern Posts Nanjing University of Posts and Telecommunications Nanjing China Key Laboratory of Applied Mathematics Putian University Putian China School of Computer Engineering Jinling Institute of Technology Nanjing China
Multi-hop localization has attracted considerable research interests, recently. Most of the existing methods assume that the distribution of anchors is non-collinear, which often does not represent real-world scenes, ... 详细信息
来源: 评论
User Privacy-Preserving Scheme Based on Anonymous Authentication in Smart Grid  1st
User Privacy-Preserving Scheme Based on Anonymous Authentica...
收藏 引用
1st International Conference on security and Privacy in Digital Economy, SPDE 2020
作者: Lai, Qichao Xu, Li Yuan, Manli Wang, Feng Fang, He College of Mathematics and Informatics Fujian Normal University Fuzhou China Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Normal University Fuzhou China Department of Electrical and Computer Engineering The University of Western Ontario London Canada
One of the main functions of smart meter is to assist utility companies charge from users intelligently. To save computation and communication resources, while protecting the privacy of users, many data aggregation sc... 详细信息
来源: 评论
Enhanced Competitive Swarm Optimizer for Multi-task Optimization  2020
Enhanced Competitive Swarm Optimizer for Multi-task Optimiza...
收藏 引用
Proceedings of the 2020 9th International Conference on Computing and Pattern Recognition
作者: Wei Li Junqing Yuan Haonan Luo Zhou Lei Qingzheng Xu School of Computer Science and Engineering Xi'an University of Technology and Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China School of Computer Science and Engineering Xi'an University of Technology Xi'an China College of Information and Communication National University of Defense Technology Xi'an China
In the real world, many problems possess the high degree of similarity. Inspired by multifactorial inheritance model, evolutionary multi-task optimization paradigm is proposed to simultaneously solve multiple optimiza... 详细信息
来源: 评论
Uncertainty-Aware Relational Graph Neural network for Few-Shot Knowledge Graph Completion
arXiv
收藏 引用
arXiv 2024年
作者: Li, Qian Guo, Shu Chen, Yingjia Ji, Cheng Sheng, Jiawei Li, Jianxin Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University Beijing100083 China The State Key Laboratory of Software Development Environment Beihang University Beijing100083 China National Computer Network Emergency Response Technical Team Coordination Center of China Beijing100083 China School of Mathematics Edinburgh University Edinburgh United Kingdom Institute of Information Engineering Chinese Academy of Sciences Beijing100083 China School of Cyber Security University of Chinese Academy of Sciences Beijing100083 China
Few-shot knowledge graph completion (FKGC) aims to query the unseen facts of a relation given its few-shot reference entity pairs. The side effect of noises due to the uncertainty of entities and triples may limit the... 详细信息
来源: 评论
ResfEANet: ResNet-fused External Attention network for Tuberculosis Diagnosis using Chest X-ray Images
收藏 引用
computer Methods and Programs in Biomedicine Update 2024年 5卷
作者: Ejiyi, Chukwuebuka Joseph Qin, Zhen Nnani, Ann O Deng, Fuhu Ejiyi, Thomas Ugochukwu Ejiyi, Makuachukwu Bennedith Agbesi, Victor Kwaku Bamisile, Olusola Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Chengdu China College of Environmental Science and Engineering Hohai University Nanjing China Department of Pure and Industrial Chemistry University of Nigeria Nsukka Enugu Nigeria Pharmacy Department University of Nigeria Nsukka Enugu Nigeria School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China Sichuan Industrial Internet Intelligent Monitoring and Application Engineering Technology Research Centre Chengdu University of Technology Chengdu China
Pulmonary tuberculosis (TB), the most prevalent form of TB, remains a major global public health concern, contributing to more than a million deaths each year. The accurate and timely diagnosis of this disease is of p... 详细信息
来源: 评论