咨询与建议

限定检索结果

文献类型

  • 614 篇 会议
  • 428 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,043 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 664 篇 工学
    • 508 篇 计算机科学与技术...
    • 410 篇 软件工程
    • 171 篇 信息与通信工程
    • 141 篇 电气工程
    • 70 篇 网络空间安全
    • 67 篇 控制科学与工程
    • 63 篇 电子科学与技术(可...
    • 52 篇 生物工程
    • 37 篇 安全科学与工程
    • 28 篇 机械工程
    • 28 篇 生物医学工程(可授...
    • 25 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 23 篇 光学工程
    • 18 篇 化学工程与技术
    • 17 篇 建筑学
    • 16 篇 动力工程及工程热...
  • 280 篇 理学
    • 173 篇 数学
    • 54 篇 生物学
    • 51 篇 统计学(可授理学、...
    • 50 篇 物理学
    • 29 篇 系统科学
    • 19 篇 化学
  • 171 篇 管理学
    • 101 篇 管理科学与工程(可...
    • 76 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 38 篇 法学
    • 22 篇 法学
    • 17 篇 社会学
  • 23 篇 医学
    • 20 篇 临床医学
  • 15 篇 经济学
    • 15 篇 应用经济学
  • 14 篇 军事学
  • 6 篇 农学
  • 3 篇 教育学
  • 3 篇 文学

主题

  • 42 篇 feature extracti...
  • 39 篇 semantics
  • 36 篇 accuracy
  • 35 篇 cryptography
  • 31 篇 computational mo...
  • 28 篇 security
  • 28 篇 protocols
  • 27 篇 federated learni...
  • 27 篇 cloud computing
  • 26 篇 privacy
  • 25 篇 authentication
  • 23 篇 training
  • 22 篇 network security
  • 21 篇 deep learning
  • 20 篇 encryption
  • 19 篇 data privacy
  • 19 篇 computer network...
  • 18 篇 servers
  • 18 篇 data models
  • 17 篇 neural networks

机构

  • 82 篇 key laboratory o...
  • 66 篇 shandong provinc...
  • 51 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 shaanxi key labo...
  • 37 篇 school of comput...
  • 33 篇 school of cyber ...
  • 31 篇 institute of inf...
  • 30 篇 shaanxi key labo...
  • 22 篇 state key labora...
  • 21 篇 shandong provinc...
  • 18 篇 national enginee...
  • 18 篇 shandong fundame...
  • 17 篇 school of comput...
  • 17 篇 college of compu...
  • 15 篇 school of comput...
  • 14 篇 national compute...
  • 13 篇 xi'an university...
  • 13 篇 key laboratory o...
  • 13 篇 shaanxi key labo...

作者

  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 19 篇 baojiang cui
  • 18 篇 hei xinhong
  • 13 篇 jianfeng ma
  • 13 篇 li wei
  • 13 篇 wei wei
  • 12 篇 jing zhao
  • 12 篇 xu li
  • 12 篇 zhenyu yang
  • 12 篇 yang xiaoyuan
  • 11 篇 fu chong
  • 11 篇 li qi
  • 11 篇 lei zhu
  • 10 篇 zhang yuqing
  • 10 篇 chen zhong
  • 10 篇 liu jun
  • 10 篇 xiaoxue liu
  • 9 篇 wang lei

语言

  • 854 篇 英文
  • 160 篇 其他
  • 34 篇 中文
检索条件"机构=Network Security Laboratory Computer Engineering"
1043 条 记 录,以下是611-620 订阅
排序:
Chinese named entity recognition method for the field of network security based on RoBERTa
Chinese named entity recognition method for the field of net...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Xiaoyan Zhu Yu Zhang Lei Zhu Xinhong Hei Yichuan Wang Feixiong Hu Yanni Yao School of Computer Science and Engineering Xi’an Jiaotong University Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China School of Computer Science and Technology Xi’an University of technology Xi’an China Shenzhen Tencent Computer System Co. Ltd Shenzhen China
As the mobile Internet is developing rapidly, people who use cell phones to access the Internet dominate, and the mobile Internet has changed the development environment of online public opinion and made online public... 详细信息
来源: 评论
Motion compensation and object detection for neuromorphic camera
Motion compensation and object detection for neuromorphic ca...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Yuxin Wan Rong Fei Yu Tang Xueru Bai Guo Xie Aimin Li School of Computer science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology School of Computer Science and Engineering Xi’an University of Technology Xi’an China Guangzhou Institute Xidian University Guangzhou China School of Automation and Information Engineering Xi’an University of Technology Xi’an China
Compared to conventional cameras, the new type of vision camera-neuromorphic cameras, which can avoid motion blur and have the advantages of high spatiotemporal resolution, high dynamic range, low latency, etc. In thi... 详细信息
来源: 评论
A Joint Operation Method of Fuzzy Test and Dynamic Symbol Execution  13
A Joint Operation Method of Fuzzy Test and Dynamic Symbol Ex...
收藏 引用
13th International Conference on Intelligent Computation Technology and Automation, ICICTA 2020
作者: Xi, Zesheng Zhang, Gongxuan Zhang, Bo School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing210094 China Institute of Information and Communication Global Energy Interconnection Research Institute Nanjing210009 China State Grid Key Laboratory of Information and Network Security Nanjing210009 China
Fuzzy testing and symbol execution are the main methods of vulnerability mining for binary programs. Among them, fuzzy testing is time-consuming due to randomness, while symbol execution is limited by path explosion d... 详细信息
来源: 评论
MedSteGAN: Medical Embedding-Optimized Steganography with Improved GAN
SSRN
收藏 引用
SSRN 2023年
作者: Peng, Yuxiang Fu, Chong Zheng, Yu Tian, Yunjia Cao, Guixing Chen, Junxin School of Computer Science and Engineering Northeastern University Liaoning Shenyang110819 China Engineering Research Center of Security Technology of Complex Network System Ministry of Education China Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Northeastern University Liaoning Shenyang110819 China Department of Information Engineering The Chinese University of Hong Kong Ma Liu Shui Shatin New Territories Hong Kong Institute of Telecommunication Satellite China Academy of Space Technology Beijing100094 China School of Software Dalian University of Technology Liaoning Dalian116621 China
Medical diagnosing systems contain sensitive information, especially the resulting certificate of diagnosis that involves the patient’s privacy, required to be protected carefully. An effective way is to secretly emb... 详细信息
来源: 评论
Double JPEG Compression Detection Based on Markov Model  18th
Double JPEG Compression Detection Based on Markov Model
收藏 引用
18th International Workshop on Digital Forensics and Watermarking, IWDW 2019
作者: Wang, Jinwei Huang, Wei Luo, Xiangyang Shi, Yung-Qing Nanjing University of Information Science and Technology Nanjing210044 China Department of Computer and Software Nanjing University of Information Science and Technology NanjingJiangsu210044 China Shanxi Key Laboratory of Network and System Security Xidian University Xi’an710071 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China State Key Laboratory of Information Security Institute Information Engineering Chinese Academy of Sciences Beijing100093 China Department of Electrical Computer Engineering New Jersey Institute of Technology NewarkNJ07102 United States
In this paper, a feature based on the Markov model in quaternion discrete cosine transform (QDCT) domain is proposed for double JPEG compression detection. Firstly, a given JPEG image is extracted from blocked images ... 详细信息
来源: 评论
A privacy-preserving logistics information system with traceability
arXiv
收藏 引用
arXiv 2021年
作者: Chen, Quanru Han, Jinguang Li, Jiguo Chen, Liquan Li, Song College of Information Engineering Nanjing University of Finance and Economics Nanjing China Jiangsu Provincial Key Laboratory of E-Business Nanjing University of Finance and Economics Nanjing China College of Computer and Cyber Security Fujian Normal University Fuzhou China Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou China School of Cyber Science and Engineering Southeast University Nanjing China
Logistics Information System (LIS) is an interactive system that provides information for logistics managers to monitor and track logistics business. In recent years, with the rise of online shopping, LIS is becoming ... 详细信息
来源: 评论
Detecting Cryptojacking Traffic Based on network Behavior Features
Detecting Cryptojacking Traffic Based on Network Behavior Fe...
收藏 引用
2021 IEEE Global Communications Conference (GLOBECOM)
作者: Xiaoyan Hu Zhuozhuo Shu Xiaoyi Song Guang Cheng Jian Gong School of Cyber Science & Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education China Research Base of International Cyberspace Governance (Southeast University) Nanjing China Purple Mountain Laboratories for Network and Communication Security Nanjing China
Bitcoin and other digital cryptocurrencies have de-veloped rapidly in recent years. To reduce hardware and power costs, many criminals use the botnet to infect other hosts to mine cryptocurrency for themselves, which ... 详细信息
来源: 评论
Collaborative filtering-based recommendation system for big data
Collaborative filtering-based recommendation system for big ...
收藏 引用
作者: Shen, Jian Zhou, Tianqi Chen, Lina Jiangsu Engineering Center of Network Monitoring Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology School of Computer and Software Nanjing University of Information Science and Technology Nanjing China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing China Guangxi Key Laboratory of Cryptography and Information Security Guilin China School of Computer and Software Nanjing University of Information Science and Technology Nanjing China Guizhousheng College of Electronics and Information Guizhou China
Collaborative filtering algorithm is widely used in the recommendation system of e-commerce website, which is based on the analysis of a large number of users' historical behaviour data, so as to explore the users... 详细信息
来源: 评论
Crsanet: Class Representations Self-Attention network for the Segmentation of Thyroid Nodules
SSRN
收藏 引用
SSRN 2023年
作者: Sun, Shiyao Fu, Chong Xu, Sen Wen, Yingyou Ma, Tao School of Computer Science and Engineering Northeastern University Shenyang110819 China Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Northeastern University Shenyang110819 China Engineering Research Center of Security Technology of Complex Network System Ministry of Education China General Hospital of Northern Theatre Command Shenyang110016 China Medical Imaging Research Department Neusoft Research of Intelligent Healthcare Technology Co. Ltd. Shenyang China Dopamine Group Ltd. Auckland1542 New Zealand
Segmenting accurate thyroid nodules in medical ultrasound images is always non-trivial due to the large variation in size, shape and texture of nodules, and also the presence of surrounding tissues and organs with sim... 详细信息
来源: 评论
Uncertainty-Aware Deep Co-training for Semi-supervised Medical Image Segmentation
arXiv
收藏 引用
arXiv 2021年
作者: Zheng, Xu Fu, Chong Xie, Haoyu Chen, Jialei Wang, Xingwei Sham, Chiu-Wing School of Computer Science and Engineering Northeastern University Shenyang110819 China Engineering Research Center of Security Technology of Complex Network System Ministry of Education China Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Northeastern University Shenyang110819 China School of Computer Science The University of Auckland New Zealand
Semi-supervised learning has made significant strides in the medical domain since it alleviates the heavy burden of collecting abundant pixel-wise annotated data for semantic segmentation tasks. Existing semi-supervis... 详细信息
来源: 评论