咨询与建议

限定检索结果

文献类型

  • 614 篇 会议
  • 428 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,043 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 664 篇 工学
    • 508 篇 计算机科学与技术...
    • 410 篇 软件工程
    • 171 篇 信息与通信工程
    • 141 篇 电气工程
    • 70 篇 网络空间安全
    • 67 篇 控制科学与工程
    • 63 篇 电子科学与技术(可...
    • 52 篇 生物工程
    • 37 篇 安全科学与工程
    • 28 篇 机械工程
    • 28 篇 生物医学工程(可授...
    • 25 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 23 篇 光学工程
    • 18 篇 化学工程与技术
    • 17 篇 建筑学
    • 16 篇 动力工程及工程热...
  • 280 篇 理学
    • 173 篇 数学
    • 54 篇 生物学
    • 51 篇 统计学(可授理学、...
    • 50 篇 物理学
    • 29 篇 系统科学
    • 19 篇 化学
  • 171 篇 管理学
    • 101 篇 管理科学与工程(可...
    • 76 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 38 篇 法学
    • 22 篇 法学
    • 17 篇 社会学
  • 23 篇 医学
    • 20 篇 临床医学
  • 15 篇 经济学
    • 15 篇 应用经济学
  • 14 篇 军事学
  • 6 篇 农学
  • 3 篇 教育学
  • 3 篇 文学

主题

  • 42 篇 feature extracti...
  • 39 篇 semantics
  • 36 篇 accuracy
  • 35 篇 cryptography
  • 31 篇 computational mo...
  • 28 篇 security
  • 28 篇 protocols
  • 27 篇 federated learni...
  • 27 篇 cloud computing
  • 26 篇 privacy
  • 25 篇 authentication
  • 23 篇 training
  • 22 篇 network security
  • 21 篇 deep learning
  • 20 篇 encryption
  • 19 篇 data privacy
  • 19 篇 computer network...
  • 18 篇 servers
  • 18 篇 data models
  • 17 篇 neural networks

机构

  • 82 篇 key laboratory o...
  • 66 篇 shandong provinc...
  • 51 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 shaanxi key labo...
  • 37 篇 school of comput...
  • 33 篇 school of cyber ...
  • 31 篇 institute of inf...
  • 30 篇 shaanxi key labo...
  • 22 篇 state key labora...
  • 21 篇 shandong provinc...
  • 18 篇 national enginee...
  • 18 篇 shandong fundame...
  • 17 篇 school of comput...
  • 17 篇 college of compu...
  • 15 篇 school of comput...
  • 14 篇 national compute...
  • 13 篇 xi'an university...
  • 13 篇 key laboratory o...
  • 13 篇 shaanxi key labo...

作者

  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 19 篇 baojiang cui
  • 18 篇 hei xinhong
  • 13 篇 jianfeng ma
  • 13 篇 li wei
  • 13 篇 wei wei
  • 12 篇 jing zhao
  • 12 篇 xu li
  • 12 篇 zhenyu yang
  • 12 篇 yang xiaoyuan
  • 11 篇 fu chong
  • 11 篇 li qi
  • 11 篇 lei zhu
  • 10 篇 zhang yuqing
  • 10 篇 chen zhong
  • 10 篇 liu jun
  • 10 篇 xiaoxue liu
  • 9 篇 wang lei

语言

  • 854 篇 英文
  • 160 篇 其他
  • 34 篇 中文
检索条件"机构=Network Security Laboratory Computer Engineering"
1043 条 记 录,以下是621-630 订阅
排序:
PCLT-PPI: Predicting Multi-type Interactions between Proteins based on Point Cloud Structure and Local Topology Preservation
收藏 引用
IEEE Journal of Biomedical and Health Informatics 2025年
作者: Li, Minglei Hou, Yurui Wang, Shuqin Wei, Jinmao Liu, Jian Nankai University College of Computer Science Tianjin300071 China Nankai University Center for Bioinformatics and Intelligent Medicine Tianjin300071 China Tianjin Key Laboratory of Network and Data Security Technology Tianjin300071 China Tianjin Normal University College of Computer and Information Engineering Tianjin300387 China
Protein-protein interactions (PPIs) play a crucial role in cellular biochemical reactions. Computationally mining PPI can help us better understand cellular regulatory mechanisms. Most existing methods focus on the li... 详细信息
来源: 评论
A Three-party Repeated Game Model for Data Privacy in Mobile Edge Crowdsensing of IoT  13
A Three-party Repeated Game Model for Data Privacy in Mobile...
收藏 引用
13th EAI International Conference on Mobile Multimedia Communications, Mobimedia 2020
作者: Zhao, Mingfeng Chen, Lei Xiong, Jinbo Tian, Youliang Fujian Provincial Key Laboratory of Network Security and Cryptology College of Mathematics and Informatics Fujian Normal University Fuzhou350117 China College of Engineering and Computing Georgia Southern University GA30458 United States State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang550025 China
The low request response delay of mobile edge crowdsensing (MECS) paradigm allows quick interactions among entities in practical scenarios. However, there often exist dishonest behaviors in such interactions, and the ... 详细信息
来源: 评论
Enabling Deep Learning-based Physical-layer Secret Key Generation for FDD-OFDM Systems in Multi-Environments
arXiv
收藏 引用
arXiv 2022年
作者: Zhang, Xinwei Li, Guyue Zhang, Junqing Peng, Linning Hu, Aiqun Wang, Xianbin The School of Cyber Science and Engineering Southeast University Nanjing210096 China The Department of Electrical Engineering and Electronics University of Liverpool LiverpoolL69 3GJ United Kingdom The School of Information Science and Engineering National Mobile Communications Research Laboratory Southeast University Nanjing210096 China The Purple Mountain Laboratories for Network and Communication Security Nanjing210096 China The Department of Electrical and Computer Engineering Western University LondonONN6A 5B9 Canada
Deep learning-based physical-layer secret key generation (PKG) has been used to overcome the imperfect uplink/downlink channel reciprocity in frequency division duplexing (FDD) orthogonal frequency division multiplexi... 详细信息
来源: 评论
WebIDE cloud server resource allocation with task pre-scheduling in IOT application development  2
WebIDE cloud server resource allocation with task pre-schedu...
收藏 引用
2nd IEEE International Conference on Industrial Internet Cloud, ICII 2019
作者: Wang, Huaijun Li, Junhuai Tian, Jubo Wang, Kan Shaanxi Key Laboratory for Network Computing and Security Technology School of Computer Science and Engineering Xian University of Technology Xian710048 China
WebIDE is leveraged for IOT applications development, which could adapt to the rapid growth of IOT applications and meanwhile facilitate the rapid development. Resource allocation is of vital significance in the WebID... 详细信息
来源: 评论
Threat-Based Declassification and Endorsement for Mobile Computing
收藏 引用
Chinese Journal of Electronics 2019年 第5期28卷 1041-1052页
作者: YIN Lihua GUO Yunchuan ZHANG Huibing HUANG Wenting FANG Binxing Cyberspace Institute of Advanced Technology Guangzhou University The State Key Laboratory of Information Security Institute of Information Engineering CAS Guangxi Key Lab of Trusted Software Guilin University of Electronic Technology The National Computer Network Emergency Response Technical Team/Coordination Center of China
Declassification and endorsement can efficiently improve the usability of mobile ***, both declassify and endorse operations in practice are often ad-hoc and nondeterministic, thus, being insecure. From a new perspect... 详细信息
来源: 评论
Q&A driven conversational recommendation integrating multiple interest modeling
收藏 引用
Neurocomputing 2025年 647卷
作者: Haiping Zhu Yuqi Sun Shuwei Che Yan Chen School of Computer Science and Technology Xi’an Jiaotong University Xi’an 710049 China Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Xi’an Jiaotong University Xi’an 710049 China Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an 710049 China
The conversational recommendation aims to provide users with recommendations in an interaction form of “System Ask-User Respond”. Existing studies rarely consider combining users’ multi-interest at the attribute le... 详细信息
来源: 评论
A 2-bit graphene encoder based on the plasmon-induced transparency effect and its sensing characteristics
收藏 引用
Results in Physics 2024年 59卷
作者: Zhu, Aijun Li, Zongteng Hou, Weigang Yang, Xinghua Cheng, Lei Hu, Cong Qiao, Fei Mahapatra, Rabi Guangxi Key Laboratory of Automatic Detecting Technology and Instruments Guilin University of Electronic Technology Guilin 541004 China Shanxi Key Laboratory of Advanced Semiconductor Optoelectronic Devices and Integrated Systems Jincheng Shanxi 048000 China Institute of Intelligent Communication and Network Security Chongqing University of Posts and Telecommunications Chongqing 400000 China College of Science Beijing Forestry University Beijing 100083 China Jincheng Research Institute of Opto-mechatronics Industry Jincheng Shanxi 048000 China Guangxi Key Laboratory of Brain-inspired Computing and Intelligent Chips Guangxi Normal University Guilin 541004 China Department of Electronic Engineering Tsinghua University Beijing 100084 China Department of Computer Science and Engineering Texas A&M University College Station 77843-3112 TX United States
A 2-bit encoder based on the plasmon-induced transparency (PIT) effect was proposed and investigated in the range from 2 to 7 THz. The Lorentz oscillation coupling model was utilized to confirm the simulation. By tuni... 详细信息
来源: 评论
A lightweight privacy-preserving scheme using label-based pixel block mixing for image classification in deep learning
arXiv
收藏 引用
arXiv 2021年
作者: Xiang, Yuexin Li, Tiantian Ren, Wei Zhu, Tianqing Raymond Choo, Kim-Kwang School of Computer Science China University of Geosciences Wuhan China Henan Key Laboratory of Network Cryptography Technology Zhengzhou China Key Laboratory of Network Assessment Technology CAS Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China Department of Information Systems and Cyber Security University of Texas at San Antonio San AntonioTX78249-0631 United States
To ensure the privacy of sensitive data used in the training of deep learning models, a number of privacy-preserving methods have been designed by the research community. However, existing schemes are generally design... 详细信息
来源: 评论
Semi-supervised federated learning with non-IID data: Algorithm and system design
arXiv
收藏 引用
arXiv 2021年
作者: Zhang, Zhe Ma, Shiyao Nie, Jiangtian Wu, Yi Yan, Qiang Xu, Xiaoke Niyato, Dusit School of Data Science and Technology Heilongjiang University Harbin150080 China Cryptology and Network Security Laboratory of Heilongjiang University Harbin150080 China College of Information and Communication Engineering Dalian Minzu University School of Computer Science and Engineering Nanyang Technological University WeBank Co. Ltd. China
Federated Learning (FL) allows edge devices (or clients) to keep data locally while simultaneously training a shared high-quality global model. However, current research is generally based on an assumption that the tr... 详细信息
来源: 评论
Domestic Violence Crisis Recognition Method based on Bi-LSTM+Attention
Domestic Violence Crisis Recognition Method based on Bi-LSTM...
收藏 引用
International Conference on network and Information Systems for computers (ICNISC)
作者: Zhixiao Wang Wenyao Yan Zhuochun Li Min Huang Qinyuan Fan Xin Wang Xi'an University of Technology Xi'an China Shaanxi Key Laboratory of Network Computing and Security Xi'an China College of Xi'an Innovation Yan'an University Xi'an China University of Pittsburgh Pittsburgh PA USA Art and Design Xi'an University of Technology Xi'an China Fakultät Verkehrs- und Maschinensysteme Technische Universität Berlin Berlin Germany Computer Science and Engineering Xi'an University of Technology Xi'an China
Domestic violence (DV) is getting more and more attention due to the critical trouble and danger that pose great challenge to human rights and health. The popularity of various social medias can help these victims to ... 详细信息
来源: 评论