咨询与建议

限定检索结果

文献类型

  • 606 篇 会议
  • 417 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,024 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 641 篇 工学
    • 488 篇 计算机科学与技术...
    • 395 篇 软件工程
    • 158 篇 信息与通信工程
    • 123 篇 电气工程
    • 61 篇 网络空间安全
    • 59 篇 电子科学与技术(可...
    • 56 篇 控制科学与工程
    • 52 篇 生物工程
    • 30 篇 安全科学与工程
    • 28 篇 生物医学工程(可授...
    • 26 篇 机械工程
    • 23 篇 仪器科学与技术
    • 22 篇 光学工程
    • 18 篇 交通运输工程
    • 17 篇 化学工程与技术
    • 16 篇 动力工程及工程热...
    • 16 篇 建筑学
  • 277 篇 理学
    • 170 篇 数学
    • 54 篇 生物学
    • 50 篇 统计学(可授理学、...
    • 49 篇 物理学
    • 29 篇 系统科学
    • 17 篇 化学
  • 163 篇 管理学
    • 93 篇 管理科学与工程(可...
    • 76 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 38 篇 法学
    • 22 篇 法学
    • 17 篇 社会学
  • 20 篇 医学
    • 18 篇 临床医学
  • 15 篇 经济学
    • 15 篇 应用经济学
  • 14 篇 军事学
  • 6 篇 农学
  • 3 篇 教育学
  • 3 篇 文学

主题

  • 42 篇 feature extracti...
  • 39 篇 semantics
  • 36 篇 accuracy
  • 35 篇 cryptography
  • 31 篇 computational mo...
  • 28 篇 security
  • 28 篇 protocols
  • 27 篇 cloud computing
  • 26 篇 federated learni...
  • 26 篇 privacy
  • 25 篇 authentication
  • 23 篇 training
  • 21 篇 network security
  • 20 篇 deep learning
  • 20 篇 encryption
  • 19 篇 data privacy
  • 19 篇 computer network...
  • 18 篇 servers
  • 18 篇 data models
  • 17 篇 neural networks

机构

  • 82 篇 key laboratory o...
  • 66 篇 shandong provinc...
  • 51 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 shaanxi key labo...
  • 37 篇 school of comput...
  • 33 篇 school of cyber ...
  • 31 篇 institute of inf...
  • 30 篇 shaanxi key labo...
  • 22 篇 state key labora...
  • 21 篇 shandong provinc...
  • 18 篇 college of compu...
  • 18 篇 national enginee...
  • 18 篇 shandong fundame...
  • 17 篇 school of comput...
  • 15 篇 school of comput...
  • 14 篇 national compute...
  • 13 篇 key laboratory o...
  • 13 篇 shaanxi key labo...
  • 13 篇 national compute...

作者

  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 19 篇 baojiang cui
  • 18 篇 hei xinhong
  • 13 篇 jianfeng ma
  • 13 篇 li wei
  • 12 篇 jing zhao
  • 12 篇 xu li
  • 12 篇 zhenyu yang
  • 12 篇 yang xiaoyuan
  • 11 篇 fu chong
  • 11 篇 lei zhu
  • 11 篇 wei wei
  • 10 篇 zhang yuqing
  • 10 篇 chen zhong
  • 10 篇 liu jun
  • 10 篇 xiaoxue liu
  • 10 篇 li qi
  • 9 篇 wang lei

语言

  • 878 篇 英文
  • 117 篇 其他
  • 33 篇 中文
检索条件"机构=Network Security Laboratory Computer Engineering"
1024 条 记 录,以下是641-650 订阅
排序:
Velocity-Driven Particle Swarm Optimization  19
Velocity-Driven Particle Swarm Optimization
收藏 引用
Proceedings of the 2019 8th International Conference on Computing and Pattern Recognition
作者: Wei Li Yaochi Fan Qiaoyong Jiang Qingzheng Xu School of Computer Science and Engineering Xi'an University of Technology and Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China School of Computer Science and Engineering Xi'an University of Technology Xi'an China College of Information and Communication National University of Defense Technology Xi'an China
Particle swarm optimization (PSO) is an efficient nature-inspired optimization algorithm, which has been widely applied in many engineering fields. The performance of particle swarm optimization (PSO) has been signifi... 详细信息
来源: 评论
Semantic path planning for indoor navigation and household tasks  20th
Semantic path planning for indoor navigation and household t...
收藏 引用
20th Towards Autonomous Robotic Systems Conference, TAROS 2019
作者: Sun, Nico Yang, Erfu Corney, Jonathan Chen, Yi Department of Design Manufacture and Engineering Management University of Strathclyde Glasgow United Kingdom Industry 4.0 Artificial Intelligence Laboratory School of Computer Science and Network Security Dongguan University of Technology Dongguan523808 China
Assisting people with daily living tasks in their own homes with a robot requires a navigation through a cluttered and varying environment. Sometimes the only possible path would be blocked by an obstacle which needs ... 详细信息
来源: 评论
Evaluation Method of Node Importance in Temporal Satellite networks Based on Time Slot Correlation
Research Square
收藏 引用
Research Square 2021年
作者: Xu, Rui Di, Xiaoqiang He, Xiongwen Qi, Hui School of Computer Science and Technology Changchun University of Science and Technology Changchun130022 China School of Computer Science and Technology Changchun University of Science and Technology Changchun130022 China Jilin Province Key Laboratory of Network and Information Security Changchun University of Science and Technology Changchun130022 China Information Center Changchun University of Science and Technology Changchun130022 China Beijing Institute of Spacecraft System Engineering Beijing100094 China
Temporal satellite networks can accurately describe the dynamic process of satellite networks by considering the interaction relationship and interaction sequence between satellite nodes. In addition, the measurement ... 详细信息
来源: 评论
Pocket diagnosis: Secure federated learning against poisoning attack in the cloud
arXiv
收藏 引用
arXiv 2020年
作者: Ma, Zhuoran Ma, Jianfeng Miao, Yinbin Liu, Ximeng Choo, Kim-Kwang Raymond Deng, Robert H. School of Cyber Engineering Xidian University Xi’an710071 China Guangxi Key Laboratory of Cryptography and Information Security Guilin541004 China Shaanxi Key Laboratory of Network and System Security Xidian University Xi’an710071 China Key Laboratory of Information Security of Network Systems College of Mathematics and Computer Science Fuzhou University Fuzhou350108 China Department of Information Systems and Cyber Security University of Texas at San Antonio San AntonioTX78249 United States School of Information Systems Singapore Management University 188065 Singapore
Federated learning has become prevalent in medical diagnosis due to its effectiveness in training a federated model among multiple health institutions (i.e., Data Islands (DIs)). However, increasingly massive DI-level... 详细信息
来源: 评论
How Does Knowledge Graph Embedding Extrapolate to Unseen Data: A Semantic Evidence View
arXiv
收藏 引用
arXiv 2021年
作者: Li, Ren Cao, Yanan Zhu, Qiannan Bi, Guanqun Fang, Fang Liu, Yi Li, Qian Institute of Information Engineering Chinese Academy of Sciences China School of Cyber Security University of Chinese Academy of Sciences China Gaoling School of Artificial Intelligence Renmin University of China China Beijing Key Laboratory of Big Data Management and Analysis Methods China National Computer Network Emergency Response Technical Team Coordination Center of China China University of Technology Sydney Australia
Knowledge Graph Embedding (KGE) aims to learn representations for entities and relations. Most KGE models have gained great success, especially on extrapolation scenarios. Specifically, given an unseen triple (h, r, t... 详细信息
来源: 评论
Unsupervised Domain Adaptive Person Re-Identification via Human Learning Imitation
arXiv
收藏 引用
arXiv 2021年
作者: Peng, Yang Liu, Ping Luo, Yawei Zhou, Pan Xu, Zichuan Liu, Jingen Center for Frontier AI Research Agency for Science Technology and Research Singapore Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Hubei Wuhan China College of Computer Science and Technology Zhejiang University Zhejiang Hangzhou China Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province School of Software Dalian University of Technology Liaoning Dalian China
Unsupervised domain adaptive person re-identification has received significant attention due to its high practical value. In past years, by following the clustering and finetuning paradigm, researchers propose to util... 详细信息
来源: 评论
VerifyTL: Secure and verifiable collaborative transfer learning
arXiv
收藏 引用
arXiv 2020年
作者: Ma, Zhuoran Ma, Jianfeng Miao, Yinbin Liu, Ximeng Zheng, Wei Choo, Kim-Kwang Raymond Deng, Robert H. School of Cyber Engineering Xidian University Xi'an710071 China Shaanxi Key Laboratory of Network and System Security Xidian University Xi'an710071 China Key Laboratory of Information Security of Network Systems College of Mathematics and Computer Science Fuzhou University Fuzhou350108 China Department of Information Systems and Cyber Security University of Texas at San Antonio San AntonioTX78249 United States School of Information Systems Singapore Management University Singapore188065 Singapore
Getting access to labelled datasets in certain sensitive application domains can be challenging. Hence, one often resorts to transfer learning to transfer knowledge learned from a source domain with sufficient labelle... 详细信息
来源: 评论
Incentive mechanism for data uploading in mobile crowdsensing
Incentive mechanism for data uploading in mobile crowdsensin...
收藏 引用
2019 International Conference on networking and network Applications, NaNA 2019
作者: Liu, Xiaolan Wang, Wu Yang, Bin Fan, Yuanyuan School of Computer and Information Engineering Chuzhou University Chuzhou Anhui239000 China Shaanxi Key Laboratory of Network and System Security Xidian University Xi'an Shaanxi710071 China School of Mathematics and Computer Science Yunnan Minzu University Kunming Yunnan650000 China
Mobile crowdsensing is a promising service paradigm utilizing the pervasive mobile devices to cooperatively perform large-scale sensing tasks. Data uploading which aims to deliver the sensed data to the control center... 详细信息
来源: 评论
Trading Based Service-Oriented Spectrum-Aware RAN-Slicing Under Spectrum Sharing
Trading Based Service-Oriented Spectrum-Aware RAN-Slicing Un...
收藏 引用
IEEE Conference on Wireless Communications and networking
作者: Kajia Jiao Xuanheng Li Miao Pan Fan Jiang Ming Li School of Information and Communication Engineering Dalian University of Technology Dalian China Department of Electrical and Computer Engineering University of Houston Houston TX USA Shaanxi Key Laboratory of Information Communication Network and Security Xi’an University of Posts and Telecommunications Xian Shaanxi China
The fast development on emerging services makes our telecommunications networks witness two key problems. One is the flexibility to fulfill the diverse service requests and the other is the shortage on spectrum. Netwo...
来源: 评论
An adaptive system for detecting malicious queries in web attacks
收藏 引用
Science China(Information Sciences) 2018年 第3期61卷 175-190页
作者: Ying DONG Yuqing ZHANG Hua MA Qianru WU Qixu LIU Kai WANG Wenjie WANG National Computer Network Intrusion Protection Center University of Chinese Academy of Sciences State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of Sciences School of Mathematics and Statistics Xidian University Security Department Alibaba Group Zhanlu Laboratory Tencent Incorporation
Web request query strings(queries), which pass parameters to a referenced resource, are always manipulated by attackers to retrieve sensitive data and even take full control of victim web servers and web applications.... 详细信息
来源: 评论