咨询与建议

限定检索结果

文献类型

  • 606 篇 会议
  • 417 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,024 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 641 篇 工学
    • 488 篇 计算机科学与技术...
    • 395 篇 软件工程
    • 158 篇 信息与通信工程
    • 123 篇 电气工程
    • 61 篇 网络空间安全
    • 59 篇 电子科学与技术(可...
    • 56 篇 控制科学与工程
    • 52 篇 生物工程
    • 30 篇 安全科学与工程
    • 28 篇 生物医学工程(可授...
    • 26 篇 机械工程
    • 23 篇 仪器科学与技术
    • 22 篇 光学工程
    • 18 篇 交通运输工程
    • 17 篇 化学工程与技术
    • 16 篇 动力工程及工程热...
    • 16 篇 建筑学
  • 277 篇 理学
    • 170 篇 数学
    • 54 篇 生物学
    • 50 篇 统计学(可授理学、...
    • 49 篇 物理学
    • 29 篇 系统科学
    • 17 篇 化学
  • 163 篇 管理学
    • 93 篇 管理科学与工程(可...
    • 76 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 38 篇 法学
    • 22 篇 法学
    • 17 篇 社会学
  • 20 篇 医学
    • 18 篇 临床医学
  • 15 篇 经济学
    • 15 篇 应用经济学
  • 14 篇 军事学
  • 6 篇 农学
  • 3 篇 教育学
  • 3 篇 文学

主题

  • 42 篇 feature extracti...
  • 39 篇 semantics
  • 36 篇 accuracy
  • 35 篇 cryptography
  • 31 篇 computational mo...
  • 28 篇 security
  • 28 篇 protocols
  • 27 篇 cloud computing
  • 26 篇 federated learni...
  • 26 篇 privacy
  • 25 篇 authentication
  • 23 篇 training
  • 21 篇 network security
  • 20 篇 deep learning
  • 20 篇 encryption
  • 19 篇 data privacy
  • 19 篇 computer network...
  • 18 篇 servers
  • 18 篇 data models
  • 17 篇 neural networks

机构

  • 82 篇 key laboratory o...
  • 66 篇 shandong provinc...
  • 51 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 shaanxi key labo...
  • 37 篇 school of comput...
  • 33 篇 school of cyber ...
  • 31 篇 institute of inf...
  • 30 篇 shaanxi key labo...
  • 22 篇 state key labora...
  • 21 篇 shandong provinc...
  • 18 篇 college of compu...
  • 18 篇 national enginee...
  • 18 篇 shandong fundame...
  • 17 篇 school of comput...
  • 15 篇 school of comput...
  • 14 篇 national compute...
  • 13 篇 key laboratory o...
  • 13 篇 shaanxi key labo...
  • 13 篇 national compute...

作者

  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 19 篇 baojiang cui
  • 18 篇 hei xinhong
  • 13 篇 jianfeng ma
  • 13 篇 li wei
  • 12 篇 jing zhao
  • 12 篇 xu li
  • 12 篇 zhenyu yang
  • 12 篇 yang xiaoyuan
  • 11 篇 fu chong
  • 11 篇 lei zhu
  • 11 篇 wei wei
  • 10 篇 zhang yuqing
  • 10 篇 chen zhong
  • 10 篇 liu jun
  • 10 篇 xiaoxue liu
  • 10 篇 li qi
  • 9 篇 wang lei

语言

  • 878 篇 英文
  • 117 篇 其他
  • 33 篇 中文
检索条件"机构=Network Security Laboratory Computer Engineering"
1024 条 记 录,以下是651-660 订阅
排序:
Generating superpixels for high-resolution images with Decoupled Patch Calibration
arXiv
收藏 引用
arXiv 2021年
作者: Wang, Yaxiong Wei, Yunchao Qian, Xueming Zhu, Li Yang, Yi The School of Software Engineering Xi'an Jiaotong University Xi'an710049 China School of Computer and Information Technology Beijing Jiaotong University Beijing100000 China The Key Laboratory for Intelligent Networks and Network Security Ministry of Education Xi'an Jiaotong University Xi'an710049 China The SMILES Laboratory Xi'an Jiaotong University Xi'an710049 China Zhibian Technology Co. Ltd. Taizhou317000 China The School of Software Xi'an Jiaotong University Xi'an710049 China School of Computer Science and Technology Zhejiang University Hangzhou310000 China
Superpixel segmentation has recently seen important progress benefiting from the advances in differentiable deep learning. However, the very high-resolution superpixel segmentation still remains challenging due to the... 详细信息
来源: 评论
A Joint Operation Method of Fuzzy Test and Dynamic Symbol Execution
A Joint Operation Method of Fuzzy Test and Dynamic Symbol Ex...
收藏 引用
International Conference on Intelligent Computation Technology and Automation, ICICTA
作者: Zesheng Xi Gongxuan Zhang Bo Zhang School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing China Institute of Information and Communication Global Energy Interconnection Research Institute Nanjing China State Grid Key Laboratory of Information & Network Security Nanjing China
Fuzzy testing and symbol execution are the main methods of vulnerability mining for binary programs. Among them, fuzzy testing is time-consuming due to randomness, while symbol execution is limited by path explosion d... 详细信息
来源: 评论
An Enhanced Feature Selection Approach based on Mutual Information for Breast Cancer Diagnosis  6
An Enhanced Feature Selection Approach based on Mutual Infor...
收藏 引用
6th International Conference on Image and Signal Processing and their Applications, ISPA 2019
作者: Zemmal, Nawel Azizi, Nabiha Ziani, Amel Benzebouchi, Nacer Eddine Aldwairi, Monther Badji Mokhtar University Labged Laboratory Annaba23000 Algeria Department of Mathematics and Computer Science Mohamed Cherif Messaadia University Souk-Ahras41000 Algeria Lri Laboratory: Information Research Laboratory Computer Science Department Annaba23000 Algeria Jordan University of Science and Technology Department of Network Engineering and Security Irbid22110 Jordan
Breast cancer is the most feared disease in the female population. Early detection plays an important role to improve prognosis. Mammography is the best examination for the detection of breast cancer. However, in some... 详细信息
来源: 评论
Velocity-driven particle swarm optimization  8
Velocity-driven particle swarm optimization
收藏 引用
8th International Conference on Computing and Pattern Recognition, ICCPR 2019
作者: Li, Wei Fan, Yaochi Jiang, Qiaoyong Xu, Qingzheng School of Computer Science and Engineering Xi'An University of Technology China Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an710048 China School of Computer Science and Engineering Xi'An University of Technology Xi'an710048 China College of Information and Communication National University of Defense Technology Xi'an710106 China
Particle swarm optimization (PSO) is an efficient nature-inspired optimization algorithm, which has been widely applied in many engineering fields. The performance of particle swarm optimization (PSO) has been signifi... 详细信息
来源: 评论
反向连边在大型分层网络中的影响(英文)
收藏 引用
engineering 2024年 第5期 240-249页
作者: 曹浩森 胡斌斌 莫小雨 陈都鑫 高建喜 袁烨 陈关荣 Tamás Vicsek 管晓宏 张海涛 MOE Engineering Research Center of Autonomous Intelligent Unmanned Systems State Key Laboratory of Intelligent Manufacturing Equipment and Technology School of Artificial Intelligence and Automation Huazhong University of Science and Technology School of Mechanical and Aerospace Engineering Nanyang Technological University Jiangsu Key Laboratory of Networked Collective Intelligence School of Mathematics Southeast University Department of Computer Science Rensselaer Polytechnic Institute Department of Electronic Engineering City University of Hong Kong Department of Biological Physics E?tv?s University MOE Key Laboratory for Intelligent Networks and Network Security School of Automation Science and Engineering Xi'an Jiaotong University
Hierarchical networks are frequently encountered in animal groups, gene networks, and artificial engineering systems such as multiple robots, unmanned vehicle systems, smart grids, wind farm networks,and so forth. The...
来源: 评论
Investigating Bi-level optimization for learning and vision from a unified perspective: A survey and beyond
arXiv
收藏 引用
arXiv 2021年
作者: Liu, Risheng Gao, Jiaxin Zhang, Jin Meng, Deyu Lin, Zhouchen DUT-RU International School of Information Science & Engineering Dalian University of Technology Key Laboratory for Ubiquitous Network Service Software of Liaoning Province Dalian116024 China Department of Mathematics Southern University of Science and Technology National Center for Applied Mathematics Shenzhen China School of Mathematics and Statistics Ministry of Education Key Lab of Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an Shaanxi China School of Electronics Engineering and Computer Science Peking University Beijing100871 China Cooperative Medianet Innovation Center Shanghai Jiao Tong University Shanghai200240 China
Bi-Level Optimization (BLO) is originated from the area of economic game theory and then introduced into the optimization community. BLO is able to handle problems with a hierarchical structure, involving two levels o... 详细信息
来源: 评论
A personalized privacy protection data uploading scheme for mobile crowdsensing  2
A personalized privacy protection data uploading scheme for ...
收藏 引用
2nd IEEE International Conference on Industrial Internet Cloud, ICII 2019
作者: Ma, Rong Chen, Lei Xiong, Jinbo Tian, Youliang Li, Qi Liu, Ximeng Fujian Provincial Key Laboratory of Network Security and Cryptology College of Mathematics and Informatics Fujian Normal University Fuzhou350117 China College of Engineering and Computing Georgia Southern University GA30458 United States Guizhou Provincial Key Laboratory of Public Big Data Guizhou University Guiyang550025 China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210023 China Fujian Provincial Key Laboratory of Information Security of Network Systems College of Mathematics and Computer Science Fuzhou University Fuzhou350108 China
Mobile crowdsensing is a typical application of the Industrial Internet of hings and brings a promising opportunity to construct powerful industrial systems and services. The existing privacy protection schemes usuall... 详细信息
来源: 评论
An improved LBG algorithm for user clustering in ultra-dense network  5th
An improved LBG algorithm for user clustering in ultra-dense...
收藏 引用
5th Euro-China Conference on Intelligent Data Analysis and Applications, ECC 2018
作者: Liang, Yanxia Liu, Yao Sun, Changyin Liu, Xin Jiang, Jing Gao, Yan Xie, Yongbin Shaanxi Key Laboratory of Information Communication Network and Security Xi’an University of Posts and Telecommunications Xi’an710121 China Department of Computer Science and Engineering University of South Florida TampaFL33647 United States School of Information Engineering Xi’an Eurasia University Xi’an710065 China
A novel LBG-based user clustering algorithm is proposed to reduce interference efficiently in Ultra-Dense network (UDN). There are two stages, weight design and user clustering. Because a user could interfere and be i... 详细信息
来源: 评论
Semantically Secure and Verifiable Multi-keyword Search in Cloud Computing  1
收藏 引用
2nd International Conference on Machine Learning for Cyber security, ML4CS 2019
作者: Zhang, Lili Wang, Wenjie Zhang, Yuqing National Key Laboratory of Integrated Services Networks Xidian University Xi’an710071 China Henan International Joint Laboratory of Cyberspace Security Applications Information Engineering College Henan University of Science and Technology Luoyang471023 China National Computer Network Intrusion Protection Center University of Chinese Academy of Sciences Beijing100049 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China
In cloud computing model, the data are usually encrypted before outsourced to the cloud server, which protects the data privacy, but also leaves keyword searches over ciphertext data a challenging problem. A keyword s... 详细信息
来源: 评论
衰亡链揭示互利共生生态系统中安全与崩溃的中间阶段(英文)
收藏 引用
engineering 2024年 第12期 89-98页
作者: 王光炜 刘雪明 肖颖 袁烨 潘林强 管晓宏 高建喜 张海涛 The MOE Engineering Research Center of Autonomous Intelligent Unmanned Systems State Key Laboratory of Digital Manufacturing Equipment and Technology School of Artificial Intelligence and Automation Huazhong University of Science and Technology Guangdong HUST Industrial Technology Research Institute Huazhong University of Science and Technology Guangdong Provincial Engineering Technology Center of Autonomous Unmanned Vessels MOE Key Laboratory of Intelligent Networks and Network Security&State Key Laboratory of Manufacturing Systems Xi'an Jiaotong University Tsinghua National Laboratory of Information Science and Technology Department of Automation Tsinghua University Department of Computer Science Rensselaer Polytechnic Institute
Ecosystems are undergoing unprecedented persistent deterioration due to unsustainable anthropogenic human activities, such as overfishing and deforestation, and the effects of such damage on ecological stability are u...
来源: 评论