咨询与建议

限定检索结果

文献类型

  • 606 篇 会议
  • 417 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,024 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 641 篇 工学
    • 488 篇 计算机科学与技术...
    • 395 篇 软件工程
    • 158 篇 信息与通信工程
    • 123 篇 电气工程
    • 61 篇 网络空间安全
    • 59 篇 电子科学与技术(可...
    • 56 篇 控制科学与工程
    • 52 篇 生物工程
    • 30 篇 安全科学与工程
    • 28 篇 生物医学工程(可授...
    • 26 篇 机械工程
    • 23 篇 仪器科学与技术
    • 22 篇 光学工程
    • 18 篇 交通运输工程
    • 17 篇 化学工程与技术
    • 16 篇 动力工程及工程热...
    • 16 篇 建筑学
  • 277 篇 理学
    • 170 篇 数学
    • 54 篇 生物学
    • 50 篇 统计学(可授理学、...
    • 49 篇 物理学
    • 29 篇 系统科学
    • 17 篇 化学
  • 163 篇 管理学
    • 93 篇 管理科学与工程(可...
    • 76 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 38 篇 法学
    • 22 篇 法学
    • 17 篇 社会学
  • 20 篇 医学
    • 18 篇 临床医学
  • 15 篇 经济学
    • 15 篇 应用经济学
  • 14 篇 军事学
  • 6 篇 农学
  • 3 篇 教育学
  • 3 篇 文学

主题

  • 42 篇 feature extracti...
  • 39 篇 semantics
  • 36 篇 accuracy
  • 35 篇 cryptography
  • 31 篇 computational mo...
  • 28 篇 security
  • 28 篇 protocols
  • 27 篇 cloud computing
  • 26 篇 federated learni...
  • 26 篇 privacy
  • 25 篇 authentication
  • 23 篇 training
  • 21 篇 network security
  • 20 篇 deep learning
  • 20 篇 encryption
  • 19 篇 data privacy
  • 19 篇 computer network...
  • 18 篇 servers
  • 18 篇 data models
  • 17 篇 neural networks

机构

  • 82 篇 key laboratory o...
  • 66 篇 shandong provinc...
  • 51 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 shaanxi key labo...
  • 37 篇 school of comput...
  • 33 篇 school of cyber ...
  • 31 篇 institute of inf...
  • 30 篇 shaanxi key labo...
  • 22 篇 state key labora...
  • 21 篇 shandong provinc...
  • 18 篇 college of compu...
  • 18 篇 national enginee...
  • 18 篇 shandong fundame...
  • 17 篇 school of comput...
  • 15 篇 school of comput...
  • 14 篇 national compute...
  • 13 篇 key laboratory o...
  • 13 篇 shaanxi key labo...
  • 13 篇 national compute...

作者

  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 19 篇 baojiang cui
  • 18 篇 hei xinhong
  • 13 篇 jianfeng ma
  • 13 篇 li wei
  • 12 篇 jing zhao
  • 12 篇 xu li
  • 12 篇 zhenyu yang
  • 12 篇 yang xiaoyuan
  • 11 篇 fu chong
  • 11 篇 lei zhu
  • 11 篇 wei wei
  • 10 篇 zhang yuqing
  • 10 篇 chen zhong
  • 10 篇 liu jun
  • 10 篇 xiaoxue liu
  • 10 篇 li qi
  • 9 篇 wang lei

语言

  • 878 篇 英文
  • 117 篇 其他
  • 33 篇 中文
检索条件"机构=Network Security Laboratory Computer Engineering"
1024 条 记 录,以下是661-670 订阅
排序:
Efficient Malware Originated Traffic Classification by Using Generative Adversarial networks
Efficient Malware Originated Traffic Classification by Using...
收藏 引用
IEEE Symposium on computers and Communications (ISCC)
作者: Zhicheng Liu Shuhao Li Yongzheng Zhang Xiaochun Yun Zhenyu Cheng Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Key Laboratory of Network Assessment Technology Chinese Academy of Sciences Beijing China National Computer Network Emergency Response Technical Team/Coordination Center of China Beijing China
With the booming of malware-based cyber-security incidents and the sophistication of attacks, previous detections based on malware sample analysis appear powerless due to time-consuming and labor-intensive analysis pr...
来源: 评论
In-situ data scheduling optimization based on rainbow DQN for IIoT
收藏 引用
Future Generation computer Systems 2026年 174卷
作者: Peiying Zhang Siyi Li Lizhuang Tan Neeraj Kumar Jian Wang Kai Liu Qingdao Institute of Software College of Computer Science and Technology China University of Petroleum (East China) Qingdao 266580 China Shandong Key Laboratory of Intelligent Oil & Gas Industrial Software Qingdao 266580 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan 250014 China Department of Computer Science and Engineering Thapar Institute of Engineering and Technology Patiala 147004 India Department of Computer Science University of Economics and Human Sciences Warszawa 01-043 Poland Department of Networks and Communications College of Computer Science and Information Technology Imam Abdulrahman Bin Faisal University Dammam 31441 Saudi Arabia College of Science China University of Petroleum (East China) Qingdao 266580 China Beijing National Research Center for Information Science and Technology Tsinghua University Beijing 100084 China State Key Laboratory of Space Network and Communications Tsinghua University Beijing 100084 China
In industrial systems, in-situ computing refers to a mode of local or proximate data processing within the cloud–edge-terminal architecture. In the Industrial Internet of Things (IIoT) environment, servers are typica...
来源: 评论
Computational strategy of dynamic nanorod networks for dielectric elastomer nanocomposites towards the balance of high permittivity, low modulus, and high breakdown strength
收藏 引用
Polymer 2025年 333卷
作者: Han Qin Yancong Feng Tao Liu Baofeng Gao Ying Guo Jingshan Pan Ming Tian Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan 250000 China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan 250000 China Guangdong Provincial Key Laboratory of Optical Information Materials and Technology & Institute of Electronic Paper Displays South China Academy of Advanced Optoelectronics South China Normal University Guangzhou 510006 China State Key Laboratory of Organic-Inorganic Composites College of Materials Science and Engineering Beijing University of Chemical Technology Beijing 100029 China
Dielectric elastomers exhibit immense potential in emerging fields such as soft robotics, flexible sensors, wearable electronic devices, and energy harvesting, but their widespread application is limited by the intric...
来源: 评论
Modeling of Layered Supply Chain network Considering Similarity
Modeling of Layered Supply Chain Network Considering Similar...
收藏 引用
第32届中国控制与决策会议
作者: Yi Zhang Yurong Song Guoping Jiang Bin Yu School of Computer Science Software and Network Space SecurityNanjing University of Posts and Telecommunications School of Automation Nanjing University of Posts and Telecommunications Jiangsu Engineering Lab for IOT Intelligent Robots(IOTRobot) Hengyang Key Laboratory of Information Secure and its application research
The supply chain network is a complex network with the risk of cascading *** study the cascading failure in it,an accurate supply chain network model needs to be *** this paper,we construct a layered supply chain netw... 详细信息
来源: 评论
LR-RRA-CCA secure functional encryption for randomized functionalities from trapdoor HPS and LAF
收藏 引用
Science China(Information Sciences) 2018年 第5期61卷 291-305页
作者: Huige WANG Kefei CHEN Baodong QIN Ziyuan HU Department of Network Engineering Anhui Science and Technology University Department of Computer Science and Engineering Shanghai Jiao Tong University Department of Mathematics Hangzhou Normal University Westone Cryptologic Research Center National Engineering Laboratory for Wireless Security Xi'an University of Posts and Telecommunications State Key Laboratory of Cryptology
Original public-key encryption is viewed as a tool to encrypt point-to-point *** data is aimed at a particular user,where a sender encrypts a message x under a specified public key P *** this case,only the owner of th... 详细信息
来源: 评论
An improved covariance spectrum sensing algorithm establish on AD test  4th
An improved covariance spectrum sensing algorithm establish ...
收藏 引用
4th International Conference on Signal and Information Processing, networking and computers, ICSINC 2018
作者: Chen, Yaqin Jing, Xiaojun Mu, Junsheng Li, Jia National Engineering Laboratory for Mobile Network Security Beijing University of Posts and Telecommunications Beijing China Ministry of Education Beijing University of Posts and Telecommunications Beijing China School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China School of Engineering and Computer Science Oakland University Rochester United States
Owing to no need for prior knowledge of signal, blind spectrum sensing has received wide attention. Covariance Absolute Value (CAV) detection algorithm, one of the most popular blind sensing algorithms, considers the ... 详细信息
来源: 评论
Golden grain: Building a secure and decentralized model marketplace for MLaaS
arXiv
收藏 引用
arXiv 2020年
作者: Weng, Jiasi Weng, Jian Cai, Chengjun Huang, Hongwei Wang, Cong The College of Information Science and Technology College of Cyber security National Joint Engineering Research Center of Network Security Detection and Protection Technology Guangdong Key Laboratory of Data Security and Privacy Preserving Jinan University Guangzhou510632 China The Department of Computer Science City University of Hong Kong Hong Kong Hong Kong The City University of Hong Kong Shenzhen Research Institute Shenzhen518057 China
ML-as-a-service (MLaaS) becomes increasingly popular and revolutionizes the lives of people. A natural requirement for MLaaS is, however, to provide highly accurate prediction services. To achieve this, current MLaaS ... 详细信息
来源: 评论
A Symmetric Uniform Formula and Sole Index Method for Sieving (Twin) Primes
A Symmetric Uniform Formula and Sole Index Method for Sievin...
收藏 引用
IEEE International Conference on Trust, security and Privacy in Computing and Communications (TrustCom)
作者: Wei Ren School of Computer Science China University of Geosciences Wuhan P.R. China Guangxi Key Laboratory of Cryptography and Information Security Guilin P.R. China Key Laboratory of Network Assessment Technology CAS Institute of Information Engineering Chinese Academy of Sciences Beijing P.R. China
All primes can be indexed by k, as primes must be in the form of 6k+1 or 6k-1. In this paper, we explore for the set of k such that either 6k+1 or 6k-1 is not a prime. Our method provides a uniform formula for k that ... 详细信息
来源: 评论
Research on System Dynamics and Agent Hybrid Modeling Method for Multi-Energy Collaborative Control under Ubiquitous Power Internet  3
Research on System Dynamics and Agent Hybrid Modeling Method...
收藏 引用
3rd IEEE Conference on Energy Internet and Energy System Integration, EI2 2019
作者: Zhang, Fuxing Zhang, Yingjie Zhan, Xiong Luo, Juan Miao, Honglei Gui, Yonghua Hunan University College of Computer Science and Electronic Engineering Changsha China Global Energy Interconnection Research Institute State Grid Key Laboratory of Information Network Security Beijing China HNAC Technology Co. Ltd. Hardware RD Department Changsha China
In order to promote the study of system dynamics (SD) and multi-agent theory and its wide application in the field of renewable energy, a hybrid modeling method of SD and Agent is proposed in this paper, which is suit... 详细信息
来源: 评论
SCScan: A SVM-Based Scanning System for Vulnerabilities in Blockchain Smart Contracts
SCScan: A SVM-Based Scanning System for Vulnerabilities in B...
收藏 引用
IEEE International Conference on Trust, security and Privacy in Computing and Communications (TrustCom)
作者: Xiaohan Hao Wei Ren Wenwen Zheng Tianqing Zhu School of Computer Science China University of Geosciences Wuhan P.R. China Guangxi Key Laboratory of Cryptography and Information Security Guilin P.R. China Key Laboratory of Network Assessment Technology CAS Institute of Information Engineering Chinese Academy of Sciences Beijing P.R. China
The application of blockchain has moved beyond cryptocurrencies, to applications such as credentialing and smart contracts. The smart contract allows ones to achieve fair exchange for values without relying on a centr... 详细信息
来源: 评论