咨询与建议

限定检索结果

文献类型

  • 614 篇 会议
  • 428 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,043 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 664 篇 工学
    • 508 篇 计算机科学与技术...
    • 410 篇 软件工程
    • 171 篇 信息与通信工程
    • 141 篇 电气工程
    • 70 篇 网络空间安全
    • 67 篇 控制科学与工程
    • 63 篇 电子科学与技术(可...
    • 52 篇 生物工程
    • 37 篇 安全科学与工程
    • 28 篇 机械工程
    • 28 篇 生物医学工程(可授...
    • 25 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 23 篇 光学工程
    • 18 篇 化学工程与技术
    • 17 篇 建筑学
    • 16 篇 动力工程及工程热...
  • 280 篇 理学
    • 173 篇 数学
    • 54 篇 生物学
    • 51 篇 统计学(可授理学、...
    • 50 篇 物理学
    • 29 篇 系统科学
    • 19 篇 化学
  • 171 篇 管理学
    • 101 篇 管理科学与工程(可...
    • 76 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 38 篇 法学
    • 22 篇 法学
    • 17 篇 社会学
  • 23 篇 医学
    • 20 篇 临床医学
  • 15 篇 经济学
    • 15 篇 应用经济学
  • 14 篇 军事学
  • 6 篇 农学
  • 3 篇 教育学
  • 3 篇 文学

主题

  • 42 篇 feature extracti...
  • 39 篇 semantics
  • 36 篇 accuracy
  • 35 篇 cryptography
  • 31 篇 computational mo...
  • 28 篇 security
  • 28 篇 protocols
  • 27 篇 federated learni...
  • 27 篇 cloud computing
  • 26 篇 privacy
  • 25 篇 authentication
  • 23 篇 training
  • 22 篇 network security
  • 21 篇 deep learning
  • 20 篇 encryption
  • 19 篇 data privacy
  • 19 篇 computer network...
  • 18 篇 servers
  • 18 篇 data models
  • 17 篇 neural networks

机构

  • 82 篇 key laboratory o...
  • 66 篇 shandong provinc...
  • 51 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 shaanxi key labo...
  • 37 篇 school of comput...
  • 33 篇 school of cyber ...
  • 31 篇 institute of inf...
  • 30 篇 shaanxi key labo...
  • 22 篇 state key labora...
  • 21 篇 shandong provinc...
  • 18 篇 national enginee...
  • 18 篇 shandong fundame...
  • 17 篇 school of comput...
  • 17 篇 college of compu...
  • 15 篇 school of comput...
  • 14 篇 national compute...
  • 13 篇 xi'an university...
  • 13 篇 key laboratory o...
  • 13 篇 shaanxi key labo...

作者

  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 19 篇 baojiang cui
  • 18 篇 hei xinhong
  • 13 篇 jianfeng ma
  • 13 篇 li wei
  • 13 篇 wei wei
  • 12 篇 jing zhao
  • 12 篇 xu li
  • 12 篇 zhenyu yang
  • 12 篇 yang xiaoyuan
  • 11 篇 fu chong
  • 11 篇 li qi
  • 11 篇 lei zhu
  • 10 篇 zhang yuqing
  • 10 篇 chen zhong
  • 10 篇 liu jun
  • 10 篇 xiaoxue liu
  • 9 篇 wang lei

语言

  • 854 篇 英文
  • 160 篇 其他
  • 34 篇 中文
检索条件"机构=Network Security Laboratory Computer Engineering"
1043 条 记 录,以下是671-680 订阅
排序:
An Enhanced Feature Selection Approach based on Mutual Information for Breast Cancer Diagnosis  6
An Enhanced Feature Selection Approach based on Mutual Infor...
收藏 引用
6th International Conference on Image and Signal Processing and their Applications, ISPA 2019
作者: Zemmal, Nawel Azizi, Nabiha Ziani, Amel Benzebouchi, Nacer Eddine Aldwairi, Monther Badji Mokhtar University Labged Laboratory Annaba23000 Algeria Department of Mathematics and Computer Science Mohamed Cherif Messaadia University Souk-Ahras41000 Algeria Lri Laboratory: Information Research Laboratory Computer Science Department Annaba23000 Algeria Jordan University of Science and Technology Department of Network Engineering and Security Irbid22110 Jordan
Breast cancer is the most feared disease in the female population. Early detection plays an important role to improve prognosis. Mammography is the best examination for the detection of breast cancer. However, in some... 详细信息
来源: 评论
Velocity-driven particle swarm optimization  8
Velocity-driven particle swarm optimization
收藏 引用
8th International Conference on Computing and Pattern Recognition, ICCPR 2019
作者: Li, Wei Fan, Yaochi Jiang, Qiaoyong Xu, Qingzheng School of Computer Science and Engineering Xi'An University of Technology China Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an710048 China School of Computer Science and Engineering Xi'An University of Technology Xi'an710048 China College of Information and Communication National University of Defense Technology Xi'an710106 China
Particle swarm optimization (PSO) is an efficient nature-inspired optimization algorithm, which has been widely applied in many engineering fields. The performance of particle swarm optimization (PSO) has been signifi... 详细信息
来源: 评论
反向连边在大型分层网络中的影响(英文)
收藏 引用
engineering 2024年 第5期 240-249页
作者: 曹浩森 胡斌斌 莫小雨 陈都鑫 高建喜 袁烨 陈关荣 Tamás Vicsek 管晓宏 张海涛 MOE Engineering Research Center of Autonomous Intelligent Unmanned Systems State Key Laboratory of Intelligent Manufacturing Equipment and Technology School of Artificial Intelligence and Automation Huazhong University of Science and Technology School of Mechanical and Aerospace Engineering Nanyang Technological University Jiangsu Key Laboratory of Networked Collective Intelligence School of Mathematics Southeast University Department of Computer Science Rensselaer Polytechnic Institute Department of Electronic Engineering City University of Hong Kong Department of Biological Physics E?tv?s University MOE Key Laboratory for Intelligent Networks and Network Security School of Automation Science and Engineering Xi'an Jiaotong University
Hierarchical networks are frequently encountered in animal groups, gene networks, and artificial engineering systems such as multiple robots, unmanned vehicle systems, smart grids, wind farm networks,and so forth. The...
来源: 评论
Investigating Bi-level optimization for learning and vision from a unified perspective: A survey and beyond
arXiv
收藏 引用
arXiv 2021年
作者: Liu, Risheng Gao, Jiaxin Zhang, Jin Meng, Deyu Lin, Zhouchen DUT-RU International School of Information Science & Engineering Dalian University of Technology Key Laboratory for Ubiquitous Network Service Software of Liaoning Province Dalian116024 China Department of Mathematics Southern University of Science and Technology National Center for Applied Mathematics Shenzhen China School of Mathematics and Statistics Ministry of Education Key Lab of Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an Shaanxi China School of Electronics Engineering and Computer Science Peking University Beijing100871 China Cooperative Medianet Innovation Center Shanghai Jiao Tong University Shanghai200240 China
Bi-Level Optimization (BLO) is originated from the area of economic game theory and then introduced into the optimization community. BLO is able to handle problems with a hierarchical structure, involving two levels o... 详细信息
来源: 评论
A personalized privacy protection data uploading scheme for mobile crowdsensing  2
A personalized privacy protection data uploading scheme for ...
收藏 引用
2nd IEEE International Conference on Industrial Internet Cloud, ICII 2019
作者: Ma, Rong Chen, Lei Xiong, Jinbo Tian, Youliang Li, Qi Liu, Ximeng Fujian Provincial Key Laboratory of Network Security and Cryptology College of Mathematics and Informatics Fujian Normal University Fuzhou350117 China College of Engineering and Computing Georgia Southern University GA30458 United States Guizhou Provincial Key Laboratory of Public Big Data Guizhou University Guiyang550025 China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210023 China Fujian Provincial Key Laboratory of Information Security of Network Systems College of Mathematics and Computer Science Fuzhou University Fuzhou350108 China
Mobile crowdsensing is a typical application of the Industrial Internet of hings and brings a promising opportunity to construct powerful industrial systems and services. The existing privacy protection schemes usuall... 详细信息
来源: 评论
An improved LBG algorithm for user clustering in ultra-dense network  5th
An improved LBG algorithm for user clustering in ultra-dense...
收藏 引用
5th Euro-China Conference on Intelligent Data Analysis and Applications, ECC 2018
作者: Liang, Yanxia Liu, Yao Sun, Changyin Liu, Xin Jiang, Jing Gao, Yan Xie, Yongbin Shaanxi Key Laboratory of Information Communication Network and Security Xi’an University of Posts and Telecommunications Xi’an710121 China Department of Computer Science and Engineering University of South Florida TampaFL33647 United States School of Information Engineering Xi’an Eurasia University Xi’an710065 China
A novel LBG-based user clustering algorithm is proposed to reduce interference efficiently in Ultra-Dense network (UDN). There are two stages, weight design and user clustering. Because a user could interfere and be i... 详细信息
来源: 评论
Semantically Secure and Verifiable Multi-keyword Search in Cloud Computing  1
收藏 引用
2nd International Conference on Machine Learning for Cyber security, ML4CS 2019
作者: Zhang, Lili Wang, Wenjie Zhang, Yuqing National Key Laboratory of Integrated Services Networks Xidian University Xi’an710071 China Henan International Joint Laboratory of Cyberspace Security Applications Information Engineering College Henan University of Science and Technology Luoyang471023 China National Computer Network Intrusion Protection Center University of Chinese Academy of Sciences Beijing100049 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China
In cloud computing model, the data are usually encrypted before outsourced to the cloud server, which protects the data privacy, but also leaves keyword searches over ciphertext data a challenging problem. A keyword s... 详细信息
来源: 评论
衰亡链揭示互利共生生态系统中安全与崩溃的中间阶段(英文)
收藏 引用
engineering 2024年 第12期 89-98页
作者: 王光炜 刘雪明 肖颖 袁烨 潘林强 管晓宏 高建喜 张海涛 The MOE Engineering Research Center of Autonomous Intelligent Unmanned Systems State Key Laboratory of Digital Manufacturing Equipment and Technology School of Artificial Intelligence and Automation Huazhong University of Science and Technology Guangdong HUST Industrial Technology Research Institute Huazhong University of Science and Technology Guangdong Provincial Engineering Technology Center of Autonomous Unmanned Vessels MOE Key Laboratory of Intelligent Networks and Network Security&State Key Laboratory of Manufacturing Systems Xi'an Jiaotong University Tsinghua National Laboratory of Information Science and Technology Department of Automation Tsinghua University Department of Computer Science Rensselaer Polytechnic Institute
Ecosystems are undergoing unprecedented persistent deterioration due to unsustainable anthropogenic human activities, such as overfishing and deforestation, and the effects of such damage on ecological stability are u...
来源: 评论
Efficient Malware Originated Traffic Classification by Using Generative Adversarial networks
Efficient Malware Originated Traffic Classification by Using...
收藏 引用
IEEE Symposium on computers and Communications (ISCC)
作者: Zhicheng Liu Shuhao Li Yongzheng Zhang Xiaochun Yun Zhenyu Cheng Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Key Laboratory of Network Assessment Technology Chinese Academy of Sciences Beijing China National Computer Network Emergency Response Technical Team/Coordination Center of China Beijing China
With the booming of malware-based cyber-security incidents and the sophistication of attacks, previous detections based on malware sample analysis appear powerless due to time-consuming and labor-intensive analysis pr...
来源: 评论
In-situ data scheduling optimization based on rainbow DQN for IIoT
收藏 引用
Future Generation computer Systems 2026年 174卷
作者: Peiying Zhang Siyi Li Lizhuang Tan Neeraj Kumar Jian Wang Kai Liu Qingdao Institute of Software College of Computer Science and Technology China University of Petroleum (East China) Qingdao 266580 China Shandong Key Laboratory of Intelligent Oil & Gas Industrial Software Qingdao 266580 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan 250014 China Department of Computer Science and Engineering Thapar Institute of Engineering and Technology Patiala 147004 India Department of Computer Science University of Economics and Human Sciences Warszawa 01-043 Poland Department of Networks and Communications College of Computer Science and Information Technology Imam Abdulrahman Bin Faisal University Dammam 31441 Saudi Arabia College of Science China University of Petroleum (East China) Qingdao 266580 China Beijing National Research Center for Information Science and Technology Tsinghua University Beijing 100084 China State Key Laboratory of Space Network and Communications Tsinghua University Beijing 100084 China
In industrial systems, in-situ computing refers to a mode of local or proximate data processing within the cloud–edge-terminal architecture. In the Industrial Internet of Things (IIoT) environment, servers are typica...
来源: 评论