咨询与建议

限定检索结果

文献类型

  • 606 篇 会议
  • 414 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,021 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 641 篇 工学
    • 488 篇 计算机科学与技术...
    • 395 篇 软件工程
    • 158 篇 信息与通信工程
    • 123 篇 电气工程
    • 61 篇 网络空间安全
    • 59 篇 电子科学与技术(可...
    • 56 篇 控制科学与工程
    • 52 篇 生物工程
    • 30 篇 安全科学与工程
    • 28 篇 生物医学工程(可授...
    • 26 篇 机械工程
    • 23 篇 仪器科学与技术
    • 22 篇 光学工程
    • 18 篇 交通运输工程
    • 17 篇 化学工程与技术
    • 16 篇 动力工程及工程热...
    • 16 篇 建筑学
  • 277 篇 理学
    • 170 篇 数学
    • 54 篇 生物学
    • 50 篇 统计学(可授理学、...
    • 49 篇 物理学
    • 29 篇 系统科学
    • 17 篇 化学
  • 163 篇 管理学
    • 93 篇 管理科学与工程(可...
    • 76 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 38 篇 法学
    • 22 篇 法学
    • 17 篇 社会学
  • 20 篇 医学
    • 18 篇 临床医学
  • 15 篇 经济学
    • 15 篇 应用经济学
  • 14 篇 军事学
  • 6 篇 农学
  • 3 篇 教育学
  • 3 篇 文学

主题

  • 42 篇 feature extracti...
  • 39 篇 semantics
  • 36 篇 accuracy
  • 35 篇 cryptography
  • 31 篇 computational mo...
  • 29 篇 protocols
  • 28 篇 security
  • 27 篇 cloud computing
  • 26 篇 federated learni...
  • 26 篇 privacy
  • 25 篇 authentication
  • 23 篇 training
  • 21 篇 network security
  • 21 篇 encryption
  • 20 篇 deep learning
  • 19 篇 data privacy
  • 19 篇 computer network...
  • 18 篇 servers
  • 18 篇 data models
  • 17 篇 neural networks

机构

  • 82 篇 key laboratory o...
  • 66 篇 shandong provinc...
  • 51 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 shaanxi key labo...
  • 37 篇 school of comput...
  • 33 篇 school of cyber ...
  • 31 篇 institute of inf...
  • 30 篇 shaanxi key labo...
  • 22 篇 state key labora...
  • 21 篇 shandong provinc...
  • 18 篇 national enginee...
  • 18 篇 shandong fundame...
  • 17 篇 school of comput...
  • 17 篇 college of compu...
  • 15 篇 school of comput...
  • 14 篇 national compute...
  • 13 篇 key laboratory o...
  • 13 篇 shaanxi key labo...
  • 13 篇 national compute...

作者

  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 19 篇 baojiang cui
  • 18 篇 hei xinhong
  • 13 篇 jianfeng ma
  • 13 篇 li wei
  • 12 篇 jing zhao
  • 12 篇 xu li
  • 12 篇 zhenyu yang
  • 12 篇 yang xiaoyuan
  • 11 篇 fu chong
  • 11 篇 lei zhu
  • 11 篇 wei wei
  • 10 篇 zhang yuqing
  • 10 篇 chen zhong
  • 10 篇 liu jun
  • 10 篇 xiaoxue liu
  • 10 篇 li qi
  • 9 篇 wang lei

语言

  • 875 篇 英文
  • 117 篇 其他
  • 33 篇 中文
检索条件"机构=Network Security Laboratory Computer Engineering"
1021 条 记 录,以下是701-710 订阅
排序:
On privacy protection of latent dirichlet allocation model training
arXiv
收藏 引用
arXiv 2019年
作者: Zhao, Fangyuan Ren, Xuebin Yang, Shusen Yang, Xinyu School of Computer Science and Technology Xi'an Jiaotong University China National Engineering Laboratory for Big Data Analytics Xi'an Jiaotong University China Ministry of Education Key Lab For Intelligent Networks and Network Security Xi'an Jiaotong University China
Latent Dirichlet Allocation (LDA) is a popular topic modeling technique for discovery of hidden semantic architecture of text datasets, and plays a fundamental role in many machine learning applications. However, like... 详细信息
来源: 评论
RETRACTED ARTICLE: Cloud enabled robust authenticated key agreement scheme for telecare medical information system
收藏 引用
Connection Science 2021年 第4期33卷 I页
作者: Liu, Tian Liu, Xuchong Li, Xiong Amin, Ruhul Liang, Wei Meng-Yen, Hsieh School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan People's Republic of China Hunan Provincial Key Laboratory of Network Investigational Technology Hunan Police Academy Changsha People's Republic of China Institute for Cyber Security School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu People's Republic of China Department of Computer Science and Engineering Dr. SPM International Institute of Information Technology Naya Raipur India College of Computer Science and Electronic Engineering Hunan University Changsha People's Republic of China Deptment of Computer Science and Information Engineering Providence University Taichung Taiwan
We, the authors, Editors and Publisher of the journal Connection Science, have retracted the following article:Tian Liu, Xuchong Liu, Xiong Li, Ruhul Amin, Wei Liang & Meng-Yen Hsieh (2021) Cloud enabled robust au...
来源: 评论
Team: An taylor expansion-based method for generating adversarial examples
arXiv
收藏 引用
arXiv 2020年
作者: Qian, Ya-guan Zhang, Xi-Ming Swaileh, Wassim Wei, Li Wang, Bin Chen, Jian-Hai Zhou, Wu-Jie Lei, Jing-Sheng School of Big-Data Science Zhejiang University of Science and Technology Hangzhou310023 China Network and Information Security Laboratory of Hangzhou Hikvision Digital Technology Co. Ltd. Hang Zhou310052 China College of Computer Science and Technology Zhejiang University Hangzhou310058 China School of Information and Electronic Engineering Zhejiang University of Science and Technology Hangzhou310023 China Laboratoire ETIS UMR-CNRS 8051 CY Cergy Paris Université France
Although Deep Neural networks(DNNs) have achieved successful applications in many fields, they are vulnerable to adversarial *** training is one of the most effective methods to improve the robustness of DNNs, and it ... 详细信息
来源: 评论
A chaotic artificial bee colony algorithm based on lévy search
A chaotic artificial bee colony algorithm based on lévy sea...
收藏 引用
作者: Lin, Shijie Dong, Chen Wang, Zhiqiang Guo, Wenzhong Chen, Zhenyi Ye, Yin College of Mathematics and Computer Science Fuzhou University Fuzhou350116 China Key Laboratory of Information Security of Network Systems Fuzhou350116 China Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou350116 China Department of Electrical Engineering University of South Florida TampaFL33620 United States
A Lévy search strategy based chaotic artificial bee colony algorithm (LABC) is proposed in this paper. The chaotic sequence, global optimal mechanism and Lévy flight mechanism were introduced respectively in... 详细信息
来源: 评论
Slice-Based Window Detection from Scene Point Clouds
Slice-Based Window Detection from Scene Point Clouds
收藏 引用
International Conference on Virtual Reality and Visualization (ICVRV)
作者: Wen Hao Yinghui Wang Wei Liang Xiaojuan Ning Ye Li Institute of Computer Science and Engineering Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China
In this paper, we propose a comprehensive strategy to detect the windows from scene point clouds. First, the planar points are extracted after computing the dimensionality structure of each point. The planar points ar... 详细信息
来源: 评论
A Provably Secure General Construction for Key Exchange Protocols Using Smart Card and Password
收藏 引用
Chinese Journal of Electronics 2017年 第2期26卷 271-278页
作者: ZHANG Gefei FAN Dan ZHANG Yuqing LI Xiaowei National Computer Network Intrusion Protection Center University of Chinese Academy of Sciences State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of Sciences
Key exchange protocols using both smart card and password are widely used nowadays since they provide greater convenience and stronger security than protocols using only a *** of these protocols are often limited to s... 详细信息
来源: 评论
Depthwise Separable Convolution Feature Learning for Ihomogeneous Rock Image Classification  1
收藏 引用
4th International Conference on Cognitive Systems and Information Processing, ICCSIP 2018
作者: Zhu, Yueqin Bai, Lin Peng, Weihang Zhang, Xinyang Luo, Xiong Development and Research Center China Geological Survey Beijing100037 China Key Laboratory of Geological Information Technology Ministry of Natural Resources Beijing100037 China Geomathematics Key Laboratory of Sichuan Province Chengdu University of Technology Chengdu610059 China College of Geophysics Chengdu University of Technology Chengdu610059 China College of Management Science Chengdu University of Technology Chengdu610059 China College of Network Security Chengdu University of Technology Chengdu610059 China School of Computer and Communication Engineering University of Science and Technology Beijing Beijing100083 China
The issue of classifying rock images is one of most important problems in geological detection and analysis. In order to improve rock recognition performance, we use convolution neural network (CNN) based deep learnin... 详细信息
来源: 评论
Incentive Mechanism for Data Uploading in Mobile Crowdsensing
Incentive Mechanism for Data Uploading in Mobile Crowdsensin...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Xiaolan Liu Wu Wang Bin Yang Yuanyuan Fan School of Computer and Information Engineering Chuzhou University Chuzhou P. R. China Shaanxi Key Laboratory of Network and System Security Xidian University Xi'an P. R. China School of Mathematics and Computer Science Yunnan Minzu University Kunming P. R. China
Mobile crowdsensing is a promising service paradigm utilizing the pervasive mobile devices to cooperatively perform large-scale sensing tasks. Data uploading which aims to deliver the sensed data to the control center... 详细信息
来源: 评论
Exploiting Meta-Path with Attention Mechanism for Fine-Grained User Location Prediction in LBSNs
Exploiting Meta-Path with Attention Mechanism for Fine-Grain...
收藏 引用
2019 3rd International Conference on Data Mining, Communications and Information Technology (DMCIT 2019)
作者: Zhixiao Wang Wenyao Yan Wendong Wang Ang Gao Lei Yu Shaobo Yang GaoYang Nie School of Computer Science and Engineering Xi'an University of Technology Telematics Group the University of Goettingen Shaanxi Key Laboratory of Network Computing and Security School of Electronic and Information Engineering Xi'an Jiaotong University College of Xi'an Innovation Yan'an University Yan'an University National Satellite Meteorological Center China Meteorological Administration
Based on the huge volumes of user check-in data in LBSNs,users’ intrinsic mobility patterns can be well explored,which is fundamental for predicting where a user will visit next given his/her historical check-in *** ...
来源: 评论
Multi-keyword Cipher-text Retrieval Method for Smart Grid Edge Computing
收藏 引用
Journal of Physics: Conference Series 2021年 第1期1754卷
作者: Jing Zhu Tao Wu Jintao Li Yanbin Liu Qixin Jiang School of Communication and Information Engineering Chongqing University of Posts and Telecommunications China School of Cybersecurity and Information Law Chongqing University of Posts and Telecommunications Chongqing China School of Computer Science Chongqing University of Posts and Telecommunications Chongqing China Guangdong Provincial Key Laboratory of Power System Network Security Guangzhou China Electric Power Institute CSG Guangzhou China
With the continuous deepening of China's power grid intelligent upgrading and the rise of edge computing technology, power grid terminals can carry out data storage and intelligent calculation at the edge of the p...
来源: 评论