咨询与建议

限定检索结果

文献类型

  • 588 篇 会议
  • 412 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,001 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 641 篇 工学
    • 486 篇 计算机科学与技术...
    • 396 篇 软件工程
    • 160 篇 信息与通信工程
    • 125 篇 电气工程
    • 61 篇 网络空间安全
    • 59 篇 电子科学与技术(可...
    • 55 篇 控制科学与工程
    • 52 篇 生物工程
    • 29 篇 安全科学与工程
    • 28 篇 生物医学工程(可授...
    • 26 篇 机械工程
    • 23 篇 仪器科学与技术
    • 22 篇 光学工程
    • 18 篇 交通运输工程
    • 16 篇 动力工程及工程热...
    • 16 篇 建筑学
    • 16 篇 化学工程与技术
  • 275 篇 理学
    • 168 篇 数学
    • 55 篇 生物学
    • 49 篇 物理学
    • 49 篇 统计学(可授理学、...
    • 28 篇 系统科学
    • 16 篇 化学
  • 162 篇 管理学
    • 92 篇 管理科学与工程(可...
    • 76 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 40 篇 法学
    • 24 篇 法学
    • 17 篇 社会学
  • 21 篇 医学
    • 18 篇 临床医学
    • 16 篇 基础医学(可授医学...
  • 15 篇 经济学
  • 14 篇 军事学
  • 6 篇 农学
  • 3 篇 教育学
  • 3 篇 文学

主题

  • 39 篇 feature extracti...
  • 35 篇 semantics
  • 34 篇 cryptography
  • 28 篇 protocols
  • 27 篇 computational mo...
  • 27 篇 security
  • 27 篇 accuracy
  • 26 篇 cloud computing
  • 25 篇 privacy
  • 24 篇 authentication
  • 20 篇 deep learning
  • 20 篇 network security
  • 19 篇 encryption
  • 19 篇 computer network...
  • 18 篇 training
  • 17 篇 data privacy
  • 17 篇 data models
  • 16 篇 neural networks
  • 15 篇 servers
  • 15 篇 federated learni...

机构

  • 67 篇 key laboratory o...
  • 65 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 shaanxi key labo...
  • 37 篇 school of comput...
  • 31 篇 school of cyber ...
  • 30 篇 shaanxi key labo...
  • 29 篇 institute of inf...
  • 22 篇 state key labora...
  • 18 篇 national enginee...
  • 18 篇 shandong fundame...
  • 15 篇 school of comput...
  • 15 篇 college of compu...
  • 15 篇 school of comput...
  • 13 篇 key laboratory o...
  • 13 篇 national compute...
  • 12 篇 shaanxi key labo...
  • 12 篇 national compute...
  • 11 篇 shandong enginee...

作者

  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 19 篇 baojiang cui
  • 18 篇 hei xinhong
  • 13 篇 li wei
  • 12 篇 jianfeng ma
  • 12 篇 xu li
  • 12 篇 yang xiaoyuan
  • 11 篇 jing zhao
  • 11 篇 fu chong
  • 11 篇 wei wei
  • 10 篇 zhang yuqing
  • 10 篇 chen zhong
  • 10 篇 liu jun
  • 10 篇 xiaoxue liu
  • 10 篇 li qi
  • 10 篇 lei zhu
  • 9 篇 wang lei
  • 9 篇 ma jianfeng

语言

  • 902 篇 英文
  • 71 篇 其他
  • 30 篇 中文
检索条件"机构=Network Security Laboratory Computer Engineering"
1001 条 记 录,以下是731-740 订阅
排序:
Constructing a Science of Cyber-Resilience for Military Systems
Constructing a Science of Cyber-Resilience for Military Syst...
收藏 引用
2017 NATO IST-153/RWS-21 Workshop on Cyber Resilience, IST-153 2017
作者: Alexeev, Alexander Henshel, Diane S. Levitt, Karl McDaniel, Patrick Rivera, Brian Templeton, Steven Weisman, Mike Data Analysis and Modeling Indiana University School of Public and Environmental Affairs 1315 E 10th Street BlooomingtonIN47405 Indiana University School of Public and Environmental Affairs 1315 E 10th Street BloomingtonIN47405 Computer Science College of Engineering University of California Davis 1 Shields Ave. DavisCA05616 School of Electrical Engineering and Computer Science Pennsylvania State University Information Sciences and Technology Building University ParkPA16802-6823 Network Science Division Tactical Network Assurance Branch U.S. Army Research Laboratory 2800 Powder Mill Road AdelphiMD20783 Computer Security Research Lab Department of Computer Science University of California Davis One Shields Avenue DavisCA95616 Network Science Division Network Security Branch U.S. Army Research Laboratory ICF International 2800 Powder Mill Road AdelphiMD20783
来源: 评论
Three Layer Game Theoretic Decision Framework for Cyber-Investment and Cyber-Insurance  8th
Three Layer Game Theoretic Decision Framework for Cyber-Inve...
收藏 引用
8th International Conference on Decision and Game Theory for security, GameSec 2017
作者: Tosh, Deepak K. Vakilinia, Iman Shetty, Sachin Sengupta, Shamik Kamhoua, Charles A. Njilla, Laurent Kwiat, Kevin Department of Computer Science Norfolk State University NorfolkVA United States Department of Computer Science and Engineering University of Nevada RenoNV United States Virginia Modeling Analysis and Simulation Center Old Dominion University NorfolkVA United States Network Security Branch Army Research Laboratory AdelphiMD United States Cyber Assurance Branch Air Force Research Laboratory RomeNY United States
Cyber-threat landscape has become highly complex, due to which isolated attempts to understand, detect, and resolve cybersecurity issues are not feasible in making a time constrained decisions. Introduction of cyber-t... 详细信息
来源: 评论
Exploiting Meta-Path with Attention Mechanism for Fine-Grained User Location Prediction in LBSNs
收藏 引用
Journal of Physics: Conference Series 2019年 第1期1284卷
作者: Zhixiao Wang Wenyao Yan Wendong Wang Ang Gao Lei Yu Shaobo Yang GaoYang Nie School of Computer Science and Engineering Xi'an University of Technology 710048 Xi'an China Telematics Group the University of Goettingen 37077 Goettingen Germany Shaanxi Key Laboratory of Network Computing and Security 710048 Xi'an China School of Electronic and Information Engineering Xi'an Jiaotong University 710048 Xi'an China College of Xi'an Innovation Yan'an University 710100 Xi'an China Yan'an University Yan'an 716000 China National Satellite Meteorological Center China Meteorological Administration Beijing 100081 China
Based on the huge volumes of user check-in data in LBSNs, users' intrinsic mobility patterns can be well explored, which is fundamental for predicting where a user will visit next given his/her historical check-in...
来源: 评论
Knowledge graph embedding with iterative guidance from soft rules
arXiv
收藏 引用
arXiv 2017年
作者: Guo, Shu Wang, Quan Wang, Lihong Wang, Bin Guo, Li Institute of Information Engineering Chinese Academy of Sciences School of Cyber Security University of Chinese Academy of Sciences State Key Laboratory of Information Security Chinese Academy of Sciences National Computer Network Emergency Response Technical Team & Coordination Center of China
Embedding knowledge graphs (KGs) into continuous vector spaces is a focus of current research. Combining such an embedding model with logic rules has recently attracted increasing attention. Most previous attempts mad... 详细信息
来源: 评论
Achieve Personalized Anonymity Through Query Blocks Exchanging
收藏 引用
China Communications 2016年 第11期13卷 106-118页
作者: Chunguang Ma Lei Zhang Songtao Yang Xiaodong Zheng Pinhui Ke College of Computer Science and Technology Harbin Engineering University Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Normal University College of Information and Electronic Technology Jiamusi University College of Applied Technology Qiqihar University
In cyberspace security,the privacy in location-based services(LBSs) becomes more critical. In previous solutions,a trusted third party(TTP) was usually employed to provide disturbance or obfuscation,but it may become ... 详细信息
来源: 评论
Detecting Adversaries in Distributed Estimation
Detecting Adversaries in Distributed Estimation
收藏 引用
Asilomar Conference on Signals, Systems, and computers
作者: Yuan Chen Soummya Kar Jose M. F. Moura School of Information Engineering Zhengzhou University Zhengzhou China Ministry of Education Key Laboratory for Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an China Southampton Wireless School of Electronics and Computer Science University of Southampton Southampton U.K.
This paper studies distributed parameter estimation in the presence of adversarial agents. We consider the Flag Raising Distributed Estimation (FRDE) algorithm, a consensus+innovations distributed algorithm for the no... 详细信息
来源: 评论
INTELLIGENT INFORMATION network security AND MANAGEMENT
收藏 引用
China Communications 2016年 第7期13卷 3-6页
作者: Yixian Yang Zhongshan Zhang Wenjing Li Information Security Center(ISC) Beijing University of Posts and Telecommunications(BUPT) National Engineering Laboratory for Disaster Backup and Recovery the School of Computer and Communication Engineering in the University of Science and Technology Beijing(USTB) State Key Lab of Networking and Switching Technologies Network Management Research Center at BUPT National Innovation Research Group of China
Intelligent Information network security and Management(IINSM)is an emerging direction in future Internet architecture research,which has gained significant tractions among academia and *** the rapid development of mo... 详细信息
来源: 评论
Out-of-band discovery and evaluation for Tor hidden services  16
Out-of-band discovery and evaluation for Tor hidden services
收藏 引用
31st Annual ACM Symposium on Applied Computing, SAC 2016
作者: Li, Kang Liu, Peipeng Tan, Qingfeng Shi, Jinqiao Gao, Yue Wang, Xuebin Institute of Information Engineering CAS China National Engineering Laboratory for Information Security Technologies China University of Chinese Academy of Sciences China National Computer Network Emergency Response Technical Team Coordination Center China Graduated University CAS China Institute of Information Engineering CAS China National Engineering Laboratory for Information Security Technologies China
Tor is one of the most well-known anonymity networks that provides anonymity to service providers such as hidden web services. Recently size and content of Tor hidden services are highly concerned because of emerging ... 详细信息
来源: 评论
Design and implementation of a C++ memory leak detection tool based on dynamic instrumentation  10
Design and implementation of a C++ memory leak detection too...
收藏 引用
10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2016
作者: Zhou, Liang Fu, Siran Guo, Tao Han, Lifang Cui, Baojiang School of Computer Science Beijing University of Posts and Telecommunications Beijing China China Electric Power Research Institute Beijing China National Engineering Laboratory for Mobile Network Security China
For C++ programs often appear memory leaks, cross-border access memory and memory does not match the release of error, we have analyzed existing memory error detection tools and methods, implemented in the Linux platf... 详细信息
来源: 评论
Multiple influence maximization in social networks  10
Multiple influence maximization in social networks
收藏 引用
10th International Conference on Ubiquitous Information Management and Communication, IMCOM 2016
作者: Sun, Honglin Gao, Xiaofeng Chen, Guihai Gu, Jian Wang, Yongjian Shanghai Key Lab. of Scalable Computing and Systems Dept. of Computer Science and Engineering Shanghai Jiao Tong University Shanghai China Key Laboratory of Information Network Security of Ministry of Public Security Third Research Institute of Ministry of Public Security Shanghai China
Influence Maximization, a technique of social analysis to help marketers select a small group of users to promote their products with the goal of maximizing their influence spread, has been studied for a long time. Ho... 详细信息
来源: 评论