咨询与建议

限定检索结果

文献类型

  • 577 篇 会议
  • 402 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 980 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 626 篇 工学
    • 474 篇 计算机科学与技术...
    • 389 篇 软件工程
    • 158 篇 信息与通信工程
    • 122 篇 电气工程
    • 60 篇 网络空间安全
    • 58 篇 电子科学与技术(可...
    • 52 篇 控制科学与工程
    • 52 篇 生物工程
    • 28 篇 生物医学工程(可授...
    • 28 篇 安全科学与工程
    • 26 篇 机械工程
    • 23 篇 仪器科学与技术
    • 21 篇 光学工程
    • 17 篇 交通运输工程
    • 16 篇 动力工程及工程热...
    • 16 篇 建筑学
  • 270 篇 理学
    • 167 篇 数学
    • 55 篇 生物学
    • 50 篇 统计学(可授理学、...
    • 46 篇 物理学
    • 28 篇 系统科学
    • 15 篇 化学
  • 162 篇 管理学
    • 92 篇 管理科学与工程(可...
    • 76 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 39 篇 法学
    • 23 篇 法学
    • 17 篇 社会学
  • 21 篇 医学
    • 18 篇 临床医学
    • 16 篇 基础医学(可授医学...
  • 15 篇 经济学
    • 15 篇 应用经济学
  • 14 篇 军事学
  • 6 篇 农学
  • 3 篇 文学
  • 2 篇 教育学

主题

  • 38 篇 feature extracti...
  • 35 篇 semantics
  • 34 篇 cryptography
  • 28 篇 protocols
  • 27 篇 computational mo...
  • 26 篇 security
  • 26 篇 accuracy
  • 26 篇 cloud computing
  • 24 篇 privacy
  • 23 篇 authentication
  • 20 篇 deep learning
  • 20 篇 network security
  • 19 篇 encryption
  • 19 篇 computer network...
  • 18 篇 training
  • 17 篇 data privacy
  • 17 篇 data models
  • 16 篇 neural networks
  • 15 篇 servers
  • 15 篇 federated learni...

机构

  • 64 篇 shandong provinc...
  • 64 篇 key laboratory o...
  • 45 篇 shandong enginee...
  • 40 篇 school of comput...
  • 37 篇 shaanxi key labo...
  • 36 篇 school of comput...
  • 30 篇 shaanxi key labo...
  • 29 篇 school of cyber ...
  • 27 篇 institute of inf...
  • 22 篇 state key labora...
  • 18 篇 national enginee...
  • 16 篇 shandong fundame...
  • 15 篇 school of comput...
  • 15 篇 college of compu...
  • 15 篇 school of comput...
  • 13 篇 key laboratory o...
  • 13 篇 national compute...
  • 12 篇 shaanxi key labo...
  • 11 篇 shandong enginee...
  • 11 篇 xi'an university...

作者

  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 21 篇 wang yichuan
  • 19 篇 baojiang cui
  • 17 篇 hei xinhong
  • 13 篇 li wei
  • 13 篇 yang xiaoyuan
  • 12 篇 jianfeng ma
  • 12 篇 xu li
  • 11 篇 jing zhao
  • 11 篇 fu chong
  • 11 篇 wei wei
  • 10 篇 zhang yuqing
  • 10 篇 chen zhong
  • 10 篇 xiaoxue liu
  • 10 篇 li qi
  • 10 篇 lei zhu
  • 9 篇 wang lei
  • 9 篇 liu jun
  • 9 篇 shen yulong

语言

  • 902 篇 英文
  • 50 篇 其他
  • 30 篇 中文
检索条件"机构=Network Security Laboratory Computer Engineering"
980 条 记 录,以下是81-90 订阅
排序:
Attribute-Based Data Sharing Scheme with Flexible Search Functionality for Cloud-Assisted Autonomous Transportation System
收藏 引用
IEEE Transactions on Industrial Informatics 2023年 第11期19卷 10977-10986页
作者: Xiong, Hu Wang, Hanxiao Meng, Weizhi Yeh, Kuo-Hui University of Electronic Science and Technology of China School of Information and Software Engineering Network and Data Security Key Laboratory of Sichuan Province Chengdu610054 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610025 China Technical University of Denmark Department of Applied Mathematics and Computer Science Kongens Lyngby2800 Denmark National Dong Hwa University Department of Information Management Hualien97401 Taiwan National Sun Yat-sen University Department of Computer Science and Engineering Kaohsiung804201 Taiwan
The existing group public key encryption with equality test schemes could only support one-to-one data sharing and are not suitable for cloud-assisted autonomous transportation systems, which demand one-to-many data s... 详细信息
来源: 评论
A Shortest Path Query Approach for Encrypted Graphs Based on Padding Dictionary Structure
A Shortest Path Query Approach for Encrypted Graphs Based on...
收藏 引用
2023 China Automation Congress, CAC 2023
作者: Yang, Ming Zhang, Kaiyang Mu, Chao Wang, Xin Liu, Yuanlong Zhang, Heng Key Laboratory of Computing Power Network and Information Security Shandong Computer Science Center Ministry of Education Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China State Grid Shandong Electric Power Company Jinan China School of Computer Engineering Jiangsu Ocean University Lianyungang China
Hybrid intelligence has emerged as an innovative approach that synergistically combines the strengths of human intelligence and artificial intelligence (AI) to address complex problems. In this paradigm, knowledge gra... 详细信息
来源: 评论
Cross Elitist Learning Multifactorial Evolutionary Algorithm  1
收藏 引用
3rd International Conference on Neural Computing for Advanced Applications, NCAA 2022
作者: Li, Wei Luo, Haonan Wang, Lei School of Computer Science and Engineering Xi’an University of Technology Xi’an710048 China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an710048 China
Multifactorial Evolutionary Algorithm (MFEA) is a popular optimization algorithm in recent years. It has implicit parallelism and can solve different problems at the same time in the same search space. However, premat... 详细信息
来源: 评论
Activity Recognition Method Based on Kernel Supervised Laplacian Eigenmaps
Activity Recognition Method Based on Kernel Supervised Lapla...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Pengjia Tu Cheng Tian Dandan Du Junhuai Li Huaijun Wang School of Computer Science and Engineering Xi’an University of Technology China Shaanxi Key Laboratory for Network Computing and Security Technology China
Laplacian dimensionality reduction can effectively achieve feature transformation and preserve the important structure of high-dimensional features. However, the trained model with this method usually require better g...
来源: 评论
Probability analysis of system vulnerability distribution based on the matroid theory
Probability analysis of system vulnerability distribution ba...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Yichuan Wang Peipei Li Xin Song Yeqiu Xiao Xiaoxue Liu School of computer science and engineering Xi’an University of technology Xi’an China Shanxi Key Laboratory for Network Computing and Security Technology
In recent years, system vulnerability mining techniques have emerged in an endless stream. At present, the existing vulnerability mining techniques are mainly to analyze the source code or monitor and analyze the beha... 详细信息
来源: 评论
Laryngeal Leukoplakia Classification Via Dense Multiscale Feature Extraction in White Light Endoscopy Images  48
Laryngeal Leukoplakia Classification Via Dense Multiscale Fe...
收藏 引用
48th IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2023
作者: You, Zhenzhen Yan, Yan Shi, Zhenghao Zhao, Minghua Yan, Jing Liu, Haiqin Hei, Xinhong Ren, Xiaoyong Xi'An University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology School of Computer Science and Engineering Xi'an China Xi'An Jiaotong University Second Affiliated Hospital of Medical College Department of Otorhinolaryngology Xi'an China
Laryngeal leukoplakia classification is challenging using white light endoscopy images. Relevant research focus on normal tissues versus non normal tissues, cancer versus non cancer classification. The objective of th... 详细信息
来源: 评论
Crucial Interaction Elements Detection for 5G Core network based on the Complex network Model
Crucial Interaction Elements Detection for 5G Core Network b...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Ruinan Peng Xinhong Hei Yichuan Wang Xiaoxue Liu Yeqiu Xiao School of Computer Science and Engineering Xi’an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China
This paper focuses on the issue of crucial interaction elements detection in the 5G core network. Given the current absence of an effective method for quantification evaluating the importance of interaction elements, ... 详细信息
来源: 评论
A Gradient-Guided Method for Hyperspectral Band Selection Based on Spatial-Spectral Weighting
A Gradient-Guided Method for Hyperspectral Band Selection Ba...
收藏 引用
IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems (MASS)
作者: Jing Hu Ke Lit Yunfei Ju Minghua Zhao Shaanxi Key Laboratory for Network Computing and Security Technology School of Computer Science and Engineering Xi'an University of Technology Xi'an China
Hyperspectral image(HSI) band selection is a crucial task in image processing. It is necessary to screen out bands with rich information and low correlation, to achieve data dimensionality reduction and retain key inf... 详细信息
来源: 评论
Hyperspectral Band Selection Based on Classification Reward Adjustment
Hyperspectral Band Selection Based on Classification Reward ...
收藏 引用
IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems (MASS)
作者: Jing Hu Jiawei Liang Yunfei Ju Minghua Zhao Shaanxi Key Laboratory for Network Computing and Security Technology School of Computer Science and Engineering Xi'an University of Technology Xi'an China
Hyperspectral image band selection is a crucial link in image processing. It is necessary to screen out bands with rich information and low correlation, to achieve data dimensionality reduction and retain key informat... 详细信息
来源: 评论
A Novel Auralization Model for network security Situation Assessment
A Novel Auralization Model for Network Security Situation As...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Yeqiu Xiao Yibin Ma Yichuan Wang Kun Jiang Lanlan Cui School of Computer Science and Engineering Xi’an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China
Situation assessment is one of indispensable part for protecting network security. However, with the development of network attacks, the timeliness of attack threat assessment using traditional mathematical methods ha... 详细信息
来源: 评论