咨询与建议

限定检索结果

文献类型

  • 113 篇 期刊文献
  • 33 篇 会议

馆藏范围

  • 146 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 75 篇 理学
    • 51 篇 数学
    • 18 篇 统计学(可授理学、...
    • 12 篇 生物学
    • 10 篇 系统科学
    • 4 篇 大气科学
    • 3 篇 物理学
    • 2 篇 化学
  • 73 篇 工学
    • 47 篇 计算机科学与技术...
    • 40 篇 软件工程
    • 15 篇 信息与通信工程
    • 8 篇 控制科学与工程
    • 7 篇 生物工程
    • 5 篇 电子科学与技术(可...
    • 4 篇 仪器科学与技术
    • 4 篇 安全科学与工程
    • 4 篇 网络空间安全
    • 3 篇 机械工程
    • 3 篇 光学工程
    • 3 篇 材料科学与工程(可...
    • 3 篇 交通运输工程
  • 42 篇 管理学
    • 28 篇 管理科学与工程(可...
    • 22 篇 工商管理
    • 13 篇 图书情报与档案管...
    • 3 篇 公共管理
  • 15 篇 医学
    • 13 篇 临床医学
    • 8 篇 基础医学(可授医学...
    • 7 篇 公共卫生与预防医...
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 7 篇 法学
    • 7 篇 社会学
  • 4 篇 农学
    • 4 篇 作物学
  • 1 篇 教育学
  • 1 篇 军事学

主题

  • 9 篇 combinatorial op...
  • 4 篇 internet of thin...
  • 4 篇 optimization
  • 4 篇 network security
  • 4 篇 scheduling
  • 3 篇 costs
  • 3 篇 decision making
  • 3 篇 machine learning
  • 3 篇 cloud computing
  • 2 篇 complex networks
  • 2 篇 approximation al...
  • 2 篇 ai
  • 2 篇 polynomial appro...
  • 2 篇 mixed-integer li...
  • 2 篇 convolution
  • 2 篇 global optimizat...
  • 2 篇 benchmarking
  • 2 篇 game theory
  • 2 篇 classification (...
  • 2 篇 forecasting

机构

  • 17 篇 network and data...
  • 10 篇 network and data...
  • 8 篇 computer network...
  • 7 篇 department of ma...
  • 6 篇 department of ne...
  • 6 篇 school of inform...
  • 5 篇 leeds institute ...
  • 5 篇 center for psych...
  • 5 篇 department of in...
  • 5 篇 institute for pa...
  • 5 篇 department of st...
  • 5 篇 university of pi...
  • 5 篇 arnie charbonnea...
  • 5 篇 ilsbio llc bioba...
  • 5 篇 department of mo...
  • 5 篇 osaka internatio...
  • 5 篇 research departm...
  • 5 篇 department of ve...
  • 5 篇 health managemen...
  • 5 篇 royal stoke univ...

作者

  • 32 篇 goerigk marc
  • 8 篇 zhang hongbin
  • 8 篇 liu bin
  • 7 篇 zhao dongmei
  • 5 篇 lendl stefan
  • 5 篇 dokka trivikram
  • 4 篇 abu-gharbieh ema...
  • 4 篇 basu sanjay
  • 4 篇 kurtz jannis
  • 4 篇 kasperski adam
  • 4 篇 hartisch michael
  • 4 篇 ardalankia jamsh...
  • 4 篇 wulf lasse
  • 4 篇 bold matthew
  • 3 篇 nadine tung
  • 3 篇 krishan kewal
  • 3 篇 peter j hulick
  • 3 篇 abbafati cristia...
  • 3 篇 bärnighausen til...
  • 3 篇 drakoulis yannou...

语言

  • 145 篇 英文
  • 1 篇 其他
检索条件"机构=Network and Data Science Management"
146 条 记 录,以下是1-10 订阅
排序:
DBKEM-AACS: a distributed key escrow model in blockchain with anonymous authentication and committee selection
收藏 引用
science China(Information sciences) 2023年 第3期66卷 289-290页
作者: Axin XIANG Hongfeng GAO Youliang TIAN Liang WAN College of Computer Science and Technology Guizhou University Institute of Cryptography and Data Security Guizhou University Network and Information Management Center Guizhou University State Key Laboratory of Public Big Data Guizhou University Institute of Computer Software and Theory Guizhou University
Dear editor, Key security is of great practical significance and demand to guarantee the security of digital assets in the blockchain system. At present, users prefer to escrow their assets on centralized institutions...
来源: 评论
Average Performance Analysis of Multi-Class Classification Based on Error-Correcting Output Codes
Average Performance Analysis of Multi-Class Classification B...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Kobayashi, Manabu Kumoi, Gendo Yagi, Hideki Hirasawa, Shigeichi Center for Data Science Waseda University Tokyo Japan Nagaoka University of Technology Department of Information and Management Systems Engineering Niigata Japan University of Electro-Communications Department of Computer and Network Engineering Tokyo Japan
In machine learning, one of the methods to solve multiclass classification problems is a framework called Error-Correcting Output Codes (ECOC), which constructs a multiclass classifier by combining a lot of binary cla... 详细信息
来源: 评论
ISAR Imaging and Cross-Range Scaling Based on Image Rotation Correlation
收藏 引用
Journal of Beijing Institute of Technology 2022年 第2期31卷 196-207页
作者: Fangming Liu Cong Du Yujiao Ding Minghai Wang Wei Dong State Key Laboratory on Integrated Optoelectronics College of Electronic Science&EngineeringJilin UniversityChangchun 130012China. Big Data and Network Management Center Jilin UniversityChangchun 130012China.
With the rapid advancement of technology,not only do we need to acquire a clear in-verse synthetic aperture radar(ISAR)image,but also the real size of the target on the imaging plane,so it’s particularly important fo... 详细信息
来源: 评论
Effectiveness of generative adversarial networks in denoising medical imaging (CT/MRI images)
收藏 引用
Multimedia Tools and Applications 2024年 1-25页
作者: Ramadass, Sudhir Narayanan, Sreekumar Kumar, Rajiv K, Thilagavathi Data Analytics Sterck Systems Private Limited Chennai Nungambakkam India Network and Infrastructure Management Faculty of Engineering and Technology Botho University Gaborone Botswana School of Computer Science Engineering and Technology Bennett University Uttar Pradesh Greater Noida India Department of Electronics and Communication Engineering Kumaraguru College of Technology Coimbatore India
For clinical analysis or medical intrusion, imaging technology is a potent tool for producing visual images of a body's inside. However, several existing methods include restricted access to high-quality and diver... 详细信息
来源: 评论
Large-Scale network Adaptive Situation Awareness Method in Spatio-Temporal Dimension  1
收藏 引用
1st International Artificial Intelligence Conference, IAIC 2023
作者: Zhang, Hongbin Xu, Ying Liu, Bin Zhao, Dongmei Bai, Yikang School of Information Science and Engineering Hebei University of Science and Technology Shijiazhuang050000 China Hebei Key Laboratory of Network and Information Security Hebei Normal University Hebei Shijiazhuang050024 China School of Economics and Management Hebei University of Science and Technology Shijiazhuang050000 China Research Center of Big Data and Social Computing Hebei University of Science Shijiazhuang China
In large-scale networks, the state space is exploding and changing dynamically. This leads to difficulties in collecting and analyzing situational awareness data, so we construct an adaptive situational awareness mode... 详细信息
来源: 评论
Real-Time Cyber Attack Detection Based on Automated Ai Security System  6
Real-Time Cyber Attack Detection Based on Automated Ai Secur...
收藏 引用
6th International Conference on Contemporary Computing and Informatics, IC3I 2023
作者: Madala, Ravikiran Amardeep, Rashmi Sowmya, S.R. Supriya, R.K. Nikshepa, T. Surabhi, K.R. University of Cumberlands Network and Data Center Engineer Ph.D Information Technology DurhamNC United States Dayananda Sagar Academy of Technology and Management Department of Information Science and Engineering Karnataka Bengaluru India
Cyber security tactics must be more potent and cunning due to the complexity of cybercrimes, which is always expanding. This will enable guard components to make real-time decisions that successfully counter sophistic... 详细信息
来源: 评论
A Study on a Reduced Indicator System for the network Security Situational Assessment Model
A Study on a Reduced Indicator System for the Network Securi...
收藏 引用
2023 International Conference on networking and network Applications, NaNA 2023
作者: Zhang, Hongbin Bai, Yikang Zhao, Dongmei Liu, Bin Xu, Ying Hebei Normal University Hebei Key Laboratory of Network and Information Security Shijiazhuang China Hebei University of Science and Technology School of Information Science and Engineering Shijiazhuang China School of Economics and Management Research Center of Big Data and Social Computing Shijiazhuang China
It is a challenge to monitor the network security state in a large-scale network environment because the selection of situation assessment indicators is overrun by massive observational information. To address this is... 详细信息
来源: 评论
Chosen-Instruction Attack Against Commercial Code Virtualization Obfuscators  29
Chosen-Instruction Attack Against Commercial Code Virtualiza...
收藏 引用
29th Annual network and Distributed System Security Symposium, NDSS 2022
作者: Li, Shijia Jia, Chunfu Qiu, Pengda Chen, Qiyuan Ming, Jiang Gao, Debin Tianjin Key Laboratory of Network and Data Security Technology College of Computer Science Nankai University China The University of Texas Arlington United States Singapore Management University Singapore
Code virtualization is a well-known sophisticated obfuscation technique that uses custom virtual machines (VM) to emulate the semantics of original native instructions. Commercial VM-based obfuscators (e.g., Themida a... 详细信息
来源: 评论
What makes a successful rebuttal in computer science conferences?: A perspective on social interaction
What makes a successful rebuttal in computer science confere...
收藏 引用
作者: Huang, Junjie Huang, Win-bin Bu, Yi Cao, Qi Shen, Huawei Cheng, Xueqi Data Intelligence System Research Center Institute of Computing Technology Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China Department of Information Management Peking University Beijing China CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing China
With an exponential increase in submissionsto top-tier Computer science (CS) conferences, more and more conferences have introduced a rebuttal stage to the conference peer review process. The rebuttal stage can be mod... 详细信息
来源: 评论
Stacking-Based Attention Temporal Convolutional network for Action Segmentation  48
Stacking-Based Attention Temporal Convolutional Network for ...
收藏 引用
48th IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2023
作者: Yang, Liu Jiang, Yu Hong, Junkun Wu, Zhenjie Yang, Zhan Long, Jun Central South University School of Computer Science and Engineering China Central South University Big Data Institute Central South University China Central South University Network Resources Management and Trust Evaluation Key Laboratory of Hunan Province Changsha China
Action segmentation plays an important role in video understanding, which is implemented by frame-wise action classification. Recent works on action segmentation capture long-term dependencies by increasing temporal c... 详细信息
来源: 评论