咨询与建议

限定检索结果

文献类型

  • 4 篇 期刊文献
  • 3 篇 会议

馆藏范围

  • 7 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5 篇 工学
    • 5 篇 计算机科学与技术...
    • 5 篇 软件工程
    • 1 篇 光学工程
    • 1 篇 动力工程及工程热...
    • 1 篇 电子科学与技术(可...
    • 1 篇 信息与通信工程
    • 1 篇 生物医学工程(可授...
  • 2 篇 理学
    • 1 篇 物理学
    • 1 篇 化学
    • 1 篇 生物学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 临床医学
    • 1 篇 公共卫生与预防医...
    • 1 篇 药学(可授医学、理...
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...
    • 1 篇 工商管理

主题

  • 2 篇 public key crypt...
  • 1 篇 covid-19
  • 1 篇 parity check cod...
  • 1 篇 genetic algorith...
  • 1 篇 security

机构

  • 2 篇 intelligent netw...
  • 2 篇 internet natural...
  • 2 篇 school of artifi...
  • 2 篇 scientific resea...
  • 1 篇 chengdu universi...
  • 1 篇 university of el...
  • 1 篇 public security ...
  • 1 篇 zhejiang gongsha...
  • 1 篇 network and data...
  • 1 篇 network and data...
  • 1 篇 school of physic...
  • 1 篇 network and data...
  • 1 篇 school of commun...
  • 1 篇 dept. of mathema...
  • 1 篇 university of el...
  • 1 篇 school of comput...
  • 1 篇 network and data...
  • 1 篇 educational info...
  • 1 篇 school of teleco...

作者

  • 1 篇 wen zhan
  • 1 篇 zhang tao
  • 1 篇 xiong jin-bo
  • 1 篇 kodjiku seth lar...
  • 1 篇 caiming liu
  • 1 篇 ma hua
  • 1 篇 hua xu
  • 1 篇 aidoo evans
  • 1 篇 aggrey esther st...
  • 1 篇 zhang yan
  • 1 篇 changsong zheng
  • 1 篇 chunming xie
  • 1 篇 jin zhou
  • 1 篇 zhen qin
  • 1 篇 liu zhen-hua
  • 1 篇 deming wang
  • 1 篇 zhonghua li
  • 1 篇 zhao jiacheng
  • 1 篇 liu caiming
  • 1 篇 fiasam linda del...

语言

  • 5 篇 英文
  • 2 篇 中文
检索条件"机构=Network and Data Security Key Lab. of Sichuan Province"
7 条 记 录,以下是1-10 订阅
排序:
An enhanced genetic algorithm for computation task offloading in MEC scenario
收藏 引用
International Journal of Wireless and Mobile Computing 2023年 第2期25卷 118-127页
作者: Zhao, Jiacheng Li, Wenzao Liu, Hantao Yu, Peizhen Li, Hanyun Wen, Zhan School of Communication Engineering Chengdu University of Information Technology Sichuan Chengdu China Chengdu University of Information Technology Sichuan Chengdu China Network and Data Security Key Lab of Sichuan Pro. University of Electronic Science and Technology of China Sichuan Chengdu China Educational Informationisation and Big Data Centre Education Department of Sichuan Province Sichuan Chengdu China
The explosive growth of Internet of Things (IoT) and 5G communication technologies has driven the increasing computing demands for wireless devices. Mobile edge computing in the 5G scenario is a promising solution for... 详细信息
来源: 评论
An Ensemble of CapsNet and KSVM Using Feature Fusion: Application to COVID-19 Detection  3
An Ensemble of CapsNet and KSVM Using Feature Fusion: Applic...
收藏 引用
3rd International Conference on Pattern Recognition and Machine Learning, PRML 2022
作者: Aggrey, Esther Stacy E. B. Zhen, Qin Kodjiku, Seth Larweh Aidoo, Evans Fiasam, Linda Delali Mensah, Acheampong Edward University of Electronic Science & Technology of China School of Information & Software Engineering Chengdu China University of Electronic Science & Technology of China School of Information & Software Engineering Network and Data Security Key Lab of Sichuan Province Chengdu China Zhejiang Gongshang University School of Computer & Information Engineering Hangzhou China
COVID-19 virus is a major worldwide pandemic that is growing at a fast pace throughout the world. The usual approach for diagnosing COVID-19 is the use of a real-time polymerase chain reaction (RT-PCR) based nucleic a... 详细信息
来源: 评论
network traffic detection based on part matching and section evolution of immune elements
Network traffic detection based on part matching and section...
收藏 引用
2020 International Conference on data Processing Algorithms and Models, ICDPAM 2020
作者: Liu, Caiming Zhang, Yan Xie, Chunming Wang, Deming Li, Zhonghua School of Artificial Intelligence Leshan Normal University Leshan614000 China Intelligent Network Security Detection and Evaluation Lab. Leshan Normal University Leshan61400 China Internet Natural Language Intelligent Processing Key Lab. of Education Department of Sichuan Province Leshan Normal University Leshan61400 China Scientific Research Department Leshan Normal University Leshan61400 China
Immune algorithms can improve the self-adaptability for network traffic detection. Classical immune algorithms dynamically evolve and match the whole content of immune elements. However, most features of network traff...
来源: 评论
LDPC Code based Pseudonym Scheme for Vehicular networks
LDPC Code based Pseudonym Scheme for Vehicular Networks
收藏 引用
Space-Air-Ground Computing (SAGC), International Conference on
作者: Jin Zhou Changsong Zheng Yuedi Li Hua Xu Zhiguang Qin Dajiang Chen Network and Data Security Key Lab of Sichuan Province UESTC Chengdu China Public Security Bureau of Sichuan Chengdu China School of Physics and Electronic Engineering Yancheng Teachers University Yancheng China
In this paper, an innovative pseudonym scheme based on Direct Anonymous Attestation (DAA) and Low-Density Parity-Check (LDPC) is proposed. For the sake of improving the efficiency of generating pseudonyms, the propose... 详细信息
来源: 评论
network traffic detection based on part matching and section evolution of immune elements
收藏 引用
Journal of Physics: Conference Series 2021年 第1期1774卷
作者: Caiming Liu Yan Zhang Chunming Xie Deming Wang Zhonghua Li School of Artificial Intelligence Leshan Normal University Leshan 614000 China Intelligent Network Security Detection and Evaluation Lab. Leshan Normal University Leshan 61400 China Internet Natural Language Intelligent Processing Key Lab. of Education Department of Sichuan Province Leshan Normal University Leshan 61400 China Scientific Research Department Leshan Normal University Leshan 61400 China
Immune algorithms can improve the self-adaptability for network traffic detection. Classical immune algorithms dynamically evolve and match the whole content of immune elements. However, most features of network traff...
来源: 评论
Ciphertext-policy weighted attribute-based encryption scheme in cloud computing
收藏 引用
sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of sichuan University (Engineering Science Edition) 2013年 第6期45卷 21-26页
作者: Liu, Xi-Meng Ma, Jian-Feng Xiong, Jin-Bo Li, Qi Zhang, Tao Zhu, Hui School of Telecommunications Eng. Xidian Univ. Xi'an 710071 China School of Computer Sci. and Technol. Xidian Univ. Xi'an 710071 China Network and Data Security Key Lab. of Sichuan Province Chengdu 611731 China
By analyzing existing ciphertext-policy attribute-based encryption scheme, ciphertext-policy weighted attribute-based encryption scheme was proposed. To solve the existing scheme without considering the attribute with... 详细信息
来源: 评论
Efficient mobile IP registration in certificateless public key infrastructure
收藏 引用
sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of sichuan University (Engineering Science Edition) 2012年 44卷 135-139页
作者: Ma, Hua Liu, Xue Liu, Zhen-Hua Dong, Bo Dept. of Mathematics Xidian Univ. Xi'an 710071 China Network and Data Security Key Lab. of Sichuan Province Univ. of Electronic Sci. and Technol. of China Chengdu 611731 China
Based on non-certificate public key cryptography, a new mobile IP(MIP) registration protocol was proposed to minimize the registration time and enhance registration performance. The protocol could realize the authenti... 详细信息
来源: 评论