咨询与建议

限定检索结果

文献类型

  • 21 篇 会议
  • 5 篇 期刊文献

馆藏范围

  • 26 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 14 篇 工学
    • 12 篇 计算机科学与技术...
    • 10 篇 软件工程
    • 5 篇 信息与通信工程
    • 2 篇 机械工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 电气工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 控制科学与工程
    • 1 篇 化学工程与技术
    • 1 篇 交通运输工程
  • 6 篇 理学
    • 4 篇 数学
    • 2 篇 化学
    • 1 篇 天文学
    • 1 篇 生物学
    • 1 篇 系统科学
    • 1 篇 统计学(可授理学、...
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 公共卫生与预防医...
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...
    • 1 篇 工商管理

主题

  • 3 篇 bandwidth
  • 3 篇 network interfac...
  • 3 篇 delay
  • 2 篇 computer science
  • 2 篇 message passing
  • 2 篇 big data
  • 2 篇 cameras
  • 2 篇 topology
  • 2 篇 protocols
  • 2 篇 hardware
  • 2 篇 artificial intel...
  • 2 篇 broadcasting
  • 2 篇 computer network...
  • 1 篇 vehicle dynamics
  • 1 篇 tuning
  • 1 篇 vehicular and wi...
  • 1 篇 scalability
  • 1 篇 compressed sensi...
  • 1 篇 botnet
  • 1 篇 video coding

机构

  • 6 篇 shandong provinc...
  • 5 篇 school of inform...
  • 2 篇 health managemen...
  • 2 篇 the hong kong po...
  • 2 篇 department of ma...
  • 2 篇 school of inform...
  • 2 篇 science and tech...
  • 2 篇 integrated elect...
  • 2 篇 aass mpi lab öre...
  • 1 篇 department of bi...
  • 1 篇 department of me...
  • 1 篇 department of ps...
  • 1 篇 preventive medic...
  • 1 篇 department of fo...
  • 1 篇 department of nu...
  • 1 篇 department of de...
  • 1 篇 innovation in he...
  • 1 篇 hubert departmen...
  • 1 篇 anesthesiology d...
  • 1 篇 cyberknife cente...

作者

  • 7 篇 panda dhabaleswa...
  • 6 篇 yu weikuan
  • 3 篇 dhabaleswar k. p...
  • 2 篇 lizhi peng
  • 2 篇 ze-yu zou
  • 2 篇 yang yang
  • 2 篇 d. buntinas
  • 2 篇 yun-li zang
  • 2 篇 vishnu abhinav
  • 2 篇 bonnie ngai-fong...
  • 2 篇 yun-xia liu
  • 2 篇 zhenxiang chen
  • 2 篇 qiben yan
  • 2 篇 graham rich l.
  • 2 篇 d.k. panda
  • 2 篇 wu jiesheng
  • 2 篇 wen-na zhang
  • 1 篇 couto rosa a.s.
  • 1 篇 joao conde
  • 1 篇 lorenzo muccioli

语言

  • 26 篇 英文
检索条件"机构=Network-Based Computing Lab"
26 条 记 录,以下是1-10 订阅
排序:
Flexible TiO_(2)-WO_(3−x) hybrid memristorwith enhanced linearity and synaptic plasticity for precise weight tuning in neuromorphic computing
收藏 引用
npj Flexible Electronics 2024年 第1期8卷 180-191页
作者: Jianyong Pan Hao Kan Zhaorui Liu Song Gao Enxiu Wu Yang Li Chunwei Zhang Shandong Provincial Key Laboratory of Network Based Intelligent Computing School of Information Science and EngineeringUniversity of JinanJinanChina State Key Lab of Transducer Technology Shanghai Institute of Microsystem and Information TechnologyChinese Academy of SciencesShanghaiChina School of Integrated Circuits Shandong UniversityJinanChina
Tungsten oxide(WO_(3))-based memristors show promising applications in neuromorphic ***,single-layer WO_(3) memristors suffer from issues such as weak memory performance and nonlinear conductance *** this work,a funct... 详细信息
来源: 评论
Devils in the Clouds: An Evolutionary Study of Telnet Bot Loaders
Devils in the Clouds: An Evolutionary Study of Telnet Bot Lo...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Yuhui Zhu Zhenxiang Chen Qiben Yan Shanshan Wang Alberto Giaretta Enlong Li Lizhi Peng Chuan Zhao Mauro Conti Shandong Provincial Key Laboratory of Network Based Intelligent Computing University of Jinan China School of Information Science and Engineering University of Jinan China Department of Computer Science and Engineering Michigan State University USA AASS MPI Lab Örebro University Sweden Department of Mathematics University of Padua Italy
One of the innovations brought by Mirai and its derived malware is the adoption of self-contained loaders for infecting IoT devices and recruiting them in botnets. Functionally decoupled from other botnet components a...
来源: 评论
Devils in the Clouds: An Evolutionary Study of Telnet Bot Loaders
arXiv
收藏 引用
arXiv 2022年
作者: Zhu, Yuhui Chen, Zhenxiang Yan, Qiben Wang, Shanshan Giaretta, Alberto Li, Enlong Peng, Lizhi Zhao, Chuan Conti, Mauro Shandong Provincial Key Laboratory of Network Based Intelligent Computing University of Jinan China School of Information Science and Engineering University of Jinan China Department of Computer Science and Engineering Michigan State University United States AASS MPI Lab Örebro University Sweden Department of Mathematics University of Padua Italy
One of the innovations brought by Mirai and its derived malware is the adoption of self-contained loaders for infecting IoT devices and recruiting them in botnets. Functionally decoupled from other botnet components a... 详细信息
来源: 评论
Generalized association and deep understanding method for big video data processing
Generalized association and deep understanding method for bi...
收藏 引用
2019 IEEE International Conferences on Ubiquitous computing and Communications and Data Science and Computational Intelligence and Smart computing, networking and Services, IUCC/DSCI/SmartCNS 2019
作者: Xu, Lin Wu, Wei Lv, Wanghan Wang, Dong Science and Technology in Information System Engineering Lab Nanjing Research Institute of Electronic Engineering Nanjing China School of Information Science and Engineering University of Jinan China Shandong Provincial Key Laboratory of Network Based Intelligent Computing University of Jinan Jinan China
In Big Data Era, it is becoming more and more important to timely and efficient processing of massive videos, and mining of the value information contained in them. This paper studies chaotic compressed sensing theory... 详细信息
来源: 评论
Generalized Association and Deep Understanding Method for Big Video Data Processing
Generalized Association and Deep Understanding Method for Bi...
收藏 引用
IEEE International Symposium on Parallel and Distributed Processing with Applications and IEEE International Conference on Ubiquitous computing and Communications (ISPA/IUCC)
作者: Lin Xu Wei Wu Wanghan Lv Dong Wang Science and Technology in Information System Engineering Lab Nanjing Research institute of Electronic Engineering Nanjing China School of Information Science and Engineering University of Jinan Jinan China Shandong Provincial Key Laboratory of Network Based Intelligent Computing University of Jinan Jinan China
In Big Data Era, it is becoming more and more important to timely and efficient processing of massive videos, and mining of the value information contained in them. This paper studies chaotic compressed sensing theory... 详细信息
来源: 评论
Robust Camera Model Identification based on Richer Convolutional Feature network
Robust Camera Model Identification Based on Richer Convoluti...
收藏 引用
Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA)
作者: Ze-Yu Zou Yun-Xia Liu Wen-Na Zhang Yue-Hui Chen Yun-Li Zang Yang Yang Bonnie Ngai-Fong Law Shandong Provincial Key Laboratory of Network Based Intelligent Computing University of Jinan Jinan China Integrated Electronic Systems Lab Co. Ltd Jinan China School of Information Science and Engineering Shandong University Qingdao China The Hong Kong Polytechnic University Hong Kong China
based on convolutional neural network (CNN), the problem of robust patch level camera model identification is studied in this paper. Firstly, an effective feature representation is proposed by concatenating a multisca... 详细信息
来源: 评论
MAC-AC: A Novel Distributed MAC Protocol for Accessing Channel in Vehicular Ad Hoc networks
MAC-AC: A Novel Distributed MAC Protocol for Accessing Chann...
收藏 引用
IEEE Conference on Vehicular Technology (VTC)
作者: Baozhu Li Fen Hou Changyue Zhang Shaohua Li Shujuan Ji Shanzhi Chen School of Information Science and Engineering University of Jinan Jinan China Shandong Provincial Key Laboratory of Network-based Intelligent Computing Jinan China Faculty of Science and Technology University of Macau Macau China Automotive Research Institute China National Heavy Duty Truck Group Co. Ltd Jinan China Shandong Key Laboratory of Wisdom Mine Information Technology Qingdao China College of Computer Science and Engineering Shandong University of Science and Technology Qingdao China State Key Lab of Wireless Mobile Communication Beijing China China Academy of Telecommunication Technology Beijing China
As a promising paradigm, VANET has been attracting more and more attention from the industry and academia recently. However, due to rapid movement of vehicles and highly dynamic topology, designing efficient MAC proto... 详细信息
来源: 评论
Effective Source Camera Identification based on MSEPLL Denoising Applied to Small Image Patches
Effective Source Camera Identification based on MSEPLL Denoi...
收藏 引用
Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA)
作者: Wen-Na Zhang Yun-Xia Liu Ze-Yu Zou Yun-Li Zang Yang Yang Bonnie Ngai-Fong Law Shandong Provincial Key Laboratory of Network Based Intelligent Computing University of Jinan Jinan China School of Control Science and Engineering Shandong University Jinan China Integrated Electronic Systems Lab Co. Ltd Jinan China School of Information Science and Engineering Shandong University Qingdao China The Hong Kong Polytechnic University Hong Kong China
Sensor Pattern Noise (SPN) has proven to be an effective fingerprint for source camera identification, while its estimation accuracy heavily relies on denoising algorithm. In this paper, an effective source camera ide... 详细信息
来源: 评论
Changing life expectancy in European countries 1990–2021: a subanalysis of causes and risk factors from the Global Burden of Disease Study 2021
收藏 引用
The Lancet Public Health 2025年 第3期10卷 e172-e188页
作者: Steel, Nicholas Bauer-Staeb, Clarissa Maria Mercedes Ford, John A. Abbafati, Cristiana Abdalla, Mohammed Altigani Abdelkader, Atef Abdi, Parsa Zuñiga, Roberto Ariel Abeldaño Abiodun, Olugbenga Olusola Abolhassani, Hassan Abu-Gharbieh, Eman Abukhadijah, Hana J. Abu-Zaid, Ahmed Addo, Isaac Yeboah Addolorato, Giovanni Adekanmbi, Victor Adetunji, Juliana Bunmi Adeyeoluwa, Temitayo Esther Agardh, Emilie E. Agyemang-Duah, Williams Ahmad, Danish Ahmed, Ayman Ahmed, Syed Anees Akinosoglou, Karolina Akkaif, Mohammed Ahmed Al Awaidy, Salah Al Hasan, Syed Mahfuz Al Zaabi, Omar Ali Mohammed Aldridge, Robert W. Algammal, Abdelazeem M. Al-Gheethi, Adel Ali Saeed Ali, Abid Ali, Mohammed Usman Ali, Syed Shujait Ali, Waad Alicandro, Gianfranco Alif, Sheikh Mohammad Al-Jumaily, Adel Allebeck, Peter Alrawashdeh, Ahmad Al-Rifai, Rami H. Alsabri, Mohammed A. Alshahrani, Najim Z. Aluh, Deborah Oyine Al-Wardat, Mohammad Al-Zyoud, Walid A. Amiri, Sohrab Anderlini, Deanna Andrei, Catalina Liliana Anil, Abhishek Anvari, Saeid Anyasodor, Anayochukwu Edward Appiah, Seth Christopher Yaw Aquilano, Michele Arabloo, Jalal Arafat, Mosab Areda, Demelash Aremu, Abdulfatai Armani, Keivan Armocida, Benedetta Ärnlöv, Johan Asaduzzaman, Muhammad Astell-Burt, Thomas Aujayeb, Avinash Ausloos, Marcel Azadnajafabad, Sina Aziz, Shahkaar Azzam, Ahmed Y. Babu, Giridhara Rathnaiah Badache, Andreea Corina Badiye, Ashish D. Bahramian, Saeed Baig, Atif Amin Baker, Jennifer L. Bansal, Hansi Bärnighausen, Till Winfried Barone, Mark Thomaz Ugliara Barrow, Amadou Barteit, Sandra Bashir, Shahid Bashiru, Hameed Akande Basso, João Diogo Bastan, Mohammad-Mahdi Basu, Sanjay Batra, Kavita Bauckneht, Matteo Baune, Bernhard T. Beghi, Massimiliano Beiranvand, Maryam Béjot, Yannick Bell, Michelle L. Bello, Olorunjuwon Omolaja Belo, Luis Beloukas, Apostolos Beneke, Alice A. Bettencourt, Paulo J.G. Bhagavathula, Akshaya Srikanth Bhala, Neeraj Bhaskar, Sonu Bisulli, Francesca Bjørge, Tone Bodunrin, Aadam Olalekan Carvajal, Alejandro Botero Bouaoud, Souad Brayne, Carol Brenner, H Department of Primary Care and Public Health University of East Anglia Norwich United Kingdom Office for Health Improvement and Disparities Department of Health and Social Care London United Kingdom Department of Legal and Economic Studies La Sapienza University Rome Italy Rome Italy Hull York Medical School University of Hull Hull United Kingdom Department of Mathematics and Sciences Ajman University Ajman United Arab Emirates Department of Medicine Memorial University St. John's NL Canada Postgraduate Department University of Sierra Sur Miahuatlan de Porfirio Diaz Mexico Yhteiskuntadatatieteen keskus (Centre for Social Data Science) Helsinki Finland Department of Internal Medicine Federal Medical Centre Abuja Nigeria Research Center for Immunodeficiencies Tehran University of Medical Sciences Tehran Iran Department of Medical Biochemistry and Biophysics Karolinska Institutet (Karolinska Institute) Stockholm Sweden Department of Clinical Sciences University of Sharjah Sharjah United Arab Emirates Department of Biopharmaceutics and Clinical Pharmacy University of Jordan Amman Jordan Medical Research Center Hamad Medical Corporation Doha Qatar Department of Biochemistry and Molecular Medicine Alfaisal University Riyadh Saudi Arabia College of Graduate Health Sciences University of Tennessee Memphis TN United States School of Medicine Sydney NSW Australia Centre for Social Research in Health University of New South Wales Sydney NSW Australia Internal Medicine and Alcohol Related Disease Unit Fondazione Policlinico Universitario A. Gemelli IRCCS Rome Italy Department of Medical and Surgical Sciences Università Cattolica di Roma (Catholic University of Rome) Rome Italy Department of Obstetrics and Gynecology University of Texas Medical Branch Galveston TX United States Department of Biochemistry Osun State University Osogbo Nigeria Department of Pharmacology and Therapeutics University of Medical Sciences Ondo Ondo Nigeria Department of Veteri
Background: Decades of steady improvements in life expectancy in Europe slowed down from around 2011, well before the COVID-19 pandemic, for reasons which remain disputed. We aimed to assess how changes in risk factor...
来源: 评论
A First Look at Android Malware Traffic in First Few Minutes
A First Look at Android Malware Traffic in First Few Minutes
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Zhenxiang Chen Hongbo Han Qiben Yan Bo Yang Lizhi Peng Lei Zhang Jin Li Shandong Provincial Key Lab of Network based Intelligent Computing University of Jinan Jinan Shandong China Shape Security Mountain View CA USA Guangzhou University Guangzhou Guangdong China
With the advent of mobile era, mobile terminals are going through a trend of surpassing PC to become the most popular computing device. Meanwhile, the hackers and viruswriters are paying close attention to the mobile ... 详细信息
来源: 评论