咨询与建议

限定检索结果

文献类型

  • 659 篇 会议
  • 357 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 1,021 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 677 篇 工学
    • 545 篇 计算机科学与技术...
    • 463 篇 软件工程
    • 153 篇 信息与通信工程
    • 91 篇 电气工程
    • 81 篇 生物工程
    • 80 篇 控制科学与工程
    • 49 篇 网络空间安全
    • 40 篇 机械工程
    • 34 篇 光学工程
    • 32 篇 安全科学与工程
    • 29 篇 交通运输工程
    • 26 篇 电子科学与技术(可...
    • 26 篇 生物医学工程(可授...
    • 25 篇 化学工程与技术
    • 24 篇 仪器科学与技术
    • 23 篇 建筑学
  • 303 篇 理学
    • 155 篇 数学
    • 87 篇 生物学
    • 59 篇 物理学
    • 50 篇 统计学(可授理学、...
    • 32 篇 化学
    • 29 篇 系统科学
  • 191 篇 管理学
    • 129 篇 管理科学与工程(可...
    • 84 篇 图书情报与档案管...
    • 48 篇 工商管理
  • 57 篇 法学
    • 30 篇 社会学
    • 28 篇 法学
  • 27 篇 医学
    • 25 篇 临床医学
    • 24 篇 基础医学(可授医学...
  • 23 篇 经济学
    • 23 篇 应用经济学
  • 9 篇 教育学
  • 9 篇 农学
  • 8 篇 军事学
  • 6 篇 艺术学

主题

  • 37 篇 deep learning
  • 36 篇 blockchain
  • 34 篇 feature extracti...
  • 27 篇 privacy
  • 26 篇 data models
  • 25 篇 security
  • 24 篇 training
  • 23 篇 machine learning
  • 22 篇 computational mo...
  • 21 篇 semantics
  • 20 篇 servers
  • 19 篇 internet of thin...
  • 19 篇 accuracy
  • 18 篇 data privacy
  • 17 篇 predictive model...
  • 17 篇 cloud computing
  • 16 篇 federated learni...
  • 15 篇 neural networks
  • 15 篇 smart contract
  • 14 篇 authentication

机构

  • 125 篇 school of comput...
  • 85 篇 school of cybers...
  • 70 篇 school of cybers...
  • 49 篇 cyberspace secur...
  • 42 篇 school of comput...
  • 32 篇 school of comput...
  • 25 篇 school of comput...
  • 25 篇 guangxi key labo...
  • 22 篇 school of comput...
  • 19 篇 hainan universit...
  • 18 篇 school of comput...
  • 18 篇 school of cyber ...
  • 17 篇 school of comput...
  • 17 篇 school of comput...
  • 17 篇 school of cybers...
  • 16 篇 hangzhou innovat...
  • 16 篇 institute of inf...
  • 15 篇 jiangsu key labo...
  • 14 篇 school of inform...
  • 13 篇 key laboratory o...

作者

  • 29 篇 ye jun
  • 24 篇 ding yong
  • 20 篇 wang yujue
  • 19 篇 zhang yuqing
  • 15 篇 yuqing zhang
  • 15 篇 wang wei
  • 15 篇 jun ye
  • 14 篇 jieren cheng
  • 14 篇 liang hai
  • 13 篇 cheng jieren
  • 13 篇 yang changsong
  • 12 篇 zhu liehuang
  • 12 篇 jiangyuan yao
  • 12 篇 chen jinfu
  • 12 篇 guo zhen
  • 11 篇 xuan qi
  • 11 篇 yong ding
  • 10 篇 yujue wang
  • 10 篇 tang xiangyan
  • 9 篇 shen meng

语言

  • 973 篇 英文
  • 42 篇 其他
  • 7 篇 中文
检索条件"机构=School of Computer and Cyberspace Security"
1021 条 记 录,以下是81-90 订阅
排序:
TRACE: A Robust Framework for Malicious Traffic Detection with Noisy Labels
TRACE: A Robust Framework for Malicious Traffic Detection wi...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Yitong Cai Chengwei Peng Shu Li Yuyi Liu Hongfei Zhang Binxing Fang Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China National Computer Network Emergency Response Technical Team/Coordination Center of China Beijing China Cyberspace Institute of Advanced Technology Guangzhou University Guangzhou China
Deep learning-based malicious traffic detection requires large-scale, accurately labeled datasets. However, realistic malicious traffic datasets contain noisy labels due to annotation errors, which can degrade the per... 详细信息
来源: 评论
VulnerGAN: a backdoor attack through vulnerability amplification against machine learning-based network intrusion detection systems
收藏 引用
Science China(Information Sciences) 2022年 第7期65卷 32-50页
作者: Guangrui LIU Weizhe ZHANG Xinjie LI Kaisheng FAN Shui YU School of Cyberspace Science Harbin Institute of Technology Cyberspace Security Research Center Peng Cheng Laboratory School of Computer Science University of Technology Sydney
Machine learning-based network intrusion detection systems(ML-NIDS) are extensively used for network security against unknown attacks. Existing intrusion detection systems can effectively defend traditional network at... 详细信息
来源: 评论
A Cross-chain Model Based on Credit Hierarchical Notary Group for IoT Roaming Settlement  6th
A Cross-chain Model Based on Credit Hierarchical Notary Gro...
收藏 引用
6th International Conference on Blockchain and Trustworthy Systems, BlockSys 2024
作者: Lu, Shuhao Liang, Hai Wang, Yujue Ding, Yong Yang, Changsong Guo, Zhenwei Guangxi Key Laboratory of Cryptography and Information Security School of Computer Science and Information Security Guilin University of Electronic Technology Guilin541004 China Guangxi Engineering Research Center of Industrial Internet Security and Blockchain Guilin University of Electronic Technology Guilin China Hangzhou Innovation Institute of Beihang University Hangzhou China Guangxi Key Laboratory of Digital Infrastructure Guangxi Zhuang Autonomous Region Information Center Nanning China Institute of Cyberspace Technology HKCT Institute for Higher Education Hong Kong
In IoT with Blockchain, an increasing number of mobile IoT devices are starting to work across various locations, requiring operators connected to these IoT devices to provide roaming services. Due to the differences ... 详细信息
来源: 评论
SDN load balancing method based on K-dijkstra
收藏 引用
International Journal of Performability Engineering 2018年 第4期14卷 709-716页
作者: Yang, Xiaohui Wang, Lei School of Cyberspace Security and Computer Hebei University Baodin071002 China
In order to solve the problem that control and forwarding are closely coupled in traditional network, the network lack of innovation and programmability, and the network management and maintenance difficulty, an SDN l... 详细信息
来源: 评论
SecPQ: Secure Prediction Queries on Encrypted Outsourced Databases
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Liang, Jinwen Guo, Song Hong, Zicong Zhou, Enyuan Zhang, Chuan Xiao, Bin Hong Kong Polytechnic University Hung Hom Department of Computing Kowloon Hong Kong Hong Kong University of Science and Technology Clear Water Bay Department of Computer Science and Engineering Kowloon Hong Kong Beijing Institute of Technology School of Cyberspace Science and Technology Beijing100081 China Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies Guangdong China
Prediction queries have revolutionized data search by integrating machine learning models and traditional data processing operations for advanced analytics. However, existing prediction query frameworks for outsourced... 详细信息
来源: 评论
Comparing Different Membership Inference Attacks with a Comprehensive Benchmark
收藏 引用
IEEE Transactions on Information Forensics and security 2025年
作者: Niu, Jun Zhu, Xiaoyan Zeng, Moxuan Zhang, Ge Zhao, Qingyang Huang, Chunhui Zhang, Yangming An, Suyu Wang, Yangzhong Yue, Xinghui He, Zhipeng Guo, Weihao Shen, Kuo Liu, Peng Zhang, Lan Ma, Jianfeng Zhang, Yuqing Xidian University School of Cyber Engineering School of Computer Science and Technology Xi'an710071 China Xidian University School of Telecommunications Engineering Xi'an710071 China Xidian University School of Hangzhou Institute of Technology Hangzhou311231 China Pennsylvania State University Information Sciences and Technology 16802 United States Northern Arizona University The School of Informatics Computing & Cyber Systems FlagstaffAZ86005 United States Xidian University School of Cyber Engineering Xi'an710071 China Yanshan University The College of Information Science and Engineering Qinhuangdao066004 China University of Chinese Academy of Sciences The School of Computer Science and Technology Beijing101408 China The School of Cyberspace Security Hainan University Haikou570228 China
Membership inference (MI) attacks pose a significant threat to user privacy in machine learning. While numerous attacks have been proposed, the lack of standardized evaluation parameters and metrics has led to inconsi... 详细信息
来源: 评论
Conformal Graph-level Out-of-distribution Detection with Adaptive Data Augmentation  25
Conformal Graph-level Out-of-distribution Detection with Ada...
收藏 引用
Proceedings of the ACM on Web Conference 2025
作者: Xixun Lin Yanan Cao Nan Sun Lixin Zou Chuan Zhou Peng Zhang Shuai Zhang Ge Zhang Jia Wu Institute of Information Engineering Chinese Academy of Sciences Beijing China Institute of Information Engineering Chinese Academy of Sciences Beijing China and School of Cyber Security University of Chinese Academy of Sciences Beijing China School of Cyber Science and Engineering Wuhan University Wuhan China School of Cyber Security University of Chinese Academy of Sciences Academy of Mathematics and Systems Science CAS Beijing China and School of Cyber Security University of Chinese Academy of Sciences Beijing China Cyberspace Institute of Advanced Technology Guangzhou University Guangzhou China Academy of Mathematics and Systems Science CAS Beijing China School of Computer Science and Technology Donghua University Shanghai China Department of Computing Macquarie University Sydney Australia
Graph-level out-of-distribution (OOD) detection, which attempts to identify OOD graphs originated from an unknown distribution, is a vital building block for safety-critical applications in Web and society. Current ap... 详细信息
来源: 评论
pFedCal: Lightweight Personalized Federated Learning with Adaptive Calibration Strategy
收藏 引用
IEEE Transactions on Services Computing 2025年
作者: Deng, Dongshang Wu, Xuangou Zhang, Tao Xiang, Chaocan Zhao, Wei Xu, Minrui Kang, Jiawen Han, Zhu Niyato, Dusit Anhui University of Technology School of Computer Science and Technology Anhui Province Key Laboratory of Digital Twin Technology in Metallurgical Industry Anhui Engineering Research Center for Intelligent Applications and Security of Industrial Internet Ma'anshan243002 China Beijing Jiaotong University School of Cyberspace Science and Technology Beijing100044 China Anhui Provincial Key Laboratory of Digital Twin Technology in Metallurgical Industry Anhui243002 China Chongqing University College of Computer Science Chongqing400044 China Nanyang Technological University School of Computer Science and Engineering 639798 Singapore Guangdong University of Technology School of Automation Guangzhou510062 China University of Houston Department of Electrical and Computer Engineering HoustonTX77004 United States Kyung Hee University Department of Computer Science and Engineering Seoul446-701 Korea Republic of
Federated learning (FL) is a promising artificial intelligence framework that enables clients to collectively train models with data privacy. However, in real-world scenarios, to construct practical FL frameworks, sev... 详细信息
来源: 评论
New MRA Schemes Based on The CRT for Polynomial Rings
收藏 引用
IEEE Transactions on Information Theory 2025年
作者: Yang, Jing Wang, Xianfang Xiang, Can Fu, Fang-Wei Xia, Shu-Tao Shandong Technology and Business University School of Computer Science and Technology Shandong Yantai264005 China CETC Cyberspace Security Technology Co. Ltd Westone Cryptologic Research Center Beijing100070 China South China Agricultural University College of Mathematics and Informatics Guangdong Guangzhou510642 China Nankai University Chern Institute of Mathematics LPMC Tianjin300071 China Tsinghua University Tsinghua Shenzhen International Graduate School Guangdong Shenzhen518055 China
At present, existing multi-receiver authentication (MRA) schemes can only handle situations where the capacities of all receivers in the schemes are the same. However, in reality, different receivers may need to have ... 详细信息
来源: 评论
PROBABILISTIC AND AVERAGE LINEAR WIDTHS OF SOBOLEV SPACE WITH GAUSSIAN MEASURE IN SPACE S_Q(T)(1≤Q≤∞)
收藏 引用
Acta Mathematica Scientia 2015年 第2期35卷 495-507页
作者: 徐艳艳 陈广贵 甘莹 许燕 Lab of Security Insurance of Cyberspace of Sichuan Province School of Mathematics and Computer EngineeringXihua University School of Mathematics and Computer Engineering Xihua University
Probabilistic linear (N, δ)-widths and p-average linear N-widths of Sobolev space W2^r(T), equipped with a Gaussian probability measure #, are studied in the metric of Sq (T) (1 ≤ Q ≤∞), and determined the... 详细信息
来源: 评论