咨询与建议

限定检索结果

文献类型

  • 264 篇 会议
  • 223 篇 期刊文献

馆藏范围

  • 487 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 330 篇 工学
    • 253 篇 计算机科学与技术...
    • 226 篇 软件工程
    • 79 篇 信息与通信工程
    • 38 篇 生物工程
    • 33 篇 电气工程
    • 30 篇 控制科学与工程
    • 29 篇 电子科学与技术(可...
    • 27 篇 网络空间安全
    • 15 篇 光学工程
    • 14 篇 机械工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 仪器科学与技术
    • 10 篇 化学工程与技术
    • 10 篇 交通运输工程
    • 9 篇 安全科学与工程
    • 8 篇 土木工程
  • 160 篇 理学
    • 99 篇 数学
    • 39 篇 生物学
    • 31 篇 统计学(可授理学、...
    • 26 篇 物理学
    • 15 篇 系统科学
    • 11 篇 化学
  • 80 篇 管理学
    • 40 篇 管理科学与工程(可...
    • 39 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 16 篇 法学
    • 10 篇 社会学
    • 7 篇 法学
  • 11 篇 医学
    • 9 篇 临床医学
    • 8 篇 基础医学(可授医学...
  • 9 篇 军事学
    • 8 篇 军队指挥学
  • 6 篇 经济学
  • 4 篇 农学
  • 3 篇 教育学
  • 2 篇 文学

主题

  • 22 篇 semantics
  • 16 篇 deep learning
  • 15 篇 feature extracti...
  • 12 篇 computational mo...
  • 12 篇 network security
  • 12 篇 training
  • 10 篇 authentication
  • 10 篇 predictive model...
  • 9 篇 neural networks
  • 9 篇 optimization
  • 9 篇 security
  • 9 篇 accuracy
  • 9 篇 cloud computing
  • 9 篇 data models
  • 9 篇 cryptography
  • 7 篇 image enhancemen...
  • 7 篇 generative adver...
  • 7 篇 image segmentati...
  • 7 篇 petri nets
  • 7 篇 blockchain

机构

  • 39 篇 school of comput...
  • 37 篇 shaanxi key labo...
  • 36 篇 school of comput...
  • 30 篇 shaanxi key labo...
  • 19 篇 school of comput...
  • 13 篇 key lab of infor...
  • 11 篇 xi'an university...
  • 11 篇 shaanxi key labo...
  • 10 篇 school of comput...
  • 9 篇 department of co...
  • 9 篇 school of comput...
  • 8 篇 shaanxi key labo...
  • 8 篇 tianjin key labo...
  • 7 篇 department of co...
  • 7 篇 shaanxi key labo...
  • 7 篇 haihe lab of ita...
  • 7 篇 school of comput...
  • 7 篇 shaanxi key labo...
  • 7 篇 key lab of netwo...
  • 7 篇 zhejiang lab

作者

  • 27 篇 yichuan wang
  • 27 篇 meng deyu
  • 26 篇 xinhong hei
  • 21 篇 wang yichuan
  • 18 篇 hei xinhong
  • 17 篇 shen yulong
  • 16 篇 liu jun
  • 16 篇 cao xiangyong
  • 15 篇 zheng qinghua
  • 12 篇 li wei
  • 12 篇 haiyan jin
  • 11 篇 jin haiyan
  • 11 篇 wenjiang ji
  • 10 篇 luo minnan
  • 10 篇 dong xuewen
  • 10 篇 lei zhu
  • 10 篇 wei wei
  • 9 篇 wang lei
  • 9 篇 xiaoxue liu
  • 9 篇 tan zuowen

语言

  • 445 篇 英文
  • 27 篇 其他
  • 16 篇 中文
检索条件"机构=Shaanxi Key Lab Network Computer and Security Technology"
487 条 记 录,以下是151-160 订阅
排序:
Chinese named entity recognition method for the field of network security based on RoBERTa
Chinese named entity recognition method for the field of net...
收藏 引用
2021 International Conference on networking and network Applications, NaNA 2021
作者: Zhu, Xiaoyan Zhang, Yu Zhu, Lei Hei, Xinhong Wang, Yichuan Hu, Feixiong Yao, Yanni Xi'an Jiaotong University School of Computer Science and Engineering Xi'an710049 China School of Computer Science and Technology Xi'an University of technology Shaanxi Xi'an710048 China Shaanxi Key Laboratory for Network Computing and Security Technology Shaanxi Xi'an710048 China Shenzhen Tencent Computer System Co. Ltd Shenzhen518054 China
As the mobile Internet is developing rapidly, people who use cell phones to access the Internet dominate, and the mobile Internet has changed the development environment of online public opinion and made online public... 详细信息
来源: 评论
A Secure Lightweight RFID Mutual Authentication Protocol Without Explicit Challenge-Response Pairs  2nd
A Secure Lightweight RFID Mutual Authentication Protocol Wit...
收藏 引用
2nd EAI International Conference on Applied Cryptography in computer and Communications, AC3 2022
作者: Huang, Keke Lin, Changlu Liu, Yali College of Computer and Cyber Security Fujian Normal University Fujian Fuzhou350117 China Fujian Provincial Key Lab of Network Security and Cryptology Fujian Fuzhou350007 China School of Mathematics and Statistics Fujian Normal University Fujian Fuzhou350117 China College of Computer Science and Technology Jiangsu Normal University Jiangsu Xuzhou221116 China
Radio Frequency Identification (RFID) has been widely deployed to various scenarios, but its security and privacy issues need to be concerned due to the tag’s limited computing and storage resources. While benef... 详细信息
来源: 评论
Shellshock Bash Vulnerability Modeling Analysis Based on Petri Net
Shellshock Bash Vulnerability Modeling Analysis Based on Pet...
收藏 引用
2021 International Conference on networking and network Applications, NaNA 2021
作者: Zhang, Liumei Deng, Xi Wang, Yichuan Xi'an Shiyou University School of Computer Science Xi'an China Xi'an University of Technology School of Computer Science and Engineering Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technolog Xi'an China
The enhancement of Internet connectivity and the increase of information transmission speed yield the increasing frequency of network attacks. The Shellshock attackers often exploit bash vulnerability to read the cont... 详细信息
来源: 评论
SemiCD-VL: Visual-Language Model Guidance Makes Better Semi-supervised Change Detector
arXiv
收藏 引用
arXiv 2024年
作者: Li, Kaiyu Cao, Xiangyong Deng, Yupeng Song, Jiayi Liu, Junmin Meng, Deyu Wang, Zhi School of Software Engineering Xi’an Jiaotong University Xi’an710049 China School of Computer Science and Technology Ministry of Education Key Lab For Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an710049 China Aerospace Information Research Institute Chinese Academy of Sciences Beijing100094 China School of Mathematics and Statistics Ministry of Education Key Lab of Intelligent Networks and Network Security Xi’an Jiaotong University Shaanxi Xi’an China Guangdong Guangzhou China
Change Detection (CD) aims to identify pixels with semantic changes between images. However, annotating massive numbers of pixel-level images is labor-intensive and costly, especially for multi-temporal images, which ... 详细信息
来源: 评论
CoG-DQA: Chain-of-Guiding Learning with Large Language Models for Diagram Question Answering
CoG-DQA: Chain-of-Guiding Learning with Large Language Model...
收藏 引用
Conference on computer Vision and Pattern Recognition (CVPR)
作者: Shaowei Wang Lingling Zhang Longji Zhu Tao Qin Kim-Hui Yap Xinyu Zhang Jun Liu School of Computer Science and Technology Xi'an Jiaotong University China Key Laboratory of Intelligent Networks and Network Security Xi'an Jiaotong University Ministry of Education Xi'an Shaanxi China School of Electrical & Electronic Engineering Nanyang Technological University Singapore
Diagram Question Answering (DQA) is a challenging task, requiring models to answer natural language questions based on visual diagram contexts. It serves as a crucial basis for academic tutoring, technical support, an... 详细信息
来源: 评论
A Novel Meta-Hierarchical Active Inference Reinforcement Learning Approach for QoS-Driven Resource Allocation in Dynamic Clouds
A Novel Meta-Hierarchical Active Inference Reinforcement Lea...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Peijie Xian Ying He F. Richard Yu Jianbo Du College of Computer Science and Software Engineering Shenzhen Univ. Shenzhen China Shaanxi Key Lab. of Information Comm. Network and Security Xi’an Univ. of Posts & Telecomm. Xi’an China School of Information Technology Carleton Univ. Ottawa Canada
The cloud computing environment is highly dynamic due to a variety of external factors such as seasonal changes, market trends, and social events. In this case, tenant behavior patterns exhibit significant variability... 详细信息
来源: 评论
A Multiple-Image Authentication Method Based on Phase-Only Hologram and Logistic Map
SSRN
收藏 引用
SSRN 2024年
作者: Liansheng, Sui Zishan, Jiang Haiwei, Lu Zhaolin, Xiao Tianyu, Zeng School of Computer Science and Engineering Xi’an University of Technology Xi’an710048 China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an710048 China Hebei Normal University Shijiazhuang050024 China Hebei Provincial Key Laboratory of Information Fusion and Intelligent Control Shijiazhuang050024 China
An interesting security method for multiple-image authentication scheme is proposed based on computer-generated holograms and logistic map. First, each original image is encoded as the complex-valued hologram under th... 详细信息
来源: 评论
UAV-RIS-Aided Energy-Efficient and QoS-Aware Emergency Communications Based on DRL  100
UAV-RIS-Aided Energy-Efficient and QoS-Aware Emergency Commu...
收藏 引用
100th IEEE Vehicular technology Conference, VTC 2024-Fall
作者: Hu, Jiawei Ju, Ying Wang, Haoyu Liu, Lei Pei, Qingqi Shee, Y.G. Zhu, Xiaojie Wu, Celimuge University of California Department of Electrical Engineering and Computer Science IrvineCA92697 United States Xidian University Guangzhou Institute of Technology Guangzhou510555 China Xi'an University of Posts Telecommunications Shaanxi Key Laboratory of Information Communication Network and Security Xi'an710121 China Universiti Tunku Abdul Rahman Department of Electrical and Electronic Engineering Kajang43000 Malaysia King Abdullah University of Science and Technology Department of Computer Electrical and Mathematical Sciences and Engineering Thuwal239556900 Saudi Arabia The University of Electro-Communications Graduate School of Informatics and Engineering Tokyo182-8585 Japan
Ensuring reliable communication can be incredibly challenging in emergencies due to the breakdown of conventional infrastructure. However, a promising solution is on the horizon: the integration of reconfigurable inte... 详细信息
来源: 评论
Prediction of piRNA-mRNA interactions based on an interactive inference network
Prediction of piRNA-mRNA interactions based on an interactiv...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Yajun Liu Ru Li Aimin Li Rong Fei Xie Guo Fang-Xiang Wu Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an University of Technology Xi'an China Shaanxi Key Laboratory of Complex System Control and Intelligent Information Processing Xi'an University of Technology Xi'an China Department of Computer Science Department of Mechanical Engineering Division of Biomedical Engineering University of Saskatchewan Saskatoon Canada
As the largest class of small non-coding RNAs, piRNAs primarily present in the reproductive cells of mammals, which influence post-transcriptional processes of mRNAs in multiple ways. Effective methods for predicting ...
来源: 评论
Laryngeal Leukoplakia Classification Via Dense Multiscale Feature Extraction in White Light Endoscopy Images
Laryngeal Leukoplakia Classification Via Dense Multiscale Fe...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Zhenzhen You Yan Yan Zhenghao Shi Minghua Zhao Jing Yan Haiqin Liu Xinhong Hei Xiaoyong Ren Shaanxi Key Laboratory for Network Computing and Security Technology School of Computer Science and Engineering Xi’an University of Technology Xi’an China Department of Otorhinolaryngology Second Affiliated Hospital of Medical College Xi'an Jiaotong University Xi'an China
Laryngeal leukoplakia classification is challenging using white light endoscopy images. Relevant research focus on normal tissues versus non normal tissues, cancer versus non cancer classification. The objective of th... 详细信息
来源: 评论