咨询与建议

限定检索结果

文献类型

  • 264 篇 会议
  • 221 篇 期刊文献

馆藏范围

  • 485 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 328 篇 工学
    • 251 篇 计算机科学与技术...
    • 225 篇 软件工程
    • 79 篇 信息与通信工程
    • 38 篇 生物工程
    • 33 篇 电气工程
    • 30 篇 控制科学与工程
    • 29 篇 电子科学与技术(可...
    • 27 篇 网络空间安全
    • 15 篇 光学工程
    • 14 篇 机械工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 仪器科学与技术
    • 10 篇 化学工程与技术
    • 10 篇 交通运输工程
    • 9 篇 安全科学与工程
    • 7 篇 土木工程
  • 160 篇 理学
    • 99 篇 数学
    • 39 篇 生物学
    • 31 篇 统计学(可授理学、...
    • 26 篇 物理学
    • 15 篇 系统科学
    • 11 篇 化学
  • 80 篇 管理学
    • 40 篇 管理科学与工程(可...
    • 39 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 16 篇 法学
    • 10 篇 社会学
    • 7 篇 法学
  • 11 篇 医学
    • 9 篇 临床医学
    • 8 篇 基础医学(可授医学...
  • 9 篇 军事学
    • 8 篇 军队指挥学
  • 6 篇 经济学
  • 4 篇 农学
  • 3 篇 教育学
  • 2 篇 文学

主题

  • 22 篇 semantics
  • 16 篇 deep learning
  • 15 篇 feature extracti...
  • 12 篇 computational mo...
  • 12 篇 network security
  • 12 篇 training
  • 10 篇 authentication
  • 10 篇 predictive model...
  • 9 篇 neural networks
  • 9 篇 optimization
  • 9 篇 security
  • 9 篇 accuracy
  • 9 篇 cloud computing
  • 9 篇 data models
  • 9 篇 cryptography
  • 7 篇 image enhancemen...
  • 7 篇 image segmentati...
  • 7 篇 petri nets
  • 7 篇 blockchain
  • 7 篇 federated learni...

机构

  • 39 篇 school of comput...
  • 37 篇 shaanxi key labo...
  • 36 篇 school of comput...
  • 30 篇 shaanxi key labo...
  • 19 篇 school of comput...
  • 13 篇 key lab of infor...
  • 11 篇 xi'an university...
  • 11 篇 shaanxi key labo...
  • 10 篇 school of comput...
  • 9 篇 department of co...
  • 9 篇 school of comput...
  • 8 篇 shaanxi key labo...
  • 8 篇 tianjin key labo...
  • 7 篇 department of co...
  • 7 篇 shaanxi key labo...
  • 7 篇 haihe lab of ita...
  • 7 篇 school of comput...
  • 7 篇 shaanxi key labo...
  • 7 篇 key lab of netwo...
  • 7 篇 zhejiang lab

作者

  • 27 篇 yichuan wang
  • 27 篇 meng deyu
  • 26 篇 xinhong hei
  • 21 篇 wang yichuan
  • 18 篇 hei xinhong
  • 17 篇 shen yulong
  • 16 篇 liu jun
  • 16 篇 cao xiangyong
  • 15 篇 zheng qinghua
  • 12 篇 li wei
  • 12 篇 haiyan jin
  • 11 篇 jin haiyan
  • 11 篇 wenjiang ji
  • 10 篇 luo minnan
  • 10 篇 dong xuewen
  • 10 篇 lei zhu
  • 10 篇 wei wei
  • 9 篇 wang lei
  • 9 篇 xiaoxue liu
  • 9 篇 tan zuowen

语言

  • 443 篇 英文
  • 27 篇 其他
  • 16 篇 中文
检索条件"机构=Shaanxi Key Lab Network Computer and Security Technology"
485 条 记 录,以下是221-230 订阅
排序:
Joint Space-Time Sparsity Based Jamming Detection for Mission-Critical mMTC networks
arXiv
收藏 引用
arXiv 2023年
作者: Wang, Shao-Di Wang, Hui-Ming Li, Zhetao Leung, Victor C.M. The School of Information and Communication Engineering Xi'an Jiaotong University Shaanxi Xi'An710049 China The Ministry of Education Key Lab for Intelligent Networks and Network Security Xi'an Jiaotong University Shaanxi Xi'An710049 China The Key Laboratory of Hunnan Province for Internet of Things and Information Security Hunan International Scientific and Technological Cooperation Base of Intelligent Network School of Computer Science Xiangtan University Xiangtan411105 China The College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China The Department of Electrical and Computer Engineering The University of British Columbia VancouverBCV6T 1Z4 Canada
For mission-critical massive machine-type communications (mMTC) applications, the messages are required to be delivered in real-time. However, due to the weak security protection capabilities of the low-cost and low-c... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
arXiv
收藏 引用
arXiv 2024年
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado SpringsCO United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab China JinYinHu Laboratory Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Zhen Li Ning Wang Deqing Zou Yating Li Ruqian Zhang Shouhuai Xu Chao Zhang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jin YinHu Laboratory Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado Springs Colorado USA Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
Fast Detection of Burst Jamming for Delay-Sensitive Internet-of-Things Applications
arXiv
收藏 引用
arXiv 2022年
作者: Wang, Shao-Di Wang, Hui-Ming Liu, Peng The School of Information and Communication Engineering The Ministry of Education Key Lab for Intelligent Networks and Network Security Xi’an Jiaotong University Shaanxi Xi’an710049 China The Wireless Technology Lab 2012 Labs Huawei Technologies Shenzhen China
In this paper, we investigate the design of a burst jamming detection method for delay-sensitive Internet-of-Things (IoT) applications. In order to obtain a timely detection of burst jamming, we propose an online prin... 详细信息
来源: 评论
Generalized Category Discovery with Large Language Models in the Loop
arXiv
收藏 引用
arXiv 2023年
作者: An, Wenbin Shi, Wenkai Tian, Feng Lin, Haonan Wang, QianYing Wu, Yaqiang Cai, Mingxiang Wang, Luyan Chen, Yan Zhu, Haiping Chen, Ping School of Automation Science and Engineering Xi’an Jiaotong University China School of Computer Science and Technology Xi’an Jiaotong University China Ministry of Education Key Laboratory of Intelligent Networks and Network Security China Shaanxi Province Key Laboratory of Big Data Knowledge Engineering China Lenovo Research China University of Massachusetts Boston United States
Generalized Category Discovery (GCD) is a crucial task that aims to recognize both known and novel categories from a set of unlabeled data by utilizing a few labeled data with only known categories. Due to the lack of... 详细信息
来源: 评论
Channel Drop Out:A Simple Way to Prevent CNN from Overfitting in Motor Imagery Based BCI
Channel Drop Out:A Simple Way to Prevent CNN from Overfittin...
收藏 引用
2021国际计算机前沿大会
作者: Jing Luo Yaojie Wang Rong Xu Guangming Liu Xiaofan Wang Yijing Gong Shaanxi Key Laboratory for Network Computing and Security Technology School of Computer Science and EngineeringXi'an University of Technology Shaanxi Province Institute of Water Resources and Electric Power Investigation and Design
With the development of deep learning,many motor imagery brain-computer interfaces based on convolutional neural networks(CNNs) show outstanding ***,the trial number of EEG in the training set is usually limited,and r...
来源: 评论
Improving the Transmission Rate by A Two-Phase Hybrid Duplex Scheme for Gaussian Relay Channel
Improving the Transmission Rate by A Two-Phase Hybrid Duplex...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Jianxin Duan Zhengchuan Chen Zhong Tian Min Wang Li Zhen Dapeng O. Wu Tony Q. S. Quek School of Microelectronics and Communication Engineering. Chongquing University Chongqing China Shaanxi Key Laboratory of Information Communication Network and Security Xi'an University of Posts and Telecommunications Xi'an China School of Optoelectronics Engineering Chongqing University of Posts and Telecommunications Chongqing China Department of Computer Science City University of Hong Kong Hong Kong Information Systems Technology and Design Pillar Singapore University of Technology and Design Singapore
Combining half-duplex (HD) and full-duplex (FD) is promising in improving the information transmission rate of relay channels. This work proposes a novel two-phase hybrid duplex scheme for Gaussian relay channel where... 详细信息
来源: 评论
Signature Scheme Based on The SM2 Algorithm in Fabric
Signature Scheme Based on The SM2 Algorithm in Fabric
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Yaling Zhang Hongyun Wang Yichuan Wang Wenjiang Ji Lei Zhu School of computer science and engineering Xi’an University of technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an University of technology Xi’an China
Based on the analysis and research of the widely used Hyperledger Fabric alliance chain structure, this paper proposes a digital signature scheme based on the national cryptographic algorithm SM2 which can be applied ... 详细信息
来源: 评论
Tile Classification Based Viewport Prediction with Multi-modal Fusion Transformer
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Zhihao Chen, Yiwei Zhang, Weizhan Yan, Caixia Zheng, Qinghua Wang, Qi Chen, Wangdu School of Computer Science and Technology Xi'an Jiaotong University Key Laboratory of Intelligent Networks and Network Security Ministry of Education Xi'an Jiaotong University Xi’an China School of Computer Science and Technology Xi'an Jiaotong University & National Engineering Lab for Big Data Analytics Xi'an Jiaotong University Xi’an China MIGU Video Shanghai China
Viewport prediction is a crucial aspect of tile-based 360◦ video streaming system. However, existing trajectory based methods lack of robustness, also oversimplify the process of information construction and fusion be... 详细信息
来源: 评论
FAST: a dual-tier few-shot learning paradigm for whole slide image classification  24
FAST: a dual-tier few-shot learning paradigm for whole slide...
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing Systems
作者: Kexue Fu Xiaoyuan Luo Linhao Qu Shuo Wang Ying Xiong Ilias Maglogiannis Longxiang Gao Manning Wang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China and Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China Digital Medical Research Center School of Basic Medical Sciences Fudan University and Shanghai Key Lab of Medical Image Computing and Computer Assisted Intervention Fudan University University of Piraeus
The expensive fine-grained annotation and data scarcity have become the primary obstacles for the widespread adoption of deep learning-based Whole Slide Images (WSI) classification algorithms in clinical practice. Unl...
来源: 评论