咨询与建议

限定检索结果

文献类型

  • 640 篇 会议
  • 298 篇 期刊文献

馆藏范围

  • 938 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 494 篇 工学
    • 368 篇 计算机科学与技术...
    • 320 篇 软件工程
    • 133 篇 信息与通信工程
    • 99 篇 电气工程
    • 48 篇 控制科学与工程
    • 45 篇 生物工程
    • 43 篇 电子科学与技术(可...
    • 36 篇 机械工程
    • 33 篇 网络空间安全
    • 27 篇 生物医学工程(可授...
    • 26 篇 光学工程
    • 25 篇 安全科学与工程
    • 24 篇 交通运输工程
    • 21 篇 仪器科学与技术
    • 19 篇 化学工程与技术
    • 13 篇 土木工程
    • 11 篇 建筑学
  • 229 篇 理学
    • 144 篇 数学
    • 49 篇 统计学(可授理学、...
    • 43 篇 生物学
    • 42 篇 物理学
    • 22 篇 系统科学
    • 16 篇 化学
  • 122 篇 管理学
    • 73 篇 管理科学与工程(可...
    • 65 篇 图书情报与档案管...
    • 22 篇 工商管理
  • 29 篇 医学
    • 23 篇 临床医学
    • 20 篇 基础医学(可授医学...
  • 27 篇 法学
    • 16 篇 社会学
    • 13 篇 法学
  • 7 篇 经济学
  • 6 篇 教育学
  • 6 篇 军事学
  • 3 篇 农学

主题

  • 88 篇 feature extracti...
  • 72 篇 accuracy
  • 61 篇 semantics
  • 53 篇 computational mo...
  • 46 篇 data models
  • 43 篇 training
  • 38 篇 federated learni...
  • 37 篇 deep learning
  • 33 篇 neural networks
  • 26 篇 transformers
  • 25 篇 predictive model...
  • 23 篇 adaptation model...
  • 20 篇 object detection
  • 20 篇 data mining
  • 20 篇 benchmark testin...
  • 19 篇 speech processin...
  • 19 篇 visualization
  • 19 篇 privacy
  • 18 篇 convolution
  • 18 篇 optimization

机构

  • 219 篇 key laboratory o...
  • 198 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 41 篇 shaanxi key labo...
  • 37 篇 shandong fundame...
  • 37 篇 school of comput...
  • 34 篇 school of comput...
  • 32 篇 shaanxi key labo...
  • 28 篇 qilu university ...
  • 28 篇 shandong provinc...
  • 19 篇 school of comput...
  • 19 篇 school of comput...
  • 19 篇 shandong provinc...
  • 18 篇 shaanxi key labo...
  • 16 篇 key laboratory o...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 15 篇 xi'an key labora...
  • 14 篇 tianjin key labo...
  • 14 篇 qilu university ...

作者

  • 28 篇 yichuan wang
  • 23 篇 xinhong hei
  • 23 篇 wang yichuan
  • 20 篇 xiaoming wu
  • 17 篇 hei xinhong
  • 16 篇 haiyan jin
  • 15 篇 xiangzhi liu
  • 15 篇 shen yulong
  • 14 篇 meng deyu
  • 14 篇 li wei
  • 13 篇 guohua lv
  • 13 篇 jin haiyan
  • 13 篇 wenpeng lu
  • 12 篇 lei zhu
  • 12 篇 aimin li
  • 11 篇 wang lei
  • 11 篇 lu wenpeng
  • 11 篇 jing zhao
  • 11 篇 chen yanping
  • 11 篇 xiaohui han

语言

  • 872 篇 英文
  • 55 篇 其他
  • 13 篇 中文
检索条件"机构=Shaanxi Key Laboratory for Network Computing and Security Technology"
938 条 记 录,以下是91-100 订阅
排序:
MRLATO: An Adaptive Task Offloading Mechanism Based on Meta Reinforcement Learning in Edge computing Environment
收藏 引用
IEEE Transactions on Vehicular technology 2025年
作者: Zhang, Peiying Liu, Jiamin Guizani, Maher Wang, Jian Kumar, Neeraj Tan, Lizhuang Qingdao Institute of Software College of Computer Science and Technology Qingdao266580 China Shandong Key Laboratory of Intelligent Oil & Gas Industrial Software Qingdao266580 China Ministry of Education Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Jinan250014 China University of Texas Arlington Computer Science and Engineering Department TX United States College of Science Qingdao266580 China Thapar University Department of Computer Science and Engineering Patiala147004 India Jinan250014 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Jinan250014 China
Traditional cloud computing models struggle to meet the requirements of latency-sensitive applications when processing large amounts of data. As a solution, Multi-access Edge computing (MEC) extends computing resource... 详细信息
来源: 评论
Double-RIS Enabled Physical Layer security for Wireless-Powered Communication Systems Over Rayleigh Fading Channels
收藏 引用
IEEE Transactions on Communications 2025年
作者: Chen, Jingyu Cao, Kunrui Ding, Haiyang Lv, Lu Ye, Yinghui Chi, Haolian Wang, Tao Yang, Liang National University of Defense Technology School of Information and Communications Wuhan430035 China Xidian University School of Telecommunications Engineering Xi'an710071 China Xi'an University of Posts and Telecommunications Shaanxi Key Laboratory of Information Communication Network and Security Xi'an710121 China Hunan University College of Computer Science and Electronic Engineering Changsha410082 China
This paper investigates the physical layer security for a double-reconfigurable intelligent surface (DRIS) aided wireless-powered communication (WPC) system in the presence of an eavesdropper, where one RIS (termed as... 详细信息
来源: 评论
A Robust key Exchange and Tamper-Resistant Protocol for HAN and NAN networks in Smart Grids
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Ayub, Muhammad Faizan Li, Xiong Mahmood, Khalid Shamshad, Salman Das, Ashok Kumar Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu611731 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan The University of Lahore Department of Software Engineering Lahore54590 Pakistan International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500 032 India Korea University College of Informatics Department of Computer Science and Engineering Anam-ro Seoul145 Korea Republic of Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250353 China
Smart Grids (SG) rely on Home Area networks (HAN) and Neighborhood Area networks (NAN) to ensure efficient power distribution, real-time monitoring, and seamless communication between smart devices. Despite these adva... 详细信息
来源: 评论
Provably Secure Efficient key-Exchange Protocol for Intelligent Supply Line Surveillance in Smart Grids
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Ayub, Muhammad Faizan Li, Xiong Mahmood, Khalid Alenazi, Mohammed J.F. Das, Ashok Kumar Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu12599 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan Department of Computer Engineering Riyadh11451 Saudi Arabia International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500 032 India Korea University College of Informatics Department of Computer Science and Engineering Anam-ro Seoul145 Korea Republic of Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security China Shandong Fundamental Research Center for Computer Science Jinan 250353 China
Intelligent supply line surveillance is critical for modern smart grids. Smart sensors and gateway nodes are strategically deployed along supply lines to achieve intelligent surveillance. They collect data continuousl... 详细信息
来源: 评论
Spatio-temporal GNN-Based Cell-Free Massive MIMO network with Maximal Benefit-Cost Ratio
收藏 引用
IEEE Transactions on Vehicular technology 2025年
作者: Jiang, Jing Li, Yanni Ye, Yinghui Feng, Dan Zhang, Jiayi Sutthiphan, Worakrin Niyato, Dusit Xi'an Uni versity of Posts and Telecommunications Shaanxi Key Laboratory of Information Communication Network and Security Xi'an710121 China Beijing Jiaotong University Frontiers Science Center for Smart High-Speed Railway System Beijing100044 China National Telecommunication Public Company Mobile System Development Department Bangkok10210 Thailand Nanyang Technological University College of Computing and Data Science Singapore
Due to the network's rapid expansion, mobile networks bear extra high deployment costs. Being a key enabler of 6th generation (6G) mobile networks, it is crucial that cell-free massive MIMO (CF mMIMO) networks ach... 详细信息
来源: 评论
Method and Practice of Trusted Embedded computing and Data Transmission Protection Architecture Based on Android
收藏 引用
Chinese Journal of Electronics 2024年 第3期33卷 623-634页
作者: Yichuan WANG Wen GAO Xinhong HEI Yanning DU School of Computer Science and Engineering Xi'an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology
In recent years,the rapid development of Internet technology has constantly enriched people's daily life and gradually changed from the traditional computer terminal to the mobile *** with it comes the security pr... 详细信息
来源: 评论
Adaptive Backdoor Attacks with Reasonable Constraints on Graph Neural networks
收藏 引用
IEEE Transactions on Dependable and Secure computing 2025年
作者: Dong, Xuewen Li, Jiachen Li, Shujun You, Zhichao Qu, Qiang Kholodov, Yaroslav Shen, Yulong The School of Computer Science and Technology Xidian University The Engineering Research Center of Blockchain Technology Application and Evaluation Ministry of Education China The Shaanxi Key Laboratory of Blockchain and Secure Computing Xi’an710071 China The School of Computing Kent Interdisciplinary Research Centre in Cyber Security University of Kent CanterburyCT2 7NF United Kingdom Shenzhen Institute of Advanced Technology Chinese Academy of Sciences China The Intelligent Transportation Systems Lab Innopolis University Innopolis Russia The School of Computer Science and Technology Xidian University China
Recent studies show that graph neural networks (GNNs) are vulnerable to backdoor attacks. Existing backdoor attacks against GNNs use fixed-pattern triggers and lack reasonable trigger constraints, overlooking individu... 详细信息
来源: 评论
DFMC:Feature-Driven Data-Free Knowledge Distillation
收藏 引用
IEEE Transactions on Circuits and Systems for Video technology 2025年
作者: Zhang, Zherui Xu, Rongtao Wang, Changwei Xu, Wenhao Chen, Shunpeng Xu, Shibiao Xu, Guangyuan Guo, Li Beijing University of Posts and Telecommunications School of Artificial Intelligence Beijing100876 China Chinese Academy of Sciences State Key Laboratory of Multimodal Artificial Intelligence Systems Institute of Automation Beijing100190 China Qilu University of Technology Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250316 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Jinan250014 China
Data-Free Knowledge Distillation (DFKD) enables knowledge transfer from teacher networks without access to the real dataset. However, generator-based DFKD methods often suffer from insufficient diversity or low-confid... 详细信息
来源: 评论
Splicer+: Secure Hub Placement and Deadlock-Free Routing for Payment Channel network Scalability
arXiv
收藏 引用
arXiv 2025年
作者: Yang, Lingxiao Dong, Xuewen Wang, Wei Gao, Sheng Qu, Qiang Tian, Wensheng Shen, Yulong The School of Computer Science and Technology Xidian University Xi’an710071 China The Shaanxi Key Laboratory of Network and System Security Xi’an710071 China The Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing Jiaotong University Beijing100044 China The School of Information Central University of Finance and Economics Beijing100081 China The Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Shenzhen518055 China The Huawei Blockchain Lab Huawei Cloud Tech Co. Ltd. Shenzhen518055 China The Nanhu Lab Jiaxing314001 China The Cryptology and Computer Security Laboratory Shanghai Jiao Tong University Shanghai200240 China
Payment channel hub (PCH) is a promising approach for payment channel networks (PCNs) to improve efficiency by deploying robust hubs to steadily process off-chain transactions. However, existing PCHs, often preplaced ... 详细信息
来源: 评论
Joint Secure and Covert Communications for Active STAR-RIS Assisted ISAC Systems
收藏 引用
IEEE Transactions on Wireless Communications 2025年
作者: Guo, Liang Jia, Jie Mu, Xidong Liu, Yuanwei Chen, Jian Wang, Xingwei Northeastern University School of Computer Science and Engineering China Northeastern University Engineering Research Center of Security Technology of Complex Network System Ministry of Education China Northeastern University Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Shenyang110819 China BelfastBT3 9DT United Kingdom Department of Electrical and Electronic Engineering China
This paper investigates the design of jointly supporting physical layer security (PLS) and covert communications (CCs) in an active simultaneously transmitting and reflecting reconfigurable intelligent surface (a-STAR... 详细信息
来源: 评论