咨询与建议

限定检索结果

文献类型

  • 647 篇 会议
  • 291 篇 期刊文献

馆藏范围

  • 938 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 503 篇 工学
    • 378 篇 计算机科学与技术...
    • 328 篇 软件工程
    • 136 篇 信息与通信工程
    • 99 篇 电气工程
    • 57 篇 控制科学与工程
    • 51 篇 电子科学与技术(可...
    • 44 篇 生物工程
    • 34 篇 机械工程
    • 33 篇 网络空间安全
    • 27 篇 光学工程
    • 26 篇 生物医学工程(可授...
    • 25 篇 安全科学与工程
    • 23 篇 仪器科学与技术
    • 22 篇 交通运输工程
    • 18 篇 化学工程与技术
    • 12 篇 土木工程
    • 11 篇 建筑学
  • 231 篇 理学
    • 146 篇 数学
    • 49 篇 统计学(可授理学、...
    • 44 篇 物理学
    • 42 篇 生物学
    • 22 篇 系统科学
    • 16 篇 化学
  • 123 篇 管理学
    • 73 篇 管理科学与工程(可...
    • 66 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 28 篇 法学
    • 16 篇 社会学
    • 14 篇 法学
  • 26 篇 医学
    • 22 篇 临床医学
    • 19 篇 基础医学(可授医学...
  • 7 篇 经济学
  • 6 篇 军事学
  • 5 篇 教育学
  • 3 篇 农学
  • 1 篇 文学

主题

  • 89 篇 feature extracti...
  • 72 篇 accuracy
  • 61 篇 semantics
  • 52 篇 computational mo...
  • 45 篇 data models
  • 42 篇 training
  • 41 篇 federated learni...
  • 37 篇 deep learning
  • 32 篇 neural networks
  • 26 篇 transformers
  • 24 篇 predictive model...
  • 23 篇 adaptation model...
  • 20 篇 object detection
  • 20 篇 data mining
  • 20 篇 benchmark testin...
  • 19 篇 speech processin...
  • 19 篇 visualization
  • 19 篇 privacy
  • 18 篇 convolution
  • 18 篇 optimization

机构

  • 220 篇 key laboratory o...
  • 197 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 42 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 37 篇 school of comput...
  • 36 篇 shandong fundame...
  • 32 篇 shaanxi key labo...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 21 篇 school of comput...
  • 21 篇 shandong provinc...
  • 18 篇 school of comput...
  • 18 篇 shaanxi key labo...
  • 16 篇 xi'an key labora...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 tianjin key labo...
  • 13 篇 key laboratory o...

作者

  • 29 篇 yichuan wang
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 20 篇 xiaoming wu
  • 17 篇 shen yulong
  • 17 篇 hei xinhong
  • 15 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 14 篇 meng deyu
  • 14 篇 li wei
  • 14 篇 jin haiyan
  • 13 篇 guohua lv
  • 12 篇 wenpeng lu
  • 12 篇 aimin li
  • 11 篇 wang lei
  • 11 篇 lu wenpeng
  • 11 篇 jing zhao
  • 11 篇 chen yanping
  • 11 篇 xiaohui han
  • 11 篇 fu chong

语言

  • 873 篇 英文
  • 55 篇 其他
  • 13 篇 中文
检索条件"机构=Shaanxi Key Laboratory for Network Computing and Security Technology"
938 条 记 录,以下是701-710 订阅
排序:
HG-ETC: Fine-Grained Application Behaviors Classification From Encrypted network Traffic
HG-ETC: Fine-Grained Application Behaviors Classification Fr...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Weihua Liu Xiaohui Han Wenbo Zuo Yu Sun Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Quancheng Provincial Laboratory Jinan China
The classification of encrypted traffic has garnered widespread attention from both researchers and industrial companies. However, existing application behavior-based encrypted traffic classification methods often ext... 详细信息
来源: 评论
Frequency synchronization for uplink massive MIMO with adaptive MUI suppression in angle-domain
arXiv
收藏 引用
arXiv 2018年
作者: Ge, Yinghao Zhang, Weile Gao, Feifei Li, Geoffrey Ye MOE Key Lab for Intelligent Networks and Network Security School of Electronic and Information Engineering Xi'an Jiaotong University Xi'an Shaanxi710049 China State Key Laboratory of Intelligent Technology and Systems Tsinghua National Laboratory for Information Science and Technology Department of Automation Tsinghua University Beijing100084 China Department of Electrical and Computer Engineering Georgia Institute of Technology AtlantaGA30332 United States
In this paper, we develop a novel angle-domain adaptive filtering (ADAF)-based frequency synchronization method for the uplink of a massive multiple-input multiple-output (MIMO) multiuser network, which is applicable ... 详细信息
来源: 评论
Communication-Efficient Federated Learning for network Traffic Anomaly Detection
Communication-Efficient Federated Learning for Network Traff...
收藏 引用
International Conference on Mobile Ad-hoc and Sensor networks, MSN
作者: Xiao Cui Xiaohui Han Guangqi Liu Wenbo Zuo Zhiwen Wang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China Quancheng Provincial Laboratory Jinan China
As an emerging machine learning method, Federated Learning is widely used in network anomaly detection scenarios. However, many current federated learning-based network anomaly detection works ignore the communication... 详细信息
来源: 评论
A Knowledge Distillation-Driven Lightweight CNN Model for Detecting Malicious Encrypted network Traffic
A Knowledge Distillation-Driven Lightweight CNN Model for De...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Yuecheng Wen Xiaohui Han Wenbo Zuo Weihua Liu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Quancheng Provincial Laboratory Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
In the realm of cybersecurity, efficiently and precisely identifying and mitigating potential threats from malicious encrypted traffic is crucial. As deep learning evolves, methods relying on Convolutional Neural Netw... 详细信息
来源: 评论
Robust Imagined Speech Production Using AI-Generated Content network for Patients with Language Impairments
收藏 引用
IEEE Transactions on Consumer Electronics 2024年
作者: Xu, Xu Fu, Chong Dalian University of Technology School of Software Dalian116621 China Northeastern University School of Computer Science and Engineering Shenyang110004 China Northeastern University Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Shenyang110819 China Ministry of Education Engineering Research Center of Security Technology of Complex Network System Shenyang110004 China
Imagined speech production is critical for brain-computer interface systems. It is able to provide the communication ability for patients with language impairments. Nowadays, many studies have developed algorithms for... 详细信息
来源: 评论
Domestic Violence Crisis Recognition Method based on Bi-LSTM+Attention
Domestic Violence Crisis Recognition Method based on Bi-LSTM...
收藏 引用
International Conference on network and Information Systems for Computers (ICNISC)
作者: Zhixiao Wang Wenyao Yan Zhuochun Li Min Huang Qinyuan Fan Xin Wang Xi'an University of Technology Xi'an China Shaanxi Key Laboratory of Network Computing and Security Xi'an China College of Xi'an Innovation Yan'an University Xi'an China University of Pittsburgh Pittsburgh PA USA Art and Design Xi'an University of Technology Xi'an China Fakultät Verkehrs- und Maschinensysteme Technische Universität Berlin Berlin Germany Computer Science and Engineering Xi'an University of Technology Xi'an China
Domestic violence (DV) is getting more and more attention due to the critical trouble and danger that pose great challenge to human rights and health. The popularity of various social medias can help these victims to ... 详细信息
来源: 评论
Joint Secure Beamforming for RIS-Aided Integrated Multibeam-Satellite Terrestrial networks
Joint Secure Beamforming for RIS-Aided Integrated Multibeam-...
收藏 引用
Future Communications and networks (FCN), International Conference on
作者: Yu Zhang Yang Yang Shuangrui Zhao Teng Li Yulong Shen Xiaohong Jiang Jianfeng Ma School of Computer Science and Technology Xidian University Xi’an China Shaanxi Key Laboratory of Network and System Security Xidian University Xi’an China School of Cyber Engineering Xidian University Xi’an China School of Systems Information Science Future University Hakodate Japan
This paper focuses on a reconfigurable intelligent surface (RIS) enabled integrated multibeam-satellite terrestrial network, which consists of a satellite, a base station (BS), an RIS, multiple earth stations (ESs), a... 详细信息
来源: 评论
PTGFI: A Prompt-Based Two-Stage Generative Framework for Function Name Inference
PTGFI: A Prompt-Based Two-Stage Generative Framework for Fun...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Menglu Wang Xiaohui Han Peipei Wang Wenbo Zuo Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Quan Cheng Laboratory Jinan China
In the field of cybersecurity, analyzing malicious software or programs is crucial for preventing network attacks. Malicious code often exists in a stripped binary form to thwart analysis, presenting challenges for an... 详细信息
来源: 评论
On The Uncertainty Principle of Neural networks
arXiv
收藏 引用
arXiv 2022年
作者: Zhang, Jun-Jie Zhang, Dong-Xiao Chen, Jian-Nan Pang, Long-Gang Meng, Deyu Division of Computational physics and Intelligent modeling Institute of Nuclear Technology Shaanxi Xi’an710024 China Key Laboratory of Quark & Lepton Physics Ministry of Education Central China Normal University Hubei Wuhan30079 China School of Mathematics and Statistics Ministry of Education Key Lab of Intelligent Networks and Network Security Xi’an Jiaotong University Shaanxi Xi’an710049 China
In this study, we explore the inherent trade-off between accuracy and robustness in neural networks, drawing an analogy to the uncertainty principle in quantum mechanics. We propose that neural networks are subject to... 详细信息
来源: 评论
Joint Extraction of Entities and Relationships from Cyber Threat Intelligence based on Task-specific Fourier network
Joint Extraction of Entities and Relationships from Cyber Th...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Haiqing Lv Xiaohui Han Hui Cui Peipei Wang Wenbo Zuo Yang Zhou Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Quan Cheng Laboratory Jinan China
The increasing complexity of cyber threats and the emergence of new attack technologies have brought huge challenges to attack incident analysis and source tracing. Using cyber threat intelligence to build a Cyber sec... 详细信息
来源: 评论