咨询与建议

限定检索结果

文献类型

  • 207 篇 会议
  • 96 篇 期刊文献

馆藏范围

  • 303 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 181 篇 工学
    • 146 篇 计算机科学与技术...
    • 131 篇 软件工程
    • 53 篇 信息与通信工程
    • 22 篇 电气工程
    • 21 篇 生物工程
    • 15 篇 机械工程
    • 14 篇 电子科学与技术(可...
    • 13 篇 控制科学与工程
    • 11 篇 仪器科学与技术
    • 11 篇 网络空间安全
    • 7 篇 土木工程
    • 7 篇 交通运输工程
    • 7 篇 安全科学与工程
    • 6 篇 光学工程
    • 6 篇 建筑学
    • 6 篇 生物医学工程(可授...
    • 5 篇 化学工程与技术
  • 79 篇 理学
    • 47 篇 数学
    • 19 篇 生物学
    • 12 篇 物理学
    • 9 篇 系统科学
    • 5 篇 统计学(可授理学、...
  • 46 篇 管理学
    • 25 篇 管理科学与工程(可...
    • 25 篇 图书情报与档案管...
    • 10 篇 工商管理
  • 9 篇 法学
    • 5 篇 法学
    • 5 篇 社会学
  • 7 篇 医学
    • 6 篇 临床医学
  • 6 篇 经济学
    • 6 篇 应用经济学
  • 5 篇 教育学
    • 4 篇 教育学
  • 3 篇 军事学
  • 2 篇 农学
  • 1 篇 文学

主题

  • 15 篇 feature extracti...
  • 12 篇 computational mo...
  • 12 篇 semantics
  • 11 篇 blockchain
  • 9 篇 network security
  • 9 篇 accuracy
  • 9 篇 data models
  • 8 篇 deep learning
  • 8 篇 neural networks
  • 7 篇 image enhancemen...
  • 7 篇 optimization
  • 7 篇 petri nets
  • 7 篇 predictive model...
  • 7 篇 codes
  • 7 篇 protocols
  • 7 篇 federated learni...
  • 7 篇 cloud computing
  • 6 篇 transformers
  • 6 篇 servers
  • 6 篇 benchmark testin...

机构

  • 42 篇 shaanxi key labo...
  • 35 篇 school of comput...
  • 35 篇 school of comput...
  • 32 篇 shaanxi key labo...
  • 24 篇 the state key la...
  • 18 篇 institute of blo...
  • 11 篇 xi'an university...
  • 10 篇 school of comput...
  • 9 篇 state key labora...
  • 8 篇 shaanxi key labo...
  • 7 篇 department of co...
  • 7 篇 college of compu...
  • 7 篇 shaanxi key labo...
  • 7 篇 college of xi'an...
  • 6 篇 xi'an university...
  • 6 篇 school of comput...
  • 6 篇 college of infor...
  • 6 篇 shaanxi key labo...
  • 6 篇 shaanxi key labo...
  • 5 篇 shaanxi key labo...

作者

  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 17 篇 hei xinhong
  • 15 篇 haiyan jin
  • 14 篇 jin haiyan
  • 13 篇 li wei
  • 10 篇 wang lei
  • 10 篇 lei zhu
  • 10 篇 wei wei
  • 9 篇 bin wang
  • 9 篇 xiaoxue liu
  • 9 篇 shen yulong
  • 9 篇 qingqi pei
  • 9 篇 wenjiang ji
  • 8 篇 zhu lei
  • 8 篇 jingwei liu
  • 8 篇 haonan su
  • 8 篇 dong xuewen
  • 7 篇 zhao minghua

语言

  • 273 篇 英文
  • 28 篇 其他
  • 4 篇 中文
检索条件"机构=Shaanxi Key Laboratory of BlockChain and Security Computing"
303 条 记 录,以下是21-30 订阅
排序:
Never Lost keys:A Novel key Generation Scheme Based on Motor Imagery EEG in End-Edge-Cloud System
收藏 引用
China Communications 2022年 第7期19卷 172-184页
作者: Yichuan Wang Dan Wu Xiaoxue Liu Xinhong Hei School of computer science and Engineering Xi’an University of TechnologyXi’an 710048China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an 710048China
Biometric key is generated from the user’s unique biometric features,and can effectively solve the security problems in ***,the current prevailing biometric key generation techniques such as fingerprint recognition a... 详细信息
来源: 评论
Ethereum Phishing Detection Using Hyperbolic Neural Networks and Temporal Information  22
Ethereum Phishing Detection Using Hyperbolic Neural Networks...
收藏 引用
22nd IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2024
作者: Xu, Rong Zhang, Jun Zhu, Xiaoyue Song, Zhaoxiong Yu, Zhi Inner Mongolia University College of Computer Science Hohhot China Zhejiang University The State Key Laboratory of Blockchain and Data Security Hangzhou China Institute of Computing Technology Chinese Academy of Sciences Beijing China
In recent years, the frequent occurrence of phishing scams on Ethereum has posed serious threats to transaction security and the financial safety of users. This paper proposes an Ethereum phishing scam detection metho... 详细信息
来源: 评论
Wishart Deeplab Network for Polarimetric SAR Image Classification  3rd
Wishart Deeplab Network for Polarimetric SAR Image Classific...
收藏 引用
3rd China Intelligent Robotics Annual Conference, CCF CIRAC 2022
作者: Shi, Junfei He, Tiansheng Jin, Haiyan Wang, Hua Xu, Weinan State Key Laboratory of Geo-Information Engineering Shaanxi Xi’an710048 China School of Computer Science and Engineering Xi’an University of Technology Shaanxi Xi’an710048 China Shaanxi Key Laboratory for Network Computing and Security Technology Shaanxi Xi’an710048 China
Polarimetric Synthetic Aperture Radar (PolSAR) images have attracted much attention with abundant polarimetric scattering information. In recent years, many deep learning models have been proposed and highly expanded ... 详细信息
来源: 评论
A Pseudonym Exchange-Based Traceable Location Privacy Protection Scheme for IoV
A Pseudonym Exchange-Based Traceable Location Privacy Protec...
收藏 引用
2023 International Conference on Networking and Network Applications, NaNA 2023
作者: Ma, Weigang Yu, Yaping Wang, Yichuan Liu, Xiaoxue Wang, Zhoukai School of Computer Science and Engineering Xi'an University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology China
Internet of Vehicles (IoV) is a network built by communicating entities such as vehicles and roadside infrastructure, etc. The entities can communicate with each other, sharing data and providing services. However, th... 详细信息
来源: 评论
DDoS Attack Detection Based on Information Entropy Feature Extraction in Software Defined Networks
DDoS Attack Detection Based on Information Entropy Feature E...
收藏 引用
2023 International Conference on Networking and Network Applications, NaNA 2023
作者: Ji, Wenjiang Yang, Yixin Zhang, Yaling Wang, Yichuan Tian, Mengjie Qiu, Yuan Xi'an University of Technology School of Computer Science and Engineering Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology China
Distributed Denial of Service(DDoS) attacks target the forwarding-control separation feature of Software-Defined Networking(SDN) to launch attacks, causing network disruptions. Therefore security against DDoS attack d... 详细信息
来源: 评论
A Novel On-Demand Service Architecture for Efficient Cloud-Edge Collaboration
A Novel On-Demand Service Architecture for Efficient Cloud-E...
收藏 引用
2023 International Conference on Networking and Network Applications, NaNA 2023
作者: Zhang, Yaling Chen, Jingjing Wang, Yichuan Xiao, Yeqiu Liu, Xiaoxue School of Computer Science and Engineering Xi'an University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology China
With the advent of 5G era, the model of cloud-edge collaboration is used to handle massive data computing tasks with significant superiority. However, this architecture still uses the traditional web service model, wh... 详细信息
来源: 评论
A Novel Teaching Strategy Based on EduCoder Platform for C Programming Language  5th
A Novel Teaching Strategy Based on EduCoder Platform for C P...
收藏 引用
5th International Conference on Computer Science and Educational Informatization, CSEI 2023
作者: Li, Wei Hei, Xinhong Wang, Lei Wang, Yichuan School of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China School of Mathematics and Computer Science Shaanxi University of Technology Hanzhong China
Experimental teaching is an important part of the C programming language course, which aims to cultivate students’ Computational thinking ability, problem solving ability and programming ability. However, the existin... 详细信息
来源: 评论
Petri Net-Based Attack Modeling for Industrial Control System Networks  3rd
Petri Net-Based Attack Modeling for Industrial Control Syste...
收藏 引用
3rd China Intelligent Robotics Annual Conference, CCF CIRAC 2022
作者: Wang, Yichuan Lv, Zhaoqi Zhang, Yaling Xiao, Yeqiu Hei, Xinhong School of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China
Industrial control systems have been deeply involved in industrial facilities and infrastructure. With the integrated development of industry and information technology, industrial control systems are tied to the Inte... 详细信息
来源: 评论
A Trusted Privacy-Preserving Model for Cross-Chain Transactions Based on zk_SNARKs
A Trusted Privacy-Preserving Model for Cross-Chain Transacti...
收藏 引用
2023 International Conference on Networking and Network Applications, NaNA 2023
作者: Wang, Yichuan Tie, Jianhuan Hei, Xinhong Zhao, Li Zhang, Xiaohui School of Computer Science and Engineering Xi'an University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technolog Xi'an China
Currently, the privacy protection technology of blockchain is not mature enough, such as user data leakage and lack of anonymity exist, and these problems are especially serious when conducting cross-chain transaction... 详细信息
来源: 评论
Competitive Swarm Optimizer Based on Individual Learning Mechanism  5
Competitive Swarm Optimizer Based on Individual Learning Mec...
收藏 引用
5th International Conference on High Performance Big Data and Intelligent Systems, HDIS 2023
作者: Tang, JingQi Li, Wei Wang, Lei School of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China
In view of the disadvantages of the traditional competitive swarm optimizer (CSO), such as falling into local minimization or poor convergence accuracy, this paper proposed an enhanced CSO algorithm called competitive... 详细信息
来源: 评论