咨询与建议

限定检索结果

文献类型

  • 7 篇 会议
  • 4 篇 期刊文献

馆藏范围

  • 11 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5 篇 工学
    • 3 篇 计算机科学与技术...
    • 3 篇 软件工程
    • 2 篇 仪器科学与技术
    • 2 篇 电气工程
    • 2 篇 电子科学与技术(可...
  • 3 篇 理学
    • 2 篇 物理学
    • 1 篇 化学
  • 2 篇 法学
    • 2 篇 法学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...
    • 1 篇 工商管理

主题

  • 2 篇 bandwidth
  • 2 篇 denial-of-servic...
  • 1 篇 routing
  • 1 篇 relays
  • 1 篇 bismuth
  • 1 篇 image restoratio...
  • 1 篇 planning
  • 1 篇 network topology
  • 1 篇 radiation therap...
  • 1 篇 thermocouples
  • 1 篇 optimization
  • 1 篇 knowledge graph
  • 1 篇 computed tomogra...
  • 1 篇 processor schedu...
  • 1 篇 servers
  • 1 篇 annealing
  • 1 篇 reconstruction a...
  • 1 篇 real-time system...
  • 1 篇 lead
  • 1 篇 algorithm design...

机构

  • 2 篇 key laboratory o...
  • 2 篇 faculty of arts ...
  • 2 篇 nsfocus r&d cent...
  • 2 篇 beijing engineer...
  • 2 篇 nsfocus r&d cent...
  • 2 篇 university of el...
  • 1 篇 dnslab china int...
  • 1 篇 southeast univer...
  • 1 篇 sichuan cloud ne...
  • 1 篇 national laborat...
  • 1 篇 baidu
  • 1 篇 gowild
  • 1 篇 first-imaging te...
  • 1 篇 school of comput...
  • 1 篇 school of manage...
  • 1 篇 tsinghua univers...
  • 1 篇 school of artifi...
  • 1 篇 sichuan universi...
  • 1 篇 institute of sys...
  • 1 篇 school of artifi...

作者

  • 3 篇 fan li
  • 3 篇 meng shen
  • 3 篇 liehuang zhu
  • 2 篇 deng jun
  • 2 篇 mingzhong wang
  • 2 篇 hu shuisong
  • 2 篇 luo haoran
  • 2 篇 miao yu
  • 2 篇 wenyong wang
  • 2 篇 jun deng
  • 2 篇 haoran luo
  • 2 篇 yu miao
  • 2 篇 li yubo
  • 2 篇 wang wenyong
  • 1 篇 tang hao
  • 1 篇 tingting zeng
  • 1 篇 liu shuang
  • 1 篇 zhang ji
  • 1 篇 feng zhifan
  • 1 篇 wang you

语言

  • 9 篇 英文
  • 2 篇 其他
检索条件"机构=Sichuan Cloud Network Integration Engineering Laboratory"
11 条 记 录,以下是1-10 订阅
排序:
Cyber Ares: Botnet Active Defense Method in Collaboration with Sava  20
Cyber Ares: Botnet Active Defense Method in Collaboration wi...
收藏 引用
20th International Computer Conference on Wavelet Active Media Technology and Information Processing, ICCWAMTIP 2023
作者: Shuisong, Hu Haoran, Luo Wenyong, Wang Yu, Miao Jun, Deng Yubo, Li University of Electronic Science and Technology China Sichuan Cloud Network Integration Engineering Laboratory SICHUAN CHENGDU610000 China NSFOCUS R&D Center SICHUAN CHENGDU610000 China
Distributed denial-of-service (DDoS) attacks has always been a major threat to cyber security. The current defense against DDoS attacks is mostly divided into three stages: pre-event, during-event and post-event. Beca... 详细信息
来源: 评论
Introduction of a Trusted Whitelist Mechanism for DDOS Attack Early Warning Optimization  20
Introduction of a Trusted Whitelist Mechanism for DDOS Attac...
收藏 引用
20th International Computer Conference on Wavelet Active Media Technology and Information Processing, ICCWAMTIP 2023
作者: Haoran, Luo Shuisong, H.U. Wenyong, Wang Yu, Miao Jun, Deng Yubo, L.I. University of Electronic Science and Technology of China Sichuan Cloud Network Integration Engineering Laboratory SICHUAN CHENGDU610000 China NSFOCUS R&D Center Building C5 of the XINCHUAN Information Technology Incubation Park SICHUAN CHENGDU610000 China
Distributed Denial of Service (DDoS) attacks pose a significant threat to modern networks, leading to substantial computational resource consumption and economic losses. Many mature defense technologies exist to block... 详细信息
来源: 评论
Cyber Ares: Botnet Active Defense Method in Collaboration with Sava
Cyber Ares: Botnet Active Defense Method in Collaboration wi...
收藏 引用
International Conference on Wavelet Active Media Technology and Information Processing (ICWAMTIP)
作者: Hu Shuisong Luo Haoran Wang Wenyong Miao Yu Deng Jun Li Yubo University of Electronic Science and Technology of China Sichuan Cloud Network Integration Engineering Laboratory CHENGDU SICHUAN China NSFOCUS R&D Center CHENGDU SICHUAN China
Distributed denial-of-service (DDoS) attacks has always been a major threat to cyber security. The current defense against DDoS attacks is mostly divided into three stages: pre-event, during-event and post-event. Beca...
来源: 评论
Introduction of a Trusted Whitelist Mechanism for DDOS Attack Early Warning Optimization
Introduction of a Trusted Whitelist Mechanism for DDOS Attac...
收藏 引用
International Conference on Wavelet Active Media Technology and Information Processing (ICWAMTIP)
作者: Luo Haoran HU Shuisong Wang Wenyong Miao Yu Deng Jun LI Yubo Sichuan Cloud Network Integration Engineering Laboratory University of Electronic Science and Technology of China CHENGDU SICHUAN CHINA NSFOCUS R&D Center Building C5 of the XINCHUAN Information Technology Incubation Park CHENGDU SICHUAN CHINA
Distributed Denial of Service (DDoS) attacks pose a significant threat to modern networks, leading to substantial computational resource consumption and economic losses. Many mature defense technologies exist to block...
来源: 评论
Cone-Beam Computed Tomography Limited-Angle Image Reconstruction Using Planning CT-Guided Deep Diffusion Model
收藏 引用
IEEE Transactions on Instrumentation and Measurement 2025年 74卷
作者: Wu, Zhan Yang, Yang Hu, Dianlin Lyu, Tianling Li, Yinsheng Tang, Hao Shu, Huazhong Xi, Yan Zhang, Yi Chen, Yang Southeast University Laboratory of Image Science and Technology Nanjing210096 China Southeast University Ministry of Education Key Laboratory of Computer Network and Information Integration Nanjing210096 China Zhejiang University of Technology Academy for Advanced Interdisciplinary Science and Technology Hangzhou China Chinese Academy of Sciences Key Laboratory of Biomedical Imaging Science and System China Capital Medical University Beijing Jishuitan Hospital China First-Imaging Tech Shanghai China Sichuan University School of Cyber Science and Engineering Chengdu China Laboratory of New Generation Artificial Intelligence Technology and Its Interdisciplinary Applications Southeast University Ministry of Education Jiangsu Provincial Joint International Research Laboratory of Medical Information Processing Laboratory of Image Science and Technology the School of Computer Science and Engineering Nanjing210096 China
For existing image-guided radiation therapy systems (IGRT), the limited angular range of the cone-beam computed tomography (CBCT) scanning improves the compactness of the system and compatibility between CBCT and line... 详细信息
来源: 评论
Mitigating polarization-dependent fluctuation of single-photon Raman distributed optical fiber temperature sensor
收藏 引用
Journal of Lightwave Technology 2025年
作者: Ou, Zhonghua Fan, Xiaodong Wu, Peng Fan, Yunru Guo, Kai Zhang, Ji Jiang, Panqiu Wang, Shikun Zhang, Lixun Qi, Qiang Deng, Guangwei Song, Haizhi Wang, You Liu, Shuang Wang, Pinghe Liu, Yong Guo, Guangcan Zhou, Qiang University of Electronic Science and Technology of China Institute of Fundamental and Frontier Sciences Chengdu611731 China University of Electronic Science and Technology of China School of Optoelectronic Science and Engineering Chengdu611731 China University of Electronic Science and Technology of China Key Laboratory of Quantum Physics and Photonic Quantum Information Ministry of Education Chengdu611731 China Institute of Systems Engineering AMS Beijing100141 China Department of Cloud and Network Development China Telecom Sichuan Branch Chengdu610012 China Southwest Institute of Technical Physics Chengdu610041 China Tianfu Jiangxi Laboratory Center for Quantum Internet Chengdu641419 China University of Science and Technology of China CAS Key Laboratory of Quantum Information Hefei230026 China
Raman distributed optical fiber temperature sensor based on single-photon detection (RDTS-SPD) improves the spatial resolution in temperature sensing. However, the temperature accuracy of RDTS-SPD is hindered by the p... 详细信息
来源: 评论
Overview of the CCKS 2019 knowledge graph evaluation track: Entity, relation, event and QA
arXiv
收藏 引用
arXiv 2020年
作者: Han, Xianpei Wang, Zhichun Zhang, Jiangtao Wen, Qinghua Li, Wenqi Tang, Buzhou Wang, Qi Feng, Zhifan Zhang, Yang Lu, Yajuan Wang, Haitao Chen, Wenliang Shao, Hao Chen, Yubo Liu, Kang Zhao, Jun Wang, Taifeng Zhang, Kezun Wang, Meng Jiang, Yinlin Qi, Guilin Zou, Lei Hu, Sen Zhang, Minhao Lin, Yinnian Chinese Information Processing Laboratory Institute of Software Chinese Academy of Sciences Beijing100190 China School of Artificial Intelligence Beijing Normal University Beijing100875 China 305 Hospital of People’s Liberation Army Beijing100017 China Department of Computer Science and Technology Tsinghua University Beijing100084 China Yidu Cloud Beijing100000 China Harbin Institute of Technology Shenzhen Guangdong518055 China Baidu Beijing100193 China School of Computer Science & Technology Soochow University Suzhou Jiangsu215006 China Gowild Suzhou Jiangsu215002 China National Laboratory of Pattern Recognition Institute of Automation Chinese Academy of Sciences Beijing100190 China School of Artificial Intelligence University of Chinese Academy of Sciences Beijing100049 China Ant Financial Hangzhou Zhejiang310000 China School of Computer Science and Engineering Southeast University Nanjing Jiangsu211189 China Key Laboratory of Computer Network Information Integration Southeast University Nanjing Jiangsu211189 China Peking University Beijing100871 China
Knowledge graph models world knowledge as concepts, entities, and the relationships between them, which has been widely used in many real-world tasks. CCKS 2019 held an evaluation track with 6 tasks and attracted more... 详细信息
来源: 评论
Micro-Expression Recognition based on 2D Gabor Filter and Sparse Representation
收藏 引用
Journal of Physics: Conference Series 2017年 第1期787卷
作者: Hao Zheng Key Laboratory of Trusted Cloud Computing and Big Data Analysis School of Information Engineering Nanjing XiaoZhuang University Nanjing China MOE Key Laboratory of Computer Network and Information Integration School of Computer Science and Engineering Southeast University Nanjing China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China
Micro-expression recognition is always a challenging problem for its quick facial expression. This paper proposed a novel method named 2D Gabor filter and Sparse Representation (2DGSR) to deal with the recognition of ...
来源: 评论
Latency-aware routing with bandwidth assignment for Software Defined networks
Latency-aware routing with bandwidth assignment for Software...
收藏 引用
IEEE International Conference on Performance, Computing and Communications (IPCCC)
作者: Qiongyu Zhang Liehuang Zhu Meng Shen Mingzhong Wang Fan Li Beijing Engineering Research Center of High Volume Language Information Processing and Cloud Computing Applications Beijing Institute of Technology P. R. China Key Laboratory of Computer Network and Information Integration (Southeast University) Ministry of Education P. R. China Faculty of Arts and Business University of the Sunshine Coast Queensland Australia
Reducing the flow latency is of great importance in traffic management, which benefits both service providers and end users. Routing design and flow scheduling are typical ways to improve the flow transmission efficie... 详细信息
来源: 评论
Self-adaptive anonymous communication scheme under SDN architecture
Self-adaptive anonymous communication scheme under SDN archi...
收藏 引用
IEEE International Conference on Performance, Computing and Communications (IPCCC)
作者: Tingting Zeng Meng Shen Mingzhong Wang Liehuang Zhu Fan Li Beijing Engineering Research Center of High Volume Language Information Processing and Cloud Computing Applications Beijing Institute of Technology P. R. China Key Laboratory of Computer Network and Information Integration (Southeast University) Ministry of Education P. R. China Faculty of Arts and Business University of the Sunshine Coast Queensland Australia
Communication privacy and latency perceived by users have become great concerns for delay-sensitive Internet services. Existing anonymous communication systems either provide high anonymity at an expense of prolonged ... 详细信息
来源: 评论