咨询与建议

限定检索结果

文献类型

  • 711 篇 会议
  • 484 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,196 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 709 篇 工学
    • 459 篇 计算机科学与技术...
    • 395 篇 软件工程
    • 228 篇 信息与通信工程
    • 123 篇 电气工程
    • 106 篇 控制科学与工程
    • 85 篇 电子科学与技术(可...
    • 65 篇 生物工程
    • 42 篇 机械工程
    • 39 篇 仪器科学与技术
    • 35 篇 光学工程
    • 33 篇 生物医学工程(可授...
    • 30 篇 动力工程及工程热...
    • 30 篇 建筑学
    • 26 篇 网络空间安全
    • 24 篇 土木工程
    • 21 篇 交通运输工程
    • 17 篇 化学工程与技术
    • 17 篇 安全科学与工程
  • 319 篇 理学
    • 194 篇 数学
    • 72 篇 生物学
    • 66 篇 统计学(可授理学、...
    • 57 篇 系统科学
    • 49 篇 物理学
    • 19 篇 化学
  • 157 篇 管理学
    • 106 篇 管理科学与工程(可...
    • 58 篇 图书情报与档案管...
    • 29 篇 工商管理
  • 26 篇 法学
    • 17 篇 社会学
  • 25 篇 医学
    • 21 篇 临床医学
    • 15 篇 基础医学(可授医学...
  • 11 篇 经济学
  • 5 篇 教育学
  • 5 篇 农学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 87 篇 feature extracti...
  • 58 篇 accuracy
  • 52 篇 semantics
  • 41 篇 computational mo...
  • 37 篇 deep learning
  • 37 篇 security
  • 35 篇 training
  • 30 篇 data models
  • 27 篇 robustness
  • 26 篇 neural networks
  • 26 篇 federated learni...
  • 21 篇 data mining
  • 20 篇 wireless communi...
  • 20 篇 interference
  • 19 篇 noise
  • 19 篇 predictive model...
  • 19 篇 visualization
  • 18 篇 object detection
  • 18 篇 signal to noise ...
  • 18 篇 transformers

机构

  • 201 篇 shandong provinc...
  • 162 篇 key laboratory o...
  • 54 篇 ministry of educ...
  • 50 篇 shandong fundame...
  • 41 篇 shandong enginee...
  • 33 篇 moe key lab for ...
  • 19 篇 moe key laborato...
  • 17 篇 qilu university ...
  • 17 篇 ministry of educ...
  • 16 篇 state key labora...
  • 13 篇 qilu university ...
  • 12 篇 ministry of educ...
  • 11 篇 key laboratory o...
  • 11 篇 ministry of educ...
  • 11 篇 key laboratory o...
  • 11 篇 state key labora...
  • 11 篇 key laboratory o...
  • 11 篇 school of commun...
  • 11 篇 school of electr...
  • 11 篇 tianjin key labo...

作者

  • 58 篇 meng deyu
  • 47 篇 guan xiaohong
  • 46 篇 xiaohong guan
  • 46 篇 wang hui-ming
  • 40 篇 qinye yin
  • 30 篇 wenjie wang
  • 30 篇 hui-ming wang
  • 24 篇 cao xiangyong
  • 22 篇 pengcheng mu
  • 18 篇 qian xueming
  • 18 篇 shen chao
  • 17 篇 jiang wu
  • 16 篇 wang pinghui
  • 16 篇 yin qinye
  • 16 篇 tao qin
  • 16 篇 zheng qinghua
  • 16 篇 feng gao
  • 15 篇 xu zongben
  • 15 篇 weile zhang
  • 14 篇 xinman zhang

语言

  • 1,117 篇 英文
  • 53 篇 其他
  • 27 篇 中文
检索条件"机构=The Key Laboratory of Intelligent Networks and Network Security"
1196 条 记 录,以下是1-10 订阅
排序:
Optimal Linear Codes With Few Weights From Simplicial Complexes
收藏 引用
IEEE Transactions on Information Theory 2025年 第5期71卷 3531-3543页
作者: Chen, Bing Xu, Yunge Hu, Zhao Li, Nian Zeng, Xiangyong Hubei University Hubei Key Laboratory of Applied Mathematics Faculty of Mathematics and Statistics Wuhan430062 China Hubei University Key Laboratory of Intelligent Sensing System and Security Ministry of Education Hubei Provincial Engineering Research Center of Intelligent Connected Vehicle Network Security School of Cyber Science and Technology Wuhan430062 China State Key Laboratory of Integrated Service Networks Xi’an710071 China Hubei University Hubei Key Laboratory of Applied Mathematics Faculty of Mathematics and Statistics Key Laboratory of Intelligent Sensing System and Security Ministry of Education Wuhan430062 China
Recently, constructions of optimal linear codes from simplicial complexes have attracted much attention and some related nice works were presented. Let q be a prime power. In this paper, by using the simplicial comple... 详细信息
来源: 评论
Enabling intelligent Connectivity: A Survey of Secure ISAC in 6G networks
收藏 引用
IEEE Communications Surveys and Tutorials 2025年 第2期27卷 748-781页
作者: Zhu, Xiaoqiang Liu, Jiqiang Lu, Lingyun Zhang, Tao Qiu, Tie Wang, Chunpeng Liu, Yuan Beijing Jiaotong University School of Software Engineering Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing100044 China Tianjin University College of Intelligence and Computing Tianjin300350 China Qilu University of Technology School of Cyber Security and the Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan250353 China
The rapid growth of intelligent sensing capabilities and super computation power in 6G mobile communication systems has facilitated their application in diverse domains such as smart health, smart factories, and the i... 详细信息
来源: 评论
Lip-Audio Modality Fusion for Deep Forgery Video Detection
收藏 引用
Computers, Materials & Continua 2025年 第2期82卷 3499-3515页
作者: Yong Liu Zhiyu Wang Shouling Ji Daofu Gong Lanxin Cheng Ruosi Cheng College of Cyberspace Security Information Engineering UniversityZhengzhou450001China Research Institute of Intelligent Networks Zhejiang LabHangzhou311121China College of Computer Science and Technology Zhejiang UniversityHangzhou310027China Henan Key Laboratory of Cyberspace Situation Awareness Zhengzhou450001China Key Laboratory of Cyberspace Security Ministry of EducationZhengzhou450001China
In response to the problem of traditional methods ignoring audio modality tampering, this study aims to explore an effective deep forgery video detection technique that improves detection precision and reliability by ... 详细信息
来源: 评论
Fusion of Time-Frequency Features in Contrastive Learning for Shipboard Wind Speed Correction
收藏 引用
Journal of Ocean University of China 2025年 第2期24卷 377-386页
作者: SONG Jian HUANG Meng LI Xiang ZHANG Zhenqiang WANG Chunxiao ZHAO Zhigang Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science Center(National Supercomputer Center in Jinan)Qilu University of Technology(Shandong Academy of Sciences)Jinan 250000China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer ScienceJinan 250000China
Accurate wind speed measurements on maritime vessels are crucial for weather forecasting,sea state prediction,and safe ***,vessel motion and challenging environmental conditions often affect measurement *** address th... 详细信息
来源: 评论
Secure Multi-way Join Query and Its Bench-Marking with Trusted Execution Environments  2nd
Secure Multi-way Join Query and Its Bench-Marking with Tru...
收藏 引用
2nd International Conference on Data security and Privacy Protection, DSPP 2024
作者: Zhao, Yi Zhao, Sen Lv, Siyi School of Cyber Engineering Xidian University Xi’an China State Key Laboratory of Integrated Service Networks Xidian University Xi’an China Key Laboratory of Data and Intelligent System Security Ministry of Education Nankai University Tianjin China
Because of server-untrustable model in outsourcing encrypted database system, it’s fatal for data owners to keep their data confidential under complex query operations performed by database servers. Trusted... 详细信息
来源: 评论
Proactive Robust Hardening of Resilient Power Distribution network: Decision-Dependent Uncertainty Modeling and Fast Solution Strategy
收藏 引用
IEEE Transactions on Automation Science and Engineering 2025年 22卷 14953-14966页
作者: Ma, Donglai Cao, Xiaoyu Zeng, Bo Jia, Qing-Shan Chen, Chen Zhai, Qiaozhu Guan, Xiaohong Xi’an Jiaotong University School of Automation Science and Engineering Ministry of Education Key Laboratory for Intelligent Networks and Network Security Shaanxi Xi’an710049 China University of Pittsburgh Department of Industrial Engineering Department of Electrical and Computer Engineering PittsburghPA15106 United States Tsinghua University Center for Intelligent and Networked Systems Department of Automation Beijing100084 China Xi’an Jiaotong University School of Electrical Engineering Shaanxi Xi’an710049 China
To address the power system hardening problem, traditional approaches often adopt robust optimization (RO) that considers a fixed set of concerned contingencies, regardless of the fact that hardening some components a... 详细信息
来源: 评论
Multiple Edge Data Integrity Verification with Multi-Vendors and Multi-Servers in Mobile Edge Computing
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第6期24卷 4668-4683页
作者: Islam, Md Rashedul Xiang, Yong Uddin, Md Palash Zhao, Yao Kua, Jonathan Gao, Longxiang The School of Information Technology Deakin University GeelongVIC3220 Australia The Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Ensuring Edge Data Integrity (EDI) is imperative in providing reliable and low-latency services in mobile edge computing. Existing EDI schemes typically address single-vendor (App Vendor, AV) single-server (Edge Serve... 详细信息
来源: 评论
N3PA-STIN: A Novel Three-Party Authentication Protocol for Multi-User Access in Satellite-Terrestrial Integrated networks
收藏 引用
IEEE Internet of Things Journal 2025年 第10期12卷 14952-14968页
作者: Guo, Junyan Yao, Shuang Song, Yue Han, Xu Zheng, Zhi Chang, Liyuan China Telecom Cybersecurity Technology Co. Ltd Beijing China China Telecom Co. Ltd Operation Center of Network Security Products Beijing China China Electric Power Research Institute Co. Ltd Beijing China Beijing Jiaotong University Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing China
Satellite-Terrestrial Integrated network (STIN) serves as essential infrastructure for providing seamless global coverage and wireless remote subscription services. However, the inherent heterogeneity, satellite expos... 详细信息
来源: 评论
EvolGCN: A Co-evolutionary Graph Convolutional network Model for Dynamically Spatio-Temporal Anomaly Event Inference
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Liu, Xiaoming Pu, Hang Chen, Zhuo Zhang, Zhanwei Lan, Yu Shen, Chao Xi'an Jiaotong University Ministry of Education Key Lab for Intelligent Networks and Network Security Shaanxi Xi'an710049 China
Accurately spatio-temporal anomaly event inference is significant to enhance society's safety, such as crime prevention and traffic collision reduction, etc. However, it is hard to achieve good performance for its... 详细信息
来源: 评论
DSDIR: A Two-Stage Method for Addressing Noisy Long-Tailed Problems in Malicious Traffic Detection
DSDIR: A Two-Stage Method for Addressing Noisy Long-Tailed P...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Li, Guoliang Zhang, Ruiqi Sun, Zhe Xing, Lingkai Zhang, Yu College of Cyber Science Nankai University Tianjin China College of Computer Science Nankai University Tianjin China Tianjin Key Laboratory of Network and Data Security Technology Tianjin China Key Laboratory of Data and Intelligent System Security Ministry of Education Tianjin China
In recent years, deep learning based malicious traffic detection (MTD) systems have demonstrated remarkable success. However, their effectiveness tend to decrease because most malicious traffic datasets are suffered f... 详细信息
来源: 评论