咨询与建议

限定检索结果

文献类型

  • 56 篇 会议
  • 36 篇 期刊文献

馆藏范围

  • 92 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 60 篇 工学
    • 32 篇 计算机科学与技术...
    • 32 篇 软件工程
    • 13 篇 信息与通信工程
    • 10 篇 控制科学与工程
    • 9 篇 电气工程
    • 8 篇 生物工程
    • 7 篇 动力工程及工程热...
    • 7 篇 电子科学与技术(可...
    • 6 篇 建筑学
    • 5 篇 机械工程
    • 3 篇 光学工程
    • 3 篇 材料科学与工程(可...
    • 3 篇 土木工程
    • 3 篇 化学工程与技术
    • 3 篇 交通运输工程
    • 2 篇 仪器科学与技术
    • 2 篇 石油与天然气工程
    • 2 篇 安全科学与工程
  • 28 篇 理学
    • 18 篇 数学
    • 8 篇 生物学
    • 7 篇 统计学(可授理学、...
    • 3 篇 物理学
    • 3 篇 化学
    • 2 篇 系统科学
    • 1 篇 天文学
  • 14 篇 管理学
    • 9 篇 管理科学与工程(可...
    • 5 篇 图书情报与档案管...
    • 3 篇 工商管理
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 农学

主题

  • 8 篇 security
  • 6 篇 semantics
  • 4 篇 load modeling
  • 4 篇 feature extracti...
  • 4 篇 clustering algor...
  • 4 篇 training
  • 3 篇 wind power
  • 3 篇 object detection
  • 3 篇 deep learning
  • 3 篇 wireless communi...
  • 3 篇 real-time system...
  • 3 篇 network security
  • 3 篇 generators
  • 3 篇 mathematical mod...
  • 3 篇 communication ne...
  • 2 篇 internet of thin...
  • 2 篇 aggregates
  • 2 篇 power systems
  • 2 篇 libraries
  • 2 篇 task analysis

机构

  • 20 篇 ministry of educ...
  • 6 篇 ministry of educ...
  • 5 篇 state key labora...
  • 3 篇 ministry of educ...
  • 3 篇 hefei national l...
  • 3 篇 xi'an jiaotong u...
  • 2 篇 department of co...
  • 2 篇 faculty of infor...
  • 2 篇 ministry of educ...
  • 2 篇 ministry of educ...
  • 2 篇 xi'an jiaotong u...
  • 2 篇 school of integr...
  • 2 篇 center for intel...
  • 2 篇 school of comput...
  • 2 篇 ministry of educ...
  • 2 篇 ministry of educ...
  • 2 篇 xi’an jiaotong u...
  • 2 篇 the ministry of ...
  • 2 篇 xi' an jiaotong ...
  • 2 篇 microsoft resear...

作者

  • 11 篇 xiaohong guan
  • 11 篇 guan xiaohong
  • 10 篇 jiang wu
  • 8 篇 meng deyu
  • 7 篇 liu xiaoming
  • 7 篇 cao xiangyong
  • 7 篇 ting liu
  • 7 篇 zheng qinghua
  • 7 篇 liu ting
  • 6 篇 kun liu
  • 6 篇 jing tao
  • 5 篇 feng gao
  • 4 篇 liu yang
  • 4 篇 zhanbo xu
  • 4 篇 hui-ming wang
  • 4 篇 qian xueming
  • 4 篇 liu junmin
  • 4 篇 shen chao
  • 3 篇 liu chengxu
  • 3 篇 wenjie wang

语言

  • 88 篇 英文
  • 3 篇 其他
  • 1 篇 中文
检索条件"机构=Ting Liu is with Ministry of Education Key Lab for Intelligent Networks and Networks Security"
92 条 记 录,以下是1-10 订阅
排序:
Traffic Matrix Prediction Based on Cross Aggregate GNN
Traffic Matrix Prediction Based on Cross Aggregate GNN
收藏 引用
2023 IEEE International Conference on Dependable, Autonomic and Secure Computing, 2023 International Conference on Pervasive Intelligence and Computing, 2023 International Conference on Cloud and Big Data Computing, 2023 International Conference on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2023
作者: Tao, Jing Cao, Ken liu, Teng Shenzhen Research Institute Xi'an Jiaotong University Ministry of Education Key Lab for Intelligent Networks and Network Security Xi'an China Xi' An Jiaotong University Ministry of Education Key Lab for Intelligent Networks and Network Security Xi'an China
Traffic Matrix (TM) prediction is defined as the problem of estimating future network traffic matrices based on historical network traffic data. It is widely applied in network planning, resource management, and netwo... 详细信息
来源: 评论
Balanced Hashgraph Based on Dynamic MCMC: Efficient, Practical and Compatible
Balanced Hashgraph Based on Dynamic MCMC: Efficient, Practic...
收藏 引用
2023 IEEE International Conference on Dependable, Autonomic and Secure Computing, 2023 International Conference on Pervasive Intelligence and Computing, 2023 International Conference on Cloud and Big Data Computing, 2023 International Conference on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2023
作者: Tao, Jing Peng, Jianghua liu, Tian Li, Yangfan Tian, Ruifeng Wu, Chengpeng Shenzhen Research Institute Xi'an Jiaotong University Ministry of Education Key Lab for Intelligent Networks and Network Security Xi'an China Xi' An Jiaotong University Ministry of Education Key Lab for Intelligent Networks and Network Security Xi'an China
In a blockchain system based on the HashGraph consensus algorithm, picking a target server for block propagation is a key step. The traditional HashGraph blockchain system uses a completely random approach to pick the... 详细信息
来源: 评论
Lip-Audio Modality Fusion for Deep Forgery Video Detection
收藏 引用
Computers, Materials & Continua 2025年 第2期82卷 3499-3515页
作者: Yong liu Zhiyu Wang Shouling Ji Daofu Gong Lanxin Cheng Ruosi Cheng College of Cyberspace Security Information Engineering UniversityZhengzhou450001China Research Institute of Intelligent Networks Zhejiang LabHangzhou311121China College of Computer Science and Technology Zhejiang UniversityHangzhou310027China Henan Key Laboratory of Cyberspace Situation Awareness Zhengzhou450001China Key Laboratory of Cyberspace Security Ministry of EducationZhengzhou450001China
In response to the problem of traditional methods ignoring audio modality tampering, this study aims to explore an effective deep forgery video detection technique that improves detection precision and reliability by ... 详细信息
来源: 评论
EvolGCN: A Co-evolutionary Graph Convolutional Network Model for Dynamically Spatio-Temporal Anomaly Event Inference
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: liu, Xiaoming Pu, Hang Chen, Zhuo Zhang, Zhanwei Lan, Yu Shen, Chao Xi'an Jiaotong University Ministry of Education Key Lab for Intelligent Networks and Network Security Shaanxi Xi'an710049 China
Accurately spatio-temporal anomaly event inference is significant to enhance society's safety, such as crime prevention and traffic collision reduction, etc. However, it is hard to achieve good performance for its... 详细信息
来源: 评论
PyAnalyzer: An Effective and Practical Approach for Dependency Extraction from Python Code  24
PyAnalyzer: An Effective and Practical Approach for Dependen...
收藏 引用
44th ACM/IEEE International Conference on Software Engineering, ICSE 2024
作者: Jin, Wuxia Xu, Shuo Chen, Dawei He, Jiajun Zhong, Dinghong Fan, Ming Chen, Hongxu Zhang, Huijia liu, ting Xi'an Jiaotong University Xi'an China The School of Software Engineering Xi'an Jiaotong University China Ministry of Education Key Lab for Intelligent Networks and Network Security Xi'an Jiaotong University China Huawei Technologies Co. Ltd Shenzhen China
Dependency extraction based on static analysis lays the ground-work for a wide range of applications. However, dynamic language features in Python make code behaviors obscure and nondeter-ministic;consequently, it pos... 详细信息
来源: 评论
Robust Approximate Dynamic Programming for Large-scale Unit Commitment with Energy Storages
arXiv
收藏 引用
arXiv 2023年
作者: Lan, Yu Zhai, Qiaozhu liu, Xiaoming Guan, Xiaohong The Ministry of Education Key Lab for Intelligent Networks and Network Security Xi’an Jiaotong University China
The multistage robust unit commitment (UC) is of paramount importance for achieving reliable operations considering the uncertainty of renewable realizations. The typical affine decision rule method and the robust fea... 详细信息
来源: 评论
Balanced Hashgraph Based on Dynamic MCMC: Efficient, Practical and Compatible
Balanced Hashgraph Based on Dynamic MCMC: Efficient, Practic...
收藏 引用
IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC)
作者: Jing Tao Jianghua Peng Tian liu Yangfan Li Ruifeng Tian Chengpeng Wu Ministry of Education Key Lab For Intelligent Networks and Network Security Shenzhen Research Institute Xi'an Jiaotong University Xi'an China Ministry of Education Key Lab For Intelligent Networks and Network Security Xi’ an Jiaotong University Xi’ an China
In a blockchain system based on the HashGraph consensus algorithm, picking a target server for block propagation is a key step. The traditional HashGraph blockchain system uses a completely random approach to pick the...
来源: 评论
Traffic Matrix Prediction Based on Cross Aggregate GNN
Traffic Matrix Prediction Based on Cross Aggregate GNN
收藏 引用
IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC)
作者: Jing Tao Ken Cao Teng liu Ministry of Education Key Lab For Intelligent Networks and Network Security Shenzhen Research Institute Xi’an Jiaotong University Xi’an China Ministry of Education Key Lab For Intelligent Networks and Network Security Xi’ an Jiaotong University Xi’ an China
Traffic Matrix (TM) prediction is defined as the problem of estimating future network traffic matrices based on historical network traffic data. It is widely applied in network planning, resource management, and netwo...
来源: 评论
Rethinking Software Misconfigurations in the Real World: An Empirical Study and Literature Analysis
arXiv
收藏 引用
arXiv 2024年
作者: liu, Yuhao Zhou, Yingnan Zhang, Hanfeng Chang, Zhiwei Xu, Sihan Jia, Yan Wang, Wei liu, Zheli College of Cyber Science Nankai University Tianjin China Ministry of Education Key Lab for Intelligent Networks and Network Security Xi’an Jiaotong University Shaanxi China
Software misconfiguration has consistently been a major reason for software failures. Over the past twenty decades, much work has been done to detect and diagnose software misconfigurations. However, there is still a ... 详细信息
来源: 评论
KNN-ADMM based Online Missing Data Recovery in Electricity Markets
KNN-ADMM based Online Missing Data Recovery in Electricity M...
收藏 引用
第34届中国控制与决策会议
作者: Jiacheng liu Jiang Wu Zhanbo Xu Ministry of Education Key Lab for Intelligent Networks and Network Security Xi'an Jiaotong University
This paper proposes a missing electricity markets data online recovery strategy combining the improved KNearest Neighbor clustering(KNN) and Alternating Direction Method of Multipliers(ADMM).Considering the coupling c... 详细信息
来源: 评论