咨询与建议

限定检索结果

文献类型

  • 422 篇 会议
  • 176 篇 期刊文献

馆藏范围

  • 598 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 399 篇 工学
    • 333 篇 计算机科学与技术...
    • 261 篇 软件工程
    • 90 篇 信息与通信工程
    • 50 篇 控制科学与工程
    • 41 篇 电气工程
    • 41 篇 生物工程
    • 39 篇 网络空间安全
    • 28 篇 安全科学与工程
    • 23 篇 交通运输工程
    • 22 篇 电子科学与技术(可...
    • 12 篇 机械工程
    • 12 篇 化学工程与技术
    • 12 篇 生物医学工程(可授...
    • 10 篇 建筑学
    • 7 篇 光学工程
  • 156 篇 理学
    • 100 篇 数学
    • 39 篇 生物学
    • 27 篇 统计学(可授理学、...
    • 19 篇 系统科学
    • 14 篇 物理学
    • 14 篇 化学
  • 94 篇 管理学
    • 59 篇 图书情报与档案管...
    • 58 篇 管理科学与工程(可...
    • 16 篇 工商管理
  • 29 篇 法学
    • 17 篇 社会学
    • 12 篇 法学
  • 11 篇 医学
    • 9 篇 基础医学(可授医学...
    • 9 篇 临床医学
  • 8 篇 教育学
    • 7 篇 教育学
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 4 篇 农学
  • 3 篇 文学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 22 篇 network security
  • 20 篇 feature extracti...
  • 18 篇 blockchain
  • 17 篇 deep learning
  • 15 篇 data science
  • 15 篇 data models
  • 14 篇 graph neural net...
  • 14 篇 semantics
  • 14 篇 privacy
  • 13 篇 cyberspace
  • 12 篇 intrusion detect...
  • 12 篇 neural networks
  • 12 篇 machine learning
  • 12 篇 security
  • 12 篇 federated learni...
  • 11 篇 conferences
  • 11 篇 accuracy
  • 11 篇 training
  • 10 篇 reinforcement le...
  • 10 篇 data privacy

机构

  • 422 篇 cyberspace insti...
  • 36 篇 guangzhou univer...
  • 32 篇 institute of inf...
  • 32 篇 school of cyber ...
  • 24 篇 peng cheng labor...
  • 21 篇 college of compu...
  • 16 篇 school of comput...
  • 15 篇 department of ne...
  • 14 篇 cyberspace insti...
  • 14 篇 the cyberspace i...
  • 13 篇 cyberspace insti...
  • 11 篇 academy of mathe...
  • 10 篇 school of comput...
  • 10 篇 school of comput...
  • 8 篇 school of cybers...
  • 8 篇 chinese academy ...
  • 8 篇 alibaba group
  • 7 篇 huangpu research...
  • 7 篇 zhongguancun lab...
  • 7 篇 peng cheng labor...

作者

  • 45 篇 zhihong tian
  • 38 篇 tian zhihong
  • 36 篇 gu zhaoquan
  • 33 篇 han weihong
  • 26 篇 zhaoquan gu
  • 25 篇 shen su
  • 25 篇 su shen
  • 24 篇 lu hui
  • 24 篇 lihua yin
  • 23 篇 wang le
  • 23 篇 zhang peng
  • 23 篇 li shudong
  • 22 篇 weihong han
  • 22 篇 yin lihua
  • 18 篇 jing qiu
  • 18 篇 tang keke
  • 18 篇 ning hu
  • 17 篇 sun yanbin
  • 17 篇 yanchun zhang
  • 16 篇 hu ning

语言

  • 487 篇 英文
  • 109 篇 其他
  • 28 篇 中文
检索条件"机构=the Cyberspace Institute of Advanced Technology"
598 条 记 录,以下是1-10 订阅
排序:
Identifying Industrial Control Equipment Based on Rule Matching and Machine Learning
收藏 引用
Computer Modeling in Engineering & Sciences 2023年 第10期137卷 577-605页
作者: Yuhao Wang Yuying Li Yanbin Sun Yu Jiang Cyberspace Institute of Advanced Technology(CIAT) Guangzhou UniversityGuangzhou510006China
To identify industrial control equipment is often a key step in network mapping,categorizing network resources,and attack *** example,if vulnerable equipment or devices can be discovered in advance and the attack path... 详细信息
来源: 评论
Graph Anomaly Detection via Multi-Scale Reconstruction of Graph Encoder-Decoder Networks
Graph Anomaly Detection via Multi-Scale Reconstruction of Gr...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Yu, Jiaqi Yang, Hong Zhang, Peng Cyberspace Institute of Advanced Technology Guangzhou University Guangzhou China
Existing unsupervised graph anomaly detection (GAD) methods can be categorized into reconstruction based methods and contrastive learning based methods. The principle of reconstruction methods is to capture anomalous ... 详细信息
来源: 评论
A Study on Classification of Tor Encrypted Traffic Based on Mamba  10
A Study on Classification of Tor Encrypted Traffic Based on ...
收藏 引用
10th IEEE Smart World Congress, SWC 2024
作者: Zhao, Silin Tan, Qingfeng Xiang, Yu Tan, Runnan Institute of Advanced Technology in Cyberspace Guangzhou University Guangzhou China
Network traffic classification is an important and fundamental work to ensure network security and network management in an orderly manner, and traffic classification of darknet encrypted traffic with high degree of e... 详细信息
来源: 评论
Non-Ideal Energy Efficiency Optimization Based on MIMO Communications
收藏 引用
IEEE Internet of Things Journal 2025年 第13期12卷 23975-23987页
作者: Li, Jiaxuan Yin, Xue Ding, Xuhui Yang, Ziyi Ye, Neng Yang, Kai Beijing Institute of Technology School of Information and Electronics Beijing100081 China Beijing Institute of Technology School of Cyberspace Science and Technology Beijing100081 China Beijing Institute of Technology Advanced Technology Research Institute Jinan250101 China
In MIMO systems, hybrid digital and analog precoding structures are gaining attention for reducing power consumption and costs compared to fully digital precoding. However, deployment expenses and circuit power consum... 详细信息
来源: 评论
Regular expression implementation: A comprehensive review from software algorithms to hardware acceleration  5
Regular expression implementation: A comprehensive review fr...
收藏 引用
5th International Conference on Computer Communication and Network Security, CCNS 2024
作者: Sheng, Chenxing Zhang, Shuo Liu, Yaping Liao, Haifu School of Cyberspace Institute of Advanced Technology Guangzhou University China
With the rapid development of internet technology, cybersecurity faces an increasing number of challenges, among which network intrusion detection systems are crucial. Due to its flexibility, regular expression matchi... 详细信息
来源: 评论
DASM: Dual Attention Subgraph Matching Model Incorporating Local Behavior-Aware Features for Threat Hunting  10
DASM: Dual Attention Subgraph Matching Model Incorporating L...
收藏 引用
10th IEEE Smart World Congress, SWC 2024
作者: Tang, Fei Cai, Yongxin Chen, Ximing Gao, Chengliang Chen, Rongrong Qiu, Jing Cyberspace Institute of Advanced Technology Guangzhou University Guangzhou China
Threat hunting represents a crucial instrument for safeguarding network security, entailing the proactive identification of potential security threats within a system. However, the types of operations represented in t... 详细信息
来源: 评论
BPFGuard: Multi-Granularity Container Runtime Mandatory Access Control
收藏 引用
IEEE Transactions on Cloud Computing 2025年 第2期13卷 629-640页
作者: Lu, Hui Du, Xiaojiang Hu, Dawei Su, Shen Tian, Zhihong Guangzhou University Cyberspace Institute of Advanced Technology Guangzhou511370 China Stevens Institute of Technology Department of Electrical and Computer Engineering HobokenNJ07030 United States
The adoption of container-based cloud computing services has been prevalent, especially with the introduction of Kubernetes, which enables the automated deployment, scaling, and administration of applications in conta... 详细信息
来源: 评论
CAROKRS: Cost-Aware Resource Optimization Kubernetes Resource Scheduler  9
CAROKRS: Cost-Aware Resource Optimization Kubernetes Resourc...
收藏 引用
9th International Conference on Cloud Computing and Big Data Analytics, ICCCBDA 2024
作者: Li, Tianzhe Qiu, Lupeng Chen, Fuhao Chen, Hao Zhou, Naqin Cyberspace Institute of Advanced Technology Guangzhou University Guangzhou China
Kubernetes (K8s) is a widely used container orchestration tool in cloud computing platforms, providing strong support for the automated deployment, scaling, and management of applications. One of its key features is t... 详细信息
来源: 评论
Against Credential Thief - A Modular Honeytoken Based Framework  30th
Against Credential Thief - A Modular Honeytoken Based Framew...
收藏 引用
30th International Conference on Computational and Experimental Engineering and Sciences, ICCES 2024
作者: Nie, Bohang Tan, Qingfeng Cyberspace Institute of Advanced Technology Guangzhou University Guangzhou510006 China
Sophisticated hacking techniques pose significant risks to both corporate and personal data, creating a formidable challenge for traditional defense methods. Cyber deception is considered a promising mechanism that ca... 详细信息
来源: 评论
CyGPT: Knowledge Graph-Based Enhancement Techniques for Large Language Models in Cybersecurity  9
CyGPT: Knowledge Graph-Based Enhancement Techniques for Larg...
收藏 引用
9th IEEE International Conference on Data Science in cyberspace, DSC 2024
作者: Ou, Lu Ni, Xiaoya Wu, Wei Tian, Zhihong Guangzhou University Cyberspace Institute of Advanced Technology Guangzhou510006 China
Large Language Models (LLMs) excel in numerous Natural Language Processing (NLP) tasks but encounter significant challenges in practical applications, including hallucinations, outdated information, and a lack of doma... 详细信息
来源: 评论