咨询与建议

限定检索结果

文献类型

  • 356 篇 期刊文献
  • 16 篇 会议

馆藏范围

  • 372 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 319 篇 工学
    • 117 篇 计算机科学与技术...
    • 97 篇 信息与通信工程
    • 93 篇 电子科学与技术(可...
    • 88 篇 仪器科学与技术
    • 58 篇 软件工程
    • 56 篇 网络空间安全
    • 47 篇 控制科学与工程
    • 41 篇 机械工程
    • 11 篇 光学工程
    • 10 篇 电气工程
    • 9 篇 动力工程及工程热...
    • 6 篇 化学工程与技术
    • 5 篇 交通运输工程
    • 5 篇 航空宇航科学与技...
    • 4 篇 建筑学
    • 2 篇 材料科学与工程(可...
    • 2 篇 土木工程
  • 74 篇 理学
    • 28 篇 数学
    • 24 篇 物理学
    • 8 篇 系统科学
    • 5 篇 生物学
    • 3 篇 化学
    • 2 篇 地理学
    • 2 篇 地球物理学
  • 63 篇 管理学
    • 59 篇 管理科学与工程(可...
    • 4 篇 公共管理
  • 21 篇 军事学
    • 21 篇 军队指挥学
  • 8 篇 医学
    • 6 篇 临床医学
  • 3 篇 法学
  • 3 篇 农学
  • 3 篇 艺术学
    • 3 篇 设计学(可授艺术学...
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 文学
  • 1 篇 历史学

主题

  • 15 篇 deep learning
  • 15 篇 security
  • 8 篇 network
  • 8 篇 wireless sensor ...
  • 8 篇 blockchain
  • 7 篇 networks
  • 6 篇 cognitive radio
  • 5 篇 intrusion detect...
  • 5 篇 wireless sensor ...
  • 5 篇 outage probabili...
  • 5 篇 cryptography
  • 5 篇 energy efficienc...
  • 4 篇 routing
  • 4 篇 quantum
  • 4 篇 machine learning
  • 4 篇 neural network
  • 4 篇 network security
  • 4 篇 artificial intel...
  • 4 篇 robustness
  • 3 篇 internet of thin...

机构

  • 11 篇 jiangsu high tec...
  • 10 篇 college of compu...
  • 7 篇 ministry of educ...
  • 6 篇 ministry of educ...
  • 5 篇 college of compu...
  • 4 篇 key lab of broad...
  • 4 篇 institute of qua...
  • 4 篇 state key labora...
  • 4 篇 guangxi key lab ...
  • 4 篇 heilongjiang key...
  • 4 篇 shandong provinc...
  • 4 篇 ministry of educ...
  • 3 篇 state key labora...
  • 3 篇 key laboratory o...
  • 3 篇 college of compu...
  • 3 篇 key lab of broad...
  • 3 篇 school of mathem...
  • 3 篇 school of commun...
  • 3 篇 key laboratory o...
  • 3 篇 state key labora...

作者

  • 7 篇 xiaohong guan
  • 6 篇 jiang wu
  • 6 篇 wang ruchuan
  • 5 篇 yin qinye
  • 4 篇 bin cao
  • 4 篇 deyu meng
  • 4 篇 yi ping
  • 4 篇 ruchuan wang
  • 4 篇 胡予濮
  • 4 篇 zheng yan
  • 3 篇 ma jianfeng
  • 3 篇 chao wang
  • 3 篇 baocang ding
  • 3 篇 wei li
  • 3 篇 qingyu yang
  • 3 篇 xu zongben
  • 3 篇 huifang ma
  • 3 篇 jie wu
  • 3 篇 qin wang
  • 3 篇 hong wang

语言

  • 350 篇 英文
  • 22 篇 中文
检索条件"机构=the Ministry of Education Key Lab for Intelligent Networks and Network Security"
372 条 记 录,以下是81-90 订阅
排序:
Modeling and analysis of anti-worm in P2P networks
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2012年 第1期19卷 112-118页
作者: TANG Xin WANG Ru-chuan SHAO Xing College of computer Nanjing University of Posts and Telecommunications Nanjing 210003 China Jiangsu High Technology Research key laboratory for Wireless Sensor networks Nanjing 210003 China key lab of Broadband Wireless Communication and Sensor network Technology N anjing University of Posts and Telecommunications Ministry of Education Nanjing 210003 China
Anti-worm is an effective way to fight against malicious worm and has been followed closely by malicious worm researchers recently. However, active and passive confronting technologies in peer-to-peer (P2P) networks... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Quantum Codes from Constacyclic Codes over Polynomial Residue Rings
收藏 引用
Chinese Journal of Electronics 2019年 第6期28卷 1131-1138页
作者: DING Jian LI Hongju LIANG Jing TANG Yongsheng College of Mathematics and Informatics Fujian Normal University Fujian Provincial key lab of network security and Cryptology Fujian Normal University Department of General education Anhui Xinhua University School of Mathematics and Statistics Hefei Normal University
Sufficient and necessary conditions for Hermitian(1 + λu)-constacyclic self-orthogonal codes over F;m +uF;m are obtained, where λ is a unit of F;m +uF;*** on this, a new method for the construction of p;ary quantu... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A Sharding Scheme Based on Graph Partitioning Algorithm for Public Blockchain
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第6期139卷 3311-3327页
作者: Shujiang Xu Ziye Wang Lianhai Wang Miodrag J.Mihaljevi′c Shuhui Zhang Wei Shao Qizheng Wang key laboratory of Computing Power network and Information security Ministry of EducationShandong Computer Science CenterQilu University of Technology(Shandong Academy of Sciences)Jinan250014China Shandong Provincial key laboratory of Computer networks Shandong Fundamental Research Center for Computer ScienceJinan250014China Mathematical Institute The Serbian Academy of Sciences and ArtsBelgrade11000Serbia
Blockchain technology,with its attributes of decentralization,immutability,and traceability,has emerged as a powerful catalyst for enhancing traditional industries in terms of optimizing business ***,transaction perfo... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Hybrid Features based K-means Clustering Algorithm for use in Electricity Customer Load Pattern Analysis
Hybrid Features based K-means Clustering Algorithm for use i...
收藏 引用
第37届中国控制会议
作者: Pengyuan Liu Chenye Yang Jiang Wu Xingbo Fu Ruanming Huang Yichao Huang Fei Fei ministry of education key lab for intelligent networks and network security Xi'an Jiaotong University State Grid Shanghai Electric Economic and Technology Research Institute
In the power system, the load pattern of users is important for electricity price formulation, abnormal electricity consumption detection and load forecasting. Accurately identifying the load patterns effectively impr... 详细信息
来源: cnki会议 评论
Multi-Relational Graph Representation Learning for Financial Statement Fraud Detection
收藏 引用
Big Data Mining and Analytics 2024年 第3期7卷 920-941页
作者: Chenxu Wang Mengqin Wang Xiaoguang Wang Luyue Zhang Yi Long School of Software Engineering and also with MoE Key Lab of Intelligent Networks and Network SecurityXi’an Jiaotong UniversityXi’an 710049China School of Software Engineering Xi’an Jiaotong UniversityXi’an 710049China Shenzhen Finance Institute The Chinese University of Hong KongShenzhen(CUHK-Shenzhen)Shenzhen 518026China
Financial statement fraud refers to malicious manipulations of financial data in listed companies'annual *** machine learning approaches focus on individual companies,overlooking the interactive relationships among co... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A fine-grained intrusion protection system for inter-edge trust transfer
收藏 引用
Digital Communications and networks 2024年 第5期10卷 1365-1374页
作者: Boran Yang Dapeng Wu Ruyan Wang Zhigang Yang Yu Yang School of Communication and Information Engineering Chongqing University of Posts and Telecommunications Advanced network and intelligent Connection Technology key laboratory of Chongqing education Commission of China Chongqing key laboratory of Ubiquitous Sensing and networking
The phenomenal popularity of smart mobile computing hardware is enabling pervasive edge intelligence and ushering us into a digital twin ***,the natural barrier between edge equipment owned by different interested par... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Neural network-Based State Estimation for Nonlinear Systems With Denial-of-Service Attack Under Try-Once-Discard Protocol
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第10期11卷 2182-2184页
作者: Xueli Wang Shangwei Zhao Ming Yang Xin Wang Xiaoming Wu the key laboratory of Computing Power network and Information security Ministry of EducationShandong Computer Science CenterQilu University of Technology(Shandong Academy of Sciences)Jinan 250014 Shandong Provincial key laboratory of Computer networks Shandong Fundamental Research Center for Computer ScienceJinan 250014China Department of Automation Shanghai Jiao Tong UniversityShanghai 200240China
Dear Editor,This letter deals with state estimation issues of discrete-time nonlinear systems subject to denial-of-service(DoS)attacks under the try-once-discard(TOD)*** specifically,to reduce the communication burden... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
INTERFERENCE COORDINATION METHOD BASED ON GRAPH THEORY IN TWO-TIER CELLULAR networks
收藏 引用
Journal of Electronics(China) 2013年 第1期30卷 66-74页
作者: Shi Jurong Zhu Qi Jiangsu key lab of Wireless Communications Key Lab on Wideband Wireless Communications and Sensor Network. Technology of Ministry of Education Nanjing University of Posts and Telecommunications
This paper studies an interference coordination method by means of spectrum allocation in Long-Term Evolution (LTE) multi-cell scenario that comprises of macrocells and femtocells. The purpose is to maximize the total... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Optimization-based mode selection scheme for OAM millimeter wave system in the off-axis misalignment case
收藏 引用
Digital Communications and networks 2024年 第1期10卷 101-108页
作者: Haie Dou Lei Wang Bin Kang Baoyu Zheng key lab of Broadband Wireless Communication and Sensor network Technology(Nanjing University of Posts and Telecommunications) Ministry of EducationNanjing210003China School of Internet of Things Nanjing University of Posts and TelecommunicationsNanjing210003China
Millimeter-wave transmission combined with Orbital Angular Momentum(OAM)has the advantage of reducing the loss of beam power and increasing the system ***,to fulfill this advantage,the antennas at the transmitter and ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
AR-CNN: an attention ranking network for learning urban perception
收藏 引用
Science China(Information Sciences) 2022年 第1期65卷 164-174页
作者: Zhetao LI Ziwen CHEN Wei-Shi ZHENG Sangyoon OH Kien NGUYEN key laboratory of Hunan Province for Internet of Things and Information security Xiangtan University key laboratory of intelligent Computing & Information Processing of ministry of education Xiangtan University School of Data and Computer Science Sun Yat-sen University Department of Computer and Information Engineering Ajou University Graduate School of Engineering Chiba University
An increasing number of deep learning methods is being applied to quantify the perception of urban environments, study the relationship between urban appearance and resident safety, and improve urban appearance. Most ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 同方期刊数据库 同方期刊数据库 评论