跳到主要导航
跳到搜索
跳到主要内容
西北工业大学 国内
English
中文
国内
简介
研究单位
科研成果
按专业知识、名称或附属进行搜索
网络空间安全学院
西北工业大学
综述
指纹
网络
简介
(6)
科研成果
(754)
指纹
深入其中 网络空间安全学院 为活跃的研究主题。这些主题标签来自该组织中成员的成果。它们共同形成唯一的指纹。
分类
加权
按字母排序
Computer Science
Reinforcement Learning
100%
Experimental Result
87%
Unmanned Aerial Vehicle
67%
Complex Network
61%
Task Offloading
57%
Edge Computing
53%
Social Dilemma
53%
Deep Learning Method
50%
Artificial Intelligence
50%
Reflecting Surface
43%
Community Detection
38%
Graph Neural Network
37%
Deep Reinforcement Learning
36%
Network Structure
34%
Approximation (Algorithm)
33%
Multi Agent System
33%
Federated Learning
31%
Internet-Of-Things
30%
Industrial Internet of Things
29%
Graph Contrastive Learning
28%
Social Network
27%
Optimization Problem
27%
Superior Performance
27%
Support Vector Regression
26%
Least Squares Method
26%
Network Slicing
26%
Multi-Agent Reinforcement Learning
24%
Neural Network
24%
Series Prediction
24%
Anomaly Detection
24%
Prediction Accuracy
24%
Noma
24%
tracking control
23%
multi-agent
22%
Promote Cooperation
22%
Multiobjective
22%
Prediction Model
22%
Network Topology
21%
Authentication
21%
Convolutional Neural Network
21%
Avionics
21%
Internet of Vehicles
21%
Support Vector Machine
20%
Graph Convolutional Network
20%
Learning Approach
20%
Evolutionary Dynamics
19%
Computing Resource
19%
Type Communication
19%
Triggered Event
19%
Multi-Access Edge Computing
18%
multi agent
18%
Intrusion Detection System
18%
Deep Neural Network
17%
Fault Detection
17%
Mutual Information
17%
Message Delivery
17%
Dynamic Network
17%
Autonomous Vehicle
17%
Communication Network
16%
Heterogeneous Network
16%
Research Direction
16%
Decision-Making
16%
Digital Twin
15%
Vehicular Network
15%
Multiple Access
15%
Cyber Physical Systems
15%
Representation Learning
15%
Detection Algorithm
15%
Diffusion Model
15%
Physical Layer
15%
Similarity Matrix
15%
Detection Method
15%
Software-Defined Networking
15%
Genetic Algorithm
14%
Learning Algorithm
14%
Attackers
14%
Physical Model
14%
Data Association
14%
Linear Discriminant Analysis
14%
Backdoors
14%
Reconfiguration
14%
Satellite Network
14%
Eavesdropping Attack
14%
Image Segmentation
14%
Cooperative Cluster
14%
Temporal Knowledge Graph
14%
Network Community
14%
Self-Supervised Learning
14%
path-planning
14%
Fault Diagnosis
14%
Particle Swarm Optimization
13%
Dynamic Behavior
13%
Resource Allocation
13%
Numerical Simulation
13%
Network Layer
13%
Computational Efficiency
13%
Internet of Things Device
13%
Control Method
13%
Underlying Network
13%
Traditional Method
13%
Engineering
Reinforcement Learning
73%
Unmanned Aerial Vehicle
66%
Simulation Result
52%
Experimental Result
50%
Joints (Structural Components)
48%
Nodes
46%
Intelligent Reflecting Surface
43%
Support Vector Machine
43%
Good Prediction
35%
Life Prediction
35%
Metrics
30%
Avionics
27%
Control Scheme
26%
Least Square
26%
Multiagents
26%
Convolutional Neural Network
25%
Internet-Of-Things
21%
Soft Error
21%
Deep Learning Method
20%
Network Topology
20%
Adaptability
19%
Integrated Energy System
19%
Lithium-Ion Batteries
19%
Optimal Control
19%
Agent System
19%
Control Algorithm
18%
Limitations
17%
State-of-the-Art Method
17%
Illustrates
17%
Physical Model
16%
Network Model
15%
Beamforming
15%
Optimisation Problem
15%
Shortfall
14%
Fault Diagnosis
14%
Stochastic Approach
14%
Reliability Analysis
14%
Dilemma Game
14%
Low Earth Orbit
14%
Artificial Intelligence
14%
Real Life
14%
Process Route
14%
Congestion Control
14%
Convergence Time
14%
Particle Swarm Optimization
13%
Genetic Algorithm
13%
Process Planning
13%
Computing Time
13%
Dynamic Behavior
13%
Lyapunov Function
13%
Noma
12%
Complex Network
12%
Nonlinear System
12%
Learning Algorithm
12%
Road
12%
Maximization
12%
Reconfiguration
11%
Singularities
11%
Channel State Information
11%
Fits and Tolerances
11%
External Disturbance
11%
Aero-Engines
11%
Computational Efficiency
11%
Basestation
10%
Point Cloud
10%
Sum-Rate Maximization
10%
Process Design
10%
Structure Information
10%
Drone
10%
Communication System
10%
Rotors
10%
Feedback Control
10%
Loss Function
10%
Stochastic Geometry
9%
Subproblem
9%
Computational Complexity
9%
Temporal Constraint
9%
Non-Orthogonal Multiple Access
9%
Computervision
9%
Path Planning
9%
Flow Distribution
9%
Random Access
9%
Aeroengine
9%
Downlink Multi
9%
Initial Condition
9%
Control Flow
9%
Quality Data
9%
Network State
9%
Initial Value
9%
Route Planning
9%
Detection Algorithm
9%
Actuator
9%
Design Intent
9%
Resource Consumption
9%
Diffusion Process
9%
Bayes Estimator
9%
Finite Time
9%
Sliding Mode Control
9%
Denial-of-Service Attack
9%
Non-Linear Dynamics
9%