咨询与建议

限定检索结果

文献类型

  • 1,033 篇 会议
  • 1,002 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 2,042 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,309 篇 工学
    • 854 篇 计算机科学与技术...
    • 658 篇 软件工程
    • 343 篇 信息与通信工程
    • 171 篇 电气工程
    • 138 篇 电子科学与技术(可...
    • 137 篇 控制科学与工程
    • 95 篇 生物工程
    • 84 篇 机械工程
    • 74 篇 核科学与技术
    • 73 篇 光学工程
    • 71 篇 网络空间安全
    • 63 篇 生物医学工程(可授...
    • 59 篇 动力工程及工程热...
    • 58 篇 仪器科学与技术
    • 53 篇 化学工程与技术
    • 51 篇 交通运输工程
    • 45 篇 安全科学与工程
  • 711 篇 理学
    • 303 篇 物理学
    • 293 篇 数学
    • 116 篇 生物学
    • 89 篇 统计学(可授理学、...
    • 54 篇 化学
    • 44 篇 系统科学
  • 346 篇 管理学
    • 213 篇 管理科学与工程(可...
    • 143 篇 图书情报与档案管...
    • 76 篇 工商管理
  • 80 篇 医学
    • 61 篇 临床医学
    • 45 篇 基础医学(可授医学...
  • 52 篇 法学
    • 29 篇 社会学
  • 28 篇 经济学
    • 28 篇 应用经济学
  • 17 篇 军事学
  • 13 篇 教育学
  • 13 篇 农学
  • 4 篇 文学
  • 3 篇 艺术学

主题

  • 106 篇 hadron colliders
  • 69 篇 computer network...
  • 56 篇 semantics
  • 48 篇 feature extracti...
  • 44 篇 accuracy
  • 38 篇 computational mo...
  • 35 篇 federated learni...
  • 34 篇 robustness
  • 33 篇 protocols
  • 32 篇 training
  • 28 篇 computer science
  • 28 篇 w & z bosons
  • 28 篇 deep learning
  • 27 篇 bandwidth
  • 27 篇 security
  • 25 篇 internet
  • 24 篇 wireless communi...
  • 24 篇 higgs bosons
  • 24 篇 wireless sensor ...
  • 23 篇 predictive model...

机构

  • 148 篇 centro brasileir...
  • 148 篇 istanbul technic...
  • 147 篇 national and kap...
  • 147 篇 yerevan physics ...
  • 146 篇 university of sp...
  • 145 篇 universidad iber...
  • 144 篇 brunel universit...
  • 144 篇 academy of scien...
  • 143 篇 indian institute...
  • 143 篇 charles universi...
  • 141 篇 department of ph...
  • 140 篇 university of de...
  • 138 篇 imperial college...
  • 138 篇 rwth aachen univ...
  • 137 篇 università di to...
  • 137 篇 indian institute...
  • 134 篇 infn sezione di ...
  • 132 篇 institute for nu...
  • 130 篇 zhejiang univers...
  • 130 篇 centro de invest...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 112 篇 e. migliore
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 111 篇 p. avery
  • 111 篇 l. silvestris

语言

  • 1,778 篇 英文
  • 226 篇 其他
  • 40 篇 中文
检索条件"机构=Computer Network Engineering Technology Center"
2042 条 记 录,以下是421-430 订阅
排序:
Identity-Consistent Video De-identification via Diffusion Autoencoders
Identity-Consistent Video De-identification via Diffusion Au...
收藏 引用
IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB)
作者: Yunhui Zhu Jingyi Cao Bo Liu Tingxi Chen Rong Xie Li Song Institute of Image Communication and Network Engineering Shanghai Jiao Tong University Shanghai China School of Computer Science University of Technology Sydney Sydney Australia Cooperative Medianet Innovation Center (CMIC) Shanghai Jiao Tong University Shanghai China
With the rise of deep learning and the widespread use of face recognition, face image privacy has become a critical research issue. Face de-identification is acknowledged as effective for protecting identity privacy. ... 详细信息
来源: 评论
An efficient and secure arbitrary N-party quantum key agreement protocol using Bell states
arXiv
收藏 引用
arXiv 2023年
作者: Liu, Wen-Jie Xu, Yong Yang, Ching-Nung Gao, Pei-Pei Yu, Wen-Bin Nanjing210044 China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science & Technology Nanjing210044 China School of Computer and Software Nanjing University of Information Science & Technology Nanjing210044 China Department of Computer Science and Information Engineering National Dong Hwa University Hualien974 Taiwan
Two quantum key agreement protocols using Bell states and Bell measurement were recently proposed by Shukla et al. [Quantum Inf. Process. 13, 2391(2014)]. However, Zhu et al. pointed out that there are some security f... 详细信息
来源: 评论
A residual attention-based privacy-preserving biometrics model of transcriptome prediction from genome
A residual attention-based privacy-preserving biometrics mod...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Cheng Tian Song Liu Jinbao Li Guangchen Wang Luyue Kong Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Department of Medicine Shandong Medical College Jinan China
Transcriptome prediction from genetic variation data is an important task in the privacy-preserving and biometrics field, which can better protect genomic data and achieve biometric recognition through transcriptome. ... 详细信息
来源: 评论
A Hybrid Model Integrating Multi-Omic and Topological Information of PPI network for Drug Synergism Prediction
A Hybrid Model Integrating Multi-Omic and Topological Inform...
收藏 引用
IEEE International Conference on Research, Innovation and Vision for the Future
作者: Giang T.T. Nguyen Kien T. Phuong Khanh Nguyen-Trong Duc-Hau Le Network Information Center Hanoi University of Science and Technology Hanoi Vietnam School of Information and Communication Technology Hanoi University of Science and Technology Hanoi Vietnam Faculty of Information Technology Telecommunications Institute of Technology Hanoi Vietnam Faculty of Computer Science and Engineering Thuyloi University Hanoi Vietnam
Combination therapies in precision medicine promise to enhance treatment efficacy and combat drug resistance. Current drug combination prediction methods struggle to extract valuable insights from multi-omics cell lin...
来源: 评论
GNMS: A novel method for model stealing based on GAN
GNMS: A novel method for model stealing based on GAN
收藏 引用
International Conference on Advanced Cloud and Big Data (CBD)
作者: Moxuan Zeng Yangzhong Wang Yangming Zhang Jun Niu Yuqing Zhang College of Cyberspace Security Hainan University Haikou National Computer Network Intrusion Protection Center University of Chinese Academy of Sciences Beijing School of Computer Science and Technology Xidian University Xian School of Cyber Engineering Xidian University Xian
Many well-performing models are currently deployed on the cloud to provide machine Learning as a service (MLaaS). However, these models are susceptible to Model Stealing Attacks, where attackers can access the model’...
来源: 评论
Logits Poisoning Attack in Federated Distillation
arXiv
收藏 引用
arXiv 2024年
作者: Tang, Yuhan Wu, Zhiyuan Gao, Bo Wen, Tian Wang, Yuwei Sun, Sheng Engineering Research Center of Network Management Technology for High-Speed Railway Ministry of Education School of Computer and Information Technology Bejing Jiaotong University Beijing China Collaborative Innovation Center of Railway Traffic Safety Beijing Jiaotong University Beijing China Institute of Computing Technology Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China
Federated Distillation (FD) is a novel and promising distributed machine learning paradigm, where knowledge distillation is leveraged to facilitate a more efficient and flexible cross-device knowledge transfer in fede... 详细信息
来源: 评论
Stacked Sparse Autoencoder for Audio Object Coding  1
收藏 引用
27th International Conference on MultiMedia Modeling, MMM 2021
作者: Wu, Yulin Hu, Ruimin Wang, Xiaochen Hu, Chenhao Li, Gang National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University Wuhan China Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University Wuhan China Collaborative Innovation Center of Geospatial Technology Wuhan China
Compared with channel-based audio coding, the object-based audio coding has a definite advantage in meeting the user’s demands of personalized control. However, in the conventional Spatial Audio Object Coding (SAOC),... 详细信息
来源: 评论
Semisupervised Encrypted Traffic Identification Based on Auxiliary Classification Generative Adversarial network
收藏 引用
computer Systems Science & engineering 2021年 第12期39卷 373-390页
作者: Jiaming Mao Mingming Zhang Mu Chen Lu Chen Fei Xia Lei Fan ZiXuan Wang Wenbing Zhao State Grid Jiangsu Electric Power Co. Ltd.Information and Telecommunication BranchNanJing210003China Institute of Information and Communication Global Energy Interconnection Research InstituteState Grid Key Laboratory of Information and Network SecurityNanjing210003China Engineering Research Center of Post Big Data Technology and Application of Jiangsu Province Research and Development Center of Post Industry Technology of the State Posts Bureau(Internet of Things Technology)Broadband Wireless Communication Technology Engineering Research Center of the Ministry of EducationNanjing University of Posts and TelecommunicationsNanjing210003China Department of Electrical Engineering and Computer Science Cleveland State UniversityCleveland44115USA
The rapidly increasing popularity of mobile devices has changed the methods with which people access various network services and increased net-work traffic *** the past few decades,network traffic identification has ... 详细信息
来源: 评论
Robust Imagined Speech Production from Electrocorticography with Adaptive Frequency Enhancement
Robust Imagined Speech Production from Electrocorticography ...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Xu Xu Chong Fu Junxin Chen Gwanggil Jeon David Camacho School of Computer Science and Engineering Northeastern University Shenyang China School of Software Dalian University of Technology Dalian China Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Northeastern University Shenyang China Engineering Research Center of Security Technology of Complex Network System Ministry of Education Shenyang China College of Information Technology Incheon National University Incheon Korea Department of Computer Systems Engineering Universidad Politécnica de Madrid Madrid Spain
Imagined speech production with electrocorticography (ECoG) plays a crucial role in brain-computer interface system. A challenging issue is the great variation underlying the frequency bands of the ECoG signals’ enco... 详细信息
来源: 评论
Effects of Optimized Operating Parameters on Combustion Characteristics and NO_(x)Emissions of a Burner based on Orthogonal Analysis
收藏 引用
Journal of Thermal Science 2021年 第4期30卷 1212-1223页
作者: XU Qian AKKURT Nevzat YANG Gang ZHU Lidong SHI Kejian WANG Kang ZOU Zhenwei LIU Zhihui WANG Jiulong DU Zhiwei School of Energy and Environmental Engineering University of Science and Technology BeijingBeijing 100083China Beijing Key Laboratory for Energy Conservation and Emission Reduction for Metallurgical Industry Beijing 100083China Department of Mechanical Engineering Munzur UniversityTunceli 62000Turkey Department of Big Data Technology and Application Development Computer Network Information CenterChinese Academy of SciencesBeijing 100190China AVIC Xinxiang Aviation Industry(group)CO. LTDHenan 453002China
To optimize the structure of the burner,improve the combustion performance,and reduce the emission of NO_(x),a self-circulating low NO_(x)combustion technology was used to design a new type of flue gas self-circulatin... 详细信息
来源: 评论