咨询与建议

限定检索结果

文献类型

  • 335 篇 会议
  • 330 篇 期刊文献

馆藏范围

  • 665 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 425 篇 工学
    • 286 篇 计算机科学与技术...
    • 249 篇 软件工程
    • 96 篇 信息与通信工程
    • 71 篇 电气工程
    • 60 篇 生物工程
    • 41 篇 控制科学与工程
    • 33 篇 化学工程与技术
    • 32 篇 电子科学与技术(可...
    • 30 篇 机械工程
    • 23 篇 生物医学工程(可授...
    • 21 篇 光学工程
    • 18 篇 安全科学与工程
    • 16 篇 土木工程
    • 15 篇 建筑学
    • 15 篇 网络空间安全
    • 14 篇 材料科学与工程(可...
    • 12 篇 动力工程及工程热...
  • 190 篇 理学
    • 85 篇 数学
    • 74 篇 生物学
    • 40 篇 物理学
    • 34 篇 统计学(可授理学、...
    • 27 篇 化学
    • 11 篇 系统科学
  • 93 篇 管理学
    • 48 篇 管理科学与工程(可...
    • 44 篇 图书情报与档案管...
    • 21 篇 工商管理
  • 22 篇 法学
    • 17 篇 社会学
  • 21 篇 农学
    • 13 篇 作物学
  • 17 篇 医学
    • 13 篇 临床医学
  • 12 篇 经济学
    • 11 篇 应用经济学
  • 4 篇 军事学
  • 3 篇 教育学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 32 篇 semantics
  • 25 篇 feature extracti...
  • 21 篇 deep learning
  • 20 篇 privacy
  • 16 篇 accuracy
  • 16 篇 training
  • 15 篇 security
  • 15 篇 federated learni...
  • 13 篇 image segmentati...
  • 13 篇 neural networks
  • 13 篇 computational mo...
  • 12 篇 data privacy
  • 11 篇 authentication
  • 11 篇 machine learning
  • 11 篇 data models
  • 10 篇 codes
  • 10 篇 blockchain
  • 9 篇 data mining
  • 9 篇 measurement
  • 8 篇 object detection

机构

  • 59 篇 school of cyber ...
  • 58 篇 hubei key labora...
  • 52 篇 shandong provinc...
  • 46 篇 key laboratory o...
  • 45 篇 shandong enginee...
  • 45 篇 school of comput...
  • 33 篇 hubei engineerin...
  • 32 篇 national enginee...
  • 29 篇 services computi...
  • 27 篇 hubei key labora...
  • 27 篇 cluster and grid...
  • 23 篇 hubei engineerin...
  • 23 篇 henan key labora...
  • 21 篇 school of softwa...
  • 19 篇 school of comput...
  • 18 篇 the hubei engine...
  • 18 篇 school of inform...
  • 17 篇 huazhong univers...
  • 17 篇 school of cyber ...
  • 14 篇 shenzhen huazhon...

作者

  • 45 篇 zhou pan
  • 36 篇 jin hai
  • 33 篇 hai jin
  • 23 篇 hu shengshan
  • 20 篇 liu daizong
  • 17 篇 mahmood khalid
  • 17 篇 zhang leo yu
  • 16 篇 das ashok kumar
  • 16 篇 deqing zou
  • 15 篇 zou deqing
  • 13 篇 li minghui
  • 12 篇 wang haoyu
  • 12 篇 zhou ziqi
  • 11 篇 xiaoke zhu
  • 11 篇 pan zhou
  • 11 篇 jing zhao
  • 11 篇 xu zichuan
  • 10 篇 wan wei
  • 10 篇 shengshan hu
  • 10 篇 fang xiang

语言

  • 634 篇 英文
  • 26 篇 其他
  • 6 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Henan Data Security Engineering Technology Research Center"
665 条 记 录,以下是391-400 订阅
排序:
SCTAR: A Multi-Layer BiLSTM-Based Chinese Short Text Similarity Computation Model with Attention Mechanism
SCTAR: A Multi-Layer BiLSTM-Based Chinese Short Text Similar...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Shuo Zhao Yiyun Xing Jianqiang Zhang Gongpeng Song Qin Lu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Shandong Branch of China Mobile Communication Group Design Institute Co. Jinan China
Text semantic similarity is a crucial research area in Natural Language Processing (NLP). However, traditional methods for calculating the similarity of short Chinese texts often fall short in accuracy and other cruci... 详细信息
来源: 评论
Multilingual Knowledge Graph Completion via Multimodal Decouple and Relation-based Ensemble Inference
Multilingual Knowledge Graph Completion via Multimodal Decou...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Xiaojing Liu Xuesong Jiang Fengge Yi Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
The objective of Multimodal Knowledge Graph Completion (MKGC) is to forecast absent entities within a knowledge graph by leveraging additional textual and visual modalities. Existing studies commonly utilize a singula...
来源: 评论
GA-Net: Gated Attention Mechanism Based Global Refinement Network for Image Inpainting
GA-Net: Gated Attention Mechanism Based Global Refinement Ne...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Ran Qiu Shengrong Zhao Hu Liang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Underwater images are often affected by problems such as light attenuation, color distortion, noise and scattering, resulting in image defects. A novel image inpainting method is proposed to intelligently predict and ...
来源: 评论
LDVNet: Lightweight and Detail-Aware Vision Network for Image Recognition Tasks in Resource-Constrained Environments
LDVNet: Lightweight and Detail-Aware Vision Network for Imag...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Yuchen Liu Hu Liang Ran Qiu Shengrong Zhao Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
In many underwater application scenarios, recognition tasks need to be executed promptly on computationally limited platforms. However, models designed for this field often exhibit spatial locality, and existing works...
来源: 评论
GAF-GAN: Gated Attention Feature Fusion Image Inpainting Network Based on Generative Adversarial Network
GAF-GAN: Gated Attention Feature Fusion Image Inpainting Net...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Ran Qiu Hu Liang Yuchen Liu Shengrong Zhao Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Image inpainting, which aims to reconstruct reasonably clear and realistic images from known pixel information, is one of the core problems in computer vision. However, due to the complexity and variability of the und...
来源: 评论
FERI: Feature Enhancement and Relational Interaction for Image-text Matching
FERI: Feature Enhancement and Relational Interaction for Ima...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Yu Zhang Jianqiang Zhang Gongpeng Song Qin Lu Shuo Zhao Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Shandong Branch of China Mobile Communication Group Design Institute Co. Jinan China
Image-text matching is an important problem at the intersection of computer vision and natural language processing. It aims to establish the semantic link between image and text to achieve high-quality semantic alignm... 详细信息
来源: 评论
A Study on a Reduced Indicator System for the Network security Situational Assessment Model
A Study on a Reduced Indicator System for the Network Securi...
收藏 引用
International Conference on Networking and Network Applications (NaNA)
作者: Hongbin Zhang Yikang Bai Dongmei Zhao Bin Liu Ying Xu Hebei University of Science and Technology School of Information Science and Engineering Shijiazhuang China Hebei Key Laboratory of Network and Information Security Hebei Normal University Shijiazhuang China School of Economics and Management Research Center of Big Data and Social Computing Shijiazhuang China
It is a challenge to monitor the network security state in a large-scale network environment because the selection of situation assessment indicators is overrun by massive observational information. To address this is...
来源: 评论
Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response Tools
arXiv
收藏 引用
arXiv 2023年
作者: Dong, Feng Li, Shaofei Jiang, Peng Li, Ding Wang, Haoyu Huang, Liangyi Xiao, Xusheng Chen, Jiedong Luo, Xiapu Guo, Yao Chen, Xiangqun Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science Peking University China Arizona State University United States Sangfor Technologies Inc. China The Hong Kong Polytechnic University Hong Kong
Provenance-Based Endpoint Detection and Response (P-EDR) systems are deemed crucial for future APT defenses. Despite the fact that numerous new techniques to improve P-EDR systems have been proposed in academia, it is...
来源: 评论
NODLINK: An Online System for Fine-Grained APT Attack Detection and Investigation
arXiv
收藏 引用
arXiv 2023年
作者: Li, Shaofei Dong, Feng Xiao, Xusheng Wang, Haoyu Shao, Fei Chen, Jiedong Guo, Yao Chen, Xiangqun Li, Ding School of Computer Science Peking University China Arizona State University United States Case Western Reserve University United States Sangfor Technologies Inc. China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology China
Advanced Persistent Threats (APT) attacks have plagued modern enterprises, causing significant financial losses. To counter these attacks, researchers propose techniques that capture the complex and stealthy scenarios... 详细信息
来源: 评论
Graph transformer-convolution network for graph classification
Graph transformer-convolution network for graph classificati...
收藏 引用
2021 International Conference on Green Communication, Network, and Internet of Things, GCNIoT 2021
作者: Li, Chengzong Zhai, Rui Zuo, Fang Zhang, Libo Yu, Junyang School of Software Henan University Kaifeng China Henan Provincial Engineering Research Center of Intelligent Data Processing Henan University Kaifeng China Henan International Joint Laboratory of Intelligent Network Theory and Key Technology Henan University Kaifeng China Subject Innovation and Intelligence Introduction Base of Henan Higher Educational Institution Software Eng. Intelligent Info. Proc. Innov. and Intelligence Introduction Base of Henan University China
The Transformer has achieved tremendous success in computer vision, natural language processing, and graph representation learning. However, the transformer cannot effectively encode the topology information of the gr... 详细信息
来源: 评论