咨询与建议

限定检索结果

文献类型

  • 1,737 篇 会议
  • 1,156 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,897 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,893 篇 工学
    • 1,437 篇 计算机科学与技术...
    • 1,153 篇 软件工程
    • 516 篇 信息与通信工程
    • 238 篇 电气工程
    • 216 篇 控制科学与工程
    • 171 篇 生物工程
    • 168 篇 电子科学与技术(可...
    • 160 篇 网络空间安全
    • 130 篇 机械工程
    • 74 篇 光学工程
    • 73 篇 仪器科学与技术
    • 70 篇 生物医学工程(可授...
    • 65 篇 安全科学与工程
    • 60 篇 交通运输工程
    • 45 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 818 篇 理学
    • 514 篇 数学
    • 182 篇 生物学
    • 164 篇 物理学
    • 149 篇 统计学(可授理学、...
    • 93 篇 系统科学
    • 48 篇 化学
  • 470 篇 管理学
    • 292 篇 管理科学与工程(可...
    • 202 篇 图书情报与档案管...
    • 93 篇 工商管理
  • 100 篇 法学
    • 60 篇 社会学
    • 42 篇 法学
  • 67 篇 医学
    • 57 篇 临床医学
    • 48 篇 基础医学(可授医学...
  • 36 篇 经济学
    • 36 篇 应用经济学
  • 30 篇 军事学
  • 18 篇 农学
  • 15 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 138 篇 feature extracti...
  • 116 篇 accuracy
  • 110 篇 semantics
  • 97 篇 training
  • 94 篇 federated learni...
  • 89 篇 computational mo...
  • 77 篇 cryptography
  • 71 篇 privacy
  • 69 篇 authentication
  • 68 篇 security
  • 63 篇 data models
  • 62 篇 deep learning
  • 52 篇 robustness
  • 50 篇 object detection
  • 49 篇 protocols
  • 46 篇 optimization
  • 45 篇 information secu...
  • 44 篇 neural networks
  • 42 篇 adaptation model...
  • 41 篇 transformers

机构

  • 272 篇 key laboratory o...
  • 204 篇 shandong provinc...
  • 68 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 57 篇 guangxi key lab ...
  • 56 篇 key lab of infor...
  • 51 篇 shandong enginee...
  • 50 篇 shandong fundame...
  • 42 篇 school of comput...
  • 40 篇 shandong provinc...
  • 38 篇 school of cyber ...
  • 31 篇 college of compu...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 27 篇 college of compu...
  • 27 篇 qilu university ...
  • 26 篇 pca lab key lab ...
  • 24 篇 shandong fundame...
  • 22 篇 beijing electron...

作者

  • 72 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 24 篇 xiaoming wu
  • 23 篇 xie jin
  • 22 篇 ma jianfeng
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 liu ximeng
  • 21 篇 li xianxian
  • 20 篇 zhixin li
  • 20 篇 li hui
  • 19 篇 xianxian li
  • 18 篇 xiangzhi liu
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 di xiaoqiang
  • 16 篇 zhang yuqing

语言

  • 2,420 篇 英文
  • 397 篇 其他
  • 87 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2897 条 记 录,以下是1001-1010 订阅
排序:
SiamIRPN: Siamese Visual Tracking with Improved Region Proposal networks
SiamIRPN: Siamese Visual Tracking with Improved Region Propo...
收藏 引用
2023 International Conference on Frontiers of Robotics and Software Engineering, FRSE 2023
作者: Cao, Dun Dai, Renhua Zhao, Tianyu Alqahtani, Fayez Tolba, Amr Sherratt, R. Simon Zhu, Min Changsha University of Science and Technology School of Computer and Communications Engineering Hunan Changsha China Nanjing University of Posts and Telecommunications Ministry of Education Key Lab of Broadcast Wireless Communication and Sensor Network Technology China King Saud University College of Computer and Information Sciences Software Engineering Department Riyadh12372 Saudi Arabia King Saud University Community College Computer Science Department Riyadh11437 Saudi Arabia The University of Reading School of Biomedical Engineering RG6 6AY United Kingdom Zhejiang Shuren University College of Information Science and Technology Zhejiang31000 China
Though introducing the Region Proposal network (RPN) from object detection enabled Siamese trackers' success, RPN-based trackers still struggle in challenging scenarios. We posit that the reason comes from two maj... 详细信息
来源: 评论
A Method Based on Hierarchical Spatiotemporal Features for Trojan Traffic Detection
arXiv
收藏 引用
arXiv 2023年
作者: Xie, Jiang Li, Shuhao Zhang, Yongzheng Yun, Xiaochun Li, Jia Institute of Information Engineering Chinese Academy of Sciences Beijing China Key Laboratory of Network Assessment Technology IIE CAS Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China National Computer Network Emergency Response Technical Team Coordination Center of China Beijing China
Trojans are one of the most threatening network attacks currently. HTTP-based Trojan, in particular, accounts for a considerable proportion of them. Moreover, as the network environment becomes more complex, HTTP-base... 详细信息
来源: 评论
LDfuzz: A Directed Greybox Fuzzer for Solidity Smart Contract
LDfuzz: A Directed Greybox Fuzzer for Solidity Smart Contrac...
收藏 引用
International Conference on Mobile Ad-hoc and Sensor networks, MSN
作者: Jiangtao Liao Huidan Hu Keke Huang Huasong Jin Changlu Lin College of Computer and Cyber Security Fujian Normal University School of mathematics and statistics Fujian Normal University Key Laboratory of Analytical Mathematics and Applications (Ministry of Education) Fujian Normal University Fujian Zhong Xin Network Security Information Technology Co. LTD Fuzhou Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin China
Smart contracts are programmable units that possess the ability to execute a wide range of computational tasks, operating on a decentralized ledger called a blockchain, frequently employed for the management of valuab... 详细信息
来源: 评论
GraphFlow: A Fast and Accurate Distributed Streaming Graph Computation Model  30
GraphFlow: A Fast and Accurate Distributed Streaming Graph C...
收藏 引用
30th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2024
作者: Liang, Zheheng Zheng, Yingying Bi, Sheng Yao, Chaosheng Wang, Jiayan Xu, Lijie Ji, Shuping Wang, Wei Duan, Shikai Information Center Guangdong Power Grid Limited Liability Company Guangzhou China Joint Laboratory on Cyberspace Security China Southern Power Grid Guangzhou China State Key Lab of Computer Science at Iscas China University of Cas Beijing China Guangzhou Power Supply Bureau Guangzhou China University of Toronto Toronto Canada Nanjing Institute of Software Technology China University of Cas Nanjing China Ant Group-Payment Business Group Hangzhou China
Streaming graph computation has been widely applied in many fields, e.g., social network analysis and online product recommendation. However, existing streaming graph computation approaches still present limitations o... 详细信息
来源: 评论
Research on Optimization and Scheduling of MPTCP Data networks in GNSS network Reference Stations
Research on Optimization and Scheduling of MPTCP Data Networ...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Fengqi Hao Yuxin Wang Hoiio Kong Dexin Ma Xiyuan Zhao Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Faculty of Data Science City University of Macau Macau China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Communication College Qingdao Agricultural University Qingdao China
The Global Navigation Satellite System network Reference Stations (GNSS-NRS) are pivotal in modern po-sitioning and navigation applications. However, GNSS-NRS face significant communication challenges, including insta... 详细信息
来源: 评论
RoKEPG: RoBERTa and Knowledge Enhancement for Prescription Generation of Traditional Chinese Medicine
arXiv
收藏 引用
arXiv 2023年
作者: Pu, Hua Mi, Jiacong Lu, Shan He, Jieyue School of Computer Science and Engineering Key Lab of Computer Network and Information Integration MOE Southeast University Jiangsu Nanjing210018 China Nanjing Fenghuo Tiandi Communication Technology Co. Ltd Jiangsu Nanjing211161 China
Traditional Chinese medicine (TCM) prescription is the most critical form of TCM treatment, and uncovering the complex nonlinear relationship between symptoms and TCM is of great significance for clinical practice and... 详细信息
来源: 评论
Time Series Anomaly Detection Based on Normalized Flow and Bayesian networks
Time Series Anomaly Detection Based on Normalized Flow and B...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Honglei Yao Donglan Liu Yingxian Chang Xin Liu Chaofan Tang State Grid Shandong Electric Power Research Institute Jinan China State Grid Shandong Electric Power Company Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Time series anomaly detection often faces significant challenges due to the high dimensionality, interdependence, and label sparsity of the data. Traditional methods struggle to model the intricate relationships betwe... 详细信息
来源: 评论
Attribute-Based key Management for Patient-Centric and Trusted Data Access in Blockchain-Enabled IoMT
SSRN
收藏 引用
SSRN 2023年
作者: Xiang, Axin Gao, Hongfeng Tian, Youliang Wang, Linjie Xiong, Jinbo State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guizhou Guiyang550025 China Guizhou Provincial Key Laboratory of Cryptography and Blockchain Technology Guizhou University Guizhou Guiyang550025 China Network and Information Management Center Guizhou University Guizhou Guiyang550025 China School of Data Science Tongren University Guizhou Tongren554300 China Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fujian Normal University Fujian Fuzhou350117 China
Internet of Medical Things (IoMT) provides real-time data collection and access services to medical entities by connecting their devices to Internet. However, within such a complex architecture, achieving patient-cent... 详细信息
来源: 评论
Tri-Perspective view Decomposition for Geometry-Aware Depth Completion
Tri-Perspective view Decomposition for Geometry-Aware Depth ...
收藏 引用
Conference on computer Vision and Pattern Recognition (CVPR)
作者: Zhiqiang Yan Yuankai Lin Kun Wang Yupeng Zheng Yufei Wang Zhenyu Zhang Jun Li Jian Yang PCA Lab Key Lab of Intelligent Perception and Systems for High-Dimensional Information of Ministry of Education and Jiangsu Key Lab of Image and Video Understanding for Social Security School of Computer Science and Engineering Nanjing University of Sci. & Tech. China Huazhong University of Science and Technology Chinese Academy of Sciences Northwestem Poly technical University Nanjing University
Depth completion is a vital taskfor autonomous driving, as it involves reconstructing the precise 3D geometry of a scene from sparse and noisy depth measurements. How-ever, most existing methods either rely only on 2D... 详细信息
来源: 评论
A Prediction Method for Atmospheric Monitoring Data Based on Transformer and GAN
A Prediction Method for Atmospheric Monitoring Data Based on...
收藏 引用
IEEE information Technology, networking, Electronic and Automation Control Conference
作者: Hongge Zhao Jingli Wang Tixiang Zhang Huijuan Hao Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Jinan Eco-environmental Bureau Pingyin Branch Office Jinan China Shandong Unite Environmental Technology Co Jinan China
With the rapid development of urbanization and industrialization, atmospheric pollution has become a major environmental problem of global concern. The problem of atmospheric pollution not only destroys the ecological... 详细信息
来源: 评论