咨询与建议

限定检索结果

文献类型

  • 1,719 篇 会议
  • 1,140 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,863 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,863 篇 工学
    • 1,414 篇 计算机科学与技术...
    • 1,137 篇 软件工程
    • 502 篇 信息与通信工程
    • 214 篇 电气工程
    • 204 篇 控制科学与工程
    • 171 篇 生物工程
    • 161 篇 电子科学与技术(可...
    • 150 篇 网络空间安全
    • 127 篇 机械工程
    • 72 篇 仪器科学与技术
    • 71 篇 光学工程
    • 70 篇 生物医学工程(可授...
    • 59 篇 安全科学与工程
    • 54 篇 交通运输工程
    • 44 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 809 篇 理学
    • 508 篇 数学
    • 181 篇 生物学
    • 157 篇 物理学
    • 147 篇 统计学(可授理学、...
    • 93 篇 系统科学
    • 46 篇 化学
  • 461 篇 管理学
    • 282 篇 管理科学与工程(可...
    • 202 篇 图书情报与档案管...
    • 92 篇 工商管理
  • 100 篇 法学
    • 60 篇 社会学
    • 42 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 36 篇 经济学
    • 36 篇 应用经济学
  • 30 篇 军事学
  • 18 篇 农学
  • 14 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 137 篇 feature extracti...
  • 114 篇 accuracy
  • 109 篇 semantics
  • 95 篇 training
  • 89 篇 federated learni...
  • 88 篇 computational mo...
  • 77 篇 cryptography
  • 70 篇 privacy
  • 69 篇 authentication
  • 68 篇 security
  • 61 篇 data models
  • 60 篇 deep learning
  • 50 篇 object detection
  • 49 篇 robustness
  • 48 篇 protocols
  • 45 篇 information secu...
  • 44 篇 neural networks
  • 44 篇 optimization
  • 41 篇 transformers
  • 41 篇 adaptation model...

机构

  • 265 篇 key laboratory o...
  • 204 篇 shandong provinc...
  • 65 篇 guangxi key lab ...
  • 64 篇 shandong provinc...
  • 57 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 51 篇 shandong enginee...
  • 50 篇 shandong fundame...
  • 42 篇 school of comput...
  • 39 篇 school of cyber ...
  • 33 篇 shandong provinc...
  • 31 篇 college of compu...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 27 篇 college of compu...
  • 27 篇 qilu university ...
  • 26 篇 pca lab key lab ...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 72 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 24 篇 xiaoming wu
  • 23 篇 xie jin
  • 22 篇 ma jianfeng
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 liu ximeng
  • 21 篇 li xianxian
  • 20 篇 zhixin li
  • 20 篇 li hui
  • 19 篇 xianxian li
  • 18 篇 xiangzhi liu
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 16 篇 zhang yuqing

语言

  • 2,485 篇 英文
  • 298 篇 其他
  • 85 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2863 条 记 录,以下是1011-1020 订阅
排序:
Global Convergence Guarantees of (A)GIST for a Family of Nonconvex Sparse Learning Problems
收藏 引用
IEEE Transactions on Cybernetics 2022年 第5期52卷 3276-3288页
作者: Zhang, Hengmin Qian, Feng Shang, Fanhua Du, Wenli Qian, Jianjun Yang, Jian East China University of Science and Technology Key Laboratory of Advanced Control and Optimization for Chemical Processes of Ministry of Education School of Information Science and Engineering Shanghai200237 China Shanghai Institute of Intelligent Science and Technology Tongji University Shanghai200092 China Xidian University Key Laboratory of Intelligent Perception and Image Understanding of Ministry of Education School of Artificial Intelligence Xi'an710071 China Peng Cheng Laboratory Shenzhen518066 China Nanjing University of Science and Technology Pca Laboratory Key Lab. of Intelligent Percept. and Syst. for High-Dimensional Information of Ministry of Education Nanjing210094 China Nanjing University of Science and Technology Jiangsu Key Laboratory of Image and Video Understanding for Social Security School of Computer Science and Engineering Nanjing210094 China
In recent years, most of the studies have shown that the generalized iterated shrinkage thresholdings (GISTs) have become the commonly used first-order optimization algorithms in sparse learning problems. The nonconve... 详细信息
来源: 评论
Design and Implementation of Takeaway Ordering Recommendation System Based on Python and Flask  1
收藏 引用
2nd International Conference on Applied Intelligence, ICAI 2024
作者: Cao, Junjie Yu, Wendong Wei, Hongwei Yuan, Lin Li, Zhujun Shandong Jinan250353 China Shandong Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Shandong Jinan250353 China Shandong Tianyi Information Technology Co. Ltd. Shandong Jinan250101 China Jinan Springs Patent and Trademark Office Shandong Jinan250014 China
With the rapid development of the economy, people are getting busier and busier, and it is difficult to find time to cook, so ordering takeout or dining at restaurants has become the norm. In the 2020 work report, the... 详细信息
来源: 评论
A Natural Language Processing Approach for Instruction Set Architecture Identification
arXiv
收藏 引用
arXiv 2022年
作者: Sahabandu, Dinuka Mertoguno, Sukarno Poovendran, Radha The Network Security Lab Department of Electrical and Computer Engineering University of Washington SeattleWA98195-2500 United States The Institute for Information Security & Privacy Georgia Institute of Technology North Avenue AtlantaGA30332 United States
Binary analysis of software is a critical step in cyber forensics applications such as program vulnerability assessment and malware detection. This involves interpreting instructions executed by software and often nec... 详细信息
来源: 评论
HSTF-Model: an HTTP-based Trojan Detection Model via the Hierarchical Spatio-Temporal Features of Traffics
arXiv
收藏 引用
arXiv 2023年
作者: Xie, Jiang Li, Shuhao Yun, Xiaochun Zhang, Yongzheng Chang, Peng Institute of Information Engineering Chinese Academy of Sciences Beijing China Key Laboratory of Network Assessment Technology University of Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China National Computer Network Emergency Response Technical Team/Coordination Center of China Beijing China
HTTP-based Trojan is extremely threatening, and it is difficult to be effectively detected because of its concealment and confusion. Previous detection methods usually are with poor generalization ability due to outda... 详细信息
来源: 评论
Detecting Unknown HTTP-based Malicious Communication Behavior via Generated Adversarial Flows and Hierarchical Traffic Features
arXiv
收藏 引用
arXiv 2023年
作者: Yun, Xiaochun Xie, Jiang Li, Shuhao Zhang, Yongzheng Sun, Peishuai National Computer Network Emergency Response Technical Team Coordination Center of China Beijing China Institute of Information Engineering Chinese Academy of Sciences Beijing China Key Laboratory of Network Assessment Technology University of Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China
Malicious communication behavior is the network communication behavior generated by malware (botnet, spyware, etc.) after victim devices are infected. Experienced adversaries often hide malicious information in HTTP t... 详细信息
来源: 评论
MedRE-DeBGPR: A Novel Model for Medical Relation Extraction Based on DeBERTa, GlobalPointer and RoPE
SSRN
收藏 引用
SSRN 2024年
作者: Deng, Zhiqi Luo, Xudong Gong, Shutao Liu, Jinlu School of Computer Science and Engineering Guangxi Normal University Guilin541004 China Guangxi Key Lab of Multi-source Information Mining & Security Guangxi Normal University Guilin541004 China Key Laboratory of Education Blockchain and Intelligent Technology Ministry of Education Guangxi Normal University Guilin541004 China
In medical text analysis, extracting relationships among medical entities is crucial for enhancing clinical decision-making and building comprehensive medical knowledge graphs. This paper proposes a novel model for Re... 详细信息
来源: 评论
PCB Defect Detection Model with Convolutional Modules Instead of Self-Attention Mechanism
PCB Defect Detection Model with Convolutional Modules Instea...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: MingLe Zhou ChangLe Yi HongLin Wan Min Li Gang Li DeLong Han Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China College of Physics and Electronic Science Shandong Normal University Jinan China
The detection of defects in printed circuit boards requires high accuracy and realtime performance. Existing industrial detection models generally adopt a pure convolutional structure for ease of deployment. However, ...
来源: 评论
Joint Secure Beamforming for RIS-Aided Integrated Multibeam-Satellite Terrestrial networks
Joint Secure Beamforming for RIS-Aided Integrated Multibeam-...
收藏 引用
Future Communications and networks (FCN), International Conference on
作者: Yu Zhang Yang Yang Shuangrui Zhao Teng Li Yulong Shen Xiaohong Jiang Jianfeng Ma School of Computer Science and Technology Xidian University Xi’an China Shaanxi Key Laboratory of Network and System Security Xidian University Xi’an China School of Cyber Engineering Xidian University Xi’an China School of Systems Information Science Future University Hakodate Japan
This paper focuses on a reconfigurable intelligent surface (RIS) enabled integrated multibeam-satellite terrestrial network, which consists of a satellite, a base station (BS), an RIS, multiple earth stations (ESs), a... 详细信息
来源: 评论
Mining unseen classes via regional objectness: a simple baseline for incremental segmentation  22
Mining unseen classes via regional objectness: a simple base...
收藏 引用
Proceedings of the 36th International Conference on Neural information Processing Systems
作者: Zekang Zhang Guangyu Gao Zhiyuan Fang Jianbo Jiao Yunchao Wei School of Computer Science Beijing Institute of Technology School of Computer Science University of Birmingham WEI Lab Institute of Information Science Beijing Jiaotong University and Beijing Key Laboratory of Advanced Information Science and Network
Incremental or continual learning has been extensively studied for image classification tasks to alleviate catastrophic forgetting, a phenomenon that earlier learned knowledge is forgotten when learning new concepts. ...
来源: 评论
Civil Engineering Design in IoT: Leveraging Improved Swarm Intelligence Optimization
Civil Engineering Design in IoT: Leveraging Improved Swarm I...
收藏 引用
IEEE/ACM Int'l Conference on & Int'l Conference on Cyber, Physical and Social Computing (CPSCom) Green Computing and Communications (GreenCom)
作者: Weiheng Fu Rongzhong Chen Kaiwen Chen Xiaojun Xie College of Computer and Data Science Fuzhou University Fuzhou China Xiamen Key Laboratory of Straits Meteorology Xiamen Meteorological Bureau Xiamen China Roadway Design Department Florida Transportarion Engineeeing INC Punta Gorda United States Office of Network Security and Information Fuzhou University Zhicheng College Fuzhou China
Nowadays, swarm intelligence algorithms are used to solve various problem in IoT environments because of their excellent performance, and the particle swarm algorithm(PSO) is a superior algorithm in swarm intelligence... 详细信息
来源: 评论