咨询与建议

限定检索结果

文献类型

  • 1,719 篇 会议
  • 1,140 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,863 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,863 篇 工学
    • 1,414 篇 计算机科学与技术...
    • 1,137 篇 软件工程
    • 502 篇 信息与通信工程
    • 214 篇 电气工程
    • 204 篇 控制科学与工程
    • 171 篇 生物工程
    • 161 篇 电子科学与技术(可...
    • 150 篇 网络空间安全
    • 127 篇 机械工程
    • 72 篇 仪器科学与技术
    • 71 篇 光学工程
    • 70 篇 生物医学工程(可授...
    • 59 篇 安全科学与工程
    • 54 篇 交通运输工程
    • 44 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 809 篇 理学
    • 508 篇 数学
    • 181 篇 生物学
    • 157 篇 物理学
    • 147 篇 统计学(可授理学、...
    • 93 篇 系统科学
    • 46 篇 化学
  • 461 篇 管理学
    • 282 篇 管理科学与工程(可...
    • 202 篇 图书情报与档案管...
    • 92 篇 工商管理
  • 100 篇 法学
    • 60 篇 社会学
    • 42 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 36 篇 经济学
    • 36 篇 应用经济学
  • 30 篇 军事学
  • 18 篇 农学
  • 14 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 137 篇 feature extracti...
  • 114 篇 accuracy
  • 109 篇 semantics
  • 95 篇 training
  • 89 篇 federated learni...
  • 88 篇 computational mo...
  • 77 篇 cryptography
  • 70 篇 privacy
  • 69 篇 authentication
  • 68 篇 security
  • 61 篇 data models
  • 60 篇 deep learning
  • 50 篇 object detection
  • 49 篇 robustness
  • 48 篇 protocols
  • 45 篇 information secu...
  • 44 篇 neural networks
  • 44 篇 optimization
  • 41 篇 transformers
  • 41 篇 adaptation model...

机构

  • 265 篇 key laboratory o...
  • 204 篇 shandong provinc...
  • 65 篇 guangxi key lab ...
  • 64 篇 shandong provinc...
  • 57 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 51 篇 shandong enginee...
  • 50 篇 shandong fundame...
  • 42 篇 school of comput...
  • 39 篇 school of cyber ...
  • 33 篇 shandong provinc...
  • 31 篇 college of compu...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 27 篇 college of compu...
  • 27 篇 qilu university ...
  • 26 篇 pca lab key lab ...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 72 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 24 篇 xiaoming wu
  • 23 篇 xie jin
  • 22 篇 ma jianfeng
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 liu ximeng
  • 21 篇 li xianxian
  • 20 篇 zhixin li
  • 20 篇 li hui
  • 19 篇 xianxian li
  • 18 篇 xiangzhi liu
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 16 篇 zhang yuqing

语言

  • 2,485 篇 英文
  • 298 篇 其他
  • 85 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2863 条 记 录,以下是1041-1050 订阅
排序:
A Rational Delegating Computation Protocol Based on Smart Contract  14th
A Rational Delegating Computation Protocol Based on Smart Co...
收藏 引用
14th EAI International Conference on Mobile Multimedia Communications, Mobimedia 2021
作者: Ma, Juan Chen, Yuling Liu, Guoxu Zhu, Hongliang Peng, Changgen State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang China Blockchain Laboratory of Agricultural Vegetables Weifang University of Science and Technology Shouguang China Engineering Lab for Cloud Security and Information Security Center of BUPT Beijing China
The delegating computation has become an irreversible trend, together comes the pressing need for fairness and efficiency issues. To solve this problem, we leverage game theory to propose a smart c... 详细信息
来源: 评论
HCF-Net: Hierarchical Context Fusion network for Infrared Small Object Detection
arXiv
收藏 引用
arXiv 2024年
作者: Xu, Shibiao Zheng, ShuChen Xu, Wenhao Xu, Rongtao Wang, Changwei Zhang, Jiguang Teng, Xiaoqiang Li, Ao Guo, Li Artificial Intelligence Beijing University of Posts and Telecommunications China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences China State Key Laboratory of Multimodal Artificial Intelligence Systems Institute of Automation Chinese Academy of Sciences China School of Artificial Intelligence University of Chinese Academy of Sciences China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science China School of Computer Science and Technology Harbin University of Science and Technology China
Infrared small object detection is an important computer vision task involving the recognition and localization of tiny objects in infrared images, which usually contain only a few pixels. However, it encounters diffi... 详细信息
来源: 评论
A Lightening Fine-grained Access Control Scheme Supporting Full Policy Hiding in Cloud Storage
A Lightening Fine-grained Access Control Scheme Supporting F...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Jiaoli Shi Chao Hu Shimao Yao Zhuolin Mei Bin Wu Hui Li School of Computer and Big Data Jiujiang Univ. Jiujiang China School of Software IoT Engineering Jiangxi Univ. of Finance and Economics Nanchang China Jiujiang Key Lab. of Network and Information Security Jiujiang China School of Computer and Big Data Jiujiang University Jiujiang China School of Elec. and Comp. Engineering Peking University Shenzhen China
Efficiency, security, and flexibility are difficult to balance in a full policy hiding CP-ABE scheme. This paper creatively converts the privacy matching problem of access policy and a user’s private key to the priva...
来源: 评论
SRoUDA: Meta Self-training for Robust Unsupervised Domain Adaptation
arXiv
收藏 引用
arXiv 2022年
作者: Zhu, Wanqing Yin, Jia-Li Chen, Bo-Hao Liu, Ximeng Fujian Province Key Laboratory of Information Security of Network System Fuzhou350108 China College of Computer Science and Big Data Fuzhou University Fuzhou350108 China Department of Computer Science and Engineering Yuan Ze University Taiwan
As acquiring manual labels on data could be costly, unsupervised domain adaptation (UDA), which transfers knowledge learned from a rich-label dataset to the unlabeled target dataset, is gaining increasing popularity. ... 详细信息
来源: 评论
Understanding the Robustness of 3D Object Detection with Bird'View Representations in Autonomous Driving
Understanding the Robustness of 3D Object Detection with Bir...
收藏 引用
2023 IEEE/CVF Conference on computer Vision and Pattern Recognition, CVPR 2023
作者: Zhu, Zijian Zhang, Yichi Chen, Hai Dong, Yinpeng Zhao, Shu Ding, Wenbo Zhong, Jiachen Zheng, Shibao Institute of Image Communication and Network Engineering Shanghai Jiao Tong University China Institute for Ai Tsinghua University BNRist Center Thbi Lab Dept. of Comp. Sci. and Tech. China School of Computer Science and Technology Anhui University Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Information Materials and Intelligent Sensing Laboratory of Anhui Province China Saic Motor Ai Lab Zhongguancun Laboratory China
3D object detection is an essential perception task in autonomous driving to understand the environments. The Bird's-Eye-View (BEV) representations have significantly improved the performance of 3D detectors with ... 详细信息
来源: 评论
Across-Platform Detection of Malicious Cryptocurrency Transactions via Account Interaction Learning
arXiv
收藏 引用
arXiv 2024年
作者: Che, Zheng Shen, Meng Tan, Zhehui Du, Hanbiao Zhu, Liehuang Wang, Wei Chen, Ting Zhao, Qinglin Xie, Yong The School of Computer Science Beijing Institute of Technology Beijing100081 China The School of Cyberspace Science and Technology Beijing Institute of Technology Beijing100081 China The Ministry of Education Key Lab for Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an710049 China The School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu611731 China The School of Computer Science and Engineering Macau University of Science and Technology China The School of Computer and Information Science Qinghai Institute of Technology Xining810016 China
With the rapid evolution of Web3.0, cryptocurrency has become a cornerstone of decentralized finance. While these digital assets enable efficient and borderless financial transactions, their pseudonymous nature has al... 详细信息
来源: 评论
Unsupervised Community Discovery Algorithm via Reconstructed Graph Neural network
Unsupervised Community Discovery Algorithm via Reconstructed...
收藏 引用
International Conference on Machine Learning and Cybernetics (ICMLC)
作者: Jinghong Wang Hui Wang Jiateng Yang Xizhao Wang College of Computer and Cyber Security Hebei Normal University Shijiazhuang China Hebei Key Laboratory of Network and Information Security Hebei Normal University Shijiazhuang China Hebei Provincial Engineering Research Center for Supply Chain Big Data Analytics & Data Security (Hebei Normal University) Shijiazhuang China College of Artificial Intelligence and Big Data Hebei Polytechnic Institute Shijiazhuang China College of Computer Science and Software Engineering ShenZhen University Shenzhen China
Community discovery can help discover potential community structures in the network, which is a fundamental and important issue in network science. Graph neural network-based algorithms are receiving increasing attent...
来源: 评论
HiRes: Hierarchical Feature Optimization and Rescorer for Automatic ICD Coding
HiRes: Hierarchical Feature Optimization and Rescorer for Au...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Zhenpeng Liang Hongjiao Guan Wenpeng Lu Xueping Peng Bing Xu Muyun Yang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China Australian Artificial Intelligence Institute University of Technology Sydney Sydney Australia Faculty of Computing Harbin Institute of Technology Harbin China
The International Classification of Diseases (ICD) coding assigns standardized codes to diseases. Automating this process enhances the efficiency and accuracy of clinical records processing. However, current methods s... 详细信息
来源: 评论
An Algorithm for Detecting Surface Defects in Industrial Strip Steel based on Receptive Field and Feature information Supplementation
An Algorithm for Detecting Surface Defects in Industrial Str...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Qingyu Xu Jiguo Yu Anming Dong Zihao Shang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China School of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Big Data Institute Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Shandong Data Intelligence Information Technology Co. Ltd. Jinan China
In the context of Industry 4.0 and the rise of intelligent manufacturing, the quality of industrial products is becoming more and more important. Strip steel surface defect detection, as a key link in industrial produ... 详细信息
来源: 评论
Towards Efficient Fine-Grained Access Control and Data Privacy Protection for Smart Home  14th
Towards Efficient Fine-Grained Access Control and Data Priva...
收藏 引用
14th EAI International Conference on Mobile Multimedia Communications, Mobimedia 2021
作者: Shen, Shuaiyong Yang, Yang Ying, Zuobin Liu, Ximeng College of Mathematics and Computer Science Fuzhou University Fuzhou350108 China Fujian Provincial Key Laboratory of Information Security of Network Systems Fuzhou University Fuzhou350108 China School of Electrical and Electronic Engineering Nanyang Technological University Nanyang639798 Singapore
Fine-grained access control become a research spotlight in the scenario of the smart home with Internet-of-Things (IoTs). However, most of the existing works could only realize ciphertext outsourcing with an unchangea... 详细信息
来源: 评论