咨询与建议

限定检索结果

文献类型

  • 1,737 篇 会议
  • 1,156 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,897 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,893 篇 工学
    • 1,437 篇 计算机科学与技术...
    • 1,153 篇 软件工程
    • 516 篇 信息与通信工程
    • 238 篇 电气工程
    • 216 篇 控制科学与工程
    • 171 篇 生物工程
    • 168 篇 电子科学与技术(可...
    • 160 篇 网络空间安全
    • 130 篇 机械工程
    • 74 篇 光学工程
    • 73 篇 仪器科学与技术
    • 70 篇 生物医学工程(可授...
    • 65 篇 安全科学与工程
    • 60 篇 交通运输工程
    • 45 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 818 篇 理学
    • 514 篇 数学
    • 182 篇 生物学
    • 164 篇 物理学
    • 149 篇 统计学(可授理学、...
    • 93 篇 系统科学
    • 48 篇 化学
  • 470 篇 管理学
    • 292 篇 管理科学与工程(可...
    • 202 篇 图书情报与档案管...
    • 93 篇 工商管理
  • 100 篇 法学
    • 60 篇 社会学
    • 42 篇 法学
  • 67 篇 医学
    • 57 篇 临床医学
    • 48 篇 基础医学(可授医学...
  • 36 篇 经济学
    • 36 篇 应用经济学
  • 30 篇 军事学
  • 18 篇 农学
  • 15 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 138 篇 feature extracti...
  • 116 篇 accuracy
  • 110 篇 semantics
  • 97 篇 training
  • 94 篇 federated learni...
  • 89 篇 computational mo...
  • 77 篇 cryptography
  • 71 篇 privacy
  • 69 篇 authentication
  • 68 篇 security
  • 63 篇 data models
  • 62 篇 deep learning
  • 52 篇 robustness
  • 50 篇 object detection
  • 49 篇 protocols
  • 46 篇 optimization
  • 45 篇 information secu...
  • 44 篇 neural networks
  • 42 篇 adaptation model...
  • 41 篇 transformers

机构

  • 272 篇 key laboratory o...
  • 204 篇 shandong provinc...
  • 68 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 57 篇 guangxi key lab ...
  • 56 篇 key lab of infor...
  • 51 篇 shandong enginee...
  • 50 篇 shandong fundame...
  • 42 篇 school of comput...
  • 40 篇 shandong provinc...
  • 38 篇 school of cyber ...
  • 31 篇 college of compu...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 27 篇 college of compu...
  • 27 篇 qilu university ...
  • 26 篇 pca lab key lab ...
  • 24 篇 shandong fundame...
  • 22 篇 beijing electron...

作者

  • 72 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 24 篇 xiaoming wu
  • 23 篇 xie jin
  • 22 篇 ma jianfeng
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 liu ximeng
  • 21 篇 li xianxian
  • 20 篇 zhixin li
  • 20 篇 li hui
  • 19 篇 xianxian li
  • 18 篇 xiangzhi liu
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 di xiaoqiang
  • 16 篇 zhang yuqing

语言

  • 2,420 篇 英文
  • 397 篇 其他
  • 87 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2897 条 记 录,以下是1051-1060 订阅
排序:
Research on liquid crystal display technology based on regional dynamic dimming algorithm
Research on liquid crystal display technology based on regio...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Zhitao Yu Peng Sun Mingle Zhou Qianlong Liu Shilong Zhao Hisense Video Technology Co. Ltd Qing Dao China Hisense Visual Technology Co. Ltd Qing Dao China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
In vehicle liquid crystal display (LCD) technology has attracted much attention for its wide range of applications in automotive infotainment systems. However, conventional LCD technologies have limitations in terms o... 详细信息
来源: 评论
A Secure keyword Spotting Scheme Based on Complex Residual network
A Secure Keyword Spotting Scheme Based on Complex Residual N...
收藏 引用
Image Processing, computer Vision and Machine Learning (ICICML), International Conference on
作者: Jingyi Chen Xiangyu Gao Peijia Zheng Huiyu Zhou Jian Li Dong Wei Jianbin Zou School of Computer Science and Engineering Sun Yat-sen University Guangzhou China Guangxi Key Laboratory of Digital Infrastructure Guangxi Zhuang Autonomous Region Information Center Nanning China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology (Shandong Academy of Sciences) Jinan China Yunnan Key Laboratory of Service Computing Yunnan University of Finance and Economics Kunming China Amazon Web Services Beijing China
To address the privacy risks associated with intelligent voice assistants, this paper proposes a non-interactive, end-to-end keyword spotting scheme in the encrypted domain. The scheme introduces an innovative complex... 详细信息
来源: 评论
A New and Efficient IT Knowledge Exchange Platform  2nd
A New and Efficient IT Knowledge Exchange Platform
收藏 引用
2nd International Conference on Applied Intelligence, ICAI 2024
作者: Sha, Jinting Yu, Wendong Wei, Hongwei Yuan, Lin Li, Zhujun Shandong Jinan250353 China Shandong Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Shandong Jinan250353 China Shandong Tianyi Information Technology Co. Ltd. Shandong Jinan250101 China Jinan Springs Patent and Trademark Office Shandong Jinan250014 China
As information technology continues to advance, an increasing number of technicians are joining the IT field. However, the technology in this field is changing very rapidly, requiring many technicians to constantly le... 详细信息
来源: 评论
Data-Driven Active Power Dispatch for Wind Farms
Data-Driven Active Power Dispatch for Wind Farms
收藏 引用
Data Driven Control and Learning Systems (DDCLS)
作者: Xuguo Jiao Daoyuan Zhang Xin Wang Zhaoxing Ma Zhenyong Zhang Wenfeng Liu School of Information and Control Engineering Qingdao University of Technology Qingdao China State Key Laboratory of Industrial Control Technology College of Control Science and Engineering Zhejiang University Hangzhou China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang China School of Civil Engineering Qingdao University of Technology Qingdao China
Active power dispatch of wind farms plays an important role in power grid scheduling. In this paper, a data-driven active power dispatch strategy for wind farms is proposed, which uses the key point of minimizing the ... 详细信息
来源: 评论
Global Convergence Guarantees of (A)GIST for a Family of Nonconvex Sparse Learning Problems
收藏 引用
IEEE Transactions on Cybernetics 2022年 第5期52卷 3276-3288页
作者: Zhang, Hengmin Qian, Feng Shang, Fanhua Du, Wenli Qian, Jianjun Yang, Jian East China University of Science and Technology Key Laboratory of Advanced Control and Optimization for Chemical Processes of Ministry of Education School of Information Science and Engineering Shanghai200237 China Shanghai Institute of Intelligent Science and Technology Tongji University Shanghai200092 China Xidian University Key Laboratory of Intelligent Perception and Image Understanding of Ministry of Education School of Artificial Intelligence Xi'an710071 China Peng Cheng Laboratory Shenzhen518066 China Nanjing University of Science and Technology Pca Laboratory Key Lab. of Intelligent Percept. and Syst. for High-Dimensional Information of Ministry of Education Nanjing210094 China Nanjing University of Science and Technology Jiangsu Key Laboratory of Image and Video Understanding for Social Security School of Computer Science and Engineering Nanjing210094 China
In recent years, most of the studies have shown that the generalized iterated shrinkage thresholdings (GISTs) have become the commonly used first-order optimization algorithms in sparse learning problems. The nonconve... 详细信息
来源: 评论
Design and Implementation of Takeaway Ordering Recommendation System Based on Python and Flask  1
收藏 引用
2nd International Conference on Applied Intelligence, ICAI 2024
作者: Cao, Junjie Yu, Wendong Wei, Hongwei Yuan, Lin Li, Zhujun Shandong Jinan250353 China Shandong Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Shandong Jinan250353 China Shandong Tianyi Information Technology Co. Ltd. Shandong Jinan250101 China Jinan Springs Patent and Trademark Office Shandong Jinan250014 China
With the rapid development of the economy, people are getting busier and busier, and it is difficult to find time to cook, so ordering takeout or dining at restaurants has become the norm. In the 2020 work report, the... 详细信息
来源: 评论
A Natural Language Processing Approach for Instruction Set Architecture Identification
arXiv
收藏 引用
arXiv 2022年
作者: Sahabandu, Dinuka Mertoguno, Sukarno Poovendran, Radha The Network Security Lab Department of Electrical and Computer Engineering University of Washington SeattleWA98195-2500 United States The Institute for Information Security & Privacy Georgia Institute of Technology North Avenue AtlantaGA30332 United States
Binary analysis of software is a critical step in cyber forensics applications such as program vulnerability assessment and malware detection. This involves interpreting instructions executed by software and often nec... 详细信息
来源: 评论
Detecting Unknown HTTP-based Malicious Communication Behavior via Generated Adversarial Flows and Hierarchical Traffic Features
arXiv
收藏 引用
arXiv 2023年
作者: Yun, Xiaochun Xie, Jiang Li, Shuhao Zhang, Yongzheng Sun, Peishuai National Computer Network Emergency Response Technical Team Coordination Center of China Beijing China Institute of Information Engineering Chinese Academy of Sciences Beijing China Key Laboratory of Network Assessment Technology University of Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China
Malicious communication behavior is the network communication behavior generated by malware (botnet, spyware, etc.) after victim devices are infected. Experienced adversaries often hide malicious information in HTTP t... 详细信息
来源: 评论
HSTF-Model: an HTTP-based Trojan Detection Model via the Hierarchical Spatio-Temporal Features of Traffics
arXiv
收藏 引用
arXiv 2023年
作者: Xie, Jiang Li, Shuhao Yun, Xiaochun Zhang, Yongzheng Chang, Peng Institute of Information Engineering Chinese Academy of Sciences Beijing China Key Laboratory of Network Assessment Technology University of Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China National Computer Network Emergency Response Technical Team/Coordination Center of China Beijing China
HTTP-based Trojan is extremely threatening, and it is difficult to be effectively detected because of its concealment and confusion. Previous detection methods usually are with poor generalization ability due to outda... 详细信息
来源: 评论
MedRE-DeBGPR: A Novel Model for Medical Relation Extraction Based on DeBERTa, GlobalPointer and RoPE
SSRN
收藏 引用
SSRN 2024年
作者: Deng, Zhiqi Luo, Xudong Gong, Shutao Liu, Jinlu School of Computer Science and Engineering Guangxi Normal University Guilin541004 China Guangxi Key Lab of Multi-source Information Mining & Security Guangxi Normal University Guilin541004 China Key Laboratory of Education Blockchain and Intelligent Technology Ministry of Education Guangxi Normal University Guilin541004 China
In medical text analysis, extracting relationships among medical entities is crucial for enhancing clinical decision-making and building comprehensive medical knowledge graphs. This paper proposes a novel model for Re... 详细信息
来源: 评论