咨询与建议

限定检索结果

文献类型

  • 1,719 篇 会议
  • 1,140 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,863 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,863 篇 工学
    • 1,414 篇 计算机科学与技术...
    • 1,137 篇 软件工程
    • 502 篇 信息与通信工程
    • 214 篇 电气工程
    • 204 篇 控制科学与工程
    • 171 篇 生物工程
    • 161 篇 电子科学与技术(可...
    • 150 篇 网络空间安全
    • 127 篇 机械工程
    • 72 篇 仪器科学与技术
    • 71 篇 光学工程
    • 70 篇 生物医学工程(可授...
    • 59 篇 安全科学与工程
    • 54 篇 交通运输工程
    • 44 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 809 篇 理学
    • 508 篇 数学
    • 181 篇 生物学
    • 157 篇 物理学
    • 147 篇 统计学(可授理学、...
    • 93 篇 系统科学
    • 46 篇 化学
  • 461 篇 管理学
    • 282 篇 管理科学与工程(可...
    • 202 篇 图书情报与档案管...
    • 92 篇 工商管理
  • 100 篇 法学
    • 60 篇 社会学
    • 42 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 36 篇 经济学
    • 36 篇 应用经济学
  • 30 篇 军事学
  • 18 篇 农学
  • 14 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 137 篇 feature extracti...
  • 114 篇 accuracy
  • 109 篇 semantics
  • 95 篇 training
  • 89 篇 federated learni...
  • 88 篇 computational mo...
  • 77 篇 cryptography
  • 70 篇 privacy
  • 69 篇 authentication
  • 68 篇 security
  • 61 篇 data models
  • 60 篇 deep learning
  • 50 篇 object detection
  • 49 篇 robustness
  • 48 篇 protocols
  • 45 篇 information secu...
  • 44 篇 neural networks
  • 44 篇 optimization
  • 41 篇 transformers
  • 41 篇 adaptation model...

机构

  • 265 篇 key laboratory o...
  • 204 篇 shandong provinc...
  • 65 篇 guangxi key lab ...
  • 64 篇 shandong provinc...
  • 57 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 51 篇 shandong enginee...
  • 50 篇 shandong fundame...
  • 42 篇 school of comput...
  • 39 篇 school of cyber ...
  • 33 篇 shandong provinc...
  • 31 篇 college of compu...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 27 篇 college of compu...
  • 27 篇 qilu university ...
  • 26 篇 pca lab key lab ...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 72 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 24 篇 xiaoming wu
  • 23 篇 xie jin
  • 22 篇 ma jianfeng
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 liu ximeng
  • 21 篇 li xianxian
  • 20 篇 zhixin li
  • 20 篇 li hui
  • 19 篇 xianxian li
  • 18 篇 xiangzhi liu
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 16 篇 zhang yuqing

语言

  • 2,485 篇 英文
  • 298 篇 其他
  • 85 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2863 条 记 录,以下是1111-1120 订阅
排序:
HTtext: A TextCNN-based pre-silicon detection for hardware Trojans
HTtext: A TextCNN-based pre-silicon detection for hardware T...
收藏 引用
IEEE International Conference on Big Data and Cloud Computing (BdCloud)
作者: Yi Xu Zhenyi Chen Binhong Huang Ximeng Liu Chen Dong College of Computer and Data Science Fuzhou University Fuzhou China University of South Floride Tampa USA Key Lab of Information Security of Network Systems (Fuzhou University) Fujian Key Laboratory of Network Computing and Intelligent Information Processing (Fuzhou University)
With the advent of the intelligence era, the usage and investment for chips have risen year by year, causing the demand for chip security. Machine learning (ML) analysis has made progress as a pre-silicon hardware Tro... 详细信息
来源: 评论
A Feature-Based Detection System of Adversarial Sample Attack  3rd
A Feature-Based Detection System of Adversarial Sample Attac...
收藏 引用
3rd International Conference on Machine Learning for Cyber security, ML4CS 2020
作者: Wang, Fangwei Lu, Yuanyuan Li, Qingru Wang, Changguang Lab of Network and Information Security of Hebei Province Hebei Normal University Shijiazhuang050024 China College of Computer and Cyber Security Hebei Normal University Shijiazhuang050024 China
With the increase of malware, traditional malicious detection methods are not suitable to high-intensity detection work. In response to this question, many malware detection methods based on Machine Learning (ML-based... 详细信息
来源: 评论
OpenAPMax: Abnormal Patterns-based Model for Real-World Alzheimer’s Disease Diagnosis
arXiv
收藏 引用
arXiv 2023年
作者: Huang, Yunyou Guan, Xianglong Lu, Xiangjiang Liang, Xiaoshuang Miao, Xiuxia Xie, Jiyue Liu, Wenjing Ma, Li Tang, Suqin Zhang, Zhifei Zhan, Jianfeng The Key Lab of Education Blockchain and Intelligent Technology Ministry of Education The Guangxi Key Laboratory of Multi-Source Information Mining and Security Guangxi Normal University China The School of Electronic and Information Engineering School of Integrated Circuits Guangxi Normal University Guilin530015 China The Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guangxi Normal University China The State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing100086 China The Department of Physiology and Pathophysiology Capital Medical University Beijing100069 China The Guilin Medical University Guilin541001 China The Guangxi Key Lab of Multi-Source Information Mining & Security China
Alzheimer’s disease (AD) cannot be reversed, but early diagnosis will significantly benefit patients’ medical treatment and care. In recent works, AD diagnosis has the primary assumption that all categories are know... 详细信息
来源: 评论
A Grouping Strategy-Based Progressive Fusion network for Hyperspectral Image Super-Resolution
A Grouping Strategy-Based Progressive Fusion Network for Hyp...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Guohua Lv Baodong Zhang Yongbiao Gao Guixin Zhao Guotao Wang Juncan Wang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China Shandong Key Laboratory of Ubiquitous Intelligent Computing Jinan China Key Laboratory of New Generation Artificial Intelligence Technology and Its Interdisciplinary Application (Southeast University) Ministry of Education China Beihang University Beijing China
Hyperspectral super-resolution involves combining low-resolution hyperspectral images with high-resolution multispectral images to produce a high-resolution hyperspectral image. Recently, although many methods for hyp... 详细信息
来源: 评论
Improving Complex Knowledge Base Question Answering with Relation-Aware Subgraph Retrieval and Reasoning network
Improving Complex Knowledge Base Question Answering with Rel...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Dan Luo Jiawei Sheng Hongbo Xu Lihong Wang Bin Wang Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Xiaomi AI Lab Beijing China National Computer Network Emergency Response Technical Team Coordination Center of China Beijing China
Complex Knowledge Base Question Answering aims to answer a complex question over a Knowledge Base. A mainstream solution is based on information retrieval, which usually extracts a pivotal subgraph from entire Knowled...
来源: 评论
Deep Learning Enabled Bandpass Electromagnetic Metasurface Inverse Design
Deep Learning Enabled Bandpass Electromagnetic Metasurface I...
收藏 引用
Cross Strait Quad-Regional Radio Science and Wireless Technology Conference (CSRWTC)
作者: Shenghui Zhao Ruizhi Zhang Meng Guo Xuewei Zhang Lifeng Nie Xiaoyu Pang The Research Institute for Special Structures of Aeronautical Composite AVIC Jinan Shandong P.R.China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputing Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan Shandong P. R. China
Conditional variational autoencoders (cVAE) is proposed to automate and optimize the design of band-pass electromagnetic metasurfaces. Electromagnetic responses curves and metasurface structural parameters are used as... 详细信息
来源: 评论
A Novel Intrusion Detection System for Malware Based on Time-Series Meta-learning  1
收藏 引用
3rd International Conference on Machine Learning for Cyber security, ML4CS 2020
作者: Wang, Fangwei Yang, Shaojie Wang, Changguang Li, Qingru Lab of Network and Information Security of Hebei Province Hebei Normal University Shijiazhuang050024 China College of Computer and Cyber Security Hebei Normal University Shijiazhuang050024 China
In recent years, frequent occurrence of network security incidents indicates that host security is more and more fragile. However, current protection tools leads to reduce the efficiency of CPU or GPU. Meanwhile, they... 详细信息
来源: 评论
SGNet: Salient Geometric network for Point Cloud Registration
arXiv
收藏 引用
arXiv 2023年
作者: Wu, Qianliang Ding, Yaqing Luo, Lei Jiang, Haobo Gu, Shuo Zhou, Chuanwei Xie, Jin Yang, Jian PCA Lab Key Lab of Intelligent Perception and Systems for High-Dimensional Information of Ministry of Education Jiangsu Key Lab of Image and Video Understanding for Social Security School of Computer Science and Engineering Nanjing University of Science and Technology China Visual Recognition Group Faculty of Electrical Engineering Czech Technical University in Prague Prague Czech Republic
Point Cloud Registration (PCR) is a critical and challenging task in computer vision and robotics. One of the primary difficulties in PCR is identifying salient and meaningful points that exhibit consistent semantic a... 详细信息
来源: 评论
A DoS-attack Resilient Control Approach for AIOT-enabled Systems
A DoS-attack Resilient Control Approach for AIOT-enabled Sys...
收藏 引用
Artificial Intelligence of Things and Systems (AIoTSys), International Conference on
作者: Xiaoya Cao Zhenya Chen Weisheng Liu Yuanlong Liu Wenting Wang Xin Wang Ming Yang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China State Grid Shandong Electric Power Company Jinan China State Grid Shandong Electric Power Research Institute Jinan China
This paper presents a novel controller design for dealing with the challenges posed by Denial-of-Service (DoS) attacks in the context of Artificial Intelligence of Things (AIOT). The proposed design employs a predicti...
来源: 评论
A Data Contribution-Based Adaptive Federated Learning Approach for Wearable Activity Recognition
A Data Contribution-Based Adaptive Federated Learning Approa...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Yi Zhao Chunyu Hu Xiaodong Yang Lin Yuan Xiang Tian Tianlei Gao Yiqiang Chen Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Beijing Key Laboratory of Mobile Computing and Pervasive Device Institute of Computing Technology Chinese Academy of Sciences Beijing China Shandong Artificial Intelligence Institute Qilu University of Technology (Shandong Academy of Sciences) Jinan China College of Computer Science and Engineering Shandong University of Science and Technology Qingdao China
Wearable activity recognition is crucial for ubiquitous computing, enhancing human-machine interaction, medical monitoring, and personalized services. As wearable devices collect user activity data that often contain ... 详细信息
来源: 评论