咨询与建议

限定检索结果

文献类型

  • 1,737 篇 会议
  • 1,156 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,897 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,893 篇 工学
    • 1,437 篇 计算机科学与技术...
    • 1,153 篇 软件工程
    • 516 篇 信息与通信工程
    • 238 篇 电气工程
    • 216 篇 控制科学与工程
    • 171 篇 生物工程
    • 168 篇 电子科学与技术(可...
    • 160 篇 网络空间安全
    • 130 篇 机械工程
    • 74 篇 光学工程
    • 73 篇 仪器科学与技术
    • 70 篇 生物医学工程(可授...
    • 65 篇 安全科学与工程
    • 60 篇 交通运输工程
    • 45 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 818 篇 理学
    • 514 篇 数学
    • 182 篇 生物学
    • 164 篇 物理学
    • 149 篇 统计学(可授理学、...
    • 93 篇 系统科学
    • 48 篇 化学
  • 470 篇 管理学
    • 292 篇 管理科学与工程(可...
    • 202 篇 图书情报与档案管...
    • 93 篇 工商管理
  • 100 篇 法学
    • 60 篇 社会学
    • 42 篇 法学
  • 67 篇 医学
    • 57 篇 临床医学
    • 48 篇 基础医学(可授医学...
  • 36 篇 经济学
    • 36 篇 应用经济学
  • 30 篇 军事学
  • 18 篇 农学
  • 15 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 138 篇 feature extracti...
  • 116 篇 accuracy
  • 110 篇 semantics
  • 97 篇 training
  • 94 篇 federated learni...
  • 89 篇 computational mo...
  • 77 篇 cryptography
  • 71 篇 privacy
  • 69 篇 authentication
  • 68 篇 security
  • 63 篇 data models
  • 62 篇 deep learning
  • 52 篇 robustness
  • 50 篇 object detection
  • 49 篇 protocols
  • 46 篇 optimization
  • 45 篇 information secu...
  • 44 篇 neural networks
  • 42 篇 adaptation model...
  • 41 篇 transformers

机构

  • 272 篇 key laboratory o...
  • 204 篇 shandong provinc...
  • 68 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 57 篇 guangxi key lab ...
  • 56 篇 key lab of infor...
  • 51 篇 shandong enginee...
  • 50 篇 shandong fundame...
  • 42 篇 school of comput...
  • 40 篇 shandong provinc...
  • 38 篇 school of cyber ...
  • 31 篇 college of compu...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 27 篇 college of compu...
  • 27 篇 qilu university ...
  • 26 篇 pca lab key lab ...
  • 24 篇 shandong fundame...
  • 22 篇 beijing electron...

作者

  • 72 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 24 篇 xiaoming wu
  • 23 篇 xie jin
  • 22 篇 ma jianfeng
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 liu ximeng
  • 21 篇 li xianxian
  • 20 篇 zhixin li
  • 20 篇 li hui
  • 19 篇 xianxian li
  • 18 篇 xiangzhi liu
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 di xiaoqiang
  • 16 篇 zhang yuqing

语言

  • 2,420 篇 英文
  • 397 篇 其他
  • 87 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2897 条 记 录,以下是1161-1170 订阅
排序:
Deep Learning Enabled Bandpass Electromagnetic Metasurface Inverse Design
Deep Learning Enabled Bandpass Electromagnetic Metasurface I...
收藏 引用
Cross Strait Quad-Regional Radio Science and Wireless Technology Conference (CSRWTC)
作者: Shenghui Zhao Ruizhi Zhang Meng Guo Xuewei Zhang Lifeng Nie Xiaoyu Pang The Research Institute for Special Structures of Aeronautical Composite AVIC Jinan Shandong P.R.China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputing Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan Shandong P. R. China
Conditional variational autoencoders (cVAE) is proposed to automate and optimize the design of band-pass electromagnetic metasurfaces. Electromagnetic responses curves and metasurface structural parameters are used as... 详细信息
来源: 评论
A Novel Intrusion Detection System for Malware Based on Time-Series Meta-learning  1
收藏 引用
3rd International Conference on Machine Learning for Cyber security, ML4CS 2020
作者: Wang, Fangwei Yang, Shaojie Wang, Changguang Li, Qingru Lab of Network and Information Security of Hebei Province Hebei Normal University Shijiazhuang050024 China College of Computer and Cyber Security Hebei Normal University Shijiazhuang050024 China
In recent years, frequent occurrence of network security incidents indicates that host security is more and more fragile. However, current protection tools leads to reduce the efficiency of CPU or GPU. Meanwhile, they... 详细信息
来源: 评论
SGNet: Salient Geometric network for Point Cloud Registration
arXiv
收藏 引用
arXiv 2023年
作者: Wu, Qianliang Ding, Yaqing Luo, Lei Jiang, Haobo Gu, Shuo Zhou, Chuanwei Xie, Jin Yang, Jian PCA Lab Key Lab of Intelligent Perception and Systems for High-Dimensional Information of Ministry of Education Jiangsu Key Lab of Image and Video Understanding for Social Security School of Computer Science and Engineering Nanjing University of Science and Technology China Visual Recognition Group Faculty of Electrical Engineering Czech Technical University in Prague Prague Czech Republic
Point Cloud Registration (PCR) is a critical and challenging task in computer vision and robotics. One of the primary difficulties in PCR is identifying salient and meaningful points that exhibit consistent semantic a... 详细信息
来源: 评论
A DoS-attack Resilient Control Approach for AIOT-enabled Systems
A DoS-attack Resilient Control Approach for AIOT-enabled Sys...
收藏 引用
Artificial Intelligence of Things and Systems (AIoTSys), International Conference on
作者: Xiaoya Cao Zhenya Chen Weisheng Liu Yuanlong Liu Wenting Wang Xin Wang Ming Yang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China State Grid Shandong Electric Power Company Jinan China State Grid Shandong Electric Power Research Institute Jinan China
This paper presents a novel controller design for dealing with the challenges posed by Denial-of-Service (DoS) attacks in the context of Artificial Intelligence of Things (AIOT). The proposed design employs a predicti...
来源: 评论
A Data Contribution-Based Adaptive Federated Learning Approach for Wearable Activity Recognition
A Data Contribution-Based Adaptive Federated Learning Approa...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Yi Zhao Chunyu Hu Xiaodong Yang Lin Yuan Xiang Tian Tianlei Gao Yiqiang Chen Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Beijing Key Laboratory of Mobile Computing and Pervasive Device Institute of Computing Technology Chinese Academy of Sciences Beijing China Shandong Artificial Intelligence Institute Qilu University of Technology (Shandong Academy of Sciences) Jinan China College of Computer Science and Engineering Shandong University of Science and Technology Qingdao China
Wearable activity recognition is crucial for ubiquitous computing, enhancing human-machine interaction, medical monitoring, and personalized services. As wearable devices collect user activity data that often contain ... 详细信息
来源: 评论
Disentangled Noisy Correspondence Learning
arXiv
收藏 引用
arXiv 2024年
作者: Dang, Zhuohang Luo, Minnan Wang, Jihong Jia, Chengyou Han, Haochen Wan, Herun Dai, Guang Chang, Xiaojun Wang, Jingdong The School of Computer Science and Technology The Ministry of Education Key Laboratory of Intelligent Networks and Network Security The Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Xi'an Jiaotong University Shaanxi Xi'An710049 China SGIT AI Lab State Grid Shaanxi Electric Power Company Limited State Grid Corporation of China Shaanxi China The School of Information Science and Technology University of Science and Technology China United Arab Emirates The Baidu Inc China
Cross-modal retrieval is crucial in understanding latent correspondences across modalities. However, existing methods implicitly assume well-matched training data, which is impractical as real-world data inevitably in... 详细信息
来源: 评论
FakeScope: Large Multimodal Expert Model for Transparent AI-Generated Image Forensics
arXiv
收藏 引用
arXiv 2025年
作者: Li, Yixuan Tian, Yu Huang, Yipo Lu, Wei Wang, Shiqi Lin, Weisi Rocha, Anderson College of Computing City University of Hong Kong Hong Kong School of Computer Science and Engineering Ministry of Education Key Laboratory of Information Technology Guangdong Province Key Laboratory of Information Security Technology Sun Yat-Sen University Guangzhou510006 China College of Computing and Data Science Nanyang Technological University Singapore Artificial Intelligence Lab Recod.ai University of Campinas Campinas13084-851 Brazil
The rapid and unrestrained advancement of generative artificial intelligence (AI) presents a double-edged sword: while enabling unprecedented creativity, it also facilitates the generation of highly convincing decepti... 详细信息
来源: 评论
Joint Beamforming Design for Integrated Sensing and Communication Systems with Hybrid-Colluding Eavesdroppers
收藏 引用
IEEE Transactions on Communications 2025年
作者: Liu, Meiding Zhou, Zhengchun Shi, Qiao Li, Guyue Liu, Zilong Fan, Pingzhi Lee, Inkyu Southwest Jiaotong University School of Information Science and Technology Chengdu611756 China Key Laboratory of Analytical Mathematics and Applications China Southeast University School of Cyber Science and Engineering Nanjing210096 China Purple Mountain Laboratories for Network and Communication Security Nanjing210096 China University of Essex School of Computer Science and Electronics Engineering ColchesterCO4 3SQ United Kingdom Southwest Jiaotong University Key Laboratory of Information Coding and Transmission Chengdu611756 China Korea University School of Electrical Engineering Seoul02841 Korea Republic of
In this paper, we consider the physical layer security (PLS) problem for integrated sensing and communication (ISAC) systems in the presence of hybrid-colluding eavesdroppers, where an active eavesdropper (AE) and a p... 详细信息
来源: 评论
A Web Attack Detection Method Based on DistilBERT and Feature Fusion for Power Micro-Application Server
A Web Attack Detection Method Based on DistilBERT and Featur...
收藏 引用
Advanced Electronics, Electrical and Green Energy (AEEGE), International Conference on
作者: Li Nige Chen Lu Zhao Lei Teng Zhenning Wang Zhiqiang Shao Yiyang Gui Xiaolin State Grid Smart Grid Research Institute Co. Ltd. State Grid Laboratory of Power cyber-Security Protection and Monitoring Technology Nanjing China Shaanxi Province Key Laboratory of Computer Network Faculty of Electronic and Information Engineering Xi’an Jiaotong University Xi’an China
The widespread use of power micro-applications has significantly expanded the attack surface of their server side, thus increasing the risk of vulnerability attacks such as SQL injection, XSS, and CRLF injection. To e...
来源: 评论
Research on the Distribution Characteristics of Standardized Big Data Resources Based on Data Visualization——Taking Standardization Practice in Shandong Province as an Example
Research on the Distribution Characteristics of Standardized...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Jinyang Sun Dongdong Peng Zhe Lu Mengran Zhai Ning Qi Yuanhua Qi SHANDONG SCICOM Information and Economy Research Institute Co. Ltd Jinan China Jinan Municipal Bureau of Big Data Jinan China Shandong Institute of Economy and Informatization Development Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology Shandong Academy of Sciences Jinan China
Standardized big data, as a product of the combination of big data and standardization work, objectively reflects the status quo and trends of standardization work. An in-depth study of the distribution characteristic... 详细信息
来源: 评论