咨询与建议

限定检索结果

文献类型

  • 1,719 篇 会议
  • 1,140 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,863 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,863 篇 工学
    • 1,414 篇 计算机科学与技术...
    • 1,137 篇 软件工程
    • 502 篇 信息与通信工程
    • 214 篇 电气工程
    • 204 篇 控制科学与工程
    • 171 篇 生物工程
    • 161 篇 电子科学与技术(可...
    • 150 篇 网络空间安全
    • 127 篇 机械工程
    • 72 篇 仪器科学与技术
    • 71 篇 光学工程
    • 70 篇 生物医学工程(可授...
    • 59 篇 安全科学与工程
    • 54 篇 交通运输工程
    • 44 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 809 篇 理学
    • 508 篇 数学
    • 181 篇 生物学
    • 157 篇 物理学
    • 147 篇 统计学(可授理学、...
    • 93 篇 系统科学
    • 46 篇 化学
  • 461 篇 管理学
    • 282 篇 管理科学与工程(可...
    • 202 篇 图书情报与档案管...
    • 92 篇 工商管理
  • 100 篇 法学
    • 60 篇 社会学
    • 42 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 36 篇 经济学
    • 36 篇 应用经济学
  • 30 篇 军事学
  • 18 篇 农学
  • 14 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 137 篇 feature extracti...
  • 114 篇 accuracy
  • 109 篇 semantics
  • 95 篇 training
  • 89 篇 federated learni...
  • 88 篇 computational mo...
  • 77 篇 cryptography
  • 70 篇 privacy
  • 69 篇 authentication
  • 68 篇 security
  • 61 篇 data models
  • 60 篇 deep learning
  • 50 篇 object detection
  • 49 篇 robustness
  • 48 篇 protocols
  • 45 篇 information secu...
  • 44 篇 neural networks
  • 44 篇 optimization
  • 41 篇 transformers
  • 41 篇 adaptation model...

机构

  • 265 篇 key laboratory o...
  • 204 篇 shandong provinc...
  • 65 篇 guangxi key lab ...
  • 64 篇 shandong provinc...
  • 57 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 51 篇 shandong enginee...
  • 50 篇 shandong fundame...
  • 42 篇 school of comput...
  • 39 篇 school of cyber ...
  • 33 篇 shandong provinc...
  • 31 篇 college of compu...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 27 篇 college of compu...
  • 27 篇 qilu university ...
  • 26 篇 pca lab key lab ...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 72 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 24 篇 xiaoming wu
  • 23 篇 xie jin
  • 22 篇 ma jianfeng
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 liu ximeng
  • 21 篇 li xianxian
  • 20 篇 zhixin li
  • 20 篇 li hui
  • 19 篇 xianxian li
  • 18 篇 xiangzhi liu
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 16 篇 zhang yuqing

语言

  • 2,485 篇 英文
  • 298 篇 其他
  • 85 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2863 条 记 录,以下是1171-1180 订阅
排序:
Forecasting the Track Irregularity of High-speed Railway based on a WT-GA-GRU Model
Forecasting the Track Irregularity of High-speed Railway bas...
收藏 引用
IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, EUC
作者: Haining Meng Wei Li Wenjiang Ji Yi Zheng Xinyu Tong Xinhong Hei School of Computer Science and Engineering Xi'an University of Technology Xi'an China Shaanxi Key Lab Network Computer and Security Technology Xi'an China
Whether the railway track can run smoothly for a long time directly affects the safety of the railway. In view of the nonlinear, random, and sudden characteristics of the time series data of railway track, we propose ... 详细信息
来源: 评论
Acoustic Characteristics of Mandarin Speech in Male Drug Users
收藏 引用
Journal of Voice 2023年
作者: Geng, Puyang Fan, Ningxue Ling, Rong Li, Zhijun Guo, Hong Lu, Qimeng Chen, Xingwen Department of Audio Video and Electronic Forensics Academy of Forensic Science Shanghai China Shanghai Forensic Service Platform Key Laboratory of Forensic Science Ministry of Justice Shanghai China Information Security and Social Management Innovation Lab Shanghai Open University Shanghai China Network Security Team Public Security Department of Guangxi Province Guangxi Nanning China
Aim: Drug use/addiction has a profound impact on the physical and mental health of individuals. Previous studies have indicated that drug users may experience speech perception disorders, including speech illusion and... 详细信息
来源: 评论
The Adaptive Fault-tolerant Routing Based on an Improved Local security information Model of the Exchanged Hypercube
The Adaptive Fault-tolerant Routing Based on an Improved Loc...
收藏 引用
IEEE International Conference on Big Data and Cloud Computing (BdCloud)
作者: Yazhi Zhang Chuanwen Luo Guijuan Wang Li Zhang Mengjie Lv Jiguo Yu School of Computer Science and Technology Qilu University of Technology Jinan China School of Information Science and Technology Beijing Forestry University Beijing China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China College of Computer Nanjing University of Posts and Telecommunications Nanjing China Big Data Research Institute Qilu University of Technology (Shandong Academy of Sciences) Jinan China
With the increasing amount of computation in high-performance computing, the scale of interconnection networks is becoming larger and larger. It is inevitable that processors or links in the network become faulty. The...
来源: 评论
Natural Language Processing-Based Requirements Modeling: A Case Study on Problem Frames
Natural Language Processing-Based Requirements Modeling: A C...
收藏 引用
Asia-Pacific Conference on Software Engineering
作者: Jiahao Wei Xuan Chen Hongbin Xiao Shangzhi Tang Xiaolan Xie Zhi Li School of Computer Science and Engineering Guangxi Normal University Guilin China College of Information Science and Engineering Guilin University of Technology Guilin China Key Lab of Education Blockchain & Intelligent Technology Ministry of Education Guangxi Normal University Guilin China Guangxi Key Laboratory of Multi-source Information Mining and Security Guangxi Normal University Guilin China
Natural Language Processing (NLP) aims to study various theories and methods that enable effective communication between humans and computers in natural language. One specific technique, known as keyphrase Extraction ...
来源: 评论
PPA: Preference Profiling Attack Against Federated Learning
arXiv
收藏 引用
arXiv 2022年
作者: Zhou, Chunyi Gao, Yansong Fu, Anmin Chen, Kai Dai, Zhiyang Zhang, Zhi Xue, Minhui Zhang, Yuqing School of Computer Science and Engineering Nanjing University of Science and Technology China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Science China Data61 CSIRO Sydney Australia National Computer Network Intrusion Protection Center University of Chinese Academy of Science China
Federated learning (FL) trains a global model across a number of decentralized users, each with a local dataset. Compared to traditional centralized learning, FL does not require direct access to local datasets and th... 详细信息
来源: 评论
Mining Unseen Classes via Regional Objectness: A Simple Baseline for Incremental Segmentation
arXiv
收藏 引用
arXiv 2022年
作者: Zhang, Zekang Gao, Guangyu Fang, Zhiyuan Jiao, Jianbo Wei, Yunchao School of Computer Science Beijing Institute of Technology China School of Computer Science University of Birmingham United Kingdom WEI Lab Institute of Information Science Beijing Jiaotong University China Beijing Key Laboratory of Advanced Information Science and Network China
Incremental or continual learning has been extensively studied for image classification tasks to alleviate catastrophic forgetting, a phenomenon that earlier learned knowledge is forgotten when learning new concepts. ... 详细信息
来源: 评论
Dynamic Power Distribution Controlling for Directional Chargers
Dynamic Power Distribution Controlling for Directional Charg...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: Yuzhuo Ma Dié Wu Jing Gao Wen Sun Jilin Yang Tang Liu College of Computer Science Sichuan Normal University Chengdu China Visual Computing and Virtual Reality Key Lab Sichuan Normal University Chengdu China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China School of Cyberspace Security Northwestern Polytechnical University Xi’an China
Recently, deploying static chargers to construct timely and robust Wireless Rechargeable Sensor networks (WRSNs) has become an important research issue for solving the limited energy problem of wireless sensor network... 详细信息
来源: 评论
A Secure key-Aggregate keyword Retrieval Scheme Over Encrypted Data in Cloud Computing
收藏 引用
IEEE Access 2024年 1-1页
作者: Lou, Chunwei Cao, Mingsheng Luo, Yaohua Xu, Hua Gao, Yuan Wang, Weiwei Wang, Dong University of Electronic Science and Technology of China Chengdu 611731 China Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Chengdu 611731 China School of Information Science and Technology Chengdu University of Technology Chengdu 610059 China School of Physics and Electronic Engineering Yancheng Teachers University Yancheng 224007 China China Academy of Railway Sciences Beijing 100081 China School of Computer Science and Engineering and the Center for Cyber Security University of Electronic Science and Technology of China Chengdu 611731 China
key-aggregate keyword retrieval primitive enables a cloud server on behalf of delegated users to securely perform a keyword search over the data encrypted with various public keys. However, existing key-aggregate sear... 详细信息
来源: 评论
Adaptive Traffic Forecasting on Daily Basis: A Spatio-Temporal Context Learning Approach
收藏 引用
IEEE Transactions on Knowledge and Data Engineering 2025年
作者: Li, Xiaoyu Zhang, Yitian Long, Guodong Hu, Yupeng Lu, Wenpeng Chen, Meng Zhang, Chengqi Gong, Yongshun Shandong University School of Software Jinan250100 China McGill University Electrical and Computer Engineering MontrealQCH3A 0G4 Canada University of Technology Sydney School of Computer Science SydneyNSW2007 Australia Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Shandong Jinan250316 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan250100 China
Traffic forecasting plays a crucial role in establishing an Intelligent Transportation System (ITS) by providing essential insights. Existing traffic forecasting relies on the assumption that there is a hidden invaria... 详细信息
来源: 评论
Direct Participant Recruitment Strategy in Sparse Mobile Crowdsensing
收藏 引用
Jisuanji Xuebao/Chinese Journal of computers 2022年 第7期45卷 1539-1556页
作者: Tu, Chun-Yu Yu, Zhi-Yong Han, Lei Zhu, Wei-Ping Huang, Fang-Wan Guo, Wen-Zhong Wang, Le-Ye College of Mathematics and Computer Science Fuzhou University Fuzhou350108 China Department of Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou350108 China School of Computer Science Northwestern Polytechnical University Xi'an710072 China Key Lab of High Confidence Software Technologies Peking University Beijing100871 China School of Computer Science Peking University Beijing100871 China
Sparse Mobile Crowdsensing (Sparse MCS) selects a small part of sub-areas for data collection and infers the data of other sub-areas from the collected data. Compared with Mobile Crowdsensing (MCS) that does not use d... 详细信息
来源: 评论