咨询与建议

限定检索结果

文献类型

  • 1,719 篇 会议
  • 1,140 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,863 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,863 篇 工学
    • 1,414 篇 计算机科学与技术...
    • 1,137 篇 软件工程
    • 502 篇 信息与通信工程
    • 214 篇 电气工程
    • 204 篇 控制科学与工程
    • 171 篇 生物工程
    • 161 篇 电子科学与技术(可...
    • 150 篇 网络空间安全
    • 127 篇 机械工程
    • 72 篇 仪器科学与技术
    • 71 篇 光学工程
    • 70 篇 生物医学工程(可授...
    • 59 篇 安全科学与工程
    • 54 篇 交通运输工程
    • 44 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 809 篇 理学
    • 508 篇 数学
    • 181 篇 生物学
    • 157 篇 物理学
    • 147 篇 统计学(可授理学、...
    • 93 篇 系统科学
    • 46 篇 化学
  • 461 篇 管理学
    • 282 篇 管理科学与工程(可...
    • 202 篇 图书情报与档案管...
    • 92 篇 工商管理
  • 100 篇 法学
    • 60 篇 社会学
    • 42 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 36 篇 经济学
    • 36 篇 应用经济学
  • 30 篇 军事学
  • 18 篇 农学
  • 14 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 137 篇 feature extracti...
  • 114 篇 accuracy
  • 109 篇 semantics
  • 95 篇 training
  • 89 篇 federated learni...
  • 88 篇 computational mo...
  • 77 篇 cryptography
  • 70 篇 privacy
  • 69 篇 authentication
  • 68 篇 security
  • 61 篇 data models
  • 60 篇 deep learning
  • 50 篇 object detection
  • 49 篇 robustness
  • 48 篇 protocols
  • 45 篇 information secu...
  • 44 篇 neural networks
  • 44 篇 optimization
  • 41 篇 transformers
  • 41 篇 adaptation model...

机构

  • 265 篇 key laboratory o...
  • 204 篇 shandong provinc...
  • 65 篇 guangxi key lab ...
  • 64 篇 shandong provinc...
  • 57 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 51 篇 shandong enginee...
  • 50 篇 shandong fundame...
  • 42 篇 school of comput...
  • 39 篇 school of cyber ...
  • 33 篇 shandong provinc...
  • 31 篇 college of compu...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 27 篇 college of compu...
  • 27 篇 qilu university ...
  • 26 篇 pca lab key lab ...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 72 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 24 篇 xiaoming wu
  • 23 篇 xie jin
  • 22 篇 ma jianfeng
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 liu ximeng
  • 21 篇 li xianxian
  • 20 篇 zhixin li
  • 20 篇 li hui
  • 19 篇 xianxian li
  • 18 篇 xiangzhi liu
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 16 篇 zhang yuqing

语言

  • 2,485 篇 英文
  • 298 篇 其他
  • 85 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2863 条 记 录,以下是1181-1190 订阅
排序:
Location Privacy-Preserving Method Based on Degree of Semantic Distribution Similarity  6th
Location Privacy-Preserving Method Based on Degree of Semant...
收藏 引用
6th International Conference of Pioneering computer Scientists, Engineers and Educators, ICPCSEE 2020
作者: Liu, Rui Zuo, Kaizhong Wang, Yonglu Zhao, Jun College of Computer and Information Anhui Normal University WuhuAnhui241002 China Anhui Provincial Key Laboratory of Network and Information Security Anhui Normal University WuhuAnhui241002 China
While enjoying the convenience brought by location-based services, mobile users also face the risk of leakage of location privacy. Therefore, it is necessary to protect location privacy. Most existing privacy-preservi... 详细信息
来源: 评论
A Drug Box Recognition System Based on Deep Learning and Cloud-Edge Collaboration for Pharmacy Automation
A Drug Box Recognition System Based on Deep Learning and Clo...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Honglei Zhu Anming Dong Jiguo Yu Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Key Laboratory of Computing Power Network and Information Security Qilu University of Technology (Shandong Academy of Sciences) Jinan China School of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Big Data Institute Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Drug box recognition is an integral part of the pharmacy automation system (PAS), which checks for discrepancies between the drugs provided by the system and the doctor’s prescription with the help of modern image re...
来源: 评论
Efficient Adaptive label Refinement for label Noise Learning
arXiv
收藏 引用
arXiv 2025年
作者: Zhang, Wenzhen Cheng, Debo Lu, Guangquan Zhou, Bo Li, Jiaye Zhang, Shichao School of Computer Science and Engineering Guangxi Normal University Guangxi Guilin541004 China Guangxi Key Lab of Multi-Source Information Mining & Security Guangxi Normal University Guangxi Guilin541004 China Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guangxi Normal University Guangxi Guilin541004 China UniSA STEM University of South Australia AdelaideSA5095 Australia Guangxi Collaborative Innovation Center of Modern Sericulture and Silk Hechi University Guangxi Hechi546300 China The State Key Laboratory of Blockchain and Data Security Zhejiang University Zhejiang Hangzhou310027 China
Deep neural networks are highly susceptible to overfitting noisy labels, which leads to degraded performance. Existing methods address this issue by employing manually defined criteria, aiming to achieve optimal parti... 详细信息
来源: 评论
A Trajectory Tracking System for Zebrafish Based on Embedded Edge Artificial Intelligence
A Trajectory Tracking System for Zebrafish Based on Embedded...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Chuanhao Zang Anming Dong Jiguo Yu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China School of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Big Data Institute Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Trajectory tracking of zebrafish is an important requirement in studying neurological disorders and developing new psychoactive drug. However, many challenges emerge for stable tracking, since zebrafish are similar in...
来源: 评论
Robustness and Privacy for Green Learning under Noisy labels
Robustness and Privacy for Green Learning under Noisy Labels
收藏 引用
IEEE International Conference on Trust, security and Privacy in Computing and Communications (TrustCom)
作者: De Li Tiange Xia Qiyu Li Xianxian Li Jinyan Wang Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guangxi Normal University Guilin China Guangxi Key Lab of Multi-Source Information Mining & Security Guangxi Normal University Guilin China School of Computer Science and Engineering Guangxi Normal University Guilin China Faculty of Education Guangxi Normal University Guilin China
As a new paradigm of machine learning, green learning has achieved performance comparable to deep learning in vision tasks, knowledge graph learning, and modeling graph structures. Compared with deep learning, green l... 详细信息
来源: 评论
Frozen-DETR: enhancing DETR with image understanding from frozen foundation models  24
Frozen-DETR: enhancing DETR with image understanding from fr...
收藏 引用
Proceedings of the 38th International Conference on Neural information Processing Systems
作者: Shenghao Fu Junkai Yan Qize Yang Xihan Wei Xiaohua Xie Wei-Shi Zheng School of Computer Science and Engineering Sun Yat-sen University China and Tongyi Lab Alibaba Group and Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China Tongyi Lab Alibaba Group School of Computer Science and Engineering Sun Yat-sen University China and Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China and Guangdong Province Key Laboratory of Information Security Technology China School of Computer Science and Engineering Sun Yat-sen University China and Peng Cheng Laboratory Shenzhen China and Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China and Pazhou Laboratory (Huangpu) Guangzhou Guangdong China
Recent vision foundation models can extract universal representations and show impressive abilities in various tasks. However, their application on object detection is largely overlooked, especially without fine-tunin...
来源: 评论
A residual attention-based privacy-preserving biometrics model of transcriptome prediction from genome
A residual attention-based privacy-preserving biometrics mod...
收藏 引用
IEEE International Conference on Trust, security and Privacy in Computing and Communications (TrustCom)
作者: Cheng Tian Song Liu Jinbao Li Guangchen Wang Luyue Kong Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Department of Medicine Shandong Medical College Jinan China
Transcriptome prediction from genetic variation data is an important task in the privacy-preserving and biometrics field, which can better protect genomic data and achieve biometric recognition through transcriptome. ... 详细信息
来源: 评论
ATHENA: An In-vehicle CAN Intrusion Detection Framework Based on Physical Characteristics of Vehicle Systems
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Kai Sun, Zhen Wang, Bailing Fan, Qilin Li, Ming Zhang, Hongke School of Computer Science and Technology Harbin Institute of Technology Weihai China Shandong Key Laboratory of Industrial Network Security China School of Big Data and Software Engineering Chongqing University Chongqing China Key Laboratory of Dependable Service Computing in Cyber Physical Society of Ministry of Education Chongqing University Chongqing China Jinan Key Laboratory of Distributed Databases Shandong Inspur Database Technology Co. Ltd Jinan China School of Electronic and Information Engineering Beijing Jiaotong University Beijing China
With the growing interconnection between In-Vehicle networks (IVNs) and external environments, intelligent vehicles are increasingly vulnerable to sophisticated external network attacks. This paper proposes ATHENA, th... 详细信息
来源: 评论
TPM, a pattern for an architecture for trusted computing  20
TPM, a pattern for an architecture for trusted computing
收藏 引用
2020 European Conference on Pattern Languages of Programs, EuroPLoP 2020
作者: Muñoz, Antonio Fernandez, Eduardo B. Network Information and Computer Security Lab University of Malaga Malaga Spain Dept. of Computer and Electrical Eng. and Computer Science Florida Atlantic University Boca RatonFL United States
Trusted Computing (TC) is a valuable technology to use when we need to process highly sensitive data and several variants of it are now available. We present here a pattern that describes the architecture of a standar... 详细信息
来源: 评论
Contact angle measurement on curved wetting surface in multiphase lattice Boltzmann method
arXiv
收藏 引用
arXiv 2022年
作者: Liu, Yangsha Yao, Yichen Li, Quanying Wen, Binghai Guangxi Key Lab of Multi-Source Information Mining & Security Guangxi Normal University Guilin541004 China School of Computer Science and Engineering Guangxi Normal University Guilin541004 China
Contact angle is an essential physical quantity that characterizes the wettability of a substrate. Although it is widely used in the studies of surface wetting, capillary phenomena and moving contact lines, measuring ... 详细信息
来源: 评论