咨询与建议

限定检索结果

文献类型

  • 1,737 篇 会议
  • 1,156 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,897 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,893 篇 工学
    • 1,437 篇 计算机科学与技术...
    • 1,153 篇 软件工程
    • 516 篇 信息与通信工程
    • 238 篇 电气工程
    • 216 篇 控制科学与工程
    • 171 篇 生物工程
    • 168 篇 电子科学与技术(可...
    • 160 篇 网络空间安全
    • 130 篇 机械工程
    • 74 篇 光学工程
    • 73 篇 仪器科学与技术
    • 70 篇 生物医学工程(可授...
    • 65 篇 安全科学与工程
    • 60 篇 交通运输工程
    • 45 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 818 篇 理学
    • 514 篇 数学
    • 182 篇 生物学
    • 164 篇 物理学
    • 149 篇 统计学(可授理学、...
    • 93 篇 系统科学
    • 48 篇 化学
  • 470 篇 管理学
    • 292 篇 管理科学与工程(可...
    • 202 篇 图书情报与档案管...
    • 93 篇 工商管理
  • 100 篇 法学
    • 60 篇 社会学
    • 42 篇 法学
  • 67 篇 医学
    • 57 篇 临床医学
    • 48 篇 基础医学(可授医学...
  • 36 篇 经济学
    • 36 篇 应用经济学
  • 30 篇 军事学
  • 18 篇 农学
  • 15 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 138 篇 feature extracti...
  • 116 篇 accuracy
  • 110 篇 semantics
  • 97 篇 training
  • 94 篇 federated learni...
  • 89 篇 computational mo...
  • 77 篇 cryptography
  • 71 篇 privacy
  • 69 篇 authentication
  • 68 篇 security
  • 63 篇 data models
  • 62 篇 deep learning
  • 52 篇 robustness
  • 50 篇 object detection
  • 49 篇 protocols
  • 46 篇 optimization
  • 45 篇 information secu...
  • 44 篇 neural networks
  • 42 篇 adaptation model...
  • 41 篇 transformers

机构

  • 272 篇 key laboratory o...
  • 204 篇 shandong provinc...
  • 68 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 57 篇 guangxi key lab ...
  • 56 篇 key lab of infor...
  • 51 篇 shandong enginee...
  • 50 篇 shandong fundame...
  • 42 篇 school of comput...
  • 40 篇 shandong provinc...
  • 38 篇 school of cyber ...
  • 31 篇 college of compu...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 27 篇 college of compu...
  • 27 篇 qilu university ...
  • 26 篇 pca lab key lab ...
  • 24 篇 shandong fundame...
  • 22 篇 beijing electron...

作者

  • 72 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 24 篇 xiaoming wu
  • 23 篇 xie jin
  • 22 篇 ma jianfeng
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 liu ximeng
  • 21 篇 li xianxian
  • 20 篇 zhixin li
  • 20 篇 li hui
  • 19 篇 xianxian li
  • 18 篇 xiangzhi liu
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 di xiaoqiang
  • 16 篇 zhang yuqing

语言

  • 2,420 篇 英文
  • 397 篇 其他
  • 87 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2897 条 记 录,以下是1201-1210 订阅
排序:
Bi-level Alignment for Cross-Domain Crowd Counting
arXiv
收藏 引用
arXiv 2022年
作者: Gong, Shenjian Zhang, Shanshan Yang, Jian Dai, Dengxin Schiele, Bernt PCA Lab Key Lab of Intelligent Perception and Systems for High-Dimensional Information Ministry of Education Jiangsu Key Lab of Image and Video Understanding for Social Security School of Computer Science and Engineering Nanjing University of Science and Technology China MPI Informatics Germany
Recently, crowd density estimation has received increasing attention. The main challenge for this task is to achieve high-quality manual annotations on a large amount of training data. To avoid reliance on such annota... 详细信息
来源: 评论
An Effective Hybrid Optimization Algorithm for Static Rebalance Problem of Bicycle-Sharing System
收藏 引用
IET Intelligent Transport Systems 2025年 第1期19卷
作者: Liang, Shuhui Ye, Yutong Wu, Jingli Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guangxi Normal University Guilin China Guangxi Key Lab of Multi-Source Information Mining and Security Guangxi Normal University Guilin China School of Computer Science and Engineering Guangxi Normal University Guilin China Software Engineering Institute East China Normal University Shanghai China
Although the bicycle-sharing system plays an important role in easing urban traffic congestion and reducing carbon emissions, it still suffers from the problem of unbalanced bicycle distribution between different stat... 详细信息
来源: 评论
Time-Efficient EV Energy Management Through In-Motion V2V Charging
Time-Efficient EV Energy Management Through In-Motion V2V Ch...
收藏 引用
IEEE Conference on Vehicular Technology (VTC)
作者: Shuohan Liu Wei Zhang Yue Cao Qiang Ni Carsten Maple Hai Lin Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China School of Cyber Science and Engineering Wuhan University Wuhan China School of Computing and Communications Lancaster University Lancaster U.K. Warwick Manufacturing Group University of Warwick Coventry U.K.
In recent years, Electric Vehicles (EVs) have emerged as a sustainable alternative to internal combustion vehicles, noted for better efficiency, lower operational costs, and reduced carbon emissions. However, with the... 详细信息
来源: 评论
Unsupervised Collaborative Metric Learning with Mixed-Scale Groups for General Object Retrieval
arXiv
收藏 引用
arXiv 2024年
作者: Kan, Shichao Deng, Yuhai Liang, Yixiong Cen, Lihui Qu, Zhe Cen, Yigang He, Zhihai School of Computer Science and Engineering Central South University Hunan Changsha410083 China School of Automation Central South University Hunan Changsha410083 China Institute of Information Science School of Computer and Information Technology Beijing Jiaotong University Beijing100044 China Beijing Key Laboratory of Advanced Information Science and Network Technology Beijing100044 China Department of Electrical and Electronic Engineering Southern University of Science and Technology Shenzhen China Pengcheng Lab Shenzhen518066 China
The task of searching for visual objects in a large image dataset is difficult because it requires efficient matching and accurate localization of objects that can vary in size. Although the segment anything model (SA... 详细信息
来源: 评论
6G-Enabled Edge AI for Metaverse:Challenges, Methods,and Future Research Directions
收藏 引用
Journal of Communications and information networks 2022年 第2期7卷 107-121页
作者: Luyi Chang Zhe Zhang Pei Li Shan Xi Wei Guo Yukang Shen Zehui Xiong Jiawen Kang Dusit Niyato Xiuquan Qiao Yi Wu School of Data Science and Technology Heilongjiang UniversityHarbin 150080China Institute for Cryptology and Network Security Heilongjiang UniversityHarbin 150080China SenseTime Group Limited Shenzhen 518000China Pillar of Information Systems Technology and Design Singapore University of Technology and Design.Singapore 487372Singapore School of Automation.Guangdong University of Technology and Center for Intelligenl Batch Manufacturing based on IoT TechnologyGuangzhou 510006China School of Computer Science and Engineering Nanyang Technological UniversitySingapore 639798.Singapore State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications.Beijing 100876China
Sixth generation(6G)enabled edge intelligence opens up a new era of Internet of everything and makes it possible to interconnect people-devices-cloud anytime,*** and more next-generation wireless network smart service... 详细信息
来源: 评论
LESSON: Multi-label Adversarial False Data Injection Attack for Deep Learning Locational Detection
arXiv
收藏 引用
arXiv 2024年
作者: Tian, Jiwei Shen, Chao Wang, Buhong Xia, Xiaofang Zhang, Meng Lin, Chenhao Li, Qian Ministry of Education Key Laboratory for Intelligent Networks and Network Security School of Cyber Science and Engineering Xi’an Jiaotong University Xi’an China Air Traffic Control and Navigation College Air Force Engineering University Xi’an China Information and Navigation College Air Force Engineering University Xi’an China School of Computer Science and Technology Xidian University Xi’an China
—Deep learning methods can not only detect false data injection attacks (FDIA) but also locate attacks of FDIA. Although adversarial false data injection attacks (AFDIA) based on deep learning vulnerabilities have be... 详细信息
来源: 评论
Few-Shot Legal Knowledge Question Answering System for COVID-19 Epidemic  3
Few-Shot Legal Knowledge Question Answering System for COVID...
收藏 引用
3rd International Conference on Algorithms, Computing and Artificial Intelligence, ACAI 2020
作者: Wu, Jiaye Liu, Jie Luo, Xudong Guangxi Key Lab of Multi-Source Information Mining and Security College of Computer Science and Information Engineering Guangxi Normal University Guilin Guangxi China
Recently, the pandemic caused by COVID-19 is severe in the entire world. The prevention and control of crimes associated with COVID-19 are critical for controlling the pandemic. Therefore, to provide efficient and con... 详细信息
来源: 评论
A Survey of Sentiment Analysis Based on Machine Learning  1
收藏 引用
9th CCF International Conference on Natural Language Processing and Chinese Computing, NLPCC 2020
作者: Lin, Pingping Luo, Xudong Guangxi Key Lab of Multi-source Information Mining and Security College of Computer Science and Information Engineering Guangxi Normal University Guilin541004 China
Every day, Facebook, Twitter, Weibo and other social network sites and major e-commerce sites generate a large number of online reviews with emotions. The analysing peoples opinions from these reviews can assist a var... 详细信息
来源: 评论
A Survey of Sentiment Analysis Based on Pretrained Language Models
A Survey of Sentiment Analysis Based on Pretrained Language ...
收藏 引用
International Conference on Tools for Artificial Intelligence (ICTAI)
作者: Kaili Sun Xudong Luo Michael Y. Luo Guangxi Key Lab of Multi-source Information Mining and Security School of Computer Science and Engineering Guangxi Normal University Guilin China Emmanuel College Cambridge University Cambridge UK
Pretrained Language Models (PLMs) can be applied to downstream tasks with only fine-tuning, without learning the model from scratch. In particular, PLMs have been applied to Sentiment Analysis (SA), which detects, ana... 详细信息
来源: 评论
AIDE: Attack Inference Based on Heterogeneous Dependency Graphs with MITRE ATT&CK  23
AIDE: Attack Inference Based on Heterogeneous Dependency Gra...
收藏 引用
23rd IEEE International Conference on Trust, security and Privacy in Computing and Communications, TrustCom 2024
作者: Zhou, Weidong Xia, Chunhe Feng, Nan Pan, Xinyi Wang, Tianbo Li, Xiaojian Beihang University Beijing Key Lab. of Network Technology Beijing China Guangxi Normal University Guangxi Collab. Innovation Center of Multi-Source Information Integration and Intelligent Processing Guilin China Peking University School of Software & Microelectronics Beijing China Beihang University School of Cyber Science and Technology Beijing China Guangxi Normal University School of Computer Science and Engineering Guilin China
The MITRE ATT&CK Framework provides a rich and actionable repository of adversarial tactics, techniques, and procedures (TTPs). By leveraging the associations among these techniques, we can infer unobserved techni... 详细信息
来源: 评论