咨询与建议

限定检索结果

文献类型

  • 1,737 篇 会议
  • 1,156 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,897 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,893 篇 工学
    • 1,437 篇 计算机科学与技术...
    • 1,153 篇 软件工程
    • 516 篇 信息与通信工程
    • 238 篇 电气工程
    • 216 篇 控制科学与工程
    • 171 篇 生物工程
    • 168 篇 电子科学与技术(可...
    • 160 篇 网络空间安全
    • 130 篇 机械工程
    • 74 篇 光学工程
    • 73 篇 仪器科学与技术
    • 70 篇 生物医学工程(可授...
    • 65 篇 安全科学与工程
    • 60 篇 交通运输工程
    • 45 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 818 篇 理学
    • 514 篇 数学
    • 182 篇 生物学
    • 164 篇 物理学
    • 149 篇 统计学(可授理学、...
    • 93 篇 系统科学
    • 48 篇 化学
  • 470 篇 管理学
    • 292 篇 管理科学与工程(可...
    • 202 篇 图书情报与档案管...
    • 93 篇 工商管理
  • 100 篇 法学
    • 60 篇 社会学
    • 42 篇 法学
  • 67 篇 医学
    • 57 篇 临床医学
    • 48 篇 基础医学(可授医学...
  • 36 篇 经济学
    • 36 篇 应用经济学
  • 30 篇 军事学
  • 18 篇 农学
  • 15 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 138 篇 feature extracti...
  • 116 篇 accuracy
  • 110 篇 semantics
  • 97 篇 training
  • 94 篇 federated learni...
  • 89 篇 computational mo...
  • 77 篇 cryptography
  • 71 篇 privacy
  • 69 篇 authentication
  • 68 篇 security
  • 63 篇 data models
  • 62 篇 deep learning
  • 52 篇 robustness
  • 50 篇 object detection
  • 49 篇 protocols
  • 46 篇 optimization
  • 45 篇 information secu...
  • 44 篇 neural networks
  • 42 篇 adaptation model...
  • 41 篇 transformers

机构

  • 272 篇 key laboratory o...
  • 204 篇 shandong provinc...
  • 68 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 57 篇 guangxi key lab ...
  • 56 篇 key lab of infor...
  • 51 篇 shandong enginee...
  • 50 篇 shandong fundame...
  • 42 篇 school of comput...
  • 40 篇 shandong provinc...
  • 38 篇 school of cyber ...
  • 31 篇 college of compu...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 27 篇 college of compu...
  • 27 篇 qilu university ...
  • 26 篇 pca lab key lab ...
  • 24 篇 shandong fundame...
  • 22 篇 beijing electron...

作者

  • 72 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 24 篇 xiaoming wu
  • 23 篇 xie jin
  • 22 篇 ma jianfeng
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 liu ximeng
  • 21 篇 li xianxian
  • 20 篇 zhixin li
  • 20 篇 li hui
  • 19 篇 xianxian li
  • 18 篇 xiangzhi liu
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 di xiaoqiang
  • 16 篇 zhang yuqing

语言

  • 2,420 篇 英文
  • 397 篇 其他
  • 87 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2897 条 记 录,以下是1221-1230 订阅
排序:
Mining Unseen Classes via Regional Objectness: A Simple Baseline for Incremental Segmentation
arXiv
收藏 引用
arXiv 2022年
作者: Zhang, Zekang Gao, Guangyu Fang, Zhiyuan Jiao, Jianbo Wei, Yunchao School of Computer Science Beijing Institute of Technology China School of Computer Science University of Birmingham United Kingdom WEI Lab Institute of Information Science Beijing Jiaotong University China Beijing Key Laboratory of Advanced Information Science and Network China
Incremental or continual learning has been extensively studied for image classification tasks to alleviate catastrophic forgetting, a phenomenon that earlier learned knowledge is forgotten when learning new concepts. ... 详细信息
来源: 评论
Dynamic Power Distribution Controlling for Directional Chargers
Dynamic Power Distribution Controlling for Directional Charg...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: Yuzhuo Ma Dié Wu Jing Gao Wen Sun Jilin Yang Tang Liu College of Computer Science Sichuan Normal University Chengdu China Visual Computing and Virtual Reality Key Lab Sichuan Normal University Chengdu China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China School of Cyberspace Security Northwestern Polytechnical University Xi’an China
Recently, deploying static chargers to construct timely and robust Wireless Rechargeable Sensor networks (WRSNs) has become an important research issue for solving the limited energy problem of wireless sensor network... 详细信息
来源: 评论
A Secure key-Aggregate keyword Retrieval Scheme Over Encrypted Data in Cloud Computing
收藏 引用
IEEE Access 2024年 1-1页
作者: Lou, Chunwei Cao, Mingsheng Luo, Yaohua Xu, Hua Gao, Yuan Wang, Weiwei Wang, Dong University of Electronic Science and Technology of China Chengdu 611731 China Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Chengdu 611731 China School of Information Science and Technology Chengdu University of Technology Chengdu 610059 China School of Physics and Electronic Engineering Yancheng Teachers University Yancheng 224007 China China Academy of Railway Sciences Beijing 100081 China School of Computer Science and Engineering and the Center for Cyber Security University of Electronic Science and Technology of China Chengdu 611731 China
key-aggregate keyword retrieval primitive enables a cloud server on behalf of delegated users to securely perform a keyword search over the data encrypted with various public keys. However, existing key-aggregate sear... 详细信息
来源: 评论
Direct Participant Recruitment Strategy in Sparse Mobile Crowdsensing
收藏 引用
Jisuanji Xuebao/Chinese Journal of computers 2022年 第7期45卷 1539-1556页
作者: Tu, Chun-Yu Yu, Zhi-Yong Han, Lei Zhu, Wei-Ping Huang, Fang-Wan Guo, Wen-Zhong Wang, Le-Ye College of Mathematics and Computer Science Fuzhou University Fuzhou350108 China Department of Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou350108 China School of Computer Science Northwestern Polytechnical University Xi'an710072 China Key Lab of High Confidence Software Technologies Peking University Beijing100871 China School of Computer Science Peking University Beijing100871 China
Sparse Mobile Crowdsensing (Sparse MCS) selects a small part of sub-areas for data collection and infers the data of other sub-areas from the collected data. Compared with Mobile Crowdsensing (MCS) that does not use d... 详细信息
来源: 评论
Location Privacy-Preserving Method Based on Degree of Semantic Distribution Similarity  6th
Location Privacy-Preserving Method Based on Degree of Semant...
收藏 引用
6th International Conference of Pioneering computer Scientists, Engineers and Educators, ICPCSEE 2020
作者: Liu, Rui Zuo, Kaizhong Wang, Yonglu Zhao, Jun College of Computer and Information Anhui Normal University WuhuAnhui241002 China Anhui Provincial Key Laboratory of Network and Information Security Anhui Normal University WuhuAnhui241002 China
While enjoying the convenience brought by location-based services, mobile users also face the risk of leakage of location privacy. Therefore, it is necessary to protect location privacy. Most existing privacy-preservi... 详细信息
来源: 评论
A Drug Box Recognition System Based on Deep Learning and Cloud-Edge Collaboration for Pharmacy Automation
A Drug Box Recognition System Based on Deep Learning and Clo...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Honglei Zhu Anming Dong Jiguo Yu Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Key Laboratory of Computing Power Network and Information Security Qilu University of Technology (Shandong Academy of Sciences) Jinan China School of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Big Data Institute Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Drug box recognition is an integral part of the pharmacy automation system (PAS), which checks for discrepancies between the drugs provided by the system and the doctor’s prescription with the help of modern image re...
来源: 评论
Efficient Adaptive label Refinement for label Noise Learning
arXiv
收藏 引用
arXiv 2025年
作者: Zhang, Wenzhen Cheng, Debo Lu, Guangquan Zhou, Bo Li, Jiaye Zhang, Shichao School of Computer Science and Engineering Guangxi Normal University Guangxi Guilin541004 China Guangxi Key Lab of Multi-Source Information Mining & Security Guangxi Normal University Guangxi Guilin541004 China Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guangxi Normal University Guangxi Guilin541004 China UniSA STEM University of South Australia AdelaideSA5095 Australia Guangxi Collaborative Innovation Center of Modern Sericulture and Silk Hechi University Guangxi Hechi546300 China The State Key Laboratory of Blockchain and Data Security Zhejiang University Zhejiang Hangzhou310027 China
Deep neural networks are highly susceptible to overfitting noisy labels, which leads to degraded performance. Existing methods address this issue by employing manually defined criteria, aiming to achieve optimal parti... 详细信息
来源: 评论
Robustness and Privacy for Green Learning under Noisy labels
Robustness and Privacy for Green Learning under Noisy Labels
收藏 引用
IEEE International Conference on Trust, security and Privacy in Computing and Communications (TrustCom)
作者: De Li Tiange Xia Qiyu Li Xianxian Li Jinyan Wang Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guangxi Normal University Guilin China Guangxi Key Lab of Multi-Source Information Mining & Security Guangxi Normal University Guilin China School of Computer Science and Engineering Guangxi Normal University Guilin China Faculty of Education Guangxi Normal University Guilin China
As a new paradigm of machine learning, green learning has achieved performance comparable to deep learning in vision tasks, knowledge graph learning, and modeling graph structures. Compared with deep learning, green l... 详细信息
来源: 评论
A Trajectory Tracking System for Zebrafish Based on Embedded Edge Artificial Intelligence
A Trajectory Tracking System for Zebrafish Based on Embedded...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Chuanhao Zang Anming Dong Jiguo Yu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China School of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Big Data Institute Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Trajectory tracking of zebrafish is an important requirement in studying neurological disorders and developing new psychoactive drug. However, many challenges emerge for stable tracking, since zebrafish are similar in...
来源: 评论
Frozen-DETR: enhancing DETR with image understanding from frozen foundation models  24
Frozen-DETR: enhancing DETR with image understanding from fr...
收藏 引用
Proceedings of the 38th International Conference on Neural information Processing Systems
作者: Shenghao Fu Junkai Yan Qize Yang Xihan Wei Xiaohua Xie Wei-Shi Zheng School of Computer Science and Engineering Sun Yat-sen University China and Tongyi Lab Alibaba Group and Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China Tongyi Lab Alibaba Group School of Computer Science and Engineering Sun Yat-sen University China and Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China and Guangdong Province Key Laboratory of Information Security Technology China School of Computer Science and Engineering Sun Yat-sen University China and Peng Cheng Laboratory Shenzhen China and Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China and Pazhou Laboratory (Huangpu) Guangzhou Guangdong China
Recent vision foundation models can extract universal representations and show impressive abilities in various tasks. However, their application on object detection is largely overlooked, especially without fine-tunin...
来源: 评论