咨询与建议

限定检索结果

文献类型

  • 1,737 篇 会议
  • 1,156 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,897 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,893 篇 工学
    • 1,437 篇 计算机科学与技术...
    • 1,153 篇 软件工程
    • 516 篇 信息与通信工程
    • 238 篇 电气工程
    • 216 篇 控制科学与工程
    • 171 篇 生物工程
    • 168 篇 电子科学与技术(可...
    • 160 篇 网络空间安全
    • 130 篇 机械工程
    • 74 篇 光学工程
    • 73 篇 仪器科学与技术
    • 70 篇 生物医学工程(可授...
    • 65 篇 安全科学与工程
    • 60 篇 交通运输工程
    • 45 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 818 篇 理学
    • 514 篇 数学
    • 182 篇 生物学
    • 164 篇 物理学
    • 149 篇 统计学(可授理学、...
    • 93 篇 系统科学
    • 48 篇 化学
  • 470 篇 管理学
    • 292 篇 管理科学与工程(可...
    • 202 篇 图书情报与档案管...
    • 93 篇 工商管理
  • 100 篇 法学
    • 60 篇 社会学
    • 42 篇 法学
  • 67 篇 医学
    • 57 篇 临床医学
    • 48 篇 基础医学(可授医学...
  • 36 篇 经济学
    • 36 篇 应用经济学
  • 30 篇 军事学
  • 18 篇 农学
  • 15 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 138 篇 feature extracti...
  • 116 篇 accuracy
  • 110 篇 semantics
  • 97 篇 training
  • 94 篇 federated learni...
  • 89 篇 computational mo...
  • 77 篇 cryptography
  • 71 篇 privacy
  • 69 篇 authentication
  • 68 篇 security
  • 63 篇 data models
  • 62 篇 deep learning
  • 52 篇 robustness
  • 50 篇 object detection
  • 49 篇 protocols
  • 46 篇 optimization
  • 45 篇 information secu...
  • 44 篇 neural networks
  • 42 篇 adaptation model...
  • 41 篇 transformers

机构

  • 272 篇 key laboratory o...
  • 204 篇 shandong provinc...
  • 68 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 57 篇 guangxi key lab ...
  • 56 篇 key lab of infor...
  • 51 篇 shandong enginee...
  • 50 篇 shandong fundame...
  • 42 篇 school of comput...
  • 40 篇 shandong provinc...
  • 38 篇 school of cyber ...
  • 31 篇 college of compu...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 27 篇 college of compu...
  • 27 篇 qilu university ...
  • 26 篇 pca lab key lab ...
  • 24 篇 shandong fundame...
  • 22 篇 beijing electron...

作者

  • 72 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 24 篇 xiaoming wu
  • 23 篇 xie jin
  • 22 篇 ma jianfeng
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 liu ximeng
  • 21 篇 li xianxian
  • 20 篇 zhixin li
  • 20 篇 li hui
  • 19 篇 xianxian li
  • 18 篇 xiangzhi liu
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 di xiaoqiang
  • 16 篇 zhang yuqing

语言

  • 2,420 篇 英文
  • 397 篇 其他
  • 87 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2897 条 记 录,以下是1231-1240 订阅
排序:
A residual attention-based privacy-preserving biometrics model of transcriptome prediction from genome
A residual attention-based privacy-preserving biometrics mod...
收藏 引用
IEEE International Conference on Trust, security and Privacy in Computing and Communications (TrustCom)
作者: Cheng Tian Song Liu Jinbao Li Guangchen Wang Luyue Kong Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Department of Medicine Shandong Medical College Jinan China
Transcriptome prediction from genetic variation data is an important task in the privacy-preserving and biometrics field, which can better protect genomic data and achieve biometric recognition through transcriptome. ... 详细信息
来源: 评论
ATHENA: An In-vehicle CAN Intrusion Detection Framework Based on Physical Characteristics of Vehicle Systems
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Kai Sun, Zhen Wang, Bailing Fan, Qilin Li, Ming Zhang, Hongke School of Computer Science and Technology Harbin Institute of Technology Weihai China Shandong Key Laboratory of Industrial Network Security China School of Big Data and Software Engineering Chongqing University Chongqing China Key Laboratory of Dependable Service Computing in Cyber Physical Society of Ministry of Education Chongqing University Chongqing China Jinan Key Laboratory of Distributed Databases Shandong Inspur Database Technology Co. Ltd Jinan China School of Electronic and Information Engineering Beijing Jiaotong University Beijing China
With the growing interconnection between In-Vehicle networks (IVNs) and external environments, intelligent vehicles are increasingly vulnerable to sophisticated external network attacks. This paper proposes ATHENA, th... 详细信息
来源: 评论
Contact angle measurement on curved wetting surface in multiphase lattice Boltzmann method
arXiv
收藏 引用
arXiv 2022年
作者: Liu, Yangsha Yao, Yichen Li, Quanying Wen, Binghai Guangxi Key Lab of Multi-Source Information Mining & Security Guangxi Normal University Guilin541004 China School of Computer Science and Engineering Guangxi Normal University Guilin541004 China
Contact angle is an essential physical quantity that characterizes the wettability of a substrate. Although it is widely used in the studies of surface wetting, capillary phenomena and moving contact lines, measuring ... 详细信息
来源: 评论
TPM, a pattern for an architecture for trusted computing  20
TPM, a pattern for an architecture for trusted computing
收藏 引用
2020 European Conference on Pattern Languages of Programs, EuroPLoP 2020
作者: Muñoz, Antonio Fernandez, Eduardo B. Network Information and Computer Security Lab University of Malaga Malaga Spain Dept. of Computer and Electrical Eng. and Computer Science Florida Atlantic University Boca RatonFL United States
Trusted Computing (TC) is a valuable technology to use when we need to process highly sensitive data and several variants of it are now available. We present here a pattern that describes the architecture of a standar... 详细信息
来源: 评论
Adaptive Perception for Unified Visual Multi-modal Object Tracking
arXiv
收藏 引用
arXiv 2025年
作者: Hu, Xiantao Zhong, Bineng Liang, Qihua Mo, Zhiyi Shi, Liangtao Tai, Ying Yang, Jian Guangxi Key Lab of Multi-Source Information Mining & Security Guangxi Normal University Guilin541004 China School of Data Science and Software Engineering Wuzhou University Wuzhou543002 China School of intelligence Science and Technonolgy Nanjing University Nanjing210008 China PCA-Lab School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing210094 China
Recently, many multi-modal trackers prioritize RGB as the dominant modality, treating other modalities as auxiliary, and fine-tuning separately various multi-modal tasks. This imbalance in modality dependence limits t... 详细信息
来源: 评论
Spurious currents suppression by accurate difference schemes in multiphase lattice Boltzmann method
arXiv
收藏 引用
arXiv 2022年
作者: Qin, Zhangrong Chen, Wenbo Qin, Chunyan Xu, Xin Wen, Binghai Guangxi Key Lab of Multi-Source Information Mining & Security Guangxi Normal University Guilin541004 China School of Computer Science and Engineering Guangxi Normal University Guilin541004 China
Spurious currents, which are often observed near a curved interface in the multiphase simulations by diffuse interface methods, are unphysical phenomena and usually damage the computational accuracy and stability. In ... 详细信息
来源: 评论
Heterogeneous Graph Convolution Based on In-Domain Self-Supervision for Multimodal Sentiment Analysis
SSRN
收藏 引用
SSRN 2022年
作者: Zeng, Yufei Li, Zhixin Tang, Zhenjun Chen, Zhenbin Ma, Huifang Guangxi Key Lab of Multi-source Information Mining and Security Guangxi Normal University Guilin541004 China College of Computer Science and Engineering Northwest Normal University Lanzhou730070 China
The inability to fully exploit domain-specific knowledge and the lack of an effective integration method have been the difficulties and focus of multimodal sentiment analysis. In this paper, we propose heterogeneous g... 详细信息
来源: 评论
Multiphase curved boundary condition in lattice Boltzmann method
arXiv
收藏 引用
arXiv 2022年
作者: Yao, Yichen Liu, Yangsha Zhong, Xingguo Wen, Binghai Guangxi Key Lab of Multi-Source Information Mining & Security Guangxi Normal University Guilin541004 China School of Computer Science and Engineering Guangxi Normal University Guilin541004 China
The boundary treatment is fundamental for modeling fluid flows;especially, in the lattice Boltzmann method, the curved boundary conditions effectively improve the accuracy of single-phase simulations with complex-geom... 详细信息
来源: 评论
Fine-Grained Bidirectional Attentional Generation and Knowledge-Assisted networks for Cross-Modal Retrieval
SSRN
收藏 引用
SSRN 2022年
作者: Zhu, Jianwei Li, Zhixin Wei, Jiahui Zeng, Yufei Ma, Huifang Guangxi Key Lab of Multi-source Information Mining and Security Guangxi Normal University Guilin541004 China College of Computer Science and Engineering Northwest Normal University Lanzhou730070 China
Generally, most existing cross-modal retrieval methods only consider global or local semantic embeddings, lacking fine-grained dependencies between objects. At the same time, it is usually ignored that the mutual tran... 详细信息
来源: 评论
Active control of particle position by boundary slip in inertial microuidics
arXiv
收藏 引用
arXiv 2022年
作者: Xuan, Chengliang Liang, Weiyin He, Bing Wen, Binghai Guangxi Key Lab Of Multi-Source Information Mining & Security Guangxi Normal University Guilin541004 China School Of Computer Science And Engineering Guangxi Normal University Guilin541004 China
Inertial microfluidic is able to focus and separate particles in microchannels based on the characteristic geometry and intrinsic hydrodynamic effect. Yet, the vertical position of suspended particles in the microchan... 详细信息
来源: 评论