咨询与建议

限定检索结果

文献类型

  • 1,737 篇 会议
  • 1,156 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,897 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,893 篇 工学
    • 1,437 篇 计算机科学与技术...
    • 1,153 篇 软件工程
    • 516 篇 信息与通信工程
    • 238 篇 电气工程
    • 216 篇 控制科学与工程
    • 171 篇 生物工程
    • 168 篇 电子科学与技术(可...
    • 160 篇 网络空间安全
    • 130 篇 机械工程
    • 74 篇 光学工程
    • 73 篇 仪器科学与技术
    • 70 篇 生物医学工程(可授...
    • 65 篇 安全科学与工程
    • 60 篇 交通运输工程
    • 45 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 818 篇 理学
    • 514 篇 数学
    • 182 篇 生物学
    • 164 篇 物理学
    • 149 篇 统计学(可授理学、...
    • 93 篇 系统科学
    • 48 篇 化学
  • 470 篇 管理学
    • 292 篇 管理科学与工程(可...
    • 202 篇 图书情报与档案管...
    • 93 篇 工商管理
  • 100 篇 法学
    • 60 篇 社会学
    • 42 篇 法学
  • 67 篇 医学
    • 57 篇 临床医学
    • 48 篇 基础医学(可授医学...
  • 36 篇 经济学
    • 36 篇 应用经济学
  • 30 篇 军事学
  • 18 篇 农学
  • 15 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 138 篇 feature extracti...
  • 116 篇 accuracy
  • 110 篇 semantics
  • 97 篇 training
  • 94 篇 federated learni...
  • 89 篇 computational mo...
  • 77 篇 cryptography
  • 71 篇 privacy
  • 69 篇 authentication
  • 68 篇 security
  • 63 篇 data models
  • 62 篇 deep learning
  • 52 篇 robustness
  • 50 篇 object detection
  • 49 篇 protocols
  • 46 篇 optimization
  • 45 篇 information secu...
  • 44 篇 neural networks
  • 42 篇 adaptation model...
  • 41 篇 transformers

机构

  • 272 篇 key laboratory o...
  • 204 篇 shandong provinc...
  • 68 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 57 篇 guangxi key lab ...
  • 56 篇 key lab of infor...
  • 51 篇 shandong enginee...
  • 50 篇 shandong fundame...
  • 42 篇 school of comput...
  • 40 篇 shandong provinc...
  • 38 篇 school of cyber ...
  • 31 篇 college of compu...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 27 篇 college of compu...
  • 27 篇 qilu university ...
  • 26 篇 pca lab key lab ...
  • 24 篇 shandong fundame...
  • 22 篇 beijing electron...

作者

  • 72 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 24 篇 xiaoming wu
  • 23 篇 xie jin
  • 22 篇 ma jianfeng
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 liu ximeng
  • 21 篇 li xianxian
  • 20 篇 zhixin li
  • 20 篇 li hui
  • 19 篇 xianxian li
  • 18 篇 xiangzhi liu
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 di xiaoqiang
  • 16 篇 zhang yuqing

语言

  • 2,420 篇 英文
  • 397 篇 其他
  • 87 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2897 条 记 录,以下是1241-1250 订阅
排序:
Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples
Securely Fine-tuning Pre-trained Encoders Against Adversaria...
收藏 引用
IEEE Symposium on security and Privacy
作者: Ziqi Zhou Minghui Li Wei Liu Shengshan Hu Yechao Zhang Wei Wan Lulu Xue Leo Yu Zhang Dezhong Yao Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University
With the evolution of self-supervised learning, the pre-training paradigm has emerged as a predominant solution within the deep learning landscape. Model providers furnish pre-trained encoders designed to function as ... 详细信息
来源: 评论
Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability
Why Does Little Robustness Help? A Further Step Towards Unde...
收藏 引用
IEEE Symposium on security and Privacy
作者: Yechao Zhang Shengshan Hu Leo Yu Zhang Junyu Shi Minghui Li Xiaogeng Liu Wei Wan Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University School of Software Engineering Huazhong University of Science and Technology Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology
Adversarial examples for deep neural networks (DNNs) are transferable: examples that successfully fool one white-box surrogate model can also deceive other black-box models with different architectures. Although a bun... 详细信息
来源: 评论
Effcient poisoning attacks and defenses for unlabeled data in DDoS prediction of intelligent transportation systems
Security and Safety
收藏 引用
security and Safety 2022年 第1期1卷 145-165页
作者: Zhong Li Xianke Wu Changjun Jiang College of Information Science and Technology Donghua UniversityShanghai 201620China Key Laboratory of the Ministry of Education for Embedded System and Service Computing Department of Computer ScienceTongji UniversityShanghai 201804China Shanghai Network Financial Security Collaborative Innovation Center Tongji UniversityShanghai 201804China
Nowadays,large numbers of smart sensors(e.g.,road-side cameras)which com-municate with nearby base stations could launch distributed denial of services(DDoS)attack storms in intelligent transportation *** attacks disa... 详细信息
来源: 评论
Zero-pole cancellation for identity-based aggregators:a constant-size designated verifier-set signature
收藏 引用
Frontiers of computer Science 2020年 第4期14卷 197-210页
作者: E CHEN Yan ZHU Changlu LIN Kewei LV School of Computer and Communication Engineering University of Science and Technology BeijingBeijing100083China College of Mathematics and Informatics Fujian Normal UniversityFuzhou350117China Fujian Provincial Key Lab of Network Security&Cryptology Fujian Normal UniversityFuzhou350007China Institute of Information Engineering DCS Research CenterChinese Academy of SciencesBeijing100093China
In this paper we present a designated verifier-set signature(DVSS),in which the signer allows to designate many verifiers rather than one verifier,and each designated verifier can verify the validity of signature by *... 详细信息
来源: 评论
Modeling Layout Reading Order as Ordering Relations for Visually-rich Document Understanding
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Chong Tu, Yi Zhao, Yixi Yuan, Chenshu Chen, Huan Zhang, Yue Chai, Mingxu Guo, Ya Zhu, Huijia Zhang, Qi Gui, Tao School of Computer Science Fudan University Shanghai China Shanghai Key Laboratory of Intelligent Information Processing Shanghai China Ant Tiansuan Security Lab Ant Group Hangzhou China School of Statistics and Data Science Nankai University Tianjin China Institute of Modern Languages and Linguistics Fudan University Shanghai China
Modeling and leveraging layout reading order in visually-rich documents (VrDs) is critical in document intelligence as it captures the rich structure semantics within documents. Previous works typically formulated lay... 详细信息
来源: 评论
MISA: Unveiling the Vulnerabilities in Split Federated Learning
MISA: Unveiling the Vulnerabilities in Split Federated Learn...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Wei Wan Yuxuan Ning Shengshan Hu Lulu Xue Minghui Li Leo Yu Zhang Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Computer Science and Technology Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University Cluster and Grid Computing Lab
Federated learning (FL) and split learning (SL) are prevailing distributed paradigms in recent years. They both enable shared global model training while keeping data localized on users’ devices. The former excels in...
来源: 评论
A Hierarchical Semantic Distillation Framework for Open-Vocabulary Object Detection
arXiv
收藏 引用
arXiv 2025年
作者: Fu, Shenghao Yan, Junkai Yang, Qize Wei, Xihan Xie, Xiaohua Zheng, Wei-Shi School of Computer Science and Engineering Sun Yat-sen University Guangzhou510006 China Peng Cheng Laboratory China Tongyi Lab Alibaba Group China School of Computer Science and Engineering Sun Yat-sen University Guangdong Guangzhou China Guangdong Key Laboratory of Information Security Technology Sun Yat-sen University Guangdong Guangzhou China Key Laboratory of Machine Intelligence and Advanced Computing Sun Yat-sen University Ministry of Education Guangdong Guangzhou China
Open-vocabulary object detection (OVD) aims to detect objects beyond the training annotations, where detectors are usually aligned to a pre-trained vision-language model, e.g., CLIP, to inherit its generalizable recog... 详细信息
来源: 评论
Towards Fair Graph Representation Learning in Social networks
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Guixian Yuan, Guan Cheng, Debo Liu, Lin Li, Jiuyong Zhang, Shichao School of Computer Science and Technology Mine Digitisation Engineering Research Center The Ministry of Education China University of Mining and Technology Jiangsu Xuzhou China UniSA STEM University of South Australia AdelaideSA Australia Guangxi Key Lab of Multisource Information Mining & Security Guangxi Normal University Guangxi Guilin China
With the widespread use of Graph Neural networks (GNNs) for representation learning from network data, the fairness of GNN models has raised great attention lately. Fair GNNs aim to ensure that node representations ca... 详细信息
来源: 评论
Multi-class label Noise Learning via Loss Decomposition and Centroid Estimation
arXiv
收藏 引用
arXiv 2022年
作者: Ding, Yongliang Zhou, Tao Zhang, Chuang Luo, Yijing Tang, Juan Gong, Chen PCA Lab The Key Laboratory of Intelligent Perceptron and Systems for High-Dimensional Information of Ministry of Education School of Computer Science and Engineering Nanjing University of Science and Technology China Jiangsu Key Lab of Image and Video Understanding for Social Security School of Computer Science and Cyber Engineering Guangzhou University China
In real-world scenarios, many large-scale datasets often contain inaccurate labels, i.e., noisy labels, which may confuse model training and lead to performance degradation. To overcome this issue, label Noise Learnin... 详细信息
来源: 评论
NumbOD: A Spatial-Frequency Fusion Attack Against Object Detectors
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Ziqi Li, Bowen Song, Yufei Yu, Zhifei Hu, Shengshan Wan, Wei Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
With the advancement of deep learning, object detectors (ODs) with various architectures have achieved significant success in complex scenarios like autonomous driving. Previous adversarial attacks against ODs have be... 详细信息
来源: 评论