咨询与建议

限定检索结果

文献类型

  • 1,737 篇 会议
  • 1,156 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,897 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,893 篇 工学
    • 1,437 篇 计算机科学与技术...
    • 1,153 篇 软件工程
    • 516 篇 信息与通信工程
    • 238 篇 电气工程
    • 216 篇 控制科学与工程
    • 171 篇 生物工程
    • 168 篇 电子科学与技术(可...
    • 160 篇 网络空间安全
    • 130 篇 机械工程
    • 74 篇 光学工程
    • 73 篇 仪器科学与技术
    • 70 篇 生物医学工程(可授...
    • 65 篇 安全科学与工程
    • 60 篇 交通运输工程
    • 45 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 818 篇 理学
    • 514 篇 数学
    • 182 篇 生物学
    • 164 篇 物理学
    • 149 篇 统计学(可授理学、...
    • 93 篇 系统科学
    • 48 篇 化学
  • 470 篇 管理学
    • 292 篇 管理科学与工程(可...
    • 202 篇 图书情报与档案管...
    • 93 篇 工商管理
  • 100 篇 法学
    • 60 篇 社会学
    • 42 篇 法学
  • 67 篇 医学
    • 57 篇 临床医学
    • 48 篇 基础医学(可授医学...
  • 36 篇 经济学
    • 36 篇 应用经济学
  • 30 篇 军事学
  • 18 篇 农学
  • 15 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 138 篇 feature extracti...
  • 116 篇 accuracy
  • 110 篇 semantics
  • 97 篇 training
  • 94 篇 federated learni...
  • 89 篇 computational mo...
  • 77 篇 cryptography
  • 71 篇 privacy
  • 69 篇 authentication
  • 68 篇 security
  • 63 篇 data models
  • 62 篇 deep learning
  • 52 篇 robustness
  • 50 篇 object detection
  • 49 篇 protocols
  • 46 篇 optimization
  • 45 篇 information secu...
  • 44 篇 neural networks
  • 42 篇 adaptation model...
  • 41 篇 transformers

机构

  • 272 篇 key laboratory o...
  • 204 篇 shandong provinc...
  • 68 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 57 篇 guangxi key lab ...
  • 56 篇 key lab of infor...
  • 51 篇 shandong enginee...
  • 50 篇 shandong fundame...
  • 42 篇 school of comput...
  • 40 篇 shandong provinc...
  • 38 篇 school of cyber ...
  • 31 篇 college of compu...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 27 篇 college of compu...
  • 27 篇 qilu university ...
  • 26 篇 pca lab key lab ...
  • 24 篇 shandong fundame...
  • 22 篇 beijing electron...

作者

  • 72 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 24 篇 xiaoming wu
  • 23 篇 xie jin
  • 22 篇 ma jianfeng
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 liu ximeng
  • 21 篇 li xianxian
  • 20 篇 zhixin li
  • 20 篇 li hui
  • 19 篇 xianxian li
  • 18 篇 xiangzhi liu
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 di xiaoqiang
  • 16 篇 zhang yuqing

语言

  • 2,420 篇 英文
  • 397 篇 其他
  • 87 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2897 条 记 录,以下是1251-1260 订阅
排序:
Tile Classification Based Viewport Prediction with Multi-modal Fusion Transformer
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Zhihao Chen, Yiwei Zhang, Weizhan Yan, Caixia Zheng, Qinghua Wang, Qi Chen, Wangdu School of Computer Science and Technology Xi'an Jiaotong University Key Laboratory of Intelligent Networks and Network Security Ministry of Education Xi'an Jiaotong University Xi’an China School of Computer Science and Technology Xi'an Jiaotong University & National Engineering Lab for Big Data Analytics Xi'an Jiaotong University Xi’an China MIGU Video Shanghai China
Viewport prediction is a crucial aspect of tile-based 360◦ video streaming system. However, existing trajectory based methods lack of robustness, also oversimplify the process of information construction and fusion be... 详细信息
来源: 评论
Multi-classification of Android Applications Based on Convolutional Neural networks  20
Multi-classification of Android Applications Based on Convol...
收藏 引用
4th International Conference on computer Science and Application Engineering, CSAE 2020
作者: Wang, Zhiqiang Li, Gefei Chi, Yaping Beijing Electronic Science and Technology Institute Beijing China and State Information Center and Key Lab of Information Network Security Ministry of Public Security Beijing China State Information Center Beijing China Beijing Electronic Science and Technology Institute Beijing China
Google Play App Store, Huawei App Market, Xiaomi App Store, etc. are the main sources for users to download applications. The application category classification is usually based on the category specified by the devel... 详细信息
来源: 评论
Graph Structure Guided Transformer for Semantic Segmentation
Graph Structure Guided Transformer for Semantic Segmentation
收藏 引用
International Conference on Tools for Artificial Intelligence (ICTAI)
作者: Luyang Qian Canlong Zhang Zhixin Li Zhiwen Wang School of Computer Science and Engineering Guangxi Normal University Guilin China Guangxi Key Lab of Multi-source Information Mining & Security Guilin China School of Computer Science and Technology Guangxi University of Science and Technology Liuzhou China
Segmentation is an essential operation of image processing, and utilizing long-range context information is the key for pixel-wise prediction tasks such as semantic segmentation. Convolutional Neural networks (CNNs) a... 详细信息
来源: 评论
Identifying driver genes in cancer based on Pareto optimality consensus
Identifying driver genes in cancer based on Pareto optimalit...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Zheng Deng Jingli Wu Xiaorong Chen Gaoshi Li College of Computer Science Information Technology Guangxi Normal University Guilin China Guangxi Key Lab of Multi-source Information Mining & Security Guangxi Normal University Guilin China Guangxi Key Laboratory of Machine Vision Intelligent Control Wuzhou University Wuzhou China
An important issue in cancer genomics is the identification of driver genes. It is significant for the discovery of key biomarkers and the development of effective personalized therapies. In this paper, a computated m... 详细信息
来源: 评论
Deepfake Detection: A Comprehensive Survey from the Reliability Perspective
arXiv
收藏 引用
arXiv 2022年
作者: Wang, Tianyi Liao, Xin Chow, Kam Pui Lin, Xiaodong Wang, Yinglong Department of Computer Science The University of Hong Kong Hong Kong College of Computer Science and Electronic Engineering Hunan University China School of Computer Science University of Guelph Canada Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology Shandong Academy of Sciences China
The mushroomed Deepfake synthetic materials circulated on the internet have raised a profound social impact on politicians, celebrities, and individuals worldwide. In this survey, we provide a thorough review of the e... 详细信息
来源: 评论
Motion compensation and object detection for neuromorphic camera
Motion compensation and object detection for neuromorphic ca...
收藏 引用
2021 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2021
作者: Wan, Yuxin Fei, Rong Tang, Yu Bai, Xueru Xie, Guo Li, Aimin Xi'An University of Technology School of Computer Science and Engineering Xi'an China Xi'An University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology School of Computer Science and Engineering Xi'an China Xidian University Guangzhou Institute Guangzhou China Xi'An University of Technology School of Computer Science and Engineering Xi'an China Xi'An University of Technology School of Automation and Information Engineering Xi'an China
Compared to conventional cameras, the new type of vision camera-neuromorphic cameras, which can avoid motion blur and have the advantages of high spatiotemporal resolution, high dynamic range, low latency, etc. In thi... 详细信息
来源: 评论
ATEDU-NET: An Attention-Embedded Deep Unet for multi-disease diagnosis in chest X-ray images, breast ultrasound, and retina fundus
收藏 引用
computers in Biology and Medicine 2025年 186卷 109708-109708页
作者: Ejiyi, Chukwuebuka Joseph Qin, Zhen Agbesi, Victor K. Ejiyi, Makuachukwu Bennedith Chikwendu, Ijeoma A. Bamisile, Oluwatoyosi F. Onyekwere, Favour Ezinne Bamisile, Olusola O. College of Nuclear Technology and Automation Engineering Chengdu University of Technology Sichuan 610059 China Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Sichuan Chengdu China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China Pharmacy Department University of Nigeria Nsukka Enugu State Nsukka Nigeria School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu China
In image segmentation for medical image analysis, effective upsampling is crucial for recovering spatial information lost during downsampling. This challenge becomes more pronounced when dealing with diverse medical i... 详细信息
来源: 评论
An edge enhancement-based fusion method of infrared and visible images in low light
An edge enhancement-based fusion method of infrared and visi...
收藏 引用
Signal, information and Data Processing (ICSIDP), IEEE International Conference on
作者: Xiang Gao Xiyan Wang Hanbin Bao Qian Li Guohua Lv Faculty of Comupter Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Bresee Technology Co. Ltd. Jinan China Shandong Grain Group Co. Ltd. Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
The combination of infrared and visible images can result in the generation of a single image with a high degree of detail and important targets in a variety of scenes, which is beneficial for human recognition. Howev... 详细信息
来源: 评论
Multi-keyword Cipher-text Retrieval Method for Smart Grid Edge Computing  3
Multi-keyword Cipher-text Retrieval Method for Smart Grid Ed...
收藏 引用
2020 3rd International Symposium on Power Electronics and Control Engineering, ISPECE 2020
作者: Zhu, Jing Wu, Tao Li, Jintao Liu, Yanbin Jiang, Qixin School of Communication and Information Engineering Chongqing University of Posts and Telecommunications China School of Cybersecurity and Information Law Chongqing University of Posts and Telecommunications Chongqing China School of Computer Science Chongqing University of Posts and Telecommunications Chongqing China Guangdong Provincial Key Laboratory of Power System Network Security Guangzhou China Electric Power Institute CSG Guangzhou China
With the continuous deepening of China's power grid intelligent upgrading and the rise of edge computing technology, power grid terminals can carry out data storage and intelligent calculation at the edge of the p... 详细信息
来源: 评论
A Parallelizable Counterfactual Generation Method Based on Gradient Optimization
A Parallelizable Counterfactual Generation Method Based on G...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Haorun Ding Xuesong Jiang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Quan Cheng Laboratory Jinan China State Key Laboratory of High-end Server & Storage Technology Jinan China
Post-hoc explanations are important for people to understand the predictions of explanation models. One class of methods in post-hoc explanation is the generation of counterfactuals, where a hypothetical example is ob...
来源: 评论