咨询与建议

限定检索结果

文献类型

  • 1,737 篇 会议
  • 1,156 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,897 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,893 篇 工学
    • 1,437 篇 计算机科学与技术...
    • 1,153 篇 软件工程
    • 516 篇 信息与通信工程
    • 238 篇 电气工程
    • 216 篇 控制科学与工程
    • 171 篇 生物工程
    • 168 篇 电子科学与技术(可...
    • 160 篇 网络空间安全
    • 130 篇 机械工程
    • 74 篇 光学工程
    • 73 篇 仪器科学与技术
    • 70 篇 生物医学工程(可授...
    • 65 篇 安全科学与工程
    • 60 篇 交通运输工程
    • 45 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 818 篇 理学
    • 514 篇 数学
    • 182 篇 生物学
    • 164 篇 物理学
    • 149 篇 统计学(可授理学、...
    • 93 篇 系统科学
    • 48 篇 化学
  • 470 篇 管理学
    • 292 篇 管理科学与工程(可...
    • 202 篇 图书情报与档案管...
    • 93 篇 工商管理
  • 100 篇 法学
    • 60 篇 社会学
    • 42 篇 法学
  • 67 篇 医学
    • 57 篇 临床医学
    • 48 篇 基础医学(可授医学...
  • 36 篇 经济学
    • 36 篇 应用经济学
  • 30 篇 军事学
  • 18 篇 农学
  • 15 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 138 篇 feature extracti...
  • 116 篇 accuracy
  • 110 篇 semantics
  • 97 篇 training
  • 94 篇 federated learni...
  • 89 篇 computational mo...
  • 77 篇 cryptography
  • 71 篇 privacy
  • 69 篇 authentication
  • 68 篇 security
  • 63 篇 data models
  • 62 篇 deep learning
  • 52 篇 robustness
  • 50 篇 object detection
  • 49 篇 protocols
  • 46 篇 optimization
  • 45 篇 information secu...
  • 44 篇 neural networks
  • 42 篇 adaptation model...
  • 41 篇 transformers

机构

  • 272 篇 key laboratory o...
  • 204 篇 shandong provinc...
  • 68 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 57 篇 guangxi key lab ...
  • 56 篇 key lab of infor...
  • 51 篇 shandong enginee...
  • 50 篇 shandong fundame...
  • 42 篇 school of comput...
  • 40 篇 shandong provinc...
  • 38 篇 school of cyber ...
  • 31 篇 college of compu...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 27 篇 college of compu...
  • 27 篇 qilu university ...
  • 26 篇 pca lab key lab ...
  • 24 篇 shandong fundame...
  • 22 篇 beijing electron...

作者

  • 72 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 24 篇 xiaoming wu
  • 23 篇 xie jin
  • 22 篇 ma jianfeng
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 liu ximeng
  • 21 篇 li xianxian
  • 20 篇 zhixin li
  • 20 篇 li hui
  • 19 篇 xianxian li
  • 18 篇 xiangzhi liu
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 di xiaoqiang
  • 16 篇 zhang yuqing

语言

  • 2,420 篇 英文
  • 397 篇 其他
  • 87 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2897 条 记 录,以下是1261-1270 订阅
排序:
A modified particle swarm optimization for autonomous UAV path planning in 3D environment  2nd
A modified particle swarm optimization for autonomous UAV pa...
收藏 引用
2nd International Conference on computer Science and Cyber security, ICONCS 2020
作者: Nayeem, Golam Moktader Fan, Mingyu Li, Shanjun Ahammad, Khalil School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu611731 China Key Laboratory of Information Network Security Ministry of Public Security Shanghai201804 China Department of Computer Science and Engineering Comilla University Cumilla Bangladesh
Path planning is an important aspect of an autonomous Unmanned Ariel Vehicle (UAV). As finding the best path is a non-deterministic problem, meta-heuristic algorithms proved to be a better choice in recent years. Part... 详细信息
来源: 评论
Chiral Chaos Enhanced Sensing
arXiv
收藏 引用
arXiv 2024年
作者: Ge, Yun-Qiu Wang, Zhe Zhao, Qian-Chuan Zhang, Jing Liu, Yu-Xi School of Integrated Circuits Tsinghua University Beijing100084 China Frontier Science Center for Quantum Information Beijing China Department of Automation Tsinghua University Beijing100084 China School of Automation Science and Engineering Xi’an Jiaotong University Xi’an710049 China MOE Key Lab for Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an710049 China
Chirality refers to the property that an object and its mirror image cannot overlap each other by spatial rotation and translation, and can be found in various research fields. We here propose chiral chaos and constru... 详细信息
来源: 评论
Mitigating Propensity Bias of Large Language Models for Recommender Systems
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Guixian Yuan, Guan Cheng, Debo Liu, Lin Li, Jiuyong Zhang, Shichao School of Computer Science and Technology Engineering Research Center of Mine Digitalisation Artificial Intelligence Research Institute China University of Mining and Technology Xuzhou221116 China UniSA STEM University of South Australia Adelaide5095 Australia Guangxi Key Lab of Multisource Information Mining & Security Guangxi Normal University Guilin541004 China
The rapid development of Large Language Models (LLMs) creates new opportunities for recommender systems, especially by exploiting the side information (e.g., descriptions and analyses of items) generated by these mode... 详细信息
来源: 评论
HF-Mid: A Hybrid Framework of network Intrusion Detection for Multi-type and Imbalanced Data
HF-Mid: A Hybrid Framework of Network Intrusion Detection fo...
收藏 引用
IEEE International Conference on Trust, security and Privacy in Computing and Communications (TrustCom)
作者: Weidong Zhou Tianbo Wang Guotao Huang Xiaopeng Liang Chunhe Xia Xiaojian Li Beijing Key Lab. of Network Technology Beihang University Beijing China School of Cyber Science and Technology Beihang University Beijing China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China Guangxi Collaborative Innovation Center of Multi-source Information Integration and Intelligent Processing Guangxi Normal University Guilin China College of Computer Science and Information Technology Guangxi Normal University Guilin China
The data-driven deep learning methods have brought significant progress and potential to intrusion detection. However, there are two thorny problems caused by the characteristics of intrusion data: "multi-type fe... 详细信息
来源: 评论
FedDLM: A Fine-Grained Assessment Scheme for Risk of Sensitive information Leakage in Federated Learning-based Android Malware Classifier
FedDLM: A Fine-Grained Assessment Scheme for Risk of Sensiti...
收藏 引用
IEEE International Conference on Trust, security and Privacy in Computing and Communications (TrustCom)
作者: Changnan Jiang Chunhe Xia Chen Chen Huacheng Li Tianbo Wang Xiaojian Li Beijing Key Lab. of Network Technology Beihang University Beijing China Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin China School of Cyber Science and Technology Beihang University Beijing China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China College of Computer Science and Information Technology Guangxi Normal University Guilin China
In the traditional centralized Android malware classification framework, privacy concerns arise as it requires collecting users’ app samples containing sensitive information directly. To address this problem, new cla... 详细信息
来源: 评论
Generative Physical AI in Vision: A Survey
arXiv
收藏 引用
arXiv 2025年
作者: Liu, Daochang Zhang, Junyu Dinh, Anh-Dung Park, Eunbyung Zhang, Shichao Xu, Chang School of Physics Mathematics and Computing The University of Western Australia CrawleyWA6009 Australia School of Computer Science and Engineering Central South University Changsha410083 China School of Computer Science Faculty of Engineering The University of Sydney DarlingtonNSW2008 Australia Department of Artificial Intelligence Department of Electrical and Computer Engineering Sungkyunkwan University Suwon16419 Korea Republic of Guangxi Key Lab of Multi-Source Information Mining & Security Guangxi Normal University Guilin541004 China
Generative Artificial Intelligence (AI) has rapidly advanced the field of computer vision by enabling machines to create and interpret visual data with unprecedented sophistication. This transformation builds upon a f... 详细信息
来源: 评论
Watermarking for out-of-distribution detection  22
Watermarking for out-of-distribution detection
收藏 引用
Proceedings of the 36th International Conference on Neural information Processing Systems
作者: Qizhou Wang Feng Liu Yonggang Zhang Jing Zhang Chen Gong Tongliang Liu Bo Han Department of Computer Science Hong Kong Baptist University School of Mathematics and Statistics The University of Melbourne School of Computer Science The University of Sydney PCA Lab Key Lab of Intelligent Perception and Systems for High-Dimensional Information of MoE and Jiangsu Key Lab of Image and Video Understanding for Social Security School of Computer Science and Engineering Nanjing University of Science and Technology TML Lab The University of Sydney
Out-of-distribution (OOD) detection aims to identify OOD data based on representations extracted from well-trained deep models. However, existing methods largely ignore the reprogramming property of deep models and th...
来源: 评论
Parallel Optimization of Computational Fluid Dynamics Application code_saturne Based on Next Generation Sunway Supercomputer
Parallel Optimization of Computational Fluid Dynamics Applic...
收藏 引用
International Symposium on Parallel Architectures, Algorithms and Programming (PAAP)
作者: Anjun Liu Yin Liao Xihao Xu YanYan Chen Hongjun Zhong Jianming Wu Bo Kong Alexander Raikov Meng Guo Jinan Key Laboratory of High Performance Industrial Software Jinan Institute of Supercomputing Technology Jinan China Jinan Supercomputing-Zhejiang Yuansuan Industrial Simulation System Joint Laboratory Zhejiang Yuansuan Technology Co. Ltd Hangzhou China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan ) Qilu University of Technology (Shandong Academy of Sciences) Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
code_saturne is an open-source general large-scale computational fluid dynamics software independently developed by Electricite de France since 1997. Due to its high computing performance, code_saturne has been widely...
来源: 评论
Hyper-class representation of data
arXiv
收藏 引用
arXiv 2022年
作者: Zhang, Shichao Li, Jiaye Zhang, Wenzhen Qin, Yongsong The School of Computer Science and Engineering Central South University Changsha410083 China Guangxi Key Lab of Multi-Source Information Mining and Security Guangxi Normal University Guangxi Guilin541004 China
Data representation is usually a natural form with their attribute values. On this basis, data processing is an attribute-centered calculation. However, there are three limitations in the attribute-centered calculatio... 详细信息
来源: 评论
JAX-CNV:A Whole-genome Sequencing-based Algorithm for Copy Number Detection at Clinical Grade Level
收藏 引用
Genomics, Proteomics & Bioinformatics 2022年 第6期20卷 1197-1206页
作者: Wan-Ping Lee Qihui Zhu Xiaofei Yang Silvia Liu Eliza Cerveira Mallory Ryan Adam Mil-Homens Lauren Bellfy Kai Ye Charles Lee Chengsheng Zhang Precision Medicine Center The First Affiliated Hospital of Xi’an Jiaotong UniversityXi’an 710061China The Jackson Laboratory for Genomic Medicine FarmingtonCT 06032USA School of Cyber Science and Engineering Xi’an Jiaotong UniversityXi’an 710049China Department of Pathology and Laboratory Medicine Perelman School of MedicineUniversity of PennsylvaniaPhiladelphiaPA 19104USA School of Computer Science and Technology Faculty of Electronic and Information EngineeringXi’an Jiaotong UniversityXi’an 710049China MOE Key Lab for Intelligent Networks&Networks Security Faculty of Electronic and Information EngineeringXi’an Jiaotong UniversityXi’an 710049China Department of Life Sciences Ewha Womans UniversitySeoul 03760South Korea
We aimed to develop a whole-genome sequencing(WGS)-based copy number variant(CNV)calling algorithm with the potential of replacing chromosomal microarray assay(CMA)for clinical ***-CNV is thus developed for CNV detect... 详细信息
来源: 评论