咨询与建议

限定检索结果

文献类型

  • 1,677 篇 会议
  • 1,155 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,836 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,891 篇 工学
    • 1,442 篇 计算机科学与技术...
    • 1,155 篇 软件工程
    • 516 篇 信息与通信工程
    • 215 篇 控制科学与工程
    • 214 篇 电气工程
    • 171 篇 生物工程
    • 164 篇 电子科学与技术(可...
    • 154 篇 网络空间安全
    • 126 篇 机械工程
    • 72 篇 光学工程
    • 72 篇 仪器科学与技术
    • 71 篇 生物医学工程(可授...
    • 58 篇 安全科学与工程
    • 54 篇 交通运输工程
    • 42 篇 化学工程与技术
    • 41 篇 动力工程及工程热...
  • 807 篇 理学
    • 511 篇 数学
    • 181 篇 生物学
    • 153 篇 物理学
    • 148 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 44 篇 化学
  • 467 篇 管理学
    • 281 篇 管理科学与工程(可...
    • 210 篇 图书情报与档案管...
    • 90 篇 工商管理
  • 102 篇 法学
    • 60 篇 社会学
    • 44 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 31 篇 军事学
  • 18 篇 农学
  • 12 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 126 篇 feature extracti...
  • 104 篇 semantics
  • 88 篇 accuracy
  • 85 篇 training
  • 77 篇 cryptography
  • 75 篇 computational mo...
  • 68 篇 authentication
  • 66 篇 security
  • 65 篇 federated learni...
  • 62 篇 privacy
  • 61 篇 deep learning
  • 55 篇 data models
  • 48 篇 object detection
  • 47 篇 protocols
  • 45 篇 information secu...
  • 42 篇 neural networks
  • 38 篇 robustness
  • 37 篇 visualization
  • 36 篇 convolution
  • 36 篇 optimization

机构

  • 228 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 56 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 52 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 38 篇 shandong provinc...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 28 篇 college of compu...
  • 28 篇 qilu university ...
  • 28 篇 college of compu...
  • 27 篇 shandong provinc...
  • 26 篇 pca lab key lab ...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 72 篇 yang jian
  • 31 篇 jian yang
  • 30 篇 meng deyu
  • 27 篇 xu li
  • 25 篇 jianfeng ma
  • 23 篇 ma jianfeng
  • 23 篇 xie jin
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 li xianxian
  • 20 篇 xiaoming wu
  • 20 篇 li hui
  • 20 篇 liu ximeng
  • 19 篇 zhixin li
  • 18 篇 xianxian li
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 17 篇 li zhixin
  • 16 篇 zhang yuqing

语言

  • 2,567 篇 英文
  • 176 篇 其他
  • 97 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2836 条 记 录,以下是121-130 订阅
排序:
A Legal Multi-Choice Question Answering Model Based on DeBERTa and Attention Mechanism  36
A Legal Multi-Choice Question Answering Model Based on DeBER...
收藏 引用
36th IEEE International Conference on Tools with Artificial Intelligence, ICTAI 2024
作者: Luo, Ying Luo, Xudong Chen, Guibin School of Computer Science and Engineering Guangxi Normal University Guangxi Key Lab of Multi-source Information Mining and Security Guangxi Key Lab of Education Blockchain and Intelligent Technology of Ministry of Education Guilin541004 China
This paper presents a novel multi-choice question answering model tailored for the legal domain, which integrates a DeBERTa-based framework with bilinear attention mechanisms. The model is designed to enhance the inte... 详细信息
来源: 评论
Fuzzy Concession Strategy for Emotional Human-computer Negotiation  36
Fuzzy Concession Strategy for Emotional Human-Computer Negot...
收藏 引用
36th IEEE International Conference on Tools with Artificial Intelligence, ICTAI 2024
作者: Luo, Xudong Luo, Ying Sun, Kaili Li, Yanling School of Computer Science and Engineering Guangxi Normal University Guangxi Key Lab of Multi-source Information Mining and Security Guangxi Key Lab of Education Blockchain and Intelligent Technology of Ministry of Education Guilin541004 China
This paper proposes an emotion-based human-computer negotiation system. Existing systems handle basic dialogues but struggle with complex negotiations involving human emotions. To address this, we design a fuzzy conce... 详细信息
来源: 评论
Cascaded Sliding-Window-Based Relativistic GAN Fusion for Perceptual and Consistent Video Super-Resolution  6th
Cascaded Sliding-Window-Based Relativistic GAN Fusion for P...
收藏 引用
6th IFIP TC 12 International Conference on Intelligence Science, ICIS 2024
作者: Li, Dingyi PCA Lab Key Lab of Intelligent Perception and Systems for High-Dimensional Information of Ministry of Education and Jiangsu Key Lab of Image and Video Understanding for Social Security School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing210094 China
Perceptual video super-resolution aims at converting low-resolution videos to visually appealing high-resolution ones. It may lead to temporal inconsistency due to the drastically changing outputs. In this paper, we p... 详细信息
来源: 评论
Towards Public Integrity Audition for Cloud-IoT Data Based on Blockchain
收藏 引用
computer Systems Science & Engineering 2022年 第6期41卷 1129-1142页
作者: Hao Yan Yanan Liu Shuo Qiu Shengzhou Hu Weijian Zhang Jinyue Xia School of Network Security Jinling Institute of TechnologyNanjing211169China Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Normal UniversityFuzhou350007China Department of Mathematics and Computer Science Gannan Normal UniversityGanzhou341000China Network Security and Information Office Hohai UniversityNanjing210098China International Business Machines Corporation(IBM) New YorkNYUSA
With the rapidly developing of Internet of Things (IoT), the volume ofdata generated by IoT systems is increasing quickly. To release the pressure ofdata management and storage, more and more enterprises and individua... 详细信息
来源: 评论
Robust Voice Activity Detection using Locality-Sensitive Hashing and Residual Frequency-Temporal Attention  25
Robust Voice Activity Detection using Locality-Sensitive Has...
收藏 引用
25th Interspeech Conferece 2024
作者: Li, Shu Zhang, Peng Li, Ye Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science China
For voice activity detection (VAD), recent works focus on learning the attention distribution on contextual information of speech to reduce the impact of irrelevant noise. However, contextual frames selected with spec... 详细信息
来源: 评论
Hyper-Relational Knowledge Representation Learning with Multi-Hypergraph Disentanglement  25
Hyper-Relational Knowledge Representation Learning with Mult...
收藏 引用
34th ACM Web Conference, WWW 2025
作者: Li, Jiecheng Luo, Xudong Lu, Guangquan Zhang, Shichao School of Computer Science and Engineering Key Lab of Education Blockchain and Intelligent Technology of the Ministry of Education Guangxi Key Lab of Multi-source Information Mining & Security Guangxi Normal University Guilin China
Hyper-relational knowledge graphs (HKGs) extend the traditional triplet-based knowledge graph by adding qualifiers to the relationships, making HKGs particularly useful for tasks that require more profound understandi... 详细信息
来源: 评论
Research on Setting of Two Firewall Rules Based on Ubuntu Linux System  5
Research on Setting of Two Firewall Rules Based on Ubuntu Li...
收藏 引用
5th International Conference on computer network, Electronic and Automation, ICCNEA 2022
作者: Ma, Limei Zhao, Dongmei Hebei Normal University College of Computer and Cyber Security Shijiazhuang China Key Laboratory of Network and Information Security in Hebei Province Shijiazhuang China
'security first' is the most concerned issue of Linux administrators. security refers to the integrity of data. The authentication security and integrity of data are higher than the privacy security of data. F... 详细信息
来源: 评论
Secure Similar Adjacent Vertex Query on Sparse Graph Data in Cloud Environment  8th
Secure Similar Adjacent Vertex Query on Sparse Graph Data i...
收藏 引用
8th International Congress on Edge Computing, EDGE 2024, Held as Part of the Services Conference Federation, SCF 2024
作者: Tian, Yun Wu, Bin Shi, Jiaoli Zhang, Caicai Xu, Du School of Computer and Big Data Science Jiujiang University Jiujiang332005 China Jiujiang Key Laboratory of Network and Information Security Jiujiang332005 China School of Modern Information Technology Zhejiang Polytechnic University of Mechanical and Electrical Engineering Hangzhou310053 China
The development of cloud computing and the widespread application of cloud services have made outsourcing services more convenient. The need for individuals and businesses to store and manipulate the graph data they g... 详细信息
来源: 评论
A Novel 3D Medical Image Segmentation Model Using Improved SAM
A Novel 3D Medical Image Segmentation Model Using Improved S...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Kuang, Yuansen Ma, Xitong Zhao, Jing Wang, Guangchen Zeng, Yijie Liu, Song Key Laboratory of Computing Power Network and Information Security Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
3D medical image segmentation is an essential task in the medical image field, which aims to segment organs or tumours into different labels. A number of issues exist with the current 3D medical image segmentation tas... 详细信息
来源: 评论
A Novel Meta-Hierarchical Active Inference Reinforcement Learning Approach for QoS-Driven Resource Allocation in Dynamic Clouds
A Novel Meta-Hierarchical Active Inference Reinforcement Lea...
收藏 引用
2024 IEEE Global Communications Conference, GLOBECOM 2024
作者: Xian, Peijie He, Ying Yu, F. Richard Du, Jianbo Shenzhen Univ. College of Computer Science and Software Engineering Shenzhen China Xi'an Univ. of Posts & Telecomm. Shaanxi Key Lab. of Information Comm. Network and Security Shaanxi Xi'an China Carleton Univ. School of Information Technology OttawaON Canada
The cloud computing environment is highly dynamic due to a variety of external factors such as seasonal changes, market trends, and social events. In this case, tenant behavior patterns exhibit significant variability... 详细信息
来源: 评论