咨询与建议

限定检索结果

文献类型

  • 1,677 篇 会议
  • 1,155 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,836 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,891 篇 工学
    • 1,442 篇 计算机科学与技术...
    • 1,155 篇 软件工程
    • 516 篇 信息与通信工程
    • 215 篇 控制科学与工程
    • 214 篇 电气工程
    • 171 篇 生物工程
    • 164 篇 电子科学与技术(可...
    • 154 篇 网络空间安全
    • 126 篇 机械工程
    • 72 篇 光学工程
    • 72 篇 仪器科学与技术
    • 71 篇 生物医学工程(可授...
    • 58 篇 安全科学与工程
    • 54 篇 交通运输工程
    • 42 篇 化学工程与技术
    • 41 篇 动力工程及工程热...
  • 807 篇 理学
    • 511 篇 数学
    • 181 篇 生物学
    • 153 篇 物理学
    • 148 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 44 篇 化学
  • 467 篇 管理学
    • 281 篇 管理科学与工程(可...
    • 210 篇 图书情报与档案管...
    • 90 篇 工商管理
  • 102 篇 法学
    • 60 篇 社会学
    • 44 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 31 篇 军事学
  • 18 篇 农学
  • 12 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 126 篇 feature extracti...
  • 104 篇 semantics
  • 88 篇 accuracy
  • 85 篇 training
  • 77 篇 cryptography
  • 75 篇 computational mo...
  • 68 篇 authentication
  • 66 篇 security
  • 65 篇 federated learni...
  • 62 篇 privacy
  • 61 篇 deep learning
  • 55 篇 data models
  • 48 篇 object detection
  • 47 篇 protocols
  • 45 篇 information secu...
  • 42 篇 neural networks
  • 38 篇 robustness
  • 37 篇 visualization
  • 36 篇 convolution
  • 36 篇 optimization

机构

  • 228 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 56 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 52 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 38 篇 shandong provinc...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 28 篇 college of compu...
  • 28 篇 qilu university ...
  • 28 篇 college of compu...
  • 27 篇 shandong provinc...
  • 26 篇 pca lab key lab ...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 72 篇 yang jian
  • 31 篇 jian yang
  • 30 篇 meng deyu
  • 27 篇 xu li
  • 25 篇 jianfeng ma
  • 23 篇 ma jianfeng
  • 23 篇 xie jin
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 li xianxian
  • 20 篇 xiaoming wu
  • 20 篇 li hui
  • 20 篇 liu ximeng
  • 19 篇 zhixin li
  • 18 篇 xianxian li
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 17 篇 li zhixin
  • 16 篇 zhang yuqing

语言

  • 2,567 篇 英文
  • 176 篇 其他
  • 97 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2836 条 记 录,以下是191-200 订阅
排序:
Knowledge Distillation Enables Federated Learning: A Data-free Federated Aggregation Scheme
Knowledge Distillation Enables Federated Learning: A Data-fr...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Jiayi Huang Yuanyuan Zhang Renwan Bi Jiayin Lin Jinbo Xiong Fujian Provincial Key Lab of Network Security & Cryptology College of Computer and Cyber Security Fujian Normal University Fuzhou China
Applying knowledge distillation (KD) in federated learning (FL) can transfer model knowledge between clients’ local models and global model, which helps to improve the generalization of the global model. However, thi... 详细信息
来源: 评论
Weakly supervised temporal action localization with proxy metric modeling
收藏 引用
Frontiers of computer Science 2023年 第2期17卷 63-72页
作者: Hongsheng XU Zihan CHEN Yu ZHANG Xin GENG Siya MI Zhihong YANG NARI Group Corporation(State Grid Electric Power Research Institute) Nanjing 211106China School of Computer Science and Engineering and the Key Lab of Computer Network and Information Integration(Ministry of Education)Southeast UniversityNanjing 211189China School of Cyber Science and Engineering Southeast UniversityNanjing 211189China Purple Mountain Laboratories Nanjing 211111China
Temporal localization is crucial for action video *** the manual annotations are expensive and time-consuming in videos,temporal localization with weak video-level labels is challenging but *** this paper,we propose a... 详细信息
来源: 评论
Block-based fine-grained and publicly verifiable data deletion for cloud storage: Block-based fine-grained and publicly verifiable..: C. Yang et al.
收藏 引用
Soft Computing 2024年 第21期28卷 12491-12506页
作者: Yang, Changsong Liu, Yueling Ding, Yong Wu, Yongqiang Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology Guilin541004 China Lion Rock Labs of Cyberspace Security Institute of Cyberspace Technology HKCT Institute for Higher Education 999077 Hong Kong Guangxi Engineering Research Center of Industrial Internet Security and Blockchain Guilin University of Electronic Technology Guilin541004 China School of Computer Guangdong University of Science & Technology Dongguan523083 China South China Technical Support Department Topsec Network Technology Inc. Guangzhou510000 China
One of the most important services provided by cloud service providers (CSPs), cloud storage is economically attractive and can provide on-demand data storage service to resource-constrained tenants in the manner of p... 详细信息
来源: 评论
Self-Anomaly-Detection Model Training via Initialized Meta Model
Self-Anomaly-Detection Model Training via Initialized Meta M...
收藏 引用
2022 International Conference on networking and network Applications, NaNA 2022
作者: Ma, Xindi Su, Cunzhu Ma, Jianfeng Jiang, Qi Xi, Ning Gao, Sheng Xie, Kang School of Cyber Engineering Xidian University Shaanxi China School of Information Central University of Finance and Economics Beijing China Key Lab of Information Network Security Ministry of Public Security Shanghai China
Anomaly detection has become a key challenge affecting the training accuracy of machine learning. Because the training data is usually collected from Internet, many noised samples will be captured and these samples ca... 详细信息
来源: 评论
Discourse Relation-Aware Multi-turn Dialogue Response Generation  12th
Discourse Relation-Aware Multi-turn Dialogue Response Genera...
收藏 引用
12th National CCF Conference on Natural Language Processing and Chinese Computing, NLPCC 2023
作者: Wang, Huijie He, Ruifang Jia, Yungang Xu, Jing Wang, Bo College of Intelligence and Computing Tianjin University Tianjin China Tianjin Key Laboratory of Cognitive Computing and Application Tianjin China Tianjin Branch of National Computer Network and Information Security Management Center Tianjin China
Multi-turn dialogue response generation aims to generate a response with consideration of the context. It is not equal to multiple single-turn dialogues due to the context dependence of response. Many existing models ... 详细信息
来源: 评论
Mal-lightDet: A light method to detect malicious encrypted traffic based on machine learning  23
Mal-lightDet: A light method to detect malicious encrypted t...
收藏 引用
2023 4th International Conference on Control, Robotics and Intelligent System, CCRIS 2023
作者: Liu, Xu Liu, Zhang Zhao, Xiaojing Ren, Zhengwei School of Computer Science and Technology Changchun University of Science and Technology China Jilin Province Key Laboratory of Network and Information Security China School of Artificial Intelligence Changchun University of Science and Technology Changchun China
Encryption not only protects the network security and privacy, but also encrypts attackers' malicious traffic to evade detection. Thus, how to detect malicious encrypted traffic is critical for network security. F... 详细信息
来源: 评论
Collecting and analyzing key-value data under shuffled differential privacy
收藏 引用
Frontiers of computer Science 2023年 第2期17卷 241-243页
作者: Ning WANG Wei ZHENG Zhigang WANG Zhiqiang WEI Yu GU Peng TANG Ge YU Faculty of Information Science and Engineering Ocean University of ChinaQingdao 266100China School of Computer Science and Engineering Northeastern UniversityShenyang 110819China Key Lab of Cryptologic Technology and Information Security Ministry of EducationShandong UniversityQingdao 266200China School of Cyber Science and Technology Shandong UniversityQingdao 266200China
1 Introduction key-value data,as NoSQL data widely used in recent years,has been frequently collected and used for analysis in major websites and mobile *** frequency distribution estimation on the key domain,as well ... 详细信息
来源: 评论
Fusion of Dynamic Hypergraph and Clinical Event for Sequential Diagnosis Prediction  29
Fusion of Dynamic Hypergraph and Clinical Event for Sequenti...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Zhang, Xin Peng, Xueping Guan, Hongjiao Zhao, Long Qiao, Xinxiao Lu, Wenpeng Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China Australian Artificial Intelligence Institute University of Technology Sydney Sydney Australia
Sequential diagnosis prediction (SDP) is a challenging task, aiming to predict patients' future diagnoses based on their historical medical records. While methods based on graph neural networks (GNNs) have proven ... 详细信息
来源: 评论
A multiple sensitive attributes data publishing method with guaranteed information utility
收藏 引用
CAAI Transactions on Intelligence Technology 2023年 第2期8卷 288-296页
作者: Haibin Zhu Tong Yi Songtao Shang Minyong Shi Zhucheng Li Wenqian Shang Department of Computer Science and Mathematics Nipissing UniversityNorth BayOntarioCanada Key Lab of Education Blockchain and Intelligent Technology Ministry of EducationGuangxi Normal UniversityGuilinChina Guangxi Key Lab of Multi‐Source Information Mining and Security Guangxi Normal UniversityGuilinChina School of Computer and Communication Engineering Zhengzhou University of Light IndustryZhengzhouChina School of Computer Science Communication University of ChinaBeijingChina Business College Beijing Union UniversityBeijingChina
Data publishing methods can provide available information for analysis while preserving *** multiple sensitive attributes data publishing,which preserves the relationship between sensitive attributes,may keep many rec... 详细信息
来源: 评论
A multipath routing algorithm for satellite networksbased on service demand and traffic awareness
收藏 引用
Frontiers of information Technology & Electronic Engineering 2023年 第6期24卷 844-858页
作者: Ziyang XING Hui QI Xiaoqiang DI Jinyao LIU Rui XU Jing CHEN Ligang CONG Jilin Key Laboratory of Network and Information Security Changchun 130022China School of Computer Science and Technology Changchun University of Science and TechnologyChangchun 130022China Information Center Changchun University of Science and TechnologyChangchun 130022China
With the reduction in manufacturing and launch costs of low Earth orbit satellites and the advantages of large coverage and high data transmission rates,satellites have become an important part of data transmission in... 详细信息
来源: 评论