咨询与建议

限定检索结果

文献类型

  • 1,677 篇 会议
  • 1,155 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,836 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,891 篇 工学
    • 1,442 篇 计算机科学与技术...
    • 1,155 篇 软件工程
    • 516 篇 信息与通信工程
    • 215 篇 控制科学与工程
    • 214 篇 电气工程
    • 171 篇 生物工程
    • 164 篇 电子科学与技术(可...
    • 154 篇 网络空间安全
    • 126 篇 机械工程
    • 72 篇 光学工程
    • 72 篇 仪器科学与技术
    • 71 篇 生物医学工程(可授...
    • 58 篇 安全科学与工程
    • 54 篇 交通运输工程
    • 42 篇 化学工程与技术
    • 41 篇 动力工程及工程热...
  • 807 篇 理学
    • 511 篇 数学
    • 181 篇 生物学
    • 153 篇 物理学
    • 148 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 44 篇 化学
  • 467 篇 管理学
    • 281 篇 管理科学与工程(可...
    • 210 篇 图书情报与档案管...
    • 90 篇 工商管理
  • 102 篇 法学
    • 60 篇 社会学
    • 44 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 31 篇 军事学
  • 18 篇 农学
  • 12 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 126 篇 feature extracti...
  • 104 篇 semantics
  • 88 篇 accuracy
  • 85 篇 training
  • 77 篇 cryptography
  • 75 篇 computational mo...
  • 68 篇 authentication
  • 66 篇 security
  • 65 篇 federated learni...
  • 62 篇 privacy
  • 61 篇 deep learning
  • 55 篇 data models
  • 48 篇 object detection
  • 47 篇 protocols
  • 45 篇 information secu...
  • 42 篇 neural networks
  • 38 篇 robustness
  • 37 篇 visualization
  • 36 篇 convolution
  • 36 篇 optimization

机构

  • 228 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 56 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 52 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 38 篇 shandong provinc...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 28 篇 college of compu...
  • 28 篇 qilu university ...
  • 28 篇 college of compu...
  • 27 篇 shandong provinc...
  • 26 篇 pca lab key lab ...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 72 篇 yang jian
  • 31 篇 jian yang
  • 30 篇 meng deyu
  • 27 篇 xu li
  • 25 篇 jianfeng ma
  • 23 篇 ma jianfeng
  • 23 篇 xie jin
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 li xianxian
  • 20 篇 xiaoming wu
  • 20 篇 li hui
  • 20 篇 liu ximeng
  • 19 篇 zhixin li
  • 18 篇 xianxian li
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 17 篇 li zhixin
  • 16 篇 zhang yuqing

语言

  • 2,567 篇 英文
  • 176 篇 其他
  • 97 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2836 条 记 录,以下是211-220 订阅
排序:
PrivNUD: Effective Range Query Processing under Local Differential Privacy  39
PrivNUD: Effective Range Query Processing under Local Differ...
收藏 引用
39th IEEE International Conference on Data Engineering, ICDE 2023
作者: Wang, Ning Wang, Yaohua Wang, Zhigang Nie, Jie Wei, Zhiqiang Tang, Peng Gu, Yu Yu, Ge Ocean University of China School of Computer Science and Engineering China Ministry of Education Shandong University Key Lab of Cryptologic Technology and Information Security China Northeastern University School of Computer Science and Engineering China
Local differential privacy (LDP) has been established as a strong privacy standard for collecting sensitive information from users. Although it has attracted much research attention in recent years, the majority of ex... 详细信息
来源: 评论
FAMC: Fair and Publicly Auditable Multi-Party Computation with Cheater Detection  26th
FAMC: Fair and Publicly Auditable Multi-Party Computation w...
收藏 引用
26th International Conference on information and Communications security, ICICS 2024
作者: Li, Yong Feng, Yueyang Chen, Xi Zhang, Jian Li, Ruxian Lv, Kewei Zhang, Dawei School of Electronic and Information Engineering Beijing Jiaotong University Beijing100044 China Linklogis Shenzhen518063 China State Key Lab of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100193 China School of Cyber Security University of Chinese Academy of Sciences Beijing101400 China School of Computer Science and Technology Beijing Jiaotong University Beijing100044 China
Secure multi-party computation (MPC) protocols do not completely prevent malicious parties from cheating. Though numerous researches on cheating detection are proposed, most cheater detection works do not guarantee fa... 详细信息
来源: 评论
Research on Classroom Behavior Target Detection Algorithm based on YOLOv7  6
Research on Classroom Behavior Target Detection Algorithm ba...
收藏 引用
6th IEEE Advanced information Management, Communicates, Electronic and Automation Control Conference, IMCEC 2024
作者: Qiu, Wenke Wu, Xiaoming Liu, Xiangzhi Computer Science and Qilu University of Technology Shandong Academy of Sciences ShanDong Jinan China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
The integration of video information for the purpose of detecting students' behavior in the classroom, with the aim of enhancing teaching efficiency and maintaining a stable classroom environment, offers significa... 详细信息
来源: 评论
A Simple Semi-Supervised Joint Learning Framework for Few-shot Text Classification  5
A Simple Semi-Supervised Joint Learning Framework for Few-sh...
收藏 引用
5th International Conference on Artificial Intelligence and Pattern Recognition, AIPR 2022
作者: Lu, Shaoshuai Chen, Long Wang, Wenjing Xu, Cai Zhao, Wei Guan, Ziyu Lu, Guangyue Shaanxi Key Laboratory of Information Communication Network and Security Xi'an University of Posts and Telecommunications China School of Computer Science and Technology Xidian University China
The lack of labeled data is the bottleneck restricting deep text classification algorithm. State-of-the-art for most existing deep text classification methods follow the two-step transfer learning paradigm: pre-traini... 详细信息
来源: 评论
FedISMH: Federated Learning Via Inference Similarity for Model Heterogeneous
FedISMH: Federated Learning Via Inference Similarity for Mod...
收藏 引用
2024 IEEE International Conference on Big Data, BigData 2024
作者: Li, Yongdong Wang, Li-E Sun, Zhigang Li, Xianxian Chang, Hengtong Xu, Jinke Lin, Caiyi Guangxi Normal University School of Computer Science and Engineering Guilin China Guangxi Normal University Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guilin China Guangxi Normal University Guangxi Key Lab of Multi-Source Information Mining and Security Guilin China
Federated Learning (FL) is a privacy-preserving machine learning paradigm, enabling decentralized devices to collaboratively train models without sharing local data. Traditional FL approaches, however, rely on averagi... 详细信息
来源: 评论
Method and system of power load classification and decomposition based on deep learning  4
Method and system of power load classification and decomposi...
收藏 引用
4th International Conference on Smart Grid and Energy Engineering, SGEE 2023
作者: Sun, Hao Yuan, Hongtai Geng, Yudong Chen, Jing Zhang, Chuanfu Li, Wen Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
This paper introduces a system for the classification and decomposition of electrical loads, addressing the shortcomings of current non-intrusive load decomposition methods that are prone to errors. We propose a metho... 详细信息
来源: 评论
A Global Task Scheduling Method Based on network Measurement and Prediction in Computing Power networks  29
A Global Task Scheduling Method Based on Network Measurement...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Zhang, Chuanfu Li, Wen Chen, Jing Ge, Jing Wang, Di Li, Na Sun, Hao Geng, Yudong Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
To improve the task scheduling efficiency in computing power networks, this paper proposes a global task scheduling method based on network measurement and prediction in computing power networks (GTS-MP), which select... 详细信息
来源: 评论
Self-Paced Self-Training Based on K-Nearest Neighbors  4
Self-Paced Self-Training Based on K-Nearest Neighbors
收藏 引用
4th International Conference on Machine Learning and computer Application, ICMLCA 2023
作者: Ma, Yongzheng Sun, Zhengkai Zhang, Yintong Guan, Hongjiao Qiao, Xinxiao Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Self-training is a classical semi-supervised classification method, which iteratively trains labeled samples that are enhanced using unlabeled samples. However, traditional self-training selects pseudo-labeled example... 详细信息
来源: 评论
GA-Net: Gated Attention Mechanism Based Global Refinement network for Image Inpainting  29
GA-Net: Gated Attention Mechanism Based Global Refinement Ne...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Qiu, Ran Zhao, Shengrong Liang, Hu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
Underwater images are often affected by problems such as light attenuation, color distortion, noise and scattering, resulting in image defects. A novel image inpainting method is proposed to intelligently predict and ... 详细信息
来源: 评论
Attribute-Based Data Sharing Scheme with Flexible Search Functionality for Cloud-Assisted Autonomous Transportation System
收藏 引用
IEEE Transactions on Industrial Informatics 2023年 第11期19卷 10977-10986页
作者: Xiong, Hu Wang, Hanxiao Meng, Weizhi Yeh, Kuo-Hui University of Electronic Science and Technology of China School of Information and Software Engineering Network and Data Security Key Laboratory of Sichuan Province Chengdu610054 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610025 China Technical University of Denmark Department of Applied Mathematics and Computer Science Kongens Lyngby2800 Denmark National Dong Hwa University Department of Information Management Hualien97401 Taiwan National Sun Yat-sen University Department of Computer Science and Engineering Kaohsiung804201 Taiwan
The existing group public key encryption with equality test schemes could only support one-to-one data sharing and are not suitable for cloud-assisted autonomous transportation systems, which demand one-to-many data s... 详细信息
来源: 评论