咨询与建议

限定检索结果

文献类型

  • 1,677 篇 会议
  • 1,155 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,836 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,891 篇 工学
    • 1,442 篇 计算机科学与技术...
    • 1,155 篇 软件工程
    • 516 篇 信息与通信工程
    • 215 篇 控制科学与工程
    • 214 篇 电气工程
    • 171 篇 生物工程
    • 164 篇 电子科学与技术(可...
    • 154 篇 网络空间安全
    • 126 篇 机械工程
    • 72 篇 光学工程
    • 72 篇 仪器科学与技术
    • 71 篇 生物医学工程(可授...
    • 58 篇 安全科学与工程
    • 54 篇 交通运输工程
    • 42 篇 化学工程与技术
    • 41 篇 动力工程及工程热...
  • 807 篇 理学
    • 511 篇 数学
    • 181 篇 生物学
    • 153 篇 物理学
    • 148 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 44 篇 化学
  • 467 篇 管理学
    • 281 篇 管理科学与工程(可...
    • 210 篇 图书情报与档案管...
    • 90 篇 工商管理
  • 102 篇 法学
    • 60 篇 社会学
    • 44 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 31 篇 军事学
  • 18 篇 农学
  • 12 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 126 篇 feature extracti...
  • 104 篇 semantics
  • 88 篇 accuracy
  • 85 篇 training
  • 77 篇 cryptography
  • 75 篇 computational mo...
  • 68 篇 authentication
  • 66 篇 security
  • 65 篇 federated learni...
  • 62 篇 privacy
  • 61 篇 deep learning
  • 55 篇 data models
  • 48 篇 object detection
  • 47 篇 protocols
  • 45 篇 information secu...
  • 42 篇 neural networks
  • 38 篇 robustness
  • 37 篇 visualization
  • 36 篇 convolution
  • 36 篇 optimization

机构

  • 228 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 56 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 52 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 38 篇 shandong provinc...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 28 篇 college of compu...
  • 28 篇 qilu university ...
  • 28 篇 college of compu...
  • 27 篇 shandong provinc...
  • 26 篇 pca lab key lab ...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 72 篇 yang jian
  • 31 篇 jian yang
  • 30 篇 meng deyu
  • 27 篇 xu li
  • 25 篇 jianfeng ma
  • 23 篇 ma jianfeng
  • 23 篇 xie jin
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 li xianxian
  • 20 篇 xiaoming wu
  • 20 篇 li hui
  • 20 篇 liu ximeng
  • 19 篇 zhixin li
  • 18 篇 xianxian li
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 17 篇 li zhixin
  • 16 篇 zhang yuqing

语言

  • 2,567 篇 英文
  • 176 篇 其他
  • 97 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2836 条 记 录,以下是241-250 订阅
排序:
Secure YOLOv3-SPP: Edge-Cooperative Privacy-preserving Object Detection for Connected Autonomous Vehicles
Secure YOLOv3-SPP: Edge-Cooperative Privacy-preserving Objec...
收藏 引用
2022 International Conference on networking and network Applications, NaNA 2022
作者: Zhou, Yongjie Xiong, Jinbo Bi, Renwan Tian, Youliang State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang550025 China Fujian Provincial Key Laboratory of Network System Information Security College of Computer and Cyberspace Security Fujian Normal University FJ Fuzhou350117 China
The connected autonomous vehicles (CAVs) are a key component of intelligent transportation systems (ITS) where vehicles communicate with each other to exchange sensing data from on-board sensors (e.g., high-definition... 详细信息
来源: 评论
Design of power supply system for portable aviation inspection equipment  3
Design of power supply system for portable aviation inspecti...
收藏 引用
2023 3rd International Conference on Measurement Control and Instrumentation, MCAI 2023
作者: Yang, Yang Ai, Hao Li, Shibo Xiao, Guokai Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Standard Institute of Emerging Technologies and Innovations Co. Ltd. Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Given that airborne electronic equipment may have a variety of wiring methods and may encounter a set of systems using multiple power supplies, it is necessary to take some measures on the circuit to ensure the normal... 详细信息
来源: 评论
Multi-party privacy-preserving decision tree training with a privileged party
收藏 引用
Science China(information Sciences) 2024年 第8期67卷 253-268页
作者: Yiwen TONG Qi FENG Min LUO Debiao HE Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Shanghai Technology Innovation Centre of Distributed Privacy-Preserving Artificial Intelligence Matrix Elements Technologies Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science Center Qilu University of Technology(Shandong Academy of Sciences)
Currently, a decision tree is the most commonly used data mining algorithm for classification tasks. While a significant number of studies have investigated privacy-preserving decision trees, the methods proposed in t... 详细信息
来源: 评论
Dual-View Self-supervised Co-training for Knowledge Graph Recommendation  28th
Dual-View Self-supervised Co-training for Knowledge Graph R...
收藏 引用
28th International Conference on Database Systems for Advanced Applications, DASFAA 2023
作者: Zhang, Ruoyi Ma, Huifang Li, Qingfeng Wang, Yike Li, Zhixin College of Computer Science and Engineering Northwest Normal University Gansu Lanzhou China Guangxi Key Lab of Multi-source Information Mining and Security Guangxi Normal University Guangxi Guilin China
Knowledge Graph Recommendation (KGR), which aims to incorporate Knowledge Graphs (KGs) as auxiliary information into recommender systems and effectively improve model performance, has attracted considerable interest. ... 详细信息
来源: 评论
CurMIM: Curriculum Masked Image Modeling
CurMIM: Curriculum Masked Image Modeling
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Liu, Hao Wang, Kun Han, Yudong Wang, Haocong Hu, Yupeng Wang, Chunxiao Nie, Liqiang School of Software Shandong University Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology Shandong Academy of Sciences Jinan China School of Computer Science and Technology Harbin Institute of Technology Shenzhen China
Masked Image Modeling (MIM), following "mask-and-reconstruct" scheme, is a promising self-supervised method to learn scalable visual representation. Studies indicate that selecting an effective mask strategy... 详细信息
来源: 评论
FERI: Feature Enhancement and Relational Interaction for Image-text Matching  30
FERI: Feature Enhancement and Relational Interaction for Ima...
收藏 引用
30th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2024
作者: Zhang, Yu Zhang, Jianqiang Song, Gongpeng Lu, Qin Zhao, Shuo Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China Shandong Branch of China Mobile Communication Group Design Institute Co. Jinan China
Image-text matching is an important problem at the intersection of computer vision and natural language processing. It aims to establish the semantic link between image and text to achieve high-quality semantic alignm... 详细信息
来源: 评论
BIFLC: A Blockchain and IPFS-Based Multi-Consensus Federated Learning Framework  26
BIFLC: A Blockchain and IPFS-Based Multi-Consensus Federated...
收藏 引用
26th International Conference on computer Supported Cooperative Work in Design, CSCWD 2023
作者: Li, Jing Sun, Jufeng Li, Fengyong Yang, Xingkai Wang, Yuwei Shanghai University of Electric Power College of Computer Science and Technology Shanghai China Guangxi Normal University Guangxi Key Lab of Multi-Source Information Mining and Security Guilin541004 China
Federated learning is an efficient technology that implements distributed model training among multiple data sources with local data, and can realize data privacy protection and data sharing ***, existing federated le... 详细信息
来源: 评论
Intra- and Inter-behavior Contrastive Learning for Multi-behavior Recommendation  28th
Intra- and Inter-behavior Contrastive Learning for Multi-be...
收藏 引用
28th International Conference on Database Systems for Advanced Applications, DASFAA 2023
作者: Li, Qingfeng Ma, Huifang Zhang, Ruoyi Jin, Wangyu Li, Zhixin College of Computer Science and Engineering Northwest Normal University Gansu Lanzhou China Guangxi Key Lab of Multi-source Information Mining and Security Guangxi Normal University Guangxi Guilin China
Multi-behavior recommendation (MBR) aims to improve the prediction of target behavior by exploiting multi-typed auxiliary behaviors. However, most MBR suffers from data sparsity in real-world scenarios and thus perfor... 详细信息
来源: 评论
MISP: An Efficient Quantum-resistant Misbehavior Preventing Scheme with Self-enforcement for Vehicle-to-Everything
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Chen, Ying He, Debiao Bao, Zijian Wang, Huaqun Luo, Min Wuhan University School of Cyber Science and Engineering Wuhan430072 China Key Laboratory of Computing Power Network & Information Security Ministry of Education Shandong Computer Science Center Jinan250014 China Nanjing University of Posts and Telecommunications College of Computer Nanjing210023 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network & Information System Security Jinan250014 China
In the Vehicle-to-Everything (V2X) communication system, the presence of ambiguous warnings significantly increases the risk of severe accidents, posing a substantial threat to the safety of autonomous driving. It is ... 详细信息
来源: 评论
Fairness of Large Music Models: From a Culturally Diverse Perspective  9
Fairness of Large Music Models: From a Culturally Diverse Pe...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Wang, Qinyuan Gu, Bruce Zhang, He Li, Yunfeng University of Sydney School of Music NSW2008 Australia Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250031 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan250031 China CNPIEC KEXIN Ltd. Beijing100020 China
This paper explores the fairness of large music models in generating culturally diverse musical compositions, emphasizing the need for inclusivity and equity in AI-generated music. By analyzing popular datasets such a... 详细信息
来源: 评论