咨询与建议

限定检索结果

文献类型

  • 1,677 篇 会议
  • 1,155 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,836 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,891 篇 工学
    • 1,442 篇 计算机科学与技术...
    • 1,155 篇 软件工程
    • 516 篇 信息与通信工程
    • 215 篇 控制科学与工程
    • 214 篇 电气工程
    • 171 篇 生物工程
    • 164 篇 电子科学与技术(可...
    • 154 篇 网络空间安全
    • 126 篇 机械工程
    • 72 篇 光学工程
    • 72 篇 仪器科学与技术
    • 71 篇 生物医学工程(可授...
    • 58 篇 安全科学与工程
    • 54 篇 交通运输工程
    • 42 篇 化学工程与技术
    • 41 篇 动力工程及工程热...
  • 807 篇 理学
    • 511 篇 数学
    • 181 篇 生物学
    • 153 篇 物理学
    • 148 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 44 篇 化学
  • 467 篇 管理学
    • 281 篇 管理科学与工程(可...
    • 210 篇 图书情报与档案管...
    • 90 篇 工商管理
  • 102 篇 法学
    • 60 篇 社会学
    • 44 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 31 篇 军事学
  • 18 篇 农学
  • 12 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 126 篇 feature extracti...
  • 104 篇 semantics
  • 88 篇 accuracy
  • 85 篇 training
  • 77 篇 cryptography
  • 75 篇 computational mo...
  • 68 篇 authentication
  • 66 篇 security
  • 65 篇 federated learni...
  • 62 篇 privacy
  • 61 篇 deep learning
  • 55 篇 data models
  • 48 篇 object detection
  • 47 篇 protocols
  • 45 篇 information secu...
  • 42 篇 neural networks
  • 38 篇 robustness
  • 37 篇 visualization
  • 36 篇 convolution
  • 36 篇 optimization

机构

  • 228 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 56 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 52 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 38 篇 shandong provinc...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 28 篇 college of compu...
  • 28 篇 qilu university ...
  • 28 篇 college of compu...
  • 27 篇 shandong provinc...
  • 26 篇 pca lab key lab ...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 72 篇 yang jian
  • 31 篇 jian yang
  • 30 篇 meng deyu
  • 27 篇 xu li
  • 25 篇 jianfeng ma
  • 23 篇 ma jianfeng
  • 23 篇 xie jin
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 li xianxian
  • 20 篇 xiaoming wu
  • 20 篇 li hui
  • 20 篇 liu ximeng
  • 19 篇 zhixin li
  • 18 篇 xianxian li
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 17 篇 li zhixin
  • 16 篇 zhang yuqing

语言

  • 2,567 篇 英文
  • 176 篇 其他
  • 97 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2836 条 记 录,以下是261-270 订阅
排序:
A Fault Diagnostic Method for Rolling Bearings Based on CAR-SNN Model
A Fault Diagnostic Method for Rolling Bearings Based on CAR-...
收藏 引用
2023 CAA Symposium on Fault Detection, Supervision and Safety for Technical Processes, SAFEPROCESS 2023
作者: Li, Qiuting Wang, Xiuqing Du, Wenxia Hebei Normal University College of Computer and Cyber Security Shijiazhuang050024 China Hebei Provincial Key Laboratory of Network & Information Security Shijiazhuang China Hebei Provincial Engineering Research Center for Supply Chain Big Data Analytics & Data Security Shijiazhuang China Hebei Normal University College of China Combustion Engineering Shijiazhuang050024 China
In the era of big data, high-performance rolling bearing fault diagnostic methods are of great significance to ensure manufacturing smoothly and avoid mass economic losses. A rolling bearing fault diagnostic CAR-SNN m... 详细信息
来源: 评论
On the MDS Condition of Generalized Expanded-Blaum-Roth Codes  18
On the MDS Condition of Generalized Expanded-Blaum-Roth Code...
收藏 引用
18th International Symposium on Problems of Redundancy in information and Control Systems, REDUNDANCY 2023
作者: Hou, Hanxu Song, Linqi Dongguan University of Technology Dongguan Key Lab of Artificial Information Network School of Electrical Engineering & Intelligentization China City University of Hong Kong Department of Computer Science Hong Kong
Generalized Expanded-Blaum-Roth (GEBR) codes [You et al. 2020] are designed for large-scale distributed storage systems that have larger recoverability for single-symbol failures, multi-column failures and multi-row f... 详细信息
来源: 评论
Research on long and short-term social recommendation based on convolutional and gated recurrent units  29
Research on long and short-term social recommendation based ...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Jia, Zihe Xue, Peng Dai, Zhiqiang Gao, Qian Zhang, Xiaomeng Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250014 China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan250014 China
The development of the Internet has made people more closely related and has put forward higher requirements for recommendation models. Most recommendation models are studied only for the long-term interests of users.... 详细信息
来源: 评论
DCCT-Net: A network Combined Dynamic CNN and Transformer for Image Compressive Sensing
DCCT-Net: A Network Combined Dynamic CNN and Transformer for...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Lijuan Xu Haixiao Mei Fenghua Tong Dawei Zhao Fuqiang Yu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
Recent end-to-end image compressive sensing networks primarily use Convolutional Neural networks (CNNs) and Transformers, each with distinct limitations: CNNs struggle with global feature capture, while Transformers l... 详细信息
来源: 评论
information spreading in mobile social networks: Identifying the influential nodes using FPSO algorithm  10
Information spreading in mobile social networks: Identifying...
收藏 引用
10th International Conference on information Technology: IoT and Smart City, ICIT 2022
作者: Zhang, Xinxin Xu, Li Xu, Zhenyu Sun, Hung-Min Lee, Chia-Wei College of Computer and Cyber Security Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Normal University Fuzhou China The Department of Computer Science National Tsing Hua University Hsinchu Taiwan Department of Computer Science and Information Engineering National Taitung University Taiwan
The most influential nodes are capable of generating maximum influence and widest information spread to their connected nodes in mobile social networks. Hence identifying high influential users plays an important role... 详细信息
来源: 评论
Triple-Fault-Tolerant Binary MDS Array Codes with Lower Encoding Complexity  18
Triple-Fault-Tolerant Binary MDS Array Codes with Lower Enco...
收藏 引用
18th International Symposium on Problems of Redundancy in information and Control Systems, REDUNDANCY 2023
作者: Hou, Hanxu Song, Linqi Dongguan University of Technology Dongguan Key Lab of Artificial Information Network School of Electrical Engineering & Intelligentization China City University of Hong Kong Department of Computer Science Hong Kong
In this paper, we present a new construction of maximal distance separable (MDS) array codes with three parity columns. We present an efficient encoding algorithm for our new codes and show that our new codes have low... 详细信息
来源: 评论
Source-free Domain Adaptation with Multiple Alignment for Efficient Image Retrieval
Source-free Domain Adaptation with Multiple Alignment for Ef...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Jinghui Ni Hui Cui Lihai Zhao Fengling Li Xiaohui Han Lijuan Xu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Quan Cheng Laboratory Shandong Open University University of Technology Sydney
Domain adaptation techniques help models generalize to target domains by addressing domain discrepancies between the source and target domain data distributions. These techniques are particularly valuable for cross-do... 详细信息
来源: 评论
A novel clinical artificial intelligence model for disease detection via retinal imaging
收藏 引用
The Innovation 2024年 第2期5卷 11-12页
作者: Yidian Fu Liang Ma Sheng Wan Shengfang Ge Zhi Yang Department of Ophthalmology Ninth People’s HospitalShanghai JiaoTong University School of MedicineShanghai 200011China Shanghai Key Laboratory of Orbital Diseases and Ocular Oncology Shanghai 200011China PCA Lab Key Lab of Intelligent Perception and Systems for High-Dimensional Information of Ministry of EducationNanjing 210000China Jiangsu Key Lab of Image and Video Understanding for Social Security School of Computer Science and EngineeringNanjing University of Science and TechnologyNanjing 210000China
Artificial intelligence(AI)is an emerging field in which computerized systems are used to carry out complex tasks in place of *** AI algorithms have been developed for disease diagnosis and prediction and treatment re... 详细信息
来源: 评论
Dynamic Social Recommendation with High-Matching Inhomogeneous Relations
Dynamic Social Recommendation with High-Matching Inhomogeneo...
收藏 引用
2023 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2023
作者: Li, Shenghan Wang, Jinyan Zeng, Huachang Li, Jun Wei, Yuecen Li, Xianxian Guangxi Normal University Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guilin China Guangxi Normal University Guangxi Key Lab of Multi-source Information Mining Security Guilin China School of Computer Science and Engineering Guangxi Normal University Guilin China School of Computer and Information Technology Anhui Vocational and Technical College Hefei China
Social recommendation utilizing social relations as auxiliary information can alleviate data sparsity issues of collaborative filtering methods. However, existing social recommendation methods usually focus on the sha... 详细信息
来源: 评论
DRL-Based Time-Varying Workload Scheduling With Priority and Resource Awareness
收藏 引用
IEEE Transactions on network and Service Management 2025年 第3期22卷 2838-2852页
作者: Liu, Qifeng Fan, Qilin Zhang, Xu Li, Xiuhua Wang, Kai Xiong, Qingyu Chongqing University School of Big Data and Software Engineering Chongqing400044 China Chongqing University Key Laboratory of Dependable Service Computing in Cyber Physical Society of Ministry of Education Chongqing400044 China Nanjing University School of Electronic Science and Engineering Nanjing210023 China Haihe Laboratory of Information Technology Application Innovation Tianjin300072 China Harbin Institute of Technology School of Computer Science and Technology Weihai264209 China Shandong Key Laboratory of Industrial Network Security Weihai264209 China
With the proliferation of cloud services and the continuous growth in enterprises' demand for dynamic multi-dimensional resources, the implementation of effective strategy for time-varying workload scheduling has ... 详细信息
来源: 评论