咨询与建议

限定检索结果

文献类型

  • 1,675 篇 会议
  • 1,145 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,824 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,879 篇 工学
    • 1,428 篇 计算机科学与技术...
    • 1,155 篇 软件工程
    • 511 篇 信息与通信工程
    • 213 篇 电气工程
    • 203 篇 控制科学与工程
    • 171 篇 生物工程
    • 160 篇 电子科学与技术(可...
    • 152 篇 网络空间安全
    • 127 篇 机械工程
    • 73 篇 光学工程
    • 72 篇 仪器科学与技术
    • 71 篇 生物医学工程(可授...
    • 59 篇 安全科学与工程
    • 55 篇 交通运输工程
    • 42 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 807 篇 理学
    • 509 篇 数学
    • 181 篇 生物学
    • 155 篇 物理学
    • 147 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 44 篇 化学
  • 465 篇 管理学
    • 282 篇 管理科学与工程(可...
    • 207 篇 图书情报与档案管...
    • 92 篇 工商管理
  • 102 篇 法学
    • 60 篇 社会学
    • 44 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 31 篇 军事学
  • 18 篇 农学
  • 14 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 126 篇 feature extracti...
  • 104 篇 semantics
  • 88 篇 accuracy
  • 85 篇 training
  • 77 篇 cryptography
  • 75 篇 computational mo...
  • 68 篇 authentication
  • 66 篇 security
  • 62 篇 federated learni...
  • 62 篇 privacy
  • 60 篇 deep learning
  • 55 篇 data models
  • 48 篇 object detection
  • 47 篇 protocols
  • 45 篇 information secu...
  • 42 篇 neural networks
  • 38 篇 robustness
  • 37 篇 visualization
  • 36 篇 convolution
  • 36 篇 optimization

机构

  • 225 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 56 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 52 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 37 篇 shandong provinc...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 28 篇 qilu university ...
  • 28 篇 college of compu...
  • 27 篇 college of compu...
  • 26 篇 pca lab key lab ...
  • 24 篇 shandong provinc...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 73 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 23 篇 ma jianfeng
  • 23 篇 xie jin
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 li xianxian
  • 20 篇 xiaoming wu
  • 20 篇 li hui
  • 20 篇 liu ximeng
  • 19 篇 zhixin li
  • 18 篇 xianxian li
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 16 篇 zhang yuqing
  • 16 篇 zhang shichao

语言

  • 2,567 篇 英文
  • 164 篇 其他
  • 97 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2824 条 记 录,以下是301-310 订阅
排序:
Time Series Anomaly Detection Based on Normalized Flow and Bayesian networks  9
Time Series Anomaly Detection Based on Normalized Flow and B...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Yao, Honglei Liu, Donglan Chang, Yingxian Liu, Xin Tang, Chaofan State Grid Shandong Electric Power Research Institute Jinan China State Grid Shandong Electric Power Company Jinan China Qilu University of Technology Shandong Academy of Sciences Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China
Time series anomaly detection often faces significant challenges due to the high dimensionality, interdependence, and label sparsity of the data. Traditional methods struggle to model the intricate relationships betwe... 详细信息
来源: 评论
A Triangular Stable Node network based on Self-supervised Learning for personalized prediction
A Triangular Stable Node Network based on Self-supervised Le...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Liu, Qing Gao, Qian Fan, Jun Zhang, Zhiqiang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan250014 China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology Shandong Academy of Sciences Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan250014 China China Telecom Digital Intelligence Techonology Co Ltd. No.1999 Shunhua road Shandong Jinan250101 China
In recent years, research has illuminated the potency of implicit data processing in enhancing user preferences. Nevertheless, barriers remain in breaking through the constraints of implicit information. This study ai... 详细信息
来源: 评论
EVPIR: Efficient and Verifiable Privacy-Preserving Image Retrieval in Cloud-assisted Internet of Things
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Li, Mingyue Li, Yuntao Du, Ruizhong Jia, Chunfu Shao, Wei Hebei University School of Cyber Security and Computer Baoding071000 China Key Lab on High Trusted Information Sys tem in Hebei Province Hebei China College of Cyber Sciences Nankai university Tianjin300350 China Tianjin Key Laboratory of Network and Data Security Technology Tianjin300350 China Jinan250014 China
With the proliferation of mobile devices and the advancement of cloud computing capabilities, cloud-assisted Internet of Things (IoT) attracts increased attention based on its computational and storage advantages. Upo... 详细信息
来源: 评论
Discrete Jaya algorithm to solve the police resource deployment problem in emergency traffic accident  10
Discrete Jaya algorithm to solve the police resource deploym...
收藏 引用
10th IEEE Joint International information Technology and Artificial Intelligence Conference, ITAIC 2022
作者: Jing, Zhang Weijie, Ding Zhejiang Police College Department of Computer and Information Security Hangzhou310053 China Big-data and Network Security Research Institute Zhejiang Police College Hangzhou310053 China College of Information Engineering Zhejiang University of Technology Hangzhou310023 China Key Laboratory of Public Security Information Application Based on Big-data Architecture Ministry of Public Security Hangzhou310053 China
Aiming at the high frequency of urban traffic accidents and the relative shortage of police resources, a multi-objective discrete Jaya algorithm is proposed to solve the problem of police resource deployment in emerge... 详细信息
来源: 评论
Multi-scale Community Detection in Subspace of Attribute  28th
Multi-scale Community Detection in Subspace of Attribute
收藏 引用
28th International Conference on Database Systems for Advanced Applications, DASFAA 2023
作者: Yan, Cairui Ma, Huifang Tang, Yuechen Li, Xiaohong Li, Zhixin College of Computer Science and Engineering Northwest Normal University Gansu Lanzhou730070 China Guangxi Key Lab of Multi-source Information Mining and Security Guangxi Normal University Guangxi Guilin541004 China
The goal of attributed community detection is to search a partition of the network such that there is high cohesion within each group and low coupling between two groups. We argue that multiple partitions of the attri... 详细信息
来源: 评论
Automatic skin lesion classification using a novel densely connected convolutional network integrated with an attention module
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第7期14卷 8943-8956页
作者: Shan, Pufang Chen, Jialei Fu, Chong Cao, Lin Tie, Ming Sham, Chiu-Wing School of Computer Science and Engineering Northeastern University Shenyang110819 China Engineering Research Center of Security Technology of Complex Network System Ministry of Education Shenyang China Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Northeastern University Shenyang110819 China School of Information and Communication Engineering Beijing Information Science and Technology University Beijing100101 China Science and Technology on Space Physics Laboratory Beijing100076 China School of Computer Science The University of Auckland Auckland New Zealand
Automated skin lesion classification in dermoscopy images remains challenging due to the existence of artefacts and intrinsic cutaneous features, diversity of lesion morphology, insufficiency of training data, and cla... 详细信息
来源: 评论
Early Detection of Autism in Children Using Transfer Learning
收藏 引用
Intelligent Automation & Soft Computing 2023年 第4期36卷 11-22页
作者: Taher M.Ghazal Sundus Munir Sagheer Abbas Atifa Athar Hamza Alrababah Muhammad Adnan Khan School of Information Technology Skyline University CollegeSharjah1797UAE Network and Communication Technology Lab Center for Cyber SecurityFaculty of Information Science and Technology Universiti Kebangsaan Malaysia43600Malaysia School of Computer Science National College of Business Administration&EconomicsLahore54000Pakistan Lahore Garrison University Lahore54000Pakistan Department of Computer Science COMSATS University Islamabad–Lahore CampusLahore54000Pakistan Department of Software Pattern Recognition and Machine Learning LabGachon UniversitySeongnamGyeonggido13120Korea
Autism spectrum disorder(ASD)is a challenging and complex neurodevelopment syndrome that affects the child’s language,speech,social skills,communication skills,and logical thinking *** early detection of ASD is essen... 详细信息
来源: 评论
Reputation based Adaptive Federated Learning in Medical Scenarios
Reputation based Adaptive Federated Learning in Medical Scen...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Lianhai Wang Tianrui Liu Yingxiaochun Wang Xinlei Wang Qi Li Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
Federated Learning (FL) is a distributed machine learning paradigm designed to address data silos and protect data privacy. However, in medical scenarios, the heterogeneity in data quality and the non-independent and ... 详细信息
来源: 评论
EVADE: Targeted Adversarial False Data Injection Attacks for State Estimation in Smart Grid
IEEE Transactions on Sustainable Computing
收藏 引用
IEEE Transactions on Sustainable Computing 2024年 第3期10卷 534-546页
作者: Tian, Jiwei Shen, Chao Wang, Buhong Ren, Chao Xia, Xiaofang Dong, Runze Cheng, Tianhao Ministry of Education Key Laboratory for Intelligent Networks and Network Security School of Cyber Science and Engineering Xi'an Jiaotong University Xi'an China Air Traffic Control and Navigation College Air Force Engineering University Xi'an China Information and Navigation College Air Force Engineering University Xi'an China School of Electrical and Electronic Engineering Nanyang Technological University Singapore School of Computer Science and Technology Xidian University Xi'an China
Although conventional false data injection attacks can circumvent the detection of bad data detection (BDD) in sustainable power grid cyber physical systems, they are easily detected by well-trained deep learning-base... 详细信息
来源: 评论
LCLB: Low Cross-Chain Transaction Ratio and Load Balancing for Blockchain Sharding
LCLB: Low Cross-Chain Transaction Ratio and Load Balancing f...
收藏 引用
Robotics, Intelligent Control and Artificial Intelligence (RICAI), International Conference on
作者: Yu Wang Xiaoming Wu Qile Yuan Yunfeng Dong Xiangzhi Liu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
As blockchain technology becomes widely applied, handling high volumes of transactions has become a critical challenge. Sharding has emerged as an effective solution to enhance the throughput of blockchain systems. Ye... 详细信息
来源: 评论