咨询与建议

限定检索结果

文献类型

  • 1,675 篇 会议
  • 1,145 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,824 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,879 篇 工学
    • 1,428 篇 计算机科学与技术...
    • 1,155 篇 软件工程
    • 511 篇 信息与通信工程
    • 213 篇 电气工程
    • 203 篇 控制科学与工程
    • 171 篇 生物工程
    • 160 篇 电子科学与技术(可...
    • 152 篇 网络空间安全
    • 127 篇 机械工程
    • 73 篇 光学工程
    • 72 篇 仪器科学与技术
    • 71 篇 生物医学工程(可授...
    • 59 篇 安全科学与工程
    • 55 篇 交通运输工程
    • 42 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 807 篇 理学
    • 509 篇 数学
    • 181 篇 生物学
    • 155 篇 物理学
    • 147 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 44 篇 化学
  • 465 篇 管理学
    • 282 篇 管理科学与工程(可...
    • 207 篇 图书情报与档案管...
    • 92 篇 工商管理
  • 102 篇 法学
    • 60 篇 社会学
    • 44 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 31 篇 军事学
  • 18 篇 农学
  • 14 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 126 篇 feature extracti...
  • 104 篇 semantics
  • 88 篇 accuracy
  • 85 篇 training
  • 77 篇 cryptography
  • 75 篇 computational mo...
  • 68 篇 authentication
  • 66 篇 security
  • 62 篇 federated learni...
  • 62 篇 privacy
  • 60 篇 deep learning
  • 55 篇 data models
  • 48 篇 object detection
  • 47 篇 protocols
  • 45 篇 information secu...
  • 42 篇 neural networks
  • 38 篇 robustness
  • 37 篇 visualization
  • 36 篇 convolution
  • 36 篇 optimization

机构

  • 225 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 56 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 52 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 37 篇 shandong provinc...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 28 篇 qilu university ...
  • 28 篇 college of compu...
  • 27 篇 college of compu...
  • 26 篇 pca lab key lab ...
  • 24 篇 shandong provinc...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 73 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 23 篇 ma jianfeng
  • 23 篇 xie jin
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 li xianxian
  • 20 篇 xiaoming wu
  • 20 篇 li hui
  • 20 篇 liu ximeng
  • 19 篇 zhixin li
  • 18 篇 xianxian li
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 16 篇 zhang yuqing
  • 16 篇 zhang shichao

语言

  • 2,567 篇 英文
  • 164 篇 其他
  • 97 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2824 条 记 录,以下是321-330 订阅
排序:
Continuous Verification of Catastrophic Recalling in Machine Unlearning via Adversarial Testing  9
Continuous Verification of Catastrophic Recalling in Machine...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Qu, Y. Neil Ji, Zonghao Cui, Lei Zhang, Chong Liu, Lei Tian, Zhiyi Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250031 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan250031 China Deakin University School of IT VIC3125 Australia Xidian University Guangzhou Institute of Technology Guangzhou510555 China University of Technology School of Computer Science SydneyNSW2007 Australia
Throughout the process of machine unlearning, in order to fulfill the requirements of machine unlearning and to comply with the rules of the right to be forgotten, it is natural to verify whether the unlearning model ... 详细信息
来源: 评论
A Deep Reinforcement Learning Approach for Online Taxi Dispatching
A Deep Reinforcement Learning Approach for Online Taxi Dispa...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: YuBo Wang TaoYi Zhang ZhiCheng Wei Key Lab of Network and Information Security College of Computer and Cyber Security Hebei Provincial Engineering Research Center for Supply Chain Big Data Analytics & Security Hebei Normal University Shijiazhuang Hebei Province China
With the development of smart city transportation systems, developing reasonable dispatching strategies for idle ride-hailing vehicles has become an urgent research problem. In this paper, we address the short-sighted...
来源: 评论
Research on the Design of Government Data Governance Evaluation System under the Perspective of Digital Government  9
Research on the Design of Government Data Governance Evaluat...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Xu, Zirui Sun, Jinyang Lu, Zhe Han, Delong Qilu University of Technology Shandong Academy of Sciences Information Research Institute Shandong Academy of Sciences Jinan China SHANDONG SCICOM Information and Economy Research Institute Co. Ltd. Jinan China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China
In the context of the digital era, government data governance is a key factor in promoting the modernization of government governance, but there is a lack of a complete set of evaluation index system to standardize th... 详细信息
来源: 评论
Distributed Deep Learning for Cooperative Computation Offloading in Low Earth Orbit Satellite networks
收藏 引用
China Communications 2022年 第4期19卷 230-243页
作者: Qingqing Tang Zesong Fei Bin Li School of Information and Electronics Beijing Institute of TechnologyBeijing 100081China School of Computer and Software Nanjing University of Information Science and TechnologyNanjing 210044China Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and TelecommunicationsMinistry of EducationNanjing 210003China
Low earth orbit(LEO) satellite network is an important development trend for future mobile communication systems, which can truly realize the“ubiquitous connection” of the whole world. In this paper, we present a co... 详细信息
来源: 评论
NeuVSA: A Unified and Efficient Accelerator for Neural Vector Search  31
NeuVSA: A Unified and Efficient Accelerator for Neural Vecto...
收藏 引用
31st IEEE International Symposium on High Performance computer Architecture, HPCA 2025
作者: Yuan, Ziming Dai, Lei Li, Wen Zhang, Jie Liang, Shengwen Wang, Ying Liu, Cheng Li, Huawei Li, Xiaowei Guo, Jiafeng Wang, Peng Chen, Renhai Zhang, Gong Shanxi University School of Computer and Information Technology China Peking University School of Computer Science China Institute of Computing Technology CAS State Key Lab of Processors China University of Chinese Academy of Sciences China Zhongguancun National Laboratory Beijing China Institute of Computing Technology CAS Key Lab of Network Data Science and Technology China Huawei Technologies Co. Ltd. China
Neural Vector Search (NVS) has exhibited superior search quality over traditional key-based strategies for information retrieval tasks. An effective NVS architecture requires high recall, low latency, and high through... 详细信息
来源: 评论
Multi-Relational Variational Contrastive Learning for Next POI Recommendation
Multi-Relational Variational Contrastive Learning for Next P...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Lin Chen Peipei Wang Xiaohui Han Lijuan Xu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China Quan Cheng Laboratory Jinan China
Next point-of-interest (POI) recommendation aims to predict the next interested POI to the user based on their historical check-in data in location-based social services. Most existing studies have attempted to model ... 详细信息
来源: 评论
Research on liquid crystal display technology based on regional dynamic dimming algorithm  9
Research on liquid crystal display technology based on regio...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Yu, Zhitao Sun, Peng Zhou, Mingle Liu, Qianlong Zhao, Shilong Hisense Video Technology Co. Ltd. Qing Dao China Hisense Visual Technology Co. Ltd. Qing Dao China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
In vehicle liquid crystal display (LCD) technology has attracted much attention for its wide range of applications in automotive infotainment systems. However, conventional LCD technologies have limitations in terms o... 详细信息
来源: 评论
Precise sensitivity recognizing,privacy preserving,knowledge graph-based method for trajectory data publication
收藏 引用
Frontiers of computer Science 2022年 第4期16卷 219-221页
作者: Xianxian Li Bing Cai Li-e Wang Lei Lei Guangxi Key Lab of Multi-source Information Mining and Security Guangxi Normal UniversityGuilin541004China College of Computer Science and Information Engineering Guangxi Normal UniversityGuilin541004China Nanning Tiancheng Zhiyuan Intellectual Property Service Co.Ltd. Nanning530000China
1Introduction The existing privacy protection methods of trajectory data publication have two ***,existing methods[1-3]cannot resist attribute link attacks *** practical scenarios,it is necessary to integrate data fro... 详细信息
来源: 评论
A Multi-Channel Composite Recommendation Method in Federated Learning
A Multi-Channel Composite Recommendation Method in Federated...
收藏 引用
2023 IEEE International Conference on Dependable, Autonomic and Secure Computing, 2023 International Conference on Pervasive Intelligence and Computing, 2023 International Conference on Cloud and Big Data Computing, 2023 International Conference on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2023
作者: Chen, Shi Li, Qianmu Wang, Qi Zhao, Xinjian Ge, Hao Li, Nianzhe State Grid Jiangsu Information & Telecommunication Company Nanjing China School of Computer Science Ana Engineering Nanjing University of Science and Technology Nanjing China State Grid Smart Grid Research Institute Co. Ltd. State Grid Key Laboratory of Information & Network Security Nanjing China
There are various data security risks in power grid systems, and recommendation systems are a good solution to the selection of security strategies. Federated learning is a machine learning framework that can protect ... 详细信息
来源: 评论
Secure and Efficient Blockchain-Based Access Control Scheme with Attribute Update
收藏 引用
IEEE Transactions on Consumer Electronics 2024年
作者: Zuo, Yuting Xu, Li Li, Jiguo Li, Jie Wang, Xiaoding Piran, Md. Jalil Fujian Normal University College of Computer and Cyber Security Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou350117 China Lab Shanghai200240 China Sejong University Department of Computer Science and Engineering Seoul05006 Korea Republic of
Secure data access control is widely concerned in Cyber Physical Systems (CPSs) to protect consumer rights. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is an ideal solution that supports fine-grained access ... 详细信息
来源: 评论