咨询与建议

限定检索结果

文献类型

  • 1,677 篇 会议
  • 1,155 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,836 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,891 篇 工学
    • 1,442 篇 计算机科学与技术...
    • 1,155 篇 软件工程
    • 516 篇 信息与通信工程
    • 215 篇 控制科学与工程
    • 214 篇 电气工程
    • 171 篇 生物工程
    • 164 篇 电子科学与技术(可...
    • 154 篇 网络空间安全
    • 126 篇 机械工程
    • 72 篇 光学工程
    • 72 篇 仪器科学与技术
    • 71 篇 生物医学工程(可授...
    • 58 篇 安全科学与工程
    • 54 篇 交通运输工程
    • 42 篇 化学工程与技术
    • 41 篇 动力工程及工程热...
  • 807 篇 理学
    • 511 篇 数学
    • 181 篇 生物学
    • 153 篇 物理学
    • 148 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 44 篇 化学
  • 467 篇 管理学
    • 281 篇 管理科学与工程(可...
    • 210 篇 图书情报与档案管...
    • 90 篇 工商管理
  • 102 篇 法学
    • 60 篇 社会学
    • 44 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 31 篇 军事学
  • 18 篇 农学
  • 12 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 126 篇 feature extracti...
  • 104 篇 semantics
  • 88 篇 accuracy
  • 85 篇 training
  • 77 篇 cryptography
  • 75 篇 computational mo...
  • 68 篇 authentication
  • 66 篇 security
  • 65 篇 federated learni...
  • 62 篇 privacy
  • 61 篇 deep learning
  • 55 篇 data models
  • 48 篇 object detection
  • 47 篇 protocols
  • 45 篇 information secu...
  • 42 篇 neural networks
  • 38 篇 robustness
  • 37 篇 visualization
  • 36 篇 convolution
  • 36 篇 optimization

机构

  • 228 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 56 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 52 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 38 篇 shandong provinc...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 28 篇 college of compu...
  • 28 篇 qilu university ...
  • 28 篇 college of compu...
  • 27 篇 shandong provinc...
  • 26 篇 pca lab key lab ...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 72 篇 yang jian
  • 31 篇 jian yang
  • 30 篇 meng deyu
  • 27 篇 xu li
  • 25 篇 jianfeng ma
  • 23 篇 ma jianfeng
  • 23 篇 xie jin
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 li xianxian
  • 20 篇 xiaoming wu
  • 20 篇 li hui
  • 20 篇 liu ximeng
  • 19 篇 zhixin li
  • 18 篇 xianxian li
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 17 篇 li zhixin
  • 16 篇 zhang yuqing

语言

  • 2,567 篇 英文
  • 176 篇 其他
  • 97 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2836 条 记 录,以下是331-340 订阅
排序:
OpenViewer: Openness-Aware Multi-View Learning  39
OpenViewer: Openness-Aware Multi-View Learning
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Du, Shide Fang, Zihan Tan, Yanchao Wang, Changwei Wang, Shiping Guo, Wenzhong College of Computer and Data Science Fuzhou University Fuzhou China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Jinan China
Multi-view learning methods leverage multiple data sources to enhance perception by mining correlations across views, typically relying on predefined categories. However, deploying these models in real-world scenarios... 详细信息
来源: 评论
AdvAD: exploring non-parametric diffusion for imperceptible adversarial attacks  24
AdvAD: exploring non-parametric diffusion for imperceptible ...
收藏 引用
Proceedings of the 38th International Conference on Neural information Processing Systems
作者: Jin Li Ziqiang He Anwei Luo Jian-Fang Hu Z. Jane Wang Xiangui Kang Guangdong Key Lab of Information Security School of Computer Science and Engineering Sun Yat-Sen University Electrical and Computer Engineering Dept University of British Columbia
Imperceptible adversarial attacks aim to fool DNNs by adding imperceptible perturbation to the input data. Previous methods typically improve the imperceptibility of attacks by integrating common attack paradigms with...
来源: 评论
A Dirty Data Identification Method in Mechanical Equipment Condition Monitoring
A Dirty Data Identification Method in Mechanical Equipment C...
收藏 引用
Smart World Congress (SWC), IEEE
作者: Huijuan Hao Hongge Zhao Sijian Zhu Yue Feng Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China Jinan China
The rise of the Industrial Internet of Things (IIOT) has brought new opportunities for the mechanical equipment condition monitoring. The trend towards intelligent and automated production of mechanical equipment has ... 详细信息
来源: 评论
A Data security Protection Method for Deep Neural network Model Based on Mobility and Sharing  1
收藏 引用
18th International Conference on Green, Pervasive, and Cloud Computing, GPC 2023
作者: Zhao, Xinjian Li, Qianmu Wang, Qi Chen, Shi Li, Tengfei Li, Nianzhe State Grid Jiangsu Information and Telecommunication Company Jiangsu Nanjing210024 China School of Computer Science and Engineering Nanjing University of Science and Technology Jiangsu Nanjing210094 China State Grid Smart Grid Research Institute Co. Ltd. Jiangsu Nanjing210003 China State Grid Key Laboratory of Information and Network Security Jiangsu Nanjing210003 China
With the rapid development of digital economy, numerous business scenarios, such as smart grid, energy network, intelligent transportation, etc., require the design and distribution of deep neural network (DNN) models... 详细信息
来源: 评论
An Approach to New Bearing Fault Diagnosis Utilizing Deep Transfer Learning
An Approach to New Bearing Fault Diagnosis Utilizing Deep Tr...
收藏 引用
Smart World Congress (SWC), IEEE
作者: HuiJuan Hao Yue Feng HongGe Zhao SiJian Zhu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China Jinan China
Bearings, serving as crucial components in mechanical equipment, exert a direct influence on the overall performance of the system. Deep transfer learning has garnered significant attention in the realm of intelligent... 详细信息
来源: 评论
Speed Master: Quick or Slow Play to Attack Speaker Recognition  39
Speed Master: Quick or Slow Play to Attack Speaker Recogniti...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Ye, Zhe Zhang, Wenjie Ren, Ying Kang, Xiangui Yan, Diqun Ma, Bin Wang, Shiqi Guangdong Key Lab of Information Security School of Computer Science and Engineering Sun Yat-sen University Guangzhou China Faculty of Electrical Engineering and Computer Science Ningbo University Ningbo China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology Shandong Academy of Sciences Jinan China Department of Computer Science City University of Hong Kong Hong Kong
Backdoor attacks pose a significant threat during the model’s training phase. Attackers craft pre-defined triggers to break deep neural networks, ensuring the model accurately classifies clean samples during inferenc... 详细信息
来源: 评论
Trajectory Privacy Protection with Pricing Awareness on Ride-on-Demand System  10
Trajectory Privacy Protection with Pricing Awareness on Ride...
收藏 引用
10th IEEE International Conference on Cyber security and Cloud Computing and 9th IEEE International Conference on Edge Computing and Scalable Cloud, CSCloud-EdgeCom 2023
作者: Jia, Sihui Long, Saiqin Zheng, Zhirun Deng, Qingyong Wang, Ping Tian, Shujuan Xiangtan University School of Computer Science and School of Cyberspace Science Hunan International Scientific and Technological Cooperation Base of Intelligent network Xiangtan China Jinan University School of Information Science and Technology Guangzhou China Xiangtan University School of Mathematics and Compulational Science Xiangtan China Guangxi Normal University Guangxi Key Lab of Multi-source Information Mining and Security Guilin China
With the widespread use of the Ride-on Demand (RoD) system, many privacy issues have been exposed, and there is growing concern about whether private information will be leaked. For this problem, our previous work add... 详细信息
来源: 评论
Research and Implementation of Trusted Blockchain Core Technology Based on State Secret Algorithm
收藏 引用
China Communications 2025年 第4期22卷 143-160页
作者: Zheng Qingan Meng Jialin Wu Junjie Li Jingtao Lin Haonan Computer Science and Information Security Management Department Fujian Police CollegeFuzhou 350007China Fujian Province Key Laboratory for Digital Network Crime Supervision and Prevention Fuzhou 350007China ByteDance Technology(Beijing)Co. Ltd.Haidian DistrictBeijing 100080China Dongguan Water Group Co. LtdDongguan 523000China Fuqing Municipal Public Security Bureau Fuzhou 350301China
With the rapid development of blockchain technology,the Chinese government has proposed that the commercial use of blockchain services in China should support the national encryption standard,also known as the state s... 详细信息
来源: 评论
Age of information Analysis for CR-NOMA Aided Uplink Systems with Randomly Arrived Packets
收藏 引用
IEEE Transactions on Communications 2024年
作者: Sun, Yanshi Ye, Yanglin Ding, Zhiguo Zhou, Momiao Liu, Lei Hefei University of Technology School of Computer Science and Information Engineering Hefei230009 China Khalifa University Department of Computer and Information Engineering Abu Dhabi United Arab Emirates Xi'an University of Posts and Telecommunications Shaanxi Key Laboratory of Information Communication Network and Security Xi'an710121 China
This paper studies the application of cognitive radio inspired non-orthogonal multiple access (CR-NOMA) to reduce age of information (AoI) for uplink transmission. In particular, a time division multiple access (TDMA)... 详细信息
来源: 评论
CYBERSHIELD: A Competitive Simulation Environment for Training AI in Cybersecurity
CYBERSHIELD: A Competitive Simulation Environment for Traini...
收藏 引用
International Conference on Internet of Things: Systems, Management and security
作者: José Álvaro Fernández Carrasco Iñigo Amonarriz Pagola Raúl Orduna Urrutia Rodrigo Román Vicomtech Basque Research and Technology Alliance (BRTA) Donostia San Sebastian Spain Network Information and Computer Security Lab University of Malaga Malaga Spain
Simulation environments are crucial in cybersecurity for training AI algorithms, providing a secure and controlled space to explore the impact derived from diverse cyber threads. They offer a flexible platform for acc... 详细信息
来源: 评论