咨询与建议

限定检索结果

文献类型

  • 1,675 篇 会议
  • 1,145 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,824 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,879 篇 工学
    • 1,428 篇 计算机科学与技术...
    • 1,155 篇 软件工程
    • 511 篇 信息与通信工程
    • 213 篇 电气工程
    • 203 篇 控制科学与工程
    • 171 篇 生物工程
    • 160 篇 电子科学与技术(可...
    • 152 篇 网络空间安全
    • 127 篇 机械工程
    • 73 篇 光学工程
    • 72 篇 仪器科学与技术
    • 71 篇 生物医学工程(可授...
    • 59 篇 安全科学与工程
    • 55 篇 交通运输工程
    • 42 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 807 篇 理学
    • 509 篇 数学
    • 181 篇 生物学
    • 155 篇 物理学
    • 147 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 44 篇 化学
  • 465 篇 管理学
    • 282 篇 管理科学与工程(可...
    • 207 篇 图书情报与档案管...
    • 92 篇 工商管理
  • 102 篇 法学
    • 60 篇 社会学
    • 44 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 31 篇 军事学
  • 18 篇 农学
  • 14 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 126 篇 feature extracti...
  • 104 篇 semantics
  • 88 篇 accuracy
  • 85 篇 training
  • 77 篇 cryptography
  • 75 篇 computational mo...
  • 68 篇 authentication
  • 66 篇 security
  • 62 篇 federated learni...
  • 62 篇 privacy
  • 60 篇 deep learning
  • 55 篇 data models
  • 48 篇 object detection
  • 47 篇 protocols
  • 45 篇 information secu...
  • 42 篇 neural networks
  • 38 篇 robustness
  • 37 篇 visualization
  • 36 篇 convolution
  • 36 篇 optimization

机构

  • 225 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 56 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 52 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 37 篇 shandong provinc...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 28 篇 qilu university ...
  • 28 篇 college of compu...
  • 27 篇 college of compu...
  • 26 篇 pca lab key lab ...
  • 24 篇 shandong provinc...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 73 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 23 篇 ma jianfeng
  • 23 篇 xie jin
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 li xianxian
  • 20 篇 xiaoming wu
  • 20 篇 li hui
  • 20 篇 liu ximeng
  • 19 篇 zhixin li
  • 18 篇 xianxian li
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 16 篇 zhang yuqing
  • 16 篇 zhang shichao

语言

  • 2,567 篇 英文
  • 164 篇 其他
  • 97 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2824 条 记 录,以下是351-360 订阅
排序:
A Multidimensional Adaptive Perception Model for security Contraband Detection
SSRN
收藏 引用
SSRN 2023年
作者: Bian, Weixin Feng, Luo Xu, Deqin Jie, Biao Huang, Yi The School of Computer and Information Anhui Normal University Wuhu241002 China Anhui Province Key Laboratory of Network and Information Security Wuhu241002 China
Identifying prohibited items in security X-ray images is a challenging task. Since prohibited items may be intentionally concealed, and the background of X-ray images is complex and the image representation ability is... 详细信息
来源: 评论
Fast Gumbel-Max Sketch and its Applications
Fast Gumbel-Max Sketch and its Applications
收藏 引用
作者: Zhang, Yuanming Wang, Pinghui Qi, Yiyan Cheng, Kuankuan Zhao, Junzhou Tian, Guangjian Guan, Xiaohong Xi'An Jiaotong University MOE Key Laboratory for Intelligent Networks and Network Security Xi'an710049 China Huawei Noah's Ark Lab Hong Kong Tsinghua University Center for Intelligent and Networked Systems Tsinghua National Lab for Information Science and Technology Beijing100084 China
The well-known Gumbel-Max Trick for sampling elements from a categorical distribution (or more generally a non-negative vector) and its variants have been widely used in areas such as machine learning and information ... 详细信息
来源: 评论
A Lightening Fine-grained Access Control Scheme Supporting Full Policy Hiding in Cloud Storage  29
A Lightening Fine-grained Access Control Scheme Supporting F...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Shi, Jiaoli Hu, Chao Yao, Shimao Mei, Zhuolin Wu, Bin Li, Hui Jiujiang Univ. School of Computer and Big Data Jiujiang China Jiangxi Univ. of Finance and Economics School of Software IoT Engineering Nanchang China Jiujiang Key Lab. of Network and Information Security Jiujiang China Jiujiang University School of Computer and Big Data Jiujiang China Peking University School of Elec. and Comp. Engineering Shenzhen China
Efficiency, security, and flexibility are difficult to balance in a full policy hiding CP-ABE scheme. This paper creatively converts the privacy matching problem of access policy and a user's private key to the pr... 详细信息
来源: 评论
TransUKAN:Computing-Efficient Hybrid KAN-Transformer for Enhanced Medical Image Segmentation
arXiv
收藏 引用
arXiv 2024年
作者: Wu, Yanlin Li, Tao Wang, Zhihong Kang, Hong He, Along Tianjin Key Laboratory of Network and Data Security Technology College of Computer Science Nankai University Tianjin China Haihe Lab of ITAI China
U-Net is currently the most widely used architecture for medical image segmentation. Benefiting from its unique encoder-decoder architecture and skip connections, it can effectively extract features from input images ... 详细信息
来源: 评论
CroPrompt: Cross-task Interactive Prompting for Zero-shot Spoken Language Understanding
CroPrompt: Cross-task Interactive Prompting for Zero-shot Sp...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Qin, Libo Wei, Fuxuan Chen, Qiguang Zhou, Jingxuan Huang, Shijue Si, Jiasheng Lu, Wenpeng Che, Wanxiang School of Computer Science and Engineering Central South University China Key Laboratory of Data Intelligence and Advanced Computing in Provincial Universities Soochow University China Research Center for Social Computing and Information Retrieval Harbin Institute of Technology China Harbin Institute of Technology Shenzhen China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology Shandong Academy of Sciences China
Slot filling and intent detection are two highly correlated tasks in spoken language understanding (SLU). Recent SLU research attempts to explore zero-shot prompting techniques in large language models to alleviate th...
来源: 评论
Adaptive Multi-Modality Prompt Learning  24
Adaptive Multi-Modality Prompt Learning
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Wu, Zongqian Liu, Yujing Zhan, Mengmeng Hu, Ping Zhu, Xiaofeng School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China Guangxi Key Lab of Multisource Information Mining and Security Guangxi Normal University Guilin China Shenzhen Institute for Advanced Study University of Electronic Science and Technology of China Shenzhen China
Although current prompt learning methods have successfully been designed to effectively reuse the large pre-trained models without fine-tuning their large number of parameters, they still have limitations to be addres... 详细信息
来源: 评论
Improved Design of des Algorithm Based on Symmetric Encryption Algorithm
Improved Design of des Algorithm Based on Symmetric Encrypti...
收藏 引用
2021 IEEE International Conference on Power Electronics, computer Applications, ICPECA 2021
作者: Yihan, Wang Yongzhen, Li Yanbian University Network Communication and Information Security Lab Dept. of Computer Science and Technology Yanji China
To address issues in security the threat posed to the DES algorithm by brute force cracking, as well as the low efficiency of the 3DES algorithm, I propose extending the length of the DES algorithm's key. First, c... 详细信息
来源: 评论
Revolutionizing Symbiotic Radio: Exploiting Tradeoffs in Hybrid Active-Passive Communications
arXiv
收藏 引用
arXiv 2025年
作者: Xu, Rui Ye, Yinghui Sun, Haijian Shi, Liqin Lu, Guangyue Shaanxi Key Laboratory of Information Communication Network and Security Xi’an University of Posts & Telecommunications China School of Electrical and Computer Engineering The University of Georgia AthensGA United States
Symbiotic radio (SR), a novel energy- and spectrum-sharing paradigm of backscatter communications (BC), has been deemed a promising solution for ambient Internet of Things (A-IoT), enabling ultra-low power consumption... 详细信息
来源: 评论
Prediction of piRNA-mRNA interactions based on an interactive inference network
Prediction of piRNA-mRNA interactions based on an interactiv...
收藏 引用
2023 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2023
作者: Liu, Yajun Li, Ru Li, Aimin Fei, Rong Guo, Xie Wu, Fang-Xiang Xi'an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China Xi'an University of Technology Shaanxi Key Laboratory of Complex System Control and Intelligent Information Processing Xi'an China University of Saskatchewan Division of Biomedical Engineering Department of Computer Science Department of Mechanical Engineering Saskatoon Canada
As the largest class of small non-coding RNAs, piRNAs primarily present in the reproductive cells of mammals, which influence post-transcriptional processes of mRNAs in multiple ways. Effective methods for predicting ... 详细信息
来源: 评论
Hyperbolic Geometric Graph Representation Learning for Hierarchy-imbalance Node Classification  23
Hyperbolic Geometric Graph Representation Learning for Hiera...
收藏 引用
2023 World Wide Web Conference, WWW 2023
作者: Fu, Xingcheng Wei, Yuecen Sun, Qingyun Yuan, Haonan Wu, Jia Peng, Hao Li, Jianxin School of Computer Science and Engineering Bdbc Beihang University Beijing China Guangxi Key Lab of Multi-source Information Mining Security Guangxi Normal University Guilin China School of Computing Macquarie University Sydney Australia School of Computer Science and Engineering Beihang University Zhongguancun Lab Beijing China
Learning unbiased node representations for imbalanced samples in the graph has become a more remarkable and important topic. For the graph, a significant challenge is that the topological properties of the nodes (e.g.... 详细信息
来源: 评论