咨询与建议

限定检索结果

文献类型

  • 1,677 篇 会议
  • 1,155 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,836 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,891 篇 工学
    • 1,442 篇 计算机科学与技术...
    • 1,155 篇 软件工程
    • 516 篇 信息与通信工程
    • 215 篇 控制科学与工程
    • 214 篇 电气工程
    • 171 篇 生物工程
    • 164 篇 电子科学与技术(可...
    • 154 篇 网络空间安全
    • 126 篇 机械工程
    • 72 篇 光学工程
    • 72 篇 仪器科学与技术
    • 71 篇 生物医学工程(可授...
    • 58 篇 安全科学与工程
    • 54 篇 交通运输工程
    • 42 篇 化学工程与技术
    • 41 篇 动力工程及工程热...
  • 807 篇 理学
    • 511 篇 数学
    • 181 篇 生物学
    • 153 篇 物理学
    • 148 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 44 篇 化学
  • 467 篇 管理学
    • 281 篇 管理科学与工程(可...
    • 210 篇 图书情报与档案管...
    • 90 篇 工商管理
  • 102 篇 法学
    • 60 篇 社会学
    • 44 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 31 篇 军事学
  • 18 篇 农学
  • 12 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 126 篇 feature extracti...
  • 104 篇 semantics
  • 88 篇 accuracy
  • 85 篇 training
  • 77 篇 cryptography
  • 75 篇 computational mo...
  • 68 篇 authentication
  • 66 篇 security
  • 65 篇 federated learni...
  • 62 篇 privacy
  • 61 篇 deep learning
  • 55 篇 data models
  • 48 篇 object detection
  • 47 篇 protocols
  • 45 篇 information secu...
  • 42 篇 neural networks
  • 38 篇 robustness
  • 37 篇 visualization
  • 36 篇 convolution
  • 36 篇 optimization

机构

  • 228 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 56 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 52 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 38 篇 shandong provinc...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 28 篇 college of compu...
  • 28 篇 qilu university ...
  • 28 篇 college of compu...
  • 27 篇 shandong provinc...
  • 26 篇 pca lab key lab ...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 72 篇 yang jian
  • 31 篇 jian yang
  • 30 篇 meng deyu
  • 27 篇 xu li
  • 25 篇 jianfeng ma
  • 23 篇 ma jianfeng
  • 23 篇 xie jin
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 li xianxian
  • 20 篇 xiaoming wu
  • 20 篇 li hui
  • 20 篇 liu ximeng
  • 19 篇 zhixin li
  • 18 篇 xianxian li
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 17 篇 li zhixin
  • 16 篇 zhang yuqing

语言

  • 2,567 篇 英文
  • 176 篇 其他
  • 97 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2836 条 记 录,以下是371-380 订阅
排序:
GAF-GAN: Gated Attention Feature Fusion Image Inpainting network Based on Generative Adversarial network  29
GAF-GAN: Gated Attention Feature Fusion Image Inpainting Net...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Qiu, Ran Liang, Hu Liu, Yuchen Zhao, Shengrong Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Qilu University of Technology Shandong Academy of Sciences Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
Image inpainting, which aims to reconstruct reasonably clear and realistic images from known pixel information, is one of the core problems in computer vision. However, due to the complexity and variability of the und... 详细信息
来源: 评论
Vulnerability knowledge extraction method based on joint extraction model  9
Vulnerability knowledge extraction method based on joint ext...
收藏 引用
9th International Conference on Advanced Cloud and Big Data, CBD 2021
作者: Liu, Zhen Di, XiaoQiang Song, Wei Ren, WeiWu Jilin Key Laboratory of Network and Information Security Changchun University of Science and Tecchnology Changchun China School of Computer Science and Technology Changchun University of Science of Technology Changchun China Information Center Changchun University of Science and Technology Changchun China
information extraction is an important semantic processing task to construct network security knowledge graph. Extracting entities and relationships in vulnerability description from public data sets will inevitably l... 详细信息
来源: 评论
network security Situation Prediction Implemented by Attention and BiLSTM
Network Security Situation Prediction Implemented by Attenti...
收藏 引用
2022 International Conference on networking and network Applications, NaNA 2022
作者: Zhao, Dongmei Wu, Yaxing Li, Qingru Hebei Normal University Hebei Provincial Key Laboratory of Network and Information Security Shijiazhuang China Hebei Normal University College of Computer and Cyberspce Security Shijiazhuang China Hebei Normal University Hebei Supply Chain Big Data Analysis Data Security Engineering Research Center Shijiazhuang China
With the increasing diversification and complexity of network security attacks, it is becoming more and more difficult to predict the network situation. In order to improve the effect of situation prediction, this pap... 详细信息
来源: 评论
OpenViewer: Openness-Aware Multi-View Learning
arXiv
收藏 引用
arXiv 2024年
作者: Du, Shide Fang, Zihan Tan, Yanchao Wang, Changwei Wang, Shiping Guo, Wenzhong College of Computer and Data Science Fuzhou University Fuzhou China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Jinan China
Multi-view learning methods leverage multiple data sources to enhance perception by mining correlations across views, typically relying on predefined categories. However, deploying these models in real-world scenarios... 详细信息
来源: 评论
An Active Learning Framework for Continuous Rapid Rumor Detection in Evolving Social Media
An Active Learning Framework for Continuous Rapid Rumor Dete...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Zhejie Shao Guoyong Cai Qinghua Liu Yunxian Shang College of Computer and Information Security Guilin University of Electronic Technology Guangxi China Guangxi Key Lab of Trusted Software Guangxi China
The widespread of social media has led to the propagation of rumors, resulting in detrimental effects on society. Existing rumor detection methods rely on labeled data and face challenges in obtaining sufficient data,... 详细信息
来源: 评论
Distributionally robust optimization based chance-constrained energy management for hybrid energy powered cellular networks
收藏 引用
Digital Communications and networks 2023年 第3期9卷 797-808页
作者: Pengfei Du Hongjiang Lei Imran Shafique Ansari Jianbo Du Xiaoli Chu The Engineering Research Center of Intelligent Air-ground Integrated Vehicle and Traffic Control Ministry of EducationXihua UniversityChengdu610039China Chongqing Key Lab of Mobile Communications Technology Chongqing University of Posts and TelecommunicationsChongqing400065China James Watt School of Engineering University of GlasgowGlasgowG128QQUK Shaanxi Key Laboratory of Information Communication Network and Security Xi'an University of Posts and TelecommunicationsXi'an710121China Electronic and Electrical Engineering University of SheffieldSheffieldS102TNUK
Energy harvesting has been recognized as a promising technique with which to effectively reduce carbon emis-sions and electricity expenses of base ***,renewable energy is inherently stochastic and inter-mittent,imposi... 详细信息
来源: 评论
KGAPG: Knowledge-Aware Neural Group Representation Learning for Attentive Prescription Generation of Traditional Chinese Medicine
KGAPG: Knowledge-Aware Neural Group Representation Learning ...
收藏 引用
2021 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2021
作者: Li, Shuchen Wang, Wei He, Jieyue MOE Southeast University Key Lab of Computer Network Information Integration Nanjing China
Prescriptions play an essential role in the process of Traditional Chinese Medicine (TCM) diagnosis and treatment. Prescription generation is to generate a set of herbs to treat the symptoms of a patient by analyzing ... 详细信息
来源: 评论
A study of watermarking techniques for data publishing
收藏 引用
Multimedia Tools and Applications 2025年 1-30页
作者: Yuan, Shuguang Yu, Jing Yang, Ke Wang, Yuyang Li, Zhaochen Qiu, Jiabao Yang, Tengfei Chen, Chi Institute of Information Engineering Chinese Academy of Science Beijing China State Key Laboratory of Cyberspace Security Defense Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China National Computer Network Emergency Response Technical Team/Coordination Center of China Beijing China
In today’s digital era, data sharing is becoming an emerging trend. However, copying, manipulating, and distributing multimedia data over an open channel is easy. Watermarking is one of the most promising methods for... 详细信息
来源: 评论
Calibration bottleneck: over-compressed representations are less calibratable  24
Calibration bottleneck: over-compressed representations are ...
收藏 引用
Proceedings of the 41st International Conference on Machine Learning
作者: Deng-Bao Wang Min-Ling Zhang School of Computer Science and Engineering Southeast University Nanjing China and Key Lab. of Computer Network and Information Integration (Southeast University) MOE China
Although deep neural networks have achieved remarkable success, they often exhibit a significant deficiency in reliable uncertainty calibration. This paper focus on model calibratability, which assesses how amenable a...
来源: 评论
AdvAD: Exploring Non-Parametric Diffusion for Imperceptible Adversarial Attacks
arXiv
收藏 引用
arXiv 2025年
作者: Li, Jin He, Ziqiang Luo, Anwei Hu, Jian-Fang Wang, Z. Jane Kang, Xiangui Guangdong Key Lab of Information Security School of Computer Science and Engineering Sun Yat-Sen University China Electrical and Computer Engineering Dept University of British Columbia Canada
Imperceptible adversarial attacks aim to fool DNNs by adding imperceptible perturbation to the input data. Previous methods typically improve the imperceptibility of attacks by integrating common attack paradigms with... 详细信息
来源: 评论