咨询与建议

限定检索结果

文献类型

  • 1,675 篇 会议
  • 1,145 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,824 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,879 篇 工学
    • 1,428 篇 计算机科学与技术...
    • 1,155 篇 软件工程
    • 511 篇 信息与通信工程
    • 213 篇 电气工程
    • 203 篇 控制科学与工程
    • 171 篇 生物工程
    • 160 篇 电子科学与技术(可...
    • 152 篇 网络空间安全
    • 127 篇 机械工程
    • 73 篇 光学工程
    • 72 篇 仪器科学与技术
    • 71 篇 生物医学工程(可授...
    • 59 篇 安全科学与工程
    • 55 篇 交通运输工程
    • 42 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 807 篇 理学
    • 509 篇 数学
    • 181 篇 生物学
    • 155 篇 物理学
    • 147 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 44 篇 化学
  • 465 篇 管理学
    • 282 篇 管理科学与工程(可...
    • 207 篇 图书情报与档案管...
    • 92 篇 工商管理
  • 102 篇 法学
    • 60 篇 社会学
    • 44 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 31 篇 军事学
  • 18 篇 农学
  • 14 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 126 篇 feature extracti...
  • 104 篇 semantics
  • 88 篇 accuracy
  • 85 篇 training
  • 77 篇 cryptography
  • 75 篇 computational mo...
  • 68 篇 authentication
  • 66 篇 security
  • 62 篇 federated learni...
  • 62 篇 privacy
  • 60 篇 deep learning
  • 55 篇 data models
  • 48 篇 object detection
  • 47 篇 protocols
  • 45 篇 information secu...
  • 42 篇 neural networks
  • 38 篇 robustness
  • 37 篇 visualization
  • 36 篇 convolution
  • 36 篇 optimization

机构

  • 225 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 56 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 52 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 37 篇 shandong provinc...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 28 篇 qilu university ...
  • 28 篇 college of compu...
  • 27 篇 college of compu...
  • 26 篇 pca lab key lab ...
  • 24 篇 shandong provinc...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 73 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 23 篇 ma jianfeng
  • 23 篇 xie jin
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 li xianxian
  • 20 篇 xiaoming wu
  • 20 篇 li hui
  • 20 篇 liu ximeng
  • 19 篇 zhixin li
  • 18 篇 xianxian li
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 16 篇 zhang yuqing
  • 16 篇 zhang shichao

语言

  • 2,567 篇 英文
  • 164 篇 其他
  • 97 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2824 条 记 录,以下是381-390 订阅
排序:
Revocable Registered Attribute-Based Encryption With User Deregistration
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Li, Jiguo Chen, Shaobo Lu, Yang Ning, Jianting Shen, Jian Zhang, Yichen Fujian Normal University College of Computer and Cyber Security Fuzhou350117 China Fuzhou350117 China Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou350117 China Nanjing Normal University School of Computer and Electronic Information Nanjing210023 China Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fuzhou350117 China Zhejiang Sci-Tech University School of Information Science and Engineering Hangzhou310018 China
Many businesses are putting their sensitive data in the cloud with the fast growth of cloud computing and storage. To ensure user privacy, it is necessary to keep encrypted data only in the cloud. Attribute-based encr... 详细信息
来源: 评论
Distributionally robust optimization based chance-constrained energy management for hybrid energy powered cellular networks
收藏 引用
Digital Communications and networks 2023年 第3期9卷 797-808页
作者: Pengfei Du Hongjiang Lei Imran Shafique Ansari Jianbo Du Xiaoli Chu The Engineering Research Center of Intelligent Air-ground Integrated Vehicle and Traffic Control Ministry of EducationXihua UniversityChengdu610039China Chongqing Key Lab of Mobile Communications Technology Chongqing University of Posts and TelecommunicationsChongqing400065China James Watt School of Engineering University of GlasgowGlasgowG128QQUK Shaanxi Key Laboratory of Information Communication Network and Security Xi'an University of Posts and TelecommunicationsXi'an710121China Electronic and Electrical Engineering University of SheffieldSheffieldS102TNUK
Energy harvesting has been recognized as a promising technique with which to effectively reduce carbon emis-sions and electricity expenses of base ***,renewable energy is inherently stochastic and inter-mittent,imposi... 详细信息
来源: 评论
KGAPG: Knowledge-Aware Neural Group Representation Learning for Attentive Prescription Generation of Traditional Chinese Medicine
KGAPG: Knowledge-Aware Neural Group Representation Learning ...
收藏 引用
2021 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2021
作者: Li, Shuchen Wang, Wei He, Jieyue MOE Southeast University Key Lab of Computer Network Information Integration Nanjing China
Prescriptions play an essential role in the process of Traditional Chinese Medicine (TCM) diagnosis and treatment. Prescription generation is to generate a set of herbs to treat the symptoms of a patient by analyzing ... 详细信息
来源: 评论
A study of watermarking techniques for data publishing
收藏 引用
Multimedia Tools and Applications 2025年 1-30页
作者: Yuan, Shuguang Yu, Jing Yang, Ke Wang, Yuyang Li, Zhaochen Qiu, Jiabao Yang, Tengfei Chen, Chi Institute of Information Engineering Chinese Academy of Science Beijing China State Key Laboratory of Cyberspace Security Defense Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China National Computer Network Emergency Response Technical Team/Coordination Center of China Beijing China
In today’s digital era, data sharing is becoming an emerging trend. However, copying, manipulating, and distributing multimedia data over an open channel is easy. Watermarking is one of the most promising methods for... 详细信息
来源: 评论
Calibration bottleneck: over-compressed representations are less calibratable  24
Calibration bottleneck: over-compressed representations are ...
收藏 引用
Proceedings of the 41st International Conference on Machine Learning
作者: Deng-Bao Wang Min-Ling Zhang School of Computer Science and Engineering Southeast University Nanjing China and Key Lab. of Computer Network and Information Integration (Southeast University) MOE China
Although deep neural networks have achieved remarkable success, they often exhibit a significant deficiency in reliable uncertainty calibration. This paper focus on model calibratability, which assesses how amenable a...
来源: 评论
AdvAD: Exploring Non-Parametric Diffusion for Imperceptible Adversarial Attacks
arXiv
收藏 引用
arXiv 2025年
作者: Li, Jin He, Ziqiang Luo, Anwei Hu, Jian-Fang Wang, Z. Jane Kang, Xiangui Guangdong Key Lab of Information Security School of Computer Science and Engineering Sun Yat-Sen University China Electrical and Computer Engineering Dept University of British Columbia Canada
Imperceptible adversarial attacks aim to fool DNNs by adding imperceptible perturbation to the input data. Previous methods typically improve the imperceptibility of attacks by integrating common attack paradigms with... 详细信息
来源: 评论
Clothed Human Performance Capture with a Double-layer Neural Radiance Fields
Clothed Human Performance Capture with a Double-layer Neural...
收藏 引用
2023 IEEE/CVF Conference on computer Vision and Pattern Recognition, CVPR 2023
作者: Wang, Kangkan Zhang, Guofeng Cong, Suxu Yang, Jian Key Lab of Intelligent Perception and Systems for High-Dimensional Information of Ministry of Education China Jiangsu Key Lab of Image and Video Understanding for Social Security School of Computer Science and Engineering Nanjing University of Science and Technology China State Key Laboratory of CAD&CG Zhejiang University China
This paper addresses the challenge of capturing performance for the clothed humans from sparse-view or monocular videos. Previous methods capture the performance of full humans with a personalized template or recover ... 详细信息
来源: 评论
Local Spectral for Polarized Communities Search in Attributed Signed network  28th
Local Spectral for Polarized Communities Search in Attribu...
收藏 引用
28th International Conference on Database Systems for Advanced Applications, DASFAA 2023
作者: Yang, Fanyi Ma, Huifang Wang, Wentao Li, Zhixin Chang, Liang College of Computer Science and Engineering Northwest Normal University Gansu Lanzhou730070 China Guangxi Key Lab of Multi-source Information Mining and Security Guangxi Normal University Guangxi Guilin541004 China Guangxi Key Lab of Trusted Software Guilin University of Electronic Technology Guangxi Guilin541004 China
Signed networks are graphs with edge annotations to indicate whether each interaction is friendly (positive edge) or antagonistic (negative edge). Community search on signed network expects to explore the polarized co... 详细信息
来源: 评论
A generalized reliability analysis of 3-ary n-cubes
A generalized reliability analysis of 3-ary n-cubes
收藏 引用
International Conference on Communication Software and networks, ICCSN
作者: Zefang Bai Guijuan Wang Meijie Ma School of Mathematics and Statistics Qilu University of Technology (Shandong Academy of Sciences) Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
Evaluating the reliability of interconnection networks is crucial. The edge-connectivity is a parameter used to assess reliability. In this paper, we discuss a conditional edge-connectivity called the h-extra g-compon... 详细信息
来源: 评论
A Non-Intrusive and Real-Time Data Provenance Method for DDS Systems
A Non-Intrusive and Real-Time Data Provenance Method for DDS...
收藏 引用
International Conference on Mobile Ad-hoc and Sensor networks, MSN
作者: Siyi Wei Jinbin Tu Yun Wang School of Computer Science and Engineering Southeast University Key Lab of Computer Network and Information Integration MOE Nanjing China
In the era of big data, because of the escalating data security threats, the importance of data provenance is widely recognized. It facilitates the tracking of data origins and evolution, improving the ability to diag... 详细信息
来源: 评论