咨询与建议

限定检索结果

文献类型

  • 1,675 篇 会议
  • 1,145 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,824 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,879 篇 工学
    • 1,428 篇 计算机科学与技术...
    • 1,155 篇 软件工程
    • 511 篇 信息与通信工程
    • 213 篇 电气工程
    • 203 篇 控制科学与工程
    • 171 篇 生物工程
    • 160 篇 电子科学与技术(可...
    • 152 篇 网络空间安全
    • 127 篇 机械工程
    • 73 篇 光学工程
    • 72 篇 仪器科学与技术
    • 71 篇 生物医学工程(可授...
    • 59 篇 安全科学与工程
    • 55 篇 交通运输工程
    • 42 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 807 篇 理学
    • 509 篇 数学
    • 181 篇 生物学
    • 155 篇 物理学
    • 147 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 44 篇 化学
  • 465 篇 管理学
    • 282 篇 管理科学与工程(可...
    • 207 篇 图书情报与档案管...
    • 92 篇 工商管理
  • 102 篇 法学
    • 60 篇 社会学
    • 44 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 31 篇 军事学
  • 18 篇 农学
  • 14 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 126 篇 feature extracti...
  • 104 篇 semantics
  • 88 篇 accuracy
  • 85 篇 training
  • 77 篇 cryptography
  • 75 篇 computational mo...
  • 68 篇 authentication
  • 66 篇 security
  • 62 篇 federated learni...
  • 62 篇 privacy
  • 60 篇 deep learning
  • 55 篇 data models
  • 48 篇 object detection
  • 47 篇 protocols
  • 45 篇 information secu...
  • 42 篇 neural networks
  • 38 篇 robustness
  • 37 篇 visualization
  • 36 篇 convolution
  • 36 篇 optimization

机构

  • 225 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 56 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 52 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 37 篇 shandong provinc...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 28 篇 qilu university ...
  • 28 篇 college of compu...
  • 27 篇 college of compu...
  • 26 篇 pca lab key lab ...
  • 24 篇 shandong provinc...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 73 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 23 篇 ma jianfeng
  • 23 篇 xie jin
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 li xianxian
  • 20 篇 xiaoming wu
  • 20 篇 li hui
  • 20 篇 liu ximeng
  • 19 篇 zhixin li
  • 18 篇 xianxian li
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 16 篇 zhang yuqing
  • 16 篇 zhang shichao

语言

  • 2,567 篇 英文
  • 164 篇 其他
  • 97 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2824 条 记 录,以下是391-400 订阅
排序:
Extinction Chains Reveal Intermediate Phases Between the Safety and Collapse in Mutualistic Ecosystems
收藏 引用
Engineering 2024年 第12期43卷 89-98页
作者: Guangwei Wang Xueming Liu Ying Xiao Ye Yuan Linqiang Pan Xiaohong Guan Jianxi Gao Hai-Tao Zhang The MOE Engineering Research Center of Autonomous Intelligent Unmanned Systems State Key Laboratory of Digital Manufacturing Equipment and TechnologySchool of Artificial Intelligence and AutomationHuazhong University of Science and TechnologyWuhan 430074China Guangdong HUST Industrial Technology Research Institute Huazhong University of Science and TechnologyDongguan 523808China Guangdong Provincial Engineering Technology Center of Autonomous Unmanned Vessels Dongguan 523808China MOE Key Laboratory of Intelligent Networks and Network Security&State Key Laboratory of Manufacturing Systems Xi’an Jiaotong UniversityXi’an 710049China Tsinghua National Laboratory of Information Science and Technology Department of AutomationTsinghua UniversityBeijing 100084China Department of Computer Science Rensselaer Polytechnic InstituteTroyNY 12180USA
Ecosystems are undergoing unprecedented persistent deterioration due to unsustainable anthropogenic human activities,such as overfishing and deforestation,and the effects of such damage on ecological stability are ***... 详细信息
来源: 评论
Android Secure Cloud Storage System Based on SM Algorithms  10th
Android Secure Cloud Storage System Based on SM Algorithms
收藏 引用
10th International Conference on computer Engineering and networks, CENet 2020
作者: Wang, Zhiqiang Yu, Kunpeng Wang, Wenbin Yu, Xinyue Kang, Haoyue Lv, Xin Li, Yang Yang, Tao State Information Center Beijing China Beijing Electronic Science and Technology Institute Beijing China Key Lab of Information Network Security Ministry of Public Security Shanghai China
With the rapid development of mobile Internet, the methods of data storage have been greatly enriched. However, many problems exist in mobile internets' current information storage, such as plain-text storage, wea... 详细信息
来源: 评论
Joint Optimization of UAV Deployment and Task Computation Offloading Decision in UAV-assisted Edge Computing network
Joint Optimization of UAV Deployment and Task Computation Of...
收藏 引用
IEEE International Conference on High Performance Computing and Communications (HPCC)
作者: Yichuan Liu Jinbin Tu Yun Wang Key Lab of Computer Network and Information Integration MOE School of Computer Science and Engineering Southeast University Nanjing China
The UAVs' deployment decision and task computation offloading decision in the UAV-assisted edge computing network significantly impact the operating efficiency of edge network. On the basis of this, the Optimizati...
来源: 评论
T-Sorokin: A General Mobility Model in Opportunistic networks
T-Sorokin: A General Mobility Model in Opportunistic Network...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Jinbin Tu Qing Li Yun Wang School of Computer Science and Engineering Southeast University Key Lab of Computer Network and Information Integration MOE Nanjing China
The opportunistic networks are a kind of ad hoc networks that rely on the chance of nodes meeting to transmit messages. Acting as an effective supplement to 4G and 5G networks in some special scenarios where hardware ...
来源: 评论
LAGNet: A Hybrid Deep Learning Model for Automatic Modulation Recognition
LAGNet: A Hybrid Deep Learning Model for Automatic Modulatio...
收藏 引用
IEEE Conference on Wireless Communications and networking
作者: Zhuo Li Guangyue Lu Yuxin Li Hao Zhou Huan Li Shaanxi Key Laboratory of Information Communication Network and Security Xi'an University of Posts and Telecommunications Xi'an China School of Computer Science and Cyber Engineering Guangzhou University Guangzhou China
Automatic Modulation Recognition (AMR) is becoming increasingly crucial in the industrial internet, and it ensures more reliable communication for devices within this vast and intricate network. Although recent applic... 详细信息
来源: 评论
A DoS-attack Resilient Control Approach for AIOT-enabled Systems
A DoS-attack Resilient Control Approach for AIOT-enabled Sys...
收藏 引用
2023 International Conference on Artificial Intelligence of Things and Systems, AIoTSys 2023
作者: Cao, Xiaoya Chen, Zhenya Liu, Weisheng Liu, Yuanlong Wang, Wenting Wang, Xin Yang, Ming Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China State Grid Shandong Electric Power Company Jinan China State Grid Shandong Electric Power Research Institute Jinan China
This paper presents a novel controller design for dealing with the challenges posed by Denial-of-Service (DoS) attacks in the context of Artificial Intelligence of Things (AIOT). The proposed design employs a predicti... 详细信息
来源: 评论
FDSC-YOLOv8:Advancements in Automated Crack Identification for Enhanced Safety in Underground Engineering
收藏 引用
computer Modeling in Engineering & Sciences 2024年 第9期140卷 3035-3049页
作者: Rui Wang Zhihui Liu Hongdi Liu Baozhong Su Chuanyi Ma Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science Center(National Supercomputer Center in Jinan)Qilu University of Technology(Shandong Academy of Sciences)Jinan250353China School of Qilu Transportation Shandong UniversityJinan250100China Geotechnical and Structural Engineering Center Shandong UniversityJinan250061China Shandong Lairong High-Speed Railway Co. Ltd.Weihai264200China Shandong High-Speed Group Co. Ltd.Jinan250014China
In underground engineering,the detection of structural cracks on tunnel surfaces stands as a pivotal task in ensuring the health and reliability of tunnel ***,the dim and dusty environment inherent to under-ground eng... 详细信息
来源: 评论
Attribute-Consistent Knowledge Graph Representation Learning for Multi-Modal Entity Alignment  23
Attribute-Consistent Knowledge Graph Representation Learning...
收藏 引用
2023 World Wide Web Conference, WWW 2023
作者: Li, Qian Guo, Shu Luo, Yangyifei Ji, Cheng Wang, Lihong Sheng, Jiawei Li, Jianxin School of Computer Science and Engineering Bdbc Beihang University Beijing China National Computer Network Emergency Response Technical Team/Coordination Center of China Beijing China Institute of Information Engineering Chinese Academy of Sciences School of Cyber Security Ucas Beijing China Scse Beihang University Zhongguancun Lab Beijing China
The multi-modal entity alignment (MMEA) aims to find all equivalent entity pairs between multi-modal knowledge graphs (MMKGs). Rich attributes and neighboring entities are valuable for the alignment task, but existing... 详细信息
来源: 评论
A Web Attack Detection Method Based on DistilBERT and Feature Fusion for Power Micro-Application Server  2
A Web Attack Detection Method Based on DistilBERT and Featur...
收藏 引用
2nd International Conference on Advanced Electronics, Electrical and Green Energy, AEEGE 2023
作者: Nige, Li Lu, Chen Lei, Zhao Zhenning, Teng Zhiqiang, Wang Yiyang, Shao Xiaolin, Gui State Grid Laboratory of Power Cyber-Security Protection and Monitoring Technology State Grid Smart Grid Research Institute Co.Ltd. Nanjing China Xi'an Jiaotong University Faculty of Electronic and Information Engineering Shaanxi Province Key Laboratory of Computer Network Xi'an China
The widespread use of power micro-applications has significantly expanded the attack surface of their server side, thus increasing the risk of vulnerability attacks such as SQL injection, XSS, and CRLF injection. To e... 详细信息
来源: 评论
Using Problem Frames Approach for key information Extraction from Natural Language Requirements  23
Using Problem Frames Approach for Key Information Extraction...
收藏 引用
23rd IEEE International Conference on Software Quality, Reliability, and security Companion, QRS-C 2023
作者: Tang, Shangzhi Chen, Xuan Xiao, Hongbin Wei, Jiahao Li, Zhi School of Computer Science and Engineering Guangxi Normal University Guilin China Guangxi Normal University Key Lab of Education Blockchain Intelligent Technology Ministry of Education Guilin China Guangxi Normal University Guangxi Key Laboratory of Multi-source Information Mining and Security Guilin China
The correct capturing and understanding of requirements play a crucial role in the software development process. However, the ambiguity in requirements described using natural language (NL) poses a challenge. Existing... 详细信息
来源: 评论