咨询与建议

限定检索结果

文献类型

  • 1,675 篇 会议
  • 1,145 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,824 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,879 篇 工学
    • 1,428 篇 计算机科学与技术...
    • 1,155 篇 软件工程
    • 511 篇 信息与通信工程
    • 213 篇 电气工程
    • 203 篇 控制科学与工程
    • 171 篇 生物工程
    • 160 篇 电子科学与技术(可...
    • 152 篇 网络空间安全
    • 127 篇 机械工程
    • 73 篇 光学工程
    • 72 篇 仪器科学与技术
    • 71 篇 生物医学工程(可授...
    • 59 篇 安全科学与工程
    • 55 篇 交通运输工程
    • 42 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 807 篇 理学
    • 509 篇 数学
    • 181 篇 生物学
    • 155 篇 物理学
    • 147 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 44 篇 化学
  • 465 篇 管理学
    • 282 篇 管理科学与工程(可...
    • 207 篇 图书情报与档案管...
    • 92 篇 工商管理
  • 102 篇 法学
    • 60 篇 社会学
    • 44 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 31 篇 军事学
  • 18 篇 农学
  • 14 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 126 篇 feature extracti...
  • 104 篇 semantics
  • 88 篇 accuracy
  • 85 篇 training
  • 77 篇 cryptography
  • 75 篇 computational mo...
  • 68 篇 authentication
  • 66 篇 security
  • 62 篇 federated learni...
  • 62 篇 privacy
  • 60 篇 deep learning
  • 55 篇 data models
  • 48 篇 object detection
  • 47 篇 protocols
  • 45 篇 information secu...
  • 42 篇 neural networks
  • 38 篇 robustness
  • 37 篇 visualization
  • 36 篇 convolution
  • 36 篇 optimization

机构

  • 225 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 56 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 52 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 37 篇 shandong provinc...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 28 篇 qilu university ...
  • 28 篇 college of compu...
  • 27 篇 college of compu...
  • 26 篇 pca lab key lab ...
  • 24 篇 shandong provinc...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 73 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 23 篇 ma jianfeng
  • 23 篇 xie jin
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 li xianxian
  • 20 篇 xiaoming wu
  • 20 篇 li hui
  • 20 篇 liu ximeng
  • 19 篇 zhixin li
  • 18 篇 xianxian li
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 16 篇 zhang yuqing
  • 16 篇 zhang shichao

语言

  • 2,567 篇 英文
  • 164 篇 其他
  • 97 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2824 条 记 录,以下是431-440 订阅
排序:
The Adaptive Fault-tolerant Routing Based on an Improved Local security information Model of the Exchanged Hypercube  21
The Adaptive Fault-tolerant Routing Based on an Improved Loc...
收藏 引用
21st IEEE International Symposium on Parallel and Distributed Processing with Applications, 13th IEEE International Conference on Big Data and Cloud Computing, 16th IEEE International Conference on Social Computing and networking and 13th International Conference on Sustainable Computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Zhang, Yazhi Luo, Chuanwen Wang, Guijuan Zhang, Li Lv, Mengjie Yu, Jiguo Qilu University of Technology School of Computer Science and Technology Jinan China Beijing Forestry University School of Information Science and Technology Beijing China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China Nanjing University of Posts and Telecommunications College of Computer Nanjing China Qilu University of Technology Shandong Academy of Sciences Big Data Research Institute Jinan China
With the increasing amount of computation in high-performance computing, the scale of interconnection networks is becoming larger and larger. It is inevitable that processors or links in the network become faulty. The... 详细信息
来源: 评论
Quantum Secret Sharing Enhanced: Utilizing W States for Anonymous and Secure Communication
arXiv
收藏 引用
arXiv 2024年
作者: Li, Guo-Dong Cheng, Wen-Chuan Wang, Qing-Le Cheng, Long Mao, Ying Jia, Heng-Yue School of Control and Computer Engineering North China Electric Power University Beijing102206 China Key Lab of Information Network Security Ministry of Public Security Shanghai200031 China Department of Computer and Information Science Fordham University New York City10458 United States School of Information Central University of Finance and Economics Beijing102206 China Engineering Research Center of State Financial Security Ministry of Education Central University of Finance and Economics Beijing102206 China
Quantum secret sharing (QSS) is the result of merging the principles of quantum mechanics with secret information sharing. It enables a sender to share a secret among receivers, and the receivers can then collectively... 详细信息
来源: 评论
Multi-label Text Classification for Judicial Texts via Dual Graph and label Feature Fusion
Multi-Label Text Classification for Judicial Texts via Dual ...
收藏 引用
Smart World Congress (SWC), IEEE
作者: Qiliang Gu Qin Lu Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
The legal judgement prediction (LJP) of judicial texts represents a multi-label text classification (MLTC) problem, which in turn involves three distinct tasks: the prediction of charges, legal articles, and terms of ... 详细信息
来源: 评论
New Cryptographic Bent Functions from Permutations and Linear Translator in Cyber security
New Cryptographic Bent Functions from Permutations and Linea...
收藏 引用
IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC)
作者: Qian Liu Yan Chen Zhixiong Chen Ximeng Liu Hui Lin College of Computer and Data Science Fuzhou University Fuzhou China Fujian Key Laboratory of Financial Information Processing Putian University Putian China Key Laboratory of Information Security of Network Systems College of Computer and Data Science Fuzhou University Fuzhou China College of Computer and Cyber Security Fujian Normal University Fuzhou China
Cryptographic bent functions are maximally nonlinear Boolean functions with an even number of variables. They are not only closely related to some interesting combinatorial objects, but also have important application...
来源: 评论
ACDNet: Attention-guided Collaborative Decision network for Effective Medication Recommendation
arXiv
收藏 引用
arXiv 2023年
作者: Mi, Jiacong Zu, Yi Wang, Zhuoyuan He, Jieyue School of Computer Science and Engineering Key Lab of Computer Network and Information Integration MOE Southeast University Jiangsu Nanjing210018 China
Medication recommendation using Electronic Health Records (EHR) is challenging due to complex medical data. Current approaches extract longitudinal information from patient EHR to personalize recommendations. However,... 详细信息
来源: 评论
Salient Object Detection Based on Pyramid Vision Transformer Gated network
SSRN
收藏 引用
SSRN 2023年
作者: Huo, Lina Zhou, Xiaoli Wang, Wei Cao, Zhiyi Key Laboratory of Network & Information Security Hebei Provincial Engineering Research Center for Supply Chain Big Data Analytics & Data Security College of Computer and Cyber Security Hebei Normal University Hebei Shijiazhuang050024 China
Recently, vision transformers started to show impressive results that significantly outperform large convolution-based models. In this work, we propose a gating network based on Pyramid Vision Transformer for salient ... 详细信息
来源: 评论
StarMFND: Star Topology Multi-Domain Fake News Detection
StarMFND: Star Topology Multi-Domain Fake News Detection
收藏 引用
Data Science and information Technology (DSIT), International Conference on
作者: Pengfei Gu Yibing Chen Wanlong Bing Yahui Liu Hongliang Ma Wei Wang School of Information Science and Technology Shihezi University Shihezi China Xinjiang Production and Construction Corps Key Laboratory of Computing Intelligence and Network Information Security Shihezi China School of Computer Science and Information Technology Beijing Jiaotong University Beijing China
The proliferation of the Internet and the emergence of social media platforms have greatly accelerated the speed and scope of information dissemination, while also introducing the peril of fake news propagation, parti... 详细信息
来源: 评论
DRNet:Towards fast,accurate and practical dish recognition
收藏 引用
Science China(Technological Sciences) 2021年 第12期64卷 2651-2661页
作者: CHENG SiYuan CHU BinFei ZHONG BiNeng ZHANG ZiKai LIU Xin TANG ZhenJun LI XianXian Guangxi Key Lab of Multi-Source Information Mining&Security Guangxi Normal UniversityGuilin 541004China Department of Computer Science and Technology Huaqiao UniversityXiamen 361021China Seetatech Technology Nanjing 211800China
Existing algorithms of dish recognition mainly focus on accuracy with predefined classes,thus limiting their application *** this paper,we propose a practical two-stage dish recognition framework(DRNet)that yields a t... 详细信息
来源: 评论
MMSFD: Multi-grained and Multi-modal Fusion for Short Video Fake News Detection
MMSFD: Multi-grained and Multi-modal Fusion for Short Video ...
收藏 引用
Data Science and information Technology (DSIT), International Conference on
作者: Shuai Ren Yahui Liu Yaping Zhu Wanlong Bing Hongliang Ma Wei Wang School of Information Science and Technology Shihezi University Shihezi China Key Laboratory of Computing Intelligence and Network Information Security Xinjiang Production and Construction Corps Shihezi China School of Computer Science and Information Technology Beijing Jiaotong University Beijing China
Short video platforms have become an essential part of people’s daily lives, while also facing the challenge of the rapid spread of fake news. Therefore, the detection of fake news in short videos has attracted incre... 详细信息
来源: 评论
INN-based Robust JPEG Steganography Through Cover Coefficient Selection
INN-based Robust JPEG Steganography Through Cover Coefficien...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Fei Shang Weixiang Zhao Jingyang Wen Xiangui Kang Z. Jane Wang Guangdong Key Lab of Information Security School of Computer Science and Engineering Sun Yat-Sen University Guangzhou China Electrical and Computer Engineering University of British Columbia Vancouver Canada
Images transmitted through social networks generally undergo JPEG recompression, which degrades image quality and could disrupt embedded secret messages, making error-free extraction of such messages difficult. In thi... 详细信息
来源: 评论