咨询与建议

限定检索结果

文献类型

  • 1,675 篇 会议
  • 1,145 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,824 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,879 篇 工学
    • 1,428 篇 计算机科学与技术...
    • 1,155 篇 软件工程
    • 511 篇 信息与通信工程
    • 213 篇 电气工程
    • 203 篇 控制科学与工程
    • 171 篇 生物工程
    • 160 篇 电子科学与技术(可...
    • 152 篇 网络空间安全
    • 127 篇 机械工程
    • 73 篇 光学工程
    • 72 篇 仪器科学与技术
    • 71 篇 生物医学工程(可授...
    • 59 篇 安全科学与工程
    • 55 篇 交通运输工程
    • 42 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 807 篇 理学
    • 509 篇 数学
    • 181 篇 生物学
    • 155 篇 物理学
    • 147 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 44 篇 化学
  • 465 篇 管理学
    • 282 篇 管理科学与工程(可...
    • 207 篇 图书情报与档案管...
    • 92 篇 工商管理
  • 102 篇 法学
    • 60 篇 社会学
    • 44 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 31 篇 军事学
  • 18 篇 农学
  • 14 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 126 篇 feature extracti...
  • 104 篇 semantics
  • 88 篇 accuracy
  • 85 篇 training
  • 77 篇 cryptography
  • 75 篇 computational mo...
  • 68 篇 authentication
  • 66 篇 security
  • 62 篇 federated learni...
  • 62 篇 privacy
  • 60 篇 deep learning
  • 55 篇 data models
  • 48 篇 object detection
  • 47 篇 protocols
  • 45 篇 information secu...
  • 42 篇 neural networks
  • 38 篇 robustness
  • 37 篇 visualization
  • 36 篇 convolution
  • 36 篇 optimization

机构

  • 225 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 56 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 52 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 37 篇 shandong provinc...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 28 篇 qilu university ...
  • 28 篇 college of compu...
  • 27 篇 college of compu...
  • 26 篇 pca lab key lab ...
  • 24 篇 shandong provinc...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 73 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 23 篇 ma jianfeng
  • 23 篇 xie jin
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 li xianxian
  • 20 篇 xiaoming wu
  • 20 篇 li hui
  • 20 篇 liu ximeng
  • 19 篇 zhixin li
  • 18 篇 xianxian li
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 16 篇 zhang yuqing
  • 16 篇 zhang shichao

语言

  • 2,567 篇 英文
  • 164 篇 其他
  • 97 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2824 条 记 录,以下是451-460 订阅
排序:
Efficient survivable mapping algorithm for logical topology in IP-over-WDM optical networks against node failure
收藏 引用
Journal of Supercomputing 2023年 第5期79卷 5037-5063页
作者: Cheng, Dun-Wei Chang, Jo-Yi Lin, Chen-Yen Lin, Limei Huang, Yanze Thulasiraman, Krishnaiyan Hsieh, Sun-Yuan Department of Computer Science and Information Engineering National Yunlin University of Science and Technology 123 University Road Yunlin64002 Taiwan Department of Computer Science and Information Engineering National Cheng Kung University No. 1 University Road Tainan701 Taiwan College of Mathematics and Informatics and the Key Laboratory of Network Security and Cryptology Fujian Normal University Fujian Fuzhou350117 China Fujian Provincial Key Laboratory of Big Data Mining and Applications School of Mathematics and Physics Fujian University of Technology Fujian Fuzhou350118 China Department of Computer Science University of Oklahoma 660 Parrington Oval NormanOK73019 United States Department of Computer Science and Information Engineering National Chi Nan University No. 1 Daxue Rd Nantou County Puli Township54561 Taiwan
The survivable mapping problem in an IP-over-WDM network with a logical graph and physical graph is the problem of finding a mapping of a logical network in a physical layer so that any failure in physical topology do... 详细信息
来源: 评论
LDD-YOLO: An Improved Lightweight Detection Method for Steel Surface Defects Based on YOLOv8
LDD-YOLO: An Improved Lightweight Detection Method for Steel...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Yuechen Zhang Aimin Li Zhiyao Li Xiaotong Kong Wenqiang Li Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Steel is an indispensable raw material in the industrial field, steel surface defects seriously affect the quality of steel, in recent years a lot of research has been carried out on the detection of steel surface def... 详细信息
来源: 评论
MF-YOLO: Multimodal Fusion for Remote Sensing Object Detection Based on YOLOv5s
MF-YOLO: Multimodal Fusion for Remote Sensing Object Detecti...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Wenqiang Li Aimin Li Xiaotong Kong Yuechen Zhang Zhiyao Li Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Remote sensing object detection has flourished at a rapid rate of development. In remote sensing images (RSI), most algorithms perform well in detecting medium and large objects but perform poorly on small objects. Th... 详细信息
来源: 评论
RFSD-YOLO: An Enhanced X-Ray Object Detection Model for Prohibited Items
RFSD-YOLO: An Enhanced X-Ray Object Detection Model for Proh...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Xiaotong Kong Aimin Li Wenqiang Li Zhiyao Li Yuechen Zhang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
X-ray image detection is essential for ensuring public safety, but traditional methods rely heavily on human analysis and are relatively inefficient. To address this issue, this paper proposes a new object detection m... 详细信息
来源: 评论
Efficient Federated Learning Using Dynamic Update and Adaptive Pruning with Momentum on Shared Server Data
收藏 引用
ACM Transactions on Intelligent Systems and Technology 2024年 第6期15卷 1-28页
作者: Liu, Ji Jia, Juncheng Zhang, Hong Yun, Yuhui Wang, Leye Zhou, Yang Dai, Huaiyu Dou, Dejing Hithink RoyalFlush Information Network Co. Ltd. Hangzhou China School of Computer Science and Technology Soochow University Suzhou China Collaborative Innovation Center of Novel Software Technology and Industrialization Nanjing China Baidu Research Beijing China Key Lab of High Confidence Software Technologies Ministry of Education and Software Institute Peking University Beijing China Department of Computer Science and Software Engineering Auburn University AuburnAL United States Department of Electrical and Computer Engineering North Carolina State University RaleighNC United States Bedi Cloud and School of Computer Science Fudan University Beijing China
Despite achieving remarkable performance, Federated Learning (FL) encounters two important problems, i.e., low training efficiency and limited computational resources. In this article, we propose a new FL framework, i... 详细信息
来源: 评论
HSD-YOLO: A Lightweight and Accurate Method for PCB Defect Detection
HSD-YOLO: A Lightweight and Accurate Method for PCB Defect D...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Zhiyao Li Aimin Li Wenqiang Li Xiaotong Kong Yuechen Zhang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
PCB defect detection is a typical small objects detection task, as with other objects, there is a small object size, the detection process is susceptible to the problem of background interference. In practical industr... 详细信息
来源: 评论
Modeling Layout Reading Order as Ordering Relations for Visually-rich Document Understanding
Modeling Layout Reading Order as Ordering Relations for Visu...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Zhang, Chong Tu, Yi Zhao, Yixi Yuan, Chenshu Chen, Huan Zhang, Yue Chai, Mingxu Guo, Ya Zhu, Huijia Zhang, Qi Gui, Tao School of Computer Science Fudan University Shanghai China Shanghai Key Laboratory of Intelligent Information Processing Shanghai China Ant Tiansuan Security Lab Ant Group Hangzhou China School of Statistics and Data Science Nankai University Tianjin China Institute of Modern Languages and Linguistics Fudan University Shanghai China
Modeling and leveraging layout reading order in visually-rich documents (VrDs) is critical in document intelligence as it captures the rich structure semantics within documents. Previous works typically formulated lay... 详细信息
来源: 评论
Learning Inverse Laplacian Pyramid for Progressive Depth Completion
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Kun Yan, Zhiqiang Fan, Junkai Li, Jun Yang, Jian PCA Lab Key Lab of Intelligent Perception and Systems for High-Dimensional Information of Ministry of Education Jiangsu Key Lab of Image and Video Understanding for Social Security School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing China
Depth completion endeavors to reconstruct a dense depth map from sparse depth measurements, leveraging the information provided by a corresponding color image. Existing approaches mostly hinge on single-scale propagat... 详细信息
来源: 评论
Online Learning Behavior Analysis and Prediction Based on Spiking Neural networks
收藏 引用
Journal of Social Computing 2024年 第2期5卷 180-193页
作者: Yanjing Li Xiaowei Wang Fukun Chen Bingxu Zhao Qiang Fu the Institute of Education Science Research Heilongjiang UniversityHarbin 150080China the School of Cyberspace Security Shandong University of Political Science and LawJinan 250014China the School of Computer Science and Technology Harbin Engineering UniversityHarbin 150001China the Faculty of Electrical and Computer Engineering University of VictoriaVictoriaV8P 5C2Canada. the Guangxi Key Lab of Brain-Inspired Computing and Intelligent Chips School of Electronic and Information EngineeringGuangxi Normal UniversityGuilin 541004China
The vast amount of data generated by large-scale open online course platforms provide a solid foundation for the analysis of learning behavior in the field of *** study utilizes the historical and final learning behav... 详细信息
来源: 评论
TFLAG: Towards Practical APT Detection via Deviation-Aware Learning on Temporal Provenance Graph
arXiv
收藏 引用
arXiv 2025年
作者: Jiang, Wenhan Chai, Tingting Liu, Hongri Wang, Kai Zhang, Hongke School of Computer Science and Technology Harbin Institute of Technology Weihai China Shandong Key Laboratory of Industrial Network Security China School of Electronic and Information Engineering Beijing Jiaotong University Beijing100044 China
Advanced Persistent Threat (APT) have grown increasingly complex and concealed, posing formidable challenges to existing Intrusion Detection Systems in identifying and mitigating these attacks. Recent studies have inc... 详细信息
来源: 评论