咨询与建议

限定检索结果

文献类型

  • 1,675 篇 会议
  • 1,145 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,824 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,879 篇 工学
    • 1,428 篇 计算机科学与技术...
    • 1,155 篇 软件工程
    • 511 篇 信息与通信工程
    • 213 篇 电气工程
    • 203 篇 控制科学与工程
    • 171 篇 生物工程
    • 160 篇 电子科学与技术(可...
    • 152 篇 网络空间安全
    • 127 篇 机械工程
    • 73 篇 光学工程
    • 72 篇 仪器科学与技术
    • 71 篇 生物医学工程(可授...
    • 59 篇 安全科学与工程
    • 55 篇 交通运输工程
    • 42 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 807 篇 理学
    • 509 篇 数学
    • 181 篇 生物学
    • 155 篇 物理学
    • 147 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 44 篇 化学
  • 465 篇 管理学
    • 282 篇 管理科学与工程(可...
    • 207 篇 图书情报与档案管...
    • 92 篇 工商管理
  • 102 篇 法学
    • 60 篇 社会学
    • 44 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 31 篇 军事学
  • 18 篇 农学
  • 14 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 126 篇 feature extracti...
  • 104 篇 semantics
  • 88 篇 accuracy
  • 85 篇 training
  • 77 篇 cryptography
  • 75 篇 computational mo...
  • 68 篇 authentication
  • 66 篇 security
  • 62 篇 federated learni...
  • 62 篇 privacy
  • 60 篇 deep learning
  • 55 篇 data models
  • 48 篇 object detection
  • 47 篇 protocols
  • 45 篇 information secu...
  • 42 篇 neural networks
  • 38 篇 robustness
  • 37 篇 visualization
  • 36 篇 convolution
  • 36 篇 optimization

机构

  • 225 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 56 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 52 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 37 篇 shandong provinc...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 28 篇 qilu university ...
  • 28 篇 college of compu...
  • 27 篇 college of compu...
  • 26 篇 pca lab key lab ...
  • 24 篇 shandong provinc...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 73 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 23 篇 ma jianfeng
  • 23 篇 xie jin
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 li xianxian
  • 20 篇 xiaoming wu
  • 20 篇 li hui
  • 20 篇 liu ximeng
  • 19 篇 zhixin li
  • 18 篇 xianxian li
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 16 篇 zhang yuqing
  • 16 篇 zhang shichao

语言

  • 2,567 篇 英文
  • 164 篇 其他
  • 97 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2824 条 记 录,以下是461-470 订阅
排序:
A Legal Multi-Choice Question Answering Model Based on DeBERTa and Attention Mechanism
A Legal Multi-Choice Question Answering Model Based on DeBER...
收藏 引用
International Conference on Tools for Artificial Intelligence (ICTAI)
作者: Ying Luo Xudong Luo Guibin Chen Guangxi Key Lab of Multi-source Information Mining and Security Guangxi Key Lab of Education Blockchain and Intelligent Technology of Ministry of Education School of Computer Science and Engineering Guangxi Normal University Guilin China
This paper presents a novel multi-choice question answering model tailored for the legal domain, which integrates a DeBERTa-based framework with bilinear attention mechanisms. The model is designed to enhance the inte... 详细信息
来源: 评论
Fuzzy Concession Strategy for Emotional Human-computer Negotiation*
Fuzzy Concession Strategy for Emotional Human-Computer Negot...
收藏 引用
International Conference on Tools for Artificial Intelligence (ICTAI)
作者: Xudong Luo Ying Luo Kaili Sun Yanling Li Guangxi Key Lab of Multi-source Information Mining and Security Guangxi Key Lab of Education Blockchain and Intelligent Technology of Ministry of Education School of Computer Science and Engineering Guangxi Normal University Guilin China
This paper proposes an emotion-based human-computer negotiation system. Existing systems handle basic dialogues but struggle with complex negotiations involving human emotions. To address this, we design a fuzzy conce... 详细信息
来源: 评论
Design and Implementation of Remote Visitor System Based on NFC Technology  10th
Design and Implementation of Remote Visitor System Based on ...
收藏 引用
10th International Conference on computer Engineering and networks, CENet 2020
作者: Wang, Zhiqiang Gao, Shichun Xue, Meng Ju, Xinyu Wang, Xinhao Lv, Xin Li, Yang Yang, Tao State Information Center Beijing100045 China Beijing Electronic Science and Technology Institute Beijing100070 China Key Lab of Information Network Security Ministry of Public Security Shanghai200000 China
Most visitor systems information management is at a low level, and the processing method is still semi-manual registration. To improve the level of automation of the visitor system, this paper designs a remote visitor... 详细信息
来源: 评论
A DeBERTa-GPLinker-Based Model for Relation Extraction from Medical Texts
A DeBERTa-GPLinker-Based Model for Relation Extraction from ...
收藏 引用
International Conference on Tools for Artificial Intelligence (ICTAI)
作者: Zhiqi Deng Shutao Gong Xudong Luo Jinlu Liu Guangxi Key Lab of Multi-source Information Mining and Security Guangxi Key Lab of Education Blockchain and Intelligent Technology of Ministry of Education Guangxi Normal University School of Computer Science and Engineering Guilin China
Extracting causal relationships in medical texts is essential for improving clinical decision support systems and constructing comprehensive medical knowledge graphs. This paper presents a novel model for extracting c... 详细信息
来源: 评论
Identification System Based on Fingerprint and Finger Vein  10th
Identification System Based on Fingerprint and Finger Vein
收藏 引用
10th International Conference on computer Engineering and networks, CENet 2020
作者: Wang, Zhiqiang Hou, Zeyang Wang, Zhiwei Li, Xinyu Wei, Bingyan Lv, Xin Yang, Tao State Information Center Beijing100045 China Beijing Electronic Science and Technology Institute Beijing100070 China Key Lab of Information Network Security Ministry of Public Security Shanghai200000 China
In recent years, with the rapid development of information technology, more and more attention has been paid to information security. Biometrics is an important way to ensure information security, and digital vein rec... 详细信息
来源: 评论
KGRN: Knowledge Graph Relational Path network for Target Prediction of TCM Prescriptions  17th
KGRN: Knowledge Graph Relational Path Network for Target Pre...
收藏 引用
17th International Conference on Intelligent Computing, ICIC 2021
作者: Gong, Zhuo Zhang, Naixin He, Jieyue School of Computer Science and Engineering Key Lab of Computer Network and Information Integration MOE Southeast University Nanjing210018 China
Accurately predicting the effect targets of Traditional Chinese Medicine (TCM) prescriptions is essential for exploring the molecular mechanism and clarifying the mechanism of TCM. Although some scholars have used net... 详细信息
来源: 评论
A Fair and Efficient Protocol for the Millionaires' Problem
收藏 引用
Chinese Journal of Electronics 2023年 第2期18卷 249-254页
作者: Ronghua Li Chuankun Wu Yuqing Zhang Graduate University of Chinese Academy of Sciences (GUCAS) Beijing China National Computer Network Intrusion Protection Center GUCAS Beijing China State Key Laboratory of Information Security Institute of Software Beijing China
In the semi-honest model, Lin and Tzeng proposed an efficient solution to the millionaires' problem based on homomorphic encryption. They reduced the problem to the set intersection problem by encoding the private... 详细信息
来源: 评论
A Binary Level Verification Framework for Real-Time Performance of PLC Program in Backhaul/Fronthaul networks
A Binary Level Verification Framework for Real-Time Performa...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Xuankai Zhang Jun Wu Jianhua Li Ali Kashif Bashir Chao Sang Bei Pei Marwan Omar School of Electronic Information and Electrical Engineering Shanghai Jiaotong University Shanghai China Department of Computing and Mathematics Manchester Metropolitan University Manchester U.K Key Lab of Information Network Security Ministry of Public Security Shanghai China Information Technology and Management Illinois Institute of Technology USA
PLC control programs are vulnerable to real-time threats, where attackers can disrupt the backhaul/front-end network of industrial production by creating numerous loops or I/O operations, leading to severe consequence... 详细信息
来源: 评论
Community discovery method based on complex network of data fusion based on the super network perspective
收藏 引用
International Journal of computers and Applications 2021年 第4期43卷 383-390页
作者: Pei, Li School of Computer Science & Technology Xi‘an University of Posts and Telecommunications Xi‘an China Shaanxi Key Laboratory of Network Data Intelligent Processing Xi‘an University of Posts and Telecommunications Xi‘an China Ministry of Education Key Lab For Intelligent Networks and Network Security Xi‘an Jiaotong University Xi‘an China
To enhance the computational efficiency and precision of community discovery, a community discovery algorithm with the mixed label based on the minimum description length (MDI) of information compression is proposed i... 详细信息
来源: 评论
Phiss: Progressive and Hierarchical Image Segmentation-Sharing Scheme
SSRN
收藏 引用
SSRN 2022年
作者: Xie, Dong Wang, Xueli Chen, Fulong Zhu, Huijun Wang, Taochun Anhui Provincial Key Laboratory of Network and Information Security School of Computer and Information Anhui Normal University Wuhu241002 China
As a classical secret sharing technique, (k, n) threshold secret image sharing mainly contains the shadow generation phase and the image reconstruction phase. The sensitive secret image is encrypted into n shadows by ... 详细信息
来源: 评论