咨询与建议

限定检索结果

文献类型

  • 1,675 篇 会议
  • 1,145 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,824 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,879 篇 工学
    • 1,428 篇 计算机科学与技术...
    • 1,155 篇 软件工程
    • 511 篇 信息与通信工程
    • 213 篇 电气工程
    • 203 篇 控制科学与工程
    • 171 篇 生物工程
    • 160 篇 电子科学与技术(可...
    • 152 篇 网络空间安全
    • 127 篇 机械工程
    • 73 篇 光学工程
    • 72 篇 仪器科学与技术
    • 71 篇 生物医学工程(可授...
    • 59 篇 安全科学与工程
    • 55 篇 交通运输工程
    • 42 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 807 篇 理学
    • 509 篇 数学
    • 181 篇 生物学
    • 155 篇 物理学
    • 147 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 44 篇 化学
  • 465 篇 管理学
    • 282 篇 管理科学与工程(可...
    • 207 篇 图书情报与档案管...
    • 92 篇 工商管理
  • 102 篇 法学
    • 60 篇 社会学
    • 44 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 31 篇 军事学
  • 18 篇 农学
  • 14 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 126 篇 feature extracti...
  • 104 篇 semantics
  • 88 篇 accuracy
  • 85 篇 training
  • 77 篇 cryptography
  • 75 篇 computational mo...
  • 68 篇 authentication
  • 66 篇 security
  • 62 篇 federated learni...
  • 62 篇 privacy
  • 60 篇 deep learning
  • 55 篇 data models
  • 48 篇 object detection
  • 47 篇 protocols
  • 45 篇 information secu...
  • 42 篇 neural networks
  • 38 篇 robustness
  • 37 篇 visualization
  • 36 篇 convolution
  • 36 篇 optimization

机构

  • 225 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 56 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 52 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 37 篇 shandong provinc...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 28 篇 qilu university ...
  • 28 篇 college of compu...
  • 27 篇 college of compu...
  • 26 篇 pca lab key lab ...
  • 24 篇 shandong provinc...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 73 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 23 篇 ma jianfeng
  • 23 篇 xie jin
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 li xianxian
  • 20 篇 xiaoming wu
  • 20 篇 li hui
  • 20 篇 liu ximeng
  • 19 篇 zhixin li
  • 18 篇 xianxian li
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 16 篇 zhang yuqing
  • 16 篇 zhang shichao

语言

  • 2,567 篇 英文
  • 164 篇 其他
  • 97 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2824 条 记 录,以下是471-480 订阅
排序:
WiDual: User Identified Gesture Recognition Using Commercial WiFi
WiDual: User Identified Gesture Recognition Using Commercial...
收藏 引用
IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGRID)
作者: Miaoling Dai Chenhong Cao Tong Liu Meijia Su Yufeng Li Jiangtao Li School of Computer Engineering and Science Shanghai University China Anhui Provincial Key Laboratory of Network and Information Security Anhui Normal Unviersity Wuhu Anhui China
WiFi-based human gesture recognition has recently enjoyed increasing popularity in the Internet of Things (IoT) scenarios. Simultaneously recognizing user identities and user gestures is of great importance for enhanc...
来源: 评论
Joint Optimization of Offloading and Caching in Full-Duplex-Enabled Edge Computing networks
收藏 引用
IEEE Transactions on Mobile Computing 2025年
作者: Dai, Xingxia Tian, Shujuan Liu, Haolin Li, Zhetao Jiang, Hongbo Deng, Qingyong Xiangtan University School of Computer Science School of Cyberspace Security Xiangtan411105 China Jinan University College of Information Science and Technology Guangzhou510632 China Hunan University College of Computer Science and Electronic Engineering Changsha Hunan410082 China Guangxi Normal University Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guilin541004 China Guangxi Key Lab of Multi-source Information Mining & Security Guangxi Normal University Guilin541004 China
Edge computing (EC) reduces task processing and content download delay by providing computation and caching resources directly to task offloading (TO) users and content request (CR) users. However, existing studies of... 详细信息
来源: 评论
Intelligent Model to Predict Early Liver Disease using Machine Learning Technique
Intelligent Model to Predict Early Liver Disease using Machi...
收藏 引用
2022 International Conference on Business Analytics for Technology and security, ICBATS 2022
作者: Ghazal, Taher M. Rehman, Aziz Ur Saleem, Muhammad Ahmad, Munir Ahmad, Shabir Mehmood, Faisal Faculty of Information Science and Technology Ukm Network and Communication Technology Lab Center for Cyber Security Malaysia School of Computer Science NCBAandE Lahore Pakistan Gachon University Department of Computer Engineering Korea Republic of Gachon University Department of It Convergence Engineering Korea Republic of
Liver Disease (LD) is the main cause of death worldwide, affecting a large number of people. A variety of factors affect the liver, resulting in this disease. The diagnosis of this condition is both expensive and time... 详细信息
来源: 评论
A Quantum Temporal Difference Learning Method Based on Quantum World Model
A Quantum Temporal Difference Learning Method Based on Quant...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Peigen Zeng Ying He F. Richard Yu Jianbo Du College of Computer Science and Software Engineering Shenzhen University Shenzhen China Shaanxi Key Laboratory of Information Communication Network and Security Xi’an University of Posts and Telecommunications Xi’an China School of Information Technology Carleton University Ottawa Canada
Based on quantum parallelism theory and quantum phenomena such as superposition and entanglement, quantum reinforcement learning (QRL) has the potential to surpass classical reinforcement learning (RL). Although some ... 详细信息
来源: 评论
OFLGI: An Optimization-based Feature-Level Gradient Inversion Attack  23
OFLGI: An Optimization-based Feature-Level Gradient Inversio...
收藏 引用
23rd IEEE International Conference on Trust, security and Privacy in Computing and Communications, TrustCom 2024
作者: Lu, Yongwei Liang, Xiaoyan Du, Ruizhong Tian, Junfeng Hebei University School of Cyber Security and Computer Baoding070012 China Key Lab on High Trusted Information System of Hebei Province Baoding070012 China
Federated learning has become the leading paradigm for privacy-preserving distributed learning, as it only requires the upload of model gradients, not private data. However, recent studies have shown that these exchan... 详细信息
来源: 评论
An Efficient Energy Consumption Prediction Framework for High Performance Computing Cluster Jobs
An Efficient Energy Consumption Prediction Framework for Hig...
收藏 引用
International Conference on computer Engineering and Applications (ICCEA)
作者: Yantao Lou Jibin Wang Shoupeng Feng Xian Yu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Department of Public Security of Shandong Province Shandong Intelligent Public Security Technology Innovation Center Jinan China
Energy consumption prediction is a crucial approach to enhance the operational efficiency of HPC (High Performance Computing) clusters. Existing predicting methods for the energy consumption mainly rely on time series... 详细信息
来源: 评论
Identifying driver genes in cancer based on Pareto optimality consensus
Identifying driver genes in cancer based on Pareto optimalit...
收藏 引用
2022 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2022
作者: Deng, Zheng Wu, Jingli Chen, Xiaorong Li, Gaoshi Guangxi Normal University College of Computer Science Information Technology Guilin China Guangxi Normal University Guangxi Key Lab of Multi-source Information Mining & Security Guilin China Wuzhou University Guangxi Key Laboratory of Machine Vision Intelligent Control Wuzhou China
An important issue in cancer genomics is the identification of driver genes. It is significant for the discovery of key biomarkers and the development of effective personalized therapies. In this paper, a computated m... 详细信息
来源: 评论
MEFold: Memory-Efficient Optimization for Protein Language Models via Chunk and Quantization
MEFold: Memory-Efficient Optimization for Protein Language M...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Yanfeng Jiang Ning Sun Zhengxian Lu Shuang Peng Yi Zhang Fei Yang Tao Li College of Computer Science Nankai University Tianjin China Tianjin Key Laboratory of Network and Data Security Technology Tianjin China Zhejiang Lab Hangzhou China Haihe Lab of ITAI Tianjin China
Protein language models are currently experiencing a surge in demand owing to their remarkable accuracy in protein structure prediction. Nevertheless, their applications are hindered by the significant computation and... 详细信息
来源: 评论
Robust Video Watermarking network Based on Channel Spatial Attention
Robust Video Watermarking Network Based on Channel Spatial A...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Jian Li Tao Zuo Bin Ma Chunpeng Wang Peng Zhang Huanhuan Zhao Zhengzhong Zhao Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China
Robust video watermarking refers to the ability to extract the originally embedded watermark information from a video even after malicious modifications and attacks. Currently, traditional watermarking methods have th... 详细信息
来源: 评论
A Novel Lightweight Dynamic Trust Evaluation Model for Edge Computing
收藏 引用
IEEE Transactions on network and Service Management 2025年
作者: Yang, Hao Guo, Liangmin Wang, Taochun Lv, Chengmei Anhui Technical College of Mechanical and Electrical Engineering School of Internet and Communication Wuhu241003 China Anhui Normal University School of Computer and Information Wuhu241003 China Anhui Provincial Key Laboratory of Network and Information Security Wuhu241003 China
The temporal decay of trust data in dynamic edge computing environments leads to inaccurate evaluation, and the recommended trust values from heterogeneous nodes are affected by subjective bias and are vulnerable to m... 详细信息
来源: 评论