咨询与建议

限定检索结果

文献类型

  • 1,675 篇 会议
  • 1,145 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,824 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,879 篇 工学
    • 1,428 篇 计算机科学与技术...
    • 1,155 篇 软件工程
    • 511 篇 信息与通信工程
    • 213 篇 电气工程
    • 203 篇 控制科学与工程
    • 171 篇 生物工程
    • 160 篇 电子科学与技术(可...
    • 152 篇 网络空间安全
    • 127 篇 机械工程
    • 73 篇 光学工程
    • 72 篇 仪器科学与技术
    • 71 篇 生物医学工程(可授...
    • 59 篇 安全科学与工程
    • 55 篇 交通运输工程
    • 42 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 807 篇 理学
    • 509 篇 数学
    • 181 篇 生物学
    • 155 篇 物理学
    • 147 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 44 篇 化学
  • 465 篇 管理学
    • 282 篇 管理科学与工程(可...
    • 207 篇 图书情报与档案管...
    • 92 篇 工商管理
  • 102 篇 法学
    • 60 篇 社会学
    • 44 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 31 篇 军事学
  • 18 篇 农学
  • 14 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 126 篇 feature extracti...
  • 104 篇 semantics
  • 88 篇 accuracy
  • 85 篇 training
  • 77 篇 cryptography
  • 75 篇 computational mo...
  • 68 篇 authentication
  • 66 篇 security
  • 62 篇 federated learni...
  • 62 篇 privacy
  • 60 篇 deep learning
  • 55 篇 data models
  • 48 篇 object detection
  • 47 篇 protocols
  • 45 篇 information secu...
  • 42 篇 neural networks
  • 38 篇 robustness
  • 37 篇 visualization
  • 36 篇 convolution
  • 36 篇 optimization

机构

  • 225 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 56 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 52 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 37 篇 shandong provinc...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 28 篇 qilu university ...
  • 28 篇 college of compu...
  • 27 篇 college of compu...
  • 26 篇 pca lab key lab ...
  • 24 篇 shandong provinc...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 73 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 23 篇 ma jianfeng
  • 23 篇 xie jin
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 li xianxian
  • 20 篇 xiaoming wu
  • 20 篇 li hui
  • 20 篇 liu ximeng
  • 19 篇 zhixin li
  • 18 篇 xianxian li
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 16 篇 zhang yuqing
  • 16 篇 zhang shichao

语言

  • 2,567 篇 英文
  • 164 篇 其他
  • 97 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2824 条 记 录,以下是501-510 订阅
排序:
Robust Quantum Feature Selection With Sparse Optimization Circuit
收藏 引用
IEEE Transactions on computer-Aided Design of Integrated Circuits and Systems 2025年
作者: Li, Jiaye Song, Jiagang Shi, Jinjing Xu, Hang Yu, Hao Chen, Gang Zhang, Shichao Zhejiang University State Key Laboratory of Blockchain and Data Security Hangzhou310027 China Institute of Blockchain and Data Security China Central South University School of Computer Science and Engineering Changsha410083 China Central South University School of Electronic Information Changsha410083 China Xiangtan University School of Computer Science and School of Cyberspace Science Hunan Xiangtan411105 China Guangxi Normal University Guangxi Key Lab of Multisource Information Mining and Security Guilin541004 China
High-dimensional data has long been a notoriously challenging issue. Existing quantum dimension reduction technology primarily focuses on quantum principal component analysis. However, there are only a few studies on ... 详细信息
来源: 评论
Suppress Content Shift: Better Diffusion Features via Off-the-Shelf Generation Techniques  38
Suppress Content Shift: Better Diffusion Features via Off-th...
收藏 引用
38th Conference on Neural information Processing Systems, NeurIPS 2024
作者: Meng, Benyuan Xu, Qianqian Wang, Zitai Yang, Zhiyong Cao, Xiaochun Huang, Qingming Institute of Information Engineering CAS China School of Cyber Security University of Chinese Academy of Sciences China Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS China Peng Cheng Laboratory China School of Computer Science and Tech. University of Chinese Academy of Sciences China School of Cyber Science and Tech. Shenzhen Campus of Sun Yat-sen University China Key Laboratory of Big Data Mining and Knowledge Management CAS China
Diffusion models are powerful generative models, and this capability can also be applied to discrimination. The inner activations of a pre-trained diffusion model can serve as features for discriminative tasks, namely...
来源: 评论
Privacy-Preserving IoT Image Transmission: Multi-Stage SVD Data Embedding and Heatmap Alignment
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Du, Kaixin Ma, Bin Yang, Meihong Wang, Xiaoyu Li, Xiaolong Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250101 China Beijing Jiaotong University School of Computer and Information Technology Beijing100044 China
The images transmitted by IoT devices, particularly those used for surveillance or sensor data, are vulnerable to malicious screenshots and unauthorized access, leading to potential privacy breaches. To address this, ... 详细信息
来源: 评论
Partially Hidden Policy Attribute-Based Multi-keyword Searchable Encryption with Verification and Revocation
收藏 引用
IEEE Transactions on Mobile Computing 2025年
作者: Chen, Liqing Xu, Shiguo Jin, Chunhua Zhang, Hao Weng, Jian Huaiyin Institute of Technology Faculty of Computer and Software Engineering Jiangsu Huai'an223003 China Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Fuzhou350117 China Jinan University College of Information Science and Technology Guangdong Guangzhou510632 China
Data security is becoming increasingly critical as outsourced data services flourish. An effective solution for ensuring data confidentiality in the cloud is attribute-based searchable encryption (ABSE). However, most... 详细信息
来源: 评论
Funny words detection via Contrastive Representations and Pre-trained Language Model  2
Funny words detection via Contrastive Representations and Pr...
收藏 引用
2nd International Seminar on Artificial Intelligence, networking and information Technology, AINIT 2021
作者: Du, Yiming Tian, Zelin Key Lab of Computer Network and Information Integration Nanjing China University of British Columbia Dept. Computer Science Vancouver Canada
Funniness detection of news headlines is a challenging task in computational linguistics. However, most existing works on funniness detection mainly tackle the scenario by simply judging whether a sentence is humorous... 详细信息
来源: 评论
Resource Allocation for Mutualistic Symbiotic Radio with Hybrid Active-Passive Communications
Resource Allocation for Mutualistic Symbiotic Radio with Hyb...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Hong Guo Yinghui Ye Haijian Sun Liqin Shi Shaanxi Key Laboratory of Information Communication Network and Security Xi'an University of Posts & Telecommunications China School of Electrical and Computer Engineering The University of Georgia Athens GA USA
To address the limitation on the rate of secondary users (SUs) in traditional mutualistic symbiotic radio (SR) systems, this paper proposes a new mutualistic SR with hybrid active-passive communications. Unlike the tr...
来源: 评论
An Early Detection Model of Prostate Cancer Based on MRI  9
An Early Detection Model of Prostate Cancer Based on MRI
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Liu, Yuankun Xing, Lumin Wang, Di Nie, Xin Zhang, Xueyan Wu, Di Liu, Wenjian The First Affiliated Hospital of Shandong First Medical University Shandong Provincial Qianfoshan Hospital Jinan China City University of Macau Faculty of Data Science China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China Chongqing Jianzhu College Chongqing China Shandong Youth University of Political Science School of Information Work Office Jinan China University of Southern Queensland School of Mathematics Physics and Computing QLD Australia
Prostate cancer is a prevalent form of cancer among men, with a high rate of occurrence but relatively lower mortality compared to other types of cancer. Early detection is crucial because it allows for earlier interv... 详细信息
来源: 评论
ADFQ-ViT: Activation-Distribution-Friendly Post-Training Quantization for Vision Transformers
arXiv
收藏 引用
arXiv 2024年
作者: Jiang, Yanfeng Sun, Ning Xie, Xueshuo Yang, Fei Li, Tao College of Computer Science Nankai University Tianjin China Tianjin Key Laboratory of Network and Data Security Technology Tianjin China Zhejiang Lab Zhejiang Hangzhou China Haihe Lab of ITAI Tianjin China
Vision Transformers (ViTs) have exhibited exceptional performance across diverse computer vision tasks, while their substantial parameter size incurs significantly increased memory and computational demands, impeding ... 详细信息
来源: 评论
Enhancing Unknown Encrypted Traffic Clustering with Self-Supervised Learning
Enhancing Unknown Encrypted Traffic Clustering with Self-Sup...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Ke Ding Xia Zhou Xiaoyan Hu Guang Cheng Ruidong Li Hua Wu School of Cyber Science & Engineering Southeast University Nanjing China Purple Mountain Laboratories for Network and Communication Security Nanjing China Jiangsu Province Engineering Research Center of Security for Ubiquitous Network Nanjing China Ministry of Education Key Laboratory of Computer Network and Information Integration (Southeast University) China Institute of Science and Engineering Kanazawa University Kanazawa Japan
Many malicious attacks are launched through encrypted traffic from unknown proprietary network protocols. Timely identification of such malicious unknown encrypted traffic is essential for the defense. However, it is ... 详细信息
来源: 评论
Establishing Multi-Party Trust Architecture for DRM by Using Game-Theoretic Analysis of security Policies
收藏 引用
Chinese Journal of Electronics 2023年 第3期18卷 519-524页
作者: Zhiyong Zhang Qingqi Pei Jianfeng Ma Lin Yang Ministry of Education Key Laboratory of Computer Network and Information Security Xidian University Xi'an China Electronic and Information Engineering College Henan University of Science and Technology Luoyang China The Research Institute China Electronic Equipment and Systems Engineering Corporation Beijing China
A successful transaction of digital contents is primarily dependent on security policies, trust mechanisms and benefits balances, as well as the simple adoption of the combination of enhanced security policies would n... 详细信息
来源: 评论