咨询与建议

限定检索结果

文献类型

  • 1,675 篇 会议
  • 1,145 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,824 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,879 篇 工学
    • 1,428 篇 计算机科学与技术...
    • 1,155 篇 软件工程
    • 511 篇 信息与通信工程
    • 213 篇 电气工程
    • 203 篇 控制科学与工程
    • 171 篇 生物工程
    • 160 篇 电子科学与技术(可...
    • 152 篇 网络空间安全
    • 127 篇 机械工程
    • 73 篇 光学工程
    • 72 篇 仪器科学与技术
    • 71 篇 生物医学工程(可授...
    • 59 篇 安全科学与工程
    • 55 篇 交通运输工程
    • 42 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 807 篇 理学
    • 509 篇 数学
    • 181 篇 生物学
    • 155 篇 物理学
    • 147 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 44 篇 化学
  • 465 篇 管理学
    • 282 篇 管理科学与工程(可...
    • 207 篇 图书情报与档案管...
    • 92 篇 工商管理
  • 102 篇 法学
    • 60 篇 社会学
    • 44 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 31 篇 军事学
  • 18 篇 农学
  • 14 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 126 篇 feature extracti...
  • 104 篇 semantics
  • 88 篇 accuracy
  • 85 篇 training
  • 77 篇 cryptography
  • 75 篇 computational mo...
  • 68 篇 authentication
  • 66 篇 security
  • 62 篇 federated learni...
  • 62 篇 privacy
  • 60 篇 deep learning
  • 55 篇 data models
  • 48 篇 object detection
  • 47 篇 protocols
  • 45 篇 information secu...
  • 42 篇 neural networks
  • 38 篇 robustness
  • 37 篇 visualization
  • 36 篇 convolution
  • 36 篇 optimization

机构

  • 225 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 56 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 52 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 37 篇 shandong provinc...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 28 篇 qilu university ...
  • 28 篇 college of compu...
  • 27 篇 college of compu...
  • 26 篇 pca lab key lab ...
  • 24 篇 shandong provinc...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 73 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 23 篇 ma jianfeng
  • 23 篇 xie jin
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 li xianxian
  • 20 篇 xiaoming wu
  • 20 篇 li hui
  • 20 篇 liu ximeng
  • 19 篇 zhixin li
  • 18 篇 xianxian li
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 16 篇 zhang yuqing
  • 16 篇 zhang shichao

语言

  • 2,567 篇 英文
  • 164 篇 其他
  • 97 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2824 条 记 录,以下是511-520 订阅
排序:
A RoBERTa-GlobalPointer-Based Method for Named Entity Recognition of Legal Documents
A RoBERTa-GlobalPointer-Based Method for Named Entity Recogn...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Xinrui Zhang Xudong Luo Jiaye Wu Guangxi Key Lab of Multi-Source Information Mining & Security School of Computer Science and Engineering Guangxi Normal University Guilin China
In legal practice, judicial professionals often need to extract useful information from numerous legal documents. The key to legal information extraction is the Named Entity Recognition (NER) of legal documents. To ad...
来源: 评论
Adfq-Vit: Activation-Distribution-Friendly Post-Training Quantization for Vision Transformers
SSRN
收藏 引用
SSRN 2024年
作者: Jiang, Yanfeng Sun, Ning Xie, Xueshuo Yang, Fei Li, Tao College of Computer Science Nankai University Tianjin China Tianjin Key Laboratory of Network and Data Security Technology Tianjin China Zhejiang Lab Zhejiang Hangzhou China Haihe Lab of ITAI Tianjin China
Vision Transformers (ViTs) have exhibited exceptional performance across diverse computer vision tasks, while their substantial parameter size incurs significantly increased memory and computational demands, impeding ... 详细信息
来源: 评论
Unsupervised Hyperspectral Pansharpening via Low-rank Diffusion Model
arXiv
收藏 引用
arXiv 2023年
作者: Rui, Xiangyu Cao, Xiangyong Pang, Li Zhu, Zeyu Yue, Zongsheng Meng, Deyu Xi’an Jiaotong University Xianning West Road Shaanxi Xi’an710049 China The School of Mathematics and Statistics Ministry of Education Key Lab of Intelligent Network Security China The School of Computer Science and Technology Ministry of Education Key Lab For Intelligent Networks and Network Security China The College of Artificial Intelligence
Hyperspectral pansharpening is a process of merging a high-resolution panchromatic (PAN) image and a low-resolution hyperspectral (LRHS) image to create a single high-resolution hyperspectral (HRHS) image. Existing Ba... 详细信息
来源: 评论
A Two-Step Method for Dynamics of Abstract Argumentation  1
收藏 引用
3rd International Conference on Distributed Artificial Intelligence, DAI 2021
作者: Jing, Xiaoxin Luo, Xudong College of Political Science and Law Capital Normal University Beijing China Guangxi Key Lab of Multi-Source Information Mining and Security School of Computer Science and Engineering Guangxi Normal University Guilin China
This paper proposes a two-step method to handle the dynamics of argumentation. Firstly, we reach the conflict-free labellings of the updated argumentation framework by the intersection of expansions of the conflict-fr...
来源: 评论
CA-UAP: Content-Agnostic Universal Adversarial Perturbation for Enhanced Generalization
CA-UAP: Content-Agnostic Universal Adversarial Perturbation ...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Rui Lu Ziqiang He Jingyang Wen Xiangui Kang Z. Jane Wang Guangdong Key Lab of Information Security School of Computer Science and Engineering Sun Yat-Sen University Guangzhou China College of Electrical and Information Engineering North Minzu University Yinchuan China Department of Electrical and Computer Engineering University of British Columbia Canada
Deep Neural networks (DNNs) have been shown vulnerable to universal adversarial perturbation (UAP), which are imperceptible and capable of fooling the target model for most samples. Existing universal attack methods m... 详细信息
来源: 评论
PGD-Imp: Rethinking and Unleashing Potential of Classic PGD with Dual Strategies for Imperceptible Adversarial Attacks
arXiv
收藏 引用
arXiv 2024年
作者: Li, Jin Yu, Zitong He, Ziqiang Wang, Z. Jane Kang, Xiangui Guangdong Key Lab of Information Security School of Computer Science and Engineering Sun Yat-Sen University China School of Computing and Information Technology Great Bay University China Electrical and Computer Engineering Dept University of British Columbia Canada
Imperceptible adversarial attacks have recently attracted increasing research interests. Existing methods typically incorporate external modules or loss terms other than a simple lp-norm into the attack process to ach... 详细信息
来源: 评论
High-quality Arabidopsis thaliana Genome Assembly with Nanopore and HiFi Long Reads
收藏 引用
Genomics, Proteomics & Bioinformatics 2022年 第1期20卷 4-13页
作者: Bo Wang Xiaofei Yang Yanyan Jia Yu Xu Peng Jia Ningxin Dang Songbo Wang Tun Xu Xixi Zhao Shenghan Gao Quanbin Dong Kai Ye MOE Key Laboratory for Intelligent Networks&Network Security Faculty of Electronic and Information EngineeringXi’an Jiaotong UniversityXi’an 710049China School of Computer Science and Technology Faculty of Electronic and Information EngineeringXi’an Jiaotong UniversityXi’an 710049China School of Life Science and Technology Xi’an Jiaotong UniversityXi’an 710049China School of Automation Science and Engineering Faculty of Electronic and Information EngineeringXi’an Jiaotong UniversityXi’an 710049China Genome Institute the First Affiliated Hospital of Xi’an Jiaotong UniversityXi’an 710061China
Arabidopsis thaliana is an important and long-established model species for plant molecular biology,genetics,epigenetics,and ***,the latest version of reference genome still contains a significant number of missing **... 详细信息
来源: 评论
Self-Attention Policy Optimization for Task Offloading and Resource Allocation in Low-Carbon Agricultural Consumer Electronic Devices
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Huang, Yi Zeng, Jisong Wei, Yanting Chen, Miaojiang Xiao, Wenjing Yang, Yang Liu, Zhiquan Farouk, Ahmed Song, Houbing Herbert Guangxi University School of Computer Electronics and Information China Guangxi Key Laboratory of Multimedia Communications and Network Technology Nanning530004 China Jinan University College of Cyber Security Guangzhou510632 China Faculty of Computers and Artificial Intelligence Egypt Department of Information Systems BaltimoreMD21250 United States
In recent years, the widespread use of edge agricultural consumer electronics has greatly contributed to the level of intelligence in agricultural production, bringing higher efficiency and quality. However, offloadin... 详细信息
来源: 评论
A novel violent video detection method based on improved C3D and transfer learning  3
A novel violent video detection method based on improved C3D...
收藏 引用
2022 3rd International Conference on computer information and Big Data Applications, CIBDA 2022
作者: Liu, Guoqing Wang, Zhiwen Zhang, Haipeng Guo, Xin Wang, Yuhang Zhang, Canlong College of electrical electronics and computer Science Guangxi University of Science and Technology LiuZhou545006 China Guangxi Key Lab of Multi-source Information Mining & Security Guangxi Normal University Guilin541004 China
In recent years, due to the widespread use of surveillance systems, the crime rates significantly decreased and public security is guaranteed. However, instead of stopping ongoing crimes, these surveillance videos is ... 详细信息
来源: 评论
Towards an Ontology of Traceable Impact Management in the Food Supply Chain
arXiv
收藏 引用
arXiv 2025年
作者: Gajderowicz, Bart Fox, Mark S. Gao, Yongchao Urban Data Centre School of Cities University of Toronto Toronto Canada Key Laboratory of Computing Power Network and Information Security Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Jinan China
The pursuit of quality improvements and accountability in the food supply chains, especially how they relate to food-related outcomes, such as hunger, has become increasingly vital, necessitating a comprehensive appro...
来源: 评论