咨询与建议

限定检索结果

文献类型

  • 1,675 篇 会议
  • 1,145 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,824 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,879 篇 工学
    • 1,428 篇 计算机科学与技术...
    • 1,155 篇 软件工程
    • 511 篇 信息与通信工程
    • 213 篇 电气工程
    • 203 篇 控制科学与工程
    • 171 篇 生物工程
    • 160 篇 电子科学与技术(可...
    • 152 篇 网络空间安全
    • 127 篇 机械工程
    • 73 篇 光学工程
    • 72 篇 仪器科学与技术
    • 71 篇 生物医学工程(可授...
    • 59 篇 安全科学与工程
    • 55 篇 交通运输工程
    • 42 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 807 篇 理学
    • 509 篇 数学
    • 181 篇 生物学
    • 155 篇 物理学
    • 147 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 44 篇 化学
  • 465 篇 管理学
    • 282 篇 管理科学与工程(可...
    • 207 篇 图书情报与档案管...
    • 92 篇 工商管理
  • 102 篇 法学
    • 60 篇 社会学
    • 44 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 31 篇 军事学
  • 18 篇 农学
  • 14 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 126 篇 feature extracti...
  • 104 篇 semantics
  • 88 篇 accuracy
  • 85 篇 training
  • 77 篇 cryptography
  • 75 篇 computational mo...
  • 68 篇 authentication
  • 66 篇 security
  • 62 篇 federated learni...
  • 62 篇 privacy
  • 60 篇 deep learning
  • 55 篇 data models
  • 48 篇 object detection
  • 47 篇 protocols
  • 45 篇 information secu...
  • 42 篇 neural networks
  • 38 篇 robustness
  • 37 篇 visualization
  • 36 篇 convolution
  • 36 篇 optimization

机构

  • 225 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 56 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 52 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 37 篇 shandong provinc...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 28 篇 qilu university ...
  • 28 篇 college of compu...
  • 27 篇 college of compu...
  • 26 篇 pca lab key lab ...
  • 24 篇 shandong provinc...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 73 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 23 篇 ma jianfeng
  • 23 篇 xie jin
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 li xianxian
  • 20 篇 xiaoming wu
  • 20 篇 li hui
  • 20 篇 liu ximeng
  • 19 篇 zhixin li
  • 18 篇 xianxian li
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 16 篇 zhang yuqing
  • 16 篇 zhang shichao

语言

  • 2,567 篇 英文
  • 164 篇 其他
  • 97 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2824 条 记 录,以下是521-530 订阅
排序:
Efficient Registered Attribute Based Access Control with Same Sub-policies in Mobile Cloud Computing
收藏 引用
IEEE Transactions on Mobile Computing 2025年
作者: Weng, Wuwei Li, Jiguo Zhang, Yichen Lu, Yang Shen, Jian Han, Jinguang Fujian Normal University College of Computer and Cyber Security Fuzhou350117 China Fujian Fuzhou350117 China Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou350117 China Nanjing Normal University School of Computer and Electronic Information Nanjing210023 China Zhejiang Sci-Tech University School of Information Science and Engineering Hangzhou310018 China Southeast University School of Cyber Science and Engineering Nanjing210096 China
Ciphertext-policy attribute-based encryption (CP-ABE) has long been considered as a promising access control technology for cloud storage. However, CP-ABE depends on a central trusted authority to generate and distrib... 详细信息
来源: 评论
A Secure Lightweight RFID Mutual Authentication Protocol Without Explicit Challenge-Response Pairs  2nd
A Secure Lightweight RFID Mutual Authentication Protocol Wit...
收藏 引用
2nd EAI International Conference on Applied Cryptography in computer and Communications, AC3 2022
作者: Huang, Keke Lin, Changlu Liu, Yali College of Computer and Cyber Security Fujian Normal University Fujian Fuzhou350117 China Fujian Provincial Key Lab of Network Security and Cryptology Fujian Fuzhou350007 China School of Mathematics and Statistics Fujian Normal University Fujian Fuzhou350117 China College of Computer Science and Technology Jiangsu Normal University Jiangsu Xuzhou221116 China
Radio Frequency Identification (RFID) has been widely deployed to various scenarios, but its security and privacy issues need to be concerned due to the tag’s limited computing and storage resources. While benef... 详细信息
来源: 评论
MDFG: Multi-Dimensional Fine-Grained Modeling for Fatigue Detection  39
MDFG: Multi-Dimensional Fine-Grained Modeling for Fatigue De...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Wang, Mei Zhu, Xiaojie Hu, Ruimin Zhu, Dongliang Liao, Liang Ye, Mang National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University China Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University China School of Cyber Science and Engineering Wuhan University Whuhan China Cyberspace Security Laboratory School of Network and Information Security Xidian University Xi'an China The School of Computer Science and Engineering Nanyang Technological University Singapore
Fatigue is a critical factor contributing to accidents in industries such as safety monitoring and engineering construction. Fatigue exhibits dynamic complexity and non-stationary characteristics, so there are many in... 详细信息
来源: 评论
TSF-Net:Abnormal Video Behavior Detection Framework Based on Two-Stream Appearance Motion Semantic Fusion  23
TSF-Net:Abnormal Video Behavior Detection Framework Based on...
收藏 引用
Proceedings of the 2023 International Conference on information Education and Artificial Intelligence
作者: Bonan Li Rui Cao Xingang Wang Hong Zhang Jinyan Zhou China Radio and Television Shandong Network Co Ltd China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) China
Video anomalous behavior detection aims to detect rare and random anomalous events, which usually deviate from expectations. Existing detection methods do not consider the appearance semantics and motion semantics of ...
来源: 评论
Timo: In-memory temporal query processing for big temporal data
Timo: In-memory temporal query processing for big temporal d...
收藏 引用
作者: Zheng, Xiao Liu, Houkai Wang, Xiujun Wu, Xuangou Yu, Feng School of Computer Science and Technology Anhui University of Technology Maanshan China Institute for Artificial Intelligence Hefei Comprehensive National Science Center Hefei China Anhui Engineering Laboratory for Intelligent Applications and Security of Industrial Internet Anhui University of Technology Anhui Maanshan China School of Computer Science and Engineering & School of Software Guangxi Normal University Guilin China Key Laboratory of Computer Network and Information Integration Southeast University Nanjing China
Today's internet applications generate massive temporal data anywhere and anytime. Although some disk-based temporal systems are currently available, they suffer from poor I/O performance, especially when applied ... 详细信息
来源: 评论
Frequency-aware Interaction network for Ultrasound Image Segmentation
收藏 引用
IEEE Transactions on Circuits and Systems for Video Technology 2024年
作者: Wang, Dongfang Zhou, Tao Zhang, Yizhe Gao, Shangbing Yang, Jian Nanjing University Of Science And Technology Pca Lab Key Lab Of Intelligent Percept. And Syst. For High-Dimensional Information Of Ministry Of Education Jiangsu Key Lab Of Image And Video Understanding For Social Security School Of Computer Science And Engineering Nanjing210094 China Huaiyin Institute Of Technology Faculty Of Computer And Software Engineering Huaian223003 China
Accurate segmentation of medical ultrasound images is crucial for guiding treatment decisions and assessing intervention effectiveness. The challenge of segmenting lesions in ultrasound images arises from factors such... 详细信息
来源: 评论
WaveLines:towards effective visualization and analysis of stability in power grid simulation
收藏 引用
Frontiers of computer Science 2021年 第6期15卷 19-30页
作者: Tianye ZHANG Qi WANG Liwen LIN Jiazhi XIA Xiwang XU Yanhao HUANG Xiaonan LUO Wenting ZHENG Wei CHEN The state key lab of CAD&CG Zhejiang UniversityHangzhou 310058China School of Computer Science and Engineering Central South UniversityChangsha 410083China The State Key Lab of Power Grid Safety and Energy Conservation China Electric Power Research InstituteBeijing 100192China School of Computer Science and Information Security Guilin University of Electronic TechnologyGuilin 541004China
Closely related to the safety and stability of power grids,stability analysis has long been a core topic in the electric *** approaches employ computational simulation to make the quantitative judgement of the grid st... 详细信息
来源: 评论
Analysis of Interpretable Spiking Neural networks for Motor Imagery Recognition Tasks
SSRN
收藏 引用
SSRN 2023年
作者: Wang, Xiuqing Yang, Yunpeng Li, Qingru Li, Qiuting An, Yang Ye, Xiaoya Key Laboratory of Network & Information Security College of Computer and Cyber Security Hebei Normal University Shijiazhuang China Hebei Provincial Engineering Research Center for Supply Chain Big Data Analytics & Data Security Hebei Normal University Shijiazhuang China
Brain-computer interface (BCI) is an important aspect of human-computer interaction (HCI). Motor imagery (MI) EEG-based BCI has great application potential for assisting disabled people in motor function reconstructio... 详细信息
来源: 评论
ICSGD-Momentum: SGD Momentum based on Inter-gradient Collision  22
ICSGD-Momentum: SGD Momentum based on Inter-gradient Collisi...
收藏 引用
22nd IEEE International Conference on Industrial Informatics, INDIN 2024
作者: Zou, Weidong Cao, Weipeng Xia, Yuanqing Zhong, Bineng Li, Dachuan School of Automation Beijing Institute of Technology Beijing China Shenzhen China Guangxi Key Lab of Multi-source Information Mining & Security Guangxi Normal University Guilin China Research Institute of Trustworthy Autonomous Systems Southern University of Science and Technology Shenzhen China Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen China
Deep neural networks (DNNs) are widely used in fields like computer vision and natural language processing. A key component of DNN training is the optimizer. SGD-Momentum is popular in many DNN methodologies, such as ... 详细信息
来源: 评论
An Efficient and Accurate Encrypted Image Retrieval Scheme via Ball Tree
An Efficient and Accurate Encrypted Image Retrieval Scheme v...
收藏 引用
International Conference on Big Data Computing and Communications (BIGCOM)
作者: Xianxian Li Jie Lei Zhenkui Shi Feng Yu College of computer science Guangxi Normal University Guilin China Guangxi Key Lab of Multi-source Information Mining & Security Guilin China Key Laboratory of Computer Network Information Integration Southeast University Nanjing China
With the rise and development of cloud computing, more and more companies try to outsource computing and storage to cloud in order to save storage and computing cost. Due to the rich information contained in images, t... 详细信息
来源: 评论