咨询与建议

限定检索结果

文献类型

  • 1,677 篇 会议
  • 1,155 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,836 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,891 篇 工学
    • 1,442 篇 计算机科学与技术...
    • 1,155 篇 软件工程
    • 516 篇 信息与通信工程
    • 215 篇 控制科学与工程
    • 214 篇 电气工程
    • 171 篇 生物工程
    • 164 篇 电子科学与技术(可...
    • 154 篇 网络空间安全
    • 126 篇 机械工程
    • 72 篇 光学工程
    • 72 篇 仪器科学与技术
    • 71 篇 生物医学工程(可授...
    • 58 篇 安全科学与工程
    • 54 篇 交通运输工程
    • 42 篇 化学工程与技术
    • 41 篇 动力工程及工程热...
  • 807 篇 理学
    • 511 篇 数学
    • 181 篇 生物学
    • 153 篇 物理学
    • 148 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 44 篇 化学
  • 467 篇 管理学
    • 281 篇 管理科学与工程(可...
    • 210 篇 图书情报与档案管...
    • 90 篇 工商管理
  • 102 篇 法学
    • 60 篇 社会学
    • 44 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 31 篇 军事学
  • 18 篇 农学
  • 12 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 126 篇 feature extracti...
  • 104 篇 semantics
  • 88 篇 accuracy
  • 85 篇 training
  • 77 篇 cryptography
  • 75 篇 computational mo...
  • 68 篇 authentication
  • 66 篇 security
  • 65 篇 federated learni...
  • 62 篇 privacy
  • 61 篇 deep learning
  • 55 篇 data models
  • 48 篇 object detection
  • 47 篇 protocols
  • 45 篇 information secu...
  • 42 篇 neural networks
  • 38 篇 robustness
  • 37 篇 visualization
  • 36 篇 convolution
  • 36 篇 optimization

机构

  • 228 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 56 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 52 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 38 篇 shandong provinc...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 28 篇 college of compu...
  • 28 篇 qilu university ...
  • 28 篇 college of compu...
  • 27 篇 shandong provinc...
  • 26 篇 pca lab key lab ...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 72 篇 yang jian
  • 31 篇 jian yang
  • 30 篇 meng deyu
  • 27 篇 xu li
  • 25 篇 jianfeng ma
  • 23 篇 ma jianfeng
  • 23 篇 xie jin
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 li xianxian
  • 20 篇 xiaoming wu
  • 20 篇 li hui
  • 20 篇 liu ximeng
  • 19 篇 zhixin li
  • 18 篇 xianxian li
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 17 篇 li zhixin
  • 16 篇 zhang yuqing

语言

  • 2,567 篇 英文
  • 176 篇 其他
  • 97 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2836 条 记 录,以下是51-60 订阅
排序:
Integration of MPC into Besu through an extended private transaction model
Integration of MPC into Besu through an extended private tra...
收藏 引用
2023 IEEE International Conference on Metaverse Computing, networking and Applications, MetaCom 2023
作者: Morales, Daniel Agudo, Isaac Lopez, Javier Itis Software Universidad de Málaga Network Information and Computer Security Lab Department of Computer Science Málaga Spain
In the last few years we have seen many different approaches to incorporate privacy features to blockchains. In the area of cryptocurrencies that would normally mean protecting the identity of the owner of some funds,... 详细信息
来源: 评论
Incorporating metapath interaction on heterogeneous information network for social recommendation
收藏 引用
Frontiers of computer Science 2024年 第1期18卷 33-48页
作者: Yanbin JIANG Huifang MA Xiaohui ZHANG Zhixin LI Liang CHANG College of Computer Science and Engineering Northwest Normal UniversityLanzhou 730070China Guangxi Key Lab of Multi-source Information Mining and Security Guangxi Normal UniversityGuilin 541001China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic TechnologyGuilin 541004China
Heterogeneous information network(HIN)has recently been widely adopted to describe complex graph structure in recommendation systems,proving its effectiveness in modeling complex graph *** existing HIN-based recommend... 详细信息
来源: 评论
Defending Against Poisoning Attacks in Federated Prototype Learning on Non-IID Data  18th
Defending Against Poisoning Attacks in Federated Prototype ...
收藏 引用
18th International Conference on Wireless Artificial Intelligent Computing Systems and Applications, WASA 2024
作者: Zhang, Jie Zhang, Hongliang Wang, Guijuan Dong, Anming Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan250353 China
Federated learning (FL) is an emerging distributed machine learning paradigm that enables participants to cooperatively train learning tasks without revealing the raw data. However, the distributed nature of FL makes ... 详细信息
来源: 评论
Conditional selection with CNN augmented transformer for multimodal affective analysis
收藏 引用
CAAI Transactions on Intelligence Technology 2024年 第4期9卷 917-931页
作者: Jianwen Wang Shiping Wang Shunxin Xiao Renjie Lin Mianxiong Dong Wenzhong Guo College of Computer and Data Science Fuzhou UniversityFuzhouChina College of Computer and Cyber Security Fujian Normal UniversityFuzhouChina Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou UniversityFuzhouChina Digital Fujian Institute of Big Data Security Technology Fujian Normal UniversityFuzhouChina Department of Sciences and Informatics Muroran Institute of TechnologyMuroranJapan
Attention mechanism has been a successful method for multimodal affective analysis in recent years. Despite the advances, several significant challenges remain in fusing language and its nonverbal context information.... 详细信息
来源: 评论
AODPFL: An Adaptive Optimization Method for Differentially Private Federated Learning
AODPFL: An Adaptive Optimization Method for Differentially P...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Qiu, Mengxing Liang, Xiaoyan Du, Ruizhong School of Cyber Security and Computer Hebei University Key Lab on High Trusted Information System of Hebei Province Baoding China
Federated learning addresses the issues of data silos and privacy to some extent by training models locally on client devices, only uploading model parameters, and aggregating them on the central server. However, atta... 详细信息
来源: 评论
LDD-YOLO: An Improved Lightweight Detection Method for Steel Surface Defects Based on YOLOv8
LDD-YOLO: An Improved Lightweight Detection Method for Steel...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Zhang, Yuechen Li, Aimin Li, Zhiyao Kong, Xiaotong Li, Wenqiang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
Steel is an indispensable raw material in the industrial field, steel surface defects seriously affect the quality of steel, in recent years a lot of research has been carried out on the detection of steel surface def... 详细信息
来源: 评论
Lip-Audio Modality Fusion for Deep Forgery Video Detection
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 3499-3515页
作者: Yong Liu Zhiyu Wang Shouling Ji Daofu Gong Lanxin Cheng Ruosi Cheng College of Cyberspace Security Information Engineering UniversityZhengzhou450001China Research Institute of Intelligent Networks Zhejiang LabHangzhou311121China College of Computer Science and Technology Zhejiang UniversityHangzhou310027China Henan Key Laboratory of Cyberspace Situation Awareness Zhengzhou450001China Key Laboratory of Cyberspace Security Ministry of EducationZhengzhou450001China
In response to the problem of traditional methods ignoring audio modality tampering, this study aims to explore an effective deep forgery video detection technique that improves detection precision and reliability by ... 详细信息
来源: 评论
BTVD-BERT: A Bilingual Domain-Adaptation Pre-Trained Model for Textural Vulnerability Descriptions
BTVD-BERT: A Bilingual Domain-Adaptation Pre-Trained Model f...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Wang, Ziyuan Liang, Xiaoyan Du, Ruizhong Zhou, Xin School of Cyber Security and Computer Hebei University Key Lab on High Trusted Information System of Hebei Province Baoding China
Textural Vulnerability Descriptions(TVD) refers to the natural language description of a vulnerability in databases like National Vulnerability Database(NVD) and China National Vulnerability Database(CNVD), which typi... 详细信息
来源: 评论
AQROM:A quality of service aware routing optimization mechanism based on asynchronous advantage actor-critic in software-defined networks
收藏 引用
Digital Communications and networks 2024年 第5期10卷 1405-1414页
作者: Wei Zhou Xing Jiang Qingsong Luo Bingli Guo Xiang Sun Fengyuan Sun Lingyu Meng School of Information and Communication Guilin University of Electronic TechnologyGuilin541004China The 34th Research Institute of China Electronics Technology Group Corporation Guilin541004China Guangxi Key Laboratory of Optical Network and Optical Information Security Guilin541004China State Key Laboratory of Information Photonics and Optical Communications BeijingUniversity of Posts and TelecommunicationsBeijing100876China Department of Electrical and Computer Engineering University of New MexicoAlbuquerqueNM87131USA
In Software-Defined networks(SDNs),determining how to efficiently achieve Quality of Service(QoS)-aware routing is challenging but critical for significantly improving the performance of a network,where the metrics of... 详细信息
来源: 评论
MMH-FE:AMulti-Precision and Multi-Sourced Heterogeneous Privacy-Preserving Neural network Training Based on Functional Encryption
收藏 引用
computers, Materials & Continua 2025年 第3期82卷 5387-5405页
作者: Hao Li Kuan Shao Xin Wang Mufeng Wang Zhenyong Zhang The State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang550025China Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science CenterQilu University of Technology(Shandong Academy of Sciences)Jinan250014China China Industrial Control Systems Cyber Emergency Response Team Beijing100040China
Due to the development of cloud computing and machine learning,users can upload their data to the cloud for machine learning model ***,dishonest clouds may infer user data,resulting in user data *** schemes have achie... 详细信息
来源: 评论