咨询与建议

限定检索结果

文献类型

  • 1,675 篇 会议
  • 1,145 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,824 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,879 篇 工学
    • 1,428 篇 计算机科学与技术...
    • 1,155 篇 软件工程
    • 511 篇 信息与通信工程
    • 213 篇 电气工程
    • 203 篇 控制科学与工程
    • 171 篇 生物工程
    • 160 篇 电子科学与技术(可...
    • 152 篇 网络空间安全
    • 127 篇 机械工程
    • 73 篇 光学工程
    • 72 篇 仪器科学与技术
    • 71 篇 生物医学工程(可授...
    • 59 篇 安全科学与工程
    • 55 篇 交通运输工程
    • 42 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 807 篇 理学
    • 509 篇 数学
    • 181 篇 生物学
    • 155 篇 物理学
    • 147 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 44 篇 化学
  • 465 篇 管理学
    • 282 篇 管理科学与工程(可...
    • 207 篇 图书情报与档案管...
    • 92 篇 工商管理
  • 102 篇 法学
    • 60 篇 社会学
    • 44 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 31 篇 军事学
  • 18 篇 农学
  • 14 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 126 篇 feature extracti...
  • 104 篇 semantics
  • 88 篇 accuracy
  • 85 篇 training
  • 77 篇 cryptography
  • 75 篇 computational mo...
  • 68 篇 authentication
  • 66 篇 security
  • 62 篇 federated learni...
  • 62 篇 privacy
  • 60 篇 deep learning
  • 55 篇 data models
  • 48 篇 object detection
  • 47 篇 protocols
  • 45 篇 information secu...
  • 42 篇 neural networks
  • 38 篇 robustness
  • 37 篇 visualization
  • 36 篇 convolution
  • 36 篇 optimization

机构

  • 225 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 56 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 52 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 37 篇 shandong provinc...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 28 篇 qilu university ...
  • 28 篇 college of compu...
  • 27 篇 college of compu...
  • 26 篇 pca lab key lab ...
  • 24 篇 shandong provinc...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 73 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 23 篇 ma jianfeng
  • 23 篇 xie jin
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 li xianxian
  • 20 篇 xiaoming wu
  • 20 篇 li hui
  • 20 篇 liu ximeng
  • 19 篇 zhixin li
  • 18 篇 xianxian li
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 16 篇 zhang yuqing
  • 16 篇 zhang shichao

语言

  • 2,567 篇 英文
  • 164 篇 其他
  • 97 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2824 条 记 录,以下是591-600 订阅
排序:
A Review of Learning-Based E-commerce  16
A Review of Learning-Based E-commerce
收藏 引用
16th IEEE International Conference on Intelligent Systems and Knowledge Engineering, ISKE 2021
作者: Yin, Sihan Luo, Xudong Guangxi Normal University Guangxi Key Lab of Multi-Source Information Mining Security School of Computer Science and Engineering Guilin China
Now e-commerce applications based on learning are continuously improving our daily life. These learning methods include graph neural networks, deep learning, machine learning, and reinforcement learning. More and more... 详细信息
来源: 评论
Harnessing Hierarchical label Distribution Variations in Test Agnostic Long-tail Recognition  41
Harnessing Hierarchical Label Distribution Variations in Tes...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Yang, Zhiyong Xu, Qianqian Wang, Zitai Li, Sicong Han, Boyu Bao, Shilong Cao, Xiaochun Huang, Qingming School of Computer Science and Tech. University of Chinese Academy of Sciences China Key Lab. of Intelligent Information Processing Institute of Computing Tech. CAS China Institute of Information Engineering CAS China School of Cyber Security University of Chinese Academy of Sciences China School of Cyber Science and Tech. Shenzhen Campus of Sun Yat-sen University China BDKM University of Chinese Academy of Sciences China
This paper explores test-agnostic long-tail recognition, a challenging long-tail task where the test label distributions are unknown and arbitrarily imbalanced. We argue that the variation in these distributions can b... 详细信息
来源: 评论
A Survey of Learning-Based Methods for Cold-Start, Social Recommendation, and Data Sparsity in E-commerce Recommendation Systems  16
A Survey of Learning-Based Methods for Cold-Start, Social Re...
收藏 引用
16th IEEE International Conference on Intelligent Systems and Knowledge Engineering, ISKE 2021
作者: Yin, Sihan Luo, Xudong Guangxi Normal University Guangxi Key Lab of Multi-Source Information Mining Security School of Computer Science and Engineering Guilin China
With the continuous development of the economy and technology, people more and more rely on online shopping, especially during the pandemic of COVID19. On the other hand, sellers display many products, so customers ne... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities  24
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
44th ACM/IEEE International Conference on Software Engineering, ICSE 2024
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hong Kong Jin YinHu Laboratory Wuhan China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China University of Colorado Colorado Springs Department of Computer Science Colorado Springs Colorado United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
Data security and Privacy in Bitcoin System:A Survey
收藏 引用
Journal of computer Science & Technology 2020年 第4期35卷 843-862页
作者: Lie-Huang Zhu Bao-Kun Zheng Meng Shen Feng Gao Hong-Yu Li Ke-Xin Shi School of Computer Science and Technology Beijing Institute of TechnologyBeijing 100081China School of Information Management for Law China University of Political Science and LawBeijing 102249China Key Laboratory of Information Network Security Ministry of Public SecurityShanghai 201204China
To date,bitcoin has been the most successful application of blockchain technology and has received considerable attention from both industry and *** is an electronic payment system based on cryptography rather than on... 详细信息
来源: 评论
Noisy Node Classification by Bi-level Optimization based Multi-teacher Distillation
arXiv
收藏 引用
arXiv 2024年
作者: Liu, Yujing Wu, Zongqian Lu, Zhengyu Nie, Ci Wen, Guoqiu Hu, Ping Zhu, Xiaofeng Guangxi Key Lab of Multisource Information Mining and Security Guangxi Normal University Guilin China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China
Previous graph neural networks (GNNs) usually assume that the graph data is with clean labels for representation learning, but it is not true in real applications. In this paper, we propose a new multi-teacher distill... 详细信息
来源: 评论
Deep Height Decoupling for Precise Vision-based 3D Occupancy Prediction
arXiv
收藏 引用
arXiv 2024年
作者: Wu, Yuan Yan, Zhiqiang Wang, Zhengxue Li, Xiang Hui, Le Yang, Jian PCA Lab Key Lab of Intelligent Perception and Systems for High-Dimensional Information Ministry of Education Jiangsu Key Lab of Image and Video Understanding for Social Security School of Computer Science and Engineering Nanjing University of Science and Technology China College of Computer Science Nankai University Tianjin300071 China Electronics and Information Northwestern Polytechnical University Xi’an710072 China
The task of vision-based 3D occupancy prediction aims to reconstruct 3D geometry and estimate its semantic classes from 2D color images, where the 2D-to-3D view transformation is an indispensable step. Most previous m... 详细信息
来源: 评论
Adversarial-Inspired Backdoor Defense via Bridging Backdoor and Adversarial Attacks  39
Adversarial-Inspired Backdoor Defense via Bridging Backdoor ...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Yin, Jia-Li Wang, Weijian Lyhwa Lin, Wei Liu, Ximeng Fujian Province Key Laboratory of Information Security and Network Systems Fuzhou350108 China College of Computer and Data Science Fuzhou University Fuzhou350118 China Fujian Provincial Key Laboratory of Big Data Mining and Applications Fuzhou350118 China College of Computer Science and Mathematics Fujian University of Technology Fuzhou350118 China Lion Rock Labs of Cyberspace Security CTIHE Hong Kong
Backdoor attacks and adversarial attacks are two major security threats to deep neural networks (DNNs), with the former one is a training-time data poisoning attack that aims to implant backdoor triggers into models b... 详细信息
来源: 评论
Violence Video Detection Based on Multi-modal Fusion and Dual Channel Contrastive Learning
Violence Video Detection Based on Multi-modal Fusion and Dua...
收藏 引用
Human-Centered Cognitive Systems (HCCS)
作者: Huan Li Zhijian Bai Yue Li Tao Qin Faculty of Electronic and Information Engineering Xi’an Jiaotong University Xi’an China MOE Key Lab for Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an Chin
There are more and more violence videos propagated on the Internet, it is important to detect them to provide support for online social network management. In the traditional detection methods, the utilization of diff...
来源: 评论
Simulating Cyber Attacks and Designing Malware using Python  10
Simulating Cyber Attacks and Designing Malware using Python
收藏 引用
10th International Conference on Signal Processing and Integrated networks, SPIN 2023
作者: Ankit, Akash Inder, Shubham Sharma, Anuj Johari, Rahul Vidyarthi, Deo Prakash University School of Information Communication and Technology Guru Gobind Singh Indraprastha University SWINGER: Security Wireless IoT Network Group of Engineering and Research Dwarka New Delhi110078 India MelbourneVIC3000 Australia Jawaharlal Nehru University Parallel and Distributed System Lab School of Computer and Systems Sciences New Delhi110067 India
In this Internet era, we have become heavily dependent on the World Wide Web and it has become a basic amenity for humans. A normal user can be trapped easily in this vicious web if not careful enough. It is a field t... 详细信息
来源: 评论