咨询与建议

限定检索结果

文献类型

  • 1,675 篇 会议
  • 1,145 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,824 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,879 篇 工学
    • 1,428 篇 计算机科学与技术...
    • 1,155 篇 软件工程
    • 511 篇 信息与通信工程
    • 213 篇 电气工程
    • 203 篇 控制科学与工程
    • 171 篇 生物工程
    • 160 篇 电子科学与技术(可...
    • 152 篇 网络空间安全
    • 127 篇 机械工程
    • 73 篇 光学工程
    • 72 篇 仪器科学与技术
    • 71 篇 生物医学工程(可授...
    • 59 篇 安全科学与工程
    • 55 篇 交通运输工程
    • 42 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 807 篇 理学
    • 509 篇 数学
    • 181 篇 生物学
    • 155 篇 物理学
    • 147 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 44 篇 化学
  • 465 篇 管理学
    • 282 篇 管理科学与工程(可...
    • 207 篇 图书情报与档案管...
    • 92 篇 工商管理
  • 102 篇 法学
    • 60 篇 社会学
    • 44 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 31 篇 军事学
  • 18 篇 农学
  • 14 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 126 篇 feature extracti...
  • 104 篇 semantics
  • 88 篇 accuracy
  • 85 篇 training
  • 77 篇 cryptography
  • 75 篇 computational mo...
  • 68 篇 authentication
  • 66 篇 security
  • 62 篇 federated learni...
  • 62 篇 privacy
  • 60 篇 deep learning
  • 55 篇 data models
  • 48 篇 object detection
  • 47 篇 protocols
  • 45 篇 information secu...
  • 42 篇 neural networks
  • 38 篇 robustness
  • 37 篇 visualization
  • 36 篇 convolution
  • 36 篇 optimization

机构

  • 225 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 56 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 52 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 37 篇 shandong provinc...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 28 篇 qilu university ...
  • 28 篇 college of compu...
  • 27 篇 college of compu...
  • 26 篇 pca lab key lab ...
  • 24 篇 shandong provinc...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 73 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 23 篇 ma jianfeng
  • 23 篇 xie jin
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 li xianxian
  • 20 篇 xiaoming wu
  • 20 篇 li hui
  • 20 篇 liu ximeng
  • 19 篇 zhixin li
  • 18 篇 xianxian li
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 16 篇 zhang yuqing
  • 16 篇 zhang shichao

语言

  • 2,567 篇 英文
  • 164 篇 其他
  • 97 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2824 条 记 录,以下是601-610 订阅
排序:
A comprehensive survey on shadow removal from document images: datasets, methods, and opportunities
收藏 引用
Vicinagearth 2025年 第1期2卷 1-18页
作者: Wang, Bingshu Li, Changping Zou, Wenbin Zhang, Yongjun Chen, Xuhang Chen, C.L. Philip School of Software Northwestern Polytechnical University Xi’an China Guangdong Provincial Key Laboratory of Intelligent Information Processing & Shenzhen Key Laboratory of Media Security Shenzhen University Shenzhen China Guangdong Key Laboratory of Intelligent Information Processing College of Electronics and Information Engineering Shenzhen University Shenzhen China Yongjun Zhang is with the State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang China School of Computer Science and Engineering Huizhou University Huizhou China School of Computer Science and Engineering South China University of Technology and Pazhou Lab Guangzhou China
With the rapid development of document digitization, people have become accustomed to capturing and processing documents using electronic devices such as smartphones. However, the captured document images often suffer...
来源: 评论
A Novel Shadow Variable Catcher for Addressing Selection Bias in Recommendation Systems
A Novel Shadow Variable Catcher for Addressing Selection Bia...
收藏 引用
IEEE International Conference on Data Mining (ICDM)
作者: Qingfeng Chen Boquan Wei Debo Cheng Jiuyong Li Lin Liu Shichao Zhang School of Computer Electronics and Information Guangxi University Nanning China UniSA STEM University of South Australia Adelaide Australia Guangxi Key Lab of Multi-source Information Mining and Security Guangxi Normal University Guilin China
Recommender systems rely on observational data to predict user ratings for unseen items. Since the observational data is typically missing not at random (MNAR), they contain biases, predominantly selection bias, thus ... 详细信息
来源: 评论
Privacy Protection Scheme of POI Query Based on Semantic and Temporal Association
收藏 引用
International Journal of network security 2022年 第5期24卷 922-932页
作者: Zuo, Kaizhong Zhao, Jun Hu, Peng Shen, Zhangyi Chu, Xixi School of Computer and Information Anhui Normal University Wuhu241002 China Anhui Provincial Key Laboratory of Network and Information Security Wuhu241002 China
In a digital society, location-based service (LBS) is a necessary function for mobile devices. However, while enjoying the convenience, users also face the risk of privacy disclosure. A novel location privacy protecti... 详细信息
来源: 评论
SCPS:A Secure and Copyright-Preserving System for IIoT Based on Hyperledger Fabric  9
SCPS:A Secure and Copyright-Preserving System for IIoT Based...
收藏 引用
9th International Conference on Advanced Cloud and Big Data, CBD 2021
作者: Peng, Jiahui Li, Chunpei Yuan, Bo Meng, Hongwei Yu, Feng Li, Xianxian Guangxi Normal University Guangxi Key Lab of Multi-Source Information Mining Security GuiLin China Beihang University Development Environment School of Computer Science and Engineering State Key Laboratory of Software Beijing100191 China Xiong'An Intelligent City Innovation Federation Blockchain Lab Beijing China
Data, a key asset in Industrial Internet of Things(IIoT), has fueled the emergence of a new data trading in-dustry, which can be collected and traded for better development of IIoT. However, copyright protection is no... 详细信息
来源: 评论
Generating Action-conditioned Prompts for Open-vocabulary Video Action Recognition  24
Generating Action-conditioned Prompts for Open-vocabulary Vi...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Jia, Chengyou Luo, Minnan Chang, Xiaojun Dang, Zhuohang Han, Mingfei Wang, Mengmeng Dai, Guang Dang, Sizhe Wang, Jingdong School of Computer Science and Technology MOEKLINNS Lab Xi'an Jiaotong University Shaanxi Xi'an China University of Science and Technology of China Anhui Hefei China School of Computer Science and Technology Xi'an Jiaotong University Shaanxi Xi'an China ReLER Lab AAII University of Technology Sydney SydneyNSW Australia Zhejiang University of Technology College of Computer Science and Technology China SGIT AI Lab State Grid Corporation of China Beijing China Baidu Inc Beijing China United Arab Emirates Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Xi'an Jiaotong University Xi'an710049 China SGIT AI Lab State Grid Corporation of China China School of Computer Science and Technology Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an710049 China
Exploring open-vocabulary video action recognition is a promising venture, which aims to recognize previously unseen actions within any arbitrary set of categories. Existing methods typically adapt pretrained image-te... 详细信息
来源: 评论
Leveraging Blockchain and Coded Computing for Secure Edge Collaborate Learning in Industrial IoT
Leveraging Blockchain and Coded Computing for Secure Edge Co...
收藏 引用
International Conference on computer Communications and networks (ICCCN)
作者: Yuliang Chen Xi Lin Hansong Xu Siyi Liao Jin Guo Chunming Zou Shanghai Jiao Tong University Shanghai China Shanghai Key Laboratory of Integrated Administration Technologies for Information Security Shanghai China China United Network Communication Co. Ltd The Department of Computer Science Morgan State University USA The Third Research Institute of Ministry of Public Security
In recent years, the rapid development of the Industrial Internet of Things (IIoT) has enabled real-time communication and data sharing among devices, significantly enhancing industrial production efficiency and secur... 详细信息
来源: 评论
Towards Hierarchically Extracting network Topologies
Towards Hierarchically Extracting Network Topologies
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Xiaoli Ma Guangsen Chen Haoxuan Zhang Tao Qin MOE Key Lab for Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an China Faculty of Electronic and Information Engineering Xi’an Jiaotong University Xi’an China Collaborative Innovation Center of Information Sensing and Understanding Xidian University Xi¶an China
network management has become increasingly difficult due to the growing complexity of these networks. It is important for network administrators, engineers, and analysts to understand network topology in order to desi... 详细信息
来源: 评论
Automatic Classification and Recognition of Seismic Waveforms Based on Convolutional Neural networks
Automatic Classification and Recognition of Seismic Waveform...
收藏 引用
network, Multimedia and information Technology (NMITCON) International Conference on
作者: Juhao Shan Hanming Huang Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guangxi Normal University Guangxi Key Lab of Multi-Source Information Mining and Security Guangxi Normal University School of Computer Science and Engineering Guangxi Normal University Guilin China
The development of efficient, high-precision, and universally applicable automatic waveform picking algorithms is becoming increasingly important in the era of seismic big data. The main challenge of waveform automati... 详细信息
来源: 评论
Improving User QoE via Joint Trajectory and Resource Optimization in Multi-UAV Assisted MEC
收藏 引用
IEEE Transactions on Services Computing 2025年 第03期18卷 1472-1486页
作者: Gao, Yang Tao, Jun Xu, Yifan Wang, Zuyan Gao, Yu Wang, Meiling Hainan University School of Cyberspace Security Haikou570228 China Ministry of Education Key Laboratory of Computer Network and Information Integration Southeast University Nanjing211189 China Southeast University School of Cyber Science and Engineering Nanjing211189 China ZTE Communications Co. Ltd Nanjing210012 China
As a promising network architecture, Mobile Edge Computing (MEC), has been proven that can effectively reduce the end-to-end latency and the energy consumption. The Unmanned Aerial Vehicle (UAV) assisted MEC network, ... 详细信息
来源: 评论
Privacy-Preserving Computation Tookit on Floating-Point Numbers  14th
Privacy-Preserving Computation Tookit on Floating-Point Numb...
收藏 引用
14th EAI International Conference on Mobile Multimedia Communications, Mobimedia 2021
作者: Chen, Zekai Zheng, Zhiwei Liu, Ximeng Guo, Wenzhong College of of Mathematics and Computer Science Fuzhou University Fuzhou350108 China Fujian Provincial Key Laboratory of Information Security of Network Systems Fuzhou University Fuzhou350108 China
Computation outsourcing using virtual environment is getting more and more prevalent in cloud computing, which several parties want to run a joint application and preserves the privacy of input data in secure computat... 详细信息
来源: 评论