咨询与建议

限定检索结果

文献类型

  • 1,675 篇 会议
  • 1,145 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,824 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,879 篇 工学
    • 1,428 篇 计算机科学与技术...
    • 1,155 篇 软件工程
    • 511 篇 信息与通信工程
    • 213 篇 电气工程
    • 203 篇 控制科学与工程
    • 171 篇 生物工程
    • 160 篇 电子科学与技术(可...
    • 152 篇 网络空间安全
    • 127 篇 机械工程
    • 73 篇 光学工程
    • 72 篇 仪器科学与技术
    • 71 篇 生物医学工程(可授...
    • 59 篇 安全科学与工程
    • 55 篇 交通运输工程
    • 42 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 807 篇 理学
    • 509 篇 数学
    • 181 篇 生物学
    • 155 篇 物理学
    • 147 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 44 篇 化学
  • 465 篇 管理学
    • 282 篇 管理科学与工程(可...
    • 207 篇 图书情报与档案管...
    • 92 篇 工商管理
  • 102 篇 法学
    • 60 篇 社会学
    • 44 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 31 篇 军事学
  • 18 篇 农学
  • 14 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 126 篇 feature extracti...
  • 104 篇 semantics
  • 88 篇 accuracy
  • 85 篇 training
  • 77 篇 cryptography
  • 75 篇 computational mo...
  • 68 篇 authentication
  • 66 篇 security
  • 62 篇 federated learni...
  • 62 篇 privacy
  • 60 篇 deep learning
  • 55 篇 data models
  • 48 篇 object detection
  • 47 篇 protocols
  • 45 篇 information secu...
  • 42 篇 neural networks
  • 38 篇 robustness
  • 37 篇 visualization
  • 36 篇 convolution
  • 36 篇 optimization

机构

  • 225 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 56 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 52 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 37 篇 shandong provinc...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 28 篇 qilu university ...
  • 28 篇 college of compu...
  • 27 篇 college of compu...
  • 26 篇 pca lab key lab ...
  • 24 篇 shandong provinc...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 73 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 23 篇 ma jianfeng
  • 23 篇 xie jin
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 li xianxian
  • 20 篇 xiaoming wu
  • 20 篇 li hui
  • 20 篇 liu ximeng
  • 19 篇 zhixin li
  • 18 篇 xianxian li
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 16 篇 zhang yuqing
  • 16 篇 zhang shichao

语言

  • 2,567 篇 英文
  • 164 篇 其他
  • 97 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2824 条 记 录,以下是621-630 订阅
排序:
Achieving Fair and Accountable Data Trading Scheme for Educational Multimedia Data Based on Blockchain  17th
Achieving Fair and Accountable Data Trading Scheme for Educa...
收藏 引用
17th EAI International Conference on Quality, Reliability, security and Robustness in Heterogeneous networks, QShine 2021
作者: Li, Xianxian Peng, Jiahui Shi, Zhenkui Li, Chunpei College of Computer Science Guangxi Normal University Guilin China Guangxi Key Lab of Multi-source Information Mining Security Guilin China
Educational resources have a higher need for copyright protection to avoiding illegal redistribution. The transactions of educational multimedia data resources can effectively promote the development of educational in... 详细信息
来源: 评论
CoinSeg: Contrast Inter- and Intra- Class Representations for Incremental Segmentation
CoinSeg: Contrast Inter- and Intra- Class Representations fo...
收藏 引用
International Conference on computer Vision (ICCV)
作者: Zekang Zhang Guangyu Gao Jianbo Jiao Chi Harold Liu Yunchao Wei School of Computer Science Beijing Institute of Technology School of Computer Science University of Birmingham WEI Lab Institute of Information Science Beijing Jiaotong University Beijing Key Laboratory of Advanced Information Science and Network
Class incremental semantic segmentation aims to strike a balance between the model’s stability and plasticity by maintaining old knowledge while adapting to new concepts. However, most state-of-the-art methods use th...
来源: 评论
Vulnerable Smart Contract Function Locating Based on Multi-Relational Nested Graph Convolutional network
arXiv
收藏 引用
arXiv 2023年
作者: Liu, Haiyang Fan, Yuqi Feng, Lin Wei, Zhenchun School of Computer Science and Information Engineering Anhui Province Key Laboratory of Industry Safety and Emergency Technology Hefei University of Technology Hefei230601 China Anhui Provincial Key Laboratory of Network and Information Security Anhui Normal Unviersity Wuhu241002 China
The immutable and trustable characteristics of blockchain enable smart contracts to be applied in various fields. Unfortunately, smart contracts are subject to various vulnerabilities, which are frequently exploited b... 详细信息
来源: 评论
Range-gated laser image compression and encryption scheme based on bidirectional diffusion
收藏 引用
Optoelectronics Letters 2021年 第10期17卷 630-635页
作者: LI Jinqing SHENG Yaohui DI Xiaoqiang MU Yining School of Computer Science and Technology Changchun University of Science and TechnologyChangchun 130022China Jilin Province Key Laboratory of Network and Information Security Changchun 130022China Information Center of Changchun University of Science and Technology Changchun 130022China School of Science Changchun University of Science and TechnologyChangchun 130022China
The existing image encryption schemes are not suitable for the secure transmission of large amounts of data in range-gated laser imaging under high noise *** at this problem,a range-gated laser imaging image compressi... 详细信息
来源: 评论
BEW-YOLO: An Improved Method for PCB Defect Detection Based on YOLOv7
BEW-YOLO: An Improved Method for PCB Defect Detection Based ...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Zhiyao Li Aimin Li Yuechen Zhang Xiaotong Kong Wenqiang Li Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
The PCB defect object size is small and the detection process is susceptible to background interference, usually have the problem of missed and false detection. In order to solve the above problems, an improved method...
来源: 评论
Multi-Channel Hypergraph Convolution Group Recommendation with Member information Enhancement  25
Multi-Channel Hypergraph Convolution Group Recommendation wi...
收藏 引用
25th IEEE International Conferences on High Performance Computing and Communications, 9th International Conference on Data Science and Systems, 21st IEEE International Conference on Smart City and 9th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC/DSS/SmartCity/DependSys 2023
作者: Chen, Tianhao Gao, Qian Fan, Jun Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Shandong Jinan250014 China Qilu University of Technology Shandong Academy of Sciences Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Shandong Jinan250353 China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Shandong Jinan250014 China China Telecom Digital Intelligence Techonology Co Ltd Shandong Jinan250101 China
Group recommendation involves comprehensively considering various aspects, including members and items, to predict the overall interests of a group and recommend suitable items through a recommendation system. With th... 详细信息
来源: 评论
KA$^{2}$2SE: key-Aggregation Authorized Searchable Encryption Scheme for Data Sharing in Wireless Sensor networks
收藏 引用
IEEE Transactions on Services Computing 2024年 第1期18卷 226-238页
作者: Haijiang Wang Jianting Ning Wei Wu Chao Lin Kai Zhang School of Information and Electronic Engineering Zhejiang University of Science and Technology Zhejiang China School of Cyber Science and Engineering Wuhan University Wuhan China Faculty of Data Science City University of Macau Macau China College of Education Sciences Hong Kong University of Science and Technology Guangzhou China Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fujian Normal University Fuzhou China Guangdong Key Laboratory of Blockchain Security Guangzhou University Guangzhou China College of Computer Science and Technology Shanghai University of Electric Power Shanghai China
As a promising technology, key-aggregation searchable encryption with constant computation overhead is especially suitable for sensor nodes with limited computation resources in wireless sensor networks. However, in m... 详细信息
来源: 评论
Time Slot Correlation-Based Caching Strategy for information-Centric Satellite networks  1
收藏 引用
11th EAI International Conference on MOBILe Wireless MiddleWARE, Operating Systems and Applications, MOBILWARE 2022
作者: Xu, Rui Di, Xiaoqiang Chen, Jing Cao, Jinhui Luo, Hao Wang, Haowei Qi, Hui He, Xiongwen Lei, Wenping School of Computer Science and Technology Changchun University of Science and Technology Changchun130022 China School of Information Engineering Henan Institute of Science and Technology Xinxiang453003 China Jilin Province Key Laboratory of Network and Information Security Changchun University of Science and Technology Changchun130022 China Information Center Changchun University of Science and Technology 130022 Changchun China Beijing Institute of Spacecraft System Engineering Beijing100094 China Beijing Institute of Space Mechanic and Electricity Beijing100094 China
With the successful manufacture of highly stable and high-performance satellite processors, caching on satellites has become possible. information Centric networking (ICN) is introduced to satellite networks to addres... 详细信息
来源: 评论
TrUStAPIS: a trust requirements elicitation method for IoT
TrUStAPIS: a trust requirements elicitation method for IoT
收藏 引用
作者: Ferraris, Davide Fernandez-Gago, Carmen Network Information and Computer Security Lab University of Malaga Malaga29071 Spain
The internet of things (IoT) is an environment of interconnected entities, which are identifiable, usable and controllable via the Internet. Trust is useful for a system such as the IoT as the entities involved would ... 详细信息
来源: 评论
Towards HDR and HFR Video from Rolling-Mixed-Bit Spikings
Towards HDR and HFR Video from Rolling-Mixed-Bit Spikings
收藏 引用
Conference on computer Vision and Pattern Recognition (CVPR)
作者: Yakun Chang Yeliduosi Xiaokaiti Yujia Liu Bin Fan Zhaojun Huang Tiejun Huang Boxin Shi Institute of Information Science School of Computer Science Beijing Jiaotong University Beijing Key Laboratory of Advanced Information Science and Network Technology National Key Laboratory for Multimedia Information Processing School of Computer Science Peking University National Engineering Research Center of Visual Technology School of Computer Science Peking University National Key Lab of General AI School of Intelligence Science and Technology Peking University
The spiking cameras offer the benefits of high dynamic range (HDR), high temporal resolution, and low data redundancy. However, reconstructing HDR videos in high-speed conditions using single-bit spikings presents cha... 详细信息
来源: 评论