咨询与建议

限定检索结果

文献类型

  • 1,675 篇 会议
  • 1,145 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,824 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,879 篇 工学
    • 1,428 篇 计算机科学与技术...
    • 1,155 篇 软件工程
    • 511 篇 信息与通信工程
    • 213 篇 电气工程
    • 203 篇 控制科学与工程
    • 171 篇 生物工程
    • 160 篇 电子科学与技术(可...
    • 152 篇 网络空间安全
    • 127 篇 机械工程
    • 73 篇 光学工程
    • 72 篇 仪器科学与技术
    • 71 篇 生物医学工程(可授...
    • 59 篇 安全科学与工程
    • 55 篇 交通运输工程
    • 42 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 807 篇 理学
    • 509 篇 数学
    • 181 篇 生物学
    • 155 篇 物理学
    • 147 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 44 篇 化学
  • 465 篇 管理学
    • 282 篇 管理科学与工程(可...
    • 207 篇 图书情报与档案管...
    • 92 篇 工商管理
  • 102 篇 法学
    • 60 篇 社会学
    • 44 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 31 篇 军事学
  • 18 篇 农学
  • 14 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 126 篇 feature extracti...
  • 104 篇 semantics
  • 88 篇 accuracy
  • 85 篇 training
  • 77 篇 cryptography
  • 75 篇 computational mo...
  • 68 篇 authentication
  • 66 篇 security
  • 62 篇 federated learni...
  • 62 篇 privacy
  • 60 篇 deep learning
  • 55 篇 data models
  • 48 篇 object detection
  • 47 篇 protocols
  • 45 篇 information secu...
  • 42 篇 neural networks
  • 38 篇 robustness
  • 37 篇 visualization
  • 36 篇 convolution
  • 36 篇 optimization

机构

  • 225 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 56 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 52 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 37 篇 shandong provinc...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 28 篇 qilu university ...
  • 28 篇 college of compu...
  • 27 篇 college of compu...
  • 26 篇 pca lab key lab ...
  • 24 篇 shandong provinc...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 73 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 23 篇 ma jianfeng
  • 23 篇 xie jin
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 li xianxian
  • 20 篇 xiaoming wu
  • 20 篇 li hui
  • 20 篇 liu ximeng
  • 19 篇 zhixin li
  • 18 篇 xianxian li
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 16 篇 zhang yuqing
  • 16 篇 zhang shichao

语言

  • 2,567 篇 英文
  • 164 篇 其他
  • 97 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2824 条 记 录,以下是631-640 订阅
排序:
Outlier Detection in Eigenvalue Spaces Based on Spectral Analysis of KNN Graphs
SSRN
收藏 引用
SSRN 2023年
作者: Li, Jia Wang, Chenxu Wang, Xiaochun Wang, Xiali School of Software Engineering Xi’an Jiaotong University Xi’an710049 China MOE Key Lab of Intelligent Network and Network Security Xi’an Jiaotong University China Department of Computer Science Chang’an University Xi’an China
Outlier detection is a critical method in data mining as it has a wide range of practical use in various fields. Spectral clustering has attracted much attention for its advantage of coping with the curse of dimension... 详细信息
来源: 评论
ASDIA: An Adversarial Sample to Preserve Privacy Program in Federated Learning
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Tian, Shujuan Tan, Yi Wang, Han Liu, Haolin Li, Zhetao Xiangtan University School of Computer Science School of Cyberspace Security Xiangtan China Xiangtan University Hunan International Scientific and Technological Cooperation Base of Intelligent network Xiangtan411105 China Xiangtan University Key Laboratory of Hunan Province for Internet of Things and Information Security Xiangtan411105 China Department of Electrical Engineering and Computer Science University of Kansas 1520 W 15th St LawrenceKS United States Jinan University College of Information Science and Technology Guangzhou510632 China
Federated learning enables training across multiple entities while ensuring data security and the effectiveness of knowledge dissemination. Despite its benefits, it remains susceptible to privacy breaches by both exte... 详细信息
来源: 评论
Social-enhanced recommendation using graph-based contrastive learning  25
Social-enhanced recommendation using graph-based contrastive...
收藏 引用
25th IEEE International Conferences on High Performance Computing and Communications, 9th International Conference on Data Science and Systems, 21st IEEE International Conference on Smart City and 9th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC/DSS/SmartCity/DependSys 2023
作者: Xue, Peng Gao, Qian Fan, Jun Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Shandong Jinan250014 China Qilu University of Technology Shandong Academy of Sciences Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Shandong Jinan250353 China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Shandong Jinan250014 China China Telecom Digital Intelligence Techonology Co Ltd Shandong Jinan250101 China
The social network-based recommendation model use social network information to mitigate data sparsity issues and improve the accuracy of recommendation models. However, In most social network-based recommendation alg... 详细信息
来源: 评论
A Legal Judgment Prediction Model Based on BERT, Attention, and Graph Convolutional network
A Legal Judgment Prediction Model Based on BERT, Attention, ...
收藏 引用
International Conference on Tools for Artificial Intelligence (ICTAI)
作者: Binxia Yang Guibin Chen Xudong Luo School of Computer Science and Engineering Guangxi Normal University Guilin Guangxi China Key Lab of Education Blockchain and Intelligent Technology of Ministry of Education Guilin Guangxi China Guangxi Key Lab of Multi-Source Information Mining & Security Guilin Guangxi China
Legal judgment prediction is one of essential tasks in legal practice. However, most existing models of legal judgment prediction struggle with long documents due to limitations in position encoding and pre-trained la... 详细信息
来源: 评论
A Real-time Cutting Model Based on Finite Element and Order Reduction
收藏 引用
computer Systems Science & Engineering 2022年 第10期43卷 1-15页
作者: Xiaorui Zhang Wenzheng Zhang Wei Sun Hailun Wu Aiguo Song Sunil Kumar Jha Wuxi Research Institute Nanjing University of Information Science&TechnologyWuxi214100China Engineering Research Center of Digital Forensics Ministry of EducationJiangsu Engineering Center of Network MonitoringSchool of Computer and SoftwareNanjing University of Information Science&TechnologyNanjing210044China School of Automation Nanjing University of Information Science&TechnologyNanjing210044China State Key Laboratory of Bioelectronics Jiangsu Key Lab of Remote Measurement and ControlSchool of Instrument Science and EngineeringSoutheast UniversityNanjing210096China IT Fundamentals and Education Technologies Applications University of Information Technology and Management in RzeszowRzeszow Voivodeship100031Poland
Telemedicine plays an important role in Corona Virus Disease 2019(COVID-19).The virtual surgery simulation system,as a key component in telemedicine,requires to compute in ***,this paper proposes a realtime cutting mo... 详细信息
来源: 评论
Grouped Federated Meta-Learning for Privacy-Preserving Rare Disease Diagnosis
Grouped Federated Meta-Learning for Privacy-Preserving Rare ...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Xinru Song Feng Wu Zongchao Xie Longxiang Gao Lei Cui Youyang Qu Shujun Gu Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China School of Computer Science University of Technology Sydney Australia Faculty of Science University of Melbourne Australia
Federated learning (FL) has been widely applied in medical field, which allows clients to collaboratively train global models without sharing local data. Nevertheless, the diversity and scarcity of samples from rare d... 详细信息
来源: 评论
A High-Dimensional Temporal Data Publishing Method Based on Dynamic Bayesian networks and Differential Privacy
A High-Dimensional Temporal Data Publishing Method Based on ...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Yaxin Wang Zhen Zhang Heng Qian Yongchao Gao Qiuyue Wang Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Massive high-dimensional data generated by the Internet typically contains sensitive privacy information. Protecting data privacy while maintaining utility has become a pressing challenge. We propose a novel high-dime... 详细信息
来源: 评论
Adversarial Purification with One-Step Guided Diffusion Model
SSRN
收藏 引用
SSRN 2024年
作者: Li, Yanchun Li, Zemin Hu, Lingzhi Zeng, Li Shen, Dongsu School of Computer Science Xiangtan University Xiangtan411105 China Hunan International Scientific and Technological Cooperation Base of Intelligent network Xiangtan411105 China Key Laboratory of Hunan Province for Internet of Things and Information Security Xiangtan411105 China School of Mathematics and Computer Science Xiangtan University Xiangtan University Xiangtan411105 China Network and Information Center Xiangtan University Xiangtan411105 China
Recently, the employment of diffusion models for adversarial purification has attracted the attention due to their strong generalization ability towards defensive adversarial examples. However, the multi-step sampling... 详细信息
来源: 评论
Fault Diagnosis for Rolling Bearing Based on RF-LSTM
Fault Diagnosis for Rolling Bearing Based on RF-LSTM
收藏 引用
2021 CAA Symposium on Fault Detection, Supervision, and Safety for Technical Processes, SAFEPROCESS 2021
作者: Li, Qiuting Wang, Xiuqing Yang, Yunpeng Wang, Ruiyi Lv, Feng Hebei Normal University College of Computer and Cyber Security Shijiazhuang050024 China Hebei Provincial Key Laboratory of Network & Information Security Shijiazhuang China Hebei Provincial Engineering Research Center for Supply Chain Big Data Analytics & Data Security Shijiazhuang China
In the era of big data, it is of great significance to study data-driven fault diagnostic methods for equipment in complex industrial environments. In this paper, a data-driven fault diagnostic method for rolling bear... 详细信息
来源: 评论
MGRR-SQL: Multi-Granularity Relevant Retrieval-Based in-Context Learning Approach for Text-to-SQL Generation
MGRR-SQL: Multi-Granularity Relevant Retrieval-Based in-Cont...
收藏 引用
Advanced Algorithms and Control Engineering (ICAACE), International Conference on
作者: Yiming Zhan Zhao Li Tong Chen Shiwei Wu Yang Li Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Shandong Evay Info Technology Co. Ltd. Jinan China School of Cyberspace Security (School of Cryptology) Hainan University Haikou China
In-Context learning serves as a vital component for enhancing Text-to-SQL task performance. However, current in-context learning methodologies for Text-to-SQL applications fail to sufficiently bridge the significant c... 详细信息
来源: 评论