咨询与建议

限定检索结果

文献类型

  • 1,675 篇 会议
  • 1,145 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,824 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,879 篇 工学
    • 1,428 篇 计算机科学与技术...
    • 1,155 篇 软件工程
    • 511 篇 信息与通信工程
    • 213 篇 电气工程
    • 203 篇 控制科学与工程
    • 171 篇 生物工程
    • 160 篇 电子科学与技术(可...
    • 152 篇 网络空间安全
    • 127 篇 机械工程
    • 73 篇 光学工程
    • 72 篇 仪器科学与技术
    • 71 篇 生物医学工程(可授...
    • 59 篇 安全科学与工程
    • 55 篇 交通运输工程
    • 42 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 807 篇 理学
    • 509 篇 数学
    • 181 篇 生物学
    • 155 篇 物理学
    • 147 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 44 篇 化学
  • 465 篇 管理学
    • 282 篇 管理科学与工程(可...
    • 207 篇 图书情报与档案管...
    • 92 篇 工商管理
  • 102 篇 法学
    • 60 篇 社会学
    • 44 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 31 篇 军事学
  • 18 篇 农学
  • 14 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 126 篇 feature extracti...
  • 104 篇 semantics
  • 88 篇 accuracy
  • 85 篇 training
  • 77 篇 cryptography
  • 75 篇 computational mo...
  • 68 篇 authentication
  • 66 篇 security
  • 62 篇 federated learni...
  • 62 篇 privacy
  • 60 篇 deep learning
  • 55 篇 data models
  • 48 篇 object detection
  • 47 篇 protocols
  • 45 篇 information secu...
  • 42 篇 neural networks
  • 38 篇 robustness
  • 37 篇 visualization
  • 36 篇 convolution
  • 36 篇 optimization

机构

  • 225 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 56 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 52 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 37 篇 shandong provinc...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 28 篇 qilu university ...
  • 28 篇 college of compu...
  • 27 篇 college of compu...
  • 26 篇 pca lab key lab ...
  • 24 篇 shandong provinc...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 73 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 23 篇 ma jianfeng
  • 23 篇 xie jin
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 li xianxian
  • 20 篇 xiaoming wu
  • 20 篇 li hui
  • 20 篇 liu ximeng
  • 19 篇 zhixin li
  • 18 篇 xianxian li
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 16 篇 zhang yuqing
  • 16 篇 zhang shichao

语言

  • 2,567 篇 英文
  • 164 篇 其他
  • 97 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2824 条 记 录,以下是651-660 订阅
排序:
A Method of Shadowsocks(R) Traffic Identification Based on Protocol Analysis  21
A Method of Shadowsocks(R) Traffic Identification Based on P...
收藏 引用
21st IEEE International Conference on Communication Technology, ICCT 2021
作者: Luo, Jie Bao, Liang Ni, Lvlin The 30th Research Institute of China Electronics Technology Group Corporation Science and Technology on Communication Security Laboratory Sichuan Chengdu China The Third Research Institute of Ministry of Public Security Key Lab of Information Network Security of Ministry of Public Security Shanghai China
Shadowsocks (R) is a proxy software based on Socks5, which is the collective name of Shadowsocks and Shadowsocks (R). In order to improves the shortcomings of other softwares breaking internet censorship, Shadowsocks ... 详细信息
来源: 评论
Gradient-YOLO: Exploring the integration of gradient architecture into the YOLO network
Gradient-YOLO: Exploring the integration of gradient archite...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Gang Li Cheng Zhang Delong Han Letian Gao Mingle Zhou Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China SHANDONG SCICOM Information and Economy Research Institute Co. Ltd Jinan China
Object detection is an essential task in the field of computer vision. The one-stage object detection model directly completes object detection through a single forward propagation and has fast real-time object detect... 详细信息
来源: 评论
Energy Efficiency Optimization for RF Energy Harvesting Relay System  11th
Energy Efficiency Optimization for RF Energy Harvesting Rela...
收藏 引用
11th EAI International Conference on Broadband Communications, networks, and Systems, BROADNETS 2020
作者: Liang, Guangjun Xin, Jianfang Wang, Qun Xia, Lingling Li, Meng Department of Computer Information and Network Security Jiangsu Police Institute Nanjing China Jiangsu Provincial Public Security Department Key Laboratory of Digital Forensics Nanjing China Electrical Engineering School Anhui Polytechnic University Wuhu China
This paper conducts research on the RF energy harvesting relay network, and proposes an improved energy harvesting relay protocol, which allows the energy harvesting source node to retransmit data to improve the syste... 详细信息
来源: 评论
On accuracy rate of community detection and pairing in mobile social network
On accuracy rate of community detection and pairing in mobil...
收藏 引用
Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, UIC-ATC
作者: Jinbin Tu Qing Li Yun Wang School of Computer Science and Engineering Southeast University Key Lab of Computer Network and Information Integration Nanjing MOE China
Mobile Social network(MSN) is an opportunity network that considers the social attributes of nodes, and also uses the ”store-carry-forward” model to carry out data transfer between nodes. The community nature of nod...
来源: 评论
EeCA: A Novel Approach for Energy Conservation in MEC via NDN-Based Content Caching
EeCA: A Novel Approach for Energy Conservation in MEC via ND...
收藏 引用
Asia-Pacific network Operations and Management Symposium (APNOMS)
作者: Jiaxin Xu Huiling Shi Haoxiang Chu Wei Zhang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China
In the context of escalating demands on wireless networks owing to the widespread application of 5G and the Internet of Things (IoT), enhancing network performance and user experience through the convergence of Multi-...
来源: 评论
Long and Recent Preference Learning with Recent-k Items Distribution for Recommender System
收藏 引用
IEEE Transactions on Multimedia 2025年
作者: Gao, Yongbiao Niu, Sijie Lv, Guohua Ling, Miaogen Geng, Xin Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Jinan China Southeast University Ministry of Education Key Laboratory of New Generation Artificial Intelligence Technology and Its Interdisciplinary Application China University of Jinan Shandong Provincial Key Laboratory of Ubiquitous Intelligent Computing School of Information Science and Engineering China Nanjing University of Information Science and Technology School of Computer Science China Southeast University School of Computer Science and Engineering China
Reinforcement learning (RL) aims to formulate the recommendation task as a Markov decision process (MDP) and trains an agent to automatically learn the optimal recommendation policy from interaction trajectories throu... 详细信息
来源: 评论
Research on YOLOv7-tiny Improved Algorithm for Compli-ance Detection of Production Personnel Wearing
Research on YOLOv7-tiny Improved Algorithm for Compli-ance D...
收藏 引用
2023 International Conference on Communication network and Machine Learning, CNML 2023
作者: Shen, Qiao Huang, Hanming Wang, Pengfei Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guangxi Normal University Guangxi Guilin541004 China Guangxi Key Lab of Multi-Source Information Mining and Security Guangxi Normal University Guangxi Guilin541004 China School of Computer Science and Engineering Guangxi Normal University Guangxi Guilin541004 China Hunan Aerospace Industry General Corp Aircraft Technology Branch Hunan Changsha410006 China
Proposed is an improved production personnel wearing target detection algorithm based on YOLOv7, aiming to address the issues of false positives and false negatives caused by occlusion and detection of small to medium... 详细信息
来源: 评论
DRSC: Dual-Reweighted Siamese Contrastive Learning network for Cross-Domain Rotating Machinery Fault Diagnosis With Multi-Source Domain Imbalanced Data
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Bi, Yuanguo Fu, Rao Jiang, Cunyu Zhang, Xiaoling Li, Fengyun Zhao, Liang Han, Guangjie Northeastern University School of Computer Science and Engineering Shenyang110169 China Ministry of Education Engineering Research Center of Security Technology of Complex Network System Shenyang110169 China Shenyang University of Technology Institute of Artificial Intelligence Shenyang110870 China Shenyang Aerospace University School of Computer Science Shenyang110135 China Hohai University Key Laboratory of Maritime Intelligent Network Information Technology Ministry of Education China
To enhance the reliability of rotating machinery, cross-domain fault diagnosis becomes vital for detecting faults under unknown operating conditions. However, multi-source domain imbalanced data present significant ch... 详细信息
来源: 评论
Two-phase Unsourced Random Access in Massive MIMO: Performance Analysis and Approximate Message Passing Decoder
arXiv
收藏 引用
arXiv 2023年
作者: Jiang, Jia-Cheng Wang, Hui-Ming The School of Information and Communications Engineering Xi'an Jiaotong University Shaanxi Xi’an710049 China The Ministry of Education Key Lab for Intelligent Networks and Network Security Shaanxi Xi’an710049 China
In this paper, we design a novel two-phase unsourced random access (URA) scheme in massive multiple input multiple output (MIMO). In the first phase, we collect a sequence of information bits to jointly acquire the us... 详细信息
来源: 评论
Hey! You Photographed My Screen without Approved: A Practical Screen Content Protection Scheme Based on Visual Cryptography
Hey! You Photographed My Screen without Approved: A Practica...
收藏 引用
2022 International Conference on networking and network Applications, NaNA 2022
作者: Liu, Kui Wang, Bin Shi, Ziwei Chen, Jiadong Zhang, Zhiwei School of Computer Science and Technology Xidian University Shaanxi Xi’an710071 China Network and Information Security Laboratory Hangzhou Hikvision Digital Technology Co. LTD. Hangzhou China Zhejiang Key Laboratory of Multi-dimensional Perception Technology Application and Cybersecurity Hangzhou310053 China
Nowadays , with the continuous development of digital media, electronic screens have become the most direct tool for people to interact with information. Various styles of electronic screens provide vivid information ... 详细信息
来源: 评论