咨询与建议

限定检索结果

文献类型

  • 1,719 篇 会议
  • 1,134 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,857 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,864 篇 工学
    • 1,414 篇 计算机科学与技术...
    • 1,137 篇 软件工程
    • 502 篇 信息与通信工程
    • 214 篇 电气工程
    • 204 篇 控制科学与工程
    • 171 篇 生物工程
    • 161 篇 电子科学与技术(可...
    • 150 篇 网络空间安全
    • 127 篇 机械工程
    • 72 篇 仪器科学与技术
    • 71 篇 光学工程
    • 70 篇 生物医学工程(可授...
    • 59 篇 安全科学与工程
    • 54 篇 交通运输工程
    • 44 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 809 篇 理学
    • 509 篇 数学
    • 181 篇 生物学
    • 157 篇 物理学
    • 148 篇 统计学(可授理学、...
    • 93 篇 系统科学
    • 46 篇 化学
  • 461 篇 管理学
    • 282 篇 管理科学与工程(可...
    • 202 篇 图书情报与档案管...
    • 92 篇 工商管理
  • 100 篇 法学
    • 60 篇 社会学
    • 42 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 36 篇 经济学
    • 36 篇 应用经济学
  • 30 篇 军事学
  • 18 篇 农学
  • 14 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 137 篇 feature extracti...
  • 114 篇 accuracy
  • 109 篇 semantics
  • 94 篇 training
  • 89 篇 federated learni...
  • 88 篇 computational mo...
  • 77 篇 cryptography
  • 70 篇 privacy
  • 69 篇 authentication
  • 68 篇 security
  • 61 篇 data models
  • 60 篇 deep learning
  • 50 篇 object detection
  • 49 篇 robustness
  • 48 篇 protocols
  • 45 篇 information secu...
  • 44 篇 neural networks
  • 44 篇 optimization
  • 41 篇 transformers
  • 41 篇 adaptation model...

机构

  • 263 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 65 篇 guangxi key lab ...
  • 65 篇 shandong provinc...
  • 57 篇 guangxi key lab ...
  • 54 篇 key lab of infor...
  • 51 篇 shandong enginee...
  • 49 篇 shandong fundame...
  • 42 篇 school of comput...
  • 39 篇 school of cyber ...
  • 32 篇 shandong provinc...
  • 30 篇 college of compu...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 27 篇 college of compu...
  • 27 篇 qilu university ...
  • 27 篇 pca lab key lab ...
  • 22 篇 peng cheng labor...
  • 22 篇 shandong fundame...

作者

  • 72 篇 yang jian
  • 31 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 24 篇 xiaoming wu
  • 24 篇 xie jin
  • 22 篇 ma jianfeng
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 liu ximeng
  • 21 篇 li xianxian
  • 20 篇 zhixin li
  • 20 篇 li hui
  • 19 篇 xianxian li
  • 18 篇 xiangzhi liu
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 16 篇 zhang yuqing

语言

  • 2,479 篇 英文
  • 298 篇 其他
  • 85 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2857 条 记 录,以下是661-670 订阅
排序:
Towards HDR and HFR Video from Rolling-Mixed-Bit Spikings
Towards HDR and HFR Video from Rolling-Mixed-Bit Spikings
收藏 引用
Conference on computer Vision and Pattern Recognition (CVPR)
作者: Yakun Chang Yeliduosi Xiaokaiti Yujia Liu Bin Fan Zhaojun Huang Tiejun Huang Boxin Shi Institute of Information Science School of Computer Science Beijing Jiaotong University Beijing Key Laboratory of Advanced Information Science and Network Technology National Key Laboratory for Multimedia Information Processing School of Computer Science Peking University National Engineering Research Center of Visual Technology School of Computer Science Peking University National Key Lab of General AI School of Intelligence Science and Technology Peking University
The spiking cameras offer the benefits of high dynamic range (HDR), high temporal resolution, and low data redundancy. However, reconstructing HDR videos in high-speed conditions using single-bit spikings presents cha... 详细信息
来源: 评论
Social-enhanced recommendation using graph-based contrastive learning  25
Social-enhanced recommendation using graph-based contrastive...
收藏 引用
25th IEEE International Conferences on High Performance Computing and Communications, 9th International Conference on Data Science and Systems, 21st IEEE International Conference on Smart City and 9th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC/DSS/SmartCity/DependSys 2023
作者: Xue, Peng Gao, Qian Fan, Jun Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Shandong Jinan250014 China Qilu University of Technology Shandong Academy of Sciences Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Shandong Jinan250353 China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Shandong Jinan250014 China China Telecom Digital Intelligence Techonology Co Ltd Shandong Jinan250101 China
The social network-based recommendation model use social network information to mitigate data sparsity issues and improve the accuracy of recommendation models. However, In most social network-based recommendation alg... 详细信息
来源: 评论
A Legal Judgment Prediction Model Based on BERT, Attention, and Graph Convolutional network
A Legal Judgment Prediction Model Based on BERT, Attention, ...
收藏 引用
International Conference on Tools for Artificial Intelligence (ICTAI)
作者: Binxia Yang Guibin Chen Xudong Luo School of Computer Science and Engineering Guangxi Normal University Guilin Guangxi China Key Lab of Education Blockchain and Intelligent Technology of Ministry of Education Guilin Guangxi China Guangxi Key Lab of Multi-Source Information Mining & Security Guilin Guangxi China
Legal judgment prediction is one of essential tasks in legal practice. However, most existing models of legal judgment prediction struggle with long documents due to limitations in position encoding and pre-trained la... 详细信息
来源: 评论
Outlier Detection in Eigenvalue Spaces Based on Spectral Analysis of KNN Graphs
SSRN
收藏 引用
SSRN 2023年
作者: Li, Jia Wang, Chenxu Wang, Xiaochun Wang, Xiali School of Software Engineering Xi’an Jiaotong University Xi’an710049 China MOE Key Lab of Intelligent Network and Network Security Xi’an Jiaotong University China Department of Computer Science Chang’an University Xi’an China
Outlier detection is a critical method in data mining as it has a wide range of practical use in various fields. Spectral clustering has attracted much attention for its advantage of coping with the curse of dimension... 详细信息
来源: 评论
ASDIA: An Adversarial Sample to Preserve Privacy Program in Federated Learning
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Tian, Shujuan Tan, Yi Wang, Han Liu, Haolin Li, Zhetao Xiangtan University School of Computer Science School of Cyberspace Security Xiangtan China Xiangtan University Hunan International Scientific and Technological Cooperation Base of Intelligent network Xiangtan411105 China Xiangtan University Key Laboratory of Hunan Province for Internet of Things and Information Security Xiangtan411105 China Department of Electrical Engineering and Computer Science University of Kansas 1520 W 15th St LawrenceKS United States Jinan University College of Information Science and Technology Guangzhou510632 China
Federated learning enables training across multiple entities while ensuring data security and the effectiveness of knowledge dissemination. Despite its benefits, it remains susceptible to privacy breaches by both exte... 详细信息
来源: 评论
A Real-time Cutting Model Based on Finite Element and Order Reduction
收藏 引用
computer Systems Science & Engineering 2022年 第10期43卷 1-15页
作者: Xiaorui Zhang Wenzheng Zhang Wei Sun Hailun Wu Aiguo Song Sunil Kumar Jha Wuxi Research Institute Nanjing University of Information Science&TechnologyWuxi214100China Engineering Research Center of Digital Forensics Ministry of EducationJiangsu Engineering Center of Network MonitoringSchool of Computer and SoftwareNanjing University of Information Science&TechnologyNanjing210044China School of Automation Nanjing University of Information Science&TechnologyNanjing210044China State Key Laboratory of Bioelectronics Jiangsu Key Lab of Remote Measurement and ControlSchool of Instrument Science and EngineeringSoutheast UniversityNanjing210096China IT Fundamentals and Education Technologies Applications University of Information Technology and Management in RzeszowRzeszow Voivodeship100031Poland
Telemedicine plays an important role in Corona Virus Disease 2019(COVID-19).The virtual surgery simulation system,as a key component in telemedicine,requires to compute in ***,this paper proposes a realtime cutting mo... 详细信息
来源: 评论
A High-Dimensional Temporal Data Publishing Method Based on Dynamic Bayesian networks and Differential Privacy
A High-Dimensional Temporal Data Publishing Method Based on ...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Yaxin Wang Zhen Zhang Heng Qian Yongchao Gao Qiuyue Wang Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Massive high-dimensional data generated by the Internet typically contains sensitive privacy information. Protecting data privacy while maintaining utility has become a pressing challenge. We propose a novel high-dime... 详细信息
来源: 评论
Grouped Federated Meta-Learning for Privacy-Preserving Rare Disease Diagnosis
Grouped Federated Meta-Learning for Privacy-Preserving Rare ...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Xinru Song Feng Wu Zongchao Xie Longxiang Gao Lei Cui Youyang Qu Shujun Gu Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China School of Computer Science University of Technology Sydney Australia Faculty of Science University of Melbourne Australia
Federated learning (FL) has been widely applied in medical field, which allows clients to collaboratively train global models without sharing local data. Nevertheless, the diversity and scarcity of samples from rare d... 详细信息
来源: 评论
Fault Diagnosis for Rolling Bearing Based on RF-LSTM
Fault Diagnosis for Rolling Bearing Based on RF-LSTM
收藏 引用
2021 CAA Symposium on Fault Detection, Supervision, and Safety for Technical Processes, SAFEPROCESS 2021
作者: Li, Qiuting Wang, Xiuqing Yang, Yunpeng Wang, Ruiyi Lv, Feng Hebei Normal University College of Computer and Cyber Security Shijiazhuang050024 China Hebei Provincial Key Laboratory of Network & Information Security Shijiazhuang China Hebei Provincial Engineering Research Center for Supply Chain Big Data Analytics & Data Security Shijiazhuang China
In the era of big data, it is of great significance to study data-driven fault diagnostic methods for equipment in complex industrial environments. In this paper, a data-driven fault diagnostic method for rolling bear... 详细信息
来源: 评论
RobustPFL: Robust Personalized Federated Learning
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Chen, Guorong Wang, Wei Wu, Yufang Li, Chao Xu, Guangquan Ji, Shouling Li, Tao Shen, Meng Han, Yufei Xi'an Jiaotong University Ministry of Education Key Lab for Intelligent Networks and Network Security Xi'an China Beijing Jiaotong University 3 Shangyuancun Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing100044 China Tianjin University Tianjin Key Laboratory of Advanced Networking College of Intelligence and Computing Tianjin300350 China Zhejiang University College of Computer Science and Technology Hangzhou310027 China ITAI Haihe Lab Tianjin China Nankai University College of Computer Science Tianjin300350 China Beijing Institute of Technology School of Cyberspace Security Beijing100081 China Peng Cheng Laboratory Cyberspace Security Research Center Shenzhen518066 China INRIA Bretagne Rennes35042 France
Conventional federated learning (FL) coordinated by a central server focuses on training a global model and protecting the privacy of clients' training data by storing it locally. However, the statistical heteroge... 详细信息
来源: 评论