咨询与建议

限定检索结果

文献类型

  • 1,675 篇 会议
  • 1,145 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,824 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,879 篇 工学
    • 1,428 篇 计算机科学与技术...
    • 1,155 篇 软件工程
    • 511 篇 信息与通信工程
    • 213 篇 电气工程
    • 203 篇 控制科学与工程
    • 171 篇 生物工程
    • 160 篇 电子科学与技术(可...
    • 152 篇 网络空间安全
    • 127 篇 机械工程
    • 73 篇 光学工程
    • 72 篇 仪器科学与技术
    • 71 篇 生物医学工程(可授...
    • 59 篇 安全科学与工程
    • 55 篇 交通运输工程
    • 42 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 807 篇 理学
    • 509 篇 数学
    • 181 篇 生物学
    • 155 篇 物理学
    • 147 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 44 篇 化学
  • 465 篇 管理学
    • 282 篇 管理科学与工程(可...
    • 207 篇 图书情报与档案管...
    • 92 篇 工商管理
  • 102 篇 法学
    • 60 篇 社会学
    • 44 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 31 篇 军事学
  • 18 篇 农学
  • 14 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 126 篇 feature extracti...
  • 104 篇 semantics
  • 88 篇 accuracy
  • 85 篇 training
  • 77 篇 cryptography
  • 75 篇 computational mo...
  • 68 篇 authentication
  • 66 篇 security
  • 62 篇 federated learni...
  • 62 篇 privacy
  • 60 篇 deep learning
  • 55 篇 data models
  • 48 篇 object detection
  • 47 篇 protocols
  • 45 篇 information secu...
  • 42 篇 neural networks
  • 38 篇 robustness
  • 37 篇 visualization
  • 36 篇 convolution
  • 36 篇 optimization

机构

  • 225 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 56 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 52 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 37 篇 shandong provinc...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 28 篇 qilu university ...
  • 28 篇 college of compu...
  • 27 篇 college of compu...
  • 26 篇 pca lab key lab ...
  • 24 篇 shandong provinc...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 73 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 23 篇 ma jianfeng
  • 23 篇 xie jin
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 li xianxian
  • 20 篇 xiaoming wu
  • 20 篇 li hui
  • 20 篇 liu ximeng
  • 19 篇 zhixin li
  • 18 篇 xianxian li
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 16 篇 zhang yuqing
  • 16 篇 zhang shichao

语言

  • 2,567 篇 英文
  • 164 篇 其他
  • 97 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2824 条 记 录,以下是681-690 订阅
排序:
A Revocable Pairing-Free Certificateless Signature Scheme Based on RSA Accumulator
A Revocable Pairing-Free Certificateless Signature Scheme Ba...
收藏 引用
IEEE International Conference on Trust, security and Privacy in Computing and Communications (TrustCom)
作者: Zhuowei Shen Xiao Kou Taiyao Yang Haoqin Xu Dongbin Wang Shaobo Niu School of Cyber Science and Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Intergration Minster of Education Nanjing China School of Cyberspace Security Beijing University of Post and Telecommunications Beijing China Engineering Research Center of Blockchain and Network Convergence Technology Ministry of Education Beijing China
Certificateless public key cryptography (CL-PKC) has garnered significant attention in recent years due to its ability to address the complex certificate management requirements inherent in public key infrastructure (... 详细信息
来源: 评论
Multiplex Graph Representation Learning with Homophily and Consistency  39
Multiplex Graph Representation Learning with Homophily and C...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Huang, Yudi Nie, Ci He, Hongqing Mo, Yujie Zhu, Yonghua Wen, Guoqiu Zhu, Xiaofeng Guangxi Key Lab of Multisource Information Mining Security Guangxi Normal University Guilin China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China Information Systems Technology Design Pillar Singapore University of Technology and Design Singapore
Although unsupervised multiplex graph representation learning (UMGRL) has been a hot research topic, existing UMGRL methods still has limitations to be addressed. For example, previous works either preserve structural... 详细信息
来源: 评论
Structure Flow-Guided network for Real Depth Super-Resolution
arXiv
收藏 引用
arXiv 2023年
作者: Yuan, Jiayi Jiang, Haobo Li, Xiang Qian, Jianjun Li, Jun Yang, Jian PCA Lab Key Lab of Intelligent Perception and Systems for High-Dimensional Information Ministry of Education Jiangsu Key Lab of Image and Video Understanding for Social Security School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing China
Real depth super-resolution (DSR), unlike synthetic settings, is a challenging task due to the structural distortion and the edge noise caused by the natural degradation in real-world low-resolution (LR) depth maps. T... 详细信息
来源: 评论
Autoencoder-Based Latent Block-Diagonal Representation for Subspace Clustering
收藏 引用
IEEE Transactions on Cybernetics 2022年 第6期52卷 5408-5418页
作者: Xu, Yesong Chen, Shuo Li, Jun Han, Zongyan Yang, Jian Nanjing University of Science and Technology PCA Laboratory Key Lab. of Intelligent Percept. and Syst. for High-Dimensional Information of Ministry of Education Nanjing210094 China Nanjing University of Science and Technology Jiangsu Key Laboratory of Image and Video Understanding for Social Security School of Computer Science and Engineering Nanjing210094 China RIKEN Center for Advanced Intelligence Project Tokyo103-0027 Japan Nanjing University of Science and Technology School of Computer Science and Engineering Nanjing210094 China
Block-diagonal representation (BDR) is an effective subspace clustering method. The existing BDR methods usually obtain a self-expression coefficient matrix from the original features by a shallow linear model. Howeve... 详细信息
来源: 评论
CRS-Diff: Controllable Remote Sensing Image Generation with Diffusion Model
arXiv
收藏 引用
arXiv 2024年
作者: Tang, Datao Cao, Xiangyong Hou, Xingsong Jiang, Zhongyuan Liu, Junmin Meng, Deyu The School of Computer Science and Technology the Ministry of Education Key Lab for Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an710049 China The School of Information and Communications Engineering Xi’an Jiaotong University Shaanxi Xi’an710049 China The School of Cyber Engineering Xidian University Shaanxi Xi’an710049 China The School of Mathematics and Statistics the Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi’an Jiaotong University Shaanxi Xi’an710049 China Guangdong Guangzhou510555 China
The emergence of generative models has revolutionized the field of remote sensing (RS) image generation. Despite generating high-quality images, existing methods are limited in relying mainly on text control condition... 详细信息
来源: 评论
A Federated Learning network Intrusion Detection System for Multiple Imbalances
A Federated Learning Network Intrusion Detection System for ...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Yifan Zeng Peijia Zheng Jian Li School of Computer Science and Engineering Sun Yat-sen University Guangzhou China Yunnan Key Laboratory of Service Computing Yunnan University of Finance and Economics Kunming China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology (Shandong Academy of Sciences) Jinan China
Centralized training of deep learning-based network intrusion detection systems (DLNIDS) raises privacy concerns and incurs huge overhead. Federated learning (FL), while preserving privacy, confronts challenges includ... 详细信息
来源: 评论
Recurrent Structure Attention Guidance for Depth Super-Resolution
arXiv
收藏 引用
arXiv 2023年
作者: Yuan, Jiayi Jiang, Haobo Li, Xiang Qian, Jianjun Li, Jun Yang, Jian PCA Lab Key Lab of Intelligent Perception and Systems for High-Dimensional Information Ministry of Education Jiangsu Key Lab of Image and Video Understanding for Social Security School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing China
Image guidance is an effective strategy for depth super-resolution. Generally, most existing methods employ handcrafted operators to decompose the high-frequency (HF) and low-frequency (LF) ingredients from low-resolu... 详细信息
来源: 评论
New Identity Based Proxy Re-Encryption Scheme from Lattices
收藏 引用
China Communications 2019年 第10期16卷 174-190页
作者: Liqiang Wu Xiaoyuan Yang Minqing Zhang Longfei Liu Key Lab of Network and Information Security Engineering University of Chinese Armed Police ForceXi’an 710086China Key Lab of Computer Network and Information Security Xi Dian UniversityXi’an 710071China
Identity-Based Proxy Re-Encryption (IB-PRE) allows a semi-trusted proxy to convert the ciphertext encrypted under Alice’s identity into Bob’s ciphertext of the same message without leaking plaintext. Lattice-based c... 详细信息
来源: 评论
Wireless Powered Backscatter Communications with Spatially Random Tags
Wireless Powered Backscatter Communications with Spatially R...
收藏 引用
2023 IEEE/CIC International Conference on Communications in China, ICCC 2023
作者: Liu, Yingting Ye, Yinghui Li, Xingwang Ma, Zhongyu Zhou, Zhiyang Lanzhou Jiaotong University School of Electronic and Information Engineering Lanzhou730070 China State Grid Gansu Electric Power Research Institute Lanzhou730070 China Beijing University of Posts and Telecommunications School of Electronic Engineering Beijing100876 China Xi'an University of Posts & Telecommunications Shaanxi Key Laboratory of Information Communication Network and Security Xi'an710121 China Henan Polytechnic University School of Physics and Electronic Information Engineering Jiaozuo454000 China College of Computer Science and Engineering Northwest Normal University Lanzhou730070 China
In this paper, a wireless powered backscatter communication (BackCom) system is considered, which consists of one dedicated radio-frequency source node (S), one destination node and multiple tags randomly located in t... 详细信息
来源: 评论
On the MDS Condition of Generalized Expanded-Blaum-Roth Codes
On the MDS Condition of Generalized Expanded-Blaum-Roth Code...
收藏 引用
International Symposium on Problems of Redundancy in information and Control Systems (RED)
作者: Hanxu Hou Linqi Song Dongguan Key Lab of Artificial Information Network School of Electrical Engineering & Intelligentization Dongguan University of Technology Department of Computer Science City University of Hong Kong
Generalized Expanded-Blaum-Roth (GEBR) codes [You et al. 2020] are designed for large-scale distributed storage systems that have larger recoverability for single-symbol failures, multi-column failures and multi-row f...
来源: 评论