咨询与建议

限定检索结果

文献类型

  • 1,675 篇 会议
  • 1,145 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,824 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,879 篇 工学
    • 1,428 篇 计算机科学与技术...
    • 1,155 篇 软件工程
    • 511 篇 信息与通信工程
    • 213 篇 电气工程
    • 203 篇 控制科学与工程
    • 171 篇 生物工程
    • 160 篇 电子科学与技术(可...
    • 152 篇 网络空间安全
    • 127 篇 机械工程
    • 73 篇 光学工程
    • 72 篇 仪器科学与技术
    • 71 篇 生物医学工程(可授...
    • 59 篇 安全科学与工程
    • 55 篇 交通运输工程
    • 42 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 807 篇 理学
    • 509 篇 数学
    • 181 篇 生物学
    • 155 篇 物理学
    • 147 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 44 篇 化学
  • 465 篇 管理学
    • 282 篇 管理科学与工程(可...
    • 207 篇 图书情报与档案管...
    • 92 篇 工商管理
  • 102 篇 法学
    • 60 篇 社会学
    • 44 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 31 篇 军事学
  • 18 篇 农学
  • 14 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 126 篇 feature extracti...
  • 104 篇 semantics
  • 88 篇 accuracy
  • 85 篇 training
  • 77 篇 cryptography
  • 75 篇 computational mo...
  • 68 篇 authentication
  • 66 篇 security
  • 62 篇 federated learni...
  • 62 篇 privacy
  • 60 篇 deep learning
  • 55 篇 data models
  • 48 篇 object detection
  • 47 篇 protocols
  • 45 篇 information secu...
  • 42 篇 neural networks
  • 38 篇 robustness
  • 37 篇 visualization
  • 36 篇 convolution
  • 36 篇 optimization

机构

  • 225 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 56 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 52 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 37 篇 shandong provinc...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 28 篇 qilu university ...
  • 28 篇 college of compu...
  • 27 篇 college of compu...
  • 26 篇 pca lab key lab ...
  • 24 篇 shandong provinc...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 73 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 23 篇 ma jianfeng
  • 23 篇 xie jin
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 li xianxian
  • 20 篇 xiaoming wu
  • 20 篇 li hui
  • 20 篇 liu ximeng
  • 19 篇 zhixin li
  • 18 篇 xianxian li
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 16 篇 zhang yuqing
  • 16 篇 zhang shichao

语言

  • 2,567 篇 英文
  • 164 篇 其他
  • 97 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2824 条 记 录,以下是721-730 订阅
排序:
Optimization Strategy for Remote Differential Upgrade of IoT Firmware
Optimization Strategy for Remote Differential Upgrade of IoT...
收藏 引用
IEEE Joint International information Technology and Artificial Intelligence Conference (ITAIC)
作者: Wenkang Ding Ruirui Sun Qinglong Meng Zhong Wan Guanghe Cheng Huijuan Hao Jinqiang Bai Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
With the continuous increase of IoT devices, the management and optimization of devices become particularly important. The update cycle of device functions is short, and in order to facilitate management and optimize ...
来源: 评论
NextSeg: Automatic COVID-19 Lung Infection Segmentation from CT Images Based on Next-ViT
NextSeg: Automatic COVID-19 Lung Infection Segmentation from...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Aimei Dong Ruixin Wang Xuening Zhang Jian Liu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
The spread of COVID-19 has brought great disaster to the world, and automatic segmentation of the infected region can help doctors make a quick diagnosis and reduce workload. However, automatic segmentation of infecte... 详细信息
来源: 评论
Non-aligned Supervision for Real Image Dehazing
arXiv
收藏 引用
arXiv 2023年
作者: Fan, Junkai Guo, Fei Qian, Jianjun Li, Xiang Li, Jun Yang, Jian Key Lab of Intelligent Perception and Systems for HighDimensional Information of Ministry of Education Jiangsu Key Lab of Image and Video Understanding for Social Security PCA Lab School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing China College of Computer Science Nankai University Tianjin China
Removing haze from real-world images is challenging due to unpredictable weather conditions, resulting in the misalignment of hazy and clear image pairs. In this paper, we propose an innovative dehazing framework that... 详细信息
来源: 评论
Research on Classroom Behavior Target Detection Algorithm based on YOLOv7
Research on Classroom Behavior Target Detection Algorithm ba...
收藏 引用
IEEE Advanced information Management,Communicates,Electronic and Automation Control Conference (IMCEC)
作者: Wenke Qiu Xiaoming Wu Xiangzhi Liu Computer Science and Qilu University of Technology (Shandong Academy of Sciences) Jinan ShanDong China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
The integration of video information for the purpose of detecting students’ behavior in the classroom, with the aim of enhancing teaching efficiency and maintaining a stable classroom environment, offers significant ... 详细信息
来源: 评论
Uncertainty-Guided Diffusion Model for Camouflaged Object Detection
收藏 引用
IEEE Transactions on Multimedia 2025年
作者: Yang, Jinsheng Zhong, Bineng Liang, Qihua Mo, Zhiyi Zhang, Shengping Song, Shuxiang Guangxi Normal University Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guilin541004 China Guangxi Normal University Guangxi Key Lab of Multi-Source Information Mining & Security China Wuzhou University Guangxi Key Laboratory of Machine Vision and Intelligent Control Wuzhou543002 China Harbin Institute of Technology School of Computer Science and Technology Weihai264209 China
Recently, diffusion models have significantly improved the performance of Camouflaged Object Detection (COD) by adding noise to a mask and iteratively denoising it to match the target distributions. Due to the direct ... 详细信息
来源: 评论
CA-STCNN: An Attention-based Hybrid Deep Learning Model for Encrypted Traffic Classification
CA-STCNN: An Attention-based Hybrid Deep Learning Model for ...
收藏 引用
Asia-Pacific network Operations and Management Symposium (APNOMS)
作者: Hongyang Sun Huiling Shi Lei Zhang Lei Huang Wei Zhang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
With the increasing trend of network traffic encryption, both normal and abnormal traffic have begun to utilize encryption techniques to conceal their behavior, making accurate identification of encrypted traffic an e...
来源: 评论
RLGNN: Robust Graph Neural networks with Noisy label Learning
RLGNN: Robust Graph Neural Networks with Noisy Label Learnin...
收藏 引用
International Symposium on Parallel and Distributed Processing with Applications, ISPA
作者: Haodong Qian De Li Qiyu Li Jinyan Wang Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guangxi Normal University Guilin China Guangxi Key Lab of Multi-Source Information Mining and Security Guangxi Normal University Guilin China School of Computer Science and Engineering Guangxi Normal University Guilin China
Graph Neural networks (GNNs) have become a powerful tool for processing graph-structured data. However, real-world data often faces the problem of label noise and sparsity, which will greatly affect the application of... 详细信息
来源: 评论
FedISMH: Federated Learning Via Inference Similarity for Model Heterogeneous
FedISMH: Federated Learning Via Inference Similarity for Mod...
收藏 引用
IEEE International Conference on Big Data
作者: Yongdong Li Li-e Wang Zhigang Sun Xianxian Li Hengtong Chang Jinke Xu Caiyi Lin School of Computer Science and Engineering Guangxi Normal University Guilin China Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guangxi Normal University Guilin China Guangxi Key Lab of Multi-Source Information Mining and Security Guangxi Normal University Guilin China
Federated Learning (FL) is a privacy-preserving machine learning paradigm, enabling decentralized devices to collaboratively train models without sharing local data. Traditional FL approaches, however, rely on averagi... 详细信息
来源: 评论
BS-YOLOv5s: Insulator Defect Detection with Attention Mechanism and Multi-Scale Fusion
BS-YOLOv5s: Insulator Defect Detection with Attention Mechan...
收藏 引用
IEEE International Conference on Image Processing
作者: Zengbin Zhang Guohua Lv Guixin Zhao Yi Zhai Jinyong Cheng Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
With the rapid development of deep learning, the use of object detection algorithms for aerial insulator image defect detection has become the main way. To address the problems of low detection accuracy for small targ...
来源: 评论
A Multiple-Image Authentication Method Based on Phase-Only Hologram and Logistic Map
SSRN
收藏 引用
SSRN 2024年
作者: Liansheng, Sui Zishan, Jiang Haiwei, Lu Zhaolin, Xiao Tianyu, Zeng School of Computer Science and Engineering Xi’an University of Technology Xi’an710048 China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an710048 China Hebei Normal University Shijiazhuang050024 China Hebei Provincial Key Laboratory of Information Fusion and Intelligent Control Shijiazhuang050024 China
An interesting security method for multiple-image authentication scheme is proposed based on computer-generated holograms and logistic map. First, each original image is encoded as the complex-valued hologram under th... 详细信息
来源: 评论