咨询与建议

限定检索结果

文献类型

  • 1,675 篇 会议
  • 1,145 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,824 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,879 篇 工学
    • 1,428 篇 计算机科学与技术...
    • 1,155 篇 软件工程
    • 511 篇 信息与通信工程
    • 213 篇 电气工程
    • 203 篇 控制科学与工程
    • 171 篇 生物工程
    • 160 篇 电子科学与技术(可...
    • 152 篇 网络空间安全
    • 127 篇 机械工程
    • 73 篇 光学工程
    • 72 篇 仪器科学与技术
    • 71 篇 生物医学工程(可授...
    • 59 篇 安全科学与工程
    • 55 篇 交通运输工程
    • 42 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 807 篇 理学
    • 509 篇 数学
    • 181 篇 生物学
    • 155 篇 物理学
    • 147 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 44 篇 化学
  • 465 篇 管理学
    • 282 篇 管理科学与工程(可...
    • 207 篇 图书情报与档案管...
    • 92 篇 工商管理
  • 102 篇 法学
    • 60 篇 社会学
    • 44 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 31 篇 军事学
  • 18 篇 农学
  • 14 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 126 篇 feature extracti...
  • 104 篇 semantics
  • 88 篇 accuracy
  • 85 篇 training
  • 77 篇 cryptography
  • 75 篇 computational mo...
  • 68 篇 authentication
  • 66 篇 security
  • 62 篇 federated learni...
  • 62 篇 privacy
  • 60 篇 deep learning
  • 55 篇 data models
  • 48 篇 object detection
  • 47 篇 protocols
  • 45 篇 information secu...
  • 42 篇 neural networks
  • 38 篇 robustness
  • 37 篇 visualization
  • 36 篇 convolution
  • 36 篇 optimization

机构

  • 225 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 56 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 52 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 37 篇 shandong provinc...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 28 篇 qilu university ...
  • 28 篇 college of compu...
  • 27 篇 college of compu...
  • 26 篇 pca lab key lab ...
  • 24 篇 shandong provinc...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 73 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 23 篇 ma jianfeng
  • 23 篇 xie jin
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 li xianxian
  • 20 篇 xiaoming wu
  • 20 篇 li hui
  • 20 篇 liu ximeng
  • 19 篇 zhixin li
  • 18 篇 xianxian li
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 16 篇 zhang yuqing
  • 16 篇 zhang shichao

语言

  • 2,567 篇 英文
  • 164 篇 其他
  • 97 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2824 条 记 录,以下是741-750 订阅
排序:
Weighted Adversarial Transfer network-Based Fault Diagnosis Method for Gearboxes
Weighted Adversarial Transfer Network-Based Fault Diagnosis ...
收藏 引用
IEEE Joint International information Technology and Artificial Intelligence Conference (ITAIC)
作者: Dan Wang Qinglong Meng Huijuan Hao Guanghe Cheng Yongwei Tang Jinqiang Bai Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
In this paper, we address the issue of gearbox fault diagnosis under changing working conditions and the limitations of migration learning algorithms that are only applicable to scenarios with identical labels in both...
来源: 评论
Job2Vec: A Self-Supervised Contrastive Learning Based HPC Job Power Consumption Prediction Framework
Job2Vec: A Self-Supervised Contrastive Learning Based HPC Jo...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Jie Zhang Jian Song Xiang Li Xuesen Tian Zhigang Zhao Lu Wu Chunxiao Wang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
In the context of the rapid development of big data and artificial intelligence, the field of HPC is facing significant challenges in energy consumption. To address this challenge, this paper proposes a power consumpt...
来源: 评论
Inserting anybody in diffusion models via celeb basis  23
Inserting anybody in diffusion models via celeb basis
收藏 引用
Proceedings of the 37th International Conference on Neural information Processing Systems
作者: Ge Yuan Xiaodong Cun Yong Zhang Maomao Li Chenyang Qi Xintao Wang Ying Shan Huicheng Zheng School of Computer Science and Engineering Sun Yat-sen University and Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China and Guangdong Key Laboratory of Information Security Technology and Tencent AI Lab Tencent AI Lab The Hong Kong University of Science and Technology School of Computer Science and Engineering Sun Yat-sen University and Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China and Guangdong Key Laboratory of Information Security Technology
Exquisite demand exists for customizing the pretrained large text-to-image model, e.g. Stable Diffusion, to generate innovative concepts, such as the users themselves. However, the newly-added concept from previous cu...
来源: 评论
Planning with Learned Dynamic Model for Unsupervised Point Cloud Registration  30
Planning with Learned Dynamic Model for Unsupervised Point C...
收藏 引用
30th International Joint Conference on Artificial Intelligence, IJCAI 2021
作者: Jiang, Haobo Qian, Jianjun Xie, Jin Yang, Jian PCA Lab Key Lab of Intelligent Perception and Systems for High-Dimensional Information Ministry of Education Jiangsu Key Lab of Image and Video Understanding for Social Security School of Computer Science and Engineering Nanjing University of Science and Technology China
Point cloud registration is a fundamental problem in 3D computer vision. In this paper, we cast point cloud registration into a planning problem in reinforcement learning, which can seek the transformation between the... 详细信息
来源: 评论
Cluster Caching Strategy Based on User Characteristics in Edge networks
Cluster Caching Strategy Based on User Characteristics in Ed...
收藏 引用
Asia-Pacific network Operations and Management Symposium (APNOMS)
作者: Ye Zhang Wei Zhang Hao Hao Kai Zhang Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Key Laboratory of Computing Power Network and Information Security Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
To meet the growing traffic demand and relieve the pressure on the core network, edge caching and device-to-device (D2D) communication are used in next generation mobile networks. In this paper, based on a three-way c...
来源: 评论
Boosting Adverse Weather Crowd Counting via Multi-queue Contrastive Learning
arXiv
收藏 引用
arXiv 2024年
作者: Pan, Tianhang Jia, Xiuyi School of Computer Science and Engineering Nanjing University of Science and Technology Jiangsu Nanjing210094 China Guangxi Key Lab of Multi-source Information Mining & Security Guangxi Normal University Guangxi Guilin541004 China
Currently, most crowd counting methods have outstanding performance under normal weather conditions. However, they often struggle to maintain their performance in extreme and adverse weather conditions due to signific... 详细信息
来源: 评论
Image-Text Retrieval with Intra-Modal Soft labels
SSRN
收藏 引用
SSRN 2022年
作者: Liu, Haoliang Zhang, Yu School of Computer Science and Engineering The Key Lab of Computer Network and Information Integration Ministry of Education Southeast University Nanjing211189 China
Image-text retrieval seeks to find relevant images from a huge image corpus given a textual description, and vice versa. The critical challenge of this task is to well learn image-text alignments to measure the image-...
来源: 评论
D4A: An efficient and effective defense across agnostic adversarial attacks
收藏 引用
Neural networks 2025年 183卷 106938页
作者: Li, Xianxian Gan, Zeming Bai, Yan Su, Linlin Li, De Wang, Jinyan Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guangxi Normal University Guilin China Guangxi Key Lab of Multi-source Information Mining and Security Guangxi Normal University Guilin China School of Computer Science and Engineering Guangxi Normal University Guilin China School of Engineering and Technology University of Washington Tacoma TacomaWA United States
Recent studies show that Graph Neural networks (GNNs) are vulnerable to structure adversarial attacks, which draws attention to adversarial defenses in graph data. Previous defenses designed heuristic defense strategi... 详细信息
来源: 评论
UAV-RIS-Aided Energy-Efficient and QoS-Aware Emergency Communications Based on DRL  100
UAV-RIS-Aided Energy-Efficient and QoS-Aware Emergency Commu...
收藏 引用
100th IEEE Vehicular Technology Conference, VTC 2024-Fall
作者: Hu, Jiawei Ju, Ying Wang, Haoyu Liu, Lei Pei, Qingqi Shee, Y.G. Zhu, Xiaojie Wu, Celimuge University of California Department of Electrical Engineering and Computer Science IrvineCA92697 United States Xidian University Guangzhou Institute of Technology Guangzhou510555 China Xi'an University of Posts Telecommunications Shaanxi Key Laboratory of Information Communication Network and Security Xi'an710121 China Universiti Tunku Abdul Rahman Department of Electrical and Electronic Engineering Kajang43000 Malaysia King Abdullah University of Science and Technology Department of Computer Electrical and Mathematical Sciences and Engineering Thuwal239556900 Saudi Arabia The University of Electro-Communications Graduate School of Informatics and Engineering Tokyo182-8585 Japan
Ensuring reliable communication can be incredibly challenging in emergencies due to the breakdown of conventional infrastructure. However, a promising solution is on the horizon: the integration of reconfigurable inte... 详细信息
来源: 评论
Image-Text Matching with Intra-Modal Knowledge
SSRN
收藏 引用
SSRN 2022年
作者: Liu, Haoliang Zhang, Yu School of Computer Science and Engineering The Key Lab of Computer Network and Information Integration Ministry of Education Southeast University Nanjing211189 China
In this paper, we study the problem of image-text matching. Image-text matching aims to train an model that learns to identify whether or not an (image, caption) input pair constitutes an aligned pair. To boost image-... 详细信息
来源: 评论