咨询与建议

限定检索结果

文献类型

  • 1,719 篇 会议
  • 1,140 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,863 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,863 篇 工学
    • 1,414 篇 计算机科学与技术...
    • 1,137 篇 软件工程
    • 502 篇 信息与通信工程
    • 214 篇 电气工程
    • 204 篇 控制科学与工程
    • 171 篇 生物工程
    • 161 篇 电子科学与技术(可...
    • 150 篇 网络空间安全
    • 127 篇 机械工程
    • 72 篇 仪器科学与技术
    • 71 篇 光学工程
    • 70 篇 生物医学工程(可授...
    • 59 篇 安全科学与工程
    • 54 篇 交通运输工程
    • 44 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 809 篇 理学
    • 508 篇 数学
    • 181 篇 生物学
    • 157 篇 物理学
    • 147 篇 统计学(可授理学、...
    • 93 篇 系统科学
    • 46 篇 化学
  • 461 篇 管理学
    • 282 篇 管理科学与工程(可...
    • 202 篇 图书情报与档案管...
    • 92 篇 工商管理
  • 100 篇 法学
    • 60 篇 社会学
    • 42 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 36 篇 经济学
    • 36 篇 应用经济学
  • 30 篇 军事学
  • 18 篇 农学
  • 14 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 137 篇 feature extracti...
  • 114 篇 accuracy
  • 109 篇 semantics
  • 95 篇 training
  • 89 篇 federated learni...
  • 88 篇 computational mo...
  • 77 篇 cryptography
  • 70 篇 privacy
  • 69 篇 authentication
  • 68 篇 security
  • 61 篇 data models
  • 60 篇 deep learning
  • 50 篇 object detection
  • 49 篇 robustness
  • 48 篇 protocols
  • 45 篇 information secu...
  • 44 篇 neural networks
  • 44 篇 optimization
  • 41 篇 transformers
  • 41 篇 adaptation model...

机构

  • 265 篇 key laboratory o...
  • 204 篇 shandong provinc...
  • 65 篇 guangxi key lab ...
  • 64 篇 shandong provinc...
  • 57 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 51 篇 shandong enginee...
  • 50 篇 shandong fundame...
  • 42 篇 school of comput...
  • 39 篇 school of cyber ...
  • 33 篇 shandong provinc...
  • 31 篇 college of compu...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 27 篇 college of compu...
  • 27 篇 qilu university ...
  • 26 篇 pca lab key lab ...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 72 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 24 篇 xiaoming wu
  • 23 篇 xie jin
  • 22 篇 ma jianfeng
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 liu ximeng
  • 21 篇 li xianxian
  • 20 篇 zhixin li
  • 20 篇 li hui
  • 19 篇 xianxian li
  • 18 篇 xiangzhi liu
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 16 篇 zhang yuqing

语言

  • 2,485 篇 英文
  • 298 篇 其他
  • 85 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2863 条 记 录,以下是771-780 订阅
排序:
BS-YOLOv5s: Insulator Defect Detection with Attention Mechanism and Multi-Scale Fusion
BS-YOLOv5s: Insulator Defect Detection with Attention Mechan...
收藏 引用
IEEE International Conference on Image Processing
作者: Zengbin Zhang Guohua Lv Guixin Zhao Yi Zhai Jinyong Cheng Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
With the rapid development of deep learning, the use of object detection algorithms for aerial insulator image defect detection has become the main way. To address the problems of low detection accuracy for small targ...
来源: 评论
A Multiple-Image Authentication Method Based on Phase-Only Hologram and Logistic Map
SSRN
收藏 引用
SSRN 2024年
作者: Liansheng, Sui Zishan, Jiang Haiwei, Lu Zhaolin, Xiao Tianyu, Zeng School of Computer Science and Engineering Xi’an University of Technology Xi’an710048 China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an710048 China Hebei Normal University Shijiazhuang050024 China Hebei Provincial Key Laboratory of Information Fusion and Intelligent Control Shijiazhuang050024 China
An interesting security method for multiple-image authentication scheme is proposed based on computer-generated holograms and logistic map. First, each original image is encoded as the complex-valued hologram under th... 详细信息
来源: 评论
CTI-JE: A Joint Extraction Framework of Entities and Relations in Unstructured Cyber Threat Intelligence
CTI-JE: A Joint Extraction Framework of Entities and Relatio...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Yang Liu Xiaohui Han Wenbo Zuo Haiqing Lv Jing Guo Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Quan Cheng Laboratory Jinan China Information Research Institute Qilu University of Technology(Shandong Academy of Sciences) Jinan China
Advanced Persistent Threat (APT) pose an increasingly serious challenge to the security of businesses and organizations. In order to cope with these threats more effectively, effective utilization of cybers threat int... 详细信息
来源: 评论
Felix: A Model of Detecting Off-chain Abnormal States in Decentralized Applications
Felix: A Model of Detecting Off-chain Abnormal States in Dec...
收藏 引用
IEEE International Conference on Trust, security and Privacy in Computing and Communications (TrustCom)
作者: Lianhai Wang Qihao Huang Wei Shao Jinpeng Wang Xiaoqian Liu Fansheng Wang Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Key Laboratory of Computing Power Network and Information Security Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
With the rapid development of blockchain technology, the use of decentralized applications (DApps) has experienced significant growth. However, current testing methods for DApps primarily focus on testing the smart co... 详细信息
来源: 评论
Malicious Traffic Classification for IoT based on Graph Attention network and Long Short-Term Memory network
Malicious Traffic Classification for IoT based on Graph Atte...
收藏 引用
Asia-Pacific network Operations and Management Symposium (APNOMS)
作者: Lei Zhang Lizhuang Tan Huiling Shi Hongyang Sun Wei Zhang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
With the rapid development of digital services and the Internet of Things (IoT), the number and diversity of cyber attacks have reached unprecedented levels, making network traffic classification a crucial means of ma...
来源: 评论
L2fusion: Low-Light Oriented Infrared and Visible Image Fusion
L2fusion: Low-Light Oriented Infrared and Visible Image Fusi...
收藏 引用
IEEE International Conference on Image Processing
作者: Xiang Gao Guohua Lv Aimei Dong Zhonghe Wei Jinyong Cheng Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Infrared and visible image fusion aims to integrate salient targets and abundant texture information into a single fused image. Existing methods typically ignore the issue of illumination, so that there are problems o...
来源: 评论
Target-Aware Tracking with Long-term Context Attention
arXiv
收藏 引用
arXiv 2023年
作者: He, Kaijie Zhang, Canlong Xie, Sheng Li, Zhixin Wang, Zhiwen School of Computer Science and Engineering Guangxi Normal University China Guangxi Key Lab of Multi-source Information Mining and Security China School of Computer Science and Technology Guangxi University of Science and Technology China
Most deep trackers still follow the guidance of the siamese paradigms and use a template that contains only the target without any contextual information, which makes it difficult for the tracker to cope with large ap... 详细信息
来源: 评论
enCBS: Delay Guarantee Mechanism based on Credit-based Shaping for Programmable Switch
enCBS: Delay Guarantee Mechanism based on Credit-based Shapi...
收藏 引用
Asia-Pacific network Operations and Management Symposium (APNOMS)
作者: Xinhang Wang Lizhuang Tan Wei Zhang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
The Time-Sensitive networking (TSN) aims to achieve delay guarantee through traffic shaping, and the programmable switch provides a data plane implementation solution for the flexible and deployable TSN network. Howev...
来源: 评论
Poisoning Attacks and Defenses to Learned Bloom Filters for Malicious URL Detection
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Dong, Fangming Wang, Pinghui Li, Rundong Cui, Xueyao Zhao, Junzhou Tao, Jing Zhang, Chen Guan, Xiaohong Zhejiang CreateLink Technology Co. Ltd Guangdong Guangzhou China Xi'an Jiaotong University MOE Key Laboratory for Intelligent Networks and Network Security Shaanxi Xi'an710049 China Tsinghua University Center for Intelligent and Networked Systems Tsinghua National Lab for Information Science and Technology Beijing China
Approximate membership query (AMQ) structures represented by the Bloom Filter and its variants have been popularly researched in recent years. Researchers have recently combined machine learning with this type of stru... 详细信息
来源: 评论
Method and system of power load classification and decomposition based on deep learning
Method and system of power load classification and decomposi...
收藏 引用
Smart Grid and Energy Engineering (SGEE), International Conference on
作者: Hao Sun Hongtai Yuan Yudong Geng Jing Chen Chuanfu Zhang Wen Li Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
This paper introduces a system for the classification and decomposition of electrical loads, addressing the shortcomings of current non-intrusive load decomposition methods that are prone to errors. We propose a metho...
来源: 评论