咨询与建议

限定检索结果

文献类型

  • 1,675 篇 会议
  • 1,145 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,824 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,879 篇 工学
    • 1,428 篇 计算机科学与技术...
    • 1,155 篇 软件工程
    • 511 篇 信息与通信工程
    • 213 篇 电气工程
    • 203 篇 控制科学与工程
    • 171 篇 生物工程
    • 160 篇 电子科学与技术(可...
    • 152 篇 网络空间安全
    • 127 篇 机械工程
    • 73 篇 光学工程
    • 72 篇 仪器科学与技术
    • 71 篇 生物医学工程(可授...
    • 59 篇 安全科学与工程
    • 55 篇 交通运输工程
    • 42 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 807 篇 理学
    • 509 篇 数学
    • 181 篇 生物学
    • 155 篇 物理学
    • 147 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 44 篇 化学
  • 465 篇 管理学
    • 282 篇 管理科学与工程(可...
    • 207 篇 图书情报与档案管...
    • 92 篇 工商管理
  • 102 篇 法学
    • 60 篇 社会学
    • 44 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 31 篇 军事学
  • 18 篇 农学
  • 14 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 126 篇 feature extracti...
  • 104 篇 semantics
  • 88 篇 accuracy
  • 85 篇 training
  • 77 篇 cryptography
  • 75 篇 computational mo...
  • 68 篇 authentication
  • 66 篇 security
  • 62 篇 federated learni...
  • 62 篇 privacy
  • 60 篇 deep learning
  • 55 篇 data models
  • 48 篇 object detection
  • 47 篇 protocols
  • 45 篇 information secu...
  • 42 篇 neural networks
  • 38 篇 robustness
  • 37 篇 visualization
  • 36 篇 convolution
  • 36 篇 optimization

机构

  • 225 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 56 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 52 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 37 篇 shandong provinc...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 28 篇 qilu university ...
  • 28 篇 college of compu...
  • 27 篇 college of compu...
  • 26 篇 pca lab key lab ...
  • 24 篇 shandong provinc...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 73 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 23 篇 ma jianfeng
  • 23 篇 xie jin
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 li xianxian
  • 20 篇 xiaoming wu
  • 20 篇 li hui
  • 20 篇 liu ximeng
  • 19 篇 zhixin li
  • 18 篇 xianxian li
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 16 篇 zhang yuqing
  • 16 篇 zhang shichao

语言

  • 2,567 篇 英文
  • 164 篇 其他
  • 97 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2824 条 记 录,以下是781-790 订阅
排序:
Two-Stage Robust Reversible Image Watermarking Based on Deep Neural network  8th
Two-Stage Robust Reversible Image Watermarking Based on Deep...
收藏 引用
8th International Conference on Artificial Intelligence and security , ICAIS 2022
作者: Huang, Jie Li, Fengyong Zhang, Lei Qin, Chuan School of Optical-Electrical and Computer Engineering University of Shanghai for Science and Technology Shanghai200093 China College of Computer Science and Technology Shanghai University of Electric Power Shanghai200090 China Guangxi Key Lab of Multi-Source Information Mining and Security Guangxi Normal University Guilin541004 China Computer Science Department University of Victoria VictoriaBC Canada
This paper proposes a two-stage lossless robust watermarking scheme based on deep neural network. In the first stage, the encoder, noise layer and decoder network are combined to design an end-to-end network framework... 详细信息
来源: 评论
AH-TDMA: An Adaptive Heterogeneous Tridiagonal Matrix Algorithm on the New Sunway Supercomputer
AH-TDMA: An Adaptive Heterogeneous Tridiagonal Matrix Algori...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Min Tian Qi Liu Yanlong Li Wei Du Zenghui Ren Yue Liu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan Key Laboratory of High Performance Computing Jinan Institute of Supercomputing Technology
The solution of tridiagonal linear systems is used in in various fields and plays a crucial role in numerical simulations. However, there is few efficient solver for tridiagonal linear systems on the new Sunway superc...
来源: 评论
Topic Embedded Representation Enhanced Variational Wasserstein Autoencoder for Text Modeling  5
Topic Embedded Representation Enhanced Variational Wasserste...
收藏 引用
5th IEEE International Conference on Electronics Technology, ICET 2022
作者: Xiang, Zheng Liu, Xiaoming Yang, Guan Liu, Yang Zhongyuan University of Technology School of Computer Science Zhengzhou China Henan Key Laboratory on Public Opinion Intelligent Analysis Zhengzhou China Key Laboratory of text processing and image understanding Zhengzhou China Xidian University State Key Laboratory of Integrated Services Networks Xi'an China Shandong University Key Lab of Cryptologic Technology and Information Security Ministry of Education Xi'an China
Variational Autoencoder (VAE) is now popular in modeling and language generation tasks, which need to pay attention to the diversity of generation results. The existing models are insufficient in capturing the built-i... 详细信息
来源: 评论
FAST: a dual-tier few-shot learning paradigm for whole slide image classification  24
FAST: a dual-tier few-shot learning paradigm for whole slide...
收藏 引用
Proceedings of the 38th International Conference on Neural information Processing Systems
作者: Kexue Fu Xiaoyuan Luo Linhao Qu Shuo Wang Ying Xiong Ilias Maglogiannis Longxiang Gao Manning Wang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China and Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China Digital Medical Research Center School of Basic Medical Sciences Fudan University and Shanghai Key Lab of Medical Image Computing and Computer Assisted Intervention Fudan University University of Piraeus
The expensive fine-grained annotation and data scarcity have become the primary obstacles for the widespread adoption of deep learning-based Whole Slide Images (WSI) classification algorithms in clinical practice. Unl...
来源: 评论
Essential proteins identification based on weak consensus model and neighborhood aggregation centrality
Essential proteins identification based on weak consensus mo...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Zhipeng Hu Gaoshi Li Jingli Wu Xinlong Luo Jiafei Liu Wei Peng Xiaoshu Zhu Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guangxi Normal University Guilin China Guangxi Key Lab of Multi-Source Information Mining & Security Guangxi Normal University Guilin China College of Computer Science and Engineering Guangxi Normal University Guilin China Faculty of Information Engineering and Automation Kunming University of Science and Technology Kunming China School of Computer and Information Security & School of Software Engineering Guilin University of Electronic Science and Technology Guilin China
Essential proteins play an essential role in cell survival and replication. Currently, more and more computational methods are developed to identify essential proteins, which overcome the time-consuming, costly and in...
来源: 评论
Monocular Camera-Based Visual Truck Type Recognition
SSRN
收藏 引用
SSRN 2024年
作者: Luo, Haibo Ye, Huaisheng Feng, Chao Shi, Xin Xie, Guoqi School of Computer and Data Science Minjiang University Fuzhou350018 China College of Computer and Data Science Fuzhou University Fuzhou350018 China College of Network and Information Security Fujian Agriculture and Forestry University Fuzhou350018 China Key Laboratory for Embedded and Network Computing of Hunan Province College of Computer Science and Electronic Engineering Hunan University Changsha410082 China College of Computer Science and Electronic Engineering Hunan University Changsha410082 China
Truck overload and over-limit are the primary causes of infrastructure damage and traffic safety accidents. In the past 2 years, researchers have started to deploy intelligent Internet of Things system at the source o... 详细信息
来源: 评论
Safe and Reliable Diffusion Models via Subspace Projection
arXiv
收藏 引用
arXiv 2025年
作者: Chen, Huiqiang Zhu, Tianqing Wang, Linlin Yu, Xin Gao, Longxiang Zhou, Wanlei Faculty of Data Science City University of Macau China School of Computer Science University of Queensland QLD Australia Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China
Large-scale text-to-image (T2I) diffusion models have revolutionized image generation, enabling the synthesis of highly detailed visuals from textual descriptions. However, these models may inadvertently generate inap... 详细信息
来源: 评论
Risk Modeling and Traceability of Boundary Attacks on Internet of Power Systems Based on Complex networks  9
Risk Modeling and Traceability of Boundary Attacks on Intern...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Li, Xin Qu, Zhaoyang Yu, Tong Xie, Ming Yu, Fu Ding, Wei Northeast Electric Power University School of Electrical Engineering Jilin132012 China People's Bank of China Qinghai Provincial Branch Xining810000 China China Southern Power Grid Guangxi Power Grid Co. Ltd. Research Institute Nanning530023 China China Guizhou Power Grid Co. Ltd. Bijie Power Supply Bureau Bijie551700 China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan250014 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan250014 China
With the increasing intelligence of power IoT terminal devices, the massive volume of data transmission, and the widespread adoption of shared services, traditional terminal boundary security mechanisms are unable to ... 详细信息
来源: 评论
Differential Cryptanalysis of Round-Reduced SPEEDY Family  18th
Differential Cryptanalysis of Round-Reduced SPEEDY Family
收藏 引用
18th International Conference on information security and Cryptology, Inscrypt 2022
作者: Yu, Qingyuan Jia, Keting Zou, Guangnan Zhang, Guoyan School of Cyber Science and Technology Shandong University Shandong Qingdao266237 China Institute for Network Sciences and Cyberspace BNRist Tsinghua University Beijing10084 China Department of Computer Sciences and Technology Tsinghua University Beijing10084 China Key Laboratory of Cryptologic Technology and Information Security Ministry of Education Shandong University Shandong Qingdao266237 China Zhongguancun Laboratory Beijing China Shandong Institute of Blockchain Shandong Jinan China
SPEEDY is a family of ultra low latency block ciphers proposed at TCHES 2021 by Leander et al. The standard version, SPEEDY-6-192 offers 128-bit security with high encryption speed in hardware. Differential cryptanaly... 详细信息
来源: 评论
NeuVSA: A Unified and Efficient Accelerator for Neural Vector Search
NeuVSA: A Unified and Efficient Accelerator for Neural Vecto...
收藏 引用
IEEE Symposium on High-Performance computer Architecture
作者: Ziming Yuan Lei Dai Wen Li Jie Zhang Shengwen Liang Ying Wang Cheng Liu Huawei Li Xiaowei Li Jiafeng Guo Peng Wang Renhai Chen Gong Zhang State Key Lab of Processors Institute of Computing TechnologyCAS University of Chinese Academy of Sciences School of Computer and Information Technology Shanxi University School of Computer Science Peking University Zhongguancun National Laboratory Beijing Key Lab of Network Data Science and Technology Institute of Computing Technology CAS Huawei Technologies Co. Ltd. China
Neural Vector Search (NVS) has exhibited superior search quality over traditional key-based strategies for information retrieval tasks. An effective NVS architecture requires high recall, low latency, and high through... 详细信息
来源: 评论