咨询与建议

限定检索结果

文献类型

  • 1,677 篇 会议
  • 1,155 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,836 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,891 篇 工学
    • 1,442 篇 计算机科学与技术...
    • 1,155 篇 软件工程
    • 516 篇 信息与通信工程
    • 215 篇 控制科学与工程
    • 214 篇 电气工程
    • 171 篇 生物工程
    • 164 篇 电子科学与技术(可...
    • 154 篇 网络空间安全
    • 126 篇 机械工程
    • 72 篇 光学工程
    • 72 篇 仪器科学与技术
    • 71 篇 生物医学工程(可授...
    • 58 篇 安全科学与工程
    • 54 篇 交通运输工程
    • 42 篇 化学工程与技术
    • 41 篇 动力工程及工程热...
  • 807 篇 理学
    • 511 篇 数学
    • 181 篇 生物学
    • 153 篇 物理学
    • 148 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 44 篇 化学
  • 467 篇 管理学
    • 281 篇 管理科学与工程(可...
    • 210 篇 图书情报与档案管...
    • 90 篇 工商管理
  • 102 篇 法学
    • 60 篇 社会学
    • 44 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 31 篇 军事学
  • 18 篇 农学
  • 12 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 126 篇 feature extracti...
  • 104 篇 semantics
  • 88 篇 accuracy
  • 85 篇 training
  • 77 篇 cryptography
  • 75 篇 computational mo...
  • 68 篇 authentication
  • 66 篇 security
  • 65 篇 federated learni...
  • 62 篇 privacy
  • 61 篇 deep learning
  • 55 篇 data models
  • 48 篇 object detection
  • 47 篇 protocols
  • 45 篇 information secu...
  • 42 篇 neural networks
  • 38 篇 robustness
  • 37 篇 visualization
  • 36 篇 convolution
  • 36 篇 optimization

机构

  • 228 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 56 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 52 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 38 篇 shandong provinc...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 28 篇 college of compu...
  • 28 篇 qilu university ...
  • 28 篇 college of compu...
  • 27 篇 shandong provinc...
  • 26 篇 pca lab key lab ...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 72 篇 yang jian
  • 31 篇 jian yang
  • 30 篇 meng deyu
  • 27 篇 xu li
  • 25 篇 jianfeng ma
  • 23 篇 ma jianfeng
  • 23 篇 xie jin
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 li xianxian
  • 20 篇 xiaoming wu
  • 20 篇 li hui
  • 20 篇 liu ximeng
  • 19 篇 zhixin li
  • 18 篇 xianxian li
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 17 篇 li zhixin
  • 16 篇 zhang yuqing

语言

  • 2,567 篇 英文
  • 176 篇 其他
  • 97 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2836 条 记 录,以下是71-80 订阅
排序:
JTEA: Implementing Semi-Supervised Entity Alignment Using Joint Teaching Strategies
JTEA: Implementing Semi-Supervised Entity Alignment Using Jo...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Lu, Kai Zhao, Jing Ding, Lichao Hao, Zenghao Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan China Faculty of Computer Science and Technology Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
Entity alignment(EA) aims to identify equivalent entities in different knowledge graphs or data sources and establish correspondences between them. In recent years, embedding-based methods have made significant progre... 详细信息
来源: 评论
Weighted Adversarial Transfer network-Based Fault Diagnosis Method for Gearboxes  11
Weighted Adversarial Transfer Network-Based Fault Diagnosis ...
收藏 引用
11th Joint International information Technology and Artificial Intelligence Conference, ITAIC 2023
作者: Wang, Dan Meng, Qinglong Hao, Huijuan Cheng, Guanghe Tang, Yongwei Bai, Jinqiang Key Laboratory of Computing Power Network and Information Security Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
In this paper, we address the issue of gearbox fault diagnosis under changing working conditions and the limitations of migration learning algorithms that are only applicable to scenarios with identical labels in both... 详细信息
来源: 评论
Job2Vec: A Self-Supervised Contrastive Learning Based HPC Job Power Consumption Prediction Framework  29
Job2Vec: A Self-Supervised Contrastive Learning Based HPC Jo...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Zhang, Jie Song, Jian Li, Xiang Tian, Xuesen Zhao, Zhigang Wu, Lu Wang, Chunxiao Key Laboratory of Computing Power Network and Information Security Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
In the context of the rapid development of big data and artificial intelligence, the field of HPC is facing significant challenges in energy consumption. To address this challenge, this paper proposes a power consumpt... 详细信息
来源: 评论
Optimization Strategy for Remote Differential Upgrade of IoT Firmware  11
Optimization Strategy for Remote Differential Upgrade of IoT...
收藏 引用
11th Joint International information Technology and Artificial Intelligence Conference, ITAIC 2023
作者: Ding, Wenkang Sun, Ruirui Meng, Qinglong Wan, Zhong Cheng, Guanghe Hao, Huijuan Bai, Jinqiang Key Laboratory of Computing Power Network and Information Security Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
With the continuous increase of IoT devices, the management and optimization of devices become particularly important. The update cycle of device functions is short, and in order to facilitate management and optimize ... 详细信息
来源: 评论
Deep Imputation Bi-stochastic Graph Regularized Matrix Factorization for Clustering Single-cell RNA-sequencing Data
收藏 引用
IEEE/ACM Transactions on Computational Biology and Bioinformatics 2024年 PP卷 1-11页
作者: Lan, Wei Chen, Jianwei Liu, Mingyang Chen, Qingfeng Liu, Jin Wang, Jianxin Chen, Yi-Ping Phoebe Wei Lan is School of Computer Electronic and Information and Guangxi Key Laboratory of Multimedia Communications and Network Technology Guangxi University Nanning Guangxi China School of Computer Electronic and Information Guangxi University Nanning Guangxi China School of Computer Electronic and Information and State Key Laboratory for Conservation and Utilization of Subtropical Agro-bioresources Guangxi University Nanning Guangxi China Hunan Provincial Key Lab on Bioinformatics School of Computer Science and Engineering Central South University Changsha Hunan China Department of Computer Science and Information Technology La Trobe University Melbourne Victoria Australia
By generating massive gene transcriptome data and analyzing transcriptomic variations at the cell level, single-cell RNA-sequencing (scRNA-seq) technology has provided new way to explore cellular heterogeneity and fun... 详细信息
来源: 评论
Joint Optimization of UAV Deployment and Task Computation Offloading Decision in UAV-assisted Edge Computing network  25
Joint Optimization of UAV Deployment and Task Computation Of...
收藏 引用
25th IEEE International Conferences on High Performance Computing and Communications, 9th International Conference on Data Science and Systems, 21st IEEE International Conference on Smart City and 9th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC/DSS/SmartCity/DependSys 2023
作者: Liu, Yichuan Tu, Jinbin Wang, Yun School of Computer Science and Engineering Southeast University Key Lab of Computer Network and Information Integration Moe Nanjing China
The UAVs' deployment decision and task computation offloading decision in the UAV-assisted edge computing network significantly impact the operating efficiency of edge network. On the basis of this, the Optimizati... 详细信息
来源: 评论
T-Sorokin: A General Mobility Model in Opportunistic networks  26
T-Sorokin: A General Mobility Model in Opportunistic Network...
收藏 引用
26th International Conference on computer Supported Cooperative Work in Design, CSCWD 2023
作者: Tu, Jinbin Li, Qing Wang, Yun Southeast University Key Lab of Computer Network and Information Integration Moe School of Computer Science and Engineering Nanjing China
The opportunistic networks are a kind of ad hoc networks that rely on the chance of nodes meeting to transmit messages. Acting as an effective supplement to 4G and 5G networks in some special scenarios where hardware ... 详细信息
来源: 评论
Dynamic detection technology of encryption algorithm based on Pin  9
Dynamic detection technology of encryption algorithm based o...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Qu, Junpeng Du, Gaolei Sun, Yunge Fu, Yong Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan250014 China Quan Cheng Laboratory Jinan250103 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
Aiming at the problem that malicious software uses encryption algorithm to hide its own malicious code and avoid detection, a dynamic detection technology based on Pin encryption algorithm is proposed. Use Pin to get ... 详细信息
来源: 评论
Semantic Relation-Based Cross Attention network for Image-Text Retrieval
Semantic Relation-Based Cross Attention Network for Image-Te...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Zhou, Huanxiao Geng, Yushui Zhao, Jing Ma, Xishan Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan China Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China Jinan China
Image-text retrieval refers to querying the text or image of another modality given an image or text, and its key lies in the ability to accurately measure the similarity between text and image. Most of the existing r...
来源: 评论
An Encryption Algorithm Cycle Identification Method Based on Bit Execution  9
An Encryption Algorithm Cycle Identification Method Based on...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Sun, Yunge Du, Gaolei Qu, Junpeng Fu, Yong Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan250014 China Quan Cheng Laboratory Jinan250103 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
Ransomware uses symmetric encryption algorithms to lock user files to extort money. This paper proposes a cryptographic algorithm loop identification method based on bit-precise execution, aiming to solve the problem ... 详细信息
来源: 评论