咨询与建议

限定检索结果

文献类型

  • 1,719 篇 会议
  • 1,134 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,857 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,864 篇 工学
    • 1,414 篇 计算机科学与技术...
    • 1,137 篇 软件工程
    • 502 篇 信息与通信工程
    • 214 篇 电气工程
    • 204 篇 控制科学与工程
    • 171 篇 生物工程
    • 161 篇 电子科学与技术(可...
    • 150 篇 网络空间安全
    • 127 篇 机械工程
    • 72 篇 仪器科学与技术
    • 71 篇 光学工程
    • 70 篇 生物医学工程(可授...
    • 59 篇 安全科学与工程
    • 54 篇 交通运输工程
    • 44 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 809 篇 理学
    • 509 篇 数学
    • 181 篇 生物学
    • 157 篇 物理学
    • 148 篇 统计学(可授理学、...
    • 93 篇 系统科学
    • 46 篇 化学
  • 461 篇 管理学
    • 282 篇 管理科学与工程(可...
    • 202 篇 图书情报与档案管...
    • 92 篇 工商管理
  • 100 篇 法学
    • 60 篇 社会学
    • 42 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 36 篇 经济学
    • 36 篇 应用经济学
  • 30 篇 军事学
  • 18 篇 农学
  • 14 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 137 篇 feature extracti...
  • 114 篇 accuracy
  • 109 篇 semantics
  • 94 篇 training
  • 89 篇 federated learni...
  • 88 篇 computational mo...
  • 77 篇 cryptography
  • 70 篇 privacy
  • 69 篇 authentication
  • 68 篇 security
  • 61 篇 data models
  • 60 篇 deep learning
  • 50 篇 object detection
  • 49 篇 robustness
  • 48 篇 protocols
  • 45 篇 information secu...
  • 44 篇 neural networks
  • 44 篇 optimization
  • 41 篇 transformers
  • 41 篇 adaptation model...

机构

  • 263 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 65 篇 guangxi key lab ...
  • 65 篇 shandong provinc...
  • 57 篇 guangxi key lab ...
  • 54 篇 key lab of infor...
  • 51 篇 shandong enginee...
  • 49 篇 shandong fundame...
  • 42 篇 school of comput...
  • 39 篇 school of cyber ...
  • 32 篇 shandong provinc...
  • 30 篇 college of compu...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 27 篇 college of compu...
  • 27 篇 qilu university ...
  • 27 篇 pca lab key lab ...
  • 22 篇 peng cheng labor...
  • 22 篇 shandong fundame...

作者

  • 72 篇 yang jian
  • 31 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 24 篇 xiaoming wu
  • 24 篇 xie jin
  • 22 篇 ma jianfeng
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 liu ximeng
  • 21 篇 li xianxian
  • 20 篇 zhixin li
  • 20 篇 li hui
  • 19 篇 xianxian li
  • 18 篇 xiangzhi liu
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 16 篇 zhang yuqing

语言

  • 2,479 篇 英文
  • 298 篇 其他
  • 85 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2857 条 记 录,以下是791-800 订阅
排序:
EventTrojan: Manipulating Non-Intrusive Speech Quality Assessment via Imperceptible Events
EventTrojan: Manipulating Non-Intrusive Speech Quality Asses...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Ying Ren Kailai Shen Zhe Ye Diqun Yan Faculty of Electrical Engineering and Computer Science Ningbo University Ningbo China Juphoon System Software Co. Ltd Ningbo China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology (Shandong Academy of Sciences) China
Non-Intrusive speech quality assessment (NISQA) has gained significant attention for predicting speech’s mean opinion score (MOS) without requiring the reference speech. Researchers have gradually started to apply NI... 详细信息
来源: 评论
SML: A Backdoor Defense for Non-Intrusive Speech Quality Assessment via Semi-Supervised and Multi-Task Learning
SML: A Backdoor Defense for Non-Intrusive Speech Quality Ass...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Ying Ren Wenjie Zhang Jiahong Ye Jie Li Diqun Yan Bin Ma Faculty of Electrical Engineering and Computer Science Ningbo University Ningbo China College of Digital Technology and Engineering Ningbo University of Finance and Economics Ningbo China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology (Shandong Academy of Sciences) China
Non-intrusive speech quality assessment (NISQA) is widely used in speech downstream tasks due to its ability to predict the quality of speech without a reference speech. However, few researchers have focused on the ba... 详细信息
来源: 评论
Coarse-to-Fine Latent Diffusion for Pose-Guided Person Image Synthesis
Coarse-to-Fine Latent Diffusion for Pose-Guided Person Image...
收藏 引用
Conference on computer Vision and Pattern Recognition (CVPR)
作者: Yanzuo Lu Manlin Zhang Andy J Ma Xiaohua Xie Jianhuang Lai School of Computer Science and Engineering Sun Yat-sen University Guangzhou China Guangdong Province Key Laboratory of Information Security Technology China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China Pazhou Lab (HuangPu) Guangzhou China
Diffusion model is a promising approach to image generation and has been employed for Pose-Guided Person Image Synthesis (PGPIS) with competitive performance. While existing methods simply align the person appearance ... 详细信息
来源: 评论
Detection method of trusted blockchain link flood attack based on trusted execution environment
Detection method of trusted blockchain link flood attack bas...
收藏 引用
information Technology: IoT and Smart City (ITIoTSC), International Conference on
作者: Ruixue Kuang Lianhai Wang Shuhui Zhang Shujiang Xu Wei Shao Qizheng Wang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan Shandong China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan Shandong China
In order to improve the detection accuracy and improve the detection speed, this paper designs a detection method of trusted blockchain link flood attack based on the trusted execution environment. First, above all, a... 详细信息
来源: 评论
Cerebrovascular segmentation from mesoscopic optical images using Swin Transformer
收藏 引用
Journal of Innovative Optical Health Sciences 2023年 第4期16卷 120-133页
作者: Yuxin Li Qianlong Zhang Hang Zhou Junhuai Li Xiangning Li Anan Li Shaanxi Key Laboratory for Network Computing and Security Technology School of Computer Science and Engineering Xi'an University of Technology Xi'an 710048P.R.China School of Computer Science Chengdu University of Information Technology Chengdu 610225P.R.China Britton Chance Center for Biomedical Photonics Wuhan National Laboratory for Optoelectronics MoE Key Laboratory for Biomedical Photonics Huazhong University of Science and Technology Wuhan 430074 P.R.China HUST-Suzhou Institute for Brainsmatics Suzhou 215123 P.R.China
Vascular segmentation is a crucial task in biomedical image processing,which is significant for analyzing and modeling vascular networks under physiological and pathological *** advances in fluorescent labeling and me... 详细信息
来源: 评论
Proceedings Research on the Path of High-Quality Development of Big Data Industry in Shandong Province
Proceedings Research on the Path of High-Quality Development...
收藏 引用
作者: Yu Wang Mingle Zhou Chunjing Wang Xingheng Mei Yumei Li Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Qilu University of Technology (Shandong Academy of Sciences)
The big data industry is a major opportunity to promote the development of the digital economy. This paper analyzes the status quo and problems of the big data industry in Shandong Province, combines the connotation o... 详细信息
来源: 评论
Gradually Spatio-Temporal Feature Activation for Target Tracking
Gradually Spatio-Temporal Feature Activation for Target Trac...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Yanfang Deng Canlong Zhang Zhixin Li Chunrong Wei Zhiwen Wang Shuqi Pan Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guangxi Normal University Guilin China Guangxi Key Lab of Multi-Source Information Mining & Security Guangxi Normal University Guilin China School of Computer Science and Technology Guangxi University of Science and Technology Liuzhou China
Most existing transformer-based trackers use ViT [1] as the backbone to extract and fuse feature tokens of target templates and search region. Since both the target template and the search region contain background in...
来源: 评论
Unleashing the Potential of Decentralized Federated Learning in Healthcare: A Comprehensive Survey on Insights and Challenges
Unleashing the Potential of Decentralized Federated Learning...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Haibo Cheng Wenjian Liu Youyang Qu Kexue Fu Qinyuan Wang Faculty of Data Science City University of Macau Macau China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China
Federated learning (FL) is a distributed learning method that reduces data transmission and privacy risks. However, the existence of a central server may become a target of attackers, resulting in an increased risk of... 详细信息
来源: 评论
A Deep Exploration of BitLocker Encryption and security Analysis  20
A Deep Exploration of BitLocker Encryption and Security Anal...
收藏 引用
20th IEEE International Conference on Communication Technology, ICCT 2020
作者: Tan, Cheng Zhang, Lijun Bao, Liang Science and Technology on Communication Security Laboratory Chengdu China Security Ministry of Public Security Key Lab of Information Network Shanghai China
Due to the popularity of Windows system, BitLocker is widely used as a built-in disk encryption tool. As a commercial application, the design of BitLocker has to consider a capability of disaster recovery, which helps... 详细信息
来源: 评论
A Scientific Workflow Engine Design and Implementation
A Scientific Workflow Engine Design and Implementation
收藏 引用
第四届公共管理与智能社会国际学术会议
作者: Zhichao Zhang Meng Guo Tingting Guo Key Laboratory of' Computing Power Network and Information Security of Ministry of Education Shandong Computer Science Center (National Supercomputing Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Inspur General Software Co.Ltd. Shandong Carbon Manager Group Co.Ltd.
This paper designs and implements a scientific workflow engine that follows the BPMN 2.0, enriching existing research on scientific workflow engine specification and theory. The engine is implemented using the Java la... 详细信息
来源: 评论