咨询与建议

限定检索结果

文献类型

  • 1,737 篇 会议
  • 1,156 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,897 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,893 篇 工学
    • 1,437 篇 计算机科学与技术...
    • 1,153 篇 软件工程
    • 516 篇 信息与通信工程
    • 238 篇 电气工程
    • 216 篇 控制科学与工程
    • 171 篇 生物工程
    • 168 篇 电子科学与技术(可...
    • 160 篇 网络空间安全
    • 130 篇 机械工程
    • 74 篇 光学工程
    • 73 篇 仪器科学与技术
    • 70 篇 生物医学工程(可授...
    • 65 篇 安全科学与工程
    • 60 篇 交通运输工程
    • 45 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 818 篇 理学
    • 514 篇 数学
    • 182 篇 生物学
    • 164 篇 物理学
    • 149 篇 统计学(可授理学、...
    • 93 篇 系统科学
    • 48 篇 化学
  • 470 篇 管理学
    • 292 篇 管理科学与工程(可...
    • 202 篇 图书情报与档案管...
    • 93 篇 工商管理
  • 100 篇 法学
    • 60 篇 社会学
    • 42 篇 法学
  • 67 篇 医学
    • 57 篇 临床医学
    • 48 篇 基础医学(可授医学...
  • 36 篇 经济学
    • 36 篇 应用经济学
  • 30 篇 军事学
  • 18 篇 农学
  • 15 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 138 篇 feature extracti...
  • 116 篇 accuracy
  • 110 篇 semantics
  • 97 篇 training
  • 94 篇 federated learni...
  • 89 篇 computational mo...
  • 77 篇 cryptography
  • 71 篇 privacy
  • 69 篇 authentication
  • 68 篇 security
  • 63 篇 data models
  • 62 篇 deep learning
  • 52 篇 robustness
  • 50 篇 object detection
  • 49 篇 protocols
  • 46 篇 optimization
  • 45 篇 information secu...
  • 44 篇 neural networks
  • 42 篇 adaptation model...
  • 41 篇 transformers

机构

  • 272 篇 key laboratory o...
  • 204 篇 shandong provinc...
  • 68 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 57 篇 guangxi key lab ...
  • 56 篇 key lab of infor...
  • 51 篇 shandong enginee...
  • 50 篇 shandong fundame...
  • 42 篇 school of comput...
  • 40 篇 shandong provinc...
  • 38 篇 school of cyber ...
  • 31 篇 college of compu...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 27 篇 college of compu...
  • 27 篇 qilu university ...
  • 26 篇 pca lab key lab ...
  • 24 篇 shandong fundame...
  • 22 篇 beijing electron...

作者

  • 72 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 24 篇 xiaoming wu
  • 23 篇 xie jin
  • 22 篇 ma jianfeng
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 liu ximeng
  • 21 篇 li xianxian
  • 20 篇 zhixin li
  • 20 篇 li hui
  • 19 篇 xianxian li
  • 18 篇 xiangzhi liu
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 di xiaoqiang
  • 16 篇 zhang yuqing

语言

  • 2,420 篇 英文
  • 397 篇 其他
  • 87 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2897 条 记 录,以下是831-840 订阅
排序:
D4A: An efficient and effective defense across agnostic adversarial attacks
收藏 引用
Neural networks 2025年 183卷 106938页
作者: Li, Xianxian Gan, Zeming Bai, Yan Su, Linlin Li, De Wang, Jinyan Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guangxi Normal University Guilin China Guangxi Key Lab of Multi-source Information Mining and Security Guangxi Normal University Guilin China School of Computer Science and Engineering Guangxi Normal University Guilin China School of Engineering and Technology University of Washington Tacoma TacomaWA United States
Recent studies show that Graph Neural networks (GNNs) are vulnerable to structure adversarial attacks, which draws attention to adversarial defenses in graph data. Previous defenses designed heuristic defense strategi... 详细信息
来源: 评论
DetecVFuzz: Enhancing security in Consumer Electronic Devices Through Scalable Vulnerability Testing of Virtual Devices
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Xiao, Xi Guo, Yongjian Jolfaei, Alireza Chen, Chuan Haghighi, Mohammad Sayad Wen, Sheng Lin, Yuanyi Tsinghua University Shenzhen International Graduate School Shenzhen China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education China Peng Cheng Laboratory Guangdong Shenzhen China Flinders University College of Science and Engineering SA5042 Australia Shandong Computer Science Center Key Laboratory of Computing Power Network and Information Security Ministry of Education China Qilu University of Technology Shandong Academy of Sciences National Supercomputer Center in Jinan Jinan China Swinburne University of Technology School of Science Computing and Engineering Technologies MelbourneVIC3122 Australia
The interconnection facilitated by consumer electronics has led to the creation of a complex network of devices. Testing efficiency of such consumer electronic devices can be improved through hardware emulation. QEMU ... 详细信息
来源: 评论
Mitigating label-Noise for Facial Expression Recognition in the Wild
Mitigating Label-Noise for Facial Expression Recognition in ...
收藏 引用
2022 IEEE International Conference on Multimedia and Expo, ICME 2022
作者: Yan, Huan Gu, Yu Zhang, Xiang Wang, Yantong Ji, Yusheng Ren, Fuji School of Computer and Information Hefei University of Technology S2AC Lab China Hefei University of Technology Key Laboratory of Knowledge Engineering with Big Data China Anhui Province Key Laboratory of Cyberspace Security Situation Awareness and Evaluation China National Institute of Informatics Tokushima University Japan
label-noise constitutes a major challenge for facial expression recognition in the wild due to the ambiguity of facial expressions worsened by low-quality images. To deal with this problem, we propose a simple but eff... 详细信息
来源: 评论
Map2Schedule: An End-to-End Link Scheduling Method for Urban V2V Communications
Map2Schedule: An End-to-End Link Scheduling Method for Urban...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Lihao Zhang Haijian Sun Jin Sun Ramviyas Parasuraman Yinghui Ye Rose Qingyang Hu School of Electrical and Computer Engineering University of Georgia Athens GA USA School of Computing University of Georgia Athens GA USA Shanxi Key Laboratory of Information Communication Network and Security Xi'an University of Posts & Telecommunications China Electrical and Computer Engineering Department at Utah State University Logan UT USA
Urban vehicle-to-vehicle (V2V) link scheduling with shared spectrum is a challenging problem. Its main goal is to find the scheduling policy that can maximize system performance (usually the sum capacity of each link ... 详细信息
来源: 评论
AirDIV: Over-the-Air Cloud-Fog Data Integrity Verification Scheme for Industrial Cyber-Physical Systems
收藏 引用
IEEE Journal on Selected Areas in Communications 2025年
作者: Zhao, Yao Xiang, Yong Uddin, Md Palash Zhang, Yushu Liu, Lu Liu, Yansong Gao, Longxiang Deakin University School of Information Technology VIC Australia Jiangxi University of Finance and Economics School of Computing and Artificial Intelligence Nanchang330013 China University of Exeter Department of Computer Science Exeter United Kingdom RWTH Aachen University Department of Computer Science Aachen Germany Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Jinan China
Industrial Cyber-Physical Systems (ICPSs) have been motivating various Industry 4.0 endeavours, particularly with the integration of fog computing. Cloud-fog data caching paradigms, as supportive elements of ICPSs, ha... 详细信息
来源: 评论
SML: A Backdoor Defense for Non-Intrusive Speech Quality Assessment via Semi-Supervised and Multi-Task Learning
SML: A Backdoor Defense for Non-Intrusive Speech Quality Ass...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Ying Ren Wenjie Zhang Jiahong Ye Jie Li Diqun Yan Bin Ma Faculty of Electrical Engineering and Computer Science Ningbo University Ningbo China College of Digital Technology and Engineering Ningbo University of Finance and Economics Ningbo China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology (Shandong Academy of Sciences) China
Non-intrusive speech quality assessment (NISQA) is widely used in speech downstream tasks due to its ability to predict the quality of speech without a reference speech. However, few researchers have focused on the ba... 详细信息
来源: 评论
Coarse-to-Fine Latent Diffusion for Pose-Guided Person Image Synthesis
Coarse-to-Fine Latent Diffusion for Pose-Guided Person Image...
收藏 引用
Conference on computer Vision and Pattern Recognition (CVPR)
作者: Yanzuo Lu Manlin Zhang Andy J Ma Xiaohua Xie Jianhuang Lai School of Computer Science and Engineering Sun Yat-sen University Guangzhou China Guangdong Province Key Laboratory of Information Security Technology China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China Pazhou Lab (HuangPu) Guangzhou China
Diffusion model is a promising approach to image generation and has been employed for Pose-Guided Person Image Synthesis (PGPIS) with competitive performance. While existing methods simply align the person appearance ... 详细信息
来源: 评论
RoKEPG: RoBERTa and Knowledge Enhancement for Prescription Generation of Traditional Chinese Medicine
RoKEPG: RoBERTa and Knowledge Enhancement for Prescription G...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Hua Pu Jiacong Mi Shan Lu Jieyue He School of Computer Science and Engineering Key Lab of Computer Network and Information Integration MOE Southeast University Nanjing China Nanjing Fenghuo Tiandi Communication Technology Co. Ltd Nanjing China
Traditional Chinese medicine (TCM) prescription is the most critical form of TCM treatment, and uncovering the complex nonlinear relationship between symptoms and TCM is of great significance for clinical practice and...
来源: 评论
EventTrojan: Manipulating Non-Intrusive Speech Quality Assessment via Imperceptible Events
EventTrojan: Manipulating Non-Intrusive Speech Quality Asses...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Ying Ren Kailai Shen Zhe Ye Diqun Yan Faculty of Electrical Engineering and Computer Science Ningbo University Ningbo China Juphoon System Software Co. Ltd Ningbo China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology (Shandong Academy of Sciences) China
Non-Intrusive speech quality assessment (NISQA) has gained significant attention for predicting speech’s mean opinion score (MOS) without requiring the reference speech. Researchers have gradually started to apply NI... 详细信息
来源: 评论
Detection method of trusted blockchain link flood attack based on trusted execution environment
Detection method of trusted blockchain link flood attack bas...
收藏 引用
information Technology: IoT and Smart City (ITIoTSC), International Conference on
作者: Ruixue Kuang Lianhai Wang Shuhui Zhang Shujiang Xu Wei Shao Qizheng Wang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan Shandong China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan Shandong China
In order to improve the detection accuracy and improve the detection speed, this paper designs a detection method of trusted blockchain link flood attack based on the trusted execution environment. First, above all, a... 详细信息
来源: 评论