咨询与建议

限定检索结果

文献类型

  • 1,719 篇 会议
  • 1,140 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,863 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,863 篇 工学
    • 1,414 篇 计算机科学与技术...
    • 1,137 篇 软件工程
    • 502 篇 信息与通信工程
    • 214 篇 电气工程
    • 204 篇 控制科学与工程
    • 171 篇 生物工程
    • 161 篇 电子科学与技术(可...
    • 150 篇 网络空间安全
    • 127 篇 机械工程
    • 72 篇 仪器科学与技术
    • 71 篇 光学工程
    • 70 篇 生物医学工程(可授...
    • 59 篇 安全科学与工程
    • 54 篇 交通运输工程
    • 44 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 809 篇 理学
    • 508 篇 数学
    • 181 篇 生物学
    • 157 篇 物理学
    • 147 篇 统计学(可授理学、...
    • 93 篇 系统科学
    • 46 篇 化学
  • 461 篇 管理学
    • 282 篇 管理科学与工程(可...
    • 202 篇 图书情报与档案管...
    • 92 篇 工商管理
  • 100 篇 法学
    • 60 篇 社会学
    • 42 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 36 篇 经济学
    • 36 篇 应用经济学
  • 30 篇 军事学
  • 18 篇 农学
  • 14 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 137 篇 feature extracti...
  • 114 篇 accuracy
  • 109 篇 semantics
  • 95 篇 training
  • 89 篇 federated learni...
  • 88 篇 computational mo...
  • 77 篇 cryptography
  • 70 篇 privacy
  • 69 篇 authentication
  • 68 篇 security
  • 61 篇 data models
  • 60 篇 deep learning
  • 50 篇 object detection
  • 49 篇 robustness
  • 48 篇 protocols
  • 45 篇 information secu...
  • 44 篇 neural networks
  • 44 篇 optimization
  • 41 篇 transformers
  • 41 篇 adaptation model...

机构

  • 265 篇 key laboratory o...
  • 204 篇 shandong provinc...
  • 65 篇 guangxi key lab ...
  • 64 篇 shandong provinc...
  • 57 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 51 篇 shandong enginee...
  • 50 篇 shandong fundame...
  • 42 篇 school of comput...
  • 39 篇 school of cyber ...
  • 33 篇 shandong provinc...
  • 31 篇 college of compu...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 27 篇 college of compu...
  • 27 篇 qilu university ...
  • 26 篇 pca lab key lab ...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 72 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 24 篇 xiaoming wu
  • 23 篇 xie jin
  • 22 篇 ma jianfeng
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 liu ximeng
  • 21 篇 li xianxian
  • 20 篇 zhixin li
  • 20 篇 li hui
  • 19 篇 xianxian li
  • 18 篇 xiangzhi liu
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 16 篇 zhang yuqing

语言

  • 2,485 篇 英文
  • 298 篇 其他
  • 85 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2863 条 记 录,以下是841-850 订阅
排序:
Data-consistent Unsupervised Diffusion Model for Metal Artifact Reduction
Data-consistent Unsupervised Diffusion Model for Metal Artif...
收藏 引用
2023 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2023
作者: Tong, Zhan Wu, Zhan Yang, Yang Mao, Weilong Wang, Shijie Li, Yinsheng Chen, Yang Southeast University Laboratory of Image Science and Technology Nanjing210096 China Southeast University Ministry of Education Key Laboratory of Computer Network and Information Integration Nanjing210096 China Chinese Academy of Sciences Research Center for Medical Artificial Intelligence Shenzhen Institutes of Advanced Technology Shenzhen518055 China School of Computer Science and Engineering Key Lab. of New Generation Artificial Intelligence Technology and Its Interdisciplinary Applications Jiangsu Provincial Joint International Research Laboratory of Medical Information Processing The Laboratory of Image Science and Technology Nanjing210096 China
Computed Tomography (CT) is an imaging technique widely used in clinical diagnosis. However, high-attenuation metallic implants result in the obstruction of low-energy Xrays and further lead to metal artifacts in the ... 详细信息
来源: 评论
DHD: Double Hard Decision Decoding Scheme for NAND Flash Memory
DHD: Double Hard Decision Decoding Scheme for NAND Flash Mem...
收藏 引用
2025 Design, Automation and Test in Europe Conference, DATE 2025
作者: Cui, Lanlan Wang, Yichuan Xiao, Renzhi Li, Miao Liu, Xiaoxue Hei, Xinhong School of Computer Science and Engineering XI'AN University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China School of Software Engineering Jiangxi University of Science and Technology Nanchang China School of Information Engineering Zhongnan University of Economics and Law Wuhan China
With the advancement of NAND flash technology, the increased storage density leads to intensified interference, which in turn raises the error rate during data retrieval. To ensure data reliability, low-density parity... 详细信息
来源: 评论
BEIR:A Blockchain-based Encrypted Image Retrieval Scheme
BEIR:A Blockchain-based Encrypted Image Retrieval Scheme
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Xianxian Li Jie Li Feng Yu Xuemei Fu JunHao Yang Yue Chen Guangxi Key Lab of Multi-source Information Mining & Security Guilin China Key Laboratory of Computer Network and Information Integration Southeast University Nanjing China
Encrypted image retrieval may return incorrect or incomplete results due to threats from malicious cloud servers. Most of the existing solutions focus on the efficiency and accuracy of retrieval, lack of verification ... 详细信息
来源: 评论
OAA: An Abstraction for Efficient Accelerator Adaptation in Deep Learning Frameworks
OAA: An Abstraction for Efficient Accelerator Adaptation in ...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Zhengxian Lu Chengkun Du Xueshuo Xie Qiankun Dong Cheng Gong Tao Li College of Computer Science Nankai University Tianjin China Tianjin Key Laboratory of Network and Data Security Technology Tianjin China Huawei Technologies Zhejiang China Haihe Lab of ITAI Tianjin China College of Software Nankai University Tianjin China
Deep learning frameworks rely on specific runtime and computation libraries to rewrite the backend for the adaptation of specialized accelerators, which is inefficient and hard to guarantee performance. This paper sol... 详细信息
来源: 评论
CroPrompt: Cross-task Interactive Prompting for Zero-shot Spoken Language Understanding
CroPrompt: Cross-task Interactive Prompting for Zero-shot Sp...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Libo Qin Fuxuan Wei Qiguang Chen Jingxuan Zhou Shijue Huang Jiasheng Si Wenpeng Lu Wanxiang Che School of Computer Science and Engineering Central South University China Key Laboratory of Data Intelligence and Advanced Computing in Provincial Universities Soochow University China Research Center for Social Computing and Information Retrieval Harbin Institute of Technology China Harbin Institute of Technology Shenzhen China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology (Shandong Academy of Sciences)
Slot filling and intent detection are two highly correlated tasks in spoken language understanding (SLU). Recent SLU research attempts to explore zero-shot prompting techniques in large language models to alleviate th... 详细信息
来源: 评论
Robust Dynamic Broadcasting for Multi-Hop Wireless networks Under Time-Varying Connectivity and Dynamic SINR
收藏 引用
IEEE Transactions on Mobile Computing 2025年
作者: Tian, Xiang Yu, Jiguo Luo, Chuanwen Yu, Dongxiao Wang, Guijuan Feng, Bin Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250353 China University of Electronic Science and Technology of China School of Information and Software Engineering Chengdu610054 China Qilu University of Technology Big Data Institute Jinan250353 China Beijing Forestry University School of Information Science and Technology Beijing100083 China Shandong University School of Computer Science and Technology Shandong Qingdao266237 China Taishan University School of Information Science and Technology 271000 China
Throughput-optimal dynamic broadcasting is an essential cornerstone for the efficient operation of Multi-hop Wireless networks (MWNs). Most existing algorithms for this problem were developed assuming static interfere... 详细信息
来源: 评论
Prediction of exosomal piRNAs based on deep learning for sequence embedding with attention mechanism
Prediction of exosomal piRNAs based on deep learning for seq...
收藏 引用
2022 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2022
作者: Liu, Yajun Ding, Yulian Li, Aimin Fei, Rong Guo, Xie Wu, Fangxiang Xi'an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China University of Saskatchewan Division of Biomedical Engineering Saskatoon Canada Xi'an University of Technology Shaanxi Key Laboratory of Complex System Control and Intelligent Information Processing Xi'an China University of Saskatchewan Division of Biomedical Engineering Department of Computer Science Department of Mechanical Engineering Saskatoon Canada
PIWI-interacting RNAs (piRNAs) are a type of small non-coding RNAs which bind with the PIWI proteins to exert biological effects in various regulatory mechanisms. A growing amount of evidence reveals that exosomal piR... 详细信息
来源: 评论
Anomaly Detection Using Multiscale C-LSTM for Univariate Time-Series
收藏 引用
security and Communication networks 2023年 第1期2023卷
作者: Lu, Yi-Xiang Jin, Xiao-Bo Liu, Dong-Jie Zhang, Xin-Chang Geng, Guang-Gang College of Information Science and Technology College of Cyber Security Jinan University Guangzhou510632 China Intelligent Science Department Xi'An Jiaotong-Liverpool University Suzhou215123 China Computer Network Information Center Chinese Academy of Sciences Beijing100190 China College of Computer Science and Technology The Shandong Provincial Key Laboratory of Computer Networks Qilu University of Technology Shandong Academy of Sciences Jinan250014 China
computers generate network traffic data when people go online, and devices generate sensor data when they communicate with each other. When events such as network intrusion or equipment failure occur, the correspondin... 详细信息
来源: 评论
A Private Statistic Query Scheme for Encrypted Electronic Medical Record System *
A Private Statistic Query Scheme for Encrypted Electronic Me...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Xianxian Li Xuemei Fu Feng Yu Zhenkui Shi Jie Li Junhao Yang Guangxi Key Lab of Multi-source Information Mining & Security Guilin China Key Laboratory of Computer Network and Information Integration Southeast University Nanjing China
In this paper, we propose a scheme that supports statistic query and authorized access control on an Encrypted Electronic Medical Records Databases(EMDB). Different from other schemes, it is based on Differential-Priv... 详细信息
来源: 评论
Suppress content shift: better diffusion features via off-the-shelf generation techniques  24
Suppress content shift: better diffusion features via off-th...
收藏 引用
Proceedings of the 38th International Conference on Neural information Processing Systems
作者: Benyuan Meng Qianqian Xu Zitai Wang Zhiyong Yang Xiaochun Cao Qingming Huang Institute of Information Engineering CAS and School of Cyber Security University of Chinese Academy of Sciences Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS and Peng Cheng Laboratory Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS School of Computer Science and Tech. University of Chinese Academy of Sciences School of Cyber Science and Tech. Shenzhen Campus of Sun Yat-sen University School of Computer Science and Tech. University of Chinese Academy of Sciences and Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS and Key Laboratory of Big Data Mining and Knowledge Management CAS
Diffusion models are powerful generative models, and this capability can also be applied to discrimination. The inner activations of a pre-trained diffusion model can serve as features for discriminative tasks, namely...
来源: 评论