咨询与建议

限定检索结果

文献类型

  • 1,719 篇 会议
  • 1,134 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,857 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,864 篇 工学
    • 1,414 篇 计算机科学与技术...
    • 1,137 篇 软件工程
    • 502 篇 信息与通信工程
    • 214 篇 电气工程
    • 204 篇 控制科学与工程
    • 171 篇 生物工程
    • 161 篇 电子科学与技术(可...
    • 150 篇 网络空间安全
    • 127 篇 机械工程
    • 72 篇 仪器科学与技术
    • 71 篇 光学工程
    • 70 篇 生物医学工程(可授...
    • 59 篇 安全科学与工程
    • 54 篇 交通运输工程
    • 44 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 809 篇 理学
    • 509 篇 数学
    • 181 篇 生物学
    • 157 篇 物理学
    • 148 篇 统计学(可授理学、...
    • 93 篇 系统科学
    • 46 篇 化学
  • 461 篇 管理学
    • 282 篇 管理科学与工程(可...
    • 202 篇 图书情报与档案管...
    • 92 篇 工商管理
  • 100 篇 法学
    • 60 篇 社会学
    • 42 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 36 篇 经济学
    • 36 篇 应用经济学
  • 30 篇 军事学
  • 18 篇 农学
  • 14 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 137 篇 feature extracti...
  • 114 篇 accuracy
  • 109 篇 semantics
  • 94 篇 training
  • 89 篇 federated learni...
  • 88 篇 computational mo...
  • 77 篇 cryptography
  • 70 篇 privacy
  • 69 篇 authentication
  • 68 篇 security
  • 61 篇 data models
  • 60 篇 deep learning
  • 50 篇 object detection
  • 49 篇 robustness
  • 48 篇 protocols
  • 45 篇 information secu...
  • 44 篇 neural networks
  • 44 篇 optimization
  • 41 篇 transformers
  • 41 篇 adaptation model...

机构

  • 263 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 65 篇 guangxi key lab ...
  • 65 篇 shandong provinc...
  • 57 篇 guangxi key lab ...
  • 54 篇 key lab of infor...
  • 51 篇 shandong enginee...
  • 49 篇 shandong fundame...
  • 42 篇 school of comput...
  • 39 篇 school of cyber ...
  • 32 篇 shandong provinc...
  • 30 篇 college of compu...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 27 篇 college of compu...
  • 27 篇 qilu university ...
  • 27 篇 pca lab key lab ...
  • 22 篇 peng cheng labor...
  • 22 篇 shandong fundame...

作者

  • 72 篇 yang jian
  • 31 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 24 篇 xiaoming wu
  • 24 篇 xie jin
  • 22 篇 ma jianfeng
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 liu ximeng
  • 21 篇 li xianxian
  • 20 篇 zhixin li
  • 20 篇 li hui
  • 19 篇 xianxian li
  • 18 篇 xiangzhi liu
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 16 篇 zhang yuqing

语言

  • 2,479 篇 英文
  • 298 篇 其他
  • 85 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2857 条 记 录,以下是871-880 订阅
排序:
Impossible Differential Analysis on 8-Round PRINCE  9th
Impossible Differential Analysis on 8-Round PRINCE
收藏 引用
9th International Conference on computer Engineering and networks, CENet2019
作者: Ding, Yaoling Jia, Keting Wang, An Shi, Ying School of Computer Science Beijing Institute of Technology Beijing100081 China Department of Computer Science and Technology Tsinghua University Beijing100084 China Key Laboratory of Network Assessment Technology CAS Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China
PRINCE is a lightweight block cipher, which was proposed by Borghoff et al. in Asiacrypt 2012. Various cryptanalytic techniques have been employed to evaluate the security of PRINCE. In 2017, Ding et al. constructed a... 详细信息
来源: 评论
Graph Matching Optimization network for Point Cloud Registration
arXiv
收藏 引用
arXiv 2023年
作者: Wu, Qianliang Shen, Yaqi Jiang, Haobo Mei, Guofeng Ding, Yaqing Luo, Lei Xie, Jin Yang, Jian PCA Lab Key Lab of Intelligent Perception and Systems for High-Dimensional Information of Ministry of Education Jiangsu Key Lab of Image and Video Understanding for Social Security School of Computer Science and Engineering Nanjing University of Science and Technology China The Faculty of Engineering and Information Technology University of Technology Sydney SydneyNSW2007 Australia
Point Cloud Registration is a fundamental and challenging problem in 3D computer vision. Recent works often utilize the geometric structure information in point feature embedding or outlier rejection for registration ... 详细信息
来源: 评论
A New Construction Structure on Coded Caching with Linear Subpacketization: Non-Half-Sum Disjoint Packing
arXiv
收藏 引用
arXiv 2025年
作者: Cheng, Minquan Wei, Huimei Wan, Kai Caire, Giuseppe Guangxi Key Lab of Multi-source Information Mining & Security Guangxi Normal University Guilin541004 China the School of Electronic Information and Communications Huazhong University of Science and Technology Wuhan430074 China the Electrical Engineering and Computer Science Department Technische Universität Berlin Berlin10587 Germany
Coded caching is a promising technique to effectively reduce peak traffic by using local caches and the multicast gains generated by these local caches. Coded caching schemes have been widely investigated following th... 详细信息
来源: 评论
Not all diffusion model activations have been evaluated as discriminative features  24
Not all diffusion model activations have been evaluated as d...
收藏 引用
Proceedings of the 38th International Conference on Neural information Processing Systems
作者: Benyuan Meng Qianqian Xu Zitai Wang Xiaochun Cao Qingming Huang Institute of Information Engineering CAS and School of Cyber Security University of Chinese Academy of Sciences Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS and Peng Cheng Laboratory Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS School of Cyber Science and Tech. Shenzhen Campus of Sun Yat-sen University School of Computer Science and Tech. University of Chinese Academy of Sciences and Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS and Key Laboratory of Big Data Mining and Knowledge Management CAS
Diffusion models are initially designed for image generation. Recent research shows that the internal signals within their backbones, named activations, can also serve as dense features for various discriminative task...
来源: 评论
Rethinking the impact of noisy labels in graph classification: A utility and privacy perspective
arXiv
收藏 引用
arXiv 2024年
作者: Li, De Li, Xianxian Gan, Zeming Li, Qiyu Qu, Bin Wang, Jinyan Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guangxi Normal University Guilin541004 China Guangxi Key Lab of Multi-Source Information Mining & Security Guangxi Normal University Guilin541004 China School of Computer Science and Engineering Guangxi Normal University Guilin541004 China
Graph neural networks (GNNs) based on message-passing mechanisms have achieved advanced results in graph classification tasks. However, their generalization performance degrades when noisy labels are present in the tr... 详细信息
来源: 评论
Adaptive and Background-Aware Match for Class-Agnostic Counting
SSRN
收藏 引用
SSRN 2023年
作者: Gong, Shenjian Yang, Jian Zhang, Shanshan PCA Lab Key Lab of Intelligent Perception and Systems for High-Dimensional Information Ministry of Education Jiangsu Key Lab of Image and Video Understanding for Social Security School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing210094 China Nankai University China
Class-agnostic counting (CAC) aims to count object instances in an image by simply specifying a few exemplar boxes of interest. The key challenge for CAC is how to tailor a desirable interaction between exemplar and q... 详细信息
来源: 评论
View-decoupled Transformer for Person Re-identification under Aerial-ground Camera network
View-decoupled Transformer for Person Re-identification unde...
收藏 引用
Conference on computer Vision and Pattern Recognition (CVPR)
作者: Quan Zhang Lei Wang Vishal M. Patel Xiaohua Xie Jianhuang Lai School of Computer Science and Engineering Sun Yat-Sen University China Department of Electrical and Computer Engineering Johns Hopkins University USA Pazhou Lab (HuangPu) Guangdong China Guangdong Province Key Laboratory of Information Security Technology Guangdong China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China
Existing person re-identification methods have achieved remarkable advances in appearance-based identity association across homogeneous cameras, such as ground-ground matching. However, as a more practical scenario, a... 详细信息
来源: 评论
Semi-Supervised Image Captioning Considering Wasserstein Graph Matching
arXiv
收藏 引用
arXiv 2024年
作者: Yang, Yang The Nanjing University of Science and Technology Nanjing210094 China PCA Lab Key Lab of Intelligent Perception and Systems for High-Dimensional Information of Ministry of Education Jiangsu Key Lab of Image and Video Understanding for Social Security School of Computer Science and Engineering Nanjing University of Science and Technology China Ministry of Education State Key Lab. for Novel Software Technology Nanjing University China
Image captioning can automatically generate captions for the given images, and the key challenge is to learn a mapping function from visual features to natural language features. Existing approaches are mostly supervi... 详细信息
来源: 评论
FusionTC: Encrypted App Traffic Classification Using Decision-Level Multimodal Fusion Learning of Flow Sequence
收藏 引用
Wireless Communications and Mobile Computing 2023年 第1期2023卷
作者: Li, Shengbao Huang, Yuchuan Gao, Tianye Yang, Lanqi Chen, Yige Pan, Quanbo Zang, Tianning Chen, Fei Institute of Information Engineering Chinese Academy of Sciences Beijing100045 China School of Cyber Security University of Chinese Academy of Sciences Beijing101408 China National Computer Network Emergency Response Technical Team/Coordination Center of China Shandong Branch Jinan250004 China Ministry of Emergency Management Big Data Center Beijing100010 China Anhui Provincial Key Laboratory of Network and Information Security Anhui Normal University Anhui Wuhu240002 China College of Computer Science and Artificial Intelligence Wenzhou University Wenzhou325000 China National Computer Network Emergency Response Technical Team/Coordination Center of China Xinjiang Branch Urumqi830000 China
In recent years, an increasing number of mobile platforms and applications have adopted traffic encryption protocol technology to ensure privacy and security. Existing researches on encrypted traffic identification ap... 详细信息
来源: 评论
HSIGene: A Foundation Model for Hyperspectral Image Generation
arXiv
收藏 引用
arXiv 2024年
作者: Pang, Li Cao, Xiangyong Tang, Datao Xu, Shuang Bai, Xueru Zhou, Feng Meng, Deyu The School of Computer Science and Technology The Ministry of Education Key Lab for Intelligent Networks and Network Security Xi’an Jiaotong University Shaanxi Xi’an710049 China The School of Mathematics and Statistics Northwestern Polytechnical University Shaanxi Xi’an710021 China The National Laboratory of Radar Signal Processing Xidian University Xi’an710071 China The Key Laboratory of Electronic Information Countermeasure and Simulation of the Education Ministry of China Xidian University Xi’an710071 China The School of Mathematics and Statistics The Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi’an Jiaotong University Shaanxi Xi’an710049 China Guangdong Guangzhou510555 China
Hyperspectral image (HSI) plays a vital role in various fields such as agriculture and environmental monitoring. However, due to the expensive acquisition cost, the number of hyperspectral images is limited, degenerat... 详细信息
来源: 评论