咨询与建议

限定检索结果

文献类型

  • 1,719 篇 会议
  • 1,134 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,857 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,864 篇 工学
    • 1,414 篇 计算机科学与技术...
    • 1,137 篇 软件工程
    • 502 篇 信息与通信工程
    • 214 篇 电气工程
    • 204 篇 控制科学与工程
    • 171 篇 生物工程
    • 161 篇 电子科学与技术(可...
    • 150 篇 网络空间安全
    • 127 篇 机械工程
    • 72 篇 仪器科学与技术
    • 71 篇 光学工程
    • 70 篇 生物医学工程(可授...
    • 59 篇 安全科学与工程
    • 54 篇 交通运输工程
    • 44 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 809 篇 理学
    • 509 篇 数学
    • 181 篇 生物学
    • 157 篇 物理学
    • 148 篇 统计学(可授理学、...
    • 93 篇 系统科学
    • 46 篇 化学
  • 461 篇 管理学
    • 282 篇 管理科学与工程(可...
    • 202 篇 图书情报与档案管...
    • 92 篇 工商管理
  • 100 篇 法学
    • 60 篇 社会学
    • 42 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 36 篇 经济学
    • 36 篇 应用经济学
  • 30 篇 军事学
  • 18 篇 农学
  • 14 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 137 篇 feature extracti...
  • 114 篇 accuracy
  • 109 篇 semantics
  • 94 篇 training
  • 89 篇 federated learni...
  • 88 篇 computational mo...
  • 77 篇 cryptography
  • 70 篇 privacy
  • 69 篇 authentication
  • 68 篇 security
  • 61 篇 data models
  • 60 篇 deep learning
  • 50 篇 object detection
  • 49 篇 robustness
  • 48 篇 protocols
  • 45 篇 information secu...
  • 44 篇 neural networks
  • 44 篇 optimization
  • 41 篇 transformers
  • 41 篇 adaptation model...

机构

  • 263 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 65 篇 guangxi key lab ...
  • 65 篇 shandong provinc...
  • 57 篇 guangxi key lab ...
  • 54 篇 key lab of infor...
  • 51 篇 shandong enginee...
  • 49 篇 shandong fundame...
  • 42 篇 school of comput...
  • 39 篇 school of cyber ...
  • 32 篇 shandong provinc...
  • 30 篇 college of compu...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 27 篇 college of compu...
  • 27 篇 qilu university ...
  • 27 篇 pca lab key lab ...
  • 22 篇 peng cheng labor...
  • 22 篇 shandong fundame...

作者

  • 72 篇 yang jian
  • 31 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 24 篇 xiaoming wu
  • 24 篇 xie jin
  • 22 篇 ma jianfeng
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 liu ximeng
  • 21 篇 li xianxian
  • 20 篇 zhixin li
  • 20 篇 li hui
  • 19 篇 xianxian li
  • 18 篇 xiangzhi liu
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 16 篇 zhang yuqing

语言

  • 2,479 篇 英文
  • 298 篇 其他
  • 85 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2857 条 记 录,以下是891-900 订阅
排序:
Enhancing Underwater Imaging with 4-D Light Fields: Dataset and Method
arXiv
收藏 引用
arXiv 2024年
作者: Lin, Yuji Lyu, Xianqiang Hou, Junhui Zhao, Qian Meng, Deyu The Department of Computer Science City University of Hong Kong Hong Kong The School of Mathematics and Statistics Xi'an Jiaotong University Shaanxi Xi'An710049 China The School of Mathematics and Statistics Ministry of Education Key Lab of Intelligent Networks and Network Security Xi'an Jiaotong University Shaanxi 710049 China The School of Mathematics and Statistics The Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi'an Jiaotong University Shaanxi Xi'An710049 China Guangdong Guangzhou510555 China
In this paper, we delve into the realm of 4-D light fields (LFs) to enhance underwater imaging plagued by light absorption, scattering, and other challenges. Contrasting with conventional 2-D RGB imaging, 4-D LF imagi... 详细信息
来源: 评论
Reversible Data Hiding Simultaneously Using Substitution of MSB and Compression of LSB of Encrypted Image  14
Reversible Data Hiding Simultaneously Using Substitution of ...
收藏 引用
14th International Conference on Digital Image Processing, ICDIP 2022
作者: Sui, Liansheng Liu, Jie Cheng, Ying Xiao, Zhaolin Tian, Ailing School of Computer Science and Engineering Xi’an University of Technology Xi’an710048 China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an710048 China Student’s Affairs Division Xi’an University of Technology Xi’an710048 China Shaanxi Province Key Lab of Thin Film Technology and Optical Test Xi’an Technological University Xi’an710048 China
With the development of privacy protection, reversible data hiding methods in encrypted image have drawn extensive research interest. Among them, a new method is proposed based on embedding prediction errors, i.e., EP... 详细信息
来源: 评论
Hybrid Deep Relation Matrix Bidirectional Approach for Relational Triple Extraction
Hybrid Deep Relation Matrix Bidirectional Approach for Relat...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Yushuai Hu Jing Zhao Ming Li Lin Yuan Qingzhi Zou Ronghuan Zhang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China School of Intelligence and Information Engineering Shandong University of Traditional Chinese Medicine Jinan China
Relation extraction is a crucial task within information extraction, and numerous models have demonstrated impressive results. However, most of the tagging-based relation triple extraction methods employ unidirectiona... 详细信息
来源: 评论
Enabling Efficient and Secure Health Data Sharing for Healthcare Iot Systems
SSRN
收藏 引用
SSRN 2023年
作者: Zhu, Liehuang Xie, Yumeng Zhou, Yuao Fan, Qing Zhang, Chuan Liu, Ximeng School of Cyberspace Science and Technology Beijing Institute of Technology Beijing100081 China College of Computer and Data Science Fuzhou University Fuzhou350108 China Fujian Provincial Key Laboratory of Information Security of Network Systems Fuzhou350108 China
The Healthcare Internet of Things (HIoT) system enables remote monitor patient health state and feedback on medical treatments timely. The success of HIoT relies on how to share health data securely and efficiently. E... 详细信息
来源: 评论
MOAFL: Potential Seed Selection with Multi-Objective Particle Swarm Optimization  21
MOAFL: Potential Seed Selection with Multi-Objective Particl...
收藏 引用
Proceedings of the 7th International Conference on Communication and information Processing
作者: Jinman Jiang Rui Ma Xiajing Wang Jinyuan He Donghai Tian Jiating Li Beijing Key Laboratory of Software Security Engineering Technology School of Computer Science&Technology Beijing Institute of Technology China CASIC General Department of Network&Information China and CASIC Network&Information Development Corporation Limited China
Fuzzing has become one of the most widely used technology for discovering software vulnerabilities thanks to its effectiveness. However, even the state-of-the-art fuzzers are not very efficient at identifying promisin... 详细信息
来源: 评论
Comprehensive Feature Processing Based on Attention Mechanism for Co-Salient Object Detection
Comprehensive Feature Processing Based on Attention Mechanis...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Guohua Lv Mao Yuan Zengbin Zhang Zhengyang Zhang Zhenhui Ding Guangxiao Ma Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China Shandong Key Laboratory of Ubiquitous Intelligent Computing Jinan China College of Computer Science and Engineering Shandong University of Science and Technology Qingdao China
Co-salient object detection (CoSOD) aims to detect common salient objects across multiple related images. However, existing methods often struggle with limited attention coverage, missing some co-salient objects. To a... 详细信息
来源: 评论
Adaptive Interacting Multiple Model for Underwater Maneuvering Target Tracking with One-Step Randomly Delayed Measurements
SSRN
收藏 引用
SSRN 2023年
作者: Li, Xiaohua Lu, Bo Li, Yuxing Lu, Xiaofeng Jin, Haiyan School of Computer Science and Engineering Xi'an University of Technology Xi’an710048 China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an710048 China School of Automation and Information Engineering Xi'an University of Technology Xi’an710048 China
The existing interacting multiple model (IMM) suffers from two problems when tracking an underwater maneuvering target: 1) the conventional nonlinear filters in IMM cannot work on the condition of delayed measurement,... 详细信息
来源: 评论
Efficient poisoning attacks and defenses for unlabeled data in DDoS prediction of intelligent transportation systems
收藏 引用
security and Safety 2022年 第1期1卷 121-141页
作者: Zhong Li Xianke Wu Changjun Jiang College of Information Science and Technology Donghua University Key Laboratory of the Ministry of Education for Embedded System and Service Computing Department of Computer Science Tongji University Shanghai Network Financial Security Collaborative Innovation Center Tongji University
Nowadays, large numbers of smart sensors(e.g., road-side cameras) which communicate with nearby base stations could launch distributed denial of services(DDoS) attack storms in intelligent transportation systems. DDoS... 详细信息
来源: 评论
Semantic and Emotional Dual Channel for Emotion Recognition in Conversation
收藏 引用
IEEE Transactions on Affective Computing 2025年
作者: Yang, Zhenyu Zhang, Zhibo Cheng, Yuhu Zhang, Tong Wang, Xuesong Jinan250353 China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250353 China China University of Mining and Technology Engineering Research Center of Intelligent Control for Underground Space Ministry of Education Xuzhou Key Laboratory of Artificial Intelligence and Big Data School of Information and Control Engineering Xuzhou221116 China South China University of Technology Guangdong Provincial Key Laboratory of Computational Intelligence and Cyberspace Information School of Computer Science and Engineering Guangzhou510006 China Pazhou Lab Guangzhou510335 China Engineering Research Center Ministry of Education on Health Intelligent Perception and Paralleled Digital-Human Guangzhou China
Emotion recognition in conversation (ERC) aims at accurately identifying emotional states expressed in conversational content. Existing ERC methods, although relying on semantic understanding, often encounter challeng... 详细信息
来源: 评论
Disentangling Interest and Conformity Representation to Mitigate Popularity Bias for Sequential Recommendation
Disentangling Interest and Conformity Representation to Miti...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Wenyue Hu Zhenyu Yang Yan Huang Zhibo Zhang Baojie Xu Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
The objective of sequential recommendation is to predict user preferences for items based on historical interaction sequences. This process often leads to a phenomenon known as popularity bias, where popular items are... 详细信息
来源: 评论