咨询与建议

限定检索结果

文献类型

  • 1,719 篇 会议
  • 1,134 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,857 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,864 篇 工学
    • 1,414 篇 计算机科学与技术...
    • 1,137 篇 软件工程
    • 502 篇 信息与通信工程
    • 214 篇 电气工程
    • 204 篇 控制科学与工程
    • 171 篇 生物工程
    • 161 篇 电子科学与技术(可...
    • 150 篇 网络空间安全
    • 127 篇 机械工程
    • 72 篇 仪器科学与技术
    • 71 篇 光学工程
    • 70 篇 生物医学工程(可授...
    • 59 篇 安全科学与工程
    • 54 篇 交通运输工程
    • 44 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 809 篇 理学
    • 509 篇 数学
    • 181 篇 生物学
    • 157 篇 物理学
    • 148 篇 统计学(可授理学、...
    • 93 篇 系统科学
    • 46 篇 化学
  • 461 篇 管理学
    • 282 篇 管理科学与工程(可...
    • 202 篇 图书情报与档案管...
    • 92 篇 工商管理
  • 100 篇 法学
    • 60 篇 社会学
    • 42 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 36 篇 经济学
    • 36 篇 应用经济学
  • 30 篇 军事学
  • 18 篇 农学
  • 14 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 137 篇 feature extracti...
  • 114 篇 accuracy
  • 109 篇 semantics
  • 94 篇 training
  • 89 篇 federated learni...
  • 88 篇 computational mo...
  • 77 篇 cryptography
  • 70 篇 privacy
  • 69 篇 authentication
  • 68 篇 security
  • 61 篇 data models
  • 60 篇 deep learning
  • 50 篇 object detection
  • 49 篇 robustness
  • 48 篇 protocols
  • 45 篇 information secu...
  • 44 篇 neural networks
  • 44 篇 optimization
  • 41 篇 transformers
  • 41 篇 adaptation model...

机构

  • 263 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 65 篇 guangxi key lab ...
  • 65 篇 shandong provinc...
  • 57 篇 guangxi key lab ...
  • 54 篇 key lab of infor...
  • 51 篇 shandong enginee...
  • 49 篇 shandong fundame...
  • 42 篇 school of comput...
  • 39 篇 school of cyber ...
  • 32 篇 shandong provinc...
  • 30 篇 college of compu...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 27 篇 college of compu...
  • 27 篇 qilu university ...
  • 27 篇 pca lab key lab ...
  • 22 篇 peng cheng labor...
  • 22 篇 shandong fundame...

作者

  • 72 篇 yang jian
  • 31 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 24 篇 xiaoming wu
  • 24 篇 xie jin
  • 22 篇 ma jianfeng
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 liu ximeng
  • 21 篇 li xianxian
  • 20 篇 zhixin li
  • 20 篇 li hui
  • 19 篇 xianxian li
  • 18 篇 xiangzhi liu
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 16 篇 zhang yuqing

语言

  • 2,479 篇 英文
  • 298 篇 其他
  • 85 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2857 条 记 录,以下是901-910 订阅
排序:
A Novel 3D Medical Image Segmentation Model Using Improved SAM
A Novel 3D Medical Image Segmentation Model Using Improved S...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Yuansen Kuang Xitong Ma Jing Zhao Guangchen Wang Yijie Zeng Song Liu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
3D medical image segmentation is an essential task in the medical image field, which aims to segment organs or tumours into different labels. A number of issues exist with the current 3D medical image segmentation tas... 详细信息
来源: 评论
Contrastive Learning for Robust Android Malware Familial Classification
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2022年 1-14页
作者: Wu, Yueming Dou, Shihan Zou, Deqing Yang, Wei Qiang, Weizhong Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Shanghai Key Laboratory of Intelligent Information Processing School of Computer Science Fudan University Shanghai China University of Texas at Dallas Dallas USA National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Due to its open-source nature, Android operating system has been the main target of attackers to exploit. Malware creators always perform different code obfuscations on their apps to hide malicious activities. Feature... 详细信息
来源: 评论
PPIRB:Achieving an privacy-preserving image retrieval scheme Based on Blockchain  5
PPIRB:Achieving an privacy-preserving image retrieval scheme...
收藏 引用
5th International Conference on Data Science and information Technology, DSIT 2022
作者: Yuan, Bo Peng, Jiahui Li, Chunpei Qiu, Wangjie School of Computer Science and Engineering State Key Laboratory of Software Development Environment Beihang University Beijing100191 China Guangxi Key Lab of Multi-source Information Mining Security Guangxi Normal University GuiLin China State Key Laboratory of Software Development Environment Beihang University Advanced Innovation Center for Future Blockchain and Privacy Computing Beijing100191 China
With the proliferation of cloud services, the work of large-scale image retrieval is carried out on remote cloud become a trend in order to get rid of the storage burden and computation. However, traditional retrieval... 详细信息
来源: 评论
Dense Cross-Query-and-Support Attention Weighted Mask Aggregation for Few-Shot Segmentation
arXiv
收藏 引用
arXiv 2022年
作者: Shi, Xinyu Wei, Dong Zhang, Yu Lu, Donghuan Ning, Munan Chen, Jiashun Ma, Kai Zheng, Yefeng School of Computer Science & Engineering Key Lab of Computer Network & Information Integration Ministry of Education Southeast Univ. Nanjing China Tencent Jarvis Lab Shenzhen China
Research into Few-shot Semantic Segmentation (FSS) has attracted great attention, with the goal to segment target objects in a query image given only a few annotated support images of the target class. A key to this c... 详细信息
来源: 评论
Significance-aware Medication Recommendation with Medication Representation Learning
Significance-aware Medication Recommendation with Medication...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Yishuo Li Zhufeng Shao Weimin Chen Shoujin Wang Yuehan Du Wenpeng Lu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Mental Health Center Jinan China Data Science Institute University of Technology Sydney Sydney Australia Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
The goal of medication recommendation system is to recommend appropriate pharmaceutical interventions based on a patient’s diagnosis. Most of existing approaches often formulate these recommendations use data on diag... 详细信息
来源: 评论
ERC DMSP: Emotion Recognition in Conversation Based on Dynamic Modeling of Speaker Personalities
ERC DMSP: Emotion Recognition in Conversation Based on Dynam...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Xiaoyang Li Zhenyu Yang Zhijun Li Yiwen Li Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Emotion Recognition in Conversations (ERC) is a widely applicable task, whether in emotional chatbots or recommender systems for dialog scenarios. The ability of systems to accurately identify human emotions is a cruc... 详细信息
来源: 评论
Dynamic Pseudonym Semantic-location Privacy Protection Based on Continuous Query for Road network
收藏 引用
International Journal of network security 2021年 第4期23卷 642-649页
作者: Wang, Yonglu Zuo, Kaizhong Liu, Rui Zhao, Jun School of Computer and Information Anhui Normal University Anhui Provincial Key Lab of Network and Information Security Anhui Normal University Wuhu241002 China
Continuous queries are one of the most common queries in location-based services, although particularly useful, such queries raise serious privacy concerns. Due to frequently updated continuous locations, continuous q... 详细信息
来源: 评论
VULSEYE: Detect Smart Contract Vulnerabilities via Stateful Directed Graybox Fuzzing
arXiv
收藏 引用
arXiv 2024年
作者: Liang, Ruichao Chen, Jing Wu, Cong He, Kun Wu, Yueming Cao, Ruochen Du, Ruiying Liu, Yang Zhao, Ziming Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Wuhan430072 China Cyber Security Lab College of Computing and Data Science Nanyang Technological University Singapore Department of Computer Science and Engineering University at Buffalo New York United States
Smart contracts, the cornerstone of decentralized applications, have become increasingly prominent in revolutionizing the digital landscape. However, vulnerabilities in smart contracts pose great risks to user assets ... 详细信息
来源: 评论
LGDB-Net: Dual-Branch Path for Building Extraction from Remote Sensing Image
LGDB-Net: Dual-Branch Path for Building Extraction from Remo...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Ronghuan Zhang Jing Zhao Ming Li Qingzhi Zou Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China School of Intelligence and Information Engineering Shandong University of Traditional Chinese Medicine Jinan China
Extracting buildings from remote sensing images using deep learning techniques is a widely applied and crucial task. Convolutional Neural networks (CNNs) adopt hierarchical feature representation, showcasing powerful ... 详细信息
来源: 评论
Estimator Meets Equilibrium Perspective: A Rectified Straight Through Estimator for Binary Neural networks Training
Estimator Meets Equilibrium Perspective: A Rectified Straigh...
收藏 引用
International Conference on computer Vision (ICCV)
作者: Xiao-Ming Wu Dian Zheng Zuhao Liu Wei-Shi Zheng School of Computer Science and Engineering Sun Yat-sen University China Pengcheng Lab China Guangdong Province Key Laboratory of Information Security Technology China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China
Binarization of neural networks is a dominant paradigm in neural networks compression. The pioneering work BinaryConnect uses Straight Through Estimator (STE) to mimic the gradients of the sign function, but it also c...
来源: 评论