咨询与建议

限定检索结果

文献类型

  • 1,675 篇 会议
  • 1,145 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,824 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,879 篇 工学
    • 1,428 篇 计算机科学与技术...
    • 1,155 篇 软件工程
    • 511 篇 信息与通信工程
    • 213 篇 电气工程
    • 203 篇 控制科学与工程
    • 171 篇 生物工程
    • 160 篇 电子科学与技术(可...
    • 152 篇 网络空间安全
    • 127 篇 机械工程
    • 73 篇 光学工程
    • 72 篇 仪器科学与技术
    • 71 篇 生物医学工程(可授...
    • 59 篇 安全科学与工程
    • 55 篇 交通运输工程
    • 42 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 807 篇 理学
    • 509 篇 数学
    • 181 篇 生物学
    • 155 篇 物理学
    • 147 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 44 篇 化学
  • 465 篇 管理学
    • 282 篇 管理科学与工程(可...
    • 207 篇 图书情报与档案管...
    • 92 篇 工商管理
  • 102 篇 法学
    • 60 篇 社会学
    • 44 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 37 篇 经济学
    • 37 篇 应用经济学
  • 31 篇 军事学
  • 18 篇 农学
  • 14 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 126 篇 feature extracti...
  • 104 篇 semantics
  • 88 篇 accuracy
  • 85 篇 training
  • 77 篇 cryptography
  • 75 篇 computational mo...
  • 68 篇 authentication
  • 66 篇 security
  • 62 篇 federated learni...
  • 62 篇 privacy
  • 60 篇 deep learning
  • 55 篇 data models
  • 48 篇 object detection
  • 47 篇 protocols
  • 45 篇 information secu...
  • 42 篇 neural networks
  • 38 篇 robustness
  • 37 篇 visualization
  • 36 篇 convolution
  • 36 篇 optimization

机构

  • 225 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 56 篇 guangxi key lab ...
  • 55 篇 key lab of infor...
  • 52 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 37 篇 shandong provinc...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 28 篇 qilu university ...
  • 28 篇 college of compu...
  • 27 篇 college of compu...
  • 26 篇 pca lab key lab ...
  • 24 篇 shandong provinc...
  • 22 篇 beijing electron...
  • 22 篇 peng cheng labor...

作者

  • 73 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 23 篇 ma jianfeng
  • 23 篇 xie jin
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 li xianxian
  • 20 篇 xiaoming wu
  • 20 篇 li hui
  • 20 篇 liu ximeng
  • 19 篇 zhixin li
  • 18 篇 xianxian li
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 16 篇 zhang yuqing
  • 16 篇 zhang shichao

语言

  • 2,567 篇 英文
  • 164 篇 其他
  • 97 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2824 条 记 录,以下是911-920 订阅
排序:
A Method Based on Hierarchical Spatiotemporal Features for Trojan Traffic Detection
arXiv
收藏 引用
arXiv 2023年
作者: Xie, Jiang Li, Shuhao Zhang, Yongzheng Yun, Xiaochun Li, Jia Institute of Information Engineering Chinese Academy of Sciences Beijing China Key Laboratory of Network Assessment Technology IIE CAS Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China National Computer Network Emergency Response Technical Team Coordination Center of China Beijing China
Trojans are one of the most threatening network attacks currently. HTTP-based Trojan, in particular, accounts for a considerable proportion of them. Moreover, as the network environment becomes more complex, HTTP-base... 详细信息
来源: 评论
LDfuzz: A Directed Greybox Fuzzer for Solidity Smart Contract
LDfuzz: A Directed Greybox Fuzzer for Solidity Smart Contrac...
收藏 引用
International Conference on Mobile Ad-hoc and Sensor networks, MSN
作者: Jiangtao Liao Huidan Hu Keke Huang Huasong Jin Changlu Lin College of Computer and Cyber Security Fujian Normal University School of mathematics and statistics Fujian Normal University Key Laboratory of Analytical Mathematics and Applications (Ministry of Education) Fujian Normal University Fujian Zhong Xin Network Security Information Technology Co. LTD Fuzhou Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin China
Smart contracts are programmable units that possess the ability to execute a wide range of computational tasks, operating on a decentralized ledger called a blockchain, frequently employed for the management of valuab... 详细信息
来源: 评论
Research on Optimization and Scheduling of MPTCP Data networks in GNSS network Reference Stations
Research on Optimization and Scheduling of MPTCP Data Networ...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Fengqi Hao Yuxin Wang Hoiio Kong Dexin Ma Xiyuan Zhao Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Faculty of Data Science City University of Macau Macau China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Communication College Qingdao Agricultural University Qingdao China
The Global Navigation Satellite System network Reference Stations (GNSS-NRS) are pivotal in modern po-sitioning and navigation applications. However, GNSS-NRS face significant communication challenges, including insta... 详细信息
来源: 评论
GraphFlow: A Fast and Accurate Distributed Streaming Graph Computation Model  30
GraphFlow: A Fast and Accurate Distributed Streaming Graph C...
收藏 引用
30th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2024
作者: Liang, Zheheng Zheng, Yingying Bi, Sheng Yao, Chaosheng Wang, Jiayan Xu, Lijie Ji, Shuping Wang, Wei Duan, Shikai Information Center Guangdong Power Grid Limited Liability Company Guangzhou China Joint Laboratory on Cyberspace Security China Southern Power Grid Guangzhou China State Key Lab of Computer Science at Iscas China University of Cas Beijing China Guangzhou Power Supply Bureau Guangzhou China University of Toronto Toronto Canada Nanjing Institute of Software Technology China University of Cas Nanjing China Ant Group-Payment Business Group Hangzhou China
Streaming graph computation has been widely applied in many fields, e.g., social network analysis and online product recommendation. However, existing streaming graph computation approaches still present limitations o... 详细信息
来源: 评论
Attribute-Based key Management for Patient-Centric and Trusted Data Access in Blockchain-Enabled IoMT
SSRN
收藏 引用
SSRN 2023年
作者: Xiang, Axin Gao, Hongfeng Tian, Youliang Wang, Linjie Xiong, Jinbo State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guizhou Guiyang550025 China Guizhou Provincial Key Laboratory of Cryptography and Blockchain Technology Guizhou University Guizhou Guiyang550025 China Network and Information Management Center Guizhou University Guizhou Guiyang550025 China School of Data Science Tongren University Guizhou Tongren554300 China Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fujian Normal University Fujian Fuzhou350117 China
Internet of Medical Things (IoMT) provides real-time data collection and access services to medical entities by connecting their devices to Internet. However, within such a complex architecture, achieving patient-cent... 详细信息
来源: 评论
RoKEPG: RoBERTa and Knowledge Enhancement for Prescription Generation of Traditional Chinese Medicine
arXiv
收藏 引用
arXiv 2023年
作者: Pu, Hua Mi, Jiacong Lu, Shan He, Jieyue School of Computer Science and Engineering Key Lab of Computer Network and Information Integration MOE Southeast University Jiangsu Nanjing210018 China Nanjing Fenghuo Tiandi Communication Technology Co. Ltd Jiangsu Nanjing211161 China
Traditional Chinese medicine (TCM) prescription is the most critical form of TCM treatment, and uncovering the complex nonlinear relationship between symptoms and TCM is of great significance for clinical practice and... 详细信息
来源: 评论
Time Series Anomaly Detection Based on Normalized Flow and Bayesian networks
Time Series Anomaly Detection Based on Normalized Flow and B...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Honglei Yao Donglan Liu Yingxian Chang Xin Liu Chaofan Tang State Grid Shandong Electric Power Research Institute Jinan China State Grid Shandong Electric Power Company Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Time series anomaly detection often faces significant challenges due to the high dimensionality, interdependence, and label sparsity of the data. Traditional methods struggle to model the intricate relationships betwe... 详细信息
来源: 评论
Tri-Perspective view Decomposition for Geometry-Aware Depth Completion
Tri-Perspective view Decomposition for Geometry-Aware Depth ...
收藏 引用
Conference on computer Vision and Pattern Recognition (CVPR)
作者: Zhiqiang Yan Yuankai Lin Kun Wang Yupeng Zheng Yufei Wang Zhenyu Zhang Jun Li Jian Yang PCA Lab Key Lab of Intelligent Perception and Systems for High-Dimensional Information of Ministry of Education and Jiangsu Key Lab of Image and Video Understanding for Social Security School of Computer Science and Engineering Nanjing University of Sci. & Tech. China Huazhong University of Science and Technology Chinese Academy of Sciences Northwestem Poly technical University Nanjing University
Depth completion is a vital taskfor autonomous driving, as it involves reconstructing the precise 3D geometry of a scene from sparse and noisy depth measurements. How-ever, most existing methods either rely only on 2D... 详细信息
来源: 评论
FRCNet: Frequency and Region Consistency for Semi-supervised Medical Image Segmentation
arXiv
收藏 引用
arXiv 2024年
作者: He, Along Li, Tao Wu, Yanlin Zou, Ke Fu, Huazhu Tianjin Key Laboratory of Network and Data Security Technology College of Computer Science Nankai University Tianjin China Haihe Lab of ITAI China National Key Laboratory of Fundamental Science on Synthetic Vision Sichuan University Sichuan Chengdu China Institute of High Performance Computing Agency for Science Technology and Research Singapore
Limited labeled data hinder the application of deep learning in medical domain. In clinical practice, there are sufficient unlabeled data that are not effectively used, and semi-supervised learning (SSL) is a promisin... 详细信息
来源: 评论
A Prediction Method for Atmospheric Monitoring Data Based on Transformer and GAN
A Prediction Method for Atmospheric Monitoring Data Based on...
收藏 引用
IEEE information Technology, networking, Electronic and Automation Control Conference
作者: Hongge Zhao Jingli Wang Tixiang Zhang Huijuan Hao Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Jinan Eco-environmental Bureau Pingyin Branch Office Jinan China Shandong Unite Environmental Technology Co Jinan China
With the rapid development of urbanization and industrialization, atmospheric pollution has become a major environmental problem of global concern. The problem of atmospheric pollution not only destroys the ecological... 详细信息
来源: 评论