咨询与建议

限定检索结果

文献类型

  • 1,719 篇 会议
  • 1,134 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,857 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,864 篇 工学
    • 1,414 篇 计算机科学与技术...
    • 1,137 篇 软件工程
    • 502 篇 信息与通信工程
    • 214 篇 电气工程
    • 204 篇 控制科学与工程
    • 171 篇 生物工程
    • 161 篇 电子科学与技术(可...
    • 150 篇 网络空间安全
    • 127 篇 机械工程
    • 72 篇 仪器科学与技术
    • 71 篇 光学工程
    • 70 篇 生物医学工程(可授...
    • 59 篇 安全科学与工程
    • 54 篇 交通运输工程
    • 44 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 809 篇 理学
    • 509 篇 数学
    • 181 篇 生物学
    • 157 篇 物理学
    • 148 篇 统计学(可授理学、...
    • 93 篇 系统科学
    • 46 篇 化学
  • 461 篇 管理学
    • 282 篇 管理科学与工程(可...
    • 202 篇 图书情报与档案管...
    • 92 篇 工商管理
  • 100 篇 法学
    • 60 篇 社会学
    • 42 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 36 篇 经济学
    • 36 篇 应用经济学
  • 30 篇 军事学
  • 18 篇 农学
  • 14 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 137 篇 feature extracti...
  • 114 篇 accuracy
  • 109 篇 semantics
  • 94 篇 training
  • 89 篇 federated learni...
  • 88 篇 computational mo...
  • 77 篇 cryptography
  • 70 篇 privacy
  • 69 篇 authentication
  • 68 篇 security
  • 61 篇 data models
  • 60 篇 deep learning
  • 50 篇 object detection
  • 49 篇 robustness
  • 48 篇 protocols
  • 45 篇 information secu...
  • 44 篇 neural networks
  • 44 篇 optimization
  • 41 篇 transformers
  • 41 篇 adaptation model...

机构

  • 263 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 65 篇 guangxi key lab ...
  • 65 篇 shandong provinc...
  • 57 篇 guangxi key lab ...
  • 54 篇 key lab of infor...
  • 51 篇 shandong enginee...
  • 49 篇 shandong fundame...
  • 42 篇 school of comput...
  • 39 篇 school of cyber ...
  • 32 篇 shandong provinc...
  • 30 篇 college of compu...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 27 篇 college of compu...
  • 27 篇 qilu university ...
  • 27 篇 pca lab key lab ...
  • 22 篇 peng cheng labor...
  • 22 篇 shandong fundame...

作者

  • 72 篇 yang jian
  • 31 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 24 篇 xiaoming wu
  • 24 篇 xie jin
  • 22 篇 ma jianfeng
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 liu ximeng
  • 21 篇 li xianxian
  • 20 篇 zhixin li
  • 20 篇 li hui
  • 19 篇 xianxian li
  • 18 篇 xiangzhi liu
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 16 篇 zhang yuqing

语言

  • 2,479 篇 英文
  • 298 篇 其他
  • 85 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2857 条 记 录,以下是931-940 订阅
排序:
A Prior Embedding-Driven Architecture for Long Distance Blind Iris Recognition
arXiv
收藏 引用
arXiv 2024年
作者: Xiong, Qi Zhang, Xinman Shen, Jun International College Hunan University of Arts and Sciences Changde415000 China School of Automation Science and Engineering Faculty of Electronic and Information Engineering MOE Key Lab for Intelligent Networks and Network Security Xi'an Jiaotong University Shaanxi Xi'An710049 China School of Computing and Information Technology University of Wollongong WollongongNSW2522 Australia
Blind iris images, which result from unknown degradation during the process of iris recognition at long distances, often lead to decreased iris recognition rates. Currently, little existing literature offers a solutio... 详细信息
来源: 评论
Animal Sound Recognition Based on Double Feature of Spectrogram
收藏 引用
Chinese Journal of Electronics 2019年 第4期28卷 667-673页
作者: LI Ying HUANG Hongkeng WU Zhibin College of Mathematics and Computer Science Fuzhou University Key Laboratory of Information Security of Network Systems (Fuzhou University)
Due to existence of different environments and noises, the existing method is difficult to ensure the recognition accuracy of animal sound in low Signal-to-noise(SNR) conditions. To address these problems, we propose ... 详细信息
来源: 评论
Traffic Engineering in Dynamic Hybrid Segment Routing networks
收藏 引用
computers, Materials & Continua 2021年 第7期68卷 655-670页
作者: Yingya Guo Kai Huang Cheng Hu Jiangyuan Yao Siyu Zhou College of Mathematics and Computer Science Fuzhou UniversityFuzhou350000China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou UniversityFuzhou350000China Key Laboratory of Spatial Data Mining&Information Sharing Ministry of EducationFuzhou350003China School of Information Science and Technology Guangdong University of Foreign StudiesGuangzhou510006China School of Computer Science and Cyberspace Security Hainan UniversityHaiKou570228China Tandon School of Engineering New York UniversityNew York10012USA Department of Computing Hong Kong Polytechnic UniversityHong Hom999077Hong Kong
The emergence of Segment Routing(SR)provides a novel routing paradigm that uses a routing technique called source packet *** SR architecture,the paths that the packets choose to route on are indicated at the ingress *... 详细信息
来源: 评论
Lombard-VLD: Voice Liveness Detection Based on Human Auditory Feedback
Lombard-VLD: Voice Liveness Detection Based on Human Auditor...
收藏 引用
IEEE Symposium on security and Privacy
作者: Hongcheng Zhu Zongkun Sun Yanzhen Ren Kun He Yongpeng Yan Zixuan Wang Wuyang Liu Yuhong Yang Weiping Tu School of Cyber Science and Engineering Wuhan University Wuhan China State Grid Wuhan Electric Power Supply Company Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education Wuhan China National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan
Voice Liveness Detection (VLD) aims to protect speaker authentication from speech spoofing by determining whether speeches come from live speakers or loudspeakers. Previous methods mainly focus on their differences at... 详细信息
来源: 评论
Discrete Curvature Graph information Bottleneck
arXiv
收藏 引用
arXiv 2024年
作者: Fu, Xingcheng Wang, Jian Gao, Yisen Sun, Qingyun Yuan, Haonan Li, Jianxin Li, Xianxian Guangxi Key Lab of Multi-source Information Mining & Security Guangxi Normal University Guilin China Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guangxi Normal University China Institute of Artificial Intelligence Beihang University Beijing China School of Computer Science and Engineering Beihang University Beijing China
Graph neural networks(GNNs) have been demonstrated to depend on whether the node effective information is sufficiently passing. Discrete curvature (Ricci curvature) is used to study graph connectivity and information ... 详细信息
来源: 评论
Efficient Batch Verification and Privacy-Preserving Data Aggregation Scheme in V2G networks
收藏 引用
IEEE Transactions on Vehicular Technology 2025年
作者: Wang, Congcong Wang, Chen Shen, Jian Vasilakos, Athanasios V. Wang, Bin Wang, Weizheng Department of Software Engineering Nanjing University of Information Science and Technology Nanjing210044 China the Zhejiang Key Laboratory of Digital Fashion and Data Governance the Zhejiang Provincial International Cooperation Base for Science and Technology on Cloud Computing Security and Data Aggregation Zhejiang Sci-Tech University Hangzhou310018 China Zhejiang Provincial Innovation Center of Advanced Textile Technology Shaoxing312000 China College of Computer Science and Information Technology IAU Saudi Arabia Grimstad4879 Norway Network and Data Security Hangzhou310053 China Computer Science Department City University of Hong Kong Hong Kong the Division of Computer Science University of Aizu Fukushima965–8580 Japan
In recent years, against the backdrop of smart grids, vehicle-to-grid (V2G) interaction has become a hot topic. With the increasing number of new energy vehicles, handling massive amounts of electricity transaction da... 详细信息
来源: 评论
Space-Air-Ground Integrated network with Native Intelligence(NI-SAGIN):Concept,Architecture,Access and networking
收藏 引用
China Communications 2022年 第1期19卷 I0002-I0007页
作者: Zhenyu Xiao Qihui Wu Jiajia Liu Ning Zhang Tao Sun the School of Electronic and Information Engineering Beihang University IET China Institute of Communications and of Electronics the Nanjing University of Aeronautics and Astronautics(NUAA) key lab of Ministry of Industry and Information Technology of China the School of Cybersecurity Northwestern Polytechnical University Shaanxi Provincial Engineering Laboratory of Cyber Security Xi’an Unmanned System Security and Intelligent Communications ISTC Center IEEE IOT-AHSN TC IEEE Communications Society1 IEEE Vehicular Technology Society1 the Department of Electrical and Computer Engineering at University of Windsor1 China Mobile Research Institute1 GPP SA21 China Mobile’s 3GPP SA and CT groups
Ubiquitous coverage is one of the most important goals for mobile communication *** achieve this,integration of space,air,and ground networks is highly demanded,which expects to become the one of the enabling technolo... 详细信息
来源: 评论
Probability-based Global Cross-modal Upsampling for Pansharpening
arXiv
收藏 引用
arXiv 2023年
作者: Zhu, Zeyu Cao, Xiangyong Zhou, Man Huang, Junhao Meng, Deyu Xi'an Jiaotong University China School of Computer Science and Technology Xi'an Jiaotong University China Ministry of Education Key Lab For Intelligent Networks and Network Security Xi'an Jiaotong University China Nanyang Technological University Singapore
Pansharpening is an essential preprocessing step for remote sensing image processing. Although deep learning (DL) approaches performed well on this task, current upsampling methods used in these approaches only utiliz... 详细信息
来源: 评论
Adversarial Training for Image Captioning Incorporating Relation Attention  18th
Adversarial Training for Image Captioning Incorporating Rela...
收藏 引用
18th Pacific Rim International Conference on Artificial Intelligence, PRICAI 2021
作者: Chen, Tianyu Li, Zhixin Zhang, Canlong Ma, Huifang Guangxi Key Lab of Multi-source Information Mining and Security Guangxi Normal University Guilin541004 China College of Computer Science and Engineering Northwest Normal University Lanzhou730070 China
Image captioning methods with attention mechanism are leading this field, especially models with global and local attention. But there are few conventional models to integrate the relationship information between vari... 详细信息
来源: 评论
StinAttack: A Lightweight and Effective Adversarial Attack Simulation to Ensemble IDSs for Satellite- Terrestrial Integrated network
StinAttack: A Lightweight and Effective Adversarial Attack S...
收藏 引用
IEEE Symposium on computers and Communications (ISCC)
作者: Shangyuan Zhuang Jiyan Sun Hangsheng Zhang Xiaohui Kuang Ling Pang Haitao Liu Yinlong Liu School of Cyber Security University of Chinese Academy of Sciences Beijing China Institute of Information Engineering Chinese Academy of Sciences Beijing China National Key Laboratory of Science and Technology on Information System Security Beijing China Computer Network Information Center Chinese Academy of Sciences Beijing China
Effective adversarial attacks simulation is essential for the deployment of ensemble Intrusion Detection Systems (en- semble IDSs) in Satellite-Terrestrial Integrated network (STIN). This is because it can automatical... 详细信息
来源: 评论