咨询与建议

限定检索结果

文献类型

  • 1,737 篇 会议
  • 1,156 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,897 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,893 篇 工学
    • 1,437 篇 计算机科学与技术...
    • 1,153 篇 软件工程
    • 516 篇 信息与通信工程
    • 238 篇 电气工程
    • 216 篇 控制科学与工程
    • 171 篇 生物工程
    • 168 篇 电子科学与技术(可...
    • 160 篇 网络空间安全
    • 130 篇 机械工程
    • 74 篇 光学工程
    • 73 篇 仪器科学与技术
    • 70 篇 生物医学工程(可授...
    • 65 篇 安全科学与工程
    • 60 篇 交通运输工程
    • 45 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 818 篇 理学
    • 514 篇 数学
    • 182 篇 生物学
    • 164 篇 物理学
    • 149 篇 统计学(可授理学、...
    • 93 篇 系统科学
    • 48 篇 化学
  • 470 篇 管理学
    • 292 篇 管理科学与工程(可...
    • 202 篇 图书情报与档案管...
    • 93 篇 工商管理
  • 100 篇 法学
    • 60 篇 社会学
    • 42 篇 法学
  • 67 篇 医学
    • 57 篇 临床医学
    • 48 篇 基础医学(可授医学...
  • 36 篇 经济学
    • 36 篇 应用经济学
  • 30 篇 军事学
  • 18 篇 农学
  • 15 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 138 篇 feature extracti...
  • 116 篇 accuracy
  • 110 篇 semantics
  • 97 篇 training
  • 94 篇 federated learni...
  • 89 篇 computational mo...
  • 77 篇 cryptography
  • 71 篇 privacy
  • 69 篇 authentication
  • 68 篇 security
  • 63 篇 data models
  • 62 篇 deep learning
  • 52 篇 robustness
  • 50 篇 object detection
  • 49 篇 protocols
  • 46 篇 optimization
  • 45 篇 information secu...
  • 44 篇 neural networks
  • 42 篇 adaptation model...
  • 41 篇 transformers

机构

  • 272 篇 key laboratory o...
  • 204 篇 shandong provinc...
  • 68 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 57 篇 guangxi key lab ...
  • 56 篇 key lab of infor...
  • 51 篇 shandong enginee...
  • 50 篇 shandong fundame...
  • 42 篇 school of comput...
  • 40 篇 shandong provinc...
  • 38 篇 school of cyber ...
  • 31 篇 college of compu...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 27 篇 college of compu...
  • 27 篇 qilu university ...
  • 26 篇 pca lab key lab ...
  • 24 篇 shandong fundame...
  • 22 篇 beijing electron...

作者

  • 72 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 24 篇 xiaoming wu
  • 23 篇 xie jin
  • 22 篇 ma jianfeng
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 liu ximeng
  • 21 篇 li xianxian
  • 20 篇 zhixin li
  • 20 篇 li hui
  • 19 篇 xianxian li
  • 18 篇 xiangzhi liu
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 di xiaoqiang
  • 16 篇 zhang yuqing

语言

  • 2,420 篇 英文
  • 397 篇 其他
  • 87 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2897 条 记 录,以下是961-970 订阅
排序:
Dense Cross-Query-and-Support Attention Weighted Mask Aggregation for Few-Shot Segmentation
arXiv
收藏 引用
arXiv 2022年
作者: Shi, Xinyu Wei, Dong Zhang, Yu Lu, Donghuan Ning, Munan Chen, Jiashun Ma, Kai Zheng, Yefeng School of Computer Science & Engineering Key Lab of Computer Network & Information Integration Ministry of Education Southeast Univ. Nanjing China Tencent Jarvis Lab Shenzhen China
Research into Few-shot Semantic Segmentation (FSS) has attracted great attention, with the goal to segment target objects in a query image given only a few annotated support images of the target class. A key to this c... 详细信息
来源: 评论
Medical Image Segmentation Use Convolutional Attention Augmentation TransUNet with Skip Connection Enhancement
Medical Image Segmentation Use Convolutional Attention Augme...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Qingzhi Zou Jing Zhao Ming Li Ling Chen Lin Yuan Ronghuan Zhang Yushuai Hu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China School of Intelligence and Information Engineering Shandong University of Traditional Chinese Medicine Jinan China
The primary objective of medical image segmentation is the isolation of pathological tissues and distinct organs from medical images, thereby assisting in medical diagnosis. The methods employed for medical image segm... 详细信息
来源: 评论
Estimator Meets Equilibrium Perspective: A Rectified Straight Through Estimator for Binary Neural networks Training
arXiv
收藏 引用
arXiv 2023年
作者: Wu, Xiao-Ming Zheng, Dian Liu, Zuhao Zheng, Wei-Shi School of Computer Science and Engineering Sun Yat-sen University China Pengcheng Lab China Guangdong Province Key Laboratory of Information Security Technology China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China
Binarization of neural networks is a dominant paradigm in neural networks compression. The pioneering work BinaryConnect uses Straight Through Estimator (STE) to mimic the gradients of the sign function, but it also c... 详细信息
来源: 评论
A Cross-Modal Interactive Memory network Based on Fine-Grained Medical Feature Extraction for Radiology Report Generation
A Cross-Modal Interactive Memory Network Based on Fine-Grain...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Xitong Ma Yuansen Kuang Lin Yuan Cheng Tian Yijie Zeng Song Liu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Radiology report generation is an essential task in the medical field, which aims to automate the generation of medical terminology descriptions of radiology images. However, this task currently suffers from several p... 详细信息
来源: 评论
ERC DMSP: Emotion Recognition in Conversation Based on Dynamic Modeling of Speaker Personalities
ERC DMSP: Emotion Recognition in Conversation Based on Dynam...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Xiaoyang Li Zhenyu Yang Zhijun Li Yiwen Li Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Emotion Recognition in Conversations (ERC) is a widely applicable task, whether in emotional chatbots or recommender systems for dialog scenarios. The ability of systems to accurately identify human emotions is a cruc... 详细信息
来源: 评论
Minimization of Age of information for Satellite-Terrestrial Covert Communication with a Full-Duplex Receiver
Minimization of Age of Information for Satellite-Terrestrial...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Yizhi Cao Zewei Guo Qifeng Miao Ranran Sun Ji He Xiaochen Li Hangzhou Institute of Technology Xidian University Hangzhou China Shaanxi Key Laboratory of Network and System Security Xidian University Xi’an China School of Systems Information Science Future University Hakodate Hakodate Japan School of Computer Science and Technology Xidian University Xi’an China PLA Strategic Support Force Information Engineering University Zhengzhou China
This paper investigates the freshness of information for covert communication in a satellite-terrestrial system consisting of a satellite transmitter Alice, a terrestrial full-duplex receiver Bob, and a terrestrial wa... 详细信息
来源: 评论
Dynamic Pseudonym Semantic-location Privacy Protection Based on Continuous Query for Road network
收藏 引用
International Journal of network security 2021年 第4期23卷 642-649页
作者: Wang, Yonglu Zuo, Kaizhong Liu, Rui Zhao, Jun School of Computer and Information Anhui Normal University Anhui Provincial Key Lab of Network and Information Security Anhui Normal University Wuhu241002 China
Continuous queries are one of the most common queries in location-based services, although particularly useful, such queries raise serious privacy concerns. Due to frequently updated continuous locations, continuous q... 详细信息
来源: 评论
ASAG: Building Strong One-Decoder-Layer Sparse Detectors via Adaptive Sparse Anchor Generation
ASAG: Building Strong One-Decoder-Layer Sparse Detectors via...
收藏 引用
International Conference on computer Vision (ICCV)
作者: Shenghao Fu Junkai Yan Yipeng Gao Xiaohua Xie Wei-Shi Zheng School of Computer Science and Engineering Sun Yat-sen University China Guangdong Province Key Laboratory of Information Security Technology China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China Pengcheng Lab China
Recent sparse detectors with multiple, e.g. six, decoder layers achieve promising performance but much inference time due to complex heads. Previous works have explored using dense priors as initialization and built o...
来源: 评论
LGDB-Net: Dual-Branch Path for Building Extraction from Remote Sensing Image
LGDB-Net: Dual-Branch Path for Building Extraction from Remo...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Ronghuan Zhang Jing Zhao Ming Li Qingzhi Zou Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China School of Intelligence and Information Engineering Shandong University of Traditional Chinese Medicine Jinan China
Extracting buildings from remote sensing images using deep learning techniques is a widely applied and crucial task. Convolutional Neural networks (CNNs) adopt hierarchical feature representation, showcasing powerful ... 详细信息
来源: 评论
Self-Supervised 3D Scene Flow Estimation Guided by Superpoints
Self-Supervised 3D Scene Flow Estimation Guided by Superpoin...
收藏 引用
Conference on computer Vision and Pattern Recognition (CVPR)
作者: Yaqi Shen Le Hui Jin Xie Jian Yang PCA Lab Nanjing University of Science and Technology Nanjing China PCA Lab Key Lab of Intelligent Perception and Systems for High-Dimensional Information of Ministry of Education Jiangsu Key Lab of Image and Video Understanding for Social Security School of Computer Science and Engineering Nanjing University of Science and Technology China
3D scene flow estimation aims to estimate point-wise motions between two consecutive frames of point clouds. Superpoints, i.e., points with similar geometric features, are usually employed to capture similar motions o...
来源: 评论