咨询与建议

限定检索结果

文献类型

  • 1,719 篇 会议
  • 1,134 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,857 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,864 篇 工学
    • 1,414 篇 计算机科学与技术...
    • 1,137 篇 软件工程
    • 502 篇 信息与通信工程
    • 214 篇 电气工程
    • 204 篇 控制科学与工程
    • 171 篇 生物工程
    • 161 篇 电子科学与技术(可...
    • 150 篇 网络空间安全
    • 127 篇 机械工程
    • 72 篇 仪器科学与技术
    • 71 篇 光学工程
    • 70 篇 生物医学工程(可授...
    • 59 篇 安全科学与工程
    • 54 篇 交通运输工程
    • 44 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 809 篇 理学
    • 509 篇 数学
    • 181 篇 生物学
    • 157 篇 物理学
    • 148 篇 统计学(可授理学、...
    • 93 篇 系统科学
    • 46 篇 化学
  • 461 篇 管理学
    • 282 篇 管理科学与工程(可...
    • 202 篇 图书情报与档案管...
    • 92 篇 工商管理
  • 100 篇 法学
    • 60 篇 社会学
    • 42 篇 法学
  • 64 篇 医学
    • 54 篇 临床医学
    • 47 篇 基础医学(可授医学...
  • 36 篇 经济学
    • 36 篇 应用经济学
  • 30 篇 军事学
  • 18 篇 农学
  • 14 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 137 篇 feature extracti...
  • 114 篇 accuracy
  • 109 篇 semantics
  • 94 篇 training
  • 89 篇 federated learni...
  • 88 篇 computational mo...
  • 77 篇 cryptography
  • 70 篇 privacy
  • 69 篇 authentication
  • 68 篇 security
  • 61 篇 data models
  • 60 篇 deep learning
  • 50 篇 object detection
  • 49 篇 robustness
  • 48 篇 protocols
  • 45 篇 information secu...
  • 44 篇 neural networks
  • 44 篇 optimization
  • 41 篇 transformers
  • 41 篇 adaptation model...

机构

  • 263 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 65 篇 guangxi key lab ...
  • 65 篇 shandong provinc...
  • 57 篇 guangxi key lab ...
  • 54 篇 key lab of infor...
  • 51 篇 shandong enginee...
  • 49 篇 shandong fundame...
  • 42 篇 school of comput...
  • 39 篇 school of cyber ...
  • 32 篇 shandong provinc...
  • 30 篇 college of compu...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 27 篇 college of compu...
  • 27 篇 qilu university ...
  • 27 篇 pca lab key lab ...
  • 22 篇 peng cheng labor...
  • 22 篇 shandong fundame...

作者

  • 72 篇 yang jian
  • 31 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 24 篇 xiaoming wu
  • 24 篇 xie jin
  • 22 篇 ma jianfeng
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 liu ximeng
  • 21 篇 li xianxian
  • 20 篇 zhixin li
  • 20 篇 li hui
  • 19 篇 xianxian li
  • 18 篇 xiangzhi liu
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 cao xiaochun
  • 16 篇 zhang yuqing

语言

  • 2,479 篇 英文
  • 298 篇 其他
  • 85 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2857 条 记 录,以下是971-980 订阅
排序:
A CPK-Based Identity Authentication Scheme for IoT
收藏 引用
computer Systems Science & Engineering 2022年 第3期40卷 1217-1231页
作者: Mingming Zhang Jiaming Mao Yuanyuan Ma Liangjie Xu Chuanjun Wang Ran Zhao Zhihao Li Lu Chen Wenbing Zhao State Grid Jiangsu Electric Power Co. Ltd.Information&Telecommunication BranchNanjing210008China State Grid Key Laboratory of Information&Network Security Institute of Information and CommunicationGlobal Energy Interconnection Research InstituteNanjing210003China Anhui Jiyuan Software Co.Ltd SGITGHefei230088China Engineering Research Center of Post Big Data Technology and Application of Jiangsu Province Research and Development Center of Post Industry Technology of the State Posts Bureau(Internet of Things Technology)Engineering Research Center of Broadband Wireless Communication Technology of the Ministry of EducationNanjing University of Posts and TelecommunicationsNanjing210003China Department of Electrical Engineering and Computer Science Cleveland State UniversityCleveland44115USA
As the power Internet of Things(IoT)enters the security construction stage,the massive use of perception layer devices urgently requires an identity authentication scheme that considers both security and *** existing ... 详细信息
来源: 评论
T-M Net: A Fusion Convolutional Neural network Method for Lung Aging Assessment
T-M Net: A Fusion Convolutional Neural Network Method for Lu...
收藏 引用
Medical Artificial Intelligence (MedAI), IEEE International Conference on
作者: Tangbin Tian Jingshan Pan Jing Ge Na Li Dexin Yu Liping Zuo Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China Department of Radiology Qilu Hospital of Shandong University Jinan China
As the population ages, the precise assessment of pulmonary senescence becomes essential for the diagnosis and management of chronic respiratory diseases. However, existing medical imaging analysis techniques encounte... 详细信息
来源: 评论
A Shortest Path Query Approach for Encrypted Graphs Based on Padding Dictionary Structure
A Shortest Path Query Approach for Encrypted Graphs Based on...
收藏 引用
Chinese Automation Congress (CAC)
作者: Ming Yang Kaiyang Zhang Chao Mu Xin Wang Yuanlong Liu Heng Zhang Key Laboratory of Computing Power Network and Information Security Shandong Computer Science Center Ministry of Education Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China State Grid Shandong Electric Power Company Jinan China School of Computer Engineering Jiangsu Ocean University Lianyungang China
Hybrid intelligence has emerged as an innovative approach that synergistically combines the strengths of human intelligence and artificial intelligence (AI) to address complex problems. In this paradigm, knowledge gra...
来源: 评论
PGUD: Personalized Graph Universal Defense
PGUD: Personalized Graph Universal Defense
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Zeming Gan Linlin Su Xianxian Li Jinyan Wang Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guangxi Normal University Guilin China Guangxi Key Lab of Multi-Source Information Mining and Security Guangxi Normal University Guilin China School of Computer Science and Engineering Guangxi Normal University Guilin China
Extensive evidence shows that Graph Neural networks (GNNs) are vulnerable to adversarial attacks. Previous work has made great efforts to improve the performance and usability of GNNs, but they remain sensitive and vu...
来源: 评论
Generating Personalized Imputations for Patient Health Status Prediction in Electronic Health Records
Generating Personalized Imputations for Patient Health Statu...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Yang Liu Weiyu Zhang Jiasheng Si Zhao Li Xueping Peng Wenpeng Lu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China Evay Info Jinan China Australian Artificial Intelligence Institute University of Technology Sydney Sydney Australia
Electronic health records (EHRs) play a crucial role in the development of personalized treatment plans for patients. However, EHRs are often highly incomplete, posing significant challenges for predictive modeling. W... 详细信息
来源: 评论
Relaxed Graph Semi-Supervised Contrastive Learning for Node Classification
Relaxed Graph Semi-Supervised Contrastive Learning for Node ...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Qiyu Li Xianxian Li Haodong Qian De Li Jinyan Wang Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guangxi Normal University Guilin China Guangxi Key Lab of Multi-Source Information Mining and Security Guangxi Normal University Guilin China School of Computer Science and Engineering Guangxi Normal University Guilin China
Graph Neural networks (GNNs) have emerged as promising tools in graph semi-supervised learning. They acquire low-dimensional node embeddings for downstream tasks by aggregating and updating features from neighboring n...
来源: 评论
A Multimedia Approach to Problem Descriptions for Fine-Grained Detail Characterization
A Multimedia Approach to Problem Descriptions for Fine-Grain...
收藏 引用
IEEE International Requirements Engineering Conference Workshops (REW)
作者: Bowen Zheng Zhi Li Hongbin Xiao School of Computer Science and Engineering Guangxi Normal University Guilin China Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guangxi Normal University Guilin China Guangxi Key Lab of Multi-Source Information Mining and Security Guangxi Normal University Guilin China
Requirements analysis has always been regarded as the starting point and focus of requirements engineering. The Problem Frames (PF) approach provides a problem-oriented requirements analysis method by describing the s...
来源: 评论
A malicious url detection model based on convolutional neural network  6th
A malicious url detection model based on convolutional neura...
收藏 引用
6th International Symposium on security and Privacy in Social networks and Big Data, SocialSec 2020
作者: Wang, Zhiqiang Li, Shuhao Wang, Bingyan Ren, Xiaorui Yang, Tao State Information Center Beijing China Beijing Electronic Science and Technology Institute Beijing China Key Lab of Information Network Security Ministry of Public Security Shanghai China
With the development of Internet technology, network security is facing great challenges. Malicious URL detection can defend against attacks such as phishing, spams, and malware implantation. However there are some pr... 详细信息
来源: 评论
Mix-Net: Automatic Segmentation of Covid-19 ct Images Based on Parallel Design
Mix-Net: Automatic Segmentation of Covid-19 ct Images Based ...
收藏 引用
IEEE International Conference on Image Processing
作者: Aimei Dong Ruixin Wang Guohua Lv Guixin Zhao Yi Zhai Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Since the discovery of COVID-19 in late 2019, the viral pneumonia crisis has begun to spread rapidly around the world. Lesion segmentation can remove unnecessary background areas and help doctors diagnose the conditio...
来源: 评论
A Hybrid Fault Diagnosis Method for Rolling Bearing Based on Attention and CNN  5
A Hybrid Fault Diagnosis Method for Rolling Bearing Based on...
收藏 引用
5th International Conference on Robotics, Intelligent Control and Artificial Intelligence, RICAI 2023
作者: Wang, Songtao Liu, Qianlong Li, Jun Liang, Kun Cai, Hui Tian, Hangwei Shandong Hi-Speed Construction Management Group Co. Ltd. Jinan China Shandong Scicom Information and Economy Research Institute Co. Ltd. Jinan China Shandong Hi-Speed Group Linteng Highway Co. Ltd. Jinan China School of Qilu Transportation Shandong University Jinan China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China
In the field of mechanical manufacturing, rolling bearings are important core components. To achieve stable rotational operation, improving diagnostic accuracy has become an urgent issue. In this paper, a hybrid fault... 详细信息
来源: 评论