咨询与建议

限定检索结果

文献类型

  • 1,737 篇 会议
  • 1,156 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,897 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,893 篇 工学
    • 1,437 篇 计算机科学与技术...
    • 1,153 篇 软件工程
    • 516 篇 信息与通信工程
    • 238 篇 电气工程
    • 216 篇 控制科学与工程
    • 171 篇 生物工程
    • 168 篇 电子科学与技术(可...
    • 160 篇 网络空间安全
    • 130 篇 机械工程
    • 74 篇 光学工程
    • 73 篇 仪器科学与技术
    • 70 篇 生物医学工程(可授...
    • 65 篇 安全科学与工程
    • 60 篇 交通运输工程
    • 45 篇 化学工程与技术
    • 40 篇 动力工程及工程热...
  • 818 篇 理学
    • 514 篇 数学
    • 182 篇 生物学
    • 164 篇 物理学
    • 149 篇 统计学(可授理学、...
    • 93 篇 系统科学
    • 48 篇 化学
  • 470 篇 管理学
    • 292 篇 管理科学与工程(可...
    • 202 篇 图书情报与档案管...
    • 93 篇 工商管理
  • 100 篇 法学
    • 60 篇 社会学
    • 42 篇 法学
  • 67 篇 医学
    • 57 篇 临床医学
    • 48 篇 基础医学(可授医学...
  • 36 篇 经济学
    • 36 篇 应用经济学
  • 30 篇 军事学
  • 18 篇 农学
  • 15 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 138 篇 feature extracti...
  • 116 篇 accuracy
  • 110 篇 semantics
  • 97 篇 training
  • 94 篇 federated learni...
  • 89 篇 computational mo...
  • 77 篇 cryptography
  • 71 篇 privacy
  • 69 篇 authentication
  • 68 篇 security
  • 63 篇 data models
  • 62 篇 deep learning
  • 52 篇 robustness
  • 50 篇 object detection
  • 49 篇 protocols
  • 46 篇 optimization
  • 45 篇 information secu...
  • 44 篇 neural networks
  • 42 篇 adaptation model...
  • 41 篇 transformers

机构

  • 272 篇 key laboratory o...
  • 204 篇 shandong provinc...
  • 68 篇 shandong provinc...
  • 66 篇 guangxi key lab ...
  • 57 篇 guangxi key lab ...
  • 56 篇 key lab of infor...
  • 51 篇 shandong enginee...
  • 50 篇 shandong fundame...
  • 42 篇 school of comput...
  • 40 篇 shandong provinc...
  • 38 篇 school of cyber ...
  • 31 篇 college of compu...
  • 29 篇 key lab of educa...
  • 29 篇 school of comput...
  • 29 篇 state key labora...
  • 27 篇 college of compu...
  • 27 篇 qilu university ...
  • 26 篇 pca lab key lab ...
  • 24 篇 shandong fundame...
  • 22 篇 beijing electron...

作者

  • 72 篇 yang jian
  • 30 篇 jian yang
  • 30 篇 meng deyu
  • 26 篇 xu li
  • 25 篇 jianfeng ma
  • 24 篇 xiaoming wu
  • 23 篇 xie jin
  • 22 篇 ma jianfeng
  • 21 篇 yang yang
  • 21 篇 wang hui-ming
  • 21 篇 liu ximeng
  • 21 篇 li xianxian
  • 20 篇 zhixin li
  • 20 篇 li hui
  • 19 篇 xianxian li
  • 18 篇 xiangzhi liu
  • 18 篇 luo xudong
  • 17 篇 hu yupu
  • 17 篇 di xiaoqiang
  • 16 篇 zhang yuqing

语言

  • 2,420 篇 英文
  • 397 篇 其他
  • 87 篇 中文
检索条件"机构=Key Lab of Computer Network and Information Security"
2897 条 记 录,以下是981-990 订阅
排序:
Communication-Efficient Federated Learning for network Traffic Anomaly Detection
Communication-Efficient Federated Learning for Network Traff...
收藏 引用
International Conference on Mobile Ad-hoc and Sensor networks, MSN
作者: Xiao Cui Xiaohui Han Guangqi Liu Wenbo Zuo Zhiwen Wang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China Quancheng Provincial Laboratory Jinan China
As an emerging machine learning method, Federated Learning is widely used in network anomaly detection scenarios. However, many current federated learning-based network anomaly detection works ignore the communication... 详细信息
来源: 评论
Response of the Yellow and East China seas low-trophic ecosystems to two typhoons at different translational speeds
收藏 引用
Journal of Oceanology and Limnology 2025年 1-21页
作者: Zhu, Lei Zhang, Jing Shi, Changcen Yang, Wei Zhang, Haiyan Wang, Yucheng Liu, Guangliang Bian, Changwei Zhao, Liang College of Marine and Environmental Science Tianjin University of Science and Technology Tianjin China Key Laboratory of Marine Resource Chemistry and Food Technology (TUST) Ministry of Education Tianjin China Key Laboratory of Ocean Observation and Information of Hainan Province Sanya China Tianjin Key Laboratory for Marine Environmental Research and Service School of Marine Science and Technology Tianjin University Tianjin China Laoshan Laboratory Qingdao China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Frontiers Science Center for Deep Ocean Multispheres and Earth System (FDOMES) and Physical Oceanography Laboratory Ocean University of China Qingdao China
Frequent typhoons can significantly change the temperature, nutrient availability, and phytoplankton biomass in marginal seas. The oceanic response to typhoons is usually influenced by the features of the typhoon, amo...
来源: 评论
Deep Video Cascade Clustering from Video Structures
SSRN
收藏 引用
SSRN 2024年
作者: Wang, Zihua Zhu, Hongyuan Mi, Siya Zhang, Yu Geng, Xin School of Computer Science and Engineering The Key Lab of Computer Network and Information Integration Ministry of Education Southeast University Nanjing211189 China A*STAR Singapore School of Cyber Science and Engineering Southeast University Nanjing211189 China Purple Mountain Laboratories Nanjing211189 China
Video clustering is a critical unsupervised learning task where, unlike in supervised video classification, category labels are not *** main challenge lies in learning an effective video representation without annotat... 详细信息
来源: 评论
A 3D Memristive Cubic Map with Dual Discrete Memristors: Design, Implementation, and Application in Image Encryption
收藏 引用
IEEE Transactions on Circuits and Systems for Video Technology 2025年
作者: Gao, Suo Iu, Herbert Ho-Ching Erkan, Ugur Simsek, Cemaleddin Toktas, Abdurrahim Cao, Yinghong Wu, Rui Mou, Jun Li, Qi Wang, Chunpeng Dalian Polytechnic University School of Information Science and Engineering Dalian116034 China The University of Western Australia School of Electrical Electronic and Computer Engineering Perth6009 Australia Faculty of Engineering Electrical and Electronics Engineering Respectively Karamanoglu Mehmetbey University Karaman70200 Turkey Ankara University Engineering Faculty Department of Artificial Intelligence and Data Engineering Ankara06830 Turkey Harbin Institute of Technology School of Computer Science and Technology Harbin150001 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan250000 China
Discrete chaotic systems based on memristors exhibit excellent dynamical properties and are more straightforward to implement in hardware, making them highly suitable for generating cryptographic keystreams. However, ... 详细信息
来源: 评论
Research on point cloud registration of industrial parts based on FGR-ICP algorithm
Research on point cloud registration of industrial parts bas...
收藏 引用
2021 3rd International Conference on Applied Machine Learning and Data Science, ICAMLDS 2021
作者: Zha, Yongjian Chen, Ming Lu, Shenglian School of Computer and Information Engineering Guangxi Normal University Guilin541004 China Guangxi Key Lab of Multi-source Information Mining and Security Guangxi Normal University Guilin541004 China
In the industrial application environment, there are some challenges to point cloud registration caused by disordered and occluded industrial parts. A point cloud registration method combining fast global alignment (F... 详细信息
来源: 评论
Mobile Terminal security Protection Method Based on Community Detection Algorithms and Graph Matching networks  8th
Mobile Terminal Security Protection Method Based on Communit...
收藏 引用
8th International Conference on Artificial Intelligence and security , ICAIS 2022
作者: Chen, Mu Dai, Zaojian Li, Yong Zhang, Juling Wang, Sheng Zhou, Jian Wu, Fan Institute of Information and Communication Global Energy Interconnection Research Institute Nanjing210003 China State Grid Key Laboratory of Information and Network Security Nanjing210003 China Electric Power Research Institute of State Grid Sichuan Chengdu610041 China State Grid Sichuan Electric Power Company Chengdu610041 China Computer Science Department Tuskegee University TuskegeeAL36088 United States
The rapid growth in the number of malware apps poses a great danger to users of power mobile terminals. Among smart devices, devices using the Android system are very popular and thus are easy targets for malware atta... 详细信息
来源: 评论
A Prior Embedding-Driven Architecture for Long Distance Blind Iris Recognition
arXiv
收藏 引用
arXiv 2024年
作者: Xiong, Qi Zhang, Xinman Shen, Jun International College Hunan University of Arts and Sciences Changde415000 China School of Automation Science and Engineering Faculty of Electronic and Information Engineering MOE Key Lab for Intelligent Networks and Network Security Xi'an Jiaotong University Shaanxi Xi'An710049 China School of Computing and Information Technology University of Wollongong WollongongNSW2522 Australia
Blind iris images, which result from unknown degradation during the process of iris recognition at long distances, often lead to decreased iris recognition rates. Currently, little existing literature offers a solutio... 详细信息
来源: 评论
Lombard-VLD: Voice Liveness Detection Based on Human Auditory Feedback
Lombard-VLD: Voice Liveness Detection Based on Human Auditor...
收藏 引用
IEEE Symposium on security and Privacy
作者: Hongcheng Zhu Zongkun Sun Yanzhen Ren Kun He Yongpeng Yan Zixuan Wang Wuyang Liu Yuhong Yang Weiping Tu School of Cyber Science and Engineering Wuhan University Wuhan China State Grid Wuhan Electric Power Supply Company Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education Wuhan China National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan
Voice Liveness Detection (VLD) aims to protect speaker authentication from speech spoofing by determining whether speeches come from live speakers or loudspeakers. Previous methods mainly focus on their differences at... 详细信息
来源: 评论
Efficient Batch Verification and Privacy-Preserving Data Aggregation Scheme in V2G networks
收藏 引用
IEEE Transactions on Vehicular Technology 2025年
作者: Wang, Congcong Wang, Chen Shen, Jian Vasilakos, Athanasios V. Wang, Bin Wang, Weizheng Department of Software Engineering Nanjing University of Information Science and Technology Nanjing210044 China the Zhejiang Key Laboratory of Digital Fashion and Data Governance the Zhejiang Provincial International Cooperation Base for Science and Technology on Cloud Computing Security and Data Aggregation Zhejiang Sci-Tech University Hangzhou310018 China Zhejiang Provincial Innovation Center of Advanced Textile Technology Shaoxing312000 China College of Computer Science and Information Technology IAU Saudi Arabia Grimstad4879 Norway Network and Data Security Hangzhou310053 China Computer Science Department City University of Hong Kong Hong Kong the Division of Computer Science University of Aizu Fukushima965–8580 Japan
In recent years, against the backdrop of smart grids, vehicle-to-grid (V2G) interaction has become a hot topic. With the increasing number of new energy vehicles, handling massive amounts of electricity transaction da... 详细信息
来源: 评论
Traffic Engineering in Dynamic Hybrid Segment Routing networks
收藏 引用
computers, Materials & Continua 2021年 第7期68卷 655-670页
作者: Yingya Guo Kai Huang Cheng Hu Jiangyuan Yao Siyu Zhou College of Mathematics and Computer Science Fuzhou UniversityFuzhou350000China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou UniversityFuzhou350000China Key Laboratory of Spatial Data Mining&Information Sharing Ministry of EducationFuzhou350003China School of Information Science and Technology Guangdong University of Foreign StudiesGuangzhou510006China School of Computer Science and Cyberspace Security Hainan UniversityHaiKou570228China Tandon School of Engineering New York UniversityNew York10012USA Department of Computing Hong Kong Polytechnic UniversityHong Hom999077Hong Kong
The emergence of Segment Routing(SR)provides a novel routing paradigm that uses a routing technique called source packet *** SR architecture,the paths that the packets choose to route on are indicated at the ingress *... 详细信息
来源: 评论