咨询与建议

限定检索结果

文献类型

  • 503 篇 会议
  • 483 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 987 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 688 篇 工学
    • 493 篇 计算机科学与技术...
    • 414 篇 软件工程
    • 179 篇 信息与通信工程
    • 71 篇 控制科学与工程
    • 70 篇 电气工程
    • 64 篇 生物工程
    • 58 篇 电子科学与技术(可...
    • 54 篇 机械工程
    • 42 篇 网络空间安全
    • 38 篇 光学工程
    • 31 篇 生物医学工程(可授...
    • 28 篇 仪器科学与技术
    • 21 篇 化学工程与技术
    • 20 篇 安全科学与工程
    • 16 篇 交通运输工程
    • 12 篇 动力工程及工程热...
  • 289 篇 理学
    • 160 篇 数学
    • 74 篇 生物学
    • 60 篇 统计学(可授理学、...
    • 55 篇 物理学
    • 43 篇 系统科学
    • 24 篇 化学
  • 169 篇 管理学
    • 94 篇 管理科学与工程(可...
    • 82 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 33 篇 法学
    • 19 篇 社会学
    • 13 篇 法学
  • 22 篇 医学
    • 17 篇 临床医学
    • 13 篇 基础医学(可授医学...
  • 15 篇 经济学
    • 15 篇 应用经济学
  • 11 篇 农学
  • 11 篇 军事学
  • 8 篇 教育学
  • 2 篇 文学

主题

  • 39 篇 semantics
  • 36 篇 feature extracti...
  • 33 篇 training
  • 25 篇 authentication
  • 23 篇 security
  • 23 篇 cryptography
  • 20 篇 deep learning
  • 15 篇 object detection
  • 15 篇 contrastive lear...
  • 15 篇 accuracy
  • 15 篇 privacy
  • 14 篇 convolution
  • 14 篇 computational mo...
  • 14 篇 visualization
  • 14 篇 machine learning
  • 12 篇 reinforcement le...
  • 12 篇 data mining
  • 12 篇 graph neural net...
  • 12 篇 wireless sensor ...
  • 11 篇 transformers

机构

  • 76 篇 key lab of educa...
  • 73 篇 guangxi key lab ...
  • 61 篇 guangxi key lab ...
  • 33 篇 key lab of infor...
  • 28 篇 pca lab key lab ...
  • 28 篇 school of comput...
  • 20 篇 beijing electron...
  • 18 篇 guangxi normal u...
  • 18 篇 state informatio...
  • 17 篇 pca lab key lab ...
  • 17 篇 school of cyber ...
  • 16 篇 hubei key labora...
  • 16 篇 national enginee...
  • 16 篇 peng cheng labor...
  • 16 篇 hubei engineerin...
  • 16 篇 school of cyber ...
  • 16 篇 school of inform...
  • 16 篇 school of comput...
  • 15 篇 services computi...
  • 14 篇 school of comput...

作者

  • 73 篇 yang jian
  • 33 篇 jian yang
  • 25 篇 li xianxian
  • 23 篇 xie jin
  • 19 篇 xianxian li
  • 19 篇 zhixin li
  • 16 篇 cheng minquan
  • 16 篇 gong chen
  • 15 篇 jiang haobo
  • 15 篇 zhong bineng
  • 14 篇 li zhixin
  • 13 篇 wu jiyi
  • 13 篇 zhang shichao
  • 13 篇 qian jianjun
  • 13 篇 wang zhiqiang
  • 13 篇 cao xiaochun
  • 13 篇 jin hai
  • 12 篇 tang zhenjun
  • 12 篇 hu shengshan
  • 12 篇 zhang leo yu

语言

  • 923 篇 英文
  • 44 篇 其他
  • 20 篇 中文
检索条件"机构=Key Lab of Cryptographic Technology and Information Security"
987 条 记 录,以下是1-10 订阅
排序:
Efficient Penetration Testing Path Planning Based on Reinforcement Learning with Episodic Memory
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第9期140卷 2613-2634页
作者: Ziqiao Zhou Tianyang Zhou Jinghao Xu Junhu Zhu Henan Key Laboratory of Information Security National Engineering Technology Research Center of the Digital Switching SystemZhengzhou450000China School of Cryptographic Engineering Information Engineering UniversityZhengzhou450000China
Intelligent penetration testing is of great significance for the improvement of the security of information systems,and the critical issue is the planning of penetration test *** view of the difficulty for attackers t... 详细信息
来源: 评论
A Temporal Knowledge Graph Embedding Model Based on Variable Translation
收藏 引用
Tsinghua Science and technology 2024年 第5期29卷 1554-1565页
作者: Yadan Han Guangquan Lu Shichao Zhang Liang Zhang Cuifang Zou Guoqiu Wen Key Lab of Education Blockchain and Intelligent Technology Ministry of EducationGuangxi Normal UniversityGuilin 541004China and also with Guangxi Key Lab of Multi-Source Information Mining and SecurityGuangxi Normal UniversityGuilin 541004China
Knowledge representation learning(KRL)aims to encode entities and relationships in various knowledge graphs into low-dimensional continuous *** is popularly used in knowledge graph completion(or link prediction)***-ba... 详细信息
来源: 评论
Class activation regularization-based facial emotion recognition network and its application in students’ emotional engagement assessment
收藏 引用
IEEE Transactions on Affective Computing 2024年 第2期16卷 1044-1055页
作者: Xu, Luhui Gan, Yanling Jin, Yi The Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guangxi Normal University China Guangxi Key Lab of Multi-Source Information Mining and Security Guangxi Normal University China
Students’ emotional engagement in the classroom can be evaluated through their facial emotions. However, facial emotion recognition remains challenging due to the uncertainty problem, which is routinely caused by fac... 详细信息
来源: 评论
Graph neural network based approach Che upo to automatically assigning common weakness enumeration identifiers for vulnerabilities
收藏 引用
Cybersecurity 2024年 第3期7卷 1-15页
作者: Peng Liu Wenzhe Ye Haiying Duan Xianxian Li Shuyi Zhang Chuanjian Yao Yongnan Li Key Lab of Education Blockchain and Intelligent Technology Ministry of EducationGuangxi Normal UniversityGuilin 541004China School of Software Beihang UniversityBeijing 100000China School of National Security People's Public Security University of ChinaBeijing 1000000China Guangxi Key Lab of Multi-Source Information Mining and Security Guangxi Normal UniversityGuilin 541004China
Vulnerability reports are essential for improving software security since they record key information on *** a report,CWE denotes the weakness of the vulnerability and thus helps quickly understand the cause of the **... 详细信息
来源: 评论
Robust Hashing with Deep Features and Meixner Moments for Image Copy Detection
收藏 引用
ACM Transactions on Multimedia Computing, Communications and Applications 2024年 第12期20卷 1-23页
作者: Yu, Mengzhu Tang, Zhenjun Liang, Xiaoping Zhang, Xianquan Li, Zhixin Zhang, Xinpeng Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guangxi Key Lab of Multi-Source Information Mining and Security Guangxi Normal University Guilin China School of Computer Science Fudan University Shanghai China
Copy detection is a key task of image copyright protection. Most robust hashing schemes do not make satisfied performance of image copy detection yet. To address this, a robust hashing scheme with deep features and Me... 详细信息
来源: 评论
security analysis and secured access design for networks of image remote sensing
收藏 引用
Digital Communications and Networks 2025年 第1期11卷 136-144页
作者: Juan Zhao Haibo Dai Xiaolong Xu Hao Yan Zheng Zhang Chunguo Li School of Network Security Jinling Institute of TechnologyNanjing 211169China School of IoT Nanjing University of Posts and Telecommunications(NJUPT)Nanjing 210003China Jiangsu Key Lab.of Big Data Security and Intelligent Processing NJUPTNanJing 210003China School of Information Science and Engineering Southeast UniversityNanjing 210096China
The secured access is studied in this paper for the network of the image remote *** sensor in this network encounters the information security when uploading information of the images wirelessly from the sensor to the... 详细信息
来源: 评论
Text-based person search by non-saliency enhancing and dynamic label smoothing
收藏 引用
Neural Computing and Applications 2024年 第21期36卷 13327-13339页
作者: Pang, Yonghua Zhang, Canlong Li, Zhixin Wei, Chunrong Wang, Zhiwen Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guangxi Normal University Guilin China Guangxi Key Lab of Multi-source Information Mining and Security Guangxi Normal University Guilin541004 China School of Computer Science and Technology Guangxi University of Science and Technology Liuzhou545006 China
The current text-based person re-identification (re-ID) models tend to learn salient features of image and text, which however is prone to failure in identifying persons with very similar dress, because their image co... 详细信息
来源: 评论
Incorporating metapath interaction on heterogeneous information network for social recommendation
收藏 引用
Frontiers of Computer Science 2024年 第1期18卷 33-48页
作者: Yanbin JIANG Huifang MA Xiaohui ZHANG Zhixin LI Liang CHANG College of Computer Science and Engineering Northwest Normal UniversityLanzhou 730070China Guangxi Key Lab of Multi-source Information Mining and Security Guangxi Normal UniversityGuilin 541001China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic TechnologyGuilin 541004China
Heterogeneous information network(HIN)has recently been widely adopted to describe complex graph structure in recommendation systems,proving its effectiveness in modeling complex graph *** existing HIN-based recommend... 详细信息
来源: 评论
Lip-Audio Modality Fusion for Deep Forgery Video Detection
收藏 引用
Computers, Materials & Continua 2025年 第2期82卷 3499-3515页
作者: Yong Liu Zhiyu Wang Shouling Ji Daofu Gong Lanxin Cheng Ruosi Cheng College of Cyberspace Security Information Engineering UniversityZhengzhou450001China Research Institute of Intelligent Networks Zhejiang LabHangzhou311121China College of Computer Science and Technology Zhejiang UniversityHangzhou310027China Henan Key Laboratory of Cyberspace Situation Awareness Zhengzhou450001China Key Laboratory of Cyberspace Security Ministry of EducationZhengzhou450001China
In response to the problem of traditional methods ignoring audio modality tampering, this study aims to explore an effective deep forgery video detection technique that improves detection precision and reliability by ... 详细信息
来源: 评论
Towards Robust Blockchain Price Oracle: A Study on Human-Centric Node Selection Strategy and Incentive Mechanism
Towards Robust Blockchain Price Oracle: A Study on Human-Cen...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Xian, Youquan Zeng, Xueying Wu, Hao Yang, Danping Wang, Peng Liu, Peng Ministry of Education The Guangxi Key Lab of Multi-Source Information Mining and Security Guangxi Normal University Key Lab of Education Blockchain and Intelligent Technology Guilin541004 China
As a trusted middleware connecting the blockchain and the real world, the blockchain oracle can obtain trusted real-time price information for financial applications such as payment and settlement, and asset valuation... 详细信息
来源: 评论