咨询与建议

限定检索结果

文献类型

  • 557 篇 会议
  • 409 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 968 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 589 篇 工学
    • 424 篇 计算机科学与技术...
    • 349 篇 软件工程
    • 165 篇 信息与通信工程
    • 75 篇 控制科学与工程
    • 69 篇 电气工程
    • 62 篇 电子科学与技术(可...
    • 49 篇 生物工程
    • 42 篇 网络空间安全
    • 41 篇 机械工程
    • 29 篇 仪器科学与技术
    • 23 篇 光学工程
    • 17 篇 安全科学与工程
    • 16 篇 建筑学
    • 15 篇 交通运输工程
    • 15 篇 生物医学工程(可授...
    • 14 篇 土木工程
    • 11 篇 材料科学与工程(可...
  • 234 篇 理学
    • 151 篇 数学
    • 50 篇 生物学
    • 43 篇 统计学(可授理学、...
    • 37 篇 物理学
    • 30 篇 系统科学
    • 10 篇 化学
  • 138 篇 管理学
    • 79 篇 管理科学与工程(可...
    • 64 篇 图书情报与档案管...
    • 23 篇 工商管理
  • 20 篇 法学
    • 11 篇 社会学
    • 10 篇 法学
  • 12 篇 经济学
    • 12 篇 应用经济学
  • 12 篇 军事学
    • 11 篇 军队指挥学
  • 11 篇 医学
  • 4 篇 教育学
  • 2 篇 农学
  • 1 篇 文学

主题

  • 60 篇 feature extracti...
  • 52 篇 accuracy
  • 48 篇 semantics
  • 38 篇 computational mo...
  • 34 篇 cryptography
  • 32 篇 training
  • 30 篇 federated learni...
  • 26 篇 data models
  • 25 篇 deep learning
  • 22 篇 transformers
  • 22 篇 neural networks
  • 21 篇 authentication
  • 21 篇 security
  • 20 篇 object detection
  • 20 篇 wireless sensor ...
  • 19 篇 information secu...
  • 19 篇 protocols
  • 18 篇 visualization
  • 17 篇 privacy
  • 16 篇 noise

机构

  • 199 篇 shandong provinc...
  • 158 篇 key laboratory o...
  • 44 篇 shandong fundame...
  • 41 篇 shandong enginee...
  • 41 篇 key laboratory o...
  • 28 篇 key lab of educa...
  • 28 篇 pca lab key lab ...
  • 25 篇 school of comput...
  • 24 篇 key laboratory o...
  • 20 篇 ministry of educ...
  • 18 篇 college of compu...
  • 18 篇 guangxi key lab ...
  • 17 篇 pca lab key lab ...
  • 16 篇 ministry of educ...
  • 15 篇 qilu university ...
  • 15 篇 key laboratory o...
  • 15 篇 school of comput...
  • 15 篇 key laboratory o...
  • 13 篇 guangxi key lab ...
  • 13 篇 jiangsu high tec...

作者

  • 71 篇 yang jian
  • 33 篇 jianfeng ma
  • 32 篇 jian yang
  • 31 篇 meng deyu
  • 27 篇 hu yupu
  • 24 篇 ma jianfeng
  • 23 篇 xie jin
  • 22 篇 wang hui-ming
  • 17 篇 ma jian-feng
  • 16 篇 cao xiangyong
  • 15 篇 jiang haobo
  • 14 篇 pei qingqi
  • 13 篇 yang yang
  • 13 篇 qian jianjun
  • 13 篇 qingqi pei
  • 12 篇 xiaoming wu
  • 12 篇 li xiang
  • 12 篇 pang liaojun
  • 12 篇 wang ruchuan
  • 12 篇 gong chen

语言

  • 909 篇 英文
  • 30 篇 其他
  • 29 篇 中文
检索条件"机构=Key Lab. of Computer Networks and Information Security Ministry of Education"
968 条 记 录,以下是31-40 订阅
排序:
Efficient Adaptive lab.l Refinement for lab.l noise learning
收藏 引用
Neurocomputing 2025年 639卷
作者: Zhang, Wenzhen Cheng, Debo Lu, Guangquan Zhou, Bo Li, Jiaye Zhang, Shichao School of Computer Science and Engineering Guangxi Normal University Guangxi Guilin541004 China Guangxi Key Lab of Multi-Source Information Mining & Security Guangxi Normal University Guangxi Guilin541004 China Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guangxi Normal University Guangxi Guilin541004 China School of Computer Science and Technology Hainan University Hainan Haikou570228 China Guangxi Collaborative Innovation Center of Modern Sericulture and Silk Hechi University Guangxi Hechi546300 China The State Key Laboratory of Blockchain and Data Security Zhejiang University Zhejiang Hangzhou310027 China
Deep neural networks are highly susceptible to overfitting noisy lab.ls, which leads to degraded performance. Existing methods address this issue by employing complex manually designed strategies, aiming to achieve op... 详细信息
来源: 评论
A resynchronization attack on stream ciphers filtered by Maiorana-McFarland functions
收藏 引用
Frontiers of computer Science 2011年 第2期5卷 158-162页
作者: Wenfeng YANG Yupu HU Key Laboratory of Computer Networks and Information Security Ministry of Education Xidian University Xi'an 710071 China
A resynchronization attack is proposed on stream ciphers filtered by Maiorana-McFarland (M-M) functions and equipped with a linear resynchronization mechanism. The proposed attack utilizes the linear weakness of the... 详细信息
来源: 评论
Exploring Triple Knowledge Cues for Zero-Shot Human-Object Interaction Detection
Exploring Triple Knowledge Cues for Zero-Shot Human-Object I...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Fang Nan Ni Zhang Qidong Liu Wei Jing Guang Dai Yan Chen Feng Tian Faculty of Electronic and Information Engineering Xi’an Jiaotong University Xi’an China Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an China School of Automation Northwestern Polytechnical University Xi’an China Lenovo Research Bei Jing China SGIT AI Lab State Grid Corporation of China
Current zero-shot human-object interaction detection methods often follow a two-phase pipeline, which uses a pre-trained detector to detect instances and then adopts CLIP to perform interaction prediction. During the ... 详细信息
来源: 评论
Cryptanalysis of PRIMATEs
收藏 引用
Science China(information Sciences) 2020年 第1期63卷 130-139页
作者: Yanbin LI Meiqin WANG Wenqing LIU Wei WANG Key Laboratory of Cryptologic Technology and Information Security Ministry of EducationShandong University Shandong Provincial Key Laboratory of Computer Networks
PRIMATEs is a family of authenticated encryption design submitted to competition for authenticated encryption: security, applicability, and robustness. The three modes of operation in PRIMATEs family are: APE, HANUMAN... 详细信息
来源: 评论
ID-based Signcryption KEM to Multiple Recipients
收藏 引用
电子学报(英文版) 2011年 第2期20卷 317-322页
作者: SUN Yinxia LI Hui Key Laboratory of Computer Networks and Information Security Ministry of Education Xidian University Xi'an 710071 China
ID-based Signcryption K EM to M ultiple SUN Yinxia and LI Hui (key lab.ratory of computer networks and information security,ministry education,Xidian University,x an ***) Abstract-Identity based signcryption K ey enca... 详细信息
来源: 评论
Semantic and Emotional Dual Channel for Emotion Recognition in Conversation
收藏 引用
IEEE Transactions on Affective Computing 2025年
作者: Yang, Zhenyu Zhang, Zhibo Cheng, Yuhu Zhang, Tong Wang, Xuesong Jinan250353 China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250353 China China University of Mining and Technology Engineering Research Center of Intelligent Control for Underground Space Ministry of Education Xuzhou Key Laboratory of Artificial Intelligence and Big Data School of Information and Control Engineering Xuzhou221116 China South China University of Technology Guangdong Provincial Key Laboratory of Computational Intelligence and Cyberspace Information School of Computer Science and Engineering Guangzhou510006 China Pazhou Lab Guangzhou510335 China Engineering Research Center Ministry of Education on Health Intelligent Perception and Paralleled Digital-Human Guangzhou China
Emotion recognition in conversation (ERC) aims at accurately identifying emotional states expressed in conversational content. Existing ERC methods, although relying on semantic understanding, often encounter challeng... 详细信息
来源: 评论
Efficient quantum secret sharing scheme with two-particle entangled states
收藏 引用
Chinese Physics B 2011年 第4期20卷 59-64页
作者: 朱珍超 张玉清 付安民 Key Lab of Computer Networks and Information Security of Ministry of Education Xidian University National Computer Network Intrusion Protection Center Graduate University of the Chinese Academy of Sciences
This paper proposes a protocol for multi-party quantum secret sharing utilizing four non-orthogonal two-particle entangled states following some ideas in the schemes proposed by Liu et al. (2006 Chin. Phys. Lett. 23 ... 详细信息
来源: 评论
Two-step transmission with artificial noise for secure wireless SIMO communications
收藏 引用
Science China(information Sciences) 2015年 第4期58卷 115-127页
作者: WANG Bo MU PengCheng YANG PeiZhi YIN QinYe Ministry of Education Key Lab for Intelligent Networks and Network Security School of Electronic and Information Engineering Xi’an Jiaotong University
The issue of physical layer security of the wireless single-input multiple-output(SIMO) system is addressed in this paper. We propose a two-step transmission scheme with artificial noise to improve the security and th... 详细信息
来源: 评论
A 3D Memristive Cubic Map with Dual Discrete Memristors: Design, Implementation, and Application in Image Encryption
收藏 引用
IEEE Transactions on Circuits and Systems for Video Technology 2025年
作者: Gao, Suo Iu, Herbert Ho-Ching Erkan, Ugur Simsek, Cemaleddin Toktas, Abdurrahim Cao, Yinghong Wu, Rui Mou, Jun Li, Qi Wang, Chunpeng Dalian Polytechnic University School of Information Science and Engineering Dalian116034 China The University of Western Australia School of Electrical Electronic and Computer Engineering Perth6009 Australia Faculty of Engineering Electrical and Electronics Engineering Respectively Karamanoglu Mehmetbey University Karaman70200 Turkey Ankara University Engineering Faculty Department of Artificial Intelligence and Data Engineering Ankara06830 Turkey Harbin Institute of Technology School of Computer Science and Technology Harbin150001 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan250000 China
Discrete chaotic systems based on memristors exhibit excellent dynamical properties and are more straightforward to implement in hardware, making them highly suitable for generating cryptographic keystreams. However, ... 详细信息
来源: 评论
On the Joint Nonlinear Span of Multiple Binary Sequence
收藏 引用
电子学报(英文版) 2007年 第2期16卷 321-325页
作者: DONG Lihua HU Yupu The Key Laboratory of Computer Networks and Information Security the Ministry of Education Xidian University Xi'an 710071 China
Recent developments in stream ciphers show strong interests in word-based (or vectorized) stream ciphers. The theory of such stream ciphers required the study of the complexity of multisequences. In this paper the pro... 详细信息
来源: 评论