咨询与建议

限定检索结果

文献类型

  • 568 篇 会议
  • 418 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 988 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 603 篇 工学
    • 437 篇 计算机科学与技术...
    • 363 篇 软件工程
    • 169 篇 信息与通信工程
    • 76 篇 控制科学与工程
    • 68 篇 电气工程
    • 62 篇 电子科学与技术(可...
    • 48 篇 生物工程
    • 42 篇 网络空间安全
    • 41 篇 机械工程
    • 29 篇 仪器科学与技术
    • 23 篇 光学工程
    • 17 篇 安全科学与工程
    • 16 篇 建筑学
    • 15 篇 土木工程
    • 15 篇 交通运输工程
    • 15 篇 生物医学工程(可授...
    • 11 篇 材料科学与工程(可...
  • 241 篇 理学
    • 158 篇 数学
    • 50 篇 生物学
    • 45 篇 统计学(可授理学、...
    • 37 篇 物理学
    • 30 篇 系统科学
    • 10 篇 化学
  • 142 篇 管理学
    • 81 篇 管理科学与工程(可...
    • 66 篇 图书情报与档案管...
    • 23 篇 工商管理
  • 21 篇 法学
    • 12 篇 社会学
    • 10 篇 法学
  • 13 篇 医学
  • 12 篇 经济学
    • 12 篇 应用经济学
  • 12 篇 军事学
    • 11 篇 军队指挥学
  • 4 篇 教育学
  • 1 篇 文学
  • 1 篇 农学

主题

  • 60 篇 feature extracti...
  • 52 篇 accuracy
  • 50 篇 semantics
  • 37 篇 computational mo...
  • 37 篇 cryptography
  • 31 篇 training
  • 30 篇 federated learni...
  • 26 篇 data models
  • 25 篇 deep learning
  • 22 篇 transformers
  • 22 篇 neural networks
  • 21 篇 authentication
  • 21 篇 wireless sensor ...
  • 21 篇 security
  • 20 篇 object detection
  • 19 篇 information secu...
  • 19 篇 protocols
  • 18 篇 visualization
  • 17 篇 privacy
  • 16 篇 public key crypt...

机构

  • 200 篇 shandong provinc...
  • 158 篇 key laboratory o...
  • 43 篇 shandong fundame...
  • 41 篇 shandong enginee...
  • 41 篇 key laboratory o...
  • 28 篇 key lab of educa...
  • 27 篇 pca lab key lab ...
  • 27 篇 school of comput...
  • 24 篇 key laboratory o...
  • 20 篇 ministry of educ...
  • 18 篇 college of compu...
  • 18 篇 guangxi key lab ...
  • 17 篇 pca lab key lab ...
  • 16 篇 ministry of educ...
  • 15 篇 qilu university ...
  • 15 篇 key laboratory o...
  • 15 篇 school of comput...
  • 15 篇 key laboratory o...
  • 14 篇 guangxi key lab ...
  • 13 篇 jiangsu high tec...

作者

  • 71 篇 yang jian
  • 33 篇 jianfeng ma
  • 32 篇 jian yang
  • 31 篇 meng deyu
  • 24 篇 hu yupu
  • 23 篇 xie jin
  • 22 篇 ma jianfeng
  • 22 篇 wang hui-ming
  • 18 篇 ma jian-feng
  • 16 篇 cao xiangyong
  • 15 篇 jiang haobo
  • 14 篇 yang yang
  • 14 篇 pei qingqi
  • 13 篇 qian jianjun
  • 13 篇 qingqi pei
  • 12 篇 xiaoming wu
  • 12 篇 li xiang
  • 12 篇 pang liaojun
  • 12 篇 wang ruchuan
  • 12 篇 gong chen

语言

  • 921 篇 英文
  • 36 篇 中文
  • 31 篇 其他
检索条件"机构=Key Lab. of the Ministry of Education for Computer Networks and Information Security"
988 条 记 录,以下是1-10 订阅
排序:
Robust Hashing with Deep Features and Meixner Moments for Image Copy Detection
收藏 引用
ACM Transactions on Multimedia Computing, Communications and Applications 2024年 第12期20卷 1-23页
作者: Yu, Mengzhu Tang, Zhenjun Liang, Xiaoping Zhang, Xianquan Li, Zhixin Zhang, Xinpeng Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guangxi Key Lab of Multi-Source Information Mining and Security Guangxi Normal University Guilin China School of Computer Science Fudan University Shanghai China
Copy detection is a key task of image copyright protection. Most robust hashing schemes do not make satisfied performance of image copy detection yet. To address this, a robust hashing scheme with deep features and Me... 详细信息
来源: 评论
Lip-Audio Modality Fusion for Deep Forgery Video Detection
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 3499-3515页
作者: Yong Liu Zhiyu Wang Shouling Ji Daofu Gong Lanxin Cheng Ruosi Cheng College of Cyberspace Security Information Engineering UniversityZhengzhou450001China Research Institute of Intelligent Networks Zhejiang LabHangzhou311121China College of Computer Science and Technology Zhejiang UniversityHangzhou310027China Henan Key Laboratory of Cyberspace Situation Awareness Zhengzhou450001China Key Laboratory of Cyberspace Security Ministry of EducationZhengzhou450001China
In response to the problem of traditional methods ignoring audio modality tampering, this study aims to explore an effective deep forgery video detection technique that improves detection precision and reliability by ... 详细信息
来源: 评论
Fusion of Time-Frequency Features in Contrastive Learning for Shipboard Wind Speed Correction
收藏 引用
Journal of Ocean University of China 2025年 第2期24卷 377-386页
作者: SONG Jian HUANG Meng LI Xiang ZHANG Zhenqiang WANG Chunxiao ZHAO Zhigang Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science Center(National Supercomputer Center in Jinan)Qilu University of Technology(Shandong Academy of Sciences)Jinan 250000China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer ScienceJinan 250000China
Accurate wind speed measurements on maritime vessels are crucial for weather forecasting,sea state prediction,and safe ***,vessel motion and challenging environmental conditions often affect measurement *** address th... 详细信息
来源: 评论
BTP-CAResNet: An Encrypted Traffic Classification Method Based on Byte Transfer Probability and Coordinate Attention Mechanism
BTP-CAResNet: An Encrypted Traffic Classification Method Bas...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Li, Junhao Shi, Huiling Zhang, Wei Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
With the extensive application of network traffic encryption technology, the accurate and efficient classification of encrypted traffic has become a critical need for network management. Deep learning has become the p... 详细信息
来源: 评论
CB-YOLO: A Small Object Detection Algorithm for Industrial Scenarios
CB-YOLO: A Small Object Detection Algorithm for Industrial S...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Chen, Hao Wu, Xiaoming Su, Zhanzhi Zhao, Ying Dong, Yunfeng Liu, Xiangzhi Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
In certain specific industrial scenarios, smoking and cellphone usage are strictly prohibited behaviors. In these scenarios, it is crucial to rapidly and accurately detect smoking and cell phone usage, and promptly is... 详细信息
来源: 评论
RFSD-YOLO: An Enhanced X-Ray Object Detection Model for Prohibited Items
RFSD-YOLO: An Enhanced X-Ray Object Detection Model for Proh...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Kong, Xiaotong Li, Aimin Li, Wenqiang Li, Zhiyao Zhang, Yuechen Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
X-ray image detection is essential for ensuring public safety, but traditional methods rely heavily on human analysis and are relatively inefficient. To address this issue, this paper proposes a new object detection m... 详细信息
来源: 评论
A Sharding Scheme Based on Graph Partitioning Algorithm for Public Blockchain
收藏 引用
computer Modeling in Engineering & Sciences 2024年 第6期139卷 3311-3327页
作者: Shujiang Xu Ziye Wang Lianhai Wang Miodrag J.Mihaljevi′c Shuhui Zhang Wei Shao Qizheng Wang Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science CenterQilu University of Technology(Shandong Academy of Sciences)Jinan250014China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer ScienceJinan250014China Mathematical Institute The Serbian Academy of Sciences and ArtsBelgrade11000Serbia
Blockchain technology,with its attributes of decentralization,immutability,and traceability,has emerged as a powerful catalyst for enhancing traditional industries in terms of optimizing business ***,transaction perfo... 详细信息
来源: 评论
MUNE: A Multi-Level User-News Embedding Model for Personalised News Recommendations  24
MUNE: A Multi-Level User-News Embedding Model for Personalis...
收藏 引用
8th International Conference on computer Science and Artificial Intelligence, CSAI 2024
作者: Long, Haixiang Luo, Xudong School of Computer Science and Engineering Guangxi Key Lab of Multi-Source Information Mining & Security Key Lab of Education Blockchain and Intelligent Technology of Ministry of Education Guangxi Normal University Guangxi Guilin China
Personalised news recommendation systems are critical for delivering relevant content, but effectively capturing and modelling users’ diverse and evolving interests is challenging. In this paper, we introduce a Multi... 详细信息
来源: 评论
Neural Network-Based State Estimation for Nonlinear Systems With Denial-of-Service Attack Under Try-Once-Discard Protocol
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第10期11卷 2182-2184页
作者: Xueli Wang Shangwei Zhao Ming Yang Xin Wang Xiaoming Wu the Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science CenterQilu University of Technology(Shandong Academy of Sciences)Jinan 250014 Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer ScienceJinan 250014China Department of Automation Shanghai Jiao Tong UniversityShanghai 200240China
Dear Editor,This letter deals with state estimation issues of discrete-time nonlinear systems subject to denial-of-service(DoS)attacks under the try-once-discard(TOD)*** specifically,to reduce the communication burden... 详细信息
来源: 评论
Text-based person search by non-saliency enhancing and dynamic lab.l smoothing
收藏 引用
Neural Computing and Applications 2024年 第21期36卷 13327-13339页
作者: Pang, Yonghua Zhang, Canlong Li, Zhixin Wei, Chunrong Wang, Zhiwen Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guangxi Normal University Guilin China Guangxi Key Lab of Multi-source Information Mining and Security Guangxi Normal University Guilin541004 China School of Computer Science and Technology Guangxi University of Science and Technology Liuzhou545006 China
The current text-based person re-identification (re-ID) models tend to learn salient features of image and text, which however is prone to failure in identifying persons with very similar dress, because their image co... 详细信息
来源: 评论