咨询与建议

限定检索结果

文献类型

  • 4,435 篇 会议
  • 3,397 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,840 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,280 篇 工学
    • 3,971 篇 计算机科学与技术...
    • 3,151 篇 软件工程
    • 1,357 篇 信息与通信工程
    • 695 篇 电气工程
    • 557 篇 控制科学与工程
    • 542 篇 电子科学与技术(可...
    • 455 篇 网络空间安全
    • 439 篇 生物工程
    • 303 篇 机械工程
    • 233 篇 光学工程
    • 224 篇 仪器科学与技术
    • 189 篇 生物医学工程(可授...
    • 168 篇 安全科学与工程
    • 148 篇 动力工程及工程热...
    • 145 篇 化学工程与技术
    • 133 篇 交通运输工程
    • 127 篇 建筑学
  • 2,305 篇 理学
    • 1,382 篇 数学
    • 506 篇 物理学
    • 475 篇 生物学
    • 430 篇 统计学(可授理学、...
    • 208 篇 系统科学
    • 165 篇 化学
  • 1,340 篇 管理学
    • 816 篇 管理科学与工程(可...
    • 584 篇 图书情报与档案管...
    • 290 篇 工商管理
  • 288 篇 法学
    • 167 篇 社会学
    • 119 篇 法学
  • 160 篇 医学
    • 130 篇 临床医学
    • 118 篇 基础医学(可授医学...
  • 117 篇 经济学
  • 98 篇 军事学
  • 54 篇 农学
  • 46 篇 教育学
  • 24 篇 文学
  • 22 篇 艺术学

主题

  • 239 篇 feature extracti...
  • 230 篇 semantics
  • 214 篇 cryptography
  • 182 篇 authentication
  • 181 篇 information secu...
  • 162 篇 computational mo...
  • 158 篇 security
  • 150 篇 protocols
  • 142 篇 accuracy
  • 140 篇 privacy
  • 139 篇 deep learning
  • 126 篇 training
  • 122 篇 laboratories
  • 106 篇 data models
  • 100 篇 federated learni...
  • 100 篇 cloud computing
  • 95 篇 servers
  • 93 篇 blockchain
  • 91 篇 public key crypt...
  • 88 篇 data privacy

机构

  • 203 篇 shandong provinc...
  • 174 篇 key laboratory o...
  • 158 篇 school of comput...
  • 155 篇 state key labora...
  • 114 篇 school of comput...
  • 106 篇 department of co...
  • 106 篇 school of cyber ...
  • 97 篇 information secu...
  • 80 篇 key laboratory o...
  • 79 篇 institute of inf...
  • 68 篇 guangdong provin...
  • 66 篇 computer network...
  • 65 篇 college of mathe...
  • 64 篇 university of ch...
  • 63 篇 state grid key l...
  • 62 篇 peng cheng labor...
  • 60 篇 key laboratory o...
  • 59 篇 school of softwa...
  • 59 篇 school of comput...
  • 55 篇 key laboratory o...

作者

  • 55 篇 jianfeng ma
  • 54 篇 yang yang
  • 50 篇 ma jianfeng
  • 45 篇 yixian yang
  • 41 篇 zheng wei-shi
  • 41 篇 ding yong
  • 38 篇 huang qingming
  • 33 篇 zhang huanguo
  • 32 篇 wang wei
  • 32 篇 hu yupu
  • 31 篇 cong runmin
  • 31 篇 xu an wang
  • 30 篇 yang yixian
  • 29 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 25 篇 xu li
  • 25 篇 xie xiaohua
  • 24 篇 xinhong hei
  • 23 篇 liu xin

语言

  • 7,214 篇 英文
  • 362 篇 其他
  • 277 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory Computer Network and Information Security"
7840 条 记 录,以下是91-100 订阅
排序:
Fine-Grained Zero-Shot Object Detection via Semantic Decoupling  24
Fine-Grained Zero-Shot Object Detection via Semantic Decoupl...
收藏 引用
8th International Conference on computer Science and Artificial Intelligence, CSAI 2024
作者: Duan, Lijuan Zhang, Zichen Gong, Zhi Beijing Key Laboratory of Trusted Computing Beijing University of Technology Beijing China School of Computer Science Beijing University of Technology Beijing China National Engineering Laboratory for Key Technologies of Information Security Level Protection Beijing China
Recent deep learning models have advanced object detection capabilities, but their reliance on labeled data limits scalability. Fine-grained zero-shot detection remains challenging due to the need to generalize to uns... 详细信息
来源: 评论
Reflectance Recovery Guided Learning of Illumination-Invariant Features for Person Re-Identification  18th
Reflectance Recovery Guided Learning of Illumination-Invari...
收藏 引用
18th Chinese Conference on Biometric Recognition, CCBR 2024
作者: Chen, Xianbiao Xie, Xiaohua School of Computer Science and Engineering Sun Yat-sen University Guangzhou China Guangdong Province Key Laboratory of Information Security Technology Guangzhou China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education Guangzhou China
In real-world scenarios, the changes of illumination are noticeable and can significantly impact the performance of re-identification (ReID) algorithms. However, the existing person ReID methods predominantly concentr... 详细信息
来源: 评论
A Byzantine Client Detection Method for Federated Learning Based on Encrypted Repeated Median Linear Regression  24
A Byzantine Client Detection Method for Federated Learning B...
收藏 引用
5th International Conference on computer Science and Management Technology, ICCSMT 2024
作者: Guo, Jinlong Yang, Ming Li, Huijuan Wu, Xiaoming He, Yunpeng Wang, Xin Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Shandong Jinan China Shandong Evayinfo Technology Co. Ltd. Shandong Jinan China
Federated learning is an emerging distributed machine learning technology that allows participants to jointly train machine learning models locally without the need for large-scale data transmission and sharing, there... 详细信息
来源: 评论
CurMIM: Curriculum Masked Image Modeling
CurMIM: Curriculum Masked Image Modeling
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Liu, Hao Wang, Kun Han, Yudong Wang, Haocong Hu, Yupeng Wang, Chunxiao Nie, Liqiang School of Software Shandong University Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology Shandong Academy of Sciences Jinan China School of Computer Science and Technology Harbin Institute of Technology Shenzhen China
Masked Image Modeling (MIM), following "mask-and-reconstruct" scheme, is a promising self-supervised method to learn scalable visual representation. Studies indicate that selecting an effective mask strategy... 详细信息
来源: 评论
Fine-grained Personalized Hierarchical Federated Learning towards Heterogeneous Internet of Vehicles
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 16349-16362页
作者: Zhang, Puning Shao, Shuman Wu, Chao Yang, Zhigang Zhang, Ruoying Chongqing University of Posts and Telecommunications School of Communications and Information Engineering Chongqing400065 China Chongqing Key Laboratory of Ubiquitous Sensing and Networking Advanced Network and Intelligent Connection Technology Key Laboratory of Chongqing Education Commission of China Chongqing400065 China Chongqing Innovation Center of Industrial Big-Data Co. Ltd National Engineering Laboratory for Industrial Big-data Application Technology Chongqing400707 China China Merchants Testing Vehicle Technology Research Institute Co. Ltd Chongqing404100 China Chongqing University of Posts and Telecommunications School of Cyber Security and Information Law Chongqing400065 China Chongqing Key Laboratory of Ubiquitous Sensing and Networking Advanced Network and Intelligent Connection Technology Key Laboratory of Chongqing Education Commission of China China China Academy of Information and Communications Beijing100083 China
High mobility and non-independent and identically distributed (non-iid) data in the Internet of Vehicles (IoV) pose challenges for the convergence speed and accuracy of federated learning model training. Traditional f... 详细信息
来源: 评论
PyionNet: Pyramid Progressive Cross-Fusion network for Joint Classification of Hyperspectral and LiDAR Data
收藏 引用
IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing 2025年 18卷 12042-12058页
作者: Pan, Haizhu Zhang, Quanxiu Ge, Haimiao Liu, Moqi Shi, Cuiping Qiqihar University College of Computer and Control Engineering Qiqihar161000 China Qiqihar University Heilongjiang Key Laboratory of Big Data Network Security Detection and Analysis Qiqihar161000 China Xi'an Jiaotong University School of Information and Communications Engineering Shanxi Xi'an710049 China Huzhou University College of Information Engineering Huzhou313000 China
Joint hyperspectral (HS) and Light Detection and Ranging (LiDAR) data for land cover classification have received widespread attention. Nevertheless, existing methods often struggle with multi-scale feature extraction... 详细信息
来源: 评论
A two-path fiber-optic AE demodulation algorithm based on Numerically Stable Direct Least Squares Fitting of Ellipses
收藏 引用
Journal of Lightwave Technology 2025年
作者: Li, Xinhao Zhang, Faxiang Sun, Zhihui Jiang, Shaodong Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
The 3 × 3 coupler demodulation algorithm commonly employs ellipse fitting algorithms (EFAs) to eliminate coupler asymmetry. In the detection scenario of fiber-optic acoustic emission (AE) sensor arrays, the amoun... 详细信息
来源: 评论
A Fast recognition method for DVS perimeter security intrusion signals based on transfer learning
收藏 引用
Optical Fiber Technology 2025年 93卷
作者: Shen, Yongxu Wang, Chang Sun, Zhihui Zhang, Faxiang Jiang, Shaodong Liu, Xu Gao, Fengxia Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
In the perimeter security intrusion signal monitoring based on the Distributed Optical Fiber Vibration Sensing (DVS) system, the common approach for identifying intrusion signals in new scenarios is to collect large a... 详细信息
来源: 评论
Non-deterministic symmetric encryption communication system based on generative adversarial networks
收藏 引用
China Communications 2025年 第5期22卷 273-284页
作者: Wu Xuguang Han Yiliang Zhang Minqing Zhu Shuaishuai Li Yu College of Cryptography Engineering Engineering University of People's Armed Police Xi'an 710086 China Key Laboratory of Network and Information Security Under the People's Armed Police Xi'an 710086 China
Symmetric encryption algorithms learned by the previous proposed end-to-end adversarial network encryption communication systems are deterministic. With the same key and same plaintext, the deterministic algorithm wil... 详细信息
来源: 评论
VFLMonitor: Defending One-Party Hijacking Attacks in Vertical Federated Learning
收藏 引用
IEEE Transactions on information Forensics and security 2025年 20卷 4828-4843页
作者: Xu, Xiangrui Zhao, Yiwen Han, Yufei Zhu, Yongsheng Han, Zhen Xu, Guangquan Wang, Bin Ji, Shouling Wang, Wei Qingdao University of Science and Technology School of Information Science and Technology Qingdao266061 China University of Southern California Thomas Lord Department of Computer Science Los AngelesCA90007 United States INRIA Brittany Rennes35042 France Institute of Computing Technologies China Academy of Railway Sciences Corporation Ltd. Beijing100081 China Beijing Jiaotong University Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing100044 China College of Intelligence and Computing Tianjin300072 China Network and Data Security Hangzhou310053 China Zhejiang University College of Computer Science and Technology Zhejiang 310058 China Xi’an Jiaotong University Ministry of Education Key Laboratory for Intelligent Networks and Network Security Xi’an710049 China
Vertical Federated Learning (VFL) is susceptible to various one-party hijacking attacks, such as Replay and Generation attacks, where a single malicious client can manipulate the model to produce attacker-specified re... 详细信息
来源: 评论