咨询与建议

限定检索结果

文献类型

  • 4,432 篇 会议
  • 3,318 篇 期刊文献

馆藏范围

  • 7,750 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,202 篇 工学
    • 3,908 篇 计算机科学与技术...
    • 3,130 篇 软件工程
    • 1,329 篇 信息与通信工程
    • 645 篇 电气工程
    • 541 篇 控制科学与工程
    • 521 篇 电子科学与技术(可...
    • 442 篇 网络空间安全
    • 439 篇 生物工程
    • 298 篇 机械工程
    • 230 篇 光学工程
    • 224 篇 仪器科学与技术
    • 188 篇 生物医学工程(可授...
    • 162 篇 安全科学与工程
    • 148 篇 动力工程及工程热...
    • 144 篇 化学工程与技术
    • 126 篇 建筑学
    • 124 篇 交通运输工程
  • 2,279 篇 理学
    • 1,360 篇 数学
    • 498 篇 物理学
    • 475 篇 生物学
    • 420 篇 统计学(可授理学、...
    • 208 篇 系统科学
    • 165 篇 化学
  • 1,326 篇 管理学
    • 809 篇 管理科学与工程(可...
    • 573 篇 图书情报与档案管...
    • 289 篇 工商管理
  • 287 篇 法学
    • 167 篇 社会学
    • 118 篇 法学
  • 153 篇 医学
    • 126 篇 临床医学
  • 116 篇 经济学
    • 116 篇 应用经济学
  • 98 篇 军事学
  • 53 篇 农学
  • 42 篇 教育学
  • 24 篇 文学
  • 22 篇 艺术学

主题

  • 238 篇 feature extracti...
  • 227 篇 semantics
  • 216 篇 cryptography
  • 182 篇 authentication
  • 181 篇 information secu...
  • 161 篇 computational mo...
  • 157 篇 security
  • 150 篇 protocols
  • 142 篇 accuracy
  • 141 篇 privacy
  • 138 篇 deep learning
  • 125 篇 training
  • 122 篇 laboratories
  • 105 篇 data models
  • 99 篇 cloud computing
  • 96 篇 federated learni...
  • 94 篇 servers
  • 92 篇 public key crypt...
  • 92 篇 blockchain
  • 88 篇 data privacy

机构

  • 202 篇 shandong provinc...
  • 173 篇 key laboratory o...
  • 158 篇 school of comput...
  • 156 篇 state key labora...
  • 113 篇 school of comput...
  • 106 篇 department of co...
  • 106 篇 school of cyber ...
  • 97 篇 information secu...
  • 80 篇 key laboratory o...
  • 78 篇 institute of inf...
  • 70 篇 guangdong provin...
  • 65 篇 college of mathe...
  • 65 篇 state grid key l...
  • 63 篇 computer network...
  • 63 篇 university of ch...
  • 60 篇 peng cheng labor...
  • 59 篇 key laboratory o...
  • 59 篇 school of softwa...
  • 59 篇 school of comput...
  • 54 篇 key laboratory o...

作者

  • 54 篇 jianfeng ma
  • 53 篇 yang yang
  • 48 篇 ma jianfeng
  • 45 篇 yixian yang
  • 42 篇 ding yong
  • 41 篇 zheng wei-shi
  • 38 篇 huang qingming
  • 31 篇 cong runmin
  • 31 篇 zhang huanguo
  • 31 篇 xu an wang
  • 31 篇 hu yupu
  • 31 篇 yang yixian
  • 30 篇 wang wei
  • 28 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 27 篇 xu li
  • 26 篇 xie xiaohua
  • 24 篇 xinhong hei
  • 23 篇 liu xin

语言

  • 7,138 篇 英文
  • 349 篇 其他
  • 278 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory Computer Network and Information Security"
7750 条 记 录,以下是121-130 订阅
排序:
Discriminative feature encoding for intrinsic image decomposition
收藏 引用
Computational Visual Media 2023年 第3期9卷 597-618页
作者: Zongji Wang Yunfei Liu Feng Lu Key Laboratory of Network Information System Technology(NIST) Aerospace Information Research InstituteChinese Academy of SciencesBeijing 100190China State Key Laboratory of Virtual Reality Technology and Systems School of Computer Science and EngineeringBeihang UniversityBeijing 100191China Peng Cheng Laboratory Shenzhen 518000China
Intrinsic image decomposition is an important and long-standing computer vision *** an input image,recovering the physical scene properties is *** physically motivated priors have been used to restrict the solution sp... 详细信息
来源: 评论
Reinforcement learning of non-additive joint steganographic embedding costs with attention mechanism
收藏 引用
Science China(information Sciences) 2023年 第3期66卷 273-286页
作者: Weixuan TANG Bin LI Weixiang LI Yuangen WANG Jiwu HUANG Institute of Artificial Intelligence and Blockchain Guangzhou University Guangdong Key Laboratory of Intelligent Information Processing Shenzhen Key Laboratory of Media Security Shenzhen University Shenzhen Institute of Artificial Intelligence and Robotics for Society School of Computer Science and Cyber Engineering Guangzhou University
Image steganography is the art and science of secure communication by concealing information within digital images. In recent years, the techniques of steganographic cost learning have developed rapidly. Although the ... 详细信息
来源: 评论
MBC-DTA: A Multi-Scale Bilinear Attention with Contrastive Learning Framework for Drug-Target Binding Affinity Prediction
MBC-DTA: A Multi-Scale Bilinear Attention with Contrastive L...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Li, Huiting Zhang, Weiyu Shang, Yong Lu, Wenpeng Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Jinan China
Drug-target binding affinity prediction is critical to drug design. Some existing computational methods rely on single-scale data and cannot fully integrate the rich information of multi-scale data, such as molecular ... 详细信息
来源: 评论
Anomaly-Free Prior Guided Knowledge Distillation for Industrial Anomaly Detection
Anomaly-Free Prior Guided Knowledge Distillation for Industr...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Li, Gang Chen, Tianjiao Li, Min Han, Delong Zhou, MingLe Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China City University of Macau Faculty of Data Science China
In industrial manufacturing, visual anomaly detection is critical for maintaining product quality by detecting and preventing production anomalies. Anomaly detection methods based on knowledge distillation demonstrate... 详细信息
来源: 评论
MemADet: A Representative Memory Bank Approach for Industrial Image Anomaly Detection
MemADet: A Representative Memory Bank Approach for Industria...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Li, Min He, Jinghui Ying, Zuobin Li, Gang Zhou, Mingle Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China City University of Macau Faculty of Data Science China
In the field of industrial production, anomaly detection is crucial for ensuring product quality and maintaining production efficiency. With the continuous advancement of computer vision technology, it has shown treme...
来源: 评论
JDC-GCN: joint diversity and consistency graph convolutional network
收藏 引用
Neural Computing and Applications 2025年 1-17页
作者: Lin, Renjie Yao, Jie Wang, Shiping Guo, Wenzhong College of Computer and Data Science Fuzhou University Fuzhou350116 China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou350116 China
In real-world scenarios, multi-view data comprises heterogeneous features, with each feature corresponding to a specific view. The objective of multi-view semi-supervised classification is to enhance classification pe... 详细信息
来源: 评论
Learning label-specific features for decomposition-based multi-class classification
收藏 引用
Frontiers of computer Science 2023年 第6期17卷 101-110页
作者: Bin-Bin JIA Jun-Ying LIU Jun-Yi HANG Min-Ling ZHANG College of Electrical and Information Engineering Lanzhou University of TechnologyLanzhou 730050China School of Computer Science and Engineering Southeast UniversityNanjing 210096China Key Laboratory of Computer Network and Information Integration(Ministry of Education) Southeast UniversityNanjing 210096China
Multi-class classification can be solved by decomposing it into a set of binary classification problems according to some encoding rules,e.g.,one-vs-one,one-vs-rest,error-correcting output *** works solve these binary... 详细信息
来源: 评论
Image Super-Resolution via Deep Dictionary Learning  12th
Image Super-Resolution via Deep Dictionary Learning
收藏 引用
12th International Conference on Image and Graphics, ICIG 2023
作者: Huang, Yi Bian, Weixin Jie, Biao Zhu, Zhiqiang Li, Wenhu School of Computer and Information Anhui Normal University Anhui Wuhu241002 China Anhui Provincial Key Laboratory of Network and Information Security Anhui Wuhu241002 China
The method of image super-resolution reconstruction through a dictionary usually only uses a single-layer dictionary, which not only fails to extract the deep features of the image, but also the trained dictionary may... 详细信息
来源: 评论
Binary Image Steganalysis Based on Symmetrical Local Residual Patterns
收藏 引用
Chinese Journal of Electronics 2022年 第4期31卷 752-763页
作者: LUO Junwei YU Mujian YIN Xiaolin LU Wei School of Computer Science and Engineering Guangdong Province Key Laboratory of Information Security TechnologyMinistry of Education Key Laboratory of Machine Intelligence and Advanced Computing Sun Yat-sen University
Residual computation is an effective method for gray-scale image steganalysis. For binary images, the residual computation calculated by the XOR operation is also employed in the local residual patterns(LRP) model for... 详细信息
来源: 评论
The dummy-based trajectory privacy protection method to resist correlation attacks in Internet of Vehicles
The dummy-based trajectory privacy protection method to resi...
收藏 引用
作者: Chen, Qiuling Ye, Ayong Zhao, Ziwen Xiong, Jinbo Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fujian Normal University Fuzhou China
Existing dummy-based trajectory privacy protection schemes do not take into account the correlation of multiple locations and whether the generated trajectory based on dummies matches the user's movement mode, whi... 详细信息
来源: 评论