咨询与建议

限定检索结果

文献类型

  • 4,511 篇 会议
  • 3,407 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,926 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,322 篇 工学
    • 4,005 篇 计算机科学与技术...
    • 3,158 篇 软件工程
    • 1,357 篇 信息与通信工程
    • 658 篇 电气工程
    • 588 篇 控制科学与工程
    • 531 篇 电子科学与技术(可...
    • 452 篇 网络空间安全
    • 440 篇 生物工程
    • 301 篇 机械工程
    • 233 篇 光学工程
    • 224 篇 仪器科学与技术
    • 188 篇 生物医学工程(可授...
    • 165 篇 安全科学与工程
    • 153 篇 动力工程及工程热...
    • 147 篇 化学工程与技术
    • 129 篇 建筑学
    • 127 篇 交通运输工程
  • 2,306 篇 理学
    • 1,374 篇 数学
    • 504 篇 物理学
    • 478 篇 生物学
    • 425 篇 统计学(可授理学、...
    • 207 篇 系统科学
    • 167 篇 化学
  • 1,340 篇 管理学
    • 818 篇 管理科学与工程(可...
    • 579 篇 图书情报与档案管...
    • 295 篇 工商管理
  • 287 篇 法学
    • 167 篇 社会学
    • 118 篇 法学
  • 156 篇 医学
    • 128 篇 临床医学
  • 116 篇 经济学
    • 116 篇 应用经济学
  • 99 篇 军事学
  • 54 篇 农学
  • 44 篇 教育学
  • 24 篇 文学
  • 23 篇 艺术学

主题

  • 238 篇 feature extracti...
  • 229 篇 semantics
  • 214 篇 cryptography
  • 184 篇 authentication
  • 181 篇 information secu...
  • 163 篇 computational mo...
  • 160 篇 security
  • 151 篇 protocols
  • 144 篇 deep learning
  • 144 篇 accuracy
  • 139 篇 privacy
  • 122 篇 laboratories
  • 122 篇 training
  • 103 篇 data models
  • 102 篇 federated learni...
  • 99 篇 cloud computing
  • 94 篇 servers
  • 92 篇 public key crypt...
  • 92 篇 blockchain
  • 89 篇 data privacy

机构

  • 204 篇 shandong provinc...
  • 179 篇 key laboratory o...
  • 166 篇 school of comput...
  • 151 篇 state key labora...
  • 112 篇 school of comput...
  • 111 篇 school of cyber ...
  • 106 篇 department of co...
  • 98 篇 information secu...
  • 84 篇 key laboratory o...
  • 81 篇 institute of inf...
  • 67 篇 computer network...
  • 67 篇 guangdong provin...
  • 66 篇 university of ch...
  • 64 篇 college of mathe...
  • 64 篇 state grid key l...
  • 63 篇 peng cheng labor...
  • 60 篇 key laboratory o...
  • 59 篇 school of softwa...
  • 57 篇 school of comput...
  • 56 篇 key laboratory o...

作者

  • 55 篇 jianfeng ma
  • 53 篇 yang yang
  • 49 篇 ma jianfeng
  • 45 篇 yixian yang
  • 43 篇 ding yong
  • 41 篇 zheng wei-shi
  • 38 篇 huang qingming
  • 31 篇 cong runmin
  • 31 篇 wang wei
  • 31 篇 zhang huanguo
  • 31 篇 hu yupu
  • 30 篇 xu an wang
  • 30 篇 yang yixian
  • 29 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 27 篇 min-ling zhang
  • 25 篇 xie xiaohua
  • 24 篇 liu xin
  • 23 篇 wang yujue

语言

  • 7,128 篇 英文
  • 536 篇 其他
  • 282 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory Computer Network and Information Security"
7926 条 记 录,以下是211-220 订阅
排序:
Enhancing Parameter-Efficient Transformers with Contrastive Syntax and Regularized Dropout for Neural Machine Translation  21st
Enhancing Parameter-Efficient Transformers with Contrastive...
收藏 引用
21st Pacific Rim International Conference on Artificial Intelligence, PRICAI 2024
作者: Fan, Yunlong Yang, Zhiheng Li, Baixuan Gao, Zhiqiang School of Computer Science and Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Nanjing China
Transformers have significantly improved Neural Machine Translation (NMT) models, accompanied by the inherent space complexity of O(n2). While recent approaches aim to be parameter-efficient, they often exhibit limite... 详细信息
来源: 评论
Associative Task Computation Offloading for Industrial Internet of Things  16
Associative Task Computation Offloading for Industrial Inter...
收藏 引用
16th International Conference on Wireless Communications and Signal Processing, WCSP 2024
作者: Jiang, Fan Zhang, Hang Liu, Lei Wang, Chaowei Xian University of Posts and Telecommunications Shaanxi Key Laboratory of Information Communication Network and Security Xi'an China Beijing University of Posts and Telecommunications Beijing China
In this paper, we propose a computational offloading strategy tailored for multiple industrial equipment (IE) within an Industrial Internet of Things (IIoT) framework. Our primary focus is on addressing the computatio... 详细信息
来源: 评论
LESaET: Low-Dimensional Embedding Method for Link Prediction Combining Self-Attention and Enhanced-TuckER
LESaET: Low-Dimensional Embedding Method for Link Prediction...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Ding, Lichao Zhao, Jing Lu, Kai Hao, Zenghao Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Knowledge graphs (KGs) provide a structured representation of the real world through entity-relation triples. However, current KGs are often incomplete, typically containing only a small fraction of all possible facts... 详细信息
来源: 评论
Secrecy Communications for Wireless-Powered Full-Duplex Cooperative NOMA Systems: A User Selection and Friendly Jamming Approach
Secrecy Communications for Wireless-Powered Full-Duplex Coop...
收藏 引用
2023 IEEE/CIC International Conference on Communications in China, ICCC Workshops 2023
作者: Ren, Yuan Ren, Jing Zhang, Xuewei Lu, Guangyue Xi'an University of Posts and Telecommunications Shaanxi Key Laboratory of Information Communication Network and Security School of Communications and Information Engineering Xi'an710121 China
This paper studies the secure communications of a wireless-powered full-duplex cooperative non-orthogonal multiple access (CoNOMA) system with a source node, a group of near users, a far user and an external eavesdrop... 详细信息
来源: 评论
Privacy-Preserving Access Control Model for E-Medical Systems  2
Privacy-Preserving Access Control Model for E-Medical System...
收藏 引用
2nd International Conference on Big Data and Privacy Computing, BDPC 2024
作者: Cai, Rongsheng Chen, Lanxiang Zhu, Yizhao City University of Macau Faculty of Data Science 999078 China College of Computer and Cyber Security Fujian Normal University Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou China
With the high speed development of information technology, the healthcare system increasingly relies on cloud servers for data storage and complex computation, patient data privacy issues stem from healthcare systems&... 详细信息
来源: 评论
Trajectory Planning of Rechargeable UAVs for AoS Minimization in IoT networks  16
Trajectory Planning of Rechargeable UAVs for AoS Minimizatio...
收藏 引用
16th International Conference on Wireless Communications and Signal Processing, WCSP 2024
作者: Liu, Yunchao Lin, Suling Gong, Jie School of Computer Science and Engineering Sun Yat-sen University Guangdong Key Laboratory of Information Security Technology Guangzhou510006 China
Freshness of information is a critical issue for real-time Internet of Things (IoT) applications. Unmanned aerial vehicles (UAVs), due to their high flexibility and low cost, are widely deployed in time-sensitive IoT ... 详细信息
来源: 评论
Privacy-Preserving Multi-Party Machine Learning Based on Trusted Execution Environment and GPU Accelerator  12
Privacy-Preserving Multi-Party Machine Learning Based on Tru...
收藏 引用
12th IEEE International Conference on information and Communication networks, ICICN 2024
作者: Tian, Haibo Ren, Shuangyin Chen, Chao School of Computer Science and Engineering Sun Yat-Sen University Guangdong Province Key Laboratory of Information Security Technology Guangzhou China
In multi-party machine learning scenarios involving sensitive data, safeguarding user and model privacy holds utmost importance. Current approaches often disclose model parameters to expedite training, but this poses ... 详细信息
来源: 评论
YOLOv8-GR: Gesture Recognition by Improving of YOLOv8 Algorithm  12
YOLOv8-GR: Gesture Recognition by Improving of YOLOv8 Algori...
收藏 引用
12th International Conference on Advanced Cloud and Big Data, CBD 2024
作者: Ding, Yi Guo, Naixuan Meng, Haitao School of Information Engineering Yancheng Institute of Technology Yancheng China Southeast University Ministry of Education Key Laboratory of Computer Network and Information Integration China
Gesture recognition has been widely used in many situations, such as human-computer interaction, virtual reality and smart home. To meet the current demands for accuracy and speed in gesture recognition, this paper pr... 详细信息
来源: 评论
m2Vib: 2D Vibration Measurement Using a Single mmWave Radar  30
m2Vib: 2D Vibration Measurement Using a Single mmWave Radar
收藏 引用
30th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2024
作者: Wang, Haolin Xu, Wei Li, Zezhao Yang, Yanni Huang, Zhijian Shandong University School of Computer Science and Technology Qingdao China National Key Laboratory of Science and Technology on Information System Security China
Two-dimensional vibration measurement is essential for monitoring structure and machine health, especially providing more information than those 1D solutions. However, most existing 2D vibration monitoring methods req... 详细信息
来源: 评论
DP-GenFL: a local differentially private federated learning system through generative data
收藏 引用
Science China(information Sciences) 2023年 第8期66卷 275-276页
作者: Jun LI Kang WEI Chuan MA Feng SHU School of Electronic and Optical Engineering Nanjing University of Science and Technology Zhejiang Lab Key Laboratory of Computer Network and Information Integration (Southeast University) Ministry of Education School of Information and Communication Engineering Hainan University
With the rapid development of the Internet of Things(Io T),the amount of data from intelligent devices is propagating at unprecedented scales. Meanwhile, machine learning(ML),which relies heavily on such data, is revo... 详细信息
来源: 评论