咨询与建议

限定检索结果

文献类型

  • 4,432 篇 会议
  • 3,318 篇 期刊文献

馆藏范围

  • 7,750 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,202 篇 工学
    • 3,908 篇 计算机科学与技术...
    • 3,130 篇 软件工程
    • 1,329 篇 信息与通信工程
    • 645 篇 电气工程
    • 541 篇 控制科学与工程
    • 521 篇 电子科学与技术(可...
    • 442 篇 网络空间安全
    • 439 篇 生物工程
    • 298 篇 机械工程
    • 230 篇 光学工程
    • 224 篇 仪器科学与技术
    • 188 篇 生物医学工程(可授...
    • 162 篇 安全科学与工程
    • 148 篇 动力工程及工程热...
    • 144 篇 化学工程与技术
    • 126 篇 建筑学
    • 124 篇 交通运输工程
  • 2,279 篇 理学
    • 1,360 篇 数学
    • 498 篇 物理学
    • 475 篇 生物学
    • 420 篇 统计学(可授理学、...
    • 208 篇 系统科学
    • 165 篇 化学
  • 1,326 篇 管理学
    • 809 篇 管理科学与工程(可...
    • 573 篇 图书情报与档案管...
    • 289 篇 工商管理
  • 287 篇 法学
    • 167 篇 社会学
    • 118 篇 法学
  • 153 篇 医学
    • 126 篇 临床医学
  • 116 篇 经济学
    • 116 篇 应用经济学
  • 98 篇 军事学
  • 53 篇 农学
  • 42 篇 教育学
  • 24 篇 文学
  • 22 篇 艺术学

主题

  • 238 篇 feature extracti...
  • 227 篇 semantics
  • 216 篇 cryptography
  • 182 篇 authentication
  • 181 篇 information secu...
  • 161 篇 computational mo...
  • 157 篇 security
  • 150 篇 protocols
  • 142 篇 accuracy
  • 141 篇 privacy
  • 138 篇 deep learning
  • 125 篇 training
  • 122 篇 laboratories
  • 105 篇 data models
  • 99 篇 cloud computing
  • 96 篇 federated learni...
  • 94 篇 servers
  • 92 篇 public key crypt...
  • 92 篇 blockchain
  • 88 篇 data privacy

机构

  • 202 篇 shandong provinc...
  • 173 篇 key laboratory o...
  • 158 篇 school of comput...
  • 156 篇 state key labora...
  • 113 篇 school of comput...
  • 106 篇 department of co...
  • 106 篇 school of cyber ...
  • 97 篇 information secu...
  • 80 篇 key laboratory o...
  • 78 篇 institute of inf...
  • 70 篇 guangdong provin...
  • 65 篇 college of mathe...
  • 65 篇 state grid key l...
  • 63 篇 computer network...
  • 63 篇 university of ch...
  • 60 篇 peng cheng labor...
  • 59 篇 key laboratory o...
  • 59 篇 school of softwa...
  • 59 篇 school of comput...
  • 54 篇 key laboratory o...

作者

  • 54 篇 jianfeng ma
  • 53 篇 yang yang
  • 48 篇 ma jianfeng
  • 45 篇 yixian yang
  • 42 篇 ding yong
  • 41 篇 zheng wei-shi
  • 38 篇 huang qingming
  • 31 篇 cong runmin
  • 31 篇 zhang huanguo
  • 31 篇 xu an wang
  • 31 篇 hu yupu
  • 31 篇 yang yixian
  • 30 篇 wang wei
  • 28 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 27 篇 xu li
  • 26 篇 xie xiaohua
  • 24 篇 xinhong hei
  • 23 篇 liu xin

语言

  • 7,138 篇 英文
  • 349 篇 其他
  • 278 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory Computer Network and Information Security"
7750 条 记 录,以下是241-250 订阅
排序:
Dynamic Student Classification with Forgetting Mechanisms on Memory networks for Knowledge Tracing  5
Dynamic Student Classification with Forgetting Mechanisms on...
收藏 引用
5th International Conference on Intelligent Computing and Human-computer Interaction, ICHCI 2024
作者: Huang, Guimin Qin, Xiangqian School of Computer Science and Information Security Guilin University of Electronic Technology Guangxi Key Laboratory of Image and Graphic Intelligent Processing Guilin China
Knowledge Tracing (KT), a technique for modeling students' knowledge levels and predicting their future question-answering performance based on their historical answer data, is one of the key research areas to str... 详细信息
来源: 评论
A Personalized Recommendation Model based on Collaborative Filtering and Federated Learning for Cultural Tourism Attractions in Fujian-Taiwan
A Personalized Recommendation Model based on Collaborative F...
收藏 引用
2023 International Conference on Software and System Engineering, ICoSSE 2023
作者: Cai, Yunsen Gao, Haolin Liao, Junkai Li, Xinwei Xu, Yushan Xiong, Jinbo Fujian Normal University College of Computer and Cyber Security Fuzhou350117 China Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou350007 China
In the era of big data, the explosive growth of cultural tourism information should provide personalized and privacy requirements for people's travel. However, the existing travel recommendation algorithms have so... 详细信息
来源: 评论
Sentence Similarity Model based on Semantics and Syntax  5
Sentence Similarity Model based on Semantics and Syntax
收藏 引用
5th International Conference on Big Data and Artificial Intelligence and Software Engineering, ICBASE 2024
作者: Zhou, Ya Chen, Chen Huang, Guimin Guilin University of Electronic Technology School of Computer Science and Information Security Guangxi Key Laboratory of Image and Graphic Intelligent Processing Guilin China
In the research methods of sentence similarity, sentence similarity is often calculated from the semantic aspect, while the influence of syntactic structure is ignored. We propose an enhanced knowledge language repres... 详细信息
来源: 评论
Genetic-A* Algorithm-Based Routing for Continuous-Flow Microfluidic Biochip in Intelligent Digital Healthcare  18th
Genetic-A* Algorithm-Based Routing for Continuous-Flow Micr...
收藏 引用
18th International Conference on Green, Pervasive, and Cloud Computing, GPC 2023
作者: Huang, Huichang Yang, Zhongliao Zhong, Jiayuan Xu, Li Dong, Chen Bao, Ruishen College of Computer and Data Science Fuzhou University Fuzhou350116 China College of Computer and Cyber Security Fujian Normal University Fuzhou350007 China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou China
In the field of intelligent digital healthcare, Continuous-flow microfluidic biochip (CFMB) has become a research direction of widespread concern. CFMB integrates a large number of microvalves and large-scale microcha... 详细信息
来源: 评论
Multi-Label Open Set Recognition  38
Multi-Label Open Set Recognition
收藏 引用
38th Conference on Neural information Processing Systems, NeurIPS 2024
作者: Wang, Yi-Bo Hang, Jun-Yi Zhang, Min-Ling School of Computer Science and Engineering Southeast University Nanjing210096 China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education China
In multi-label learning, each training instance is associated with multiple labels simultaneously. Traditional multi-label learning studies primarily focus on closed set scenario, i.e. the class label set of test data...
来源: 评论
A divide-and-conquer reconstruction method for defending against adversarial example attacks
收藏 引用
Visual Intelligence 2024年 第1期2卷 1-17页
作者: Liu, Xiyao Hu, Jiaxin Yang, Qingying Jiang, Ming He, Jianbiao Fang, Hui School of Computer Science and Engineering Central South University Hunan Changsha 410083 China Guangxi Key Laboratory of Cryptography and Information Security School of Computer Science and Information Security Guilin University of Electronic Technology Guangxi Guilin China Department of Computer Science Loughborough University Loughborough LE113TU United Kingdom
In recent years, defending against adversarial examples has gained significant importance, leading to a growing body of research in this area. Among these studies, pre-processing defense approaches have emerged as a p... 详细信息
来源: 评论
SEAVER: Attention Reallocation for Mitigating Distractions in Language Models for Conditional Semantic Textual Similarity Measurement
SEAVER: Attention Reallocation for Mitigating Distractions i...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Li, Baixuan Fan, Yunlong Gao, Zhiqiang School of Computer Science and Engineering Southeast University Nanjing211189 China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education China
Conditional Semantic Textual Similarity (C-STS) introduces specific limiting conditions to the traditional Semantic Textual Similarity (STS) task, posing challenges for STS models. Language models employing cross-enco... 详细信息
来源: 评论
Binary Decomposition: A Problem Transformation Perspective for Open-Set Semi-Supervised Learning  41
Binary Decomposition: A Problem Transformation Perspective f...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Hang, Jun-Yi Zhang, Min-Ling School of Computer Science and Engineering Southeast University Nanjing210096 China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education China
Semi-supervised learning (SSL) is a classical machine learning paradigm dealing with labeled and unlabeled data. However, it often suffers performance degradation in real-world open-set scenarios, where unlabeled data... 详细信息
来源: 评论
A New HARQ Scheme for 5G Systems via Interleaved Superposition Retransmission
收藏 引用
China Communications 2023年 第4期20卷 1-11页
作者: Qianfan Wang Li Chen Xiao Ma School of Computer Science and Engineering Guangdong Key Laboratory of Information Security TechnologySun Yat-sen UniversityGuangzhou 510006China College of Computer Science Jiaying UniversityMeizhou 514015China School of Electronics and Information Technology Sun Yat-sen UniversityGuangzhou 510006China
Within the framework of the 5G new radio(NR),we propose a new hybrid automatic repeat request(HARQ)scheme to improve the throughput *** difference between the proposed scheme and the conventional one lies in the first... 详细信息
来源: 评论
Resource Binding and Module Placement Algorithms for Continuous-Flow Microfluidic Biochip in Intelligent Digital Healthcare  18th
Resource Binding and Module Placement Algorithms for Conti...
收藏 引用
18th International Conference on Green, Pervasive, and Cloud Computing, GPC 2023
作者: Yang, Zhongliao Huang, Huichang Liu, Zeyi Dong, Chen Xu, Li College of Computer and Data Science Fuzhou University Fuzhou350116 China College of Computer and Cyber Security Fujian Normal University Fuzhou350007 China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou China
Continuous-Flow Microfluidic Biochip (CFMB), with their integrated features, bring traditional biochemical experiments on a single chip to accomplish complex operations and reactions through precise control, efficient... 详细信息
来源: 评论