咨询与建议

限定检索结果

文献类型

  • 4,446 篇 会议
  • 3,330 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,784 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,204 篇 工学
    • 3,909 篇 计算机科学与技术...
    • 3,119 篇 软件工程
    • 1,328 篇 信息与通信工程
    • 638 篇 电气工程
    • 539 篇 控制科学与工程
    • 520 篇 电子科学与技术(可...
    • 441 篇 网络空间安全
    • 439 篇 生物工程
    • 298 篇 机械工程
    • 230 篇 光学工程
    • 223 篇 仪器科学与技术
    • 188 篇 生物医学工程(可授...
    • 162 篇 安全科学与工程
    • 149 篇 动力工程及工程热...
    • 145 篇 化学工程与技术
    • 125 篇 建筑学
    • 124 篇 交通运输工程
  • 2,278 篇 理学
    • 1,357 篇 数学
    • 498 篇 物理学
    • 476 篇 生物学
    • 419 篇 统计学(可授理学、...
    • 207 篇 系统科学
    • 164 篇 化学
  • 1,324 篇 管理学
    • 807 篇 管理科学与工程(可...
    • 573 篇 图书情报与档案管...
    • 289 篇 工商管理
  • 286 篇 法学
    • 167 篇 社会学
    • 117 篇 法学
  • 153 篇 医学
    • 126 篇 临床医学
  • 116 篇 经济学
    • 116 篇 应用经济学
  • 98 篇 军事学
  • 54 篇 农学
  • 42 篇 教育学
  • 24 篇 文学
  • 22 篇 艺术学

主题

  • 237 篇 feature extracti...
  • 229 篇 semantics
  • 216 篇 cryptography
  • 182 篇 authentication
  • 181 篇 information secu...
  • 163 篇 computational mo...
  • 158 篇 security
  • 151 篇 protocols
  • 143 篇 accuracy
  • 140 篇 privacy
  • 138 篇 deep learning
  • 123 篇 training
  • 122 篇 laboratories
  • 104 篇 data models
  • 99 篇 cloud computing
  • 98 篇 federated learni...
  • 94 篇 servers
  • 92 篇 public key crypt...
  • 92 篇 blockchain
  • 88 篇 data privacy

机构

  • 203 篇 shandong provinc...
  • 175 篇 key laboratory o...
  • 158 篇 school of comput...
  • 155 篇 state key labora...
  • 111 篇 school of comput...
  • 107 篇 school of cyber ...
  • 106 篇 department of co...
  • 97 篇 information secu...
  • 80 篇 key laboratory o...
  • 78 篇 institute of inf...
  • 66 篇 guangdong provin...
  • 65 篇 computer network...
  • 65 篇 university of ch...
  • 65 篇 state grid key l...
  • 64 篇 college of mathe...
  • 61 篇 peng cheng labor...
  • 60 篇 key laboratory o...
  • 59 篇 school of softwa...
  • 55 篇 school of comput...
  • 54 篇 key laboratory o...

作者

  • 55 篇 jianfeng ma
  • 53 篇 yang yang
  • 48 篇 ma jianfeng
  • 45 篇 yixian yang
  • 42 篇 ding yong
  • 41 篇 zheng wei-shi
  • 38 篇 huang qingming
  • 31 篇 cong runmin
  • 31 篇 zhang huanguo
  • 31 篇 xu an wang
  • 31 篇 hu yupu
  • 30 篇 wang wei
  • 30 篇 yang yixian
  • 28 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 26 篇 min-ling zhang
  • 24 篇 xinhong hei
  • 24 篇 xu li
  • 24 篇 xie xiaohua

语言

  • 7,179 篇 英文
  • 343 篇 其他
  • 277 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory Computer Network and Information Security"
7784 条 记 录,以下是301-310 订阅
排序:
Enhancing Stance Detection on Social Media via Core Views Discovery  27
Enhancing Stance Detection on Social Media via Core Views Di...
收藏 引用
27th European Conference on Artificial Intelligence, ECAI 2024
作者: Yan, Yu Shen, Yinghan Liu, Teli Jiang, Xuhui Yin, Dechun School of Information and Network Security People Public Security University of China China Institute of Computing Technology Chinese Academy of Sciences China Key Laboratory of AI Safety Institute of Computing Technology Chinese Academy of Sciences China
Stance detection aims to identify the expressed attitude towards a target from the text, which is significant for learning public cognition from social media. The short and implicit nature of social media users' e... 详细信息
来源: 评论
DRL-Based Time-Varying Workload Scheduling With Priority and Resource Awareness
收藏 引用
IEEE Transactions on network and Service Management 2025年 第3期22卷 2838-2852页
作者: Liu, Qifeng Fan, Qilin Zhang, Xu Li, Xiuhua Wang, Kai Xiong, Qingyu Chongqing University School of Big Data and Software Engineering Chongqing400044 China Chongqing University Key Laboratory of Dependable Service Computing in Cyber Physical Society of Ministry of Education Chongqing400044 China Nanjing University School of Electronic Science and Engineering Nanjing210023 China Haihe Laboratory of Information Technology Application Innovation Tianjin300072 China Harbin Institute of Technology School of Computer Science and Technology Weihai264209 China Shandong Key Laboratory of Industrial Network Security Weihai264209 China
With the proliferation of cloud services and the continuous growth in enterprises' demand for dynamic multi-dimensional resources, the implementation of effective strategy for time-varying workload scheduling has ... 详细信息
来源: 评论
Towards Privacy-Preserving and Practical Vaccine Supply Chain based on Blockchain  18
Towards Privacy-Preserving and Practical Vaccine Supply Chai...
收藏 引用
18th Asia Joint Conference on information security, AsiaJCIS 2023
作者: Wen, Baodong Wang, Yujue Ding, Yong Liang, Hai Yang, Changsong Luo, Decun Hangzhou Innovation Institute of Beihang University Hangzhou China Guilin University of Electronic Technology Guangxi Key Laboratory of Cryptography and Information Security School of Computer Science and Information Security Guilin China Pengcheng Laboratory Cyberspace Security Research Center Shenzhen China
Vaccines play a vital role in safeguarding people's health and improving their well-being. With the increase in the variety and number of infectious diseases, the importance of vaccination cannot be underestimated... 详细信息
来源: 评论
Post-quantum Dropout-Resilient Aggregation for Federated Learning via Lattice-Based PRF  1st
Post-quantum Dropout-Resilient Aggregation for Federated Le...
收藏 引用
1st International Conference on Artificial Intelligence security and Privacy, AIS and P 2023
作者: Zuo, Ruozhou Tian, Haibo Zhang, Fangguo School of Computer Science and Engineering Sun Yat-sen University Guangzhou510006 China Guangdong Key Laboratory of Information Security Technology Guangzhou510006 China
Machine learning has greatly improved the convenience of modern life. As the deployment scale of machine learning grows larger, the corresponding data scale also increases, leading to a large number of small and mediu... 详细信息
来源: 评论
Brain-inspired artificial intelligence research: A review
收藏 引用
Science China(Technological Sciences) 2024年 第8期67卷 2282-2296页
作者: WANG GuoYin BAO HuaNan LIU Qun ZHOU TianGang WU Si HUANG TieJun YU ZhaoFei LU CeWu GONG YiHong ZHANG ZhaoXiang HE Sheng Chongqing Key Laboratory of Computational Intelligence Chongqing University of Posts and TelecommunicationsChongqing 400065China Key Laboratory of Cyberspace Big Data Intelligent Security Chongqing University of Posts and TelecommunicationsChongqing 400065China College of Computer and Information Science Chongqing Normal UniversityChongqing 401331China State Key Laboratory of Brain and Cognitive Science Institute of BiophysicsChinese Academy of SciencesBeijing 100101China School of Psychological and Cognitive Sciences Peking UniversityBeijing 100871China State Key Laboratory of Multimedia Information Processing School of Computer SciencePeking UniversityBeijing 100871China Department of Computer Science School of ElectronicsInformation and Electrical EngineeringShanghai Jiao Tong UniversityShanghai 200240China Faculty of Electronic and Information Engineering Xi’an Jiaotong UniversityXi’an 710049China The Center for Research on Intelligent Perception and Computing Institute of AutomationChinese Academy of SciencesBeijing 100190China Institute of Biophysics Chinese Academy of SciencesBeijing 100101China
Artificial intelligence(AI) systems surpass certain human intelligence abilities in a statistical sense as a whole, but are not yet the true realization of these human intelligence abilities and behaviors. There are d... 详细信息
来源: 评论
Research on Interpretable Fake News Detection Technology Based on Co-Attention Mechanism  23
Research on Interpretable Fake News Detection Technology Bas...
收藏 引用
2023 International Conference on computer, Vision and Intelligent Technology, ICCVIT 2023
作者: Jiang, Wen Zhang, Mingshu Wei, Bin Ren, Kelan Yan, Facheng Zhang, Xiong Armed Police Engineering University Shaanxi Province Xi'an China Key Laboratory of Network and Information Security of Armed Police Force Xi'an China
The wide dissemination of false news is increasingly threatening both individuals and society. Aiming at the problem of insufficient interpretability in false news detection task, the model TCIN based on collaborative... 详细信息
来源: 评论
LayerCFL:an efcient federated learning with layer-wised clustering
收藏 引用
Cybersecurity 2025年 第1期8卷 72-85页
作者: Jie Yuan Rui Qian Tingting Yuan Mingliang Sun Jirui Li Xiaoyong Li School of Cyberspace Security Beijing University of Posts and TelecommunicationsBeijingChina Key Laboratory of Trustworthy Distributed Computing and Service(BUPT) Ministry of EducationBeijingChina Institute of Computer Science Faculty of Mathematics and Computer ScienceUniversity of GoettingenGöettingenGermany School of Information Technology Henan University of Chinese MedicineZhengzhouHenanChina
Federated Learning(FL)sufers from the Non-IID problem in practice,which poses a challenge for efcient and accurate model *** address this challenge,prior research has introduced clustered FL(CFL),which involves cluste... 详细信息
来源: 评论
Chain-of-Specificity: Enhancing Task-Specific Constraint Adherence in Large Language Models  31
Chain-of-Specificity: Enhancing Task-Specific Constraint Adh...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Wei, Kaiwen Zhong, Jiang Zhang, Hongzhi Zhang, Di Jin, Li Yu, Yue Zhang, Jingyuan College of Computer Science Chongqing University China Kuaishou Inc. China Key Laboratory of Network Information System Technology Aerospace Information Research Institute Chinese Academy of Sciences China
Large Language Models (LLMs) exhibit remarkable generative capabilities, enabling the generation of valuable information. Despite these advancements, previous research found that LLMs sometimes struggle with adhering ... 详细信息
来源: 评论
LogESP: Enhancing Log Semantic Representation With Word Position for Anomaly Detection  22
LogESP: Enhancing Log Semantic Representation With Word Posi...
收藏 引用
22nd IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2024
作者: Ni, Zhengping Di, Xiaoqiang Liu, Xu Chang, Lianjie Li, Jinqing Tang, Qiyue Changchun University of Science and Technology School of Computer Science and Technology Changchun130022 China Changchun University of Science and Technology Jilin Province Key Laboratory of Network and Information Security Changchun130022 China Changchun University of Science and Technology Information Center Changchun130022 China
Logs are valuable data for detecting anomalous network behavior. Accurate feature extraction from logs is essential for anomaly detection. However, statistical-based feature extraction methods consider the statistical... 详细信息
来源: 评论
LGDB-Net: Dual-Branch Path for Building Extraction from Remote Sensing Image  30
LGDB-Net: Dual-Branch Path for Building Extraction from Remo...
收藏 引用
30th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2024
作者: Zhang, Ronghuan Zhao, Jing Li, Ming Zou, Qingzhi Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China Shandong University of Traditional Chinese Medicine School of Intelligence and Information Engineering Jinan China
Extracting buildings from remote sensing images using deep learning techniques is a widely applied and crucial task. Convolutional Neural networks (CNNs) adopt hierarchical feature representation, showcasing powerful ... 详细信息
来源: 评论