咨询与建议

限定检索结果

文献类型

  • 4,511 篇 会议
  • 3,407 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,926 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,322 篇 工学
    • 4,005 篇 计算机科学与技术...
    • 3,158 篇 软件工程
    • 1,357 篇 信息与通信工程
    • 658 篇 电气工程
    • 588 篇 控制科学与工程
    • 531 篇 电子科学与技术(可...
    • 452 篇 网络空间安全
    • 440 篇 生物工程
    • 301 篇 机械工程
    • 233 篇 光学工程
    • 224 篇 仪器科学与技术
    • 188 篇 生物医学工程(可授...
    • 165 篇 安全科学与工程
    • 153 篇 动力工程及工程热...
    • 147 篇 化学工程与技术
    • 129 篇 建筑学
    • 127 篇 交通运输工程
  • 2,306 篇 理学
    • 1,374 篇 数学
    • 504 篇 物理学
    • 478 篇 生物学
    • 425 篇 统计学(可授理学、...
    • 207 篇 系统科学
    • 167 篇 化学
  • 1,340 篇 管理学
    • 818 篇 管理科学与工程(可...
    • 579 篇 图书情报与档案管...
    • 295 篇 工商管理
  • 287 篇 法学
    • 167 篇 社会学
    • 118 篇 法学
  • 156 篇 医学
    • 128 篇 临床医学
  • 116 篇 经济学
    • 116 篇 应用经济学
  • 99 篇 军事学
  • 54 篇 农学
  • 44 篇 教育学
  • 24 篇 文学
  • 23 篇 艺术学

主题

  • 238 篇 feature extracti...
  • 229 篇 semantics
  • 214 篇 cryptography
  • 184 篇 authentication
  • 181 篇 information secu...
  • 163 篇 computational mo...
  • 160 篇 security
  • 151 篇 protocols
  • 144 篇 deep learning
  • 144 篇 accuracy
  • 139 篇 privacy
  • 122 篇 laboratories
  • 122 篇 training
  • 103 篇 data models
  • 102 篇 federated learni...
  • 99 篇 cloud computing
  • 94 篇 servers
  • 92 篇 public key crypt...
  • 92 篇 blockchain
  • 89 篇 data privacy

机构

  • 204 篇 shandong provinc...
  • 179 篇 key laboratory o...
  • 166 篇 school of comput...
  • 151 篇 state key labora...
  • 112 篇 school of comput...
  • 111 篇 school of cyber ...
  • 106 篇 department of co...
  • 98 篇 information secu...
  • 84 篇 key laboratory o...
  • 81 篇 institute of inf...
  • 67 篇 computer network...
  • 67 篇 guangdong provin...
  • 66 篇 university of ch...
  • 64 篇 college of mathe...
  • 64 篇 state grid key l...
  • 63 篇 peng cheng labor...
  • 60 篇 key laboratory o...
  • 59 篇 school of softwa...
  • 57 篇 school of comput...
  • 56 篇 key laboratory o...

作者

  • 55 篇 jianfeng ma
  • 53 篇 yang yang
  • 49 篇 ma jianfeng
  • 45 篇 yixian yang
  • 43 篇 ding yong
  • 41 篇 zheng wei-shi
  • 38 篇 huang qingming
  • 31 篇 cong runmin
  • 31 篇 wang wei
  • 31 篇 zhang huanguo
  • 31 篇 hu yupu
  • 30 篇 xu an wang
  • 30 篇 yang yixian
  • 29 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 27 篇 min-ling zhang
  • 25 篇 xie xiaohua
  • 24 篇 liu xin
  • 23 篇 wang yujue

语言

  • 7,128 篇 英文
  • 536 篇 其他
  • 282 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory Computer Network and Information Security"
7926 条 记 录,以下是411-420 订阅
排序:
The Program Testing Ability of Large Language Models for Code
The Program Testing Ability of Large Language Models for Cod...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Xiong, Weimin Guo, Yiwen Chen, Hao National Key Laboratory for Multimedia Information Processing School of Computer Science Peking University China Tencent Security Big Data Lab China UC Davis United States
Recent development of large language models (LLMs) for code like CodeX and CodeT5+ shows promise in achieving code intelligence. Their ability of synthesizing program targeting a pre-defined algorithmic coding task ha... 详细信息
来源: 评论
Research and Implementation of Hybrid Storage Method for Multi-source Heterogeneous Data of Electric Distribution network  4th
收藏 引用
4th International Conference on 3D Imaging Technologies- Multidimensional Signal Processing and Deep Learning, 3D IT-MSP and DL 2022
作者: Qiao, Junfeng Zhou, Aihua Peng, Lin Zhu, Lipeng Pan, Sen Yang, Pei State Grid Key Laboratory of Information & Network Security of State Grid Smart Grid Research Institute Co. Ltd Jiangsu Nanjing210003 China
The traditional relational database is difficult to efficiently store the power grid topology data with complex network relationships, which seriously restricts the application expansion of power grid topology analysi... 详细信息
来源: 评论
Automated object recognition in high-resolution optical remote sensing imagery
收藏 引用
National Science Review 2023年 第6期10卷 38-41页
作者: Yazhou Yao Tao Chen Hanbo Bi Xinhao Cai Gensheng Pei Guoye Yang Zhiyuan Yan Xian Sun Xing Xu Hai Zhang School of Computer Science and Engineering Nanjing University of Science and Technology Aerospace Information Research Institute Chinese Academy of Sciences School of Electronic Electrical and Communication Engineering University of Chinese Academy of Sciences Key Laboratory of Network Information System Technology (NIST) Aerospace Information Research Institute Chinese Academy of Sciences Department of Computer Science and Technology Tsinghua University School of Computer Science and Engineering University of Electronic Science and Technology of China Pazhou Laboratory (Huangpu) School of Mathematics Northwest University
INTRODUCTION With the rapid development of remote sensing technology,high-quality remote sensing images have become widely *** automated object detection and recognition of these images,which aims to automatically loc...
来源: 评论
A multipath routing algorithm for satellite networksbased on service demand and traffic awareness
收藏 引用
Frontiers of information Technology & Electronic Engineering 2023年 第6期24卷 844-858页
作者: Ziyang XING Hui QI Xiaoqiang DI Jinyao LIU Rui XU Jing CHEN Ligang CONG Jilin Key Laboratory of Network and Information Security Changchun 130022China School of Computer Science and Technology Changchun University of Science and TechnologyChangchun 130022China Information Center Changchun University of Science and TechnologyChangchun 130022China
With the reduction in manufacturing and launch costs of low Earth orbit satellites and the advantages of large coverage and high data transmission rates,satellites have become an important part of data transmission in... 详细信息
来源: 评论
GAN-based Symmetric Embedding Costs Adjustment for Enhancing Image Steganographic security  24
GAN-based Symmetric Embedding Costs Adjustment for Enhancing...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Ye, Miaoxin Zhou, Saixing Luo, Weiqi Tan, Shunquan Huang, Jiwu Guangdong Provincial Key Laboratory of Information Security Technology Sun Yat-Sen University Guangzhou China Shenzhen Key Laboratory of Media Security College of Computer Science and Software Engineering Shenzhen University Shenzhen China Guangdong Laboratory of Machine Perception and Intelligent Computing Faculty of Engineering Shenzhen MSU-BIT University Shenzhen China
Designing embedding costs is pivotal in modern image steganography. Many studies have shown adjusting symmetric embedding costs to asymmetric ones can enhance steganographic security. However, most existing methods he... 详细信息
来源: 评论
IntML-KNN: A Few-Shot Radio Frequency Fingerprint Identification Scheme for Lora Devices
收藏 引用
IEEE Signal Processing Letters 2025年 32卷 2259-2263页
作者: Cao, Xin Tan, Weijie Gao, Qiangqiang Hu, Zhilong Li, Chunguo Guizhou University College of Computer Science and Technology Guiyang550025 China Guizhou University State Key Laboratory of Public Big Data College of Computer Science and Technology Guiyang550025 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610025 China Ministry of Industry and Information Technology Laboratory of Cryptograph Application Technology Innovation and Testing Verification Beijing100015 China Southeast University School of Information Science and Engineering Nanjing210096 China
Deep learning (DL) is widely used in radio frequency fingerprint identification (RFFI). However, in few-shot case, traditional DL-based RFFI need to construct auxiliary dataset to realize radio frequency fingerprint i... 详细信息
来源: 评论
A Simple Semi-Supervised Joint Learning Framework for Few-shot Text Classification  5
A Simple Semi-Supervised Joint Learning Framework for Few-sh...
收藏 引用
5th International Conference on Artificial Intelligence and Pattern Recognition, AIPR 2022
作者: Lu, Shaoshuai Chen, Long Wang, Wenjing Xu, Cai Zhao, Wei Guan, Ziyu Lu, Guangyue Shaanxi Key Laboratory of Information Communication Network and Security Xi'an University of Posts and Telecommunications China School of Computer Science and Technology Xidian University China
The lack of labeled data is the bottleneck restricting deep text classification algorithm. State-of-the-art for most existing deep text classification methods follow the two-step transfer learning paradigm: pre-traini... 详细信息
来源: 评论
HRNet-U: Combining the Strengths of U-Net and HRNet for Efficient Pose Estimation  2
HRNet-U: Combining the Strengths of U-Net and HRNet for Effi...
收藏 引用
2nd International Conference on Algorithm, Image Processing and Machine Vision, AIPMV 2024
作者: Guo, Biao Guo, Fangmin He, Qian Guilin University of Electronic Technology Guangxi Key Laboratory of Trusted Software Guilin China School of Computer Science and Information Security Guilin University of Electronic Technology Guilin China
High-resolution network (HRNet) shows excellent performance in 2D multi-person pose estimation tasks. It can maintain high-resolution representation in the network and exchange information between multi-scale features... 详细信息
来源: 评论
Research and Implementation of Electric Power Line Loss Analysis Technology Based on Artificial Intelligence Algorithm  12
Research and Implementation of Electric Power Line Loss Anal...
收藏 引用
12th International Conference of information and Communication Technology, ICTech 2023
作者: Qiao, Junfeng Zhou, Aihua Peng, Lin Zhu, Lipeng Pan, Sen Yang, Pei Security of State Grid Smart Grid Research Institute Co. Ltd State Grid Key Laboratory of Information & Network Jiangsu Nanjing210003 China
Electric power supply line loss is a very important economic indicator of the State Grid Corporation of China, which is a comprehensive reflection of many important indicators. For companies of electric supply, the lo... 详细信息
来源: 评论
DMCPose: A Binocular 3D Pose Estimation network Integrating Disparity and Multi-View Consistency via Attention
DMCPose: A Binocular 3D Pose Estimation Network Integrating ...
收藏 引用
2024 International Symposium on Digital Home, ISDH 2024
作者: Zhang, Jialun Guo, Biao School of Computer Science and Information Security Guilin University of Electronic Technology Guilin China Guilin University of Electronic Technology Guangxi Key Laboratory of Trusted Software Guilin China
In 3D human pose estimation, binocular vision typically relies on stereo matching to obtain depth information and calculates 3D keypoints using the disparity principle. However, the high computational cost of stereo m... 详细信息
来源: 评论