咨询与建议

限定检索结果

文献类型

  • 4,506 篇 会议
  • 3,387 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,901 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,299 篇 工学
    • 3,983 篇 计算机科学与技术...
    • 3,164 篇 软件工程
    • 1,348 篇 信息与通信工程
    • 653 篇 电气工程
    • 561 篇 控制科学与工程
    • 523 篇 电子科学与技术(可...
    • 449 篇 网络空间安全
    • 440 篇 生物工程
    • 301 篇 机械工程
    • 233 篇 光学工程
    • 224 篇 仪器科学与技术
    • 188 篇 生物医学工程(可授...
    • 165 篇 安全科学与工程
    • 151 篇 动力工程及工程热...
    • 148 篇 化学工程与技术
    • 127 篇 交通运输工程
    • 126 篇 建筑学
  • 2,310 篇 理学
    • 1,377 篇 数学
    • 504 篇 物理学
    • 479 篇 生物学
    • 428 篇 统计学(可授理学、...
    • 206 篇 系统科学
    • 166 篇 化学
  • 1,338 篇 管理学
    • 818 篇 管理科学与工程(可...
    • 576 篇 图书情报与档案管...
    • 297 篇 工商管理
  • 289 篇 法学
    • 168 篇 社会学
    • 119 篇 法学
  • 154 篇 医学
    • 127 篇 临床医学
  • 116 篇 经济学
    • 116 篇 应用经济学
  • 99 篇 军事学
  • 55 篇 农学
  • 46 篇 教育学
  • 24 篇 文学
  • 23 篇 艺术学

主题

  • 238 篇 feature extracti...
  • 229 篇 semantics
  • 216 篇 cryptography
  • 184 篇 authentication
  • 181 篇 information secu...
  • 163 篇 computational mo...
  • 158 篇 security
  • 152 篇 protocols
  • 144 篇 accuracy
  • 141 篇 deep learning
  • 138 篇 privacy
  • 122 篇 laboratories
  • 121 篇 training
  • 103 篇 data models
  • 100 篇 federated learni...
  • 99 篇 cloud computing
  • 94 篇 servers
  • 92 篇 public key crypt...
  • 92 篇 blockchain
  • 89 篇 data privacy

机构

  • 204 篇 shandong provinc...
  • 178 篇 key laboratory o...
  • 164 篇 school of comput...
  • 152 篇 state key labora...
  • 113 篇 school of comput...
  • 111 篇 school of cyber ...
  • 106 篇 department of co...
  • 98 篇 information secu...
  • 83 篇 key laboratory o...
  • 81 篇 institute of inf...
  • 69 篇 guangdong provin...
  • 68 篇 computer network...
  • 66 篇 university of ch...
  • 64 篇 college of mathe...
  • 64 篇 state grid key l...
  • 63 篇 peng cheng labor...
  • 60 篇 key laboratory o...
  • 59 篇 school of softwa...
  • 56 篇 school of comput...
  • 54 篇 key laboratory o...

作者

  • 55 篇 jianfeng ma
  • 53 篇 yang yang
  • 49 篇 ma jianfeng
  • 45 篇 yixian yang
  • 43 篇 ding yong
  • 41 篇 zheng wei-shi
  • 38 篇 huang qingming
  • 31 篇 cong runmin
  • 31 篇 wang wei
  • 31 篇 hu yupu
  • 31 篇 yang yixian
  • 30 篇 zhang huanguo
  • 30 篇 xu an wang
  • 29 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 26 篇 min-ling zhang
  • 24 篇 liu xin
  • 24 篇 xinhong hei
  • 24 篇 xie xiaohua

语言

  • 7,143 篇 英文
  • 499 篇 其他
  • 278 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory Computer Network and Information Security"
7901 条 记 录,以下是421-430 订阅
排序:
A multipath routing algorithm for satellite networksbased on service demand and traffic awareness
收藏 引用
Frontiers of information Technology & Electronic Engineering 2023年 第6期24卷 844-858页
作者: Ziyang XING Hui QI Xiaoqiang DI Jinyao LIU Rui XU Jing CHEN Ligang CONG Jilin Key Laboratory of Network and Information Security Changchun 130022China School of Computer Science and Technology Changchun University of Science and TechnologyChangchun 130022China Information Center Changchun University of Science and TechnologyChangchun 130022China
With the reduction in manufacturing and launch costs of low Earth orbit satellites and the advantages of large coverage and high data transmission rates,satellites have become an important part of data transmission in... 详细信息
来源: 评论
GAN-based Symmetric Embedding Costs Adjustment for Enhancing Image Steganographic security  24
GAN-based Symmetric Embedding Costs Adjustment for Enhancing...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Ye, Miaoxin Zhou, Saixing Luo, Weiqi Tan, Shunquan Huang, Jiwu Guangdong Provincial Key Laboratory of Information Security Technology Sun Yat-Sen University Guangzhou China Shenzhen Key Laboratory of Media Security College of Computer Science and Software Engineering Shenzhen University Shenzhen China Guangdong Laboratory of Machine Perception and Intelligent Computing Faculty of Engineering Shenzhen MSU-BIT University Shenzhen China
Designing embedding costs is pivotal in modern image steganography. Many studies have shown adjusting symmetric embedding costs to asymmetric ones can enhance steganographic security. However, most existing methods he... 详细信息
来源: 评论
A Simple Semi-Supervised Joint Learning Framework for Few-shot Text Classification  5
A Simple Semi-Supervised Joint Learning Framework for Few-sh...
收藏 引用
5th International Conference on Artificial Intelligence and Pattern Recognition, AIPR 2022
作者: Lu, Shaoshuai Chen, Long Wang, Wenjing Xu, Cai Zhao, Wei Guan, Ziyu Lu, Guangyue Shaanxi Key Laboratory of Information Communication Network and Security Xi'an University of Posts and Telecommunications China School of Computer Science and Technology Xidian University China
The lack of labeled data is the bottleneck restricting deep text classification algorithm. State-of-the-art for most existing deep text classification methods follow the two-step transfer learning paradigm: pre-traini... 详细信息
来源: 评论
IntML-KNN: A Few-Shot Radio Frequency Fingerprint Identification Scheme for Lora Devices
收藏 引用
IEEE Signal Processing Letters 2025年 32卷 2259-2263页
作者: Cao, Xin Tan, Weijie Gao, Qiangqiang Hu, Zhilong Li, Chunguo Guizhou University College of Computer Science and Technology Guiyang550025 China Guizhou University State Key Laboratory of Public Big Data College of Computer Science and Technology Guiyang550025 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610025 China Ministry of Industry and Information Technology Laboratory of Cryptograph Application Technology Innovation and Testing Verification Beijing100015 China Southeast University School of Information Science and Engineering Nanjing210096 China
Deep learning (DL) is widely used in radio frequency fingerprint identification (RFFI). However, in few-shot case, traditional DL-based RFFI need to construct auxiliary dataset to realize radio frequency fingerprint i... 详细信息
来源: 评论
HRNet-U: Combining the Strengths of U-Net and HRNet for Efficient Pose Estimation  2
HRNet-U: Combining the Strengths of U-Net and HRNet for Effi...
收藏 引用
2nd International Conference on Algorithm, Image Processing and Machine Vision, AIPMV 2024
作者: Guo, Biao Guo, Fangmin He, Qian Guilin University of Electronic Technology Guangxi Key Laboratory of Trusted Software Guilin China School of Computer Science and Information Security Guilin University of Electronic Technology Guilin China
High-resolution network (HRNet) shows excellent performance in 2D multi-person pose estimation tasks. It can maintain high-resolution representation in the network and exchange information between multi-scale features... 详细信息
来源: 评论
DMCPose: A Binocular 3D Pose Estimation network Integrating Disparity and Multi-View Consistency via Attention
DMCPose: A Binocular 3D Pose Estimation Network Integrating ...
收藏 引用
2024 International Symposium on Digital Home, ISDH 2024
作者: Zhang, Jialun Guo, Biao School of Computer Science and Information Security Guilin University of Electronic Technology Guilin China Guilin University of Electronic Technology Guangxi Key Laboratory of Trusted Software Guilin China
In 3D human pose estimation, binocular vision typically relies on stereo matching to obtain depth information and calculates 3D keypoints using the disparity principle. However, the high computational cost of stereo m... 详细信息
来源: 评论
Research and Implementation of Electric Power Line Loss Analysis Technology Based on Artificial Intelligence Algorithm  12
Research and Implementation of Electric Power Line Loss Anal...
收藏 引用
12th International Conference of information and Communication Technology, ICTech 2023
作者: Qiao, Junfeng Zhou, Aihua Peng, Lin Zhu, Lipeng Pan, Sen Yang, Pei Security of State Grid Smart Grid Research Institute Co. Ltd State Grid Key Laboratory of Information & Network Jiangsu Nanjing210003 China
Electric power supply line loss is a very important economic indicator of the State Grid Corporation of China, which is a comprehensive reflection of many important indicators. For companies of electric supply, the lo... 详细信息
来源: 评论
Multi-dimensional ability diagnosis for machine learning algorithms
收藏 引用
Science China(information Sciences) 2024年 第12期67卷 321-322页
作者: Qi LIU Zheng GONG Zhenya HUANG Chuanren LIU Hengshu ZHU Zhi LI Enhong CHEN Hui XIONG State Key Laboratory of Cognitive Intelligence University of Science and Technology of China Business Analytics and Statistics The University of Tennessee Computer Network Information Center Chinese Academy of Sciences Shenzhen International Graduate School Tsinghua University Hong Kong University of Science and Technology (Guangzhou)
A significant proportion of noticeable improvement in machine learning architectures actually benefits from the consistent inspiration of the way human learning [1]. For instance, curriculum learning [2] is inspired b... 详细信息
来源: 评论
Random mating mayfly algorithm for RFID network planning
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2022年 第5期29卷 40-50页
作者: Xie Xiaode Zheng Jiali Lin Zihan He Siyi Feng Minyu School of Computer Electrics and InformationGuangxi UniversityNanning 530004China Guangxi Key Laboratory of Multimedia Communications and Network Technology Guangxi UniversityNanning 530004China
In order to improve robustness and efficiency of the radio frequency identification(RFID)network,a random mating mayfly algorithm(RMMA)was ***,RMMA introduced the mechanism of random mating into the mayfly algorithm(M... 详细信息
来源: 评论
RFID network planning based on improved brain storm optimization algorithm
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2022年 第5期29卷 30-39页
作者: Lin Zihan Zheng Jiali Xie Xiaode Feng Minyu He Siyi School of Computer Electrics and InformationGuangxi UniversityNanning 530004China Guangxi Key Laboratory of Multimedia Communications and Network Technology Guangxi UniversityNanning 530004China
In order to improve the service quality of radio frequency identification(RFID) systems, multiple objectives should be comprehensively considered. An improved brain storm optimization algorithm GABSO, which incorporat... 详细信息
来源: 评论