咨询与建议

限定检索结果

文献类型

  • 4,511 篇 会议
  • 3,407 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,926 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,322 篇 工学
    • 4,005 篇 计算机科学与技术...
    • 3,158 篇 软件工程
    • 1,357 篇 信息与通信工程
    • 658 篇 电气工程
    • 588 篇 控制科学与工程
    • 531 篇 电子科学与技术(可...
    • 452 篇 网络空间安全
    • 440 篇 生物工程
    • 301 篇 机械工程
    • 233 篇 光学工程
    • 224 篇 仪器科学与技术
    • 188 篇 生物医学工程(可授...
    • 165 篇 安全科学与工程
    • 153 篇 动力工程及工程热...
    • 147 篇 化学工程与技术
    • 129 篇 建筑学
    • 127 篇 交通运输工程
  • 2,306 篇 理学
    • 1,374 篇 数学
    • 504 篇 物理学
    • 478 篇 生物学
    • 425 篇 统计学(可授理学、...
    • 207 篇 系统科学
    • 167 篇 化学
  • 1,340 篇 管理学
    • 818 篇 管理科学与工程(可...
    • 579 篇 图书情报与档案管...
    • 295 篇 工商管理
  • 287 篇 法学
    • 167 篇 社会学
    • 118 篇 法学
  • 156 篇 医学
    • 128 篇 临床医学
  • 116 篇 经济学
    • 116 篇 应用经济学
  • 99 篇 军事学
  • 54 篇 农学
  • 44 篇 教育学
  • 24 篇 文学
  • 23 篇 艺术学

主题

  • 238 篇 feature extracti...
  • 229 篇 semantics
  • 214 篇 cryptography
  • 184 篇 authentication
  • 181 篇 information secu...
  • 163 篇 computational mo...
  • 160 篇 security
  • 151 篇 protocols
  • 144 篇 deep learning
  • 144 篇 accuracy
  • 139 篇 privacy
  • 122 篇 laboratories
  • 122 篇 training
  • 103 篇 data models
  • 102 篇 federated learni...
  • 99 篇 cloud computing
  • 94 篇 servers
  • 92 篇 public key crypt...
  • 92 篇 blockchain
  • 89 篇 data privacy

机构

  • 204 篇 shandong provinc...
  • 179 篇 key laboratory o...
  • 166 篇 school of comput...
  • 151 篇 state key labora...
  • 112 篇 school of comput...
  • 111 篇 school of cyber ...
  • 106 篇 department of co...
  • 98 篇 information secu...
  • 84 篇 key laboratory o...
  • 81 篇 institute of inf...
  • 67 篇 computer network...
  • 67 篇 guangdong provin...
  • 66 篇 university of ch...
  • 64 篇 college of mathe...
  • 64 篇 state grid key l...
  • 63 篇 peng cheng labor...
  • 60 篇 key laboratory o...
  • 59 篇 school of softwa...
  • 57 篇 school of comput...
  • 56 篇 key laboratory o...

作者

  • 55 篇 jianfeng ma
  • 53 篇 yang yang
  • 49 篇 ma jianfeng
  • 45 篇 yixian yang
  • 43 篇 ding yong
  • 41 篇 zheng wei-shi
  • 38 篇 huang qingming
  • 31 篇 cong runmin
  • 31 篇 wang wei
  • 31 篇 zhang huanguo
  • 31 篇 hu yupu
  • 30 篇 xu an wang
  • 30 篇 yang yixian
  • 29 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 27 篇 min-ling zhang
  • 25 篇 xie xiaohua
  • 24 篇 liu xin
  • 23 篇 wang yujue

语言

  • 7,128 篇 英文
  • 536 篇 其他
  • 282 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory Computer Network and Information Security"
7926 条 记 录,以下是441-450 订阅
排序:
Text Guided Road Marking Point Cloud Completion  6
Text Guided Road Marking Point Cloud Completion
收藏 引用
6th International Conference on Next Generation Data-Driven networks, NGDN 2024
作者: He, Xu Xu, Qihong Luo, Huan Fuzhou University College of Computer and Data Science Fuzhou China Fuzhou University Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou China
With the continuous development of intelligent transportation technologies such as autonomous driving and navigation, accurate perception of road markings becomes crucial. However, due to limitations in sensor perspec... 详细信息
来源: 评论
An SDN Traffic Engineering Approach Based on Traffic Unsupervised Contrastive Representation and Reinforcement Learning  6
An SDN Traffic Engineering Approach Based on Traffic Unsuper...
收藏 引用
6th International Conference on Next Generation Data-Driven networks, NGDN 2024
作者: Yang, Ruiyu Tang, Qi Guo, Yingya College of Computer and Data Science Fuzhou University Fuzhou China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou China
With the rapid development of Internet technology and the continuous explosive growth of network traffic, Traffic Engineering (TE), as a viable method for optimizing network traffic distribution and improving network ... 详细信息
来源: 评论
hcaPCG: A Heterogeneous and communication-avoid PCG with Jacobi preconditioner on SW26010-Pro architecture  29
hcaPCG: A Heterogeneous and communication-avoid PCG with Jac...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Tian, Min Liu, Yue Wang, Li Chen, Yanyan Liu, Qi Pan, Jingshan Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks China Jinan Institute of Supercomputing Technology Jinan Key Laboratory of High Performance Computing China
Due to its efficiency and versatility, the preconditioned conjugate gradient algorithm has long been a staple in the realm of iterative linear system solvers. In this paper, we proposed an optimized preconditioned con... 详细信息
来源: 评论
Malicious Traffic Detection with Noise Labels Based on Cross-Modal Consistency
IEEE Networking Letters
收藏 引用
IEEE networking Letters 2024年 第2期6卷 148-151页
作者: Yuan, Qingjun Niu, Weina Wang, Yongjuan Gou, Gaopeng Lu, Bin Henan Key Laboratory of Network Cryptography Technology Zhengzhou450001 China Institute for Cyber Security School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu611731 China Shenzhen Institute for Advanced Study University of Electronic Science and Technology of China Shenzhen518110 China Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China
To train robust malicious traffic identification models under noisy labeled datasets, a number of learning with noise labels approaches have been introduced, among which parallel training methods have been proved to b... 详细信息
来源: 评论
Block-based fine-grained and publicly verifiable data deletion for cloud storage: Block-based fine-grained and publicly verifiable..: C. Yang et al.
收藏 引用
Soft Computing 2024年 第21期28卷 12491-12506页
作者: Yang, Changsong Liu, Yueling Ding, Yong Wu, Yongqiang Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology Guilin541004 China Lion Rock Labs of Cyberspace Security Institute of Cyberspace Technology HKCT Institute for Higher Education 999077 Hong Kong Guangxi Engineering Research Center of Industrial Internet Security and Blockchain Guilin University of Electronic Technology Guilin541004 China School of Computer Guangdong University of Science & Technology Dongguan523083 China South China Technical Support Department Topsec Network Technology Inc. Guangzhou510000 China
One of the most important services provided by cloud service providers (CSPs), cloud storage is economically attractive and can provide on-demand data storage service to resource-constrained tenants in the manner of p... 详细信息
来源: 评论
Multi-dimensional Classification via Selective Feature Augmentation
收藏 引用
Machine Intelligence Research 2022年 第1期19卷 38-51页
作者: Bin-Bin Jia Min-Ling Zhang School of Computer Science and Engineering Southeast UniversityNanjing 210096China College of Electrical and Information Engineering Lanzhou University of TechnologyLanzhou 730050China Key Laboratory of Computer Network and Information Integration Southeast UniversityMinistry of EducationChina
In multi-dimensional classification(MDC), the semantics of objects are characterized by multiple class spaces from different dimensions. Most MDC approaches try to explicitly model the dependencies among class spaces ... 详细信息
来源: 评论
A Review on Binary Code Analysis Datasets  18th
A Review on Binary Code Analysis Datasets
收藏 引用
18th International Conference on Wireless Artificial Intelligent Computing Systems and Applications, WASA 2024
作者: Huang, Zhijian Song, Shuguang Liu, Han Kuang, Hongyu Zhang, Jingjing Hu, Pengfei National Key Laboratory of Science and Technology on Information System Security Systems Engineering Institute Academy of Military Sciences Beijing China School of Computer Science and Technology Shandong University Qingdao China
Binary code analysis serves as the foundation for research in vulnerability discovery, software protection, and malicious code analysis. However, analyzing binary files is challenging due to the lack of high-level sem... 详细信息
来源: 评论
Fault-tolerant identity-based encryption from SM9
收藏 引用
Science China(information Sciences) 2024年 第2期67卷 104-117页
作者: Xiaohong LIU Xinyi HUANG Zhaohui CHENG Wei WU Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber SecurityFujian Normal University Artificial Intelligence Thrust Information HubThe Hong Kong University of Science and Technology (Guangzhou) Olym Information Security Technology Ltd. Center for Applied Mathematics of Fujian Province School of Mathematics and StatisticsFujian Normal University
This paper initiates the formal study of attribute-based encryption within the framework of SM9,the Chinese National Cryptography Standard for Identity-Based Cryptography, by presenting two new faulttolerant identity-... 详细信息
来源: 评论
Sentences Similarity Model Based on Fusion of Semantic, Syntactic and Word Order Multi-Features  4
Sentences Similarity Model Based on Fusion of Semantic, Synt...
收藏 引用
4th International Conference on information Science, Parallel and Distributed Systems, ISPDS 2023
作者: Zhou, Ya Zhao, Ning Huang, Guimin Deng, Nanxiao Guo, Qingkai School of Computer Science and Information Security Guilin University of Electronic Technology Guangxi Key Laboratory of Image and Graphic Intelligent Processing Guilin China
In sentence similarity research methods, sentence similarity is often calculated from semantic aspects, however, the influence of other features is ignored. For example, the influence of sentence syntactic structure a... 详细信息
来源: 评论
Stereoscopic Video Retargeting Based on Camera Motion Classification  48
Stereoscopic Video Retargeting Based on Camera Motion Classi...
收藏 引用
48th IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2023
作者: Cai, Linghui Tang, Zhenhua Guangxi University School of Computer and Electronics Information Nanning China Guangxi Key Laboratory of Multimedia Communication and Network Technology Nanning China
The existing stereo video retargeting algorithms commonly use a same methodology to perform resizing without considering different videos with various features, leading to the low quality of reconstructed videos. To a... 详细信息
来源: 评论