咨询与建议

限定检索结果

文献类型

  • 4,506 篇 会议
  • 3,387 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,901 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,299 篇 工学
    • 3,983 篇 计算机科学与技术...
    • 3,164 篇 软件工程
    • 1,348 篇 信息与通信工程
    • 653 篇 电气工程
    • 561 篇 控制科学与工程
    • 523 篇 电子科学与技术(可...
    • 449 篇 网络空间安全
    • 440 篇 生物工程
    • 301 篇 机械工程
    • 233 篇 光学工程
    • 224 篇 仪器科学与技术
    • 188 篇 生物医学工程(可授...
    • 165 篇 安全科学与工程
    • 151 篇 动力工程及工程热...
    • 148 篇 化学工程与技术
    • 127 篇 交通运输工程
    • 126 篇 建筑学
  • 2,310 篇 理学
    • 1,377 篇 数学
    • 504 篇 物理学
    • 479 篇 生物学
    • 428 篇 统计学(可授理学、...
    • 206 篇 系统科学
    • 166 篇 化学
  • 1,338 篇 管理学
    • 818 篇 管理科学与工程(可...
    • 576 篇 图书情报与档案管...
    • 297 篇 工商管理
  • 289 篇 法学
    • 168 篇 社会学
    • 119 篇 法学
  • 154 篇 医学
    • 127 篇 临床医学
  • 116 篇 经济学
    • 116 篇 应用经济学
  • 99 篇 军事学
  • 55 篇 农学
  • 46 篇 教育学
  • 24 篇 文学
  • 23 篇 艺术学

主题

  • 238 篇 feature extracti...
  • 229 篇 semantics
  • 216 篇 cryptography
  • 184 篇 authentication
  • 181 篇 information secu...
  • 163 篇 computational mo...
  • 158 篇 security
  • 152 篇 protocols
  • 144 篇 accuracy
  • 141 篇 deep learning
  • 138 篇 privacy
  • 122 篇 laboratories
  • 121 篇 training
  • 103 篇 data models
  • 100 篇 federated learni...
  • 99 篇 cloud computing
  • 94 篇 servers
  • 92 篇 public key crypt...
  • 92 篇 blockchain
  • 89 篇 data privacy

机构

  • 204 篇 shandong provinc...
  • 178 篇 key laboratory o...
  • 164 篇 school of comput...
  • 152 篇 state key labora...
  • 113 篇 school of comput...
  • 111 篇 school of cyber ...
  • 106 篇 department of co...
  • 98 篇 information secu...
  • 83 篇 key laboratory o...
  • 81 篇 institute of inf...
  • 69 篇 guangdong provin...
  • 68 篇 computer network...
  • 66 篇 university of ch...
  • 64 篇 college of mathe...
  • 64 篇 state grid key l...
  • 63 篇 peng cheng labor...
  • 60 篇 key laboratory o...
  • 59 篇 school of softwa...
  • 56 篇 school of comput...
  • 54 篇 key laboratory o...

作者

  • 55 篇 jianfeng ma
  • 53 篇 yang yang
  • 49 篇 ma jianfeng
  • 45 篇 yixian yang
  • 43 篇 ding yong
  • 41 篇 zheng wei-shi
  • 38 篇 huang qingming
  • 31 篇 cong runmin
  • 31 篇 wang wei
  • 31 篇 hu yupu
  • 31 篇 yang yixian
  • 30 篇 zhang huanguo
  • 30 篇 xu an wang
  • 29 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 26 篇 min-ling zhang
  • 24 篇 liu xin
  • 24 篇 xinhong hei
  • 24 篇 xie xiaohua

语言

  • 7,143 篇 英文
  • 499 篇 其他
  • 278 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory Computer Network and Information Security"
7901 条 记 录,以下是481-490 订阅
排序:
Trust Evaluation Based on Variable Weight Synthesis  23
Trust Evaluation Based on Variable Weight Synthesis
收藏 引用
23rd IEEE International Conference on High Performance Computing and Communications, 7th IEEE International Conference on Data Science and Systems, 19th IEEE International Conference on Smart City and 7th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC-DSS-SmartCity-DependSys 2021
作者: Chen, Mu Chen, Lu Dai, Zaojian Shao, Zhipeng Ma, Yuanyuan Institute of Information and Communication Global Energy Interconnection Research Institute State Grid Key Laboratory of Information & Network Security Nanjing China
There are a large number of terminals with data collection, transmission, processing, storage processing and storage functions in the scenario of power mobile internet. Traditional security protection methods are diff... 详细信息
来源: 评论
A Competition-Based Clustering Algorithm in Ultra-Dense network  11
A Competition-Based Clustering Algorithm in Ultra-Dense Netw...
收藏 引用
2023 IEEE 11th International Conference on information, Communication and networks, ICICN 2023
作者: Liang, Yanxia Zhao, Zhiheng Liu, Xin Zhao, Meng Zhao, Songlin Xi'An University of Posts and Telecommunications Dept. Shaanxi Key Laboratory of Information Communication Network and Security Xi'an China Xi'An Eurasia University Dept. School of Information Engineering Xi'an China
Ultra-dense network (UDN) is the key technology to meet the future trend of network densification. In order to solve the serious interference problem between users in UDN, a competition-based clustering algorithm is p... 详细信息
来源: 评论
Privacy-Preserving Face Recognition with Adaptive Generative Perturbations  27th
Privacy-Preserving Face Recognition with Adaptive Generative...
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Zhang, Delong Peng, Yixing Wu, Ancong Zheng, Wei-Shi School of Computer Science and Engineering Sun Yat-sen University Guangzhou China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education Guangzhou China Guangdong Province Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou China
For online face recognition services, the potential leakage of facial features and reconstruction techniques gives malicious attackers the opportunity to reconstruct face images, raising public concern about priv... 详细信息
来源: 评论
Towards Completeness: A Generalizable Action Proposal Generator for Zero-Shot Temporal Action Localization  27th
Towards Completeness: A Generalizable Action Proposal Genera...
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Du, Jia-Run Lin, Kun-Yu Meng, Jingke Zheng, Wei-Shi School of Computer Science and Engineering Sun Yat-sen University Guangzhou China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education Guangzhou China Guangdong Province Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou China
To address the zero-shot temporal action localization (ZSTAL) task, existing works develop models that are generalizable to detect and classify actions from unseen categories. They typically develop a category-ag... 详细信息
来源: 评论
LabelEase: A Semi-Automatic Tool for Efficient and Accurate Trace Labeling in Microservices  35
LabelEase: A Semi-Automatic Tool for Efficient and Accurate ...
收藏 引用
35th IEEE International Symposium on Software Reliability Engineering, ISSRE 2024
作者: Zhang, Shenglin Che, Zeyu Pan, Zhongjie Nie, Xiaohui Sun, Yongqian Pan, Lemeng Pei, Dan Nankai University China Haihe Laboratory of Information Technology Application Innovation China Chinese Academy of Sciences Computer Network Information Center China Tianjin Key Laboratory of Software Experience and Human Computer Interaction China Huawei China Tsinghua University Beijing National Research Center for Information Science and Technology China
Trace data is crucial for system observability and maintainability within microservices architectures, and many operation algorithms depend heavily on trace data, including anomaly detection, root cause analysis, etc.... 详细信息
来源: 评论
Visible Light Positioning Method for Indoor Line-of-Sight Scene Based on Time Series Coding  9
Visible Light Positioning Method for Indoor Line-of-Sight Sc...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Yu, Yonghao Guo, Yongde Zhao, Dawei Fu, Kexue Tang, Yongwei Wang, Qinyuan City University of Macau Faculty of Data Science China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Shandong University School of Mechanical Engineering Key Laboratory of High Efficiency and Clean Mechanical Manufacture Ministry of Education Jinan China
Existing indoor visible light positioning methods, such as those based on fingerprint database algorithms, are complex to construct and consume significant resources. In response to this issue, the text proposes an en... 详细信息
来源: 评论
Source-free Domain Adaptation with Multiple Alignment for Efficient Image Retrieval
Source-free Domain Adaptation with Multiple Alignment for Ef...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Jinghui Ni Hui Cui Lihai Zhao Fengling Li Xiaohui Han Lijuan Xu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Quan Cheng Laboratory Shandong Open University University of Technology Sydney
Domain adaptation techniques help models generalize to target domains by addressing domain discrepancies between the source and target domain data distributions. These techniques are particularly valuable for cross-do... 详细信息
来源: 评论
A Police UAV System Based on Target Recognition  13th
A Police UAV System Based on Target Recognition
收藏 引用
13th International Conference on computer Engineering and networks, CENet 2023
作者: Qiu, Zhenyu Liang, Guangjun Du, Hongtian Yan, Bohan Peng, Jiahao Ju, Zexin Department of Computer Information and Cyber Security Jiangsu Police Institute Nanjing China Engineering Research Center of Electronic Data Forensics Analysis Nanjing China Key Laboratory of Digital Forensics Department of Public Security of Jiangsu Province Nanjing China
The As a kind of aircraft without carrying operators, unmanned aerial vehicle (UAV) has been rapidly developed in the civil field. It is widely used in police, urban management, agriculture, geology, meteorology, elec... 详细信息
来源: 评论
Research on long and short-term social recommendation based on convolutional and gated recurrent units  29
Research on long and short-term social recommendation based ...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Jia, Zihe Xue, Peng Dai, Zhiqiang Gao, Qian Zhang, Xiaomeng Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250014 China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan250014 China
The development of the Internet has made people more closely related and has put forward higher requirements for recommendation models. Most recommendation models are studied only for the long-term interests of users.... 详细信息
来源: 评论
Depth-Enhanced Alignment for Label-Free 3D Semantic Segmentation  27th
Depth-Enhanced Alignment for Label-Free 3D Semantic Segment...
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Xie, Shangjin Feng, Jiawei Chen, Zibo Liu, Zhixuan Zheng, Wei-Shi School of Computer Science and Engineering Sun Yat-sen University Guangzhou China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education Guangzhou China Guangdong Province Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou China
Labeling every point in a scene is a laborious journey for 3D understanding. To achieve annotation-free training, existing works introduce Contrastive Language-Image Pre-training (CLIP) to transfer the pre-trained cap... 详细信息
来源: 评论