咨询与建议

限定检索结果

文献类型

  • 4,506 篇 会议
  • 3,387 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,901 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,299 篇 工学
    • 3,983 篇 计算机科学与技术...
    • 3,164 篇 软件工程
    • 1,348 篇 信息与通信工程
    • 653 篇 电气工程
    • 561 篇 控制科学与工程
    • 523 篇 电子科学与技术(可...
    • 449 篇 网络空间安全
    • 440 篇 生物工程
    • 301 篇 机械工程
    • 233 篇 光学工程
    • 224 篇 仪器科学与技术
    • 188 篇 生物医学工程(可授...
    • 165 篇 安全科学与工程
    • 151 篇 动力工程及工程热...
    • 148 篇 化学工程与技术
    • 127 篇 交通运输工程
    • 126 篇 建筑学
  • 2,310 篇 理学
    • 1,377 篇 数学
    • 504 篇 物理学
    • 479 篇 生物学
    • 428 篇 统计学(可授理学、...
    • 206 篇 系统科学
    • 166 篇 化学
  • 1,338 篇 管理学
    • 818 篇 管理科学与工程(可...
    • 576 篇 图书情报与档案管...
    • 297 篇 工商管理
  • 289 篇 法学
    • 168 篇 社会学
    • 119 篇 法学
  • 154 篇 医学
    • 127 篇 临床医学
  • 116 篇 经济学
    • 116 篇 应用经济学
  • 99 篇 军事学
  • 55 篇 农学
  • 46 篇 教育学
  • 24 篇 文学
  • 23 篇 艺术学

主题

  • 238 篇 feature extracti...
  • 229 篇 semantics
  • 216 篇 cryptography
  • 184 篇 authentication
  • 181 篇 information secu...
  • 163 篇 computational mo...
  • 158 篇 security
  • 152 篇 protocols
  • 144 篇 accuracy
  • 141 篇 deep learning
  • 138 篇 privacy
  • 122 篇 laboratories
  • 121 篇 training
  • 103 篇 data models
  • 100 篇 federated learni...
  • 99 篇 cloud computing
  • 94 篇 servers
  • 92 篇 public key crypt...
  • 92 篇 blockchain
  • 89 篇 data privacy

机构

  • 204 篇 shandong provinc...
  • 178 篇 key laboratory o...
  • 164 篇 school of comput...
  • 152 篇 state key labora...
  • 113 篇 school of comput...
  • 111 篇 school of cyber ...
  • 106 篇 department of co...
  • 98 篇 information secu...
  • 83 篇 key laboratory o...
  • 81 篇 institute of inf...
  • 69 篇 guangdong provin...
  • 68 篇 computer network...
  • 66 篇 university of ch...
  • 64 篇 college of mathe...
  • 64 篇 state grid key l...
  • 63 篇 peng cheng labor...
  • 60 篇 key laboratory o...
  • 59 篇 school of softwa...
  • 56 篇 school of comput...
  • 54 篇 key laboratory o...

作者

  • 55 篇 jianfeng ma
  • 53 篇 yang yang
  • 49 篇 ma jianfeng
  • 45 篇 yixian yang
  • 43 篇 ding yong
  • 41 篇 zheng wei-shi
  • 38 篇 huang qingming
  • 31 篇 cong runmin
  • 31 篇 wang wei
  • 31 篇 hu yupu
  • 31 篇 yang yixian
  • 30 篇 zhang huanguo
  • 30 篇 xu an wang
  • 29 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 26 篇 min-ling zhang
  • 24 篇 liu xin
  • 24 篇 xinhong hei
  • 24 篇 xie xiaohua

语言

  • 7,143 篇 英文
  • 499 篇 其他
  • 278 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory Computer Network and Information Security"
7901 条 记 录,以下是491-500 订阅
排序:
Multi-scale network for single image deblurring based on ensemble learning module
收藏 引用
Multimedia Tools and Applications 2025年 第11期84卷 9045-9064页
作者: Wu, WenBo Pan, Yun Su, Na Wang, JingTao Wu, ShaoChuan Xu, ZeKun Yu, YouJian Liu, YaPeng State Key Laboratory of Media Convergence and Communication Communication University of China Beijing100024 China School of Computer and Cyberspace Security Communication University of China Beijing100024 China School of Electronics and Information Engineering Harbin Institute of Technology Harbin150080 China College of Computer and Control Engineering Northeast Forestry University Harbin150040 China School of Computer and Information Engineering Tianjin Chengjian University Tianjin300384 China School of Computer Science and Technology Anhui University Hefei230601 China
In this paper, we have identified two primary issues with current multi-scale image deblurring methods. On the one hand, the blurring scale is ignored. On the other hand, the context information of images is not fully... 详细信息
来源: 评论
A Deep Knowledge Tracing Model Based on Multi-Head Self-Attention Mechanism
A Deep Knowledge Tracing Model Based on Multi-Head Self-Atte...
收藏 引用
2023 International Conference on Algorithms, High Performance Computing, and Artificial Intelligence, AHPCAI 2023
作者: Zhou, Ya Wu, Fengzhen Huang, Guimin Lin, Jianxing Deng, Nanxiao Guo, Qingkai School of Computer Science and Information Security Guangxi Key Laboratory of Image and Graphic Intelligent Processing Guilin University of Electronic Technology Guilin541004 China
How to provide individualized instruction and personalized teaching for students and effectively track their knowledge status in a targeted manner is a key concern in the field of education. The target of knowledge tr... 详细信息
来源: 评论
Optimization algorithm for global k-means algorithm  13
Optimization algorithm for global k-means algorithm
收藏 引用
13th International Conference on Intelligent Control and information Processing, ICICIP 2025
作者: Li, Sen Li, Fang Luo, Xiaonan School of Computer Science and Information Security Guilin University of Electronic Technology Guilin541004 China Guilin541004 China Guangxi Key Laboratory of Image and Graphic Intelligent Processing Guilin541004 China
The k-means method is widely utilized for clustering. Its simplicity, efficacy, and swiftness make it a favored choice among clustering algorithms. It faces the challenge of sensitivity to the initial class center. Th... 详细信息
来源: 评论
An Interference Vector Judgement Based User Clustering Scheme in Ultra Dense network  3
An Interference Vector Judgement Based User Clustering Schem...
收藏 引用
3rd International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies, ICAECT 2023
作者: Liang, Yanxia Zhao, Zhiheng Liu, Xin Zhao, Meng Zhao, Songlin Xi'An University of Posts and Telecommunications Dept. Shaanxi Key Laboratory of Information Communication Network and Security Xi'an China Xi'An Eurasia University Dept. School of Information Engineering Xi'an China
Ultra Dense network will undoubtedly play an important role in next generation communication network due to its excellent system performance. However, the deployment of large-scale small cells can cause serious interf... 详细信息
来源: 评论
Design and Implementation of an Automated APK Analysis System for Practical Forensics  13th
Design and Implementation of an Automated APK Analysis Syste...
收藏 引用
13th International Conference on computer Engineering and networks, CENet 2023
作者: Li, Yicheng Liang, Guangjun Tang, keyan Teng, Yijia Ruan, Haoran Mo, Zixi Department of Computer Information and Cyber Security Jiangsu Police Institute Nanjing China Engineering Research Center of Electronic Data Forensics Analysis Nanjing China Key Laboratory of Digital Forensics Department of Public Security of Jiangsu Province Nanjing China
In order to cope with the widespread emergence of malicious APK in the application market and the increasingly rampant situation of mobile malware, as well as to meet the needs of the actual forensics work, this paper... 详细信息
来源: 评论
Improving MPCitH with Preprocessing: Mask Is All You Need
IACR Transactions on Cryptographic Hardware and Embedded Sys...
收藏 引用
IACR Transactions on Cryptographic Hardware and Embedded Systems 2025年 第2期2025卷 1-22页
作者: Liu, Guowei Liu, Guoxiao Jiang, Kaijie Yu, Qingyuan Jia, Keting Wei, Puwen Wang, Meiqin School of Cyber Science and Technology Shandong University Qingdao China Institute for Network Sciences and Cyberspace Tsinghua University Beijing China Institute for Advanced Study Tsinghua University Beijing China Quan Cheng Shandong Laboratory Jinan China Zhongguancun Laboratory Beijing China BNRist Tsinghua University Beijing China Key Laboratory of Cryptologic Technology and Information Security Ministry of Education Shandong University Jinan China
The MPC-in-the-head with preprocessing (MPCitH-PP) paradigm presents a novel approach for constructing post-quantum digital signatures like Picnic3. This paper revisits the MPCitH-PP construction, analyzing both its o... 详细信息
来源: 评论
FLAP: Federated Learning Aggregation Scheme Based on Privileged Secret Sharing
FLAP: Federated Learning Aggregation Scheme Based on Privile...
收藏 引用
2023 International Conference on networking and network Applications, NaNA 2023
作者: Mu, Xianyu Tian, Youliang Xiong, Jinbo Wang, Shuai Gong, Boxiang College of Computer Science and Technology Guizhou University State Key Laboratory of Public Big Data Guiyang550025 China College of Computer and Cyber Security Fujian Normal University Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou350117 China Guizhou Xishan Technology Co. Ltd China
Federated Learning (FL) is a privacy-preserving machine learning technique that trains models on client devices and only uploads new model gradients to servers for aggregation. However, transmitting the true gradients... 详细信息
来源: 评论
Image inpainting via Smooth Tucker decomposition and Low-rank Hankel constraint
收藏 引用
International Journal of computers and Applications 2023年 第6期45卷 421-432页
作者: Cai, Jing Jiang, Jiawei Wang, Yibing Zheng, Jianwei Xu, Honghui Department of Forensic Science Zhejiang Police College Hangzhou China Key Laboratory of Public Security Information Application Based on Big-Data Architecture Hangzhou China College of Computer Science and Technology Zhejiang University of Technology Hangzhou China
Image inpainting, aiming at exactly recovering missing pixels from partially observed entries, is typically an ill-posed problem. As a powerful constraint, low-rank priors have been widely applied in image inpainting ... 详细信息
来源: 评论
Learning Label Shift Correction for Test-Agnostic Long-Tailed Recognition  41
Learning Label Shift Correction for Test-Agnostic Long-Taile...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Wei, Tong Mao, Zhen Zhou, Zi-Hao Wan, Yuanyu Zhang, Min-Ling School of Computer Science and Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education China School of Software Technology Zhejiang University Ningbo China
Long-tail learning primarily focuses on mitigating the label distribution shift between long-tailed training data and uniformly distributed test data. However, in real-world applications, we often encounter a more int... 详细信息
来源: 评论
A Deep Reinforcement Learning Approach for Online Taxi Dispatching
A Deep Reinforcement Learning Approach for Online Taxi Dispa...
收藏 引用
2023 International Conference on networking and network Applications, NaNA 2023
作者: Wang, YuBo Zhang, TaoYi Wei, ZhiCheng Key Lab of Network and Information Security China College of Computer and Cyber Security China Hebei Prov. Eng. Res. Center for Supply Chain Big Data Analytics Security Hebei Normal University Hebei Province Shijiazhuang China
With the development of smart city transportation systems, developing reasonable dispatching strategies for idle ride-hailing vehicles has become an urgent research problem. In this paper, we address the short-sighted... 详细信息
来源: 评论