咨询与建议

限定检索结果

文献类型

  • 4,432 篇 会议
  • 3,329 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,769 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,212 篇 工学
    • 3,916 篇 计算机科学与技术...
    • 3,130 篇 软件工程
    • 1,329 篇 信息与通信工程
    • 645 篇 电气工程
    • 541 篇 控制科学与工程
    • 523 篇 电子科学与技术(可...
    • 442 篇 网络空间安全
    • 439 篇 生物工程
    • 298 篇 机械工程
    • 230 篇 光学工程
    • 224 篇 仪器科学与技术
    • 188 篇 生物医学工程(可授...
    • 162 篇 安全科学与工程
    • 148 篇 动力工程及工程热...
    • 144 篇 化学工程与技术
    • 126 篇 建筑学
    • 124 篇 交通运输工程
  • 2,279 篇 理学
    • 1,360 篇 数学
    • 498 篇 物理学
    • 475 篇 生物学
    • 420 篇 统计学(可授理学、...
    • 208 篇 系统科学
    • 165 篇 化学
  • 1,326 篇 管理学
    • 809 篇 管理科学与工程(可...
    • 573 篇 图书情报与档案管...
    • 289 篇 工商管理
  • 287 篇 法学
    • 167 篇 社会学
    • 118 篇 法学
  • 153 篇 医学
    • 126 篇 临床医学
  • 116 篇 经济学
    • 116 篇 应用经济学
  • 98 篇 军事学
  • 53 篇 农学
  • 42 篇 教育学
  • 24 篇 文学
  • 22 篇 艺术学

主题

  • 237 篇 feature extracti...
  • 227 篇 semantics
  • 216 篇 cryptography
  • 182 篇 authentication
  • 181 篇 information secu...
  • 161 篇 computational mo...
  • 157 篇 security
  • 150 篇 protocols
  • 142 篇 accuracy
  • 141 篇 privacy
  • 139 篇 deep learning
  • 125 篇 training
  • 122 篇 laboratories
  • 105 篇 data models
  • 99 篇 federated learni...
  • 99 篇 cloud computing
  • 94 篇 servers
  • 93 篇 blockchain
  • 92 篇 public key crypt...
  • 88 篇 data privacy

机构

  • 202 篇 shandong provinc...
  • 173 篇 key laboratory o...
  • 158 篇 school of comput...
  • 156 篇 state key labora...
  • 113 篇 school of comput...
  • 106 篇 department of co...
  • 106 篇 school of cyber ...
  • 97 篇 information secu...
  • 80 篇 key laboratory o...
  • 78 篇 institute of inf...
  • 69 篇 guangdong provin...
  • 65 篇 college of mathe...
  • 65 篇 state grid key l...
  • 64 篇 computer network...
  • 64 篇 university of ch...
  • 60 篇 key laboratory o...
  • 60 篇 peng cheng labor...
  • 59 篇 school of softwa...
  • 59 篇 school of comput...
  • 54 篇 key laboratory o...

作者

  • 55 篇 jianfeng ma
  • 53 篇 yang yang
  • 48 篇 ma jianfeng
  • 45 篇 yixian yang
  • 42 篇 ding yong
  • 41 篇 zheng wei-shi
  • 38 篇 huang qingming
  • 31 篇 cong runmin
  • 31 篇 zhang huanguo
  • 31 篇 xu an wang
  • 31 篇 hu yupu
  • 31 篇 yang yixian
  • 30 篇 wang wei
  • 28 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 26 篇 xu li
  • 26 篇 xie xiaohua
  • 24 篇 xinhong hei
  • 23 篇 liu xin

语言

  • 7,157 篇 英文
  • 349 篇 其他
  • 278 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory Computer Network and Information Security"
7769 条 记 录,以下是4991-5000 订阅
排序:
GLCF: A Global-Local Multimodal Coherence Analysis Framework for Talking Face Generation Detection
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Xiaocan Yin, Qilin Liu, Jiarui Lu, Wei Luo, Xiangyang Zhou, Jiantao School of Computer Science and Engineering MoE Key Laboratory of Information Technology Guangdong Province Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou510006 China Alibaba Group Hangzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450002 China State Key Laboratory of Internet of Things for Smart City Department of Computer and Information Science Faculty of Science and Technology University of Macau 999078 China
Talking face generation (TFG) allows for producing lifelike talking videos of any character using only facial images and accompanying text. Abuse of this technology could pose significant risks to society, creating th... 详细信息
来源: 评论
SiamTBD:A Novel Algorithm for Small and Dim Target Tracking Using Video SAR
SiamTBD:A Novel Algorithm for Small and Dim Target Tracking ...
收藏 引用
第43届中国控制会议
作者: Zhenyuan Li Jing Liu Jianting Zhang Haolong Wang Xinyuan Ji Shuncheng Tan Hailang Zhang Ministry of Education Key Laboratory for Intelligent Network and Network Security School of Automation Science and EngineeringFaculty of Electronic and Information Engineering Xi'an Jiaotong University No.91977 Unit of the Chinese People's Liberation Army Institute of Information Fusion Naval Aviation University
A large number of publications on detection and tracking have appeared in the field of video synthetic aperture radar(Video SAR) due to its capability of forming high-resolution videos for a region of interest. Howeve... 详细信息
来源: 评论
A Design of Direct Memory Access Controller for Wireless Communication SoC in Power Grid
A Design of Direct Memory Access Controller for Wireless Com...
收藏 引用
International Conference on Circuits, System and Simulation (ICCSS)
作者: Yingying Chi Zhe Zheng Research Department of Smart Chip Global Energy Interconnection Research Institute Co. Ltd. Beijing China State Grid Key Laboratory of Information & Network Security State Grid Laboratory of Electric Power Communication Network Technology Beijing China
This paper presents a complete Register Transfer Level (RTL) design of Direct Memory Access (DMA) controller which is compliable with the Advanced Highperformance Bus (AHB). The DMA is integrated in Cortex-M3-based sy... 详细信息
来源: 评论
An Algorithmic Aspect of Zernike Moments in the Presence of Rotation
An Algorithmic Aspect of Zernike Moments in the Presence of ...
收藏 引用
The First International Conference on Multimedia information networking and security(第一届国际多媒体网络信息安全会议 MINES 2009)
作者: Shijun Xiang Department of Electronic Engineering School of Information Science and Technology Jinan University Guangzhou 510632 China Key Laboratory of Network Security and Cryptology Fujian Normal University Fuzhou 350007 China
Zernike moments are widely used in image processing fields (e.g., rotation-invariant watermarking) based on many desirable properties, such as rotational invariance, noise robust and efficient representation of patter... 详细信息
来源: 评论
RFID indoor localization based on relational aggregation
RFID indoor localization based on relational aggregation
收藏 引用
International Workshop on Advanced Computational Intelligence (IWACI)
作者: Jiali Zheng Tuanfa Qin Jieming Wu Li Wan Guangxi Key Laboratory of Multimedia Communications and Network Technology (Cultivating Base) Guangxi Colleges and Universities Key Laboratory of Multimedia Communications and Information Processing School of Computer Electronics and Information Guangxi University Nanning China School of Information and Electronic Engineering WuZhou University Wuzhou China
This paper proposes a relational aggregation algorithm based on Radio Frequency Identification (RFID) to achieve accurate indoor localization. The proposed algorithm is composed of three steps: (1) exploring the relat... 详细信息
来源: 评论
Test-Time Training with Invariant Graph Learning for Out-of-Distribution Generalization
SSRN
收藏 引用
SSRN 2024年
作者: Pi, Li Li, Jiaxing Song, Lei Yang, Guanyu Chen, Yang Kong, Youyong Jiangsu Provincial Joint International Research Laboratory of Medical Information Processing School of Computer Science and Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Jiangsu Province Nanjing China
Graph Neural networks (GNNs) frequently do not perform optimally on out-of-distribution (OOD) data. Previous research on graph OOD generalization suggests extracting invariant subgraphs, which provide crucial categori... 详细信息
来源: 评论
Steganography for Neural Radiance Fields by Backdooring
arXiv
收藏 引用
arXiv 2023年
作者: Dong, Weina Liu, Jia Ke, Yan Chen, Lifeng Sun, Wenquan Pan, Xiaozhong The College of Cryptography Engineering Engineering University of PAP Shaanxi Xi’an710086 China Key Laboratory of Network and Information Security of PAP Engineering University of PAP Shaanxi Xi’an710086 China
The utilization of implicit representation for visual data (such as images, videos, and 3D models) has recently gained significant attention in computer vision research. In this letter, we propose a novel model stegan... 详细信息
来源: 评论
PRAD: Unsupervised KPI Anomaly Detection by Joint Prediction and Reconstruction of Multivariate Time Series  19
PRAD: Unsupervised KPI Anomaly Detection by Joint Prediction...
收藏 引用
2022 IEEE SmartWorld, 19th IEEE International Conference on Ubiquitous Intelligence and Computing, 2022 IEEE International Conference on Autonomous and Trusted Vehicles Conference, 22nd IEEE International Conference on Scalable Computing and Communications, 2022 IEEE International Conference on Digital Twin, 8th IEEE International Conference on Privacy Computing and 2022 IEEE International Conference on Metaverse, SmartWorld/UIC/ATC/ScalCom/DigitalTwin/PriComp/Metaverse 2022
作者: Xiong, Zhiying Fan, Qilin Wang, Kai Li, Xiuhua Zhang, Xu Xiong, Qingyu Chongqing University School of Big Data and Software Engineering Chongqing China Chongqing University Chongqing Key Laboratory of Digital Cinema Art Theory and Technology Chongqing China Harbin Institute of Technology School of Computer Science and Technology Weihai China Harbin Institute of Technology Research Institute of Cyberspace Security Weihai China Haihe Laboratory of Information Technology Application Innovation Tianjin China University of Exeter Department of Computer Science Exeter United Kingdom
Detecting anomalies for key performance indicator (KPI) data is of paramount importance to ensure the quality and reliability of network services. However, building the anomaly detection system for KPI is challenging ... 详细信息
来源: 评论
Proposal Feature Learning Using Proposal Relations for Weakly Supervised Object Detection
Proposal Feature Learning Using Proposal Relations for Weakl...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Zhaofei Wang Weijia Zhang Min-Ling Zhang School of Computer Science and Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education China School of Information and Physical Sciences The University of Newcastle NSW Australia
Weakly Supervised Object Detection (WSOD) trains detectors using only image-level annotations. Most existing WSOD models are based on pre-computed proposals and do not fully explore the relations of proposals. In this... 详细信息
来源: 评论
Trading Trust for Privacy: Socially-Motivated Personalized Privacy-Preserving Collaborative Learning in IoT
Trading Trust for Privacy: Socially-Motivated Personalized P...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Yuliang Chen Xi Lin Gaolei Li Lixing Chen Jing Wang Siyi Liao Jianhua Li Shanghai Jiao Tong University Shanghai China Shanghai Key Laboratory of Integrated Administration Technologies for Information Security Shanghai China China United Network Communication Co. Ltd
Nowadays, collaborative federated learning (CFL) is developing rapidly in the Internet of Things (IoT), which allows clients to jointly train models without compromising private data. The existing research has studied... 详细信息
来源: 评论