咨询与建议

限定检索结果

文献类型

  • 4,432 篇 会议
  • 3,329 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,769 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,212 篇 工学
    • 3,916 篇 计算机科学与技术...
    • 3,130 篇 软件工程
    • 1,329 篇 信息与通信工程
    • 645 篇 电气工程
    • 541 篇 控制科学与工程
    • 523 篇 电子科学与技术(可...
    • 442 篇 网络空间安全
    • 439 篇 生物工程
    • 298 篇 机械工程
    • 230 篇 光学工程
    • 224 篇 仪器科学与技术
    • 188 篇 生物医学工程(可授...
    • 162 篇 安全科学与工程
    • 148 篇 动力工程及工程热...
    • 144 篇 化学工程与技术
    • 126 篇 建筑学
    • 124 篇 交通运输工程
  • 2,279 篇 理学
    • 1,360 篇 数学
    • 498 篇 物理学
    • 475 篇 生物学
    • 420 篇 统计学(可授理学、...
    • 208 篇 系统科学
    • 165 篇 化学
  • 1,326 篇 管理学
    • 809 篇 管理科学与工程(可...
    • 573 篇 图书情报与档案管...
    • 289 篇 工商管理
  • 287 篇 法学
    • 167 篇 社会学
    • 118 篇 法学
  • 153 篇 医学
    • 126 篇 临床医学
  • 116 篇 经济学
    • 116 篇 应用经济学
  • 98 篇 军事学
  • 53 篇 农学
  • 42 篇 教育学
  • 24 篇 文学
  • 22 篇 艺术学

主题

  • 237 篇 feature extracti...
  • 227 篇 semantics
  • 216 篇 cryptography
  • 182 篇 authentication
  • 181 篇 information secu...
  • 161 篇 computational mo...
  • 157 篇 security
  • 150 篇 protocols
  • 142 篇 accuracy
  • 141 篇 privacy
  • 139 篇 deep learning
  • 125 篇 training
  • 122 篇 laboratories
  • 105 篇 data models
  • 99 篇 federated learni...
  • 99 篇 cloud computing
  • 94 篇 servers
  • 93 篇 blockchain
  • 92 篇 public key crypt...
  • 88 篇 data privacy

机构

  • 202 篇 shandong provinc...
  • 173 篇 key laboratory o...
  • 158 篇 school of comput...
  • 156 篇 state key labora...
  • 113 篇 school of comput...
  • 106 篇 department of co...
  • 106 篇 school of cyber ...
  • 97 篇 information secu...
  • 80 篇 key laboratory o...
  • 78 篇 institute of inf...
  • 69 篇 guangdong provin...
  • 65 篇 college of mathe...
  • 65 篇 state grid key l...
  • 64 篇 computer network...
  • 64 篇 university of ch...
  • 60 篇 key laboratory o...
  • 60 篇 peng cheng labor...
  • 59 篇 school of softwa...
  • 59 篇 school of comput...
  • 54 篇 key laboratory o...

作者

  • 55 篇 jianfeng ma
  • 53 篇 yang yang
  • 48 篇 ma jianfeng
  • 45 篇 yixian yang
  • 42 篇 ding yong
  • 41 篇 zheng wei-shi
  • 38 篇 huang qingming
  • 31 篇 cong runmin
  • 31 篇 zhang huanguo
  • 31 篇 xu an wang
  • 31 篇 hu yupu
  • 31 篇 yang yixian
  • 30 篇 wang wei
  • 28 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 26 篇 xu li
  • 26 篇 xie xiaohua
  • 24 篇 xinhong hei
  • 23 篇 liu xin

语言

  • 7,157 篇 英文
  • 349 篇 其他
  • 278 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory Computer Network and Information Security"
7769 条 记 录,以下是71-80 订阅
排序:
Chain-of-Specificity: Enhancing Task-Specific Constraint Adherence in Large Language Models  31
Chain-of-Specificity: Enhancing Task-Specific Constraint Adh...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Wei, Kaiwen Zhong, Jiang Zhang, Hongzhi Zhang, Di Jin, Li Yu, Yue Zhang, Jingyuan College of Computer Science Chongqing University China Kuaishou Inc. China Key Laboratory of Network Information System Technology Aerospace Information Research Institute Chinese Academy of Sciences China
Large Language Models (LLMs) exhibit remarkable generative capabilities, enabling the generation of valuable information. Despite these advancements, previous research found that LLMs sometimes struggle with adhering ... 详细信息
来源: 评论
A Chain-of-Task Framework for Instruction Tuning of LLMs Based on Chinese Grammatical Error Correction  31
A Chain-of-Task Framework for Instruction Tuning of LLMs Bas...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Liu, Xinpeng Xu, Bing Yang, Muyun Cao, Hailong Zhu, Conghui Zhao, Tiejun Lu, Wenpeng Faculty of Computing Harbin Institute of Technology Harbin China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology Shandong Academy of Sciences Jinan China
Over-correction is a critical issue for large language models (LLMs) to address Grammatical Error Correction (GEC) task, esp. for Chinese. This paper proposes a Chain-of-Task (CoTask) framework to reduce over-correcti... 详细信息
来源: 评论
A Verifiable Decentralized Data Modification Mechanism Supporting Accountability for Securing Industrial IoT  24th
A Verifiable Decentralized Data Modification Mechanism Suppo...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Yang, Changsong Wu, Junfu Liang, Hai Ding, Yong Wang, Yujue Guangxi Key Laboratory of Cryptography and Information Security School of Computer Science and Information Security Guilin University of Electronic Technology Guilin China Guangxi Key Laboratory of Digital Infrastructure Guangxi Zhuang Autonomous Region Information Center Nanning China Institute of Cyberspace Technology HKCT Institute for Higher Education Hong Kong Hangzhou Innovation Institute of Beihang University Hangzhou China
The widespread application of Industrial Internet of Things (IIoT) has profoundly transformed modern industrial production methods. However, the large scale of industrial data, the diversity of data sources, and the h... 详细信息
来源: 评论
A Fine-Grained Ownership Transfer Protocol for Cloud EMRs Auditing  24th
A Fine-Grained Ownership Transfer Protocol for Cloud EMRs A...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Wang, Yamei Zhang, Yuexin You, Weijing Ma, Yunru Wang, Derui Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fujian Normal University Fuzhou China School of Health Fujian Medical University Fuzhou China CSIRO’s Data61 Melbourne Australia
In cloud Electronic Medical Records (EMRs), a user’s medical records typically comprise various types of health-related sensitive data. When data ownership needs to be transferred, it is preferred to transfer the req... 详细信息
来源: 评论
Confidence-Guided Feature Alignment for Cloth-Changing Person Re-identification  27th
Confidence-Guided Feature Alignment for Cloth-Changing Pers...
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Huang, Sirong Zheng, Huicheng School of Computer Science and Engineering Sun Yat-Sen University Guangzhou China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education Guangzhou China Guangdong Province Key Laboratory of Information Security Technology Guangzhou China
Much progress has been made in the field of person re-identification, but changes in clothing have hindered the practical application of long-term person re-identification. Cloth-changing person re-identification (CC-... 详细信息
来源: 评论
Fine-Grained Zero-Shot Object Detection via Semantic Decoupling  24
Fine-Grained Zero-Shot Object Detection via Semantic Decoupl...
收藏 引用
8th International Conference on computer Science and Artificial Intelligence, CSAI 2024
作者: Duan, Lijuan Zhang, Zichen Gong, Zhi Beijing Key Laboratory of Trusted Computing Beijing University of Technology Beijing China School of Computer Science Beijing University of Technology Beijing China National Engineering Laboratory for Key Technologies of Information Security Level Protection Beijing China
Recent deep learning models have advanced object detection capabilities, but their reliance on labeled data limits scalability. Fine-grained zero-shot detection remains challenging due to the need to generalize to uns... 详细信息
来源: 评论
Reflectance Recovery Guided Learning of Illumination-Invariant Features for Person Re-Identification  18th
Reflectance Recovery Guided Learning of Illumination-Invari...
收藏 引用
18th Chinese Conference on Biometric Recognition, CCBR 2024
作者: Chen, Xianbiao Xie, Xiaohua School of Computer Science and Engineering Sun Yat-sen University Guangzhou China Guangdong Province Key Laboratory of Information Security Technology Guangzhou China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education Guangzhou China
In real-world scenarios, the changes of illumination are noticeable and can significantly impact the performance of re-identification (ReID) algorithms. However, the existing person ReID methods predominantly concentr... 详细信息
来源: 评论
A Byzantine Client Detection Method for Federated Learning Based on Encrypted Repeated Median Linear Regression  24
A Byzantine Client Detection Method for Federated Learning B...
收藏 引用
5th International Conference on computer Science and Management Technology, ICCSMT 2024
作者: Guo, Jinlong Yang, Ming Li, Huijuan Wu, Xiaoming He, Yunpeng Wang, Xin Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Shandong Jinan China Shandong Evayinfo Technology Co. Ltd. Shandong Jinan China
Federated learning is an emerging distributed machine learning technology that allows participants to jointly train machine learning models locally without the need for large-scale data transmission and sharing, there... 详细信息
来源: 评论
CurMIM: Curriculum Masked Image Modeling
CurMIM: Curriculum Masked Image Modeling
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Liu, Hao Wang, Kun Han, Yudong Wang, Haocong Hu, Yupeng Wang, Chunxiao Nie, Liqiang School of Software Shandong University Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology Shandong Academy of Sciences Jinan China School of Computer Science and Technology Harbin Institute of Technology Shenzhen China
Masked Image Modeling (MIM), following "mask-and-reconstruct" scheme, is a promising self-supervised method to learn scalable visual representation. Studies indicate that selecting an effective mask strategy... 详细信息
来源: 评论
Fine-grained Personalized Hierarchical Federated Learning towards Heterogeneous Internet of Vehicles
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 16349-16362页
作者: Zhang, Puning Shao, Shuman Wu, Chao Yang, Zhigang Zhang, Ruoying Chongqing University of Posts and Telecommunications School of Communications and Information Engineering Chongqing400065 China Chongqing Key Laboratory of Ubiquitous Sensing and Networking Advanced Network and Intelligent Connection Technology Key Laboratory of Chongqing Education Commission of China Chongqing400065 China Chongqing Innovation Center of Industrial Big-Data Co. Ltd National Engineering Laboratory for Industrial Big-data Application Technology Chongqing400707 China China Merchants Testing Vehicle Technology Research Institute Co. Ltd Chongqing404100 China Chongqing University of Posts and Telecommunications School of Cyber Security and Information Law Chongqing400065 China Chongqing Key Laboratory of Ubiquitous Sensing and Networking Advanced Network and Intelligent Connection Technology Key Laboratory of Chongqing Education Commission of China China China Academy of Information and Communications Beijing100083 China
High mobility and non-independent and identically distributed (non-iid) data in the Internet of Vehicles (IoV) pose challenges for the convergence speed and accuracy of federated learning model training. Traditional f... 详细信息
来源: 评论