咨询与建议

限定检索结果

文献类型

  • 4,432 篇 会议
  • 3,329 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,769 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,212 篇 工学
    • 3,916 篇 计算机科学与技术...
    • 3,130 篇 软件工程
    • 1,329 篇 信息与通信工程
    • 645 篇 电气工程
    • 541 篇 控制科学与工程
    • 523 篇 电子科学与技术(可...
    • 442 篇 网络空间安全
    • 439 篇 生物工程
    • 298 篇 机械工程
    • 230 篇 光学工程
    • 224 篇 仪器科学与技术
    • 188 篇 生物医学工程(可授...
    • 162 篇 安全科学与工程
    • 148 篇 动力工程及工程热...
    • 144 篇 化学工程与技术
    • 126 篇 建筑学
    • 124 篇 交通运输工程
  • 2,279 篇 理学
    • 1,360 篇 数学
    • 498 篇 物理学
    • 475 篇 生物学
    • 420 篇 统计学(可授理学、...
    • 208 篇 系统科学
    • 165 篇 化学
  • 1,326 篇 管理学
    • 809 篇 管理科学与工程(可...
    • 573 篇 图书情报与档案管...
    • 289 篇 工商管理
  • 287 篇 法学
    • 167 篇 社会学
    • 118 篇 法学
  • 153 篇 医学
    • 126 篇 临床医学
  • 116 篇 经济学
    • 116 篇 应用经济学
  • 98 篇 军事学
  • 53 篇 农学
  • 42 篇 教育学
  • 24 篇 文学
  • 22 篇 艺术学

主题

  • 237 篇 feature extracti...
  • 227 篇 semantics
  • 216 篇 cryptography
  • 182 篇 authentication
  • 181 篇 information secu...
  • 161 篇 computational mo...
  • 157 篇 security
  • 150 篇 protocols
  • 142 篇 accuracy
  • 141 篇 privacy
  • 139 篇 deep learning
  • 125 篇 training
  • 122 篇 laboratories
  • 105 篇 data models
  • 99 篇 federated learni...
  • 99 篇 cloud computing
  • 94 篇 servers
  • 93 篇 blockchain
  • 92 篇 public key crypt...
  • 88 篇 data privacy

机构

  • 202 篇 shandong provinc...
  • 173 篇 key laboratory o...
  • 158 篇 school of comput...
  • 156 篇 state key labora...
  • 113 篇 school of comput...
  • 106 篇 department of co...
  • 106 篇 school of cyber ...
  • 97 篇 information secu...
  • 80 篇 key laboratory o...
  • 78 篇 institute of inf...
  • 69 篇 guangdong provin...
  • 65 篇 college of mathe...
  • 65 篇 state grid key l...
  • 64 篇 computer network...
  • 64 篇 university of ch...
  • 60 篇 key laboratory o...
  • 60 篇 peng cheng labor...
  • 59 篇 school of softwa...
  • 59 篇 school of comput...
  • 54 篇 key laboratory o...

作者

  • 55 篇 jianfeng ma
  • 53 篇 yang yang
  • 48 篇 ma jianfeng
  • 45 篇 yixian yang
  • 42 篇 ding yong
  • 41 篇 zheng wei-shi
  • 38 篇 huang qingming
  • 31 篇 cong runmin
  • 31 篇 zhang huanguo
  • 31 篇 xu an wang
  • 31 篇 hu yupu
  • 31 篇 yang yixian
  • 30 篇 wang wei
  • 28 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 26 篇 xu li
  • 26 篇 xie xiaohua
  • 24 篇 xinhong hei
  • 23 篇 liu xin

语言

  • 7,157 篇 英文
  • 349 篇 其他
  • 278 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory Computer Network and Information Security"
7769 条 记 录,以下是71-80 订阅
排序:
LCLB: Low Cross-Chain Transaction Ratio and Load Balancing for Blockchain Sharding  6
LCLB: Low Cross-Chain Transaction Ratio and Load Balancing f...
收藏 引用
6th International Conference on Robotics, Intelligent Control and Artificial Intelligence, RICAI 2024
作者: Wang, Yu Wu, Xiaoming Yuan, Qile Dong, Yunfeng Liu, Xiangzhi Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
As blockchain technology becomes widely applied, handling high volumes of transactions has become a critical challenge. Sharding has emerged as an effective solution to enhance the throughput of blockchain systems. Ye... 详细信息
来源: 评论
FHGraph:A Novel Framework for Fake News Detection Using Graph Contrastive Learning and LLM
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 309-333页
作者: Yuanqing Li Mengyao Dai Sanfeng Zhang School of Cyber Science and Engineering Southeast UniversityNanjing210096China Key Laboratory of Computer Network and Information Integration(Southeast University) Ministry of EducationNanjing210096China
Social media has significantly accelerated the rapid dissemination of information,but it also boosts propagation of fake news,posing serious challenges to public awareness and social *** real-world contexts,the volume... 详细信息
来源: 评论
AQROM:A quality of service aware routing optimization mechanism based on asynchronous advantage actor-critic in software-defined networks
收藏 引用
Digital Communications and networks 2024年 第5期10卷 1405-1414页
作者: Wei Zhou Xing Jiang Qingsong Luo Bingli Guo Xiang Sun Fengyuan Sun Lingyu Meng School of Information and Communication Guilin University of Electronic TechnologyGuilin541004China The 34th Research Institute of China Electronics Technology Group Corporation Guilin541004China Guangxi Key Laboratory of Optical Network and Optical Information Security Guilin541004China State Key Laboratory of Information Photonics and Optical Communications BeijingUniversity of Posts and TelecommunicationsBeijing100876China Department of Electrical and Computer Engineering University of New MexicoAlbuquerqueNM87131USA
In Software-Defined networks(SDNs),determining how to efficiently achieve Quality of Service(QoS)-aware routing is challenging but critical for significantly improving the performance of a network,where the metrics of... 详细信息
来源: 评论
SGNet: A Multi-Scale Method for Steel Surface Defect Detection  10
SGNet: A Multi-Scale Method for Steel Surface Defect Detecti...
收藏 引用
10th IEEE Smart World Congress, SWC 2024
作者: Liu, Shanshan Liu, Xiangzhi Man, Jiazheng Cao, Bingyang Dong, Yunfeng Wu, Xiaoming Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
The large variation in target scales within steel surface defect images often results in low detection accuracy. To address this issue, we have developed a multi-scale defect detection method named SGNet. Initially, w... 详细信息
来源: 评论
ID-YOLOv7: A Method for Steel Surface Defect Detection Combining Residual Attention and Dynamic Upsampling  10
ID-YOLOv7: A Method for Steel Surface Defect Detection Combi...
收藏 引用
10th IEEE Smart World Congress, SWC 2024
作者: Liu, Shanshan Liu, Xiangzhi Man, Jiazheng Cao, Bingyang Dong, Yunfeng Wu, Xiaoming Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
Industrial defect detection is a crucial challenge in computer vision. The accuracy of detecting defects on steel surfaces is hindered by spatially varying noise. To address this challenge, we propose an efficient met... 详细信息
来源: 评论
Source-free Domain Adaptation with Multiple Alignment for Efficient Image Retrieval
Source-free Domain Adaptation with Multiple Alignment for Ef...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Ni, Jinghui Cui, Hui Zhao, Lihai Li, Fengling Han, Xiaohui Xu, Lijuan Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science China Quan Cheng Laboratory China Shandong Open University China University of Technology Sydney Australia
Domain adaptation techniques help models generalize to target domains by addressing domain discrepancies between the source and target domain data distributions. These techniques are particularly valuable for cross-do... 详细信息
来源: 评论
A Blockchain-Based Hierarchical Dynamic Collaborative Storage Model  10
A Blockchain-Based Hierarchical Dynamic Collaborative Storag...
收藏 引用
10th IEEE Smart World Congress, SWC 2024
作者: Yuan, Qile Liu, Xiangzhi Wang, Yu Dong, Yunfeng Jia, Haoyu Wu, Xiaoming Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
The pervasive application of blockchain technology has led to a significant increase in data volume, presenting significant challenges to existing storage architectures in environments characterized by large volumes o... 详细信息
来源: 评论
Dual-Mode Resonant Sectorial Monopole Antenna with Stable Backfire Gain
收藏 引用
Chinese Journal of Electronics 2024年 第6期33卷 1478-1486页
作者: Feiyan JI Heng ZHANG Xiuqiong XING Wenjun LU Lei ZHU Jiangsu Key Laboratory of Wireless Communications Nanjing University of Posts and Telecommunications Key Laboratory of Wireless Sensor Network & Communication Shanghai Institute of Microsystem and Information Technology Chinese Academy of Sciences Department of Electrical and Computer Engineering Faculty of Science and Technology University of Macau
A novel design approach to wideband, dual-mode resonant monopole antenna with stable, enhanced backfire gain is advanced. The sectorial monopole evolves from a linear, 0.75-wavelength electric prototype monopole under... 详细信息
来源: 评论
Multi-Label Text Classification for Judicial Texts via Dual Graph and Label Feature Fusion  10
Multi-Label Text Classification for Judicial Texts via Dual ...
收藏 引用
10th IEEE Smart World Congress, SWC 2024
作者: Gu, Qiliang Lu, Qin Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
The legal judgement prediction (LJP) of judicial texts represents a multi-label text classification (MLTC) problem, which in turn involves three distinct tasks: the prediction of charges, legal articles, and terms of ... 详细信息
来源: 评论
NDFuzz:a non-intrusive coverage-guided fuzzing framework for virtualized network devices
收藏 引用
Cybersecurity 2023年 第1期6卷 54-74页
作者: Yu Zhang Nanyu Zhong Wei You Yanyan Zou Kunpeng Jian Jiahuan Xu Jian Sun Baoxu Liu Wei Huo Institute of Information Engineering Chinese Academy of SciencesBejingChina School of Cyber Security University of Chinese Academy of SciencesBejingChina Key Laboratory of Network Assessment Technology Chinese Academy of SciencesBeijingChina Beijing Key Laboratory of Network Security and Protection Technology BeijingChina Renmin University of China BeijingChina
network function virtualization provides programmable in-network middlewares by leveraging virtualization tech-nologies and commodity hardware and has gained popularity among all mainstream network device *** it is ch... 详细信息
来源: 评论