咨询与建议

限定检索结果

文献类型

  • 1,828 篇 会议
  • 1,577 篇 期刊文献

馆藏范围

  • 3,405 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,295 篇 工学
    • 1,683 篇 计算机科学与技术...
    • 1,319 篇 软件工程
    • 616 篇 信息与通信工程
    • 304 篇 电气工程
    • 249 篇 电子科学与技术(可...
    • 236 篇 控制科学与工程
    • 223 篇 生物工程
    • 157 篇 机械工程
    • 130 篇 网络空间安全
    • 111 篇 仪器科学与技术
    • 107 篇 光学工程
    • 106 篇 生物医学工程(可授...
    • 83 篇 化学工程与技术
    • 77 篇 动力工程及工程热...
    • 77 篇 交通运输工程
    • 60 篇 安全科学与工程
    • 56 篇 建筑学
  • 1,080 篇 理学
    • 640 篇 数学
    • 246 篇 生物学
    • 229 篇 物理学
    • 199 篇 统计学(可授理学、...
    • 93 篇 系统科学
    • 89 篇 化学
  • 672 篇 管理学
    • 387 篇 管理科学与工程(可...
    • 313 篇 图书情报与档案管...
    • 140 篇 工商管理
  • 107 篇 法学
    • 71 篇 社会学
  • 87 篇 医学
    • 72 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 59 篇 经济学
    • 59 篇 应用经济学
  • 39 篇 农学
  • 23 篇 军事学
  • 12 篇 教育学
  • 11 篇 文学
  • 9 篇 艺术学

主题

  • 138 篇 feature extracti...
  • 123 篇 semantics
  • 94 篇 accuracy
  • 78 篇 computational mo...
  • 77 篇 training
  • 64 篇 data models
  • 62 篇 deep learning
  • 60 篇 federated learni...
  • 49 篇 protocols
  • 49 篇 clustering algor...
  • 47 篇 data mining
  • 46 篇 cryptography
  • 44 篇 neural networks
  • 44 篇 visualization
  • 43 篇 privacy
  • 42 篇 robustness
  • 41 篇 optimization
  • 41 篇 predictive model...
  • 41 篇 security
  • 40 篇 wireless sensor ...

机构

  • 217 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 165 篇 school of comput...
  • 80 篇 key laboratory o...
  • 65 篇 college of compu...
  • 63 篇 computer network...
  • 61 篇 key laboratory o...
  • 59 篇 college of infor...
  • 56 篇 college of mathe...
  • 50 篇 shandong fundame...
  • 47 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 44 篇 key laboratory o...
  • 43 篇 school of cyber ...
  • 42 篇 the key laborato...
  • 42 篇 institute of inf...
  • 39 篇 school of comput...
  • 37 篇 university of ch...
  • 37 篇 shandong provinc...
  • 36 篇 key laboratory o...

作者

  • 47 篇 zhao yao
  • 42 篇 ren jiadong
  • 36 篇 zhou deyu
  • 27 篇 zhang min-ling
  • 26 篇 cong runmin
  • 26 篇 yang yang
  • 24 篇 guo wenzhong
  • 22 篇 min-ling zhang
  • 21 篇 xiaoming wu
  • 21 篇 guang cheng
  • 20 篇 guo kun
  • 19 篇 geng xin
  • 19 篇 wang yun
  • 19 篇 zhang zhenrong
  • 19 篇 du bo
  • 17 篇 xiaoping li
  • 17 篇 liu ximeng
  • 16 篇 di xiaoqiang
  • 16 篇 he yulan
  • 16 篇 xia chunhe

语言

  • 3,086 篇 英文
  • 188 篇 其他
  • 146 篇 中文
检索条件"机构=Key Laboratory for Computer Network and Information Integration"
3405 条 记 录,以下是41-50 订阅
排序:
Privacy-Preserving Covert Channels in VoLTE via Inter-Frame Delay Modulation  1
收藏 引用
2nd International Conference on Artificial Intelligence Security and Privacy, AIS and P 2024
作者: Wu, Xiaokai sun, Xuan Huang, Jiaxin Shi, Ning Liang, Chen Computer School Beijing Information Science and Technology University Beijing100192 China China Southern Airlines Co. Ltd. Guangdong Guangzhou510000 China Hebei Key Laboratory of IoT Blockchain Integration Shijiazhuang China
The rapid advancement of artificial intelligence and mobile communication technologies has brought unprecedented convenience, but also significant privacy and security concerns, particularly in real-time video communi... 详细信息
来源: 评论
Comprehensive Perturbation Consistency for Semi-Supervised Change Detection in Remote Sensing Images
Comprehensive Perturbation Consistency for Semi-Supervised C...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Zan Mao Xin Li Ze Luo Yingjuan Tang Dongmei Jiang Computer Network Information Center Chinese Academy of Sciences University of the Chinese Academy of Sciences PengCheng Laboratory National Key Laboratory of Advanced Vehicle Integration and Control Beijing Institute of Technology
Currently, many change detection (CD) methods rely on supervised learning, which necessitates extensive manually annotated data, resulting in significant labor and time requirements. Recently, semi-supervised (SS) app... 详细信息
来源: 评论
Brillouin Frequency Shift Extraction for BOTDA Based on Gramian Angular Fields  4
Brillouin Frequency Shift Extraction for BOTDA Based on Gram...
收藏 引用
4th International Computational Imaging Conference, CITA 2024
作者: Zhu, Borong Zhang, Zhihao Qian, Yuhao Ma, Xiaole Wang, Liang Yu, Kuanglu Beijing Key Laboratory of Advanced Information Science and Network Technology Beijing100044 China Institute of Information Science School of Computer and Information Technology Beijing Jiaotong University Beijing100044 China National Engineering Laboratory for Next Generation Internet Access System School of Optics and Electronic Information Huazhong University of Science and Technology Wuhan430074 China
To accurately extract Brillouin frequency shift of BOTDA with large sweeping step sizes, a novel structure of GAFCNN is proposed, combining time series coding with convolutional neural networks. The experimental data ... 详细信息
来源: 评论
A circuit area optimization of MK-3 S-box
收藏 引用
Cybersecurity 2025年 第1期8卷 61-71页
作者: Yanjun Li Weiguo Zhang Yiping Lin Jian Zou Jian Liu Information Industry Information Security Evaluation Center The 15th Research Institute of China Electronic Technology Group CorporationBeijing 100083China Henan Key Laboratory of Network Cryptography Technology Zhengzhou 450001China Beijing Electronic Science and Technology Institute No.7 Fufeng RoadFengtai DistricBeijing 100083China College of Computer and Data Science Fuzhou UniversityFuzhou 350108China
In MILCOM 2015,Kelly et *** the authentication encryption algorithm MK-3,which applied the 16-bit *** paper aims to implement the 16-bit S-box with less circuit ***,we classifed the irreducible polynomials over F_(2n)... 详细信息
来源: 评论
A Reversible Data Hiding in Encryption Domain for JPEG Image Based on Controllable Ciphertext Range of Paillier Homomorphic Encryption Algorithm  21st
A Reversible Data Hiding in Encryption Domain for JPEG Ima...
收藏 引用
21st Pacific Rim International Conference on Artificial Intelligence, PRICAI 2024
作者: Ma, Bin Zhao, Chunxin Ma, Ruihe Xian, Yongjin Wang, Chunpeng Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China School of Economics Jilin University Changchun130015 China
With the rapid advancement of cloud computing, significant security concerns regarding data storage have been continuously raised. When the encrypted images are stored in the cloud, reversible data hiding in encrypted... 详细信息
来源: 评论
Density Peak Clustering Algorithm Based on Data Field Theory and Grid Similarity
收藏 引用
Journal of computer Science and Technology 2025年 第2期40卷 301-321页
作者: Yu, Qing-Ying Shi, Ge-Ge Xu, Dong-Sheng Wang, Wen-Kai Chen, Chuan-Ming Luo, Yong-Long School of Computer and Information Anhui Normal University Wuhu241002 China Anhui Provincial Key Laboratory of Network and Information Security Wuhu241002 China
The density peak clustering algorithm can rapidly identify cluster centers by drawing decision graphs without any prior knowledge;however, when multiple density peaks are present in one cluster of the dataset, the clu... 详细信息
来源: 评论
Do Not Trust What They Tell: Exposing Malicious Accomplices in Tor via Anomalous Circuit Detection  34
Do Not Trust What They Tell: Exposing Malicious Accomplices ...
收藏 引用
34th ACM Web Conference, WWW 2025
作者: Yao, Yixuan Yang, Ming Liu, Zixia Dong, Kai Gu, Xiaodan Wang, Chunmian Southeast University Jiangsu Nanjing China Anhui University of Technology Anhui Maanshan China Key Laboratory of Computer Network and Information Integration (Southeast University) Ministry of Education China
The Tor network, while offering anonymity through traffic routing across volunteer-operated nodes, remains vulnerable to attacks that aim to deanonymize users by correlating traffic patterns between colluded entry and... 详细信息
来源: 评论
Non-Line-of-Sight Multipath Classification Method for BDS Using Convolutional Sparse Autoencoder with LSTM
收藏 引用
Tsinghua Science and Technology 2025年 第1期30卷 68-86页
作者: Yahang Qin Zhenni Li Shengli Xie Bo Li Ming Liu Victor Kuzin School of Automation Guangdong University of Technologyand also with Guangdong-Hong Kong-Macao Joint Laboratory for Smart Discrete ManufacturingGuangzhou 510006China School of Automation Guangdong University of TechnologyGuangdong Key Laboratory of IoT Information TechnologyGuangzhou 510006China 111 Center for Intelligent Batch Manufacturing Based on IoT Technology Key Laboratory of Intelligent Information Processing and System Integration of IoTMinistry of EducationGuangzhou 510006China Department of Electronic and Computer Engineering Hong Kong University of Science and TechnologHong Kong 999077China Academician of Russian Engineering Academy Moscow Moscow 125009Russia
Multipath signal recognition is crucial to the ability to provide high-precision absolute-position services by the BeiDou Navigation Satellite System(BDS).However,most existing approaches to this issue involve supervi... 详细信息
来源: 评论
Secure Similar Adjacent Vertex Query on Sparse Graph Data in Cloud Environment  8th
Secure Similar Adjacent Vertex Query on Sparse Graph Data i...
收藏 引用
8th International Congress on Edge Computing, EDGE 2024, Held as Part of the Services Conference Federation, SCF 2024
作者: Tian, Yun Wu, Bin Shi, Jiaoli Zhang, Caicai Xu, Du School of Computer and Big Data Science Jiujiang University Jiujiang332005 China Jiujiang Key Laboratory of Network and Information Security Jiujiang332005 China School of Modern Information Technology Zhejiang Polytechnic University of Mechanical and Electrical Engineering Hangzhou310053 China
The development of cloud computing and the widespread application of cloud services have made outsourcing services more convenient. The need for individuals and businesses to store and manipulate the graph data they g... 详细信息
来源: 评论
Rehearse With User: Personalized Opinion Summarization via Role-Playing based on Large Language Models
arXiv
收藏 引用
arXiv 2025年
作者: Zhang, Yanyue He, Yulan Zhou, Deyu School of Computer Science and Engineering Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University China Department of Informatics King’s College London United Kingdom The Alan Turing Institute
Personalized opinion summarization is crucial as it considers individual user interests while generating product summaries. Recent studies show that although large language models demonstrate powerful text summarizati... 详细信息
来源: 评论