咨询与建议

限定检索结果

文献类型

  • 3,828 篇 会议
  • 1,897 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 5,726 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,677 篇 工学
    • 2,586 篇 计算机科学与技术...
    • 2,064 篇 软件工程
    • 989 篇 信息与通信工程
    • 532 篇 电气工程
    • 441 篇 控制科学与工程
    • 415 篇 电子科学与技术(可...
    • 339 篇 生物工程
    • 259 篇 机械工程
    • 253 篇 网络空间安全
    • 181 篇 仪器科学与技术
    • 156 篇 光学工程
    • 154 篇 生物医学工程(可授...
    • 138 篇 安全科学与工程
    • 135 篇 动力工程及工程热...
    • 127 篇 化学工程与技术
    • 118 篇 交通运输工程
    • 110 篇 建筑学
    • 108 篇 材料科学与工程(可...
    • 95 篇 土木工程
  • 1,631 篇 理学
    • 969 篇 数学
    • 366 篇 生物学
    • 336 篇 物理学
    • 321 篇 统计学(可授理学、...
    • 171 篇 系统科学
    • 142 篇 化学
  • 894 篇 管理学
    • 569 篇 管理科学与工程(可...
    • 368 篇 图书情报与档案管...
    • 193 篇 工商管理
  • 195 篇 法学
    • 125 篇 社会学
  • 126 篇 医学
    • 102 篇 临床医学
  • 77 篇 经济学
  • 53 篇 军事学
  • 43 篇 农学
  • 21 篇 教育学
  • 11 篇 文学
  • 11 篇 艺术学

主题

  • 240 篇 feature extracti...
  • 140 篇 semantics
  • 138 篇 security
  • 137 篇 computational mo...
  • 127 篇 accuracy
  • 125 篇 cryptography
  • 118 篇 deep learning
  • 116 篇 authentication
  • 116 篇 training
  • 111 篇 data models
  • 108 篇 protocols
  • 95 篇 privacy
  • 87 篇 simulation
  • 85 篇 information secu...
  • 81 篇 laboratories
  • 78 篇 neural networks
  • 78 篇 network security
  • 78 篇 federated learni...
  • 73 篇 data mining
  • 70 篇 robustness

机构

  • 277 篇 shandong provinc...
  • 228 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 191 篇 school of inform...
  • 93 篇 shandong provinc...
  • 82 篇 key laboratory o...
  • 72 篇 college of compu...
  • 68 篇 state grid key l...
  • 59 篇 information secu...
  • 56 篇 college of mathe...
  • 54 篇 ministry of educ...
  • 53 篇 school of comput...
  • 52 篇 tianjin key labo...
  • 51 篇 shandong fundame...
  • 50 篇 chongqing key la...
  • 49 篇 network and data...
  • 49 篇 school of commun...
  • 45 篇 shandong enginee...
  • 45 篇 fujian provincia...
  • 45 篇 state grid key l...

作者

  • 62 篇 yang bo
  • 55 篇 bo yang
  • 55 篇 meng deyu
  • 42 篇 yang xiaoyuan
  • 41 篇 guan xiaohong
  • 38 篇 ruyan wang
  • 37 篇 feng zhiquan
  • 37 篇 xiaohong guan
  • 37 篇 xu li
  • 35 篇 xu an wang
  • 35 篇 lin wang
  • 33 篇 ma kun
  • 33 篇 dapeng wu
  • 33 篇 wang lin
  • 32 篇 wenjie wang
  • 32 篇 yixian yang
  • 31 篇 xiaoyuan yang
  • 30 篇 hui-ming wang
  • 30 篇 chen yuehui
  • 30 篇 wang hui-ming

语言

  • 5,302 篇 英文
  • 272 篇 其他
  • 164 篇 中文
  • 2 篇 斯洛文尼亚文
检索条件"机构=Key Laboratory for Intelligent Network and Network Security"
5726 条 记 录,以下是1-10 订阅
排序:
Simulating learning methodology(SLeM):an approach to machine learning automation
收藏 引用
National Science Review 2024年 第8期11卷 12-17页
作者: Zongben Xu Jun Shu Deyu Meng School of Mathematics and Statistics Xi'an Jiaotong University Ministry of Education Key Lab of Intelligent Networks and Network Security Xi'an Jiaotong University Peng Cheng Laboratory Pazhou Laboratory(Huangpu)
MACHINE LEARNING REQUIRES AUTOMATION Machine learning (ML) is a fundamental technology of artificial intelligence(AI) that focuses on searching the possibly existing mapping f:x→y to fit a given dataset D={(xi,y... 详细信息
来源: 评论
DDoS Attack Autonomous Detection Model Based on Multi-Strategy Integrate Zebra Optimization Algorithm
收藏 引用
Computers, Materials & Continua 2025年 第1期82卷 645-674页
作者: Chunhui Li Xiaoying Wang Qingjie Zhang Jiaye Liang Aijing Zhang School of Information Engineering Institute of Disaster PreventionLangfang065201China Langfang Key Laboratory of Network Emergency Protection and Network Security Langfang065201China
Previous studies have shown that deep learning is very effective in detecting known ***,when facing unknown attacks,models such as Deep Neural networks(DNN)combined with Long Short-Term Memory(LSTM),Convolutional Neur... 详细信息
来源: 评论
Multimodal Cross-Attention Mechanism-Based Algorithm for Elderly Behavior Monitoring and Recognition
收藏 引用
Chinese Journal of Electronics 2025年 第1期34卷 309-321页
作者: Hao Liu Zhiquan Feng Qingbei Guo School of Information Science and Engineering Unicersity of Jinan Shandong Provincial Key Laboratory of Network Based Intelligent Computing Unicersity of Jinan
In contrast to the general population, behavior recognition among the elderly poses increased specificity and difficulty, rendering the reliability and usability aspects of safety monitoring systems for the elderly mo... 详细信息
来源: 评论
Heterogeneous Dual-Dynamic Attention network for Modeling Mutual Interplay of Stocks
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第7期5卷 3595-3606页
作者: Liu, Haotian Zhou, Yadong Zhou, Yuxun Hu, Bowen Xi'an Jiaotong University Ministry of Education Key Laboratory for Intelligent Networks and Network Security Faculty of Electronic and Information Engineering Xi'an710049 China
Modern quantitative finance and portfolio-based investment hinge on the dependence structure among financial instruments (like stocks) for return prediction, risk management, and hedging. Several attempts have been ma... 详细信息
来源: 评论
High Capacity Reversible Data Hiding Algorithm in Encrypted Images Based on Image Adaptive MSB Prediction and Secret Sharing
收藏 引用
清华大学学报自然科学版(英文版) 2025年 第3期30卷 1139-1156页
作者: Kaili Qi Minqing Zhang Fuqiang Di Chao Jiang Key Laboratory of Network & Information Security under PAP Engineering University of PAPXi'an 710086China
Until now,some reversible data hiding in encrypted images(RDH-EI)schemes based on secret sharing(SIS-RDHEI)still have the problems of not realizing diffusivity and high embedding ***,this paper innovatively proposes a... 详细信息
来源: 评论
A Revisit to Graph Neighborhood Cardinality Estimation  40
A Revisit to Graph Neighborhood Cardinality Estimation
收藏 引用
40th IEEE International Conference on Data Engineering, ICDE 2024
作者: Wang, Pinghui Zhang, Yuanming Cheng, Kuankuan Zhao, Junzhou Xi'An Jiaotong University MOE Key Laboratory for Intelligent Networks and Network Security Xi'an China
Graph data are ubiquitous in real-world systems such as social networks and protein-protein interaction networks. In many applications, nodes usually are associated with real-value attributes, e.g., age, income, and w... 详细信息
来源: 评论
CMW-Net: an adaptive robust algorithm for sample selection and label correction
收藏 引用
National Science Review 2023年 第6期10卷 19-23页
作者: Jun Shu Xiang Yuan Deyu Meng School of Mathematics and Statistics Xi'an Jiaotong University Ministry of Education Key Lab of Intelligent Networks and Network Security Xi'an Jiaotong University Peng Cheng Laboratory Pazhou Laboratory (Huangpu)
PROBLEM Deep neural networks (DNNs) have recently achieved impressive performance in various *** successis largely attributed to massive but carefully labeled data expected to properly and sufficiently simulate testin...
来源: 评论
Hierarchical Task Planning for Power Line Flow Regulation
收藏 引用
CSEE Journal of Power and Energy Systems 2024年 第1期10卷 29-40页
作者: Chenxi Wang Youtian Du Yanhao Huang Yuanlin Chang Zihao Guo the Ministry of Education Key Lab for Intelligent Networks and Network Security Xi'an Jiaotong UniversityXi'an 713599China the State Key Laboratory of Power Grid Safety and Energy Conservation China Electric Power Research InstituteBeijing 100192China
The complexity and uncertainty in power systems cause great challenges to controlling power *** a popular data-driven technique,deep reinforcement learning(DRL)attracts attention in the control of power ***,DRL has so... 详细信息
来源: 评论
Weighted Attribute Based Conditional Proxy Re-Encryption in the Cloud
收藏 引用
Computers, Materials & Continua 2025年 第4期83卷 1399-1414页
作者: Xixi Yan Jing Zhang Pengyu Cheng Henan Key Laboratory of Network Cryptography Technology Network Information Security and Cryptography LaboratorySchool of SoftwareHenan Polytechnic UniversityJiaozuo454003China School of Computer Science and Technology Henan Polytechnic UniversityJiaozuo454000China
Conditional proxy re-encryption(CPRE)is an effective cryptographic primitive language that enhances the access control mechanism and makes the delegation of decryption permissions more granular,but most of the attribu... 详细信息
来源: 评论
Method and Practice of Trusted Embedded Computing and Data Transmission Protection Architecture Based on Android
收藏 引用
Chinese Journal of Electronics 2024年 第3期33卷 623-634页
作者: Yichuan WANG Wen GAO Xinhong HEI Yanning DU School of Computer Science and Engineering Xi'an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology
In recent years,the rapid development of Internet technology has constantly enriched people's daily life and gradually changed from the traditional computer terminal to the mobile *** with it comes the security pr... 详细信息
来源: 评论