咨询与建议

限定检索结果

文献类型

  • 3,825 篇 会议
  • 1,883 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 5,709 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,660 篇 工学
    • 2,571 篇 计算机科学与技术...
    • 2,061 篇 软件工程
    • 982 篇 信息与通信工程
    • 529 篇 电气工程
    • 428 篇 控制科学与工程
    • 408 篇 电子科学与技术(可...
    • 338 篇 生物工程
    • 257 篇 机械工程
    • 250 篇 网络空间安全
    • 181 篇 仪器科学与技术
    • 157 篇 光学工程
    • 154 篇 生物医学工程(可授...
    • 139 篇 安全科学与工程
    • 134 篇 动力工程及工程热...
    • 127 篇 化学工程与技术
    • 118 篇 交通运输工程
    • 107 篇 建筑学
    • 105 篇 材料科学与工程(可...
    • 93 篇 土木工程
  • 1,631 篇 理学
    • 969 篇 数学
    • 365 篇 生物学
    • 336 篇 物理学
    • 321 篇 统计学(可授理学、...
    • 170 篇 系统科学
    • 141 篇 化学
  • 894 篇 管理学
    • 569 篇 管理科学与工程(可...
    • 368 篇 图书情报与档案管...
    • 195 篇 工商管理
  • 195 篇 法学
    • 125 篇 社会学
  • 124 篇 医学
    • 101 篇 临床医学
  • 78 篇 经济学
  • 53 篇 军事学
  • 43 篇 农学
  • 22 篇 教育学
  • 11 篇 文学
  • 9 篇 艺术学

主题

  • 240 篇 feature extracti...
  • 140 篇 semantics
  • 138 篇 security
  • 137 篇 computational mo...
  • 127 篇 accuracy
  • 126 篇 cryptography
  • 117 篇 deep learning
  • 116 篇 authentication
  • 116 篇 training
  • 111 篇 data models
  • 108 篇 protocols
  • 96 篇 privacy
  • 87 篇 simulation
  • 85 篇 information secu...
  • 81 篇 laboratories
  • 78 篇 neural networks
  • 78 篇 network security
  • 75 篇 federated learni...
  • 73 篇 data mining
  • 69 篇 wireless communi...

机构

  • 277 篇 shandong provinc...
  • 225 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 190 篇 school of inform...
  • 93 篇 shandong provinc...
  • 82 篇 key laboratory o...
  • 70 篇 college of compu...
  • 68 篇 state grid key l...
  • 59 篇 information secu...
  • 56 篇 college of mathe...
  • 54 篇 ministry of educ...
  • 53 篇 school of comput...
  • 52 篇 tianjin key labo...
  • 51 篇 shandong fundame...
  • 50 篇 chongqing key la...
  • 49 篇 network and data...
  • 49 篇 school of commun...
  • 45 篇 shandong enginee...
  • 45 篇 fujian provincia...
  • 45 篇 state grid key l...

作者

  • 62 篇 yang bo
  • 55 篇 bo yang
  • 55 篇 meng deyu
  • 41 篇 guan xiaohong
  • 41 篇 yang xiaoyuan
  • 38 篇 ruyan wang
  • 37 篇 feng zhiquan
  • 37 篇 xiaohong guan
  • 37 篇 xu li
  • 35 篇 xu an wang
  • 35 篇 lin wang
  • 33 篇 ma kun
  • 33 篇 dapeng wu
  • 33 篇 wang lin
  • 32 篇 wenjie wang
  • 32 篇 yixian yang
  • 31 篇 xiaoyuan yang
  • 30 篇 hui-ming wang
  • 30 篇 chen yuehui
  • 30 篇 wang hui-ming

语言

  • 5,294 篇 英文
  • 264 篇 其他
  • 162 篇 中文
  • 2 篇 斯洛文尼亚文
检索条件"机构=Key Laboratory for Intelligent Network and Network Security"
5709 条 记 录,以下是21-30 订阅
排序:
Meta-path and Meta-schema Hierarchical Aggregation for Heterogeneous Graph Neural networks  10
Meta-path and Meta-schema Hierarchical Aggregation for Heter...
收藏 引用
10th IEEE Smart World Congress, SWC 2024
作者: Wu, Ling Gao, Pingping Guo, Kun Fujian Key Laboratory of Network Computing and Intelligent Information Processing China
With deep learning's advancement in recent years, heterogeneous graph neural networks (HGNNs) have drawn a lot of interest. They are a group of deep learning models specifically designed for handling heterogeneous... 详细信息
来源: 评论
High-precision end-to-end adaptive optics aided orbital angular momentum wireless communication with XFTC-Net
收藏 引用
Optics Letters 2025年 第10期50卷 3265-3268页
作者: Xu, Panpan Chang, Huan Wang, Fei Gao, Ran Guo, Dong Zhu, Lei Li, Zhipei Zhou, Sitong Xu, Qi Chen, Jing Xin, Xiangjun Beijing100081 China National Key Laboratory of Science and Technology on Space-Born Intelligent Information Processing Beijing China Beijing100876 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology 250353 China
In this Letter, we demonstrate high-precision end-to-end adaptive optics (AO) technique based on the X-Shape Fusion Transformer-convolutional neural network (XFTC-Net) without an additional probe path to compensate fo... 详细信息
来源: 评论
Privacy Preserving Demand Side Management Method via Multi-Agent Reinforcement Learning
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2023年 第10期10卷 1984-1999页
作者: Feiye Zhang Qingyu Yang Dou An Faculty of Electronic and Information Engineering Xi’an Jiaotong UniversityXi’an 710049China Key Laboratory for Manufacturing Systems Engineering(SKLMSE) Xi’an Jiaotong UniversityXi’an 710049 MOE Key Laboratory for Intelligent Networks and Network Security Xi’an Jiaotong UniversityXi’an 710049China
The smart grid utilizes the demand side management technology to motivate energy users towards cutting demand during peak power consumption periods, which greatly improves the operation efficiency of the power grid. H... 详细信息
来源: 评论
An Empirical Application of User-Guided Program Analysis
收藏 引用
China Communications 2024年 第7期21卷 325-333页
作者: Wang Jigang Cheng Shengyu Cao Jicheng He Meihua State Key Laboratory of Mobile Network and Mobile Multimedia Shenzhen 518055China Department of Cyberspace Security ZTE CorporationShenzhen 518057China
Although static program analysis methods are frequently employed to enhance software quality,their efficiency in commercial settings is limited by their high false positive *** EUGENE tool can effectively lower the fa... 详细信息
来源: 评论
MarkNeRF:Watermarking for Neural Radiance Field
收藏 引用
Computers, Materials & Continua 2024年 第7期80卷 1235-1250页
作者: Lifeng Chen Jia Liu Wenquan Sun Weina Dong Xiaozhong Pan Cryptographic Engineering Department Institute of Cryptographic EngineeringEngineering University of PAPXi’an710086China Key Laboratory of Network and Information Security of PAP Xi’an710086China
This paper presents a novel watermarking scheme designed to address the copyright protection challenges encountered with Neural radiation field(NeRF)*** employ an embedding network to integrate the watermark into the ... 详细信息
来源: 评论
A Traceable Privacy-Preserving Transaction Protocol With Evolutionary Threshold Authentication
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 20787-20799页
作者: Xie, Ninghai Li, Jiguo Lin, Chao Zhang, Yichen Shen, Jian Fujian Normal University College of Computer and Cyber Security Fuzhou350117 China School of Mathematics and Statistics Key Laboratory of Analytical Mathematics and Applications Ministry of Education Fujian Fuzhou350117 China Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou350117 China Fujian Normal University Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fuzhou350117 China Guangzhou University Guangdong Key Laboratory of Blockchain Security Guangzhou510006 China Zhejiang Sci-Tech University School of Information Science and Engineering Hangzhou310018 China
Decentralized payment systems, such as Bitcoin, enable immutable and transparent payments in a distributed manner. To address the issue of user privacy leakage due to transaction transparency, some efforts have enhanc... 详细信息
来源: 评论
OSE: On-Site State-of-Health Estimation for Li-Ion Battery Using Real-Time Field Data
收藏 引用
IEEE Transactions on Transportation Electrification 2025年 第3期11卷 7452-7462页
作者: Chen, Yanwen Zhao, Cong Yang, Shusen Zhao, Peng Ren, Xuebin Han, Qing Yang, Yuqian Wu, Shuaijun Xi’an Jiaotong University National Engineering Laboratory for Big Data Analytics Shaanxi Xi’an710049 China Xi’an Jiaotong University National Engineering Laboratory for Big Data Analytics Ministry of Education Key Laboratory for Intelligent Networks and Network Security Shaanxi Xi’an710049 China
On-site lithium-ion batteries’ state-of-health (SoH) estimation is of crucial importance for reliable operations of electric vehicles (EVs). Yet, due to the low quality of unlabeled real-time field data, diverse oper... 详细信息
来源: 评论
DE-DFKD: diversity enhancing data-free knowledge distillation
收藏 引用
Multimedia Tools and Applications 2024年 1-28页
作者: Liu, Yanni Ye, Ayong Chen, Qiulin Zhang, Yuexin Chen, Jianwei College of Computer and Cyber Security Fujian Normal University Fuzhou350117 China Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou350117 China
Data-Free Knowledge Distillation (DFKD) can be used to train students using synthetic data, when the original dataset of the teacher network is not accessible. However, existing studies mainly focus on how to use the ... 详细信息
来源: 评论
Artificial Immune Detection for network Intrusion Data Based on Quantitative Matching Method
收藏 引用
Computers, Materials & Continua 2024年 第2期78卷 2361-2389页
作者: CaiMing Liu Yan Zhang Zhihui Hu Chunming Xie School of Electronic Information and Artificial Intelligence Leshan Normal UniversityLeshan614000China Intelligent Network Security Detection and Evaluation Laboratory Leshan Normal UniversityLeshan614000China Internet Natural Language Intelligent Processing Key Laboratory of Education Department of Sichuan Province Leshan Normal UniversityLeshan614000China
Artificial immune detection can be used to detect network intrusions in an adaptive approach and proper matching methods can improve the accuracy of immune detection *** paper proposes an artificial immune detection m... 详细信息
来源: 评论
Abnormal-trajectory detection method based on sub-trajectory classification and outlier-factor acquisition
收藏 引用
Journal of intelligent and Fuzzy Systems 2024年 第4期46卷 8477-8496页
作者: Xu, Dongsheng Chen, Chuanming Jin, Qi Zheng, Ming Ni, Tianjiao Yu, Qingying School of Computer and Information Anhui Normal University Anhui Wuhu China Anhui Provincial Key Laboratory of Network and Information Security Anhui Wuhu China
Abnormal-trajectory detection can be used to detect fraudulent behavior of taxi drivers transporting passengers. Aiming at the problem that existing methods do not fully consider abnormal fragments of trajectories, th... 详细信息
来源: 评论