咨询与建议

限定检索结果

文献类型

  • 720 篇 会议
  • 478 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,199 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 710 篇 工学
    • 461 篇 计算机科学与技术...
    • 392 篇 软件工程
    • 230 篇 信息与通信工程
    • 119 篇 电气工程
    • 109 篇 控制科学与工程
    • 88 篇 电子科学与技术(可...
    • 64 篇 生物工程
    • 41 篇 机械工程
    • 41 篇 仪器科学与技术
    • 34 篇 光学工程
    • 32 篇 生物医学工程(可授...
    • 31 篇 动力工程及工程热...
    • 30 篇 建筑学
    • 27 篇 网络空间安全
    • 23 篇 土木工程
    • 21 篇 交通运输工程
    • 17 篇 化学工程与技术
    • 17 篇 安全科学与工程
  • 320 篇 理学
    • 194 篇 数学
    • 71 篇 生物学
    • 67 篇 统计学(可授理学、...
    • 56 篇 系统科学
    • 49 篇 物理学
    • 20 篇 化学
  • 153 篇 管理学
    • 104 篇 管理科学与工程(可...
    • 56 篇 图书情报与档案管...
    • 27 篇 工商管理
  • 24 篇 法学
    • 17 篇 社会学
  • 23 篇 医学
    • 21 篇 临床医学
    • 15 篇 基础医学(可授医学...
  • 11 篇 经济学
  • 5 篇 教育学
  • 5 篇 农学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 88 篇 feature extracti...
  • 58 篇 accuracy
  • 53 篇 semantics
  • 41 篇 computational mo...
  • 39 篇 security
  • 37 篇 deep learning
  • 34 篇 training
  • 29 篇 data models
  • 27 篇 federated learni...
  • 27 篇 robustness
  • 25 篇 neural networks
  • 21 篇 data mining
  • 20 篇 wireless communi...
  • 20 篇 interference
  • 20 篇 privacy
  • 19 篇 noise
  • 19 篇 visualization
  • 19 篇 protocols
  • 18 篇 object detection
  • 18 篇 signal to noise ...

机构

  • 202 篇 shandong provinc...
  • 166 篇 key laboratory o...
  • 54 篇 ministry of educ...
  • 52 篇 shandong fundame...
  • 41 篇 shandong enginee...
  • 33 篇 moe key lab for ...
  • 18 篇 moe key laborato...
  • 17 篇 qilu university ...
  • 17 篇 ministry of educ...
  • 16 篇 state key labora...
  • 14 篇 qilu university ...
  • 12 篇 key laboratory o...
  • 12 篇 key laboratory o...
  • 11 篇 ministry of educ...
  • 11 篇 ministry of educ...
  • 11 篇 moe key lab for ...
  • 11 篇 state key labora...
  • 11 篇 school of electr...
  • 11 篇 tianjin key labo...
  • 10 篇 shandong enginee...

作者

  • 58 篇 meng deyu
  • 47 篇 wang hui-ming
  • 46 篇 xiaohong guan
  • 46 篇 guan xiaohong
  • 40 篇 qinye yin
  • 30 篇 wenjie wang
  • 30 篇 hui-ming wang
  • 24 篇 cao xiangyong
  • 22 篇 pengcheng mu
  • 18 篇 shen chao
  • 17 篇 qian xueming
  • 17 篇 jiang wu
  • 16 篇 yin qinye
  • 16 篇 tao qin
  • 16 篇 zheng qinghua
  • 16 篇 feng gao
  • 15 篇 xu zongben
  • 15 篇 wang pinghui
  • 15 篇 weile zhang
  • 14 篇 xinman zhang

语言

  • 1,095 篇 英文
  • 79 篇 其他
  • 26 篇 中文
检索条件"机构=Key Laboratory for Intelligent Networks and Network Security"
1199 条 记 录,以下是21-30 订阅
排序:
CB-YOLO: A Small Object Detection Algorithm for Industrial Scenarios
CB-YOLO: A Small Object Detection Algorithm for Industrial S...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Chen, Hao Wu, Xiaoming Su, Zhanzhi Zhao, Ying Dong, Yunfeng Liu, Xiangzhi Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
In certain specific industrial scenarios, smoking and cellphone usage are strictly prohibited behaviors. In these scenarios, it is crucial to rapidly and accurately detect smoking and cell phone usage, and promptly is... 详细信息
来源: 评论
RFSD-YOLO: An Enhanced X-Ray Object Detection Model for Prohibited Items
RFSD-YOLO: An Enhanced X-Ray Object Detection Model for Proh...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Kong, Xiaotong Li, Aimin Li, Wenqiang Li, Zhiyao Zhang, Yuechen Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
X-ray image detection is essential for ensuring public safety, but traditional methods rely heavily on human analysis and are relatively inefficient. To address this issue, this paper proposes a new object detection m... 详细信息
来源: 评论
A Low-Rank Matching Attention Based Cross-Modal Feature Fusion Method for Conversational Emotion Recognition
收藏 引用
IEEE Transactions on Affective Computing 2024年 第2期16卷 1177-1189页
作者: Shou, Yuntao Liu, Huan Cao, Xiangyong Meng, Deyu Dong, Bo Xi'An Jiaotong School of Computer Science and Technology Ministry of Education Key Laboratory for Intelligent Networks and Network Security Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Shaanxi Xi'an710049 China Xi'An Jiaotong School of Computer Science and Technology Shaanxi Xi'an710049 China BigKEJoint Innovation Center SHMEEA Shanghai China Xi'An Jiaotong University School of Mathematics and Statistics Xi'an China
Conversational emotion recognition (CER) is an important research topic in human-computer interactions. Although recent advancements in transformer-based cross-modal fusion methods have shown promise in CER tasks, the... 详细信息
来源: 评论
C-privacy:A social relationship-driven image customization sharing method in cyber-physical networks
收藏 引用
Digital Communications and networks 2025年 第2期11卷 563-573页
作者: Dapeng Wu Jian Liu Yangliang Wan Zhigang Yang Ruyan Wang Xinqi Lin School of Communications and Information Engineering Chongqing University of Posts and TelecommunicationsChongqing 400065China Aerospace Tianmu Satellite Technology Company Limited Chongqing401332China School of Cyber Security and Information Law Chongqing University of Posts and TelecommunicationsChongqing400065China College of Computer and Cyber Security Fujian Normal UniversityFujian350117China The Advanced Network and Intelligent Connection Technology Key Laboratory Chongqing400065China Key Laboratory of Ubiquitous Sensing and Networking Chongqing400065China
Cyber-Physical networks(CPN)are comprehensive systems that integrate information and physical domains,and are widely used in various fields such as online social networking,smart grids,and the Internet of Vehicles(IoV... 详细信息
来源: 评论
Secure Multi-way Join Query and Its Bench-Marking with Trusted Execution Environments  2nd
Secure Multi-way Join Query and Its Bench-Marking with Tru...
收藏 引用
2nd International Conference on Data security and Privacy Protection, DSPP 2024
作者: Zhao, Yi Zhao, Sen Lv, Siyi School of Cyber Engineering Xidian University Xi’an China State Key Laboratory of Integrated Service Networks Xidian University Xi’an China Key Laboratory of Data and Intelligent System Security Ministry of Education Nankai University Tianjin China
Because of server-untrustable model in outsourcing encrypted database system, it’s fatal for data owners to keep their data confidential under complex query operations performed by database servers. Trusted... 详细信息
来源: 评论
Multi-Relational Graph Representation Learning for Financial Statement Fraud Detection
收藏 引用
Big Data Mining and Analytics 2024年 第3期7卷 920-941页
作者: Chenxu Wang Mengqin Wang Xiaoguang Wang Luyue Zhang Yi Long School of Software Engineering and also with MoE Key Lab of Intelligent Networks and Network SecurityXi’an Jiaotong UniversityXi’an 710049China School of Software Engineering Xi’an Jiaotong UniversityXi’an 710049China Shenzhen Finance Institute The Chinese University of Hong KongShenzhen(CUHK-Shenzhen)Shenzhen 518026China
Financial statement fraud refers to malicious manipulations of financial data in listed companies'annual *** machine learning approaches focus on individual companies,overlooking the interactive relationships amon... 详细信息
来源: 评论
Extinction Chains Reveal Intermediate Phases Between the Safety and Collapse in Mutualistic Ecosystems
收藏 引用
Engineering 2024年 第12期43卷 89-98页
作者: Guangwei Wang Xueming Liu Ying Xiao Ye Yuan Linqiang Pan Xiaohong Guan Jianxi Gao Hai-Tao Zhang The MOE Engineering Research Center of Autonomous Intelligent Unmanned Systems State Key Laboratory of Digital Manufacturing Equipment and TechnologySchool of Artificial Intelligence and AutomationHuazhong University of Science and TechnologyWuhan 430074China Guangdong HUST Industrial Technology Research Institute Huazhong University of Science and TechnologyDongguan 523808China Guangdong Provincial Engineering Technology Center of Autonomous Unmanned Vessels Dongguan 523808China MOE Key Laboratory of Intelligent Networks and Network Security&State Key Laboratory of Manufacturing Systems Xi’an Jiaotong UniversityXi’an 710049China Tsinghua National Laboratory of Information Science and Technology Department of AutomationTsinghua UniversityBeijing 100084China Department of Computer Science Rensselaer Polytechnic InstituteTroyNY 12180USA
Ecosystems are undergoing unprecedented persistent deterioration due to unsustainable anthropogenic human activities,such as overfishing and deforestation,and the effects of such damage on ecological stability are ***... 详细信息
来源: 评论
A Sharding Scheme Based on Graph Partitioning Algorithm for Public Blockchain
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第6期139卷 3311-3327页
作者: Shujiang Xu Ziye Wang Lianhai Wang Miodrag J.Mihaljevi′c Shuhui Zhang Wei Shao Qizheng Wang Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science CenterQilu University of Technology(Shandong Academy of Sciences)Jinan250014China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer ScienceJinan250014China Mathematical Institute The Serbian Academy of Sciences and ArtsBelgrade11000Serbia
Blockchain technology,with its attributes of decentralization,immutability,and traceability,has emerged as a powerful catalyst for enhancing traditional industries in terms of optimizing business ***,transaction perfo... 详细信息
来源: 评论
A power consumption prediction algorithm based on job similarity judgment  8
A power consumption prediction algorithm based on job simila...
收藏 引用
8th International Conference on intelligent Computing and Signal Processing, ICSP 2023
作者: Yang, Meihong Chen, Yongjie Wang, Jibin Guo, Ying Qin, Shuwei Shandong Provincial Key Laboratory of Computer Networks Jinan China Shandong Intelligent Public Security Joint Innovation Center Department of Public Security of Shandong Province Jinan China
Facing the high energy consumption problem of High Performance Computing(HPC) clusters, power consumption prediction of HPC clusters can help data centers improve energy efficiency and formulate energy-saving strategi... 详细信息
来源: 评论
Neural network-Based State Estimation for Nonlinear Systems With Denial-of-Service Attack Under Try-Once-Discard Protocol
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第10期11卷 2182-2184页
作者: Xueli Wang Shangwei Zhao Ming Yang Xin Wang Xiaoming Wu the Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science CenterQilu University of Technology(Shandong Academy of Sciences)Jinan 250014 Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer ScienceJinan 250014China Department of Automation Shanghai Jiao Tong UniversityShanghai 200240China
Dear Editor,This letter deals with state estimation issues of discrete-time nonlinear systems subject to denial-of-service(DoS)attacks under the try-once-discard(TOD)*** specifically,to reduce the communication burden... 详细信息
来源: 评论