咨询与建议

限定检索结果

文献类型

  • 1,827 篇 会议
  • 1,580 篇 期刊文献

馆藏范围

  • 3,407 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,290 篇 工学
    • 1,679 篇 计算机科学与技术...
    • 1,314 篇 软件工程
    • 615 篇 信息与通信工程
    • 308 篇 电气工程
    • 248 篇 电子科学与技术(可...
    • 235 篇 控制科学与工程
    • 224 篇 生物工程
    • 156 篇 机械工程
    • 132 篇 网络空间安全
    • 109 篇 光学工程
    • 109 篇 仪器科学与技术
    • 107 篇 生物医学工程(可授...
    • 83 篇 化学工程与技术
    • 76 篇 动力工程及工程热...
    • 75 篇 交通运输工程
    • 58 篇 安全科学与工程
    • 53 篇 建筑学
  • 1,078 篇 理学
    • 635 篇 数学
    • 247 篇 生物学
    • 228 篇 物理学
    • 197 篇 统计学(可授理学、...
    • 93 篇 系统科学
    • 89 篇 化学
  • 671 篇 管理学
    • 387 篇 管理科学与工程(可...
    • 309 篇 图书情报与档案管...
    • 140 篇 工商管理
  • 106 篇 法学
    • 71 篇 社会学
  • 88 篇 医学
    • 73 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 60 篇 经济学
    • 60 篇 应用经济学
  • 39 篇 农学
  • 23 篇 军事学
  • 11 篇 教育学
  • 11 篇 文学
  • 9 篇 艺术学

主题

  • 135 篇 feature extracti...
  • 123 篇 semantics
  • 94 篇 accuracy
  • 79 篇 computational mo...
  • 78 篇 training
  • 65 篇 data models
  • 61 篇 deep learning
  • 59 篇 federated learni...
  • 49 篇 protocols
  • 48 篇 clustering algor...
  • 47 篇 data mining
  • 45 篇 cryptography
  • 44 篇 neural networks
  • 44 篇 visualization
  • 43 篇 privacy
  • 42 篇 predictive model...
  • 42 篇 robustness
  • 41 篇 optimization
  • 41 篇 security
  • 40 篇 wireless sensor ...

机构

  • 215 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 165 篇 school of comput...
  • 80 篇 key laboratory o...
  • 64 篇 college of compu...
  • 62 篇 computer network...
  • 59 篇 college of infor...
  • 57 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 50 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 44 篇 key laboratory o...
  • 44 篇 institute of inf...
  • 43 篇 school of cyber ...
  • 42 篇 the key laborato...
  • 40 篇 school of comput...
  • 36 篇 university of ch...
  • 36 篇 shandong provinc...
  • 35 篇 key laboratory o...

作者

  • 49 篇 zhao yao
  • 42 篇 ren jiadong
  • 36 篇 zhou deyu
  • 29 篇 zhang min-ling
  • 26 篇 cong runmin
  • 24 篇 guo wenzhong
  • 23 篇 yang yang
  • 22 篇 min-ling zhang
  • 21 篇 xiaoming wu
  • 21 篇 guang cheng
  • 20 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 du bo
  • 19 篇 geng xin
  • 19 篇 wang yun
  • 17 篇 xiaoping li
  • 17 篇 liu ximeng
  • 16 篇 niyato dusit
  • 16 篇 di xiaoqiang
  • 16 篇 he yulan

语言

  • 3,100 篇 英文
  • 175 篇 其他
  • 147 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Integration"
3407 条 记 录,以下是41-50 订阅
排序:
DM-FedMF: A Recommendation Model of Federated Matrix Factorization with Detection Mechanism
收藏 引用
IEEE Transactions on network Science and Engineering 2025年
作者: Zheng, Xiaoyao Jia, Xianmin Cheng, Xiongchao He, Wenxuan Sun, Liping Guo, Liangmin Yu, Qingying Luo, Yonglong Anhui Normal University Anhui Provincial Key Laboratory of Network and Information Security School of Computer and Information Wuhu China
Items are recommended to users by the federated recommendation system while protecting user privacy, but there is a risk of the performance of the global model being seriously affected by malicious clients through the... 详细信息
来源: 评论
A numerical magnitude aware multi-channel hierarchical encoding network for math word problem solving
收藏 引用
Neural Computing and Applications 2025年 第3期37卷 1651-1672页
作者: Xu, Junjie Chen, Yuzhong Xiao, Lingsheng Liao, Hongmiao Zhong, Jiayuan Dong, Chen College of Computer and Data Science Fuzhou University Fujian Province Fuzhou350108 China Engineering Research Center of Big Data Intelligence Ministry of Education Fuzhou China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fujian Province Fuzhou350108 China
Math word problem (MWP) represents a critical research area within reading comprehension, where accurate comprehension of math problem text is crucial for generating math expressions. However, current approaches still... 详细信息
来源: 评论
Density Peak Clustering Algorithm Based on Data Field Theory and Grid Similarity
收藏 引用
Journal of computer Science and Technology 2025年 第2期40卷 301-321页
作者: Yu, Qing-Ying Shi, Ge-Ge Xu, Dong-Sheng Wang, Wen-Kai Chen, Chuan-Ming Luo, Yong-Long School of Computer and Information Anhui Normal University Wuhu China Anhui Provincial Key Laboratory of Network and Information Security Wuhu China
The density peak clustering algorithm can rapidly identify cluster centers by drawing decision graphs without any prior knowledge; however, when multiple density peaks are present in one cluster of the dataset, the cl... 详细信息
来源: 评论
Privacy-Preserving Covert Channels in VoLTE via Inter-Frame Delay Modulation  1
收藏 引用
2nd International Conference on Artificial Intelligence Security and Privacy, AIS and P 2024
作者: Wu, Xiaokai sun, Xuan Huang, Jiaxin Shi, Ning Liang, Chen Computer School Beijing Information Science and Technology University Beijing100192 China China Southern Airlines Co. Ltd. Guangdong Guangzhou510000 China Hebei Key Laboratory of IoT Blockchain Integration Shijiazhuang China
The rapid advancement of artificial intelligence and mobile communication technologies has brought unprecedented convenience, but also significant privacy and security concerns, particularly in real-time video communi... 详细信息
来源: 评论
MAGRET: Machine-generated Text Detection with Rewritten Texts  31
MAGRET: Machine-generated Text Detection with Rewritten Text...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Huang, Yifei Cao, Jingxin Luo, Hanyu Guan, Xin Liu, Bo School of Cyber Science and Engineering Southeast University Nanjing211189 China Key Laboratory of Computer Network and Information of Ministry of Education of China Nanjing211189 China School of Computer Science and Engineering Southeast University Nanjing211189 China
With the quick advancement in text generation ability of Large Language Model(LLM), concerns about the misuse of machine-generated text(MGT) have grown, raising potential violations of legal and ethical standards. Som... 详细信息
来源: 评论
Comprehensive Perturbation Consistency for Semi-Supervised Change Detection in Remote Sensing Images
Comprehensive Perturbation Consistency for Semi-Supervised C...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Zan Mao Xin Li Ze Luo Yingjuan Tang Dongmei Jiang Computer Network Information Center Chinese Academy of Sciences University of the Chinese Academy of Sciences PengCheng Laboratory National Key Laboratory of Advanced Vehicle Integration and Control Beijing Institute of Technology
Currently, many change detection (CD) methods rely on supervised learning, which necessitates extensive manually annotated data, resulting in significant labor and time requirements. Recently, semi-supervised (SS) app... 详细信息
来源: 评论
Efficient and fine-grained access control with fully-hidden policies for cloud-enabled IoT
收藏 引用
Digital Communications and networks 2025年 第2期11卷 473-481页
作者: Li, Qi Liu, Gaozhan Zhang, Qianqian Han, Lidong Chen, Wei Li, Rui Xiong, Jinbo School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210023 China Key Laboratory of Cryptography of Zhejiang Province Hangzhou Normal University Hangzhou311121 China Tongda College of Nanjing University of Posts and Telecommunications Yangzhou225127 China Henan Key Laboratory of Network Cryptography Technology Zhengzhou450001 China School of Computer Science and Technology Xidian University Xi'an710071 China State Key Laboratory of Tibetan Intelligent Information Processing and Application Qinghai Normal University Xining810008 China Faculty of Software Fujian Normal University Fuzhou350108 China
Ciphertext-Policy Attribute-Based Encryption (CP-ABE) enables fine-grained access control on ciphertexts, making it a promising approach for managing data stored in the cloud-enabled Internet of Things. But existing s... 详细信息
来源: 评论
Brillouin Frequency Shift Extraction for BOTDA Based on Gramian Angular Fields  4
Brillouin Frequency Shift Extraction for BOTDA Based on Gram...
收藏 引用
4th International Computational Imaging Conference, CITA 2024
作者: Zhu, Borong Zhang, Zhihao Qian, Yuhao Ma, Xiaole Wang, Liang Yu, Kuanglu Beijing Key Laboratory of Advanced Information Science and Network Technology Beijing100044 China Institute of Information Science School of Computer and Information Technology Beijing Jiaotong University Beijing100044 China National Engineering Laboratory for Next Generation Internet Access System School of Optics and Electronic Information Huazhong University of Science and Technology Wuhan430074 China
To accurately extract Brillouin frequency shift of BOTDA with large sweeping step sizes, a novel structure of GAFCNN is proposed, combining time series coding with convolutional neural networks. The experimental data ... 详细信息
来源: 评论
A circuit area optimization of MK-3 S-box
收藏 引用
Cybersecurity 2025年 第1期8卷 61-71页
作者: Yanjun Li Weiguo Zhang Yiping Lin Jian Zou Jian Liu Information Industry Information Security Evaluation Center The 15th Research Institute of China Electronic Technology Group CorporationBeijing 100083China Henan Key Laboratory of Network Cryptography Technology Zhengzhou 450001China Beijing Electronic Science and Technology Institute No.7 Fufeng RoadFengtai DistricBeijing 100083China College of Computer and Data Science Fuzhou UniversityFuzhou 350108China
In MILCOM 2015,Kelly et *** the authentication encryption algorithm MK-3,which applied the 16-bit *** paper aims to implement the 16-bit S-box with less circuit ***,we classifed the irreducible polynomials over F_(2n)... 详细信息
来源: 评论
A Reversible Data Hiding in Encryption Domain for JPEG Image Based on Controllable Ciphertext Range of Paillier Homomorphic Encryption Algorithm  21st
A Reversible Data Hiding in Encryption Domain for JPEG Ima...
收藏 引用
21st Pacific Rim International Conference on Artificial Intelligence, PRICAI 2024
作者: Ma, Bin Zhao, Chunxin Ma, Ruihe Xian, Yongjin Wang, Chunpeng Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China School of Economics Jilin University Changchun130015 China
With the rapid advancement of cloud computing, significant security concerns regarding data storage have been continuously raised. When the encrypted images are stored in the cloud, reversible data hiding in encrypted... 详细信息
来源: 评论