咨询与建议

限定检索结果

文献类型

  • 1,687 篇 会议
  • 1,331 篇 期刊文献

馆藏范围

  • 3,018 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,994 篇 工学
    • 1,476 篇 计算机科学与技术...
    • 1,159 篇 软件工程
    • 542 篇 信息与通信工程
    • 278 篇 电气工程
    • 215 篇 电子科学与技术(可...
    • 203 篇 控制科学与工程
    • 200 篇 生物工程
    • 136 篇 机械工程
    • 125 篇 网络空间安全
    • 98 篇 仪器科学与技术
    • 95 篇 光学工程
    • 89 篇 生物医学工程(可授...
    • 66 篇 交通运输工程
    • 64 篇 动力工程及工程热...
    • 64 篇 化学工程与技术
    • 52 篇 安全科学与工程
    • 42 篇 建筑学
  • 910 篇 理学
    • 529 篇 数学
    • 218 篇 生物学
    • 196 篇 物理学
    • 165 篇 统计学(可授理学、...
    • 83 篇 系统科学
    • 74 篇 化学
  • 561 篇 管理学
    • 342 篇 管理科学与工程(可...
    • 243 篇 图书情报与档案管...
    • 122 篇 工商管理
  • 94 篇 法学
    • 59 篇 社会学
  • 71 篇 医学
    • 58 篇 临床医学
    • 51 篇 基础医学(可授医学...
  • 51 篇 经济学
    • 51 篇 应用经济学
  • 30 篇 农学
  • 21 篇 军事学
  • 10 篇 教育学
  • 10 篇 文学
  • 9 篇 艺术学

主题

  • 136 篇 feature extracti...
  • 118 篇 semantics
  • 93 篇 accuracy
  • 76 篇 computational mo...
  • 76 篇 training
  • 64 篇 data models
  • 60 篇 deep learning
  • 60 篇 federated learni...
  • 45 篇 protocols
  • 45 篇 cryptography
  • 44 篇 privacy
  • 43 篇 neural networks
  • 42 篇 security
  • 42 篇 robustness
  • 41 篇 visualization
  • 40 篇 adaptation model...
  • 39 篇 data mining
  • 39 篇 predictive model...
  • 38 篇 optimization
  • 37 篇 authentication

机构

  • 221 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 156 篇 school of comput...
  • 80 篇 key laboratory o...
  • 65 篇 college of compu...
  • 63 篇 computer network...
  • 58 篇 key laboratory o...
  • 56 篇 college of mathe...
  • 50 篇 shandong fundame...
  • 47 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 43 篇 institute of inf...
  • 40 篇 school of comput...
  • 37 篇 school of cyber ...
  • 37 篇 shandong provinc...
  • 36 篇 key laboratory o...
  • 36 篇 fujian provincia...
  • 35 篇 university of ch...
  • 33 篇 fujian key labor...

作者

  • 46 篇 zhao yao
  • 36 篇 zhou deyu
  • 26 篇 cong runmin
  • 26 篇 yang yang
  • 26 篇 min-ling zhang
  • 25 篇 zhang min-ling
  • 24 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 21 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 du bo
  • 19 篇 liu ximeng
  • 17 篇 geng xin
  • 17 篇 xiaoping li
  • 16 篇 di xiaoqiang
  • 16 篇 he yulan
  • 16 篇 xia chunhe
  • 16 篇 wang jin
  • 15 篇 zhenrong zhang

语言

  • 2,733 篇 英文
  • 176 篇 其他
  • 121 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Intergration"
3018 条 记 录,以下是281-290 订阅
排序:
Dense Video Captioning through Convolutional-Transformer Integration  4
Dense Video Captioning through Convolutional-Transformer Int...
收藏 引用
4th IEEE International Conference on Digital Twins and Parallel Intelligence, DTPI 2024
作者: Cao, Jiaxi Zhang, Chunjie Zheng, Xiaolong Beijing Jiaotong University Beijing Key Laboratory of Advanced Information Science and Network Technology School of Computer Science and Technology Beijing China Chinese Academy of Sciences State Key Laboratory of Multimodal Artificial Intelligence Systems Institute of Automation Beijing China University of Chinese Academy of Sciences School of Artificial Intelligence Beijing China
Dense video captioning, a task that has recently garnered attention in the field of computer vision, focuses on generating detailed captions for multiple events along with their temporal locations within untrimmed vid... 详细信息
来源: 评论
HIFI-Stego: A High-Fidelity Embedding Audio Steganography Based on Audio Features Decoupling
IEEE Transactions on Audio, Speech and Language Processing
收藏 引用
IEEE Transactions on Audio, Speech and Language Processing 2025年 33卷 2032-2044页
作者: Sanfeng Zhang Baiyu Tian Yang Gao Xingyu Liu Wang Yang School of Cyber Science and Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Nanjing China
The higher audio quality of steganography is directly correlated with the increased resistance to steganalysis tools. The advancement of generative AI technologies, particularly those that decouple style features from... 详细信息
来源: 评论
Adversarial attack method with adaptive step size for ID card text recognition  4
Adversarial attack method with adaptive step size for ID car...
收藏 引用
4th IEEE International Conference on Digital Twins and Parallel Intelligence, DTPI 2024
作者: Feng, Weidong Zhang, Chunjie Zheng, Xiaolong Beijing Jiaotong University Beijing Key Laboratory of Advanced Information Science and Network Technology School of Computer Science and Technology Beijing China Chinese Academy of Sciences State Key Laboratory of Multimodal Artificial Intelligence Systems Institute of Automation Beijing China University of Chinese Academy of Sciences School of Artificial Intelligence Beijing China
In the field of text recognition models, existing adversarial attack algorithms mainly target white-box scenarios, which are usually limited to single-color backgrounds and short text length. However, with the complex... 详细信息
来源: 评论
STA+: Spatiotemporal Adaptation with Adaptive Model Selection for Video Action Recognition  4
STA+: Spatiotemporal Adaptation with Adaptive Model Selectio...
收藏 引用
4th IEEE International Conference on Digital Twins and Parallel Intelligence, DTPI 2024
作者: Li, Minghui Zhang, Chunjie Zheng, Xiaolong Beijing Jiaotong University Beijing Key Laboratory of Advanced Information Science and Network Technology School of Computer Science and Technology Beijing China Chinese Academy of Sciences State Key Laboratory of Multimodal Artifical Intelligence Systems Institute of Automation Beijing China University of Chinese Academy of Sciences School of Artificial Intelligence Beijing China
Recent breakthroughs in video models have achieved remarkable success by integrating vision transformers into the video domain through adaptation. However, prevalent approaches in existing literature often entail a si... 详细信息
来源: 评论
The drivers and spatial distribution of economic efficiency in China's cities
收藏 引用
Journal of Geographical Sciences 2022年 第8期32卷 1427-1450页
作者: CAO Yanni WU Tong KONG Lingqiao WANG Xuezhi ZHANG Lufeng OUYANG Zhiyun State Key Laboratory of Urban and Regional Ecology Research Center for Eco-Environmental SciencesCASBeijing 100085China University of Chinese Academy of Sciences Beijing 100049China Computer Network Information Center CASBeijing 100190China
This study analyzes cities in China at the prefecture level and above to calculate indices for“urban economic efficiency”(the relationship between input factors and output)and“urbanization economic efficiency”(the... 详细信息
来源: 评论
Research on long and short-term social recommendation based on convolutional and gated recurrent units  29
Research on long and short-term social recommendation based ...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Jia, Zihe Xue, Peng Dai, Zhiqiang Gao, Qian Zhang, Xiaomeng Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250014 China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan250014 China
The development of the Internet has made people more closely related and has put forward higher requirements for recommendation models. Most recommendation models are studied only for the long-term interests of users.... 详细信息
来源: 评论
The Analysis of Schnorr Multi-Signatures and the Application to AI  1
收藏 引用
1st International Conference on Artificial Intelligence Security and Privacy, AIS and P 2023
作者: Wang, Wenchao Qin, Jing Liu, Jinlu Zhang, Xi Hou, Xinyi Wei, Zhongkai School of Mathematics Shandong University Jinan250100 China College of Computer and Cyber Security Hebei Normal University Shijiazhuang050024 China Hebei Provincial Key Laboratory of Network and Information Security Hebei Normal University Shijiazhuang050024 China
Artificial intelligence (AI) is having a profound impact on our daily lives. We suggest using digital signatures to protect the user’s identity and achieve data accountability. To address high-risk applications, mult... 详细信息
来源: 评论
GHTO: Improving Byzantine Robustness in Distributed Machine Learning Through Gradient Heterogeneity Twofold Optimization  6
GHTO: Improving Byzantine Robustness in Distributed Machine ...
收藏 引用
6th International Conference on Frontier Technologies of information and computer, ICFTIC 2024
作者: Li, Caiyun Yang, Ming Cao, Jian Wu, Xiaoming He, Yunpeng Wang, Xin Jinan250014 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan250014 China Shandong Evayinfo Technology Co. Ltd Jinan250101 China
Heterogeneous datasets induce local gradient variance and global gradient variance in distributed learning, collectively referred to as gradient heterogeneity. Gradient heterogeneity increases the system's vulnera... 详细信息
来源: 评论
Visual malware classification and detection method based on convolutional neural network  9
Visual malware classification and detection method based on ...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Huang, Hua Sheng, Hua Han, Xingwang Zhang, Wenbin Zhao, Zilin State Grid Shandong Electric Power Company Information and Telecommunications Company Jinan China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China
With the rapid development of Internet technology, leading to the evolution of malware variants, and malicious threats are also increasing. Therefore, rapid and accurate classification of malware becomes crucial. In r... 详细信息
来源: 评论
Self-Evaluation of Large Language Model based on Glass-box Features
Self-Evaluation of Large Language Model based on Glass-box F...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Huang, Hui Qu, Yingqi Liu, Jing Yang, Muyun Xu, Bing Zhao, Tiejun Lu, Wenpeng Faculty of Computing Harbin Institute of Technology Harbin China Baidu Inc. Beijing China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Jinan China
The proliferation of open-source Large Language Models (LLMs) underscores the pressing need for evaluation methods. Existing works primarily rely on external evaluators, focusing on training and prompting strategies. ... 详细信息
来源: 评论