咨询与建议

限定检索结果

文献类型

  • 1,687 篇 会议
  • 1,322 篇 期刊文献

馆藏范围

  • 3,009 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,984 篇 工学
    • 1,467 篇 计算机科学与技术...
    • 1,153 篇 软件工程
    • 541 篇 信息与通信工程
    • 270 篇 电气工程
    • 215 篇 电子科学与技术(可...
    • 203 篇 控制科学与工程
    • 200 篇 生物工程
    • 135 篇 机械工程
    • 125 篇 网络空间安全
    • 98 篇 仪器科学与技术
    • 95 篇 光学工程
    • 89 篇 生物医学工程(可授...
    • 66 篇 交通运输工程
    • 64 篇 动力工程及工程热...
    • 64 篇 化学工程与技术
    • 52 篇 安全科学与工程
    • 41 篇 建筑学
  • 910 篇 理学
    • 528 篇 数学
    • 218 篇 生物学
    • 196 篇 物理学
    • 164 篇 统计学(可授理学、...
    • 82 篇 系统科学
    • 74 篇 化学
  • 561 篇 管理学
    • 342 篇 管理科学与工程(可...
    • 243 篇 图书情报与档案管...
    • 122 篇 工商管理
  • 93 篇 法学
    • 59 篇 社会学
  • 71 篇 医学
    • 58 篇 临床医学
    • 51 篇 基础医学(可授医学...
  • 51 篇 经济学
    • 51 篇 应用经济学
  • 30 篇 农学
  • 21 篇 军事学
  • 10 篇 教育学
  • 10 篇 文学
  • 9 篇 艺术学

主题

  • 136 篇 feature extracti...
  • 118 篇 semantics
  • 93 篇 accuracy
  • 76 篇 computational mo...
  • 75 篇 training
  • 64 篇 data models
  • 60 篇 deep learning
  • 60 篇 federated learni...
  • 45 篇 protocols
  • 45 篇 cryptography
  • 44 篇 privacy
  • 43 篇 neural networks
  • 42 篇 security
  • 42 篇 robustness
  • 40 篇 visualization
  • 40 篇 adaptation model...
  • 39 篇 data mining
  • 39 篇 predictive model...
  • 38 篇 optimization
  • 37 篇 authentication

机构

  • 221 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 156 篇 school of comput...
  • 80 篇 key laboratory o...
  • 65 篇 college of compu...
  • 64 篇 computer network...
  • 58 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 50 篇 shandong fundame...
  • 47 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 43 篇 institute of inf...
  • 40 篇 school of comput...
  • 37 篇 school of cyber ...
  • 37 篇 shandong provinc...
  • 36 篇 key laboratory o...
  • 36 篇 fujian provincia...
  • 35 篇 university of ch...
  • 33 篇 fujian key labor...

作者

  • 46 篇 zhao yao
  • 36 篇 zhou deyu
  • 26 篇 cong runmin
  • 26 篇 yang yang
  • 26 篇 min-ling zhang
  • 25 篇 zhang min-ling
  • 24 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 21 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 du bo
  • 18 篇 liu ximeng
  • 17 篇 geng xin
  • 17 篇 xiaoping li
  • 16 篇 di xiaoqiang
  • 16 篇 he yulan
  • 16 篇 xia chunhe
  • 16 篇 wang jin
  • 15 篇 zhenrong zhang

语言

  • 2,727 篇 英文
  • 173 篇 其他
  • 121 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Intergration"
3009 条 记 录,以下是361-370 订阅
排序:
Don’t Abandon the Primary key: A High-Synchronization and Robust Virtual Primary key Scheme for Watermarking Relational Databases  26th
Don’t Abandon the Primary Key: A High-Synchronization and...
收藏 引用
26th International Conference on information and Communications Security, ICICS 2024
作者: Yang, Ke Yuan, Shuguang Yu, Jing Wang, Yuyang Yang, Tengfei Chen, Chi Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Key Laboratory of Cyberspace Security Defense Beijing China National Computer Network Emergency Response Technical Team/Coordination Center of China Beijing China
A relational database is an infrastructure that manages and shares structured data. To safeguard the copyrights of data within such databases, database watermarking is an effective technique. Most watermarking schemes... 详细信息
来源: 评论
HybridFL: Hybrid Approach Toward Privacy-Preserving Federated Learning  6th
HybridFL: Hybrid Approach Toward Privacy-Preserving Federate...
收藏 引用
6th International Conference on Security and Privacy in New Computing Environments, SPNCE 2023
作者: Ali, Sheraz Mamoon, Saqib Usman, Areeba Abidin, Zain ul Zhao, Chuan School of Information Science and Engineering University of Jinan Jinan250022 China School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing210094 China University of Sargodha Sargodha Pakistan Shandong Provincial Key Laboratory of Network-Based Intelligent Computing University of Jinan Jinan250022 China Shandong Provincial Key Laboratory of Software Engineering University of Jinan Jinan250022 China
In this study, we introduce a novel Hybrid Federated Learning (HybridFL) approach aimed at enhancing privacy and accuracy in collaborative machine learning scenarios. Our methodology integrates Differential Privacy (D... 详细信息
来源: 评论
Rapid Maize Seedling Detection Based on Receptive-Field and Cross-Dimensional information Interaction
Rapid Maize Seedling Detection Based on Receptive-Field and ...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Hao, Fengqi Zhu, Shulei Ma, Dexin Dong, Xiangjun Kong, Hoiio Liu, Xia Mu, Chunhua Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan250014 China City University of Macau Faculty of Data Science 999078 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan250014 China Communication College Qingdao Agricultural University Qingdao266109 China Maize Research Institute Shandong Academy of Agricultural Sciences National Engineering Laboratory of Wheat and Maize Key Laboratory of Biology and Genetic Improvement of Maize in Northern Yellow-huai River Plain Ministry of Agriculture Jinan250100 China
The seedling stage is important in the growth and development of maize, and it is also a critical period that affects maize yield and quality. Accurately recognizing this stage of maize is challenging, as current maiz... 详细信息
来源: 评论
CroPrompt: Cross-task Interactive Prompting for Zero-shot Spoken Language Understanding
CroPrompt: Cross-task Interactive Prompting for Zero-shot Sp...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Qin, Libo Wei, Fuxuan Chen, Qiguang Zhou, Jingxuan Huang, Shijue Si, Jiasheng Lu, Wenpeng Che, Wanxiang School of Computer Science and Engineering Central South University China Key Laboratory of Data Intelligence and Advanced Computing in Provincial Universities Soochow University China Research Center for Social Computing and Information Retrieval Harbin Institute of Technology China Harbin Institute of Technology Shenzhen China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology Shandong Academy of Sciences China
Slot filling and intent detection are two highly correlated tasks in spoken language understanding (SLU). Recent SLU research attempts to explore zero-shot prompting techniques in large language models to alleviate th...
来源: 评论
MISP: An Efficient Quantum-resistant Misbehavior Preventing Scheme with Self-enforcement for Vehicle-to-Everything
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Chen, Ying He, Debiao Bao, Zijian Wang, Huaqun Luo, Min Wuhan University School of Cyber Science and Engineering Wuhan430072 China Key Laboratory of Computing Power Network & Information Security Ministry of Education Shandong Computer Science Center Jinan250014 China Nanjing University of Posts and Telecommunications College of Computer Nanjing210023 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network & Information System Security Jinan250014 China
In the Vehicle-to-Everything (V2X) communication system, the presence of ambiguous warnings significantly increases the risk of severe accidents, posing a substantial threat to the safety of autonomous driving. It is ... 详细信息
来源: 评论
CurMIM: Curriculum Masked Image Modeling
CurMIM: Curriculum Masked Image Modeling
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Liu, Hao Wang, Kun Han, Yudong Wang, Haocong Hu, Yupeng Wang, Chunxiao Nie, Liqiang School of Software Shandong University Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology Shandong Academy of Sciences Jinan China School of Computer Science and Technology Harbin Institute of Technology Shenzhen China
Masked Image Modeling (MIM), following "mask-and-reconstruct" scheme, is a promising self-supervised method to learn scalable visual representation. Studies indicate that selecting an effective mask strategy... 详细信息
来源: 评论
Towards Public Integrity Audition for Cloud-IoT Data Based on Blockchain
收藏 引用
computer Systems Science & Engineering 2022年 第6期41卷 1129-1142页
作者: Hao Yan Yanan Liu Shuo Qiu Shengzhou Hu Weijian Zhang Jinyue Xia School of Network Security Jinling Institute of TechnologyNanjing211169China Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Normal UniversityFuzhou350007China Department of Mathematics and Computer Science Gannan Normal UniversityGanzhou341000China Network Security and Information Office Hohai UniversityNanjing210098China International Business Machines Corporation(IBM) New YorkNYUSA
With the rapidly developing of Internet of Things (IoT), the volume ofdata generated by IoT systems is increasing quickly. To release the pressure ofdata management and storage, more and more enterprises and individua... 详细信息
来源: 评论
A Parallelizable Counterfactual Generation Method Based on Gradient Optimization  29
A Parallelizable Counterfactual Generation Method Based on G...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Ding, Haorun Jiang, Xuesong Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Quan Cheng Laboratory Jinan China State Key Laboratory of High-end Server and Storage Technology Jinan China
Post-hoc explanations are important for people to understand the predictions of explanation models. One class of methods in post-hoc explanation is the generation of counterfactuals, where a hypothetical example is ob... 详细信息
来源: 评论
Efficient Wildcard Searchable Symmetric Encryption with Forward and Backward Security  1st
Efficient Wildcard Searchable Symmetric Encryption with For...
收藏 引用
1st International Conference on Artificial Intelligence Security and Privacy, AIS and P 2023
作者: Zhang, Xi Su, Ye Wei, Zhongkai Shen, Wenting Qin, Jing College of Computer and Cyber Security Hebei Normal University Shijiazhuang050024 China Hebei Provincial Key Laboratory of Network and Information Security Hebei Normal University Shijiazhuang050024 China School of Information Science and Engineering Shandong Normal University Jinan250358 China School of Mathematics Shandong University Jinan250100 China College of Computer Science and Technology Qingdao University Qingdao266071 China
Wildcard Searchable Symmetric Encryption can achieve flexibility and pattern matching while protecting data privacy. There is a promising future for combining secure wildcard search with emerging technologies such as ... 详细信息
来源: 评论
NeuVSA: A Unified and Efficient Accelerator for Neural Vector Search  31
NeuVSA: A Unified and Efficient Accelerator for Neural Vecto...
收藏 引用
31st IEEE International Symposium on High Performance computer Architecture, HPCA 2025
作者: Yuan, Ziming Dai, Lei Li, Wen Zhang, Jie Liang, Shengwen Wang, Ying Liu, Cheng Li, Huawei Li, Xiaowei Guo, Jiafeng Wang, Peng Chen, Renhai Zhang, Gong Shanxi University School of Computer and Information Technology China Peking University School of Computer Science China Institute of Computing Technology CAS State Key Lab of Processors China University of Chinese Academy of Sciences China Zhongguancun National Laboratory Beijing China Institute of Computing Technology CAS Key Lab of Network Data Science and Technology China Huawei Technologies Co. Ltd. China
Neural Vector Search (NVS) has exhibited superior search quality over traditional key-based strategies for information retrieval tasks. An effective NVS architecture requires high recall, low latency, and high through... 详细信息
来源: 评论