咨询与建议

限定检索结果

文献类型

  • 1,687 篇 会议
  • 1,322 篇 期刊文献

馆藏范围

  • 3,009 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,984 篇 工学
    • 1,467 篇 计算机科学与技术...
    • 1,153 篇 软件工程
    • 541 篇 信息与通信工程
    • 270 篇 电气工程
    • 215 篇 电子科学与技术(可...
    • 203 篇 控制科学与工程
    • 200 篇 生物工程
    • 135 篇 机械工程
    • 125 篇 网络空间安全
    • 98 篇 仪器科学与技术
    • 95 篇 光学工程
    • 89 篇 生物医学工程(可授...
    • 66 篇 交通运输工程
    • 64 篇 动力工程及工程热...
    • 64 篇 化学工程与技术
    • 52 篇 安全科学与工程
    • 41 篇 建筑学
  • 910 篇 理学
    • 528 篇 数学
    • 218 篇 生物学
    • 196 篇 物理学
    • 164 篇 统计学(可授理学、...
    • 82 篇 系统科学
    • 74 篇 化学
  • 561 篇 管理学
    • 342 篇 管理科学与工程(可...
    • 243 篇 图书情报与档案管...
    • 122 篇 工商管理
  • 93 篇 法学
    • 59 篇 社会学
  • 71 篇 医学
    • 58 篇 临床医学
    • 51 篇 基础医学(可授医学...
  • 51 篇 经济学
    • 51 篇 应用经济学
  • 30 篇 农学
  • 21 篇 军事学
  • 10 篇 教育学
  • 10 篇 文学
  • 9 篇 艺术学

主题

  • 136 篇 feature extracti...
  • 118 篇 semantics
  • 93 篇 accuracy
  • 76 篇 computational mo...
  • 75 篇 training
  • 64 篇 data models
  • 60 篇 deep learning
  • 60 篇 federated learni...
  • 45 篇 protocols
  • 45 篇 cryptography
  • 44 篇 privacy
  • 43 篇 neural networks
  • 42 篇 security
  • 42 篇 robustness
  • 40 篇 visualization
  • 40 篇 adaptation model...
  • 39 篇 data mining
  • 39 篇 predictive model...
  • 38 篇 optimization
  • 37 篇 authentication

机构

  • 221 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 156 篇 school of comput...
  • 80 篇 key laboratory o...
  • 65 篇 college of compu...
  • 64 篇 computer network...
  • 58 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 50 篇 shandong fundame...
  • 47 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 43 篇 institute of inf...
  • 40 篇 school of comput...
  • 37 篇 school of cyber ...
  • 37 篇 shandong provinc...
  • 36 篇 key laboratory o...
  • 36 篇 fujian provincia...
  • 35 篇 university of ch...
  • 33 篇 fujian key labor...

作者

  • 46 篇 zhao yao
  • 36 篇 zhou deyu
  • 26 篇 cong runmin
  • 26 篇 yang yang
  • 26 篇 min-ling zhang
  • 25 篇 zhang min-ling
  • 24 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 21 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 du bo
  • 18 篇 liu ximeng
  • 17 篇 geng xin
  • 17 篇 xiaoping li
  • 16 篇 di xiaoqiang
  • 16 篇 he yulan
  • 16 篇 xia chunhe
  • 16 篇 wang jin
  • 15 篇 zhenrong zhang

语言

  • 2,727 篇 英文
  • 173 篇 其他
  • 121 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Intergration"
3009 条 记 录,以下是411-420 订阅
排序:
Comprehensive Perturbation Consistency for Semi-Supervised Change Detection in Remote Sensing Images
Comprehensive Perturbation Consistency for Semi-Supervised C...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Zan Mao Xin Li Ze Luo Yingjuan Tang Dongmei Jiang Computer Network Information Center Chinese Academy of Sciences University of the Chinese Academy of Sciences PengCheng Laboratory National Key Laboratory of Advanced Vehicle Integration and Control Beijing Institute of Technology
Currently, many change detection (CD) methods rely on supervised learning, which necessitates extensive manually annotated data, resulting in significant labor and time requirements. Recently, semi-supervised (SS) app... 详细信息
来源: 评论
THC-DL: Three-Party Homomorphic Computing Delegation Learning for Secure Optimization
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Yang, Ze Tian, Youliang Xiong, Jinbo Niu, Kun Li, Mengqian Zhang, Xinyu Ma, Jianfeng Guizhou University Guizhou Provincial Key Laboratory of Cryptography and Blockchain Technology College of Computer Science and Technology Guiyang550025 China Guizhou University College of Big Data and Information Engineering Guiyang550025 China Fujian Normal University Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fuzhou350117 China Xidian University State Key Laboratory of Integrated Services Network Xi’an710071 China Xidian University State Key Laboratory of Integrated Services Network School of Cyber Engineering Xi’an710071 China
Delegation Learning(DL) flourishes data sharing, enabling agents to delegate data to the cloud for model training. To preserve privacy, homomorphic encryption (HE) offers an effective solution for privacy-preserving m... 详细信息
来源: 评论
Research on the Design of Government Data Governance Evaluation System under the Perspective of Digital Government  9
Research on the Design of Government Data Governance Evaluat...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Xu, Zirui Sun, Jinyang Lu, Zhe Han, Delong Qilu University of Technology Shandong Academy of Sciences Information Research Institute Shandong Academy of Sciences Jinan China SHANDONG SCICOM Information and Economy Research Institute Co. Ltd. Jinan China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China
In the context of the digital era, government data governance is a key factor in promoting the modernization of government governance, but there is a lack of a complete set of evaluation index system to standardize th... 详细信息
来源: 评论
A two Stage Mixed Integer Programming Model for Distributionally Robust State Based Non-Intrusive Load Monitoring
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Zhang, Chen Chai, Zimo Yang, Linfeng University of Shanghai for Science and Technology School of Mechanical Engineering Shanghai China Guangxi University School of Computer Electronics and Information the Guangxi Key Laboratory of Multimedia Communication and Network Technology Nanning China
This paper presents a non-intrusive load monitoring (NILM) model based on two-stage mixed-integer linear programming theory. Compared with other mixed integer optimization-based models, this paper model introduces few... 详细信息
来源: 评论
A Novel Classical-Quantum Transfer Learning Framework for Image Recognition
SSRN
收藏 引用
SSRN 2024年
作者: Ruan, Banyao Liu, Zhihao Li, Xi School of Computer Science and Engineering Southeast University Nanjing211189 China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Nanjing211189 China
With the advent of the era of Noisy Intermediate-Scale quantum (NISQ), quantum processors have demonstrated clear quantum supremacy, marking a new milestone in the development of quantum computing. At the same time, c... 详细信息
来源: 评论
EVADE: Targeted Adversarial False Data Injection Attacks for State Estimation in Smart Grid
IEEE Transactions on Sustainable Computing
收藏 引用
IEEE Transactions on Sustainable Computing 2024年 第03期10卷 534-546页
作者: Tian, Jiwei Shen, Chao Wang, Buhong Ren, Chao Xia, Xiaofang Dong, Runze Cheng, Tianhao Ministry of Education Key Laboratory for Intelligent Networks and Network Security School of Cyber Science and Engineering Xi'an Jiaotong University Xi'an China Air Traffic Control and Navigation College Air Force Engineering University Xi'an China Information and Navigation College Air Force Engineering University Xi'an China School of Electrical and Electronic Engineering Nanyang Technological University Singapore School of Computer Science and Technology Xidian University Xi'an China
Although conventional false data injection attacks can circumvent the detection of bad data detection (BDD) in sustainable power grid cyber physical systems, they are easily detected by well-trained deep learning-base... 详细信息
来源: 评论
Byzantine-Robust Federated Learning Framework via a Server-Client Defense Mechanisms
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Song, Anxiao Zhang, Tao Cheng, Ke Cao, Yang Zhu, Xinghui Shen, Yulong Xidian University School of Computer Science and Technology Xi’an China Shaanxi Key Laboratory of Network and System Security Shaanxi Xi’an710071 China Xidian University School of Computer Science and Technology Shaanxi Xi’an710071 China Xi’an University of Posts and Telecommunications Shaanxi Key Laboratory of Information Communication Network and Security Shaanxi Xi’an710121 China Institute of Science Tokyo Department of Computer Science Tokyo Japan
Federated Learning (FL), a distributed machine learning (ML) framework, is susceptible to Byzantine attacks since the attacker can manipulate clients' local data or models to compromise the performance of the glob... 详细信息
来源: 评论
FPPNet: Fast Privacy-Preserving Neural network via Three-Party Arithmetic Secret Sharing  15th
FPPNet: Fast Privacy-Preserving Neural Network via Three-Pa...
收藏 引用
15th EAI International Conference on Mobile Multimedia Communications, MobiMedia 2022
作者: Bi, Renwan Xiong, Jinbo Li, Qi Liu, Ximeng Tian, Youliang Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fujian Normal University Fuzhou350117 China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210023 China Key Laboratory of Cryptography of Zhejiang Province Hangzhou Normal University Hangzhou311121 China Key Laboratory of Information Security of Network Systems College of Mathematics and Computer Science Fuzhou University Fuzhou350108 China State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang550025 China
Jointing multi-source data for model training can improve the accuracy of neural network. To solve the raising privacy concerns caused by data sharing, data are generally encrypted and outsourced to a group of cloud s... 详细信息
来源: 评论
Entity Disambiguation Based on UCL Knowledge Space
Entity Disambiguation Based on UCL Knowledge Space
收藏 引用
2021 IEEE International Conference on Artificial Intelligence and Industrial Design, AIID 2021
作者: Xinchen, Chang Peng, Yang School of Computer Science and Engineering Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University Nanjing China
Named entity disambiguation is an important task in the process of knowledge space construction and improvement, which builds a bridge between entities in text and entities in knowledge space. However, the existing en... 详细信息
来源: 评论
RGBT tracking via reliable feature configuration
收藏 引用
Science China(information Sciences) 2022年 第4期65卷 128-140页
作者: Zhengzheng TU Wenli PAN Yunsheng DUAN Jin TANG Chenglong LI Anhui Provincial Key Laboratory of Multimodal Cognitive Computation School of Computer Science and Technology Anhui University Network Information Center Anhui University
There is an increasing interest in RGBT tracking recently because of the complementary benefits of RGB and thermal infrared data. However, the reliability of each modality will change over time quite possibly, and the... 详细信息
来源: 评论