咨询与建议

限定检索结果

文献类型

  • 4,435 篇 会议
  • 3,397 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,840 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,280 篇 工学
    • 3,971 篇 计算机科学与技术...
    • 3,151 篇 软件工程
    • 1,357 篇 信息与通信工程
    • 695 篇 电气工程
    • 557 篇 控制科学与工程
    • 542 篇 电子科学与技术(可...
    • 455 篇 网络空间安全
    • 439 篇 生物工程
    • 303 篇 机械工程
    • 233 篇 光学工程
    • 224 篇 仪器科学与技术
    • 189 篇 生物医学工程(可授...
    • 168 篇 安全科学与工程
    • 148 篇 动力工程及工程热...
    • 145 篇 化学工程与技术
    • 133 篇 交通运输工程
    • 127 篇 建筑学
  • 2,305 篇 理学
    • 1,382 篇 数学
    • 506 篇 物理学
    • 475 篇 生物学
    • 430 篇 统计学(可授理学、...
    • 208 篇 系统科学
    • 165 篇 化学
  • 1,340 篇 管理学
    • 816 篇 管理科学与工程(可...
    • 584 篇 图书情报与档案管...
    • 290 篇 工商管理
  • 288 篇 法学
    • 167 篇 社会学
    • 119 篇 法学
  • 160 篇 医学
    • 130 篇 临床医学
    • 118 篇 基础医学(可授医学...
  • 117 篇 经济学
  • 98 篇 军事学
  • 54 篇 农学
  • 46 篇 教育学
  • 24 篇 文学
  • 22 篇 艺术学

主题

  • 239 篇 feature extracti...
  • 230 篇 semantics
  • 214 篇 cryptography
  • 182 篇 authentication
  • 181 篇 information secu...
  • 162 篇 computational mo...
  • 158 篇 security
  • 150 篇 protocols
  • 142 篇 accuracy
  • 140 篇 privacy
  • 139 篇 deep learning
  • 126 篇 training
  • 122 篇 laboratories
  • 106 篇 data models
  • 100 篇 federated learni...
  • 100 篇 cloud computing
  • 95 篇 servers
  • 93 篇 blockchain
  • 91 篇 public key crypt...
  • 88 篇 data privacy

机构

  • 203 篇 shandong provinc...
  • 174 篇 key laboratory o...
  • 158 篇 school of comput...
  • 155 篇 state key labora...
  • 114 篇 school of comput...
  • 106 篇 department of co...
  • 106 篇 school of cyber ...
  • 97 篇 information secu...
  • 80 篇 key laboratory o...
  • 79 篇 institute of inf...
  • 68 篇 guangdong provin...
  • 66 篇 computer network...
  • 65 篇 college of mathe...
  • 64 篇 university of ch...
  • 63 篇 state grid key l...
  • 62 篇 peng cheng labor...
  • 60 篇 key laboratory o...
  • 59 篇 school of softwa...
  • 59 篇 school of comput...
  • 55 篇 key laboratory o...

作者

  • 55 篇 jianfeng ma
  • 54 篇 yang yang
  • 50 篇 ma jianfeng
  • 45 篇 yixian yang
  • 41 篇 zheng wei-shi
  • 41 篇 ding yong
  • 38 篇 huang qingming
  • 33 篇 zhang huanguo
  • 32 篇 wang wei
  • 32 篇 hu yupu
  • 31 篇 cong runmin
  • 31 篇 xu an wang
  • 30 篇 yang yixian
  • 29 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 25 篇 xu li
  • 25 篇 xie xiaohua
  • 24 篇 xinhong hei
  • 23 篇 liu xin

语言

  • 7,214 篇 英文
  • 362 篇 其他
  • 277 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Computer Network and Information Security"
7840 条 记 录,以下是121-130 订阅
排序:
Multi-scale network for single image deblurring based on ensemble learning module
收藏 引用
Multimedia Tools and Applications 2025年 第11期84卷 9045-9064页
作者: Wu, WenBo Pan, Yun Su, Na Wang, JingTao Wu, ShaoChuan Xu, ZeKun Yu, YouJian Liu, YaPeng State Key Laboratory of Media Convergence and Communication Communication University of China Beijing100024 China School of Computer and Cyberspace Security Communication University of China Beijing100024 China School of Electronics and Information Engineering Harbin Institute of Technology Harbin150080 China College of Computer and Control Engineering Northeast Forestry University Harbin150040 China School of Computer and Information Engineering Tianjin Chengjian University Tianjin300384 China School of Computer Science and Technology Anhui University Hefei230601 China
In this paper, we have identified two primary issues with current multi-scale image deblurring methods. On the one hand, the blurring scale is ignored. On the other hand, the context information of images is not fully... 详细信息
来源: 评论
Optimization algorithm for global k-means algorithm  13
Optimization algorithm for global k-means algorithm
收藏 引用
13th International Conference on Intelligent Control and information Processing, ICICIP 2025
作者: Li, Sen Li, Fang Luo, Xiaonan School of Computer Science and Information Security Guilin University of Electronic Technology Guilin541004 China Guilin541004 China Guangxi Key Laboratory of Image and Graphic Intelligent Processing Guilin541004 China
The k-means method is widely utilized for clustering. Its simplicity, efficacy, and swiftness make it a favored choice among clustering algorithms. It faces the challenge of sensitivity to the initial class center. Th... 详细信息
来源: 评论
Disentangled Noisy Correspondence Learning
收藏 引用
IEEE Transactions on Image Processing 2025年 34卷 2602-2615页
作者: Dang, Zhuohang Luo, Minnan Wang, Jihong Jia, Chengyou Han, Haochen Wan, Herun Dai, Guang Chang, Xiaojun Wang, Jingdong Xi’an Jiaotong University School of Computer Science and Technology Ministry of Education Key Laboratory of Intelligent Networks and Network Security Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Shaanxi Xi’an710049 China SGIT AI Laboratory Xi’an710048 China State Grid Corporation of China State Grid Shaanxi Electric Power Company Ltd. Xi’an710048 China University of Science and Technology of China School of Information Science and Technology Hefei230026 China Abu Dhabi United Arab Emirates Baidu Inc. Beijing100085 China
Cross-modal retrieval is crucial in understanding latent correspondences across modalities. However, existing methods implicitly assume well-matched training data, which is impractical as real-world data inevitably in... 详细信息
来源: 评论
Discriminative Score Suppression for Weakly Supervised Video Anomaly Detection
Discriminative Score Suppression for Weakly Supervised Video...
收藏 引用
2025 IEEE/CVF Winter Conference on Applications of computer Vision, WACV 2025
作者: Xu, Chen Li, Chunguo Xing, Hongjie College of Mathematics and Information Science Hebei University Hebei Key Laboratory of Machine Learning and Computational Intelligence Baoding071002 China School of Cyber Security and Computer Hebei University Baoding071000 China
Weakly supervised video anomaly detection (WSVAD) often relies on Multiple Instance Learning (MIL). However, selecting only the most discriminative segments for training limits the model's ability to comprehensive... 详细信息
来源: 评论
Improving MPCitH with Preprocessing: Mask Is All You Need
IACR Transactions on Cryptographic Hardware and Embedded Sys...
收藏 引用
IACR Transactions on Cryptographic Hardware and Embedded Systems 2025年 第2期2025卷 1-22页
作者: Liu, Guowei Liu, Guoxiao Jiang, Kaijie Yu, Qingyuan Jia, Keting Wei, Puwen Wang, Meiqin School of Cyber Science and Technology Shandong University Qingdao China Institute for Network Sciences and Cyberspace Tsinghua University Beijing China Institute for Advanced Study Tsinghua University Beijing China Quan Cheng Shandong Laboratory Jinan China Zhongguancun Laboratory Beijing China BNRist Tsinghua University Beijing China Key Laboratory of Cryptologic Technology and Information Security Ministry of Education Shandong University Jinan China
The MPC-in-the-head with preprocessing (MPCitH-PP) paradigm presents a novel approach for constructing post-quantum digital signatures like Picnic3. This paper revisits the MPCitH-PP construction, analyzing both its o... 详细信息
来源: 评论
LASS: A Novel and Economical Data Augmentation Framework Based on Language Models for Debiasing Opinion Summarization  31
LASS: A Novel and Economical Data Augmentation Framework Bas...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Zhang, Yanyue Li, Pengfei Lai, Yilong He, Yulan Zhou, Deyu School of Computer Science and Engineering Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University China Department of Informatics King's College London United Kingdom The Alan Turing Institute United Kingdom
As more than 70% of reviews in the existing opinion summary data set are positive, current opinion summarization approaches are hesitant to generate negative summaries given the input of negative texts. To address suc... 详细信息
来源: 评论
Tomato Leaf Disease Identification and Growth Dataset Augmentation Based on UAE-GAN  13
Tomato Leaf Disease Identification and Growth Dataset Augmen...
收藏 引用
13th International Conference on Intelligent Control and information Processing, ICICIP 2025
作者: Li, Xin Li, Fang Luo, Xiaonan School of Computer Science and Information Security Guilin University of Electronic Technology Guilin541004 China Guilin541004 China Guangxi Key Laboratory of Image and Graphic Intelligent Processing Guilin541004 China
To delve into the characterization of growth disorders in different crops, it is important to support the model with a large amount of image data that includes a variety of disease types and disease levels to capture ... 详细信息
来源: 评论
DTPN: A Diffusion-based Traffic Purification network for Tor Website Fingerprinting  25
DTPN: A Diffusion-based Traffic Purification Network for Tor...
收藏 引用
18th ACM International Conference on Web Search and Data Mining, WSDM 2025
作者: Yang, Chenchen Xiao, Xi Hu, Guangwu Ling, Zhen Li, Hao Zhang, Bin Shenzhen International Graduate School Tsinghua University Shenzhen China Key Laboratory of Cyberspace Security Ministry of Education of China Zhengzhou China Peng Cheng Laboratory Shenzhen China Shenzhen Institute of Information Technology Shenzhen China Southeast University Nanjing China National Key Laboratory of Advanced Communication Network Shijiazhuang China
Website Fingerprinting attack is a type of method used to classify network traffic generated by users on the Tor (The Onion Router) based on the websites they visit, leading to the leakage of individuals' privacy ... 详细信息
来源: 评论
Verifiable and Forward-Secure Multi-keyword Query in Internet of Medical Things
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Li, Hongjun He, Debiao Feng, Qi Luo, Min Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan China Wuhan University School of Cyber Science and Engineering Wuhan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250014 China National Key Laboratory of Security Communication Chengdu China
The Internet of Medical Things (IoMT) plays a pivotal role in modern healthcare systems, enhancing patients' medical experiences and improving the efficiency of public medical services. However, concerns regarding... 详细信息
来源: 评论
A numerical magnitude aware multi-channel hierarchical encoding network for math word problem solving
收藏 引用
Neural Computing and Applications 2025年 第3期37卷 1651-1672页
作者: Xu, Junjie Chen, Yuzhong Xiao, Lingsheng Liao, Hongmiao Zhong, Jiayuan Dong, Chen College of Computer and Data Science Fuzhou University Fujian Province Fuzhou350108 China Engineering Research Center of Big Data Intelligence Ministry of Education Fuzhou China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fujian Province Fuzhou350108 China
Math word problem (MWP) represents a critical research area within reading comprehension, where accurate comprehension of math problem text is crucial for generating math expressions. However, current approaches still... 详细信息
来源: 评论