咨询与建议

限定检索结果

文献类型

  • 4,435 篇 会议
  • 3,397 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,840 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,280 篇 工学
    • 3,971 篇 计算机科学与技术...
    • 3,151 篇 软件工程
    • 1,357 篇 信息与通信工程
    • 695 篇 电气工程
    • 557 篇 控制科学与工程
    • 542 篇 电子科学与技术(可...
    • 455 篇 网络空间安全
    • 439 篇 生物工程
    • 303 篇 机械工程
    • 233 篇 光学工程
    • 224 篇 仪器科学与技术
    • 189 篇 生物医学工程(可授...
    • 168 篇 安全科学与工程
    • 148 篇 动力工程及工程热...
    • 145 篇 化学工程与技术
    • 133 篇 交通运输工程
    • 127 篇 建筑学
  • 2,305 篇 理学
    • 1,382 篇 数学
    • 506 篇 物理学
    • 475 篇 生物学
    • 430 篇 统计学(可授理学、...
    • 208 篇 系统科学
    • 165 篇 化学
  • 1,340 篇 管理学
    • 816 篇 管理科学与工程(可...
    • 584 篇 图书情报与档案管...
    • 290 篇 工商管理
  • 288 篇 法学
    • 167 篇 社会学
    • 119 篇 法学
  • 160 篇 医学
    • 130 篇 临床医学
    • 118 篇 基础医学(可授医学...
  • 117 篇 经济学
  • 98 篇 军事学
  • 54 篇 农学
  • 46 篇 教育学
  • 24 篇 文学
  • 22 篇 艺术学

主题

  • 239 篇 feature extracti...
  • 230 篇 semantics
  • 214 篇 cryptography
  • 182 篇 authentication
  • 181 篇 information secu...
  • 162 篇 computational mo...
  • 158 篇 security
  • 150 篇 protocols
  • 142 篇 accuracy
  • 140 篇 privacy
  • 139 篇 deep learning
  • 126 篇 training
  • 122 篇 laboratories
  • 106 篇 data models
  • 100 篇 federated learni...
  • 100 篇 cloud computing
  • 95 篇 servers
  • 93 篇 blockchain
  • 91 篇 public key crypt...
  • 88 篇 data privacy

机构

  • 203 篇 shandong provinc...
  • 174 篇 key laboratory o...
  • 158 篇 school of comput...
  • 155 篇 state key labora...
  • 114 篇 school of comput...
  • 106 篇 department of co...
  • 106 篇 school of cyber ...
  • 97 篇 information secu...
  • 80 篇 key laboratory o...
  • 79 篇 institute of inf...
  • 68 篇 guangdong provin...
  • 66 篇 computer network...
  • 65 篇 college of mathe...
  • 64 篇 university of ch...
  • 63 篇 state grid key l...
  • 62 篇 peng cheng labor...
  • 60 篇 key laboratory o...
  • 59 篇 school of softwa...
  • 59 篇 school of comput...
  • 55 篇 key laboratory o...

作者

  • 55 篇 jianfeng ma
  • 54 篇 yang yang
  • 50 篇 ma jianfeng
  • 45 篇 yixian yang
  • 41 篇 zheng wei-shi
  • 41 篇 ding yong
  • 38 篇 huang qingming
  • 33 篇 zhang huanguo
  • 32 篇 wang wei
  • 32 篇 hu yupu
  • 31 篇 cong runmin
  • 31 篇 xu an wang
  • 30 篇 yang yixian
  • 29 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 25 篇 xu li
  • 25 篇 xie xiaohua
  • 24 篇 xinhong hei
  • 23 篇 liu xin

语言

  • 7,214 篇 英文
  • 362 篇 其他
  • 277 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Computer Network and Information Security"
7840 条 记 录,以下是171-180 订阅
排序:
Multi-routine-data driven spatio-temporal short-term predictions for surface ozone in China
收藏 引用
Air Quality, Atmosphere and Health 2025年 1-10页
作者: Zheng, Canju Shen, Hengqing Sun, Jianan Liu, Guangliang Cao, Haowei Zhang, Jie Gong, Xiang Xu, Da Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Environment Research Institute Shandong University Shandong Qingdao 266237 China Ningbo Yonghuanyuan Environmental Engineering and Technology Co. LTD Zhejiang Ningbo 315012 China School of Mathematics and Physics Qingdao University of Science and Technology Qingdao 266061 China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Qingdao Innovation Center of Artificial Intelligence Ocean Technology Qingdao 266061 China
Ozone (O3) is a major atmospheric pollutant, and accurate prediction of its concentrations remains challenging due to its complex nonlinear relationships with precursor compounds. Existing machine learning methods hav... 详细信息
来源: 评论
Robust Watermarking Based on Multi-layer Watermark Feature Fusion
收藏 引用
IEEE Transactions on Multimedia 2025年
作者: Wu, Shaowu Lu, Wei Luo, Xiangyang Sun Yat-Sen University School of Computer Science and Engineering Ministry of Education Key Laboratory of Information Technology Guangdong Province Key Laboratory of Information Security Technology Guangzhou510006 China State Key Laboratory of Mathematical Engineering and Advanced Computing Henan450002 China
The purpose of robust image watermarking is to embed a watermark into a carrier image in an invisible form and extract the watermark successfully even under noise interference conditions to achieve copyright confirmat... 详细信息
来源: 评论
CPSNet: Comprehensive Enhancement Representation for Polyp Segmentation Task
CPSNet: Comprehensive Enhancement Representation for Polyp S...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Cai, Jiati Liu, Xiaogang Yang, Hongjie Ding, Yi Zhong, Ting Qin, Zhen Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Chengdu China Department of Gastroenterology and Hepatology University of Electronic Science and Technology of China Chengdu China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China
Accurately segmenting polyp regions in colonoscopy images is crucial for the diagnosis and intervention of colorectal cancer. However, the task of polyp segmentation remains challenging due to the diverse size and sha... 详细信息
来源: 评论
Joint Automatic Speech Recognition And Structure Learning For Better Speech Understanding
Joint Automatic Speech Recognition And Structure Learning Fo...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Hu, Jiliang Li, Zuchao Shen, Mengjia Ai, Haojun Li, Sheng Zhang, Jun Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Wuhan China School of Computer Science Wuhan University Wuhan China Wuhan Second Ship Design and Research Institute Wuhan China National Institute of Information and Communications Technology Japan
Spoken language understanding (SLU) is a structure prediction task in the field of speech. Recently, many works on SLU that treat it as a sequence-to-sequence task have achieved great success. However, This method is ... 详细信息
来源: 评论
A novel shilling attack on black-box recommendation systems for multiple targets
收藏 引用
Neural Computing and Applications 2025年 第5期37卷 3399-3417页
作者: Liu, Shuangyu Yu, Siyang Li, Huan Yang, Zhibang Duan, Mingxing Liao, Xiangke School of Information Science and Engineering Hunan University Hunan Changsha410082 China College of Information Technology and Management Hunan University of Finance and Economics Hunan Changsha410000 China Hunan Province Key Laboratory of Industrial Internet Technology and Security Changsha University Hunan Changsha410022 China Shenzhen Institute Hunan University Guangdong Shenzhen518063 China School of Computer Science National University of Defense Technology Hunan Changsha410073 China
In the digital era, e-platforms ubiquitously deploy recommendation systems, utilizing machine learning paradigms to tailor content according to user preferences and needs. Yet, the integrity of these systems is often ... 详细信息
来源: 评论
When Crypto Fails: Demystifying Cryptographic Defects in Ethereum Smart Contracts
收藏 引用
IEEE Transactions on Software Engineering 2025年 第5期51卷 1381-1398页
作者: Zhang, Jiashuo Chen, Jiachi Shen, Yiming Zhang, Tao Wang, Yanlin Chen, Ting Gao, Jianbo Chen, Zhong Peking University School of Computer Science Beijing100871 China Sun Yat-sen University School of Software Engineering Zhuhai510275 China Macau University of Science and Technology School of Computer Science and Engineering 999078 China University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China Kashi Institute of Electronics and Information Industry Kashi844000 China Beijing Jiaotong University Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing100044 China
Ethereum has officially provided a set of system-level cryptographic APIs to enhance smart contracts with cryptographic capabilities. These APIs have been utilized in over 13.8% of Ethereum transactions, motivating de... 详细信息
来源: 评论
Byzantine-Robust Federated Learning Framework via a Server-Client Defense Mechanisms
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Song, Anxiao Zhang, Tao Cheng, Ke Cao, Yang Zhu, Xinghui Shen, Yulong Xidian University School of Computer Science and Technology Xi’an China Shaanxi Key Laboratory of Network and System Security Shaanxi Xi’an710071 China Xidian University School of Computer Science and Technology Shaanxi Xi’an710071 China Xi’an University of Posts and Telecommunications Shaanxi Key Laboratory of Information Communication Network and Security Shaanxi Xi’an710121 China Institute of Science Tokyo Department of Computer Science Tokyo Japan
Federated Learning (FL), a distributed machine learning (ML) framework, is susceptible to Byzantine attacks since the attacker can manipulate clients' local data or models to compromise the performance of the glob... 详细信息
来源: 评论
Multimodal Dialogue Emotion Recognition Based on Label Optimization and Coarse-Grained Assisted Fine-Grained
Multimodal Dialogue Emotion Recognition Based on Label Optim...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Zhibo Zhang Zhenyu Yang Yan Huang Baojie Xu Wenyue Hu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science China
Multimodal dialogue emotion recognition integrates data from multiple modalities to accurately identify emotional states in conversations. However, differences in expression and information density across modalities c... 详细信息
来源: 评论
Forgery-Aware Adaptive Learning With Vision Transformer for Generalized Face Forgery Detection
收藏 引用
IEEE Transactions on Circuits and Systems for Video Technology 2025年 第5期35卷 4116-4129页
作者: Luo, Anwei Cai, Rizhao Kong, Chenqi Ju, Yakun Kang, Xiangui Huang, Jiwu Kot, Alex C. Sun Yat-sen University School of Computer Science and Engineering Guangzhou510006 China Jiangxi University of Finance and Economics School of Computing and Artificial Intelligence Nanchang330013 China Laboratory School of Electrical and Electronic Engineering Jurong West 639798 Singapore Sun Yat-sen University Guangdong Key Laboratory of Information Security School of Computer Science and Engineering Guangzhou510006 China Shenzhen MSU-BIT University Guangdong Laboratory of Machine Perception and Intelligent Computing Faculty of Engineering Shenzhen518116 China China-Singapore International Joint Research Institute Guangzhou China
With the rapid progress of generative models, the current challenge in face forgery detection is how to effectively detect realistic manipulated faces from different unseen domains. Though previous studies show that p... 详细信息
来源: 评论
Image Compression Algorithm Based on Region of Interest Extraction for Unmanned Aerial Vehicles Communication
Image Compression Algorithm Based on Region of Interest Extr...
收藏 引用
IEEE information Technology and Mechatronics Engineering Conference (ITOEC)
作者: Yanxia Liang Tong Jia Xin Liu Huanhuan Zhang Shaanxi Key Laboratory of Information Communication Network and Security Xi’an University of Posts and Telecommunications Xi’an China College of Information Engineering Xi’an Eurasia University Xi’an China
The flexibility and maneuverability of unmanned aerial vehicles (UAVs) have led to their widespread use, but the challenge of limited storage space and bandwidth in emergency scenarios necessitates efficient image com... 详细信息
来源: 评论