咨询与建议

限定检索结果

文献类型

  • 4,432 篇 会议
  • 3,329 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,769 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,212 篇 工学
    • 3,916 篇 计算机科学与技术...
    • 3,130 篇 软件工程
    • 1,329 篇 信息与通信工程
    • 645 篇 电气工程
    • 541 篇 控制科学与工程
    • 523 篇 电子科学与技术(可...
    • 442 篇 网络空间安全
    • 439 篇 生物工程
    • 298 篇 机械工程
    • 230 篇 光学工程
    • 224 篇 仪器科学与技术
    • 188 篇 生物医学工程(可授...
    • 162 篇 安全科学与工程
    • 148 篇 动力工程及工程热...
    • 144 篇 化学工程与技术
    • 126 篇 建筑学
    • 124 篇 交通运输工程
  • 2,279 篇 理学
    • 1,360 篇 数学
    • 498 篇 物理学
    • 475 篇 生物学
    • 420 篇 统计学(可授理学、...
    • 208 篇 系统科学
    • 165 篇 化学
  • 1,326 篇 管理学
    • 809 篇 管理科学与工程(可...
    • 573 篇 图书情报与档案管...
    • 289 篇 工商管理
  • 287 篇 法学
    • 167 篇 社会学
    • 118 篇 法学
  • 153 篇 医学
    • 126 篇 临床医学
  • 116 篇 经济学
    • 116 篇 应用经济学
  • 98 篇 军事学
  • 53 篇 农学
  • 42 篇 教育学
  • 24 篇 文学
  • 22 篇 艺术学

主题

  • 237 篇 feature extracti...
  • 227 篇 semantics
  • 216 篇 cryptography
  • 182 篇 authentication
  • 181 篇 information secu...
  • 161 篇 computational mo...
  • 157 篇 security
  • 150 篇 protocols
  • 142 篇 accuracy
  • 141 篇 privacy
  • 139 篇 deep learning
  • 125 篇 training
  • 122 篇 laboratories
  • 105 篇 data models
  • 99 篇 federated learni...
  • 99 篇 cloud computing
  • 94 篇 servers
  • 93 篇 blockchain
  • 92 篇 public key crypt...
  • 88 篇 data privacy

机构

  • 202 篇 shandong provinc...
  • 173 篇 key laboratory o...
  • 158 篇 school of comput...
  • 156 篇 state key labora...
  • 113 篇 school of comput...
  • 106 篇 department of co...
  • 106 篇 school of cyber ...
  • 97 篇 information secu...
  • 80 篇 key laboratory o...
  • 78 篇 institute of inf...
  • 69 篇 guangdong provin...
  • 65 篇 college of mathe...
  • 65 篇 state grid key l...
  • 64 篇 computer network...
  • 64 篇 university of ch...
  • 60 篇 key laboratory o...
  • 60 篇 peng cheng labor...
  • 59 篇 school of softwa...
  • 59 篇 school of comput...
  • 54 篇 key laboratory o...

作者

  • 55 篇 jianfeng ma
  • 53 篇 yang yang
  • 48 篇 ma jianfeng
  • 45 篇 yixian yang
  • 42 篇 ding yong
  • 41 篇 zheng wei-shi
  • 38 篇 huang qingming
  • 31 篇 cong runmin
  • 31 篇 zhang huanguo
  • 31 篇 xu an wang
  • 31 篇 hu yupu
  • 31 篇 yang yixian
  • 30 篇 wang wei
  • 28 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 26 篇 xu li
  • 26 篇 xie xiaohua
  • 24 篇 xinhong hei
  • 23 篇 liu xin

语言

  • 7,157 篇 英文
  • 349 篇 其他
  • 278 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Computer Network and Information Security"
7769 条 记 录,以下是221-230 订阅
排序:
Spatial-Temporal Reconstruction Error for AIGC-based Forgery Image Detection
Spatial-Temporal Reconstruction Error for AIGC-based Forgery...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Chengji Shen Zhenjiang Liu Kaixuan Chen Jie Lei Mingli Song Zunlei Feng State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security Idlefish Network Technology Alibaba Group College of Computer Science and Technology Zhejiang University of Technology
The remarkable success of AI-Generated Content (AIGC), especially diffusion image generation models, brings about unprecedented creative applications, but also creates fertile ground for malicious counterfeiting and c... 详细信息
来源: 评论
FedSimRep: A Federated Learning Method Based on Data Representation Selection  25
FedSimRep: A Federated Learning Method Based on Data Represe...
收藏 引用
Proceedings of the 2025 3rd International Conference on Communication networks and Machine Learning
作者: Falu Zhai Lu Wu Chunxiao Wang Tongyang Hao Shucang Zang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan Shandong China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan Shandong China
As an emerging distributed technology, Federated learning enables model training while protecting privacy without sharing local data. However, the heterogeneity of geographic locations and devices leads to response de... 详细信息
来源: 评论
Comprehensive Perturbation Consistency for Semi-Supervised Change Detection in Remote Sensing Images
Comprehensive Perturbation Consistency for Semi-Supervised C...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Zan Mao Xin Li Ze Luo Yingjuan Tang Dongmei Jiang Computer Network Information Center Chinese Academy of Sciences University of the Chinese Academy of Sciences PengCheng Laboratory National Key Laboratory of Advanced Vehicle Integration and Control Beijing Institute of Technology
Currently, many change detection (CD) methods rely on supervised learning, which necessitates extensive manually annotated data, resulting in significant labor and time requirements. Recently, semi-supervised (SS) app... 详细信息
来源: 评论
STAD: Joint Spatial-Temporal Dimension and Channel Correlation for Time Series Anomaly Detection
STAD: Joint Spatial-Temporal Dimension and Channel Correlati...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Mingle Zhou Xingli Wang Delong Han Jin Wan Jiachen Li Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China SHANDONG SCICOM Information and Economy Research Institute Co. Ltd
Accurately identifying real anomalies and pseudo-anomalies in complex multi-dimensional time series data has been a difficult problem in time series anomaly detection. To solve this problem, this paper proposes a new ... 详细信息
来源: 评论
Double-RIS Enabled Physical Layer security for Wireless-Powered Communication Systems Over Rayleigh Fading Channels
收藏 引用
IEEE Transactions on Communications 2025年
作者: Chen, Jingyu Cao, Kunrui Ding, Haiyang Lv, Lu Ye, Yinghui Chi, Haolian Wang, Tao Yang, Liang National University of Defense Technology School of Information and Communications Wuhan430035 China Xidian University School of Telecommunications Engineering Xi'an710071 China Xi'an University of Posts and Telecommunications Shaanxi Key Laboratory of Information Communication Network and Security Xi'an710121 China Hunan University College of Computer Science and Electronic Engineering Changsha410082 China
This paper investigates the physical layer security for a double-reconfigurable intelligent surface (DRIS) aided wireless-powered communication (WPC) system in the presence of an eavesdropper, where one RIS (termed as... 详细信息
来源: 评论
On the Performance of Coexisting Passive RIS and Active Relay-Assisted Short-Packet Communications
On the Performance of Coexisting Passive RIS and Active Rela...
收藏 引用
IEEE Conference on Wireless Communications and networking
作者: Chenyao Wei Liqin Shi Xiaoli Chu Xi Song Guangyue Lu Shaanxi Key Laboratory of Information Communication Network and Security Xi'an University of Posts & Telecommunications China University of Sheffield U.K. North China Electric Power University Beijing China
Although coexisting passive reconfigurable intelligent surface (RIS) and active relay have been considered for enhancing long-packet communications, their potential in supporting short-packet communications (SPC) wher... 详细信息
来源: 评论
A two Stage Mixed Integer Programming Model for Distributionally Robust State Based Non-Intrusive Load Monitoring
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Zhang, Chen Chai, Zimo Yang, Linfeng University of Shanghai for Science and Technology School of Mechanical Engineering Shanghai China Guangxi University School of Computer Electronics and Information the Guangxi Key Laboratory of Multimedia Communication and Network Technology Nanning China
This paper presents a non-intrusive load monitoring (NILM) model based on two-stage mixed-integer linear programming theory. Compared with other mixed integer optimization-based models, this paper model introduces few... 详细信息
来源: 评论
Digital Human Techniques for Education Reform  24
Digital Human Techniques for Education Reform
收藏 引用
7th International Conference on Educational Technology Management, ICETM 2024
作者: Guo, Peirong Zhang, Qi Tian, Chunwei Xue, Wanli Feng, Xiaocheng School of Software Northwestern Polytechnical University Shaanxi Xi’an China School of Economics and Management Harbin Institute of Technology at Weihai Shandong Weihai China Shenzhen Research Institute of Northwestern Polytechnical University Northwestern Polytechnical University Guangdong Shenzhen China School of Computer Science and Engineering Tianjin University of Technology Tianjin China Research Center for Social Computing and Information Retrieval Harbin Institute of Technology Heilongjiang Harbin China Guangdong Key Laboratory of Intelligent Information Processing Shenzhen Key Laboratory of Media Security Shenzhen University Guangdong Shenzhen China
The rapid evolution of artificial intelligence, big data, and generative AI models has ushered in significant transformations across various sectors, including education. Digital Human Technique, an innovative technol... 详细信息
来源: 评论
A Time-Driven UAV Deployment and Content Caching Approach for Multi-UAV-Enabled Consumer Electronics network
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Zhang, Jianshan Yang, Xu Ming, Rui Luo, Haibo Wang, Xiaoding Piran, Md. Jalil Minjiang University School of Computer and Big Data Fuzhou350108 China Fujian Normal University College of Computer and Cyber Security Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Fuzhou350117 China Chinese Academy of Tropical Agricultural Sciences National Key Laboratory for Tropical Crop Breeding Institute of Tropical Bioscience and Biotechnology Sanya Research Institute Hainan Sanya572024 China Sejong University Department of Computer Science and Engineering Seoul05006 Korea Republic of
To address the problem of high delay due to the explosive growth of mobile data traffic in consumer electronics network (CEN), in this paper, we investigate the multiple-unmanned aerial vehicle (UAV)-enabled CEN conte... 详细信息
来源: 评论
Symbiosis Rather Than Aggregation: Towards Generalized Federated Learning via Model Symbiosis
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Liu, Yuange Liu, Yuru Zhang, Weishan Zheng, Chaoqun Jiang, Wei Luo, Daobin Qiao, Qiao Meng, Lingzhao Zhao, Hongwei Yang, Su College of Computer Science and Technology Qingdao266580 China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan250014 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Jinan250014 China Information Science Academy of China Electronics Technology Group Corporation Beijing100036 China Fudan University School of Computer Science Shanghai200433 China
Federated Learning (FL) faces significant challenges in scenarios with non-IID (non-independent and identically distributed) data distributions across participating clients. Traditional aggregation-based approaches of... 详细信息
来源: 评论