咨询与建议

限定检索结果

文献类型

  • 4,511 篇 会议
  • 3,407 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,926 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,322 篇 工学
    • 4,005 篇 计算机科学与技术...
    • 3,158 篇 软件工程
    • 1,357 篇 信息与通信工程
    • 658 篇 电气工程
    • 588 篇 控制科学与工程
    • 531 篇 电子科学与技术(可...
    • 452 篇 网络空间安全
    • 440 篇 生物工程
    • 301 篇 机械工程
    • 233 篇 光学工程
    • 224 篇 仪器科学与技术
    • 188 篇 生物医学工程(可授...
    • 165 篇 安全科学与工程
    • 153 篇 动力工程及工程热...
    • 147 篇 化学工程与技术
    • 129 篇 建筑学
    • 127 篇 交通运输工程
  • 2,306 篇 理学
    • 1,374 篇 数学
    • 504 篇 物理学
    • 478 篇 生物学
    • 425 篇 统计学(可授理学、...
    • 207 篇 系统科学
    • 167 篇 化学
  • 1,340 篇 管理学
    • 818 篇 管理科学与工程(可...
    • 579 篇 图书情报与档案管...
    • 295 篇 工商管理
  • 287 篇 法学
    • 167 篇 社会学
    • 118 篇 法学
  • 156 篇 医学
    • 128 篇 临床医学
  • 116 篇 经济学
    • 116 篇 应用经济学
  • 99 篇 军事学
  • 54 篇 农学
  • 44 篇 教育学
  • 24 篇 文学
  • 23 篇 艺术学

主题

  • 238 篇 feature extracti...
  • 229 篇 semantics
  • 214 篇 cryptography
  • 184 篇 authentication
  • 181 篇 information secu...
  • 163 篇 computational mo...
  • 160 篇 security
  • 151 篇 protocols
  • 144 篇 deep learning
  • 144 篇 accuracy
  • 139 篇 privacy
  • 122 篇 laboratories
  • 122 篇 training
  • 103 篇 data models
  • 102 篇 federated learni...
  • 99 篇 cloud computing
  • 94 篇 servers
  • 92 篇 public key crypt...
  • 92 篇 blockchain
  • 89 篇 data privacy

机构

  • 204 篇 shandong provinc...
  • 179 篇 key laboratory o...
  • 166 篇 school of comput...
  • 151 篇 state key labora...
  • 112 篇 school of comput...
  • 111 篇 school of cyber ...
  • 106 篇 department of co...
  • 98 篇 information secu...
  • 84 篇 key laboratory o...
  • 81 篇 institute of inf...
  • 67 篇 computer network...
  • 67 篇 guangdong provin...
  • 66 篇 university of ch...
  • 64 篇 college of mathe...
  • 64 篇 state grid key l...
  • 63 篇 peng cheng labor...
  • 60 篇 key laboratory o...
  • 59 篇 school of softwa...
  • 57 篇 school of comput...
  • 56 篇 key laboratory o...

作者

  • 55 篇 jianfeng ma
  • 53 篇 yang yang
  • 49 篇 ma jianfeng
  • 45 篇 yixian yang
  • 43 篇 ding yong
  • 41 篇 zheng wei-shi
  • 38 篇 huang qingming
  • 31 篇 cong runmin
  • 31 篇 wang wei
  • 31 篇 zhang huanguo
  • 31 篇 hu yupu
  • 30 篇 xu an wang
  • 30 篇 yang yixian
  • 29 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 27 篇 min-ling zhang
  • 25 篇 xie xiaohua
  • 24 篇 liu xin
  • 23 篇 wang yujue

语言

  • 7,128 篇 英文
  • 536 篇 其他
  • 282 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Computer Network and Information Security"
7926 条 记 录,以下是331-340 订阅
排序:
DTGCN: a method combining dependency tree and graph convolutional networks for Chinese long-interval named entity relationship extraction
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第10期14卷 13361-13373页
作者: Li, Taoyuan Ma, Liangli Qin, Jiwei Ren, Wei College of Electronic Engineering Naval University of Engineering Wuhan China School of Computer Science China University of Geosciences Wuhan China Key Laboratory of Network Assessment Technology CAS Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China Henan Key Laboratory of Network Cryptography Technology Zhengzhou China
The extraction of relationships between military entities and descriptive entities is a key task for automated construction of military knowledge graphs. This category of text unstructured imposed problems such as unf... 详细信息
来源: 评论
Loc4Plan: Locating Before Planning for Outdoor Vision and Language Navigation  24
Loc4Plan: Locating Before Planning for Outdoor Vision and La...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Tian, Huilin Meng, Jingke Zheng, Wei-Shi Li, Yuan-Ming Yan, Junkai Zhang, Yunong School of Computer Science and Engineering Sun Yat-sen University Guangzhou China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education Guangdong Provincial Key Laboratory of Information Security Technology Guangzhou China
Vision and Language Navigation (VLN) is a challenging task that requires agents to understand instructions and navigate to the destination in a visual environment. One of the key challenges in outdoor VLN is keeping t... 详细信息
来源: 评论
Decoy-state quantum-key-distribution-based quantum private query with error tolerance bound
收藏 引用
Physical Review A 2024年 第5期109卷 052442-052442页
作者: Bin Liu Zhonghao Liang Wei Huang Fei Gao Jiayi Yuan Bingjie Xu College of Computer Science The State Key Laboratory of Networking and Switching Technology Center for Network and Information Science and Technology on Communication Security Laboratory Institute of Southwestern Communication Chengdu 610041 China
Quantum private query (QPQ) faces many challenges in practical applications. At present, some scholars have made substantial work on overcoming channel loss, channel noise, and nonideal light sources, respectively. Ho... 详细信息
来源: 评论
A Fine-Grained Ownership Transfer Protocol for Cloud EMRs Auditing  24th
A Fine-Grained Ownership Transfer Protocol for Cloud EMRs A...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Wang, Yamei Zhang, Yuexin You, Weijing Ma, Yunru Wang, Derui Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fujian Normal University Fuzhou China School of Health Fujian Medical University Fuzhou China CSIRO’s Data61 Melbourne Australia
In cloud Electronic Medical Records (EMRs), a user’s medical records typically comprise various types of health-related sensitive data. When data ownership needs to be transferred, it is preferred to transfer the req... 详细信息
来源: 评论
PixelFade: Privacy-preserving Person Re-identification with Noise-guided Progressive Replacement  24
PixelFade: Privacy-preserving Person Re-identification with ...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Zhang, Delong Peng, Yi-Xing Wu, Xiao-Ming Wu, Ancong Zheng, Wei-Shi School of Computer Science and Engineering Sun Yat-sen University Guangzhou China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education Guangdong Province Key Laboratory of Information Security Technology Guangzhou China
Online person re-identification services face privacy breaches from potential data leakage and recovery attacks, exposing cloud-stored images to malicious attackers and triggering public concern. The privacy protectio... 详细信息
来源: 评论
FLEER: A Federated Learning Framework for EEG Emotion Recognition  5
FLEER: A Federated Learning Framework for EEG Emotion Recogn...
收藏 引用
5th International Seminar on Artificial Intelligence, networking and information Technology, AINIT 2024
作者: Li, Mingming Tang, Xianglei School of Computer Science and Technology Hangzhou Dianzi University Hangzhou China Zhejiang Electronic Information Products Inspection and Research Institute Key Laboratory of Information Security of Zhejiang Province Hangzhou China
The success of deep learning (DL) methods in the Brain-computer Interface (BCI) field for emotion recognition of electroencephalographic (EEG) recordings has been limited due to the scarcity of large datasets. Individ... 详细信息
来源: 评论
GHTO: Improving Byzantine Robustness in Distributed Machine Learning Through Gradient Heterogeneity Twofold Optimization  6
GHTO: Improving Byzantine Robustness in Distributed Machine ...
收藏 引用
6th International Conference on Frontier Technologies of information and computer, ICFTIC 2024
作者: Li, Caiyun Yang, Ming Cao, Jian Wu, Xiaoming He, Yunpeng Wang, Xin Jinan250014 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan250014 China Shandong Evayinfo Technology Co. Ltd Jinan250101 China
Heterogeneous datasets induce local gradient variance and global gradient variance in distributed learning, collectively referred to as gradient heterogeneity. Gradient heterogeneity increases the system's vulnera... 详细信息
来源: 评论
A Trusted Privacy-Preserving Model for Cross-Chain Transactions Based on zk_SNARKs
A Trusted Privacy-Preserving Model for Cross-Chain Transacti...
收藏 引用
2023 International Conference on networking and network Applications, NaNA 2023
作者: Wang, Yichuan Tie, Jianhuan Hei, Xinhong Zhao, Li Zhang, Xiaohui School of Computer Science and Engineering Xi'an University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technolog Xi'an China
Currently, the privacy protection technology of blockchain is not mature enough, such as user data leakage and lack of anonymity exist, and these problems are especially serious when conducting cross-chain transaction... 详细信息
来源: 评论
Confidence-Guided Feature Alignment for Cloth-Changing Person Re-identification  27th
Confidence-Guided Feature Alignment for Cloth-Changing Pers...
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Huang, Sirong Zheng, Huicheng School of Computer Science and Engineering Sun Yat-Sen University Guangzhou China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education Guangzhou China Guangdong Province Key Laboratory of Information Security Technology Guangzhou China
Much progress has been made in the field of person re-identification, but changes in clothing have hindered the practical application of long-term person re-identification. Cloth-changing person re-identification (CC-... 详细信息
来源: 评论
A Short-Term Electric Load Forecasting Method Based on the Fusion of Global and Local Features  9
A Short-Term Electric Load Forecasting Method Based on the F...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Gu, Haozhan Tian, Hangwei Wang, Jingchun Li, Yumei Shandong University Of Arts Academy of Fine Arts China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
Accurate short-term electric load forecasting is crucial for ensuring the stability and efficiency of the power grid. This study proposes an innovative dual-branch electric load forecasting model that enhances the acc... 详细信息
来源: 评论