咨询与建议

限定检索结果

文献类型

  • 4,506 篇 会议
  • 3,387 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,901 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,299 篇 工学
    • 3,983 篇 计算机科学与技术...
    • 3,164 篇 软件工程
    • 1,348 篇 信息与通信工程
    • 653 篇 电气工程
    • 561 篇 控制科学与工程
    • 523 篇 电子科学与技术(可...
    • 449 篇 网络空间安全
    • 440 篇 生物工程
    • 301 篇 机械工程
    • 233 篇 光学工程
    • 224 篇 仪器科学与技术
    • 188 篇 生物医学工程(可授...
    • 165 篇 安全科学与工程
    • 151 篇 动力工程及工程热...
    • 148 篇 化学工程与技术
    • 127 篇 交通运输工程
    • 126 篇 建筑学
  • 2,310 篇 理学
    • 1,377 篇 数学
    • 504 篇 物理学
    • 479 篇 生物学
    • 428 篇 统计学(可授理学、...
    • 206 篇 系统科学
    • 166 篇 化学
  • 1,338 篇 管理学
    • 818 篇 管理科学与工程(可...
    • 576 篇 图书情报与档案管...
    • 297 篇 工商管理
  • 289 篇 法学
    • 168 篇 社会学
    • 119 篇 法学
  • 154 篇 医学
    • 127 篇 临床医学
  • 116 篇 经济学
    • 116 篇 应用经济学
  • 99 篇 军事学
  • 55 篇 农学
  • 46 篇 教育学
  • 24 篇 文学
  • 23 篇 艺术学

主题

  • 238 篇 feature extracti...
  • 229 篇 semantics
  • 216 篇 cryptography
  • 184 篇 authentication
  • 181 篇 information secu...
  • 163 篇 computational mo...
  • 158 篇 security
  • 152 篇 protocols
  • 144 篇 accuracy
  • 141 篇 deep learning
  • 138 篇 privacy
  • 122 篇 laboratories
  • 121 篇 training
  • 103 篇 data models
  • 100 篇 federated learni...
  • 99 篇 cloud computing
  • 94 篇 servers
  • 92 篇 public key crypt...
  • 92 篇 blockchain
  • 89 篇 data privacy

机构

  • 204 篇 shandong provinc...
  • 178 篇 key laboratory o...
  • 164 篇 school of comput...
  • 152 篇 state key labora...
  • 113 篇 school of comput...
  • 111 篇 school of cyber ...
  • 106 篇 department of co...
  • 98 篇 information secu...
  • 83 篇 key laboratory o...
  • 81 篇 institute of inf...
  • 69 篇 guangdong provin...
  • 68 篇 computer network...
  • 66 篇 university of ch...
  • 64 篇 college of mathe...
  • 64 篇 state grid key l...
  • 63 篇 peng cheng labor...
  • 60 篇 key laboratory o...
  • 59 篇 school of softwa...
  • 56 篇 school of comput...
  • 54 篇 key laboratory o...

作者

  • 55 篇 jianfeng ma
  • 53 篇 yang yang
  • 49 篇 ma jianfeng
  • 45 篇 yixian yang
  • 43 篇 ding yong
  • 41 篇 zheng wei-shi
  • 38 篇 huang qingming
  • 31 篇 cong runmin
  • 31 篇 wang wei
  • 31 篇 hu yupu
  • 31 篇 yang yixian
  • 30 篇 zhang huanguo
  • 30 篇 xu an wang
  • 29 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 26 篇 min-ling zhang
  • 24 篇 liu xin
  • 24 篇 xinhong hei
  • 24 篇 xie xiaohua

语言

  • 7,143 篇 英文
  • 499 篇 其他
  • 278 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Computer Network and Information Security"
7901 条 记 录,以下是381-390 订阅
排序:
Super-resolution reconstruction of single image for latent features
收藏 引用
Computational Visual Media 2024年 第6期10卷 1219-1239页
作者: Xin Wang Jing-Ke Yan Jing-Ye Cai Jian-Hua Deng Qin Qin Yao Cheng School of Information and Software Engineering University of Electronic Science and Technology of ChinaChengdu 610000 China State Key Laboratory of Rail Transit Vehicle System Southwest Jiaotong UniversityChengdu 610000China School of Marine Engineering Guilin University of Electronic TechnologyGuilin 541000China School of Computer and Information Security Guilin University of Electronic TechnologyGuilin 541000China
Single-image super-resolution(SISR)typically focuses on restoring various degraded low-resolution(LR)images to a single high-resolution(HR)***,during SISR tasks,it is often challenging for models to simultaneously mai... 详细信息
来源: 评论
FedFLD: Heterogeneous Federated Learning via Forget-Less Distillation
FedFLD: Heterogeneous Federated Learning via Forget-Less Dis...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Yi, Xiaoyang Zhang, Jian Chen, Jing Bao, Yuru Xing, Lingkai College of Cyber Science Nankai University China College of Computer Science Nankai University China Tianjin Key Laboratory of Network and Data Security Technology Tianjin China
Federated learning, as a distributed machine learning paradigm, enhances privacy protection but faces the challenge of heterogeneity. Data-free knowledge distillation (DFKD) methods attempt to overcome this challenge ... 详细信息
来源: 评论
Prediction of miRNA family based on class-incremental learning
Prediction of miRNA family based on class-incremental learni...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Liu, Yajun Qiu, Lulu Li, Aimin Fei, Rong Li, Junhuai Wu, Fang-Xiang Xi'an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China Division of Biomedical Engineering Department of Mechanical Engineering Department of Computer Science Saskatoon Canada
With the development of deep sequencing, recent studies indicate that a miRNA precursor can generate multiple miRNA isoforms (isomiRs). The family prediction of canonical miRNAs and isomiRs could provide a basis for m... 详细信息
来源: 评论
Research and Implementation of Electric Equipment Connectivity Data Analysis Model Based on Graph Database  1
收藏 引用
4th International Conference on 3D Imaging Technologies- Multidimensional Signal Processing and Deep Learning, 3D IT-MSP and DL 2022
作者: Qiao, Junfeng Peng, Lin Zhou, Aihua Zhu, Lipeng Yang, Pei Pan, Sen State Grid Key Laboratory of Information & Network Security State Grid Smart Grid Research Institute Co. Ltd Nanjing210014 China
Effective description of electric data resources is an important basis for electric data modeling. With the access of large-scale distributed new energy, electric allocation data resources are more complex and changea... 详细信息
来源: 评论
Design and implementation of cooperative multi-agent based on MAPPO  5
Design and implementation of cooperative multi-agent based o...
收藏 引用
5th International Conference on Telecommunications, Optics, and computer Science, TOCS 2024
作者: Wang, Haolong Fei, Rong Chen, Ruizhu School of Computer Science and Engineering Xi'an University of Technology Xi'an China Shannxi Key Laboratory for Network Computing and Security Technology Xi'an University of Technology Xi'an China
In the past few years, with the continuous development of deep reinforcement learning, the application of deep reinforcement has been set off within the realms of self-driving vehicle technology, game games, and natur... 详细信息
来源: 评论
Efficient Wildcard Searchable Symmetric Encryption with Forward and Backward security  1st
Efficient Wildcard Searchable Symmetric Encryption with For...
收藏 引用
1st International Conference on Artificial Intelligence security and Privacy, AIS and P 2023
作者: Zhang, Xi Su, Ye Wei, Zhongkai Shen, Wenting Qin, Jing College of Computer and Cyber Security Hebei Normal University Shijiazhuang050024 China Hebei Provincial Key Laboratory of Network and Information Security Hebei Normal University Shijiazhuang050024 China School of Information Science and Engineering Shandong Normal University Jinan250358 China School of Mathematics Shandong University Jinan250100 China College of Computer Science and Technology Qingdao University Qingdao266071 China
Wildcard Searchable Symmetric Encryption can achieve flexibility and pattern matching while protecting data privacy. There is a promising future for combining secure wildcard search with emerging technologies such as ... 详细信息
来源: 评论
Unmanned Aerial Vehicle Assisted Timely Data Collection in IoT networks with Faulty Sensors  16
Unmanned Aerial Vehicle Assisted Timely Data Collection in I...
收藏 引用
16th International Conference on Wireless Communications and Signal Processing, WCSP 2024
作者: Zhang, Dongliang Gong, Jie School of Computer Science and Engineering Sun Yat-sen University Guangzhou510006 China Guangdong Province Key Laboratory of Information Security Technology Guangzhou510006 China
Thanks to their low deployment costs and high flexibility, unmanned aerial vehicles (UAVs) have been widely applied for data collection in Internet of Things (IoT) networks. However, the unpredictable status updates f... 详细信息
来源: 评论
Analysis and improvement of verifiable blind quantum computation
收藏 引用
Chinese Physics B 2022年 第5期31卷 130-140页
作者: Min Xiao Yannan Zhang College of Computer Science and Technology Chongqing University of Posts and TelecommunicationsChongqing 400065China Chongqing Key Laboratory of Cyberspace and Information Security Chongqing University of Posts and TelecommunicationsChongqing 400065China
In blind quantum computation(BQC),a client with weak quantum computation capabilities is allowed to delegate its quantum computation tasks to a server with powerful quantum computation capabilities,and the inputs,algo... 详细信息
来源: 评论
Multi-View Graph Embedding Learning for Image Co-Segmentation and Co-Localization
收藏 引用
IEEE Transactions on Circuits and Systems for Video Technology 2024年 第6期34卷 4942-4956页
作者: Huang, Aiping Li, Lijian Zhang, Le Niu, Yuzhen Zhao, Tiesong Lin, Chia-Wen Fuzhou University Fujian Key Laboratory for Intelligent Processing and Wireless Transmission of Media Information College of Physics and Information Engineering Fuzhou350108 China Fuzhou University Fujian Key Laboratory of Network Computing and Intelligent Information Processing College of Computer and Data Science Fuzhou350108 China University of Electronic Science and Technology of China School of Information and Communication Engineering Chengdu611731 China Fuzhou University Fujian Key Laboratory for Intelligent Processing and Wireless Transmission of Media Information College of Physics and Information Engineering The Fujian Science and Technology Innovation Laboratory for Optoelectronic Information Fuzhou350108 China Institute of Communications Engineering National Tsing Hua University Department of Electrical Engineering Hsinchu30013 Taiwan
Image co-segmentation and co-localization exploit inter-image information to identify and extract foreground objects with a batch mode. However, they remain challenging when confronted with large object variations or ... 详细信息
来源: 评论
GA-Net: Gated Attention Mechanism Based Global Refinement network for Image Inpainting  29
GA-Net: Gated Attention Mechanism Based Global Refinement Ne...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Qiu, Ran Zhao, Shengrong Liang, Hu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
Underwater images are often affected by problems such as light attenuation, color distortion, noise and scattering, resulting in image defects. A novel image inpainting method is proposed to intelligently predict and ... 详细信息
来源: 评论