咨询与建议

限定检索结果

文献类型

  • 4,511 篇 会议
  • 3,407 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,926 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,322 篇 工学
    • 4,005 篇 计算机科学与技术...
    • 3,158 篇 软件工程
    • 1,357 篇 信息与通信工程
    • 658 篇 电气工程
    • 588 篇 控制科学与工程
    • 531 篇 电子科学与技术(可...
    • 452 篇 网络空间安全
    • 440 篇 生物工程
    • 301 篇 机械工程
    • 233 篇 光学工程
    • 224 篇 仪器科学与技术
    • 188 篇 生物医学工程(可授...
    • 165 篇 安全科学与工程
    • 153 篇 动力工程及工程热...
    • 147 篇 化学工程与技术
    • 129 篇 建筑学
    • 127 篇 交通运输工程
  • 2,306 篇 理学
    • 1,374 篇 数学
    • 504 篇 物理学
    • 478 篇 生物学
    • 425 篇 统计学(可授理学、...
    • 207 篇 系统科学
    • 167 篇 化学
  • 1,340 篇 管理学
    • 818 篇 管理科学与工程(可...
    • 579 篇 图书情报与档案管...
    • 295 篇 工商管理
  • 287 篇 法学
    • 167 篇 社会学
    • 118 篇 法学
  • 156 篇 医学
    • 128 篇 临床医学
  • 116 篇 经济学
    • 116 篇 应用经济学
  • 99 篇 军事学
  • 54 篇 农学
  • 44 篇 教育学
  • 24 篇 文学
  • 23 篇 艺术学

主题

  • 238 篇 feature extracti...
  • 229 篇 semantics
  • 214 篇 cryptography
  • 184 篇 authentication
  • 181 篇 information secu...
  • 163 篇 computational mo...
  • 160 篇 security
  • 151 篇 protocols
  • 144 篇 deep learning
  • 144 篇 accuracy
  • 139 篇 privacy
  • 122 篇 laboratories
  • 122 篇 training
  • 103 篇 data models
  • 102 篇 federated learni...
  • 99 篇 cloud computing
  • 94 篇 servers
  • 92 篇 public key crypt...
  • 92 篇 blockchain
  • 89 篇 data privacy

机构

  • 204 篇 shandong provinc...
  • 179 篇 key laboratory o...
  • 166 篇 school of comput...
  • 151 篇 state key labora...
  • 112 篇 school of comput...
  • 111 篇 school of cyber ...
  • 106 篇 department of co...
  • 98 篇 information secu...
  • 84 篇 key laboratory o...
  • 81 篇 institute of inf...
  • 67 篇 computer network...
  • 67 篇 guangdong provin...
  • 66 篇 university of ch...
  • 64 篇 college of mathe...
  • 64 篇 state grid key l...
  • 63 篇 peng cheng labor...
  • 60 篇 key laboratory o...
  • 59 篇 school of softwa...
  • 57 篇 school of comput...
  • 56 篇 key laboratory o...

作者

  • 55 篇 jianfeng ma
  • 53 篇 yang yang
  • 49 篇 ma jianfeng
  • 45 篇 yixian yang
  • 43 篇 ding yong
  • 41 篇 zheng wei-shi
  • 38 篇 huang qingming
  • 31 篇 cong runmin
  • 31 篇 wang wei
  • 31 篇 zhang huanguo
  • 31 篇 hu yupu
  • 30 篇 xu an wang
  • 30 篇 yang yixian
  • 29 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 27 篇 min-ling zhang
  • 25 篇 xie xiaohua
  • 24 篇 liu xin
  • 23 篇 wang yujue

语言

  • 7,128 篇 英文
  • 536 篇 其他
  • 282 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Computer Network and Information Security"
7926 条 记 录,以下是391-400 订阅
排序:
STGAT: A Spatio-Temporal Graph Attention network for Travel Demand Prediction
STGAT: A Spatio-Temporal Graph Attention Network for Travel ...
收藏 引用
2023 International Conference on networking and network Applications, NaNA 2023
作者: Zhang, Tao Yi Wang, YuBo Wei, ZhiCheng Key Lab of Network and Information Security China College of Computer and Cyberspace Security China Hebei Provincial Engineering Research Center for Supply Chain Big Data Analytics & Security Hebei Normal University Hebei Province Shijiazhuang China
Forecasting travel demand is a challenging task due to the complex spatial dependencies and dynamic temporal correlation of the traffic data. Furthermore, a limited representation of the given spatial graph structure ... 详细信息
来源: 评论
Advancing MobileNet security: Weighted Adversarial Learning in Convolutional Neural networks  11
Advancing MobileNet Security: Weighted Adversarial Learning ...
收藏 引用
11th International Conference on Machine Intelligence Theory and Applications, MiTA 2024
作者: Quadri, Hakeem Gu, Bruce Wang, Hua Islam, Sardar Victoria University Department of Information Technology Melbourne Australia Qilu University of Technology Key Laboratory of Computing Power Network and Information Security Jinan China Victoria University Institute for sustainable Industries and Liveable Cities Melbourne Australia
Convolutional Neural networks (CNN), particularly low latency models such as MobileNets have excelled in many applications, including object detection in images, speech recognition and natural language processing, but... 详细信息
来源: 评论
Mal-lightDet: A light method to detect malicious encrypted traffic based on machine learning  23
Mal-lightDet: A light method to detect malicious encrypted t...
收藏 引用
2023 4th International Conference on Control, Robotics and Intelligent System, CCRIS 2023
作者: Liu, Xu Liu, Zhang Zhao, Xiaojing Ren, Zhengwei School of Computer Science and Technology Changchun University of Science and Technology China Jilin Province Key Laboratory of Network and Information Security China School of Artificial Intelligence Changchun University of Science and Technology Changchun China
Encryption not only protects the network security and privacy, but also encrypts attackers' malicious traffic to evade detection. Thus, how to detect malicious encrypted traffic is critical for network security. F... 详细信息
来源: 评论
Ultra-high definition video quality assessment method based on deep learning  9
Ultra-high definition video quality assessment method based ...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Li, Wei He, Can Zhou, MingLe Zhang, HengYu Liu, WenLong Hisense Video Technology Co. Ltd. Qing Dao China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
With the development of display technology, people's demand for high-definition video is increasing, and the requirements for video quality are also increasing. Nowadays, a large number of videos have emerged, and... 详细信息
来源: 评论
Discourse Relation-Aware Multi-turn Dialogue Response Generation  12th
Discourse Relation-Aware Multi-turn Dialogue Response Genera...
收藏 引用
12th National CCF Conference on Natural Language Processing and Chinese Computing, NLPCC 2023
作者: Wang, Huijie He, Ruifang Jia, Yungang Xu, Jing Wang, Bo College of Intelligence and Computing Tianjin University Tianjin China Tianjin Key Laboratory of Cognitive Computing and Application Tianjin China Tianjin Branch of National Computer Network and Information Security Management Center Tianjin China
Multi-turn dialogue response generation aims to generate a response with consideration of the context. It is not equal to multiple single-turn dialogues due to the context dependence of response. Many existing models ... 详细信息
来源: 评论
Convertible certificateless proxy re-signcryption for data access control in cloud computing
Convertible certificateless proxy re-signcryption for data a...
收藏 引用
2023 International Conference on computer Application and information security, ICCAIS 2023
作者: Wu, Chenhuang Yang, Linghui Yuan, Beibei Li, Huimin Huang, Hui Fujian Key Laboratory of Financial Information Processing Putian University Fujian Putian351100 China Fujian Zhongxin Network Security Information Technology Co. Ltd. Fujian Fuzhou350011 China School of Computer Science Minnan Normal University Fujian Zhangzhou363000 China
Cloud storage service enables users not only to save their local data storage costs but also to access their outsourced data at any time and anywhere. Traditionally, a data owner outsources the encrypted data to the c... 详细信息
来源: 评论
Open-vocabulary 3D Semantic Understanding via Affinity Neural Radiance Fields  6
Open-vocabulary 3D Semantic Understanding via Affinity Neura...
收藏 引用
6th International Conference on Next Generation Data-Driven networks, NGDN 2024
作者: Fan, Yujie Luo, Huan Computer and Data Science Fuzhou University Fuzhou China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou China
Three-dimensional semantic understanding using only several multi-view images can largely reduce the communication burden on the network. In addition, while point clouds are extensively studied for 3D scene understand... 详细信息
来源: 评论
Multi-instance partial-label learning: towards exploiting dual inexact supervision
收藏 引用
Science China(information Sciences) 2024年 第3期67卷 48-61页
作者: Wei TANG Weijia ZHANG Min-Ling ZHANG School of Computer Science and Engineering Southeast University Key Laboratory of Computer Network and Information Integration (Southeast University) Ministry of Education School of Information and Physical Sciences The University of Newcastle
Weakly supervised machine learning algorithms are able to learn from ambiguous samples or labels, e.g., multi-instance learning or partial-label learning. However, in some real-world tasks, each training sample is ass... 详细信息
来源: 评论
TMOVF: A Task-Agnostic Model Ownership Verification Framework
TMOVF: A Task-Agnostic Model Ownership Verification Framewor...
收藏 引用
2023 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2023
作者: Sun, Zhe Huang, Zhongyu Zhao, Wangqi Zhang, Yu Zhang, Jianzhong College of Cyber Science College of Computer Science Nankai University Tianjin China Tianjin Key Laboratory of Network and Data Security Technology Tianjin China
The protection of model intellectual property is becoming an increasingly important issue. However, the existing methods for protecting model ownership, although effective, have limitations. Firstly, they primarily fo...
来源: 评论
Text information Mining in Cyberspace: An information Extraction Method Based on T5 and keyBERT  9
Text Information Mining in Cyberspace: An Information Extrac...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Liu, Kuan Li, Yumei Qi, Yuanhua Qi, Ning Zhai, Mengran Qilu University of Technology Shandong Academy of Sciences Information Research Institute Shandong Academy of Sciences Jinan China Qilu University of Technology Shandong Academy of Sciences Shandong Institute of Economy and Informatization Development Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Qilu University of Technology Shandong Academy of Sciences Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China SHANDONG SCICOM Information and Economy Research Institute Co. Ltd Jinan China Shandong Institute of Economy and Informatization Development Jinan China
With the development of the digital economy and the advent of the big data era, the rapid growth of textual information in cyberspace has placed higher demands on information processing technology. This paper proposes... 详细信息
来源: 评论