咨询与建议

限定检索结果

文献类型

  • 4,435 篇 会议
  • 3,397 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,840 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,280 篇 工学
    • 3,971 篇 计算机科学与技术...
    • 3,151 篇 软件工程
    • 1,357 篇 信息与通信工程
    • 695 篇 电气工程
    • 557 篇 控制科学与工程
    • 542 篇 电子科学与技术(可...
    • 455 篇 网络空间安全
    • 439 篇 生物工程
    • 303 篇 机械工程
    • 233 篇 光学工程
    • 224 篇 仪器科学与技术
    • 189 篇 生物医学工程(可授...
    • 168 篇 安全科学与工程
    • 148 篇 动力工程及工程热...
    • 145 篇 化学工程与技术
    • 133 篇 交通运输工程
    • 127 篇 建筑学
  • 2,305 篇 理学
    • 1,382 篇 数学
    • 506 篇 物理学
    • 475 篇 生物学
    • 430 篇 统计学(可授理学、...
    • 208 篇 系统科学
    • 165 篇 化学
  • 1,340 篇 管理学
    • 816 篇 管理科学与工程(可...
    • 584 篇 图书情报与档案管...
    • 290 篇 工商管理
  • 288 篇 法学
    • 167 篇 社会学
    • 119 篇 法学
  • 160 篇 医学
    • 130 篇 临床医学
    • 118 篇 基础医学(可授医学...
  • 117 篇 经济学
  • 98 篇 军事学
  • 54 篇 农学
  • 46 篇 教育学
  • 24 篇 文学
  • 22 篇 艺术学

主题

  • 239 篇 feature extracti...
  • 230 篇 semantics
  • 214 篇 cryptography
  • 182 篇 authentication
  • 181 篇 information secu...
  • 162 篇 computational mo...
  • 158 篇 security
  • 150 篇 protocols
  • 142 篇 accuracy
  • 140 篇 privacy
  • 139 篇 deep learning
  • 126 篇 training
  • 122 篇 laboratories
  • 106 篇 data models
  • 100 篇 federated learni...
  • 100 篇 cloud computing
  • 95 篇 servers
  • 93 篇 blockchain
  • 91 篇 public key crypt...
  • 88 篇 data privacy

机构

  • 203 篇 shandong provinc...
  • 174 篇 key laboratory o...
  • 158 篇 school of comput...
  • 155 篇 state key labora...
  • 114 篇 school of comput...
  • 106 篇 department of co...
  • 106 篇 school of cyber ...
  • 97 篇 information secu...
  • 80 篇 key laboratory o...
  • 79 篇 institute of inf...
  • 68 篇 guangdong provin...
  • 66 篇 computer network...
  • 65 篇 college of mathe...
  • 64 篇 university of ch...
  • 63 篇 state grid key l...
  • 62 篇 peng cheng labor...
  • 60 篇 key laboratory o...
  • 59 篇 school of softwa...
  • 59 篇 school of comput...
  • 55 篇 key laboratory o...

作者

  • 55 篇 jianfeng ma
  • 54 篇 yang yang
  • 50 篇 ma jianfeng
  • 45 篇 yixian yang
  • 41 篇 zheng wei-shi
  • 41 篇 ding yong
  • 38 篇 huang qingming
  • 33 篇 zhang huanguo
  • 32 篇 wang wei
  • 32 篇 hu yupu
  • 31 篇 cong runmin
  • 31 篇 xu an wang
  • 30 篇 yang yixian
  • 29 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 25 篇 xu li
  • 25 篇 xie xiaohua
  • 24 篇 xinhong hei
  • 23 篇 liu xin

语言

  • 7,214 篇 英文
  • 362 篇 其他
  • 277 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Computer Network and Information Security"
7840 条 记 录,以下是4981-4990 订阅
排序:
A Multi-label Classifier for Human Protein Subcellular Localization Based on LSTM networks
A Multi-label Classifier for Human Protein Subcellular Local...
收藏 引用
2018 International Conference on Advanced Control, Automation and Artificial Intelligence (ACAAI2018)
作者: Zhiying Gao Lijun Sun Zhihua Wei Department of Computer Science and Technology Tongji University Research Center of Big Data and Network Security Tongji University Key Laboratory of Embedded System and Service Computing Tongji University
Nowadays, with the increasing number of protein sequences all over the world, more and more people are paying their attention to predicting protein subcellular location. Since wet experiment is costly and time-consumi... 详细信息
来源: 评论
MemADet: A Representative Memory Bank Approach for Industrial Image Anomaly Detection
MemADet: A Representative Memory Bank Approach for Industria...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Min Li Jinghui He Zuobin Ying Gang Li Mingle Zhou Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Faculty of Data Science City University of Macau Macau China
In the field of industrial production, anomaly detection is crucial for ensuring product quality and maintaining production efficiency. With the continuous advancement of computer vision technology, it has shown treme... 详细信息
来源: 评论
Explore the Impact of Cellular Resource Allocation on Mobile UHD Video Streaming over 5G UDN
Explore the Impact of Cellular Resource Allocation on Mobile...
收藏 引用
IEEE Conference on Wireless Communications and networking
作者: Xinjing Yuan Lingjun Pu Xiaohang Xu Jingdong Xu Institute of Systems and Networks College of Computer Science Nankai University Tianjin China Tianjin Key Laboratory of Network and Data Security Technology Tianjin China State Key Laboratory of Integrated Services Networks (Xidian University) Xi’an China
The incoming 5G cellular network is stepping into a densification era, where various kinds of base stations are densely deployed to provide fruitful mobile services such as video streaming. In order to improve the per... 详细信息
来源: 评论
Fairness of Large Music Models: From a Culturally Diverse Perspective
Fairness of Large Music Models: From a Culturally Diverse Pe...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Qinyuan Wang Bruce Gu He Zhang Yunfeng Li School of Music University of Sydney NSW Australia Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China CNPIEC KEXIN Ltd Beijing China
This paper explores the fairness of large music models in generating culturally diverse musical compositions, emphasizing the need for inclusivity and equity in AI-generated music. By analyzing popular datasets such a... 详细信息
来源: 评论
Polarization attack on continuous-variable quantum key distribution
arXiv
收藏 引用
arXiv 2018年
作者: Zhao, Yijia Zhang, Yichen Huang, Yundi Xu, Bingjie Yu, Song Guo, Hong State Key Laboratory of Information Photonics and Optical Communications Beijing University of Posts and Telecommunications Beijing100876 China Science and Technology on Security Communication Laboratory Institute of Southwestern Communication Chengdu610041 China State Key Laboratory of Advanced Optical Communication System and Network School of Electronics Engineering and Computer Science Center for Quantum Information Technology Peking University Beijing100871 China
The shot-noise unit (SNU) is a crucial factor for the practical security of a continuous-variable quantum key distribution system. In the most widely used experimental scheme, the SNU should be calibrated first and ac... 详细信息
来源: 评论
Depthwise Separable Convolution Feature Learning for Ihomogeneous Rock Image Classification  4th
Depthwise Separable Convolution Feature Learning for Ihomoge...
收藏 引用
4th International Conference on Cognitive Systems and information Processing, ICCSIP 2018
作者: Zhu, Yueqin Bai, Lin Peng, Weihang Zhang, Xinyang Luo, Xiong Development and Research Center China Geological Survey Beijing100037 China Key Laboratory of Geological Information Technology Ministry of Natural Resources Beijing100037 China Geomathematics Key Laboratory of Sichuan Province Chengdu University of Technology Chengdu610059 China College of Geophysics Chengdu University of Technology Chengdu610059 China College of Management Science Chengdu University of Technology Chengdu610059 China College of Network Security Chengdu University of Technology Chengdu610059 China School of Computer and Communication Engineering University of Science and Technology Beijing Beijing100083 China
The issue of classifying rock images is one of most important problems in geological detection and analysis. In order to improve rock recognition performance, we use convolution neural network (CNN) based deep learnin... 详细信息
来源: 评论
A large family of prime-phase sequences with low correlation
A large family of prime-phase sequences with low correlation
收藏 引用
International Workshop on Signal Design and Its Applications in Communications (IWSDA)
作者: Ni-Gang Sun Chang-Lu Lin Key Laboratory of Network Security and Cryptology Fujian Normal University Fuzhou Fujian China Department of Computer Science and Engineering East China University of Science and Technology Shanghai China
A large family of p-phase highest coordinate sequences, where p is an odd prime, is constructed by using the highest coordinate of the generalized Kerdock codes over the ring Z pl , for l ges 3. Utilizing the local We... 详细信息
来源: 评论
Universal designated-verifier partially blind signatures for e-commerce
收藏 引用
International Journal of computers and Applications 2010年 第4期32卷 399-403页
作者: Cao, Tianjie Lin, Dongdai Xue, Rui School of Computer Science and Technology China University of Mining and Technology Xuzhou 221116 China State Key Laboratory of Information Security of Institute of Software Chinese Academy of Sciences Beijing 100080 China
Blind signature schemes can prevent the information of a signature and message pair from leaking to the signer. Partially blind signature is a signature of which the message containing some information agreed by the s... 详细信息
来源: 评论
Efficient and Effective Weakly-Supervised Action Segmentation via Action-Transition-Aware Boundary Alignment
arXiv
收藏 引用
arXiv 2024年
作者: Xu, Angchi Zheng, Wei-Shi School of Computer Science and Engineering Sun Yat-sen University China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China Guangdong Province Key Laboratory of Information Security Technology Guangzhou China
Weakly-supervised action segmentation is a task of learning to partition a long video into several action segments, where training videos are only accompanied by transcripts (ordered list of actions). Most of existing... 详细信息
来源: 评论
Efficient and Effective Weakly-Supervised Action Segmentation via Action-Transition-Aware Boundary Alignment
Efficient and Effective Weakly-Supervised Action Segmentatio...
收藏 引用
Conference on computer Vision and Pattern Recognition (CVPR)
作者: Angchi Xu Wei-Shi Zheng School of Computer Science and Engineering Sun Yat-sen University China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China Guangdong Province Key Laboratory of Information Security Technology Guangzhou China
Weakly-supervised action segmentation is a task of learning to partition a long video into several action segments, where training videos are only accompanied by transcripts (ordered list of actions). Most of existing... 详细信息
来源: 评论