咨询与建议

限定检索结果

文献类型

  • 4,506 篇 会议
  • 3,387 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,901 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,299 篇 工学
    • 3,983 篇 计算机科学与技术...
    • 3,164 篇 软件工程
    • 1,348 篇 信息与通信工程
    • 653 篇 电气工程
    • 561 篇 控制科学与工程
    • 523 篇 电子科学与技术(可...
    • 449 篇 网络空间安全
    • 440 篇 生物工程
    • 301 篇 机械工程
    • 233 篇 光学工程
    • 224 篇 仪器科学与技术
    • 188 篇 生物医学工程(可授...
    • 165 篇 安全科学与工程
    • 151 篇 动力工程及工程热...
    • 148 篇 化学工程与技术
    • 127 篇 交通运输工程
    • 126 篇 建筑学
  • 2,310 篇 理学
    • 1,377 篇 数学
    • 504 篇 物理学
    • 479 篇 生物学
    • 428 篇 统计学(可授理学、...
    • 206 篇 系统科学
    • 166 篇 化学
  • 1,338 篇 管理学
    • 818 篇 管理科学与工程(可...
    • 576 篇 图书情报与档案管...
    • 297 篇 工商管理
  • 289 篇 法学
    • 168 篇 社会学
    • 119 篇 法学
  • 154 篇 医学
    • 127 篇 临床医学
  • 116 篇 经济学
    • 116 篇 应用经济学
  • 99 篇 军事学
  • 55 篇 农学
  • 46 篇 教育学
  • 24 篇 文学
  • 23 篇 艺术学

主题

  • 238 篇 feature extracti...
  • 229 篇 semantics
  • 216 篇 cryptography
  • 184 篇 authentication
  • 181 篇 information secu...
  • 163 篇 computational mo...
  • 158 篇 security
  • 152 篇 protocols
  • 144 篇 accuracy
  • 141 篇 deep learning
  • 138 篇 privacy
  • 122 篇 laboratories
  • 121 篇 training
  • 103 篇 data models
  • 100 篇 federated learni...
  • 99 篇 cloud computing
  • 94 篇 servers
  • 92 篇 public key crypt...
  • 92 篇 blockchain
  • 89 篇 data privacy

机构

  • 204 篇 shandong provinc...
  • 178 篇 key laboratory o...
  • 164 篇 school of comput...
  • 152 篇 state key labora...
  • 113 篇 school of comput...
  • 111 篇 school of cyber ...
  • 106 篇 department of co...
  • 98 篇 information secu...
  • 83 篇 key laboratory o...
  • 81 篇 institute of inf...
  • 69 篇 guangdong provin...
  • 68 篇 computer network...
  • 66 篇 university of ch...
  • 64 篇 college of mathe...
  • 64 篇 state grid key l...
  • 63 篇 peng cheng labor...
  • 60 篇 key laboratory o...
  • 59 篇 school of softwa...
  • 56 篇 school of comput...
  • 54 篇 key laboratory o...

作者

  • 55 篇 jianfeng ma
  • 53 篇 yang yang
  • 49 篇 ma jianfeng
  • 45 篇 yixian yang
  • 43 篇 ding yong
  • 41 篇 zheng wei-shi
  • 38 篇 huang qingming
  • 31 篇 cong runmin
  • 31 篇 wang wei
  • 31 篇 hu yupu
  • 31 篇 yang yixian
  • 30 篇 zhang huanguo
  • 30 篇 xu an wang
  • 29 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 26 篇 min-ling zhang
  • 24 篇 liu xin
  • 24 篇 xinhong hei
  • 24 篇 xie xiaohua

语言

  • 7,143 篇 英文
  • 499 篇 其他
  • 278 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Computer Network and Information Security"
7901 条 记 录,以下是621-630 订阅
排序:
Knowledge-based recommendation with contrastive learning
收藏 引用
High-Confidence Computing 2023年 第4期3卷 41-46页
作者: Yang He Xu Zheng Rui Xu Ling Tian School of Computer Science and Engineering University of Electronic Science and Technology of ChinaChengdu 611731China Kash Institute of Electronics and Information Industry Kashgar 844199China China Electronic Technology Cyber Security Co. Ltd.Chengdu 610041China Cyberspace Security Key Laboratory of Sichuan Province Chengdu 610041China
Knowledge Graphs(KGs)have been incorporated as external information into recommendation systems to ensure the high-confidence ***,Contrastive Learning(CL)framework has been widely used in knowledge-based recommendatio... 详细信息
来源: 评论
A Cloud Computing User Experience Focused Load Balancing Method Based on Modified CMA-ES Algorithm  18th
A Cloud Computing User Experience Focused Load Balancing Met...
收藏 引用
18th International Conference on Green, Pervasive, and Cloud Computing, GPC 2023
作者: Luo, Jihai Dong, Chen Chen, Zhenyi Xu, Li Chen, Tianci College of Computer and Data Science - Fuzhou University Xueyuan Road Fujian Fuzhou360108 China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou China Department of Computer Science and Engineering University of South Florida TampaFL33620 United States College of Computer and Cyber Security Fujian Normal University Fuzhou350007 China
The development of the software and hardware has brought about the abundance and overflow of computing resources. Many Internet companies can lease idle computing resources based on the peak and valley cycles of usage... 详细信息
来源: 评论
Short-Term Smart Grid Load Forecasting Based on CNN-BiLSTM with Attention Mechanism  6
Short-Term Smart Grid Load Forecasting Based on CNN-BiLSTM w...
收藏 引用
6th International Conference on Energy, Power and Grid, ICEPG 2024
作者: Sun, Feihu Zhong, Yanru Guilin University of Electronic Technology School of Computer Science and Information Security Guangxi Guilin China Guilin University of Electronic Technology Guangxi Key Laboratory of Image and Graphic Intelligent Processing Guangxi Guilin China
The existing power load data exhibits complex multidimensionality, while existing techniques often focus on learning and forecasting from single load data. To fully exploit the complex multidimensionality of the exist... 详细信息
来源: 评论
Vulnerability Detection Based on Pre-trained Code Language Model and Convolutional Neural network  36
Vulnerability Detection Based on Pre-trained Code Language M...
收藏 引用
36th International Conference on Software Engineering and Knowledge Engineering, SEKE 2024
作者: Liao, Tingfeng Lu, Lu Liang, Zhihong Suo, Siliang School of Computer Science and Engineering South China University of Technology Guangzhou China Pazhou Laboratory Guangzhou China Pengcheng Laboratory Shenzhen China Electric Power Research Institute CSG Guangzhou China Guangdong Provincial Key Laboratory of Power System Network Security Guangzhou China
Software vulnerabilities damage the reliability of software systems. Recently, many methods based on deep learning have been proposed for vulnerability detection by learning features from code sequences or various pro... 详细信息
来源: 评论
A Lightweight PUF-Based Group Authentication Scheme for Privacy-Preserving Metering Data Collection in Smart Grid  19th
A Lightweight PUF-Based Group Authentication Scheme for Pri...
收藏 引用
19th EAI International Conference on Collaborative Computing: networking, Applications and Worksharing, CollaborateCom 2023
作者: Cao, Ya-Nan Wang, Yujue Ding, Yong Guo, Zhenwei Yang, Changsong Liang, Hai Guangdong University of Science and Technology Dongguan China Hangzhou Innovation Institute of Beihang University Hangzhou China Guangxi Key Laboratory of Cryptography and Information Security School of Computer Science and Information Security Guilin University of Electronic Technology Guilin China Institute of Cyberspace Technology HKCT Institute for Higher Education Hong Kong
With the development of information and communication technologies, the services provided by smart grid attract more users to join smart grid. However, with the explosive growth of the number of smart meters, the tran... 详细信息
来源: 评论
Real-time arbitrarily-shaped scene text spotting with weakly supervised points
Real-time arbitrarily-shaped scene text spotting with weakly...
收藏 引用
2023 International Conference on computer Graphics, Artificial Intelligence, and Data Processing, ICCAID 2023
作者: Zhao, Longyang Zhang, Shuhao Xu, Zhi School of Computer Science and Information Security Guilin University of Electronics Technology No.1 Jinji road Guilin541004 China Guangxi Key Laboratory of Image and Graphic Intelligent Processing Guilin541004 China
Recently, there has been widespread interest in arbitrary-shaped scene text spotting, showing notable progress in both speed and accuracy. However, common issues such as model complexity, slow inference speed, and cha... 详细信息
来源: 评论
HiCoCS: High Concurrency Cross-Sharding on Permissioned Blockchains
收藏 引用
IEEE Transactions on computers 2025年 第07期74卷 2168-2182页
作者: Yang, Lingxiao Dong, Xuewen Wan, Zhiguo Lu, Di Zhang, Yushu Shen, Yulong Xidian University School of Computer Science and Technology China Ministry of Education Engineering Research Center of Blockchain Technology Application and Evaluation China Shaanxi Key Laboratory of Blockchain and Secure Computing Xi’an710071 China Zhejiang Lab Zhejiang Hangzhou311121 China Shaanxi Key Laboratory of Network and System Security Xi’an710071 China Jiangxi University of Finance and Economics School of Computing Nanchang330013 China Jiangxi University of Finance and Economics Nanchang330013 China
As the foundation of the Web3 trust system, blockchain technology faces increasing demands for scalability. Sharding emerges as a promising solution, but it struggles to handle highly concurrent cross-shard transactio... 详细信息
来源: 评论
IoT-Assisted Blockchain-Based Car Rental System Supporting Traceability  28th
IoT-Assisted Blockchain-Based Car Rental System Supporting T...
收藏 引用
28th International Conference on Database Systems for Advanced Applications, DASFAA 2023
作者: Chen, Lipan Wang, Yujue Ding, Yong Liang, Hai Yang, Changsong Wang, Huiyong Guangxi Key Laboratory of Cryptography and Information Security School of Computer Science and Information Security Guilin University of Electronic Technology Guilin China Hangzhou Innovation Institute Beihang University Hangzhou China Cyberspace Security Research Center Pengcheng Laboratory Shenzhen China School of Mathematics and Computing Science Guilin University of Electronic Technology Guilin China
The majority of existing car rental systems rely on a centralized database to manage the data. Although these centralized architectures could make the system design and operation costs are reduced, there are many secu... 详细信息
来源: 评论
information spreading in mobile social networks: Identifying the influential nodes using FPSO algorithm  10
Information spreading in mobile social networks: Identifying...
收藏 引用
10th International Conference on information Technology: IoT and Smart City, ICIT 2022
作者: Zhang, Xinxin Xu, Li Xu, Zhenyu Sun, Hung-Min Lee, Chia-Wei College of Computer and Cyber Security Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Normal University Fuzhou China The Department of Computer Science National Tsing Hua University Hsinchu Taiwan Department of Computer Science and Information Engineering National Taitung University Taiwan
The most influential nodes are capable of generating maximum influence and widest information spread to their connected nodes in mobile social networks. Hence identifying high influential users plays an important role... 详细信息
来源: 评论
Generalization Analysis for Label-Specific Representation Learning  38
Generalization Analysis for Label-Specific Representation Le...
收藏 引用
38th Conference on Neural information Processing Systems, NeurIPS 2024
作者: Zhang, Yi-Fan Zhang, Min-Ling School of Cyber Science and Engineering Southeast University Nanjing210096 China School of Computer Science and Engineering Southeast University Nanjing210096 China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education China
Label-specific representation learning (LSRL), i.e., constructing the representation with specific discriminative properties for each class label, is an effective strategy to improve the performance of multi-label lea...
来源: 评论