咨询与建议

限定检索结果

文献类型

  • 4,506 篇 会议
  • 3,387 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,901 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,299 篇 工学
    • 3,983 篇 计算机科学与技术...
    • 3,164 篇 软件工程
    • 1,348 篇 信息与通信工程
    • 653 篇 电气工程
    • 561 篇 控制科学与工程
    • 523 篇 电子科学与技术(可...
    • 449 篇 网络空间安全
    • 440 篇 生物工程
    • 301 篇 机械工程
    • 233 篇 光学工程
    • 224 篇 仪器科学与技术
    • 188 篇 生物医学工程(可授...
    • 165 篇 安全科学与工程
    • 151 篇 动力工程及工程热...
    • 148 篇 化学工程与技术
    • 127 篇 交通运输工程
    • 126 篇 建筑学
  • 2,310 篇 理学
    • 1,377 篇 数学
    • 504 篇 物理学
    • 479 篇 生物学
    • 428 篇 统计学(可授理学、...
    • 206 篇 系统科学
    • 166 篇 化学
  • 1,338 篇 管理学
    • 818 篇 管理科学与工程(可...
    • 576 篇 图书情报与档案管...
    • 297 篇 工商管理
  • 289 篇 法学
    • 168 篇 社会学
    • 119 篇 法学
  • 154 篇 医学
    • 127 篇 临床医学
  • 116 篇 经济学
    • 116 篇 应用经济学
  • 99 篇 军事学
  • 55 篇 农学
  • 46 篇 教育学
  • 24 篇 文学
  • 23 篇 艺术学

主题

  • 238 篇 feature extracti...
  • 229 篇 semantics
  • 216 篇 cryptography
  • 184 篇 authentication
  • 181 篇 information secu...
  • 163 篇 computational mo...
  • 158 篇 security
  • 152 篇 protocols
  • 144 篇 accuracy
  • 141 篇 deep learning
  • 138 篇 privacy
  • 122 篇 laboratories
  • 121 篇 training
  • 103 篇 data models
  • 100 篇 federated learni...
  • 99 篇 cloud computing
  • 94 篇 servers
  • 92 篇 public key crypt...
  • 92 篇 blockchain
  • 89 篇 data privacy

机构

  • 204 篇 shandong provinc...
  • 178 篇 key laboratory o...
  • 164 篇 school of comput...
  • 152 篇 state key labora...
  • 113 篇 school of comput...
  • 111 篇 school of cyber ...
  • 106 篇 department of co...
  • 98 篇 information secu...
  • 83 篇 key laboratory o...
  • 81 篇 institute of inf...
  • 69 篇 guangdong provin...
  • 68 篇 computer network...
  • 66 篇 university of ch...
  • 64 篇 college of mathe...
  • 64 篇 state grid key l...
  • 63 篇 peng cheng labor...
  • 60 篇 key laboratory o...
  • 59 篇 school of softwa...
  • 56 篇 school of comput...
  • 54 篇 key laboratory o...

作者

  • 55 篇 jianfeng ma
  • 53 篇 yang yang
  • 49 篇 ma jianfeng
  • 45 篇 yixian yang
  • 43 篇 ding yong
  • 41 篇 zheng wei-shi
  • 38 篇 huang qingming
  • 31 篇 cong runmin
  • 31 篇 wang wei
  • 31 篇 hu yupu
  • 31 篇 yang yixian
  • 30 篇 zhang huanguo
  • 30 篇 xu an wang
  • 29 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 26 篇 min-ling zhang
  • 24 篇 liu xin
  • 24 篇 xinhong hei
  • 24 篇 xie xiaohua

语言

  • 7,143 篇 英文
  • 499 篇 其他
  • 278 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Computer Network and Information Security"
7901 条 记 录,以下是721-730 订阅
排序:
GAF-GAN: Gated Attention Feature Fusion Image Inpainting network Based on Generative Adversarial network  29
GAF-GAN: Gated Attention Feature Fusion Image Inpainting Net...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Qiu, Ran Liang, Hu Liu, Yuchen Zhao, Shengrong Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Qilu University of Technology Shandong Academy of Sciences Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
Image inpainting, which aims to reconstruct reasonably clear and realistic images from known pixel information, is one of the core problems in computer vision. However, due to the complexity and variability of the und... 详细信息
来源: 评论
ILP-Based Heuristics for the Multi-Modal Stable Matching Problem
收藏 引用
Tsinghua Science and Technology 2025年 第2期30卷 479-487页
作者: Yang Yang Rolf H.Möhring Junteng Song Yicheng Xu Yong Zhang Shenzhen Institute of Advanced Technology Chinese Academy of SciencesShenzhen 518055China University of Chinese Academy of Sciences Beijing 101408China School of Applied Mathematics and Computer Science Technische Universität BerlinBerlin 10623Germany School of Mathematics and Information Science Hebei UniversityBaoding 071002China Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic TechnologyGuilin 541004China
In this paper,we investigate the stable matching problem with multiple preferences in bipartite graphs,where each agent has various preference lists for all available partners with respect to different *** problem req... 详细信息
来源: 评论
A Multi-Channel Composite Recommendation Method in Federated Learning
A Multi-Channel Composite Recommendation Method in Federated...
收藏 引用
2023 IEEE International Conference on Dependable, Autonomic and Secure Computing, 2023 International Conference on Pervasive Intelligence and Computing, 2023 International Conference on Cloud and Big Data Computing, 2023 International Conference on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2023
作者: Chen, Shi Li, Qianmu Wang, Qi Zhao, Xinjian Ge, Hao Li, Nianzhe State Grid Jiangsu Information & Telecommunication Company Nanjing China School of Computer Science Ana Engineering Nanjing University of Science and Technology Nanjing China State Grid Smart Grid Research Institute Co. Ltd. State Grid Key Laboratory of Information & Network Security Nanjing China
There are various data security risks in power grid systems, and recommendation systems are a good solution to the selection of security strategies. Federated learning is a machine learning framework that can protect ... 详细信息
来源: 评论
An Approach to New Bearing Fault Diagnosis Utilizing Deep Transfer Learning
An Approach to New Bearing Fault Diagnosis Utilizing Deep Tr...
收藏 引用
Smart World Congress (SWC), IEEE
作者: HuiJuan Hao Yue Feng HongGe Zhao SiJian Zhu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China Jinan China
Bearings, serving as crucial components in mechanical equipment, exert a direct influence on the overall performance of the system. Deep transfer learning has garnered significant attention in the realm of intelligent... 详细信息
来源: 评论
FIMD: Fusion-Inspired Modality Distillation for Enhanced MRI Segmentation in Incomplete Multi-Modal Scenarios  24
FIMD: Fusion-Inspired Modality Distillation for Enhanced MRI...
收藏 引用
7th International Conference on Image and Graphics Processing, ICIGP 2024
作者: Yang, Rui Wang, Xiao Xu, Xin Hubei Province Key Laboratory of Intelligent Information Processing and Real-Time Industrial System Wuhan University of Science and Technology China School of Computer Science and Technology Wuhan University of Science and Technology China Hubei Provincial Key Laboratory of Multimedia and Network Communication Engineering Wuhan China
Magnetic Resonance Imaging (MRI) is an invaluable tool for brain tumor segmentation. However, in clinical practice, certain modalities might be unavailable, leading to potential performance degradation in prediction t... 详细信息
来源: 评论
Forward and Backward Private Searchable Encryption with Fine-grained Access Control  2
Forward and Backward Private Searchable Encryption with Fine...
收藏 引用
2nd International Conference on Cloud Computing, Big Data Application and Software Engineering, CBASE 2023
作者: Xu, Peiming Xu, Lingling Jin, Xiang Network Security Electric Power Research Institute CSG Guangdong Provincial Key Laboratory of Power System Guangzhou China South China University of Technology School of Computer Science and Engineering Guangzhou China
With the rapid development of cloud computing, more and more data are stored in the cloud server. However, due to the increasing demands for security and user privacy, sensitive data are expected to be stored in an en... 详细信息
来源: 评论
FLF-YOLO: an Efficient and Lightweight network for Small Target Detection in Aerial Photography  7
FLF-YOLO: an Efficient and Lightweight Network for Small Tar...
收藏 引用
7th International Conference on Advanced Algorithms and Control Engineering, ICAACE 2024
作者: Jia, Bin Ao, Naixiang Wang, Xinyi Zhao, Xueyi Xiong, Bingbing School Of Computer Science And Technology Xinjiang University Urumqi China China Academy Of Electronics And Information Technology Beijing China Lianhaichuangzhi Information Technology Co. Ltd. Key Laboratory Of Big Data Of Xinjiang Social Security Risk And Xinjiang Urumqi China
To address the issues related to the ineffective identification of small targets in aerial images and the absence of real-time detection, we propose a lightweight algorithm FLF-YOLO based on the improvement of ***, Fa... 详细信息
来源: 评论
Universal and General Quantum Simultaneous Secret Distribution with Dense Coding by Using One-Dimensional High-Level Cluster States
收藏 引用
Journal of computer Science & Technology 2021年 第1期36卷 221-230页
作者: Zhi-Hao Liu Han-Wu Chen School of Computer Science and Engineering Southeast UniversityNanjing 211189China Key Laboratory of Computer Network and Information Integration(Southeast University) Ministry of Education Nanjing 211189China
A universal and general quantum simultaneous secret distribution(QSSD)protocol is put forward based on the properties of the one-dimensional high-level cluster states,in which one sender dispatches different high-leve... 详细信息
来源: 评论
CL-TAP: An Efficient Certificateless Based Trusted Access Protocol for WLAN
收藏 引用
Chinese Journal of Electronics 2025年 第1期23卷 142-146页
作者: Zhuo Ma Fenghua Li Jianfeng Ma Wenjiang Ji School of Computer Science and Technology Xidian University Xi'an Shannxi China State Key Laboratory of Information Security Institute of Information Engineering CAS Beijing China
Based on the certificateless public key cryptography and the trusted computing technologies, a certificateless based trusted access protocol for WLAN (Wireless local area networks) is proposed. Such protocol realizes ... 详细信息
来源: 评论
A robust and automatic method for the recognition of speech category in online learning discourse
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2024年 第12期15卷 3913-3924页
作者: Jiang, Dazhi He, Zhihui Chen, Yifei Xu, Linyan Lin, Jiali Guangdong Provincial Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou510399 China Department of Computer Science Shantou University Shantou515063 China Department of Management Economics and Industrial Engineering Politecnico di Milano MI Milan20156 Italy School of Business Shantou University Shantou515063 China
It is a rapid and irresistible developing trend that the traditional classroom learning mode is transformed into an online learning mode. In the online learning process, it is important to achieve effective voice sepa... 详细信息
来源: 评论