咨询与建议

限定检索结果

文献类型

  • 4,554 篇 会议
  • 3,369 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,931 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,258 篇 工学
    • 3,946 篇 计算机科学与技术...
    • 3,125 篇 软件工程
    • 1,325 篇 信息与通信工程
    • 641 篇 电气工程
    • 556 篇 控制科学与工程
    • 522 篇 电子科学与技术(可...
    • 445 篇 网络空间安全
    • 440 篇 生物工程
    • 301 篇 机械工程
    • 226 篇 光学工程
    • 225 篇 仪器科学与技术
    • 187 篇 生物医学工程(可授...
    • 165 篇 安全科学与工程
    • 151 篇 动力工程及工程热...
    • 147 篇 化学工程与技术
    • 126 篇 交通运输工程
    • 125 篇 建筑学
  • 2,286 篇 理学
    • 1,359 篇 数学
    • 504 篇 物理学
    • 477 篇 生物学
    • 418 篇 统计学(可授理学、...
    • 205 篇 系统科学
    • 166 篇 化学
  • 1,324 篇 管理学
    • 810 篇 管理科学与工程(可...
    • 567 篇 图书情报与档案管...
    • 294 篇 工商管理
  • 286 篇 法学
    • 169 篇 社会学
    • 115 篇 法学
  • 151 篇 医学
    • 125 篇 临床医学
  • 115 篇 经济学
    • 115 篇 应用经济学
  • 98 篇 军事学
  • 55 篇 农学
  • 46 篇 教育学
  • 24 篇 文学
  • 23 篇 艺术学

主题

  • 255 篇 feature extracti...
  • 233 篇 semantics
  • 212 篇 cryptography
  • 187 篇 authentication
  • 180 篇 information secu...
  • 177 篇 computational mo...
  • 166 篇 accuracy
  • 164 篇 security
  • 155 篇 protocols
  • 141 篇 deep learning
  • 141 篇 privacy
  • 133 篇 training
  • 126 篇 federated learni...
  • 122 篇 laboratories
  • 109 篇 data models
  • 101 篇 cloud computing
  • 98 篇 servers
  • 93 篇 data privacy
  • 93 篇 blockchain
  • 91 篇 public key crypt...

机构

  • 215 篇 key laboratory o...
  • 207 篇 shandong provinc...
  • 160 篇 school of comput...
  • 152 篇 state key labora...
  • 116 篇 school of cyber ...
  • 116 篇 school of comput...
  • 106 篇 department of co...
  • 99 篇 information secu...
  • 85 篇 key laboratory o...
  • 83 篇 institute of inf...
  • 71 篇 guangdong provin...
  • 67 篇 computer network...
  • 67 篇 university of ch...
  • 64 篇 college of mathe...
  • 64 篇 peng cheng labor...
  • 63 篇 state grid key l...
  • 60 篇 school of softwa...
  • 58 篇 school of comput...
  • 56 篇 shandong provinc...
  • 54 篇 key laboratory o...

作者

  • 56 篇 jianfeng ma
  • 53 篇 yang yang
  • 45 篇 ma jianfeng
  • 45 篇 yixian yang
  • 42 篇 ding yong
  • 41 篇 zheng wei-shi
  • 39 篇 huang qingming
  • 31 篇 cong runmin
  • 31 篇 wang wei
  • 31 篇 xu an wang
  • 31 篇 hu yupu
  • 31 篇 yang yixian
  • 30 篇 zhang huanguo
  • 28 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 27 篇 xiaoming wu
  • 26 篇 min-ling zhang
  • 24 篇 liu xin
  • 24 篇 xinhong hei

语言

  • 6,839 篇 英文
  • 863 篇 其他
  • 257 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Computer Network and Information Security"
7931 条 记 录,以下是871-880 订阅
排序:
Inaccurate Label Distribution Learning with Dependency Noise
arXiv
收藏 引用
arXiv 2024年
作者: Kou, Zhiqiang Wang, Jing Jia, Yuheng Geng, Xin MOE Key Laboratory of Computer Network and Information Integration School of Computer Science and Engineering Southeast University Nanjing China
In this paper, we introduce the Dependent Noise-based Inaccurate Label Distribution Learning (DN-ILDL) framework to tackle the challenges posed by noise in label distribution learning, which arise from dependencies on... 详细信息
来源: 评论
Critical (P5, dart) -Free Graphs  16th
Critical (P5, dart) -Free Graphs
收藏 引用
16th Annual International Conference on Combinatorial Optimization and Applications, COCOA 2023
作者: Xia, Wen Jooken, Jorik Goedgebeur, Jan Huang, Shenwei College of Computer Science Nankai University Tianjin300071 China Tianjin Key Laboratory of Network and Data Security Technology Nankai University Tianjin300071 China Department of Computer Science KU Leuven Campus Kulak-Kortrijk Kortrijk8500 Belgium Department of Applied Mathematics Computer Science and Statistics Ghent University Ghent9000 Belgium
Given two graphs H1 and H2, a graph is (H1, H2) -free if it contains no induced subgraph isomorphic to H1 nor H2. A dart is the graph obtained from a diamond by adding a new vertex and making it adjacent to exactly on... 详细信息
来源: 评论
Microservices Crowdsourcing Platform for Industrial Control Systems  6
Microservices Crowdsourcing Platform for Industrial Control ...
收藏 引用
6th International Conference on Next Generation Data-Driven networks, NGDN 2024
作者: Wang, Han Peng, Xinyong Zhang, Haifeng Su, Jie Wang, Huiyong Li, Chunhai Guilin University of Electronic Technology College of Computer and Information Security Guilin China Guangxi Zhuang Autonomous Region Information Center Guangxi Key Laboratory of Digital Infrastructure Guilin China Guangxi Liugang Dongxin Technology Co. Ltd Guilin China Guilin University of Electronic Technology College of Information and Communication Guilin China
With the wide application of microservice architecture in industrial control systems, more and more security problems arise, such as unauthorized access and data leakage. For the generation of these problems, industri... 详细信息
来源: 评论
Fast CU Partition for VVC Using Texture Complexity Classification Convolutional Neural network
收藏 引用
computers, Materials & Continua 2022年 第11期73卷 3545-3556页
作者: Yue Zhang Pengyu Liu Xiaowei Jia Shanji Chen Tianyu Liu Chang Liu The Information Department Beijing University of TechnologyBeijing100124China School of Physics and Electronic Information Engineering Qinghai Minzu UniversityXining810000China Advanced Information Network Beijing Laboratory Beijing100124China Computational Intelligence and Intelligent Systems Beijing Key Laboratory Beijing100124China Department of Computer Science University of PittsburghPittsburgh15260USA
Versatile video coding(H.266/VVC),which was newly released by the Joint Video Exploration Team(JVET),introduces quad-tree plus multitype tree(QTMT)partition structure on the basis of quad-tree(QT)partition structure i... 详细信息
来源: 评论
Object-Attribute-Relation Representation Based Video Semantic Communication
收藏 引用
IEEE Journal on Selected Areas in Communications 2025年 第7期43卷 2446-2461页
作者: Du, Qiyuan Duan, Yiping Yang, Qianqian Tao, Xiaoming Debbah, Merouane Tsinghua University Department of Electronic Engineering Beijing China Beijing China State Key Laboratory of Space Network and Communications Beijing China Zhejiang University College of Information Science and Electronic Engineering Hangzhou China Xinjiang University School of Computer Science and Technology Xinjiang China Khalifa University KU6G Research Center Department of Computer and Information Engineering Abu Dhabi127788 United Arab Emirates University Paris-Saclay CentraleSupelec Gif-sur-Yvette91192 France
With the rapid growth of multimedia data volume, there is an increasing need for efficient video transmission in applications such as virtual reality and future video streaming services. Semantic communication is emer... 详细信息
来源: 评论
Correlation Power Analysis for SM4 based on EEMD, Permutation Entropy and Singular Spectrum Analysis  5
Correlation Power Analysis for SM4 based on EEMD, Permutatio...
收藏 引用
5th IEEE Advanced information Technology, Electronic and Automation Control Conference, IAEAC 2021
作者: Xia, Xuan Chen, Bowei Zhong, Weidong Wu, Liqiang University of Pap Key Laboratory of Network and Information Security under Engineering Xi'an China
Signal-to-noise ratio of the power consumption curves collected during encryption has a greater impact on the bits of Secret key cracked and the efficiency of later analysis. Wavelet threshold noise reduction's pa... 详细信息
来源: 评论
Trellis-Based Construction of Polar Codes for SCL Decoding
Trellis-Based Construction of Polar Codes for SCL Decoding
收藏 引用
IEEE International Symposium on information Theory
作者: Xinyuanmeng Yao Xiangping Zheng Xiao Ma Guangdong Key Laboratory of Information Security Technology School of Computer Science and Engineering Sun Yat-sen University Guangzhou China School of Computer Science and Engineering Sun Yat-sen University Guangdong Key Laboratory of Information Security Technology Guangzhou China
In this paper, we propose an approach to construction of polar codes for successive cancellation list (SCL) decoding with a preset list size. For a given code length, we construct a trellis through which a path corres... 详细信息
来源: 评论
FDSC-YOLOv8:Advancements in Automated Crack Identification for Enhanced Safety in Underground Engineering
收藏 引用
computer Modeling in Engineering & Sciences 2024年 第9期140卷 3035-3049页
作者: Rui Wang Zhihui Liu Hongdi Liu Baozhong Su Chuanyi Ma Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science Center(National Supercomputer Center in Jinan)Qilu University of Technology(Shandong Academy of Sciences)Jinan250353China School of Qilu Transportation Shandong UniversityJinan250100China Geotechnical and Structural Engineering Center Shandong UniversityJinan250061China Shandong Lairong High-Speed Railway Co. Ltd.Weihai264200China Shandong High-Speed Group Co. Ltd.Jinan250014China
In underground engineering,the detection of structural cracks on tunnel surfaces stands as a pivotal task in ensuring the health and reliability of tunnel ***,the dim and dusty environment inherent to under-ground eng... 详细信息
来源: 评论
LAGNet: A Hybrid Deep Learning Model for Automatic Modulation Recognition
LAGNet: A Hybrid Deep Learning Model for Automatic Modulatio...
收藏 引用
IEEE Conference on Wireless Communications and networking
作者: Zhuo Li Guangyue Lu Yuxin Li Hao Zhou Huan Li Shaanxi Key Laboratory of Information Communication Network and Security Xi'an University of Posts and Telecommunications Xi'an China School of Computer Science and Cyber Engineering Guangzhou University Guangzhou China
Automatic Modulation Recognition (AMR) is becoming increasingly crucial in the industrial internet, and it ensures more reliable communication for devices within this vast and intricate network. Although recent applic... 详细信息
来源: 评论
Blockchain E-voting Scheme Based on SM9 Partial Blind Signature  4
Blockchain E-voting Scheme Based on SM9 Partial Blind Signat...
收藏 引用
4th International Conference on computer information Science and Artificial Intelligence, CISAI 2021
作者: Yin, Dongqing Zhang, Mingshu Wei, Bin University of the PAP Key Laboratory for Network and Information Security of the PAP Engineering Xi'an China
Aiming at the problems of user privacy leakage, digital signature denial and tracking in the current digital signature electronic voting system, a blockchain electronic voting scheme based on SM9 partial blind signatu... 详细信息
来源: 评论