咨询与建议

限定检索结果

文献类型

  • 4,585 篇 会议
  • 3,423 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 8,016 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,350 篇 工学
    • 4,013 篇 计算机科学与技术...
    • 3,165 篇 软件工程
    • 1,364 篇 信息与通信工程
    • 704 篇 电气工程
    • 586 篇 控制科学与工程
    • 543 篇 电子科学与技术(可...
    • 469 篇 网络空间安全
    • 442 篇 生物工程
    • 305 篇 机械工程
    • 237 篇 光学工程
    • 230 篇 仪器科学与技术
    • 188 篇 生物医学工程(可授...
    • 180 篇 安全科学与工程
    • 152 篇 动力工程及工程热...
    • 149 篇 化学工程与技术
    • 140 篇 交通运输工程
    • 127 篇 建筑学
  • 2,314 篇 理学
    • 1,371 篇 数学
    • 517 篇 物理学
    • 480 篇 生物学
    • 419 篇 统计学(可授理学、...
    • 205 篇 系统科学
    • 172 篇 化学
  • 1,348 篇 管理学
    • 829 篇 管理科学与工程(可...
    • 573 篇 图书情报与档案管...
    • 295 篇 工商管理
  • 287 篇 法学
    • 169 篇 社会学
    • 116 篇 法学
  • 157 篇 医学
    • 130 篇 临床医学
  • 115 篇 经济学
    • 115 篇 应用经济学
  • 98 篇 军事学
  • 55 篇 农学
  • 48 篇 教育学
  • 24 篇 文学
  • 23 篇 艺术学

主题

  • 257 篇 feature extracti...
  • 233 篇 semantics
  • 211 篇 cryptography
  • 188 篇 authentication
  • 180 篇 information secu...
  • 177 篇 computational mo...
  • 169 篇 accuracy
  • 166 篇 security
  • 156 篇 protocols
  • 145 篇 deep learning
  • 140 篇 privacy
  • 133 篇 training
  • 130 篇 federated learni...
  • 122 篇 laboratories
  • 109 篇 data models
  • 101 篇 cloud computing
  • 100 篇 servers
  • 96 篇 blockchain
  • 95 篇 data privacy
  • 91 篇 public key crypt...

机构

  • 218 篇 key laboratory o...
  • 207 篇 shandong provinc...
  • 162 篇 school of comput...
  • 151 篇 state key labora...
  • 118 篇 school of cyber ...
  • 112 篇 school of comput...
  • 106 篇 department of co...
  • 98 篇 information secu...
  • 85 篇 key laboratory o...
  • 84 篇 institute of inf...
  • 70 篇 guangdong provin...
  • 69 篇 computer network...
  • 67 篇 university of ch...
  • 64 篇 college of mathe...
  • 64 篇 peng cheng labor...
  • 63 篇 state grid key l...
  • 59 篇 school of softwa...
  • 58 篇 shandong provinc...
  • 56 篇 school of comput...
  • 54 篇 key laboratory o...

作者

  • 56 篇 jianfeng ma
  • 53 篇 yang yang
  • 45 篇 ma jianfeng
  • 45 篇 yixian yang
  • 42 篇 ding yong
  • 41 篇 zheng wei-shi
  • 40 篇 huang qingming
  • 32 篇 wang wei
  • 31 篇 cong runmin
  • 31 篇 xu an wang
  • 31 篇 hu yupu
  • 31 篇 yang yixian
  • 30 篇 zhang huanguo
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 26 篇 xiaoming wu
  • 26 篇 min-ling zhang
  • 26 篇 wang bin
  • 25 篇 liu xin
  • 23 篇 li tao

语言

  • 6,638 篇 英文
  • 1,144 篇 其他
  • 269 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Computer Network and Information Security"
8016 条 记 录,以下是881-890 订阅
排序:
PROMPTING LABEL EFFICIENCY IN FEDERATED GRAPH LEARNING VIA PERSONALIZED SEMI-SUPERVISION  49
PROMPTING LABEL EFFICIENCY IN FEDERATED GRAPH LEARNING VIA P...
收藏 引用
2024 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2024
作者: Mao, Qinghua Lin, Xi Su, Xiu Li, Gaolei Chen, Lixing Li, Jianhua Shanghai Jiao Tong University China Big Data Institute Central South University China School of Computer Science Faculty of Engineering The University of Sydney Australia Shanghai Key Laboratory of Integrated Administration Technologies for Information Security China
Federated graph learning (FGL) enables the collaborative training of graph neural networks (GNNs) in a distributed manner. A critical challenge in FGL is label deficiency, which becomes more intricate due to non-IID d... 详细信息
来源: 评论
Finding EFS1 Allocations for Indivisible Resources among two agents
Finding EFS1 Allocations for Indivisible Resources among two...
收藏 引用
2023 International Conference on Algorithms, High Performance Computing, and Artificial Intelligence, AHPCAI 2023
作者: Pang, Xiaoyun Huang, Wei Yuan, Liang School of Computer Science and Information Security Guilin University of Electronics Technology Guilin541004 China Guangxi Key Laboratory of Trusted Software Guilin University of Electronics Technology Guilin541004 China
We study the problem of fairly allocating a set of indivisible goods between two agents with additive valuations. Fair distribution has become an emerging research topic in computer science and artificial intelligence... 详细信息
来源: 评论
Image steganography based on generative implicit neural representation
arXiv
收藏 引用
arXiv 2024年
作者: Zhong, Yangjie Ke, Yan Liu, Meiqi Liu, Jia Engineering University of PAP Shanxi710000 China Key Laboratory of Network and Information Security of PAP Shanxi710000 China
In the realm of advanced steganography, the scale of the model typically correlates directly with the resolution of the fundamental grid, necessitating the training of a distinct neural network for message extraction.... 详细信息
来源: 评论
Detecting Fake-Normal Pornographic and Gambling Websites through one Multi-Attention HGNN  26
Detecting Fake-Normal Pornographic and Gambling Websites thr...
收藏 引用
26th International Conference on computer Supported Cooperative Work in Design, CSCWD 2023
作者: Ma, Xiaoqing Zheng, Chao Li, Zhao Yin, Jiangyi Liu, Qingyun Chen, Xunxun Institute of Information Engineering Chinese Academy of Sciences Beijing China National Engineering Laboratory for Information Security Technologies Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Geedge Networks Beijing China National Computer Network Emergency Response Technical Team Coordination Center of China Beijing China
The rapid development of pornographic and gambling websites, fueled by the widespread abuse of information technology, has become a growing concern. They pose a serious threat to the physical and mental health of chil... 详细信息
来源: 评论
A Poisoning Attack Based on Variant Generative Adversarial networks in Recommender Systems  9th
A Poisoning Attack Based on Variant Generative Adversarial ...
收藏 引用
19th International Conference on Advanced Data Mining and Applications, ADMA 2023
作者: Cai, Hongyun Wang, Shiyun Zhang, Yu Zhang, Meiling Zhao, Ao School of Cyber Security and Computer Hebei University Hebei Baoding071000 China Key Laboratory on High Trusted Information System in Hebei Province Hebei University Hebei Baoding071000 China
The emergence of poisoning attacks brings significant security risks to recommender systems. Injecting a well-designed set of fake user profiles into these systems can severely impact the quality of recommendations. H... 详细信息
来源: 评论
Near-Lossless Compression of Two Independent Binary Sources with One Encoder
Near-Lossless Compression of Two Independent Binary Sources ...
收藏 引用
International Conference on Wireless Communications and Signal Processing (WCSP)
作者: Tingting Zhu Xiao Ma School of Computer Science and Engineering MoE Key Laboratory of Information Technology Guangdong Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou China
In this paper, we consider the near-lossless compression of two distinct but independent binary random sources $U$ and $V$ , both of which are asymmetrical independent and identically distributed (i.i.d.) sources. In ... 详细信息
来源: 评论
security situation awareness method of power mobile application based on big data architecture  5
Security situation awareness method of power mobile applicat...
收藏 引用
5th International Conference on Data Science and information Technology, DSIT 2022
作者: Yong, Li Mu, Chen Zaojian, Dai Lu, Chen State Grid Key Laboratory of Information & Network Security State Grid Smart Grid Research Enstitute Co. Ltd Nanjing210003 China
According to the characteristics of security threats and massive users in power mobile applications, a mobile application security situational awareness method based on big data architecture is proposed. The method us... 详细信息
来源: 评论
Weakly Supervised Gland Segmentation with Class Semantic Consistency and Purified Labels Filtration  39
Weakly Supervised Gland Segmentation with Class Semantic Con...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Feng, Siyang Wang, Huadeng Han, Chu Liu, Zhenbing Zhang, Hualong Lan, Rushi Pan, Xipeng School of Computer Science and Information Security Guilin University of Electronic Technology Guilin541004 China Guangdong Provincial Key Laboratory of Artificial Intelligence Medical Image Analysis and Application Guangzhou510080 China International Joint Research Laboratory of Spatio-temporal Information and Intelligent Location Services Guilin University of Electronic Technology Guilin541004 China
Image-level weakly supervised semantic segmentation (WSSS) reduces the dependence on high-quality data annotation, which plays a crucial role in computational pathology. Benefit from the ability to localize the object... 详细信息
来源: 评论
Lithological Facies Classification Using Attention-Based Gated Recurrent Unit
收藏 引用
Tsinghua Science and Technology 2024年 第4期29卷 1206-1218页
作者: Yuwen Liu Yulan Zhang Xingyuan Mao Xucheng Zhou Jingwen Chang Wenwei Wang Pan Wang Lianyong Qi College of Computer Science and Technology China University of Petroleum(East China)Qingdao 266580China Shandong Provincial University Laboratory for Protected Horticulture Weifang University of Science and TechnologyShouguang 262700China School of Mechanical Electrical and Information EngineeringShandong UniversityWeihai 264209China Shandong Provincial Key Laboratory of Network Based Intelligent Computing University of JinanJinan 250022China School of Modern Posts Nanjing University of Posts and TelecommunicationsNanjing 210023China
Lithological facies classification is a pivotal task in petroleum geology, underpinning reservoir characterization and influencing decision-making in exploration and production operations. Traditional classification m... 详细信息
来源: 评论
Research and Implementation of Electric Topology Intelligent Checking System Based on Graph Computing  7
Research and Implementation of Electric Topology Intelligent...
收藏 引用
7th International Conference on Intelligent, Interactive Systems and Applications, IISA2022
作者: Qiao, Junfeng Pan, Sen Yang, Pei State Grid Key Laboratory of Information and Network Security State Grid Smart Grid Research Institute Co.Ltd Nanjing210003 China
The information system of low-voltage distribution network correctly records the topological structure of distribution network, which is the premise of fine management and safe operation of electric power *** the topo... 详细信息
来源: 评论