咨询与建议

限定检索结果

文献类型

  • 1,258 篇 会议
  • 533 篇 期刊文献

馆藏范围

  • 1,791 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,091 篇 工学
    • 775 篇 计算机科学与技术...
    • 643 篇 软件工程
    • 256 篇 信息与通信工程
    • 236 篇 电气工程
    • 142 篇 控制科学与工程
    • 128 篇 电子科学与技术(可...
    • 112 篇 生物工程
    • 94 篇 机械工程
    • 61 篇 光学工程
    • 57 篇 化学工程与技术
    • 50 篇 生物医学工程(可授...
    • 50 篇 安全科学与工程
    • 44 篇 交通运输工程
    • 40 篇 材料科学与工程(可...
    • 40 篇 网络空间安全
    • 35 篇 仪器科学与技术
    • 27 篇 建筑学
  • 503 篇 理学
    • 300 篇 数学
    • 125 篇 物理学
    • 121 篇 生物学
    • 121 篇 统计学(可授理学、...
    • 51 篇 化学
    • 27 篇 系统科学
  • 288 篇 管理学
    • 177 篇 管理科学与工程(可...
    • 134 篇 图书情报与档案管...
    • 73 篇 工商管理
  • 63 篇 法学
    • 51 篇 社会学
  • 56 篇 医学
    • 48 篇 临床医学
    • 43 篇 基础医学(可授医学...
  • 27 篇 经济学
    • 27 篇 应用经济学
  • 19 篇 农学
  • 7 篇 教育学
  • 5 篇 军事学
  • 3 篇 文学
  • 3 篇 艺术学

主题

  • 118 篇 feature extracti...
  • 86 篇 accuracy
  • 63 篇 semantics
  • 62 篇 training
  • 60 篇 computational mo...
  • 51 篇 federated learni...
  • 51 篇 data models
  • 44 篇 deep learning
  • 36 篇 neural networks
  • 30 篇 data mining
  • 29 篇 predictive model...
  • 29 篇 visualization
  • 27 篇 object detection
  • 27 篇 privacy
  • 26 篇 transformers
  • 25 篇 image segmentati...
  • 25 篇 security
  • 25 篇 robustness
  • 24 篇 network security
  • 24 篇 adaptation model...

机构

  • 227 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 194 篇 school of inform...
  • 125 篇 shandong provinc...
  • 82 篇 shandong provinc...
  • 59 篇 college of compu...
  • 52 篇 shandong fundame...
  • 50 篇 college of mathe...
  • 46 篇 shandong enginee...
  • 41 篇 fujian provincia...
  • 40 篇 shandong provinc...
  • 38 篇 state grid key l...
  • 34 篇 shandong provinc...
  • 33 篇 fujian key labor...
  • 30 篇 shandong provinc...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 28 篇 state grid key l...
  • 27 篇 fujian key labor...
  • 24 篇 quan cheng labor...

作者

  • 34 篇 feng zhiquan
  • 25 篇 chen yuehui
  • 25 篇 guo wenzhong
  • 24 篇 zhiquan feng
  • 21 篇 yang bo
  • 20 篇 xiaoming wu
  • 20 篇 guo kun
  • 18 篇 yang yang
  • 18 篇 zhang bo
  • 18 篇 xi zesheng
  • 15 篇 lu wenpeng
  • 15 篇 lin peng
  • 15 篇 xiangzhi liu
  • 15 篇 niu sijie
  • 14 篇 chen zhenxiang
  • 14 篇 wang shiping
  • 14 篇 wang gang
  • 13 篇 guohua lv
  • 13 篇 zhenxiang chen
  • 13 篇 zhang jing

语言

  • 1,655 篇 英文
  • 100 篇 其他
  • 46 篇 中文
  • 2 篇 斯洛文尼亚文
检索条件"机构=Key Laboratory of Computing Power Network and Information"
1791 条 记 录,以下是311-320 订阅
排序:
Prediction and Analysis of Infectious Disease Visit Data Based on DPC  10th
Prediction and Analysis of Infectious Disease Visit Data Bas...
收藏 引用
10th International Conference on Signal and information Processing, network and Computers, ICSINC 2022
作者: Zhang, Rui Song, Yuhui Du, Tao School of Information Engineering Shandong Management University No. 3500 Dingxiang Road Changqing District Shandong Jinan250357 China School of Information Science and Engineering University of Jinan Jinan China Shandong Provincial Key Laboratory of Network Based Intelligent Computing University of Jinan Jinan China
Since the outbreak of the COVID-19 in early 2020, the prevention and control of infectious diseases has been raised to a higher level. However, tuberculosis still ranks in the forefront of the incidence rate of variou... 详细信息
来源: 评论
A DPC Based Recommendation Algorithm for Internship Positions  10th
A DPC Based Recommendation Algorithm for Internship Position...
收藏 引用
10th International Conference on Signal and information Processing, network and Computers, ICSINC 2022
作者: Zhang, Rui Bi, Lingyun Du, Tao School of Information Engineering Shandong Management University No.3500 Dingxiang Road Shandong Changqing District Jinan250357 China School of Information Science and Engineering University of Jinan Jinan China Shandong Provincial Key Laboratory of Network Based Intelligent Computing University of Jinan Jinan China
In the graduation internship activities, the choice of centralized internship based on school-enterprise cooperation units is limited, and the independent internship method will inevitably lead to the problem of blind... 详细信息
来源: 评论
Open-vocabulary 3D Semantic Understanding via Affinity Neural Radiance Fields
Open-vocabulary 3D Semantic Understanding via Affinity Neura...
收藏 引用
Next Generation Data-driven networks (NGDN), International Conference on
作者: Yujie Fan Huan Luo Computer and Data Science Fuzhou University Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou China
Three-dimensional semantic understanding using only several multi-view images can largely reduce the communication burden on the network. In addition, while point clouds are extensively studied for 3D scene understand... 详细信息
来源: 评论
An Encryption Algorithm Cycle Identification Method Based on Bit Execution
An Encryption Algorithm Cycle Identification Method Based on...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Yunge Sun Gaolei Du Junpeng Qu Yong Fu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology(Shandong Academy of Sciences) Jinan China Quan Cheng Laboratory Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
Ransomware uses symmetric encryption algorithms to lock user files to extort money. This paper proposes a cryptographic algorithm loop identification method based on bit-precise execution, aiming to solve the problem ... 详细信息
来源: 评论
An automated construction method for symmetric encryption round function models based on dynamic analysis
An automated construction method for symmetric encryption ro...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Gaolei Du Yunge Sun Junpeng Qu Yong Fu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Quan Cheng Laboratory Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
With the deepening of informatization, the incidence of cybercrimes utilizing malicious software for attacks is on the rise. This paper addresses the detection issue of symmetric encryption in malicious software from ... 详细信息
来源: 评论
Dynamic detection technology of encryption algorithm based on Pin
Dynamic detection technology of encryption algorithm based o...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Junpeng Qu Gaolei Du Yunge Sun Yong Fu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Quan Cheng Laboratory Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
Aiming at the problem that malicious software uses encryption algorithm to hide its own malicious code and avoid detection, a dynamic detection technology based on Pin encryption algorithm is proposed. Use Pin to get ... 详细信息
来源: 评论
TDMF: Text-Guided Denoising and Interactive Medical Image Fusion
TDMF: Text-Guided Denoising and Interactive Medical Image Fu...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Aimei Dong Jingyuan Xu Long Wang Guohua Lv Guixin Zhao Jinyong Cheng Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Faculty of Computer Science and Technology Qilu University of Technology(Shandong Academy of Sciences) Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China
Multimodal image fusion aims to merge features from different modalities to create a comprehensively representative image. However, existing medical image fusion methods often struggle to handle noise generated during... 详细信息
来源: 评论
Offloading Mode Hidden for Delay Sensitive Tasks in Edge computing networks
Offloading Mode Hidden for Delay Sensitive Tasks in Edge Com...
收藏 引用
Artificial Intelligence, networking and information Technology (AINIT), International Seminar on
作者: Guowei Zhang Jiayuan Du School of Cyber Science and Engineering Qufu Normal University Qufu China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology (Shandong Academy of Sciences) Jinan China
Edge computing has been developed to support local services with lower burden to the core network. However, privacy issues deteriorate when terminal users enjoy the high-quality services with the price of sending thei... 详细信息
来源: 评论
Safe and Reliable Diffusion Models via Subspace Projection
arXiv
收藏 引用
arXiv 2025年
作者: Chen, Huiqiang Zhu, Tianqing Wang, Linlin Yu, Xin Gao, Longxiang Zhou, Wanlei Faculty of Data Science City University of Macau China School of Computer Science University of Queensland QLD Australia Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China
Large-scale text-to-image (T2I) diffusion models have revolutionized image generation, enabling the synthesis of highly detailed visuals from textual descriptions. However, these models may inadvertently generate inap... 详细信息
来源: 评论
RMSLRS: Real-Time Multi-terminal Sign Language Recognition System  13th
RMSLRS: Real-Time Multi-terminal Sign Language Recognition S...
收藏 引用
13th International Conference on Innovations in Bio-Inspired computing and Applications, IBICA 2022, and 12th World Congress on information and Communication Technologies, WICT 2022
作者: Zhao, Yilin Zhang, Biao Ma, Kun Business School of Jinan University University of Jinan Jinan250022 China School of Computer and Information Hefei University of Technology Hefei230009 China Shandong Provincial Key Laboratory of Network Based Intelligent Computing University of Jinan Jinan250022 China
Sign language is commonly used by deaf or speech-impaired people to convey meaning. Sign language recognition (SLR) aims to help users learn and use sign language by recognizing the signs from given videos. Although s... 详细信息
来源: 评论