咨询与建议

限定检索结果

文献类型

  • 349 篇 会议
  • 271 篇 期刊文献

馆藏范围

  • 620 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 297 篇 工学
    • 203 篇 计算机科学与技术...
    • 151 篇 软件工程
    • 67 篇 信息与通信工程
    • 44 篇 电气工程
    • 42 篇 控制科学与工程
    • 36 篇 生物工程
    • 32 篇 网络空间安全
    • 25 篇 电子科学与技术(可...
    • 16 篇 机械工程
    • 15 篇 光学工程
    • 14 篇 化学工程与技术
    • 13 篇 交通运输工程
    • 12 篇 安全科学与工程
    • 9 篇 核科学与技术
    • 9 篇 生物医学工程(可授...
    • 7 篇 材料科学与工程(可...
    • 6 篇 仪器科学与技术
  • 193 篇 理学
    • 89 篇 物理学
    • 62 篇 数学
    • 36 篇 生物学
    • 20 篇 系统科学
    • 16 篇 统计学(可授理学、...
    • 14 篇 化学
  • 73 篇 管理学
    • 44 篇 管理科学与工程(可...
    • 39 篇 图书情报与档案管...
    • 8 篇 工商管理
  • 13 篇 法学
    • 9 篇 社会学
  • 9 篇 医学
    • 8 篇 基础医学(可授医学...
    • 8 篇 临床医学
  • 8 篇 军事学
    • 8 篇 军队指挥学
  • 3 篇 经济学
  • 3 篇 文学
  • 1 篇 农学

主题

  • 60 篇 feature extracti...
  • 50 篇 accuracy
  • 29 篇 computational mo...
  • 29 篇 semantics
  • 27 篇 training
  • 25 篇 data models
  • 21 篇 deep learning
  • 21 篇 federated learni...
  • 16 篇 transformers
  • 16 篇 adaptation model...
  • 15 篇 neural networks
  • 13 篇 convolution
  • 13 篇 data mining
  • 13 篇 codes
  • 13 篇 robustness
  • 12 篇 object detection
  • 12 篇 speech processin...
  • 12 篇 visualization
  • 12 篇 measurement
  • 11 篇 noise

机构

  • 145 篇 key laboratory o...
  • 126 篇 shandong provinc...
  • 58 篇 information secu...
  • 38 篇 department of ph...
  • 38 篇 faculty of scien...
  • 38 篇 departamento de ...
  • 38 篇 department for p...
  • 38 篇 department of ph...
  • 38 篇 dipartimento di ...
  • 38 篇 yerevan physics ...
  • 38 篇 institute of phy...
  • 38 篇 institute of phy...
  • 38 篇 department of ph...
  • 38 篇 physics departme...
  • 37 篇 lehrstuhl für ex...
  • 37 篇 west university ...
  • 37 篇 kirchhoff-instit...
  • 37 篇 graduate school ...
  • 37 篇 tomsk state univ...
  • 37 篇 instituto de fís...

作者

  • 30 篇 m. khader
  • 30 篇 a. t. law
  • 30 篇 c. alexa
  • 30 篇 j. d. mansour
  • 30 篇 j. m. izen
  • 30 篇 s. veneziano
  • 30 篇 d. di valentino
  • 30 篇 g. bella
  • 30 篇 j. strandberg
  • 30 篇 d. calvet
  • 30 篇 c. amelung
  • 30 篇 a. grummer
  • 30 篇 k. j. r. cormier
  • 30 篇 n. orlando
  • 30 篇 c. gumpert
  • 30 篇 f. a. förster
  • 30 篇 h. a. gordon
  • 30 篇 y. tayalati
  • 30 篇 g. spigo
  • 30 篇 v. chiarella

语言

  • 564 篇 英文
  • 51 篇 其他
  • 6 篇 中文
检索条件"机构=Key Laboratory of Information Security and National Computing Grid"
620 条 记 录,以下是11-20 订阅
排序:
A Transformation of Repairing Reed-Solomon Codes from Rack-Aware Storage Model to Homogeneous Storage Model
arXiv
收藏 引用
arXiv 2024年
作者: Yang, Yumeng Cai, Han Tang, Xiaohu The Information Security and National Computing Grid Laboratory Southwest Jiaotong University Chengdu China
In this paper, we address the node repair problem of Reed-Solomon (RS) coded distributed storage systems. Specifically, to overcome the challenges of multiple-node failures of RS codes under the rack-aware storage mod... 详细信息
来源: 评论
An Improved YOLOv5s-Based Smoke Detection System for Outdoor Parking Lots
收藏 引用
Computers, Materials & Continua 2024年 第8期80卷 3333-3349页
作者: Ruobing Zuo Xiaohan Huang Xuguo Jiao Zhenyong Zhang State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang550025China School of Information and Control Engineering Qingdao University of TechnologyQingdao266520China State Key Laboratory of Industrial Control Technology College of Control Science and EngineeringZhejiang UniversityHangzhou310027China Key Laboratory of Computing Power Network and Information Security Ministry of EducationQilu University of Technology(Shandong Academy of Sciences)Jinan250353China Text Computing&Cognitive Intelligence Engineering Research Center of National Education Ministry Guizhou UniversityGuiyang550025China
In the rapidly evolving urban landscape,outdoor parking lots have become an indispensable part of the city’s transportation *** growth of parking lots has raised the likelihood of spontaneous vehicle combus-tion,a si... 详细信息
来源: 评论
Visual malware classification and detection method based on convolutional neural network  9
Visual malware classification and detection method based on ...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Huang, Hua Sheng, Hua Han, Xingwang Zhang, Wenbin Zhao, Zilin State Grid Shandong Electric Power Company Information and Telecommunications Company Jinan China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China
With the rapid development of Internet technology, leading to the evolution of malware variants, and malicious threats are also increasing. Therefore, rapid and accurate classification of malware becomes crucial. In r... 详细信息
来源: 评论
Research and Application of Speech Transmission Index in Acoustic Leakage Detection  17
Research and Application of Speech Transmission Index in Aco...
收藏 引用
17th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics, CISP-BMEI 2024
作者: Hao, Qiuyun Wang, FuQiang Zhang, Peng Ma, XiaoFeng Zhang, Jianqiang Zhao, Wei Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
Acoustic information in confidential premise can be leaked through channels such as walls, pipes, doors and windows. Acoustic leakage level needs to be measured through specific indicators. Acoustic leakage evaluation... 详细信息
来源: 评论
Infringement Detection and Traceability Scheme Based on Ciphertext Feature Extraction  9
Infringement Detection and Traceability Scheme Based on Ciph...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Wang, Lianhai Wang, Xinlei Liu, Tianrui Wang, Yingxiaochun Li, Qi Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
The rapid growth of healthcare data transactions has fostered win-win developments in healthcare technology innovation and economic benefits. However, the issue of secondary transactions makes data ownership vulnerabl... 详细信息
来源: 评论
Reputation based Adaptive Federated Learning in Medical Scenarios  9
Reputation based Adaptive Federated Learning in Medical Scen...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Wang, Lianhai Liu, Tianrui Wang, Yingxiaochun Wang, Xinlei Li, Qi Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
Federated Learning (FL) is a distributed machine learning paradigm designed to address data silos and protect data privacy. However, in medical scenarios, the heterogeneity in data quality and the non-independent and ... 详细信息
来源: 评论
LCLB: Low Cross-Chain Transaction Ratio and Load Balancing for Blockchain Sharding  6
LCLB: Low Cross-Chain Transaction Ratio and Load Balancing f...
收藏 引用
6th International Conference on Robotics, Intelligent Control and Artificial Intelligence, RICAI 2024
作者: Wang, Yu Wu, Xiaoming Yuan, Qile Dong, Yunfeng Liu, Xiangzhi Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
As blockchain technology becomes widely applied, handling high volumes of transactions has become a critical challenge. Sharding has emerged as an effective solution to enhance the throughput of blockchain systems. Ye... 详细信息
来源: 评论
DialogREC+ : An Extension of DialogRE to Investigate How Much Coreference Helps Relation Extraction in Dialogs  12th
DialogREC+ : An Extension of DialogRE to Investigate How M...
收藏 引用
12th national CCF Conference on Natural Language Processing and Chinese computing, NLPCC 2023
作者: Xiong, Yiyun Dai, Mengwei Li, Fei Fei, Hao Li, Bobo Wu, Shengqiong Ji, Donghong Teng, Chong Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Wuhan China School of Computing National University of Singapore Singapore Singapore
Dialogue relation extraction (DRE) that identifies the relations between argument pairs in dialogue text, suffers much from the frequent occurrence of personal pronouns, or entity and speaker coreference. This work in... 详细信息
来源: 评论
Hierarchical certification of nonclassical network correlations
收藏 引用
Physical Review A 2024年 第2期110卷 022617页
作者: Ming-Xing Luo Xue Yang Alejandro Pozas-Kerstjens Information Security and National Computing Grid Laboratory CAS Center for Excellence in Quantum Information and Quantum Physics Hefei 230026 China Group of Applied Physics 8200 Schaffhausen Switzerland (
With the increased availability of quantum technological devices, it becomes more important to have tools to guarantee their correct nonclassical behavior. This is especially important for quantum networks, which cons... 详细信息
来源: 评论
Learning EEG synchronization patterns for epileptic seizure prediction using bag-of-wave features
收藏 引用
Journal of Ambient Intelligence and Humanized computing 2023年 第11期14卷 15557-15572页
作者: Cui, Song Duan, Lijuan Qiao, Yuanhua Xiao, Ying Faculty of Information Technology Beijing University of Technology Beijing100124 China Beijing Key Laboratory of Trusted Computing National Engineering Laboratory for Critical Technologies of Information Security Classified Protection Beijing100124 China College of Applied Sciences Beijing University of Technology Beijing100124 China
Epileptic seizure prediction has the potential to promote epilepsy care and treatment. However, the seizure prediction accuracy does not satisfy the application requirements. In this paper, a novel framework for seizu... 详细信息
来源: 评论