咨询与建议

限定检索结果

文献类型

  • 348 篇 会议
  • 270 篇 期刊文献

馆藏范围

  • 618 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 295 篇 工学
    • 201 篇 计算机科学与技术...
    • 151 篇 软件工程
    • 67 篇 信息与通信工程
    • 44 篇 电气工程
    • 40 篇 控制科学与工程
    • 36 篇 生物工程
    • 32 篇 网络空间安全
    • 25 篇 电子科学与技术(可...
    • 16 篇 机械工程
    • 15 篇 光学工程
    • 14 篇 化学工程与技术
    • 13 篇 交通运输工程
    • 12 篇 安全科学与工程
    • 9 篇 核科学与技术
    • 9 篇 生物医学工程(可授...
    • 7 篇 材料科学与工程(可...
    • 6 篇 仪器科学与技术
  • 193 篇 理学
    • 90 篇 物理学
    • 61 篇 数学
    • 36 篇 生物学
    • 20 篇 系统科学
    • 16 篇 统计学(可授理学、...
    • 14 篇 化学
  • 74 篇 管理学
    • 45 篇 管理科学与工程(可...
    • 39 篇 图书情报与档案管...
    • 8 篇 工商管理
  • 13 篇 法学
    • 9 篇 社会学
  • 9 篇 医学
    • 8 篇 基础医学(可授医学...
    • 8 篇 临床医学
  • 8 篇 军事学
    • 8 篇 军队指挥学
  • 3 篇 经济学
  • 3 篇 文学
  • 1 篇 农学

主题

  • 60 篇 feature extracti...
  • 50 篇 accuracy
  • 29 篇 computational mo...
  • 29 篇 semantics
  • 27 篇 training
  • 25 篇 data models
  • 21 篇 deep learning
  • 20 篇 federated learni...
  • 16 篇 transformers
  • 16 篇 adaptation model...
  • 15 篇 neural networks
  • 13 篇 convolution
  • 13 篇 data mining
  • 13 篇 codes
  • 13 篇 robustness
  • 12 篇 object detection
  • 12 篇 speech processin...
  • 12 篇 visualization
  • 12 篇 measurement
  • 11 篇 noise

机构

  • 144 篇 key laboratory o...
  • 126 篇 shandong provinc...
  • 58 篇 information secu...
  • 38 篇 department of ph...
  • 38 篇 faculty of scien...
  • 38 篇 departamento de ...
  • 38 篇 department for p...
  • 38 篇 department of ph...
  • 38 篇 dipartimento di ...
  • 38 篇 yerevan physics ...
  • 38 篇 institute of phy...
  • 38 篇 institute of phy...
  • 38 篇 department of ph...
  • 38 篇 physics departme...
  • 37 篇 lehrstuhl für ex...
  • 37 篇 west university ...
  • 37 篇 kirchhoff-instit...
  • 37 篇 graduate school ...
  • 37 篇 tomsk state univ...
  • 37 篇 instituto de fís...

作者

  • 30 篇 m. khader
  • 30 篇 a. t. law
  • 30 篇 c. alexa
  • 30 篇 j. d. mansour
  • 30 篇 j. m. izen
  • 30 篇 s. veneziano
  • 30 篇 d. di valentino
  • 30 篇 g. bella
  • 30 篇 j. strandberg
  • 30 篇 d. calvet
  • 30 篇 c. amelung
  • 30 篇 a. grummer
  • 30 篇 k. j. r. cormier
  • 30 篇 n. orlando
  • 30 篇 c. gumpert
  • 30 篇 f. a. förster
  • 30 篇 h. a. gordon
  • 30 篇 y. tayalati
  • 30 篇 g. spigo
  • 30 篇 v. chiarella

语言

  • 568 篇 英文
  • 45 篇 其他
  • 6 篇 中文
检索条件"机构=Key Laboratory of Information Security and National Computing Grid"
618 条 记 录,以下是21-30 订阅
排序:
FedIERF: Federated Incremental Extremely Random Forest for Wearable Health Monitoring
收藏 引用
Journal of Computer Science & Technology 2023年 第5期38卷 970-984页
作者: 胡春雨 忽丽莎 袁林 陆佃杰 吕蕾 陈益强 Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science Center(National Supercomputer Center in Jinan)Qilu University of Technology(Shandong Academy of Sciences)Jinan 250353China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer ScienceJinan 250000China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan 25000China Institute of Information Technology Hebei University of Economics and BusinessShijiazhuang 050061China School of Information Science and Engineering Shandong Normal UniversityJinan 250358China Institute of Computing Technology Chinese Academy of SciencesBeijing 100190China
Wearable health monitoring is a crucial technical tool that offers early warning for chronic diseases due to its superior portability and low power ***,most wearable health data is distributed across dfferent organiza... 详细信息
来源: 评论
Self-Adaptive Fine-grained Multi-modal Data Augmentation for Semi-supervised Muti-modal Coreference Resolution  24
Self-Adaptive Fine-grained Multi-modal Data Augmentation for...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Zheng, Li Chen, Boyu Fei, Hao Li, Fei Wu, Shengqiong Liao, Lizi Ji, Donghong Teng, Chong School of Cyber Science and Engineering Wuhan University Wuhan China School of Computing National University of Singapore Singapore Singapore SCIS Singapore Management University Singapore Singapore Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education China
Coreference resolution, an essential task in natural language processing, is particularly challenging in multi-modal scenarios where data comes in various forms and modalities. Despite advancements, limitations due to... 详细信息
来源: 评论
Decoupled knowledge distillation method based on meta-learning
收藏 引用
High-Confidence computing 2024年 第1期4卷 1-6页
作者: Wenqing Du Liting Geng Jianxiong Liu Zhigang Zhao Chunxiao Wang Jidong Huo Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science Center(National Supercomputer Center in Jinan)Qilu University of Technology(Shandong Academy of Sciences)Jinan 250014China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer ScienceJinan 250014China Aerospace Science&Industry Network Information Development Co. LTDBeijing 100854China
With the advancement of deep learning techniques,the number of model parameters has been increasing,leading to significant memory consumption and limits in the deployment of such models in real-time *** reduce the num... 详细信息
来源: 评论
Dynamic detection technology of encryption algorithm based on Pin  9
Dynamic detection technology of encryption algorithm based o...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Qu, Junpeng Du, Gaolei Sun, Yunge Fu, Yong Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan250014 China Quan Cheng Laboratory Jinan250103 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
Aiming at the problem that malicious software uses encryption algorithm to hide its own malicious code and avoid detection, a dynamic detection technology based on Pin encryption algorithm is proposed. Use Pin to get ... 详细信息
来源: 评论
An automated construction method for symmetric encryption round function models based on dynamic analysis  9
An automated construction method for symmetric encryption ro...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Du, Gaolei Sun, Yunge Qu, Junpeng Fu, Yong Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan250014 China Quan Cheng Laboratory Jinan250103 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
With the deepening of informatization, the incidence of cybercrimes utilizing malicious software for attacks is on the rise. This paper addresses the detection issue of symmetric encryption in malicious software from ... 详细信息
来源: 评论
An Encryption Algorithm Cycle Identification Method Based on Bit Execution  9
An Encryption Algorithm Cycle Identification Method Based on...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Sun, Yunge Du, Gaolei Qu, Junpeng Fu, Yong Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan250014 China Quan Cheng Laboratory Jinan250103 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
Ransomware uses symmetric encryption algorithms to lock user files to extort money. This paper proposes a cryptographic algorithm loop identification method based on bit-precise execution, aiming to solve the problem ... 详细信息
来源: 评论
Knowledge Graph Embedding Method Based on Entity Metric Learning  23
Knowledge Graph Embedding Method Based on Entity Metric Lear...
收藏 引用
9th International Conference on computing and Artificial Intelligence, ICCAI 2023
作者: He, Meng Duan, Lijuan Zhang, Baochang Han, Shengwen Faculty of Information Technology Beijing University of Technology Beijing Key Laboratory of Trusted Computing National Engineering Laboratory for Key Technologies of Information Security Level Protection China Institute of Artificial Intelligence Beihang University China Faculty of Information Technology Beijing University of Technology China
A knowledge graph is a knowledge base of graph structure that stores massive facts and their relations in the form of triplets. Embedding entities and relations in knowledge graph into low-dimensional continuous vecto... 详细信息
来源: 评论
Discourse Relation-Aware Multi-turn Dialogue Response Generation  12th
Discourse Relation-Aware Multi-turn Dialogue Response Genera...
收藏 引用
12th national CCF Conference on Natural Language Processing and Chinese computing, NLPCC 2023
作者: Wang, Huijie He, Ruifang Jia, Yungang Xu, Jing Wang, Bo College of Intelligence and Computing Tianjin University Tianjin China Tianjin Key Laboratory of Cognitive Computing and Application Tianjin China Tianjin Branch of National Computer Network and Information Security Management Center Tianjin China
Multi-turn dialogue response generation aims to generate a response with consideration of the context. It is not equal to multiple single-turn dialogues due to the context dependence of response. Many existing models ... 详细信息
来源: 评论
MMLSCU: A Dataset for Multi-modal Multi-domain Live Streaming Comment Understanding  24
MMLSCU: A Dataset for Multi-modal Multi-domain Live Streamin...
收藏 引用
33rd ACM Web Conference, WWW 2024
作者: Meng, Zixiang Gao, Qiang Guo, Di Li, Yunlong Li, Bobo Fei, Hao Wu, Shengqiong Li, Fei Teng, Chong Ji, Donghong Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Wuhan China National University of Singapore Singapore Singapore Sea-NExT Joint Lab National University of Singapore Singapore Singapore
With the increasing popularity of live streaming, the interactions from viewers during a live streaming can provide more specific and constructive feedback for both the streamer and platform. In such scenario, the pri... 详细信息
来源: 评论
A Cooperative Repair Scheme for MSR Codes with Two Erasures and Small Finite Field
A Cooperative Repair Scheme for MSR Codes with Two Erasures ...
收藏 引用
International Conference on Communication Technology (ICCT)
作者: Yajuan Liu Han Cai Xiaohu Tang The Information Security and National Computing Grid Laboratory Southwest Jiaotong University Chengdu China
In large-scale distributed storage systems, the repair bandwidth, i.e., the amount of data downloaded for failures, is one of the most important factors that determines the performance of the system. In this paper, we...
来源: 评论