咨询与建议

限定检索结果

文献类型

  • 391 篇 会议
  • 272 篇 期刊文献

馆藏范围

  • 663 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 304 篇 工学
    • 208 篇 计算机科学与技术...
    • 150 篇 软件工程
    • 67 篇 信息与通信工程
    • 46 篇 电气工程
    • 40 篇 控制科学与工程
    • 35 篇 生物工程
    • 31 篇 网络空间安全
    • 28 篇 电子科学与技术(可...
    • 17 篇 机械工程
    • 15 篇 光学工程
    • 15 篇 化学工程与技术
    • 12 篇 交通运输工程
    • 11 篇 材料科学与工程(可...
    • 11 篇 安全科学与工程
    • 9 篇 核科学与技术
    • 9 篇 生物医学工程(可授...
    • 6 篇 力学(可授工学、理...
  • 196 篇 理学
    • 93 篇 物理学
    • 64 篇 数学
    • 35 篇 生物学
    • 20 篇 系统科学
    • 16 篇 统计学(可授理学、...
    • 15 篇 化学
  • 74 篇 管理学
    • 45 篇 管理科学与工程(可...
    • 38 篇 图书情报与档案管...
    • 8 篇 工商管理
  • 13 篇 法学
    • 9 篇 社会学
  • 9 篇 医学
    • 8 篇 基础医学(可授医学...
    • 8 篇 临床医学
  • 8 篇 军事学
    • 8 篇 军队指挥学
  • 3 篇 经济学
  • 3 篇 文学
  • 1 篇 教育学
  • 1 篇 农学

主题

  • 72 篇 feature extracti...
  • 70 篇 accuracy
  • 39 篇 computational mo...
  • 36 篇 federated learni...
  • 33 篇 training
  • 30 篇 semantics
  • 30 篇 data models
  • 23 篇 deep learning
  • 22 篇 transformers
  • 22 篇 robustness
  • 22 篇 adaptation model...
  • 17 篇 neural networks
  • 17 篇 data mining
  • 16 篇 attention mechan...
  • 15 篇 object detection
  • 15 篇 optimization
  • 15 篇 measurement
  • 14 篇 visualization
  • 14 篇 privacy
  • 13 篇 speech processin...

机构

  • 178 篇 key laboratory o...
  • 128 篇 shandong provinc...
  • 58 篇 information secu...
  • 39 篇 shandong provinc...
  • 38 篇 department of ph...
  • 38 篇 faculty of scien...
  • 38 篇 departamento de ...
  • 38 篇 department for p...
  • 38 篇 department of ph...
  • 38 篇 dipartimento di ...
  • 38 篇 yerevan physics ...
  • 38 篇 institute of phy...
  • 38 篇 institute of phy...
  • 38 篇 department of ph...
  • 38 篇 physics departme...
  • 37 篇 lehrstuhl für ex...
  • 37 篇 west university ...
  • 37 篇 kirchhoff-instit...
  • 37 篇 graduate school ...
  • 37 篇 tomsk state univ...

作者

  • 30 篇 m. khader
  • 30 篇 a. t. law
  • 30 篇 c. alexa
  • 30 篇 j. d. mansour
  • 30 篇 j. m. izen
  • 30 篇 s. veneziano
  • 30 篇 d. di valentino
  • 30 篇 g. bella
  • 30 篇 j. strandberg
  • 30 篇 d. calvet
  • 30 篇 c. amelung
  • 30 篇 a. grummer
  • 30 篇 k. j. r. cormier
  • 30 篇 n. orlando
  • 30 篇 c. gumpert
  • 30 篇 f. a. förster
  • 30 篇 h. a. gordon
  • 30 篇 y. tayalati
  • 30 篇 g. spigo
  • 30 篇 v. chiarella

语言

  • 546 篇 英文
  • 113 篇 其他
  • 5 篇 中文
检索条件"机构=Key Laboratory of Information Security and National Computing Grid"
663 条 记 录,以下是51-60 订阅
排序:
MTRNet: An Efficient Hybrid Network Model for Surface Defect Detection of Sheet Metal  36
MTRNet: An Efficient Hybrid Network Model for Surface Defect...
收藏 引用
36th International Conference on Software Engineering and Knowledge Engineering, SEKE 2024
作者: Hao, Huijuan Zhu, Sijian Chen, Yu Yi, Changle Zhao, Hongge Feng, Yue Yang, Rong Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Addressing the challenges posed by the insufficient computational power of low-spec devices to achieve the inference efficiency of prevailing deep learning models, alongside the variability in type and shape within in... 详细信息
来源: 评论
An adaptive time-convolutional network online prediction method for ocean observation data  36
An adaptive time-convolutional network online prediction met...
收藏 引用
36th International Conference on Software Engineering and Knowledge Engineering, SEKE 2024
作者: Li, Enjing Li, Xiang Zhao, Zhigang Wu, Lu Wang, Yinglong Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Deep learning is particularly important in the field of time series data analysis, and has been applied to tasks such as marine data prediction. However, there is a’concept drift’ problem in marine observation data,... 详细信息
来源: 评论
A novel firmware secure transmission scheme based on SM2 threshold key agreement algorithm
A novel firmware secure transmission scheme based on SM2 thr...
收藏 引用
2023 International Conference on Computer Graphics, Artificial Intelligence, and Data Processing, ICCAID 2023
作者: Wang, Kun Gao, Shaofeng Chen, Xinze Fu, Yong Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
During the process of embedded firmware upgrade, to protect the security of the firmware during transmission, this paper proposes an improved firmware transmission scheme based on the combination of the SM2 threshold ... 详细信息
来源: 评论
Entity-centered Cross-document Relation Extraction
Entity-centered Cross-document Relation Extraction
收藏 引用
2022 Conference on Empirical Methods in Natural Language Processing, EMNLP 2022
作者: Wang, Fengqi Li, Fei Fei, Hao Li, Jingye Wu, Shengqiong Su, Fangfang Shi, Wenxuan Ji, Donghong Cai, Bo Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University China School of Computing National University of Singapore Singapore
Relation Extraction (RE) is a fundamental task of information extraction, which has attracted a large amount of research attention. Previous studies focus on extracting the relations within a sentence or document, whi... 详细信息
来源: 评论
A Patent Fast Recommendation Algorithm Based on User Requirements Combined with an Inverted Table
A Patent Fast Recommendation Algorithm Based on User Require...
收藏 引用
2024 lEEE International Conference on Advanced information, Mechanical Engineering, Robotics and Automation, AIMERA 2024
作者: Zheng, Wan Ding, Qingyan Li, Na Pan, Yu Dong, Xuecheng Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
Patent recommendation has always been an essential service for the innovation and development of all walks of life. The matching of demand and patent information can enable enterprises to quickly obtain the innovation... 详细信息
来源: 评论
Joint Automatic Speech Recognition And Structure Learning For Better Speech Understanding
Joint Automatic Speech Recognition And Structure Learning Fo...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Hu, Jiliang Li, Zuchao Shen, Mengjia Ai, Haojun Li, Sheng Zhang, Jun Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Wuhan China School of Computer Science Wuhan University Wuhan China Wuhan Second Ship Design and Research Institute Wuhan China National Institute of Information and Communications Technology Japan
Spoken language understanding (SLU) is a structure prediction task in the field of speech. Recently, many works on SLU that treat it as a sequence-to-sequence task have achieved great success. However, This method is ... 详细信息
来源: 评论
A Robust key Exchange and Tamper-Resistant Protocol for HAN and NAN Networks in Smart grids
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 21394-21403页
作者: Faizan Ayub, Muhammad Li, Xiong Mahmood, Khalid Shamshad, Salman Kumar Das, Ashok Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Douliu64002 Taiwan The University of Lahore Department of Software Engineering Lahore54590 Pakistan International Institute of Information Technology Hyderabad Center for Security Theory and Algorithmic Research Hyderabad500032 India Korea University College of Informatics Department of Computer Science and Engineering Seoul02841 Korea Republic of Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250353 China
Smart grids (SGs) rely on home area networks (HANs) and neighborhood area networks (NANs) to ensure efficient power distribution, real-time monitoring, and seamless communication between smart devices. Despite these a... 详细信息
来源: 评论
NumbOD: A Spatial-Frequency Fusion Attack Against Object Detectors  39
NumbOD: A Spatial-Frequency Fusion Attack Against Object Det...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Zhou, Ziqi Li, Bowen Song, Yufei Yu, Zhifei Hu, Shengshan Wan, Wei Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
With the advancement of deep learning, object detectors (ODs) with various architectures have achieved significant success in complex scenarios like autonomous driving. Previous adversarial attacks against ODs have be... 详细信息
来源: 评论
Research on Static Reverse Analysis Technology for security Detection of Power Industrial Control Software  3
Research on Static Reverse Analysis Technology for Security ...
收藏 引用
3rd International Conference on Intelligent Power and Systems, ICIPS 2023
作者: Chen, Jinshan Yu, Sihang Xie, Xuanxuan Cheng, Yu Tang, Zhijun Deng, Chaoping Li, June State Grid Fujian Electric Power Research Institute Fujian Fuzhou350000 China Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Hubei Wuhan430072 China
In the power industrial control software, defects of software and possible pre-implanted backdoors and malicious codes are important factors that threaten the security of the power industrial control system. The compl... 详细信息
来源: 评论
A firmware upgrade solution based on hardware unique ID and SM4 cryptographic algorithm
A firmware upgrade solution based on hardware unique ID and ...
收藏 引用
2023 International Conference on Computer Graphics, Artificial Intelligence, and Data Processing, ICCAID 2023
作者: Gao, Shaofeng Wang, Kun Chen, Xinze Fu, Yong Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan250000 China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan250000 China
This article presents and implements a firmware upgrade solution for embedded systems, which aims to address the vulnerability of using the same file that can be easily copied or stolen. When upgrading firmware, a txt... 详细信息
来源: 评论