咨询与建议

限定检索结果

文献类型

  • 2,087 篇 会议
  • 1,620 篇 期刊文献

馆藏范围

  • 3,707 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,418 篇 工学
    • 1,833 篇 计算机科学与技术...
    • 1,472 篇 软件工程
    • 594 篇 信息与通信工程
    • 340 篇 电气工程
    • 272 篇 控制科学与工程
    • 242 篇 电子科学与技术(可...
    • 233 篇 生物工程
    • 177 篇 网络空间安全
    • 155 篇 机械工程
    • 113 篇 光学工程
    • 96 篇 生物医学工程(可授...
    • 91 篇 化学工程与技术
    • 86 篇 仪器科学与技术
    • 86 篇 安全科学与工程
    • 78 篇 交通运输工程
    • 69 篇 材料科学与工程(可...
    • 64 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,083 篇 理学
    • 612 篇 数学
    • 268 篇 物理学
    • 252 篇 生物学
    • 207 篇 统计学(可授理学、...
    • 100 篇 系统科学
    • 91 篇 化学
  • 606 篇 管理学
    • 333 篇 管理科学与工程(可...
    • 301 篇 图书情报与档案管...
    • 101 篇 工商管理
  • 121 篇 法学
    • 72 篇 社会学
  • 82 篇 医学
    • 72 篇 临床医学
    • 66 篇 基础医学(可授医学...
  • 45 篇 经济学
  • 34 篇 军事学
  • 19 篇 农学
  • 18 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 168 篇 feature extracti...
  • 129 篇 semantics
  • 127 篇 accuracy
  • 112 篇 training
  • 110 篇 computational mo...
  • 103 篇 federated learni...
  • 98 篇 deep learning
  • 80 篇 privacy
  • 73 篇 data models
  • 69 篇 cryptography
  • 62 篇 authentication
  • 61 篇 security
  • 60 篇 robustness
  • 59 篇 data privacy
  • 59 篇 protocols
  • 52 篇 neural networks
  • 51 篇 object detection
  • 51 篇 adaptation model...
  • 50 篇 cloud computing
  • 48 篇 data mining

机构

  • 278 篇 key laboratory o...
  • 207 篇 shandong provinc...
  • 98 篇 university of ch...
  • 83 篇 school of comput...
  • 82 篇 key laboratory o...
  • 67 篇 shandong provinc...
  • 66 篇 school of cyber ...
  • 64 篇 information secu...
  • 63 篇 cas key laborato...
  • 60 篇 guangdong provin...
  • 53 篇 shandong enginee...
  • 51 篇 tianjin key labo...
  • 49 篇 network and data...
  • 49 篇 state key labora...
  • 47 篇 peng cheng labor...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 46 篇 school of comput...
  • 46 篇 shandong provinc...
  • 44 篇 institute of inf...

作者

  • 101 篇 cheng xueqi
  • 50 篇 guo jiafeng
  • 47 篇 shen huawei
  • 43 篇 zheng wei-shi
  • 33 篇 huang qingming
  • 33 篇 yixian yang
  • 33 篇 xie xiaohua
  • 33 篇 cao xiaochun
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 27 篇 jin xiaolong
  • 27 篇 xu qianqian
  • 25 篇 xiaoming wu
  • 25 篇 jin hai
  • 24 篇 xinhong hei
  • 24 篇 li wei
  • 21 篇 hu shengshan
  • 21 篇 lai jianhuang
  • 20 篇 yang zhiyong
  • 20 篇 shen yulong

语言

  • 3,242 篇 英文
  • 390 篇 其他
  • 86 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3707 条 记 录,以下是91-100 订阅
Diffusion Model with Multi-layer Wavelet Transform for Low-Light Image Enhancement
Diffusion Model with Multi-layer Wavelet Transform for Low-L...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Haiyan Jin Jing Wang Fengyuan Zuo Haonan Su Zhaolin Xiao Bin Wang Yuanlin Zhang Xi’an University of Technology China Shaanxi Key Laboratory for Network Computing and Security Technology China
Low-light image enhancement methods based on diffusion models, though effective in improving image quality, often overrely on noise sensitivity and neglect the reconstruction deviations due to the naive up- and down-s... 详细信息
来源: 评论
LCLB: Low Cross-Chain Transaction Ratio and Load Balancing for Blockchain Sharding  6
LCLB: Low Cross-Chain Transaction Ratio and Load Balancing f...
收藏 引用
6th International Conference on Robotics, Intelligent Control and Artificial Intelligence, RICAI 2024
作者: Wang, Yu Wu, Xiaoming Yuan, Qile Dong, Yunfeng Liu, Xiangzhi Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
As blockchain technology becomes widely applied, handling high volumes of transactions has become a critical challenge. Sharding has emerged as an effective solution to enhance the throughput of blockchain systems. Ye... 详细信息
来源: 评论
Multi-Label Text Classification for Judicial Texts via Dual Graph and Label Feature Fusion  10
Multi-Label Text Classification for Judicial Texts via Dual ...
收藏 引用
10th IEEE Smart World Congress, SWC 2024
作者: Gu, Qiliang Lu, Qin Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
The legal judgement prediction (LJP) of judicial texts represents a multi-label text classification (MLTC) problem, which in turn involves three distinct tasks: the prediction of charges, legal articles, and terms of ... 详细信息
来源: 评论
BTP-CAResNet: An Encrypted Traffic Classification Method Based on Byte Transfer Probability and Coordinate Attention Mechanism
BTP-CAResNet: An Encrypted Traffic Classification Method Bas...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Li, Junhao Shi, Huiling Zhang, Wei Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
With the extensive application of network traffic encryption technology, the accurate and efficient classification of encrypted traffic has become a critical need for network management. Deep learning has become the p... 详细信息
来源: 评论
RFSD-YOLO: An Enhanced X-Ray Object Detection Model for Prohibited Items
RFSD-YOLO: An Enhanced X-Ray Object Detection Model for Proh...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Kong, Xiaotong Li, Aimin Li, Wenqiang Li, Zhiyao Zhang, Yuechen Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
X-ray image detection is essential for ensuring public safety, but traditional methods rely heavily on human analysis and are relatively inefficient. To address this issue, this paper proposes a new object detection m... 详细信息
来源: 评论
CB-YOLO: A Small Object Detection Algorithm for Industrial Scenarios
CB-YOLO: A Small Object Detection Algorithm for Industrial S...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Chen, Hao Wu, Xiaoming Su, Zhanzhi Zhao, Ying Dong, Yunfeng Liu, Xiangzhi Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
In certain specific industrial scenarios, smoking and cellphone usage are strictly prohibited behaviors. In these scenarios, it is crucial to rapidly and accurately detect smoking and cell phone usage, and promptly is... 详细信息
来源: 评论
Identity-Based Encryption with Equality Test Supporting Accountable Authorization in Cloud computing
收藏 引用
计算机科学技术学报(英文版) 2025年 第1期40卷 215-228页
作者: 赵臻 王保仓 高雯 2Henan Key Laboratory of Network Cryptography Technology Zhengzhou 453499 China 1School of Cyber Engineering Xidian University Xi’an 710071 China 3School of Cyberspace Security Xi’an University of Posts and Telecommunications Xi’an 710121 China
Identity-based encryption with equality test(IBEET)is proposed to check whether the underlying messages of ciphertexts,even those encrypted with different public keys,are the same or not without *** people pre-fer to ... 详细信息
来源: 评论
CroPrompt: Cross-task Interactive Prompting for Zero-shot Spoken Language Understanding
CroPrompt: Cross-task Interactive Prompting for Zero-shot Sp...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Qin, Libo Wei, Fuxuan Chen, Qiguang Zhou, Jingxuan Huang, Shijue Si, Jiasheng Lu, Wenpeng Che, Wanxiang School of Computer Science and Engineering Central South University China Key Laboratory of Data Intelligence and Advanced Computing in Provincial Universities Soochow University China Research Center for Social Computing and Information Retrieval Harbin Institute of Technology China Harbin Institute of Technology Shenzhen China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology Shandong Academy of Sciences China
Slot filling and intent detection are two highly correlated tasks in spoken language understanding (SLU). Recent SLU research attempts to explore zero-shot prompting techniques in large language models to alleviate th...
来源: 评论
C-privacy:A social relationship-driven image customization sharing method in cyber-physical networks
收藏 引用
Digital Communications and networks 2025年 第2期11卷 563-573页
作者: Dapeng Wu Jian Liu Yangliang Wan Zhigang Yang Ruyan Wang Xinqi Lin School of Communications and Information Engineering Chongqing University of Posts and TelecommunicationsChongqing 400065China Aerospace Tianmu Satellite Technology Company Limited Chongqing401332China School of Cyber Security and Information Law Chongqing University of Posts and TelecommunicationsChongqing400065China College of Computer and Cyber Security Fujian Normal UniversityFujian350117China The Advanced Network and Intelligent Connection Technology Key Laboratory Chongqing400065China Key Laboratory of Ubiquitous Sensing and Networking Chongqing400065China
Cyber-Physical networks(CPN)are comprehensive systems that integrate information and physical domains,and are widely used in various fields such as online social networking,smart grids,and the Internet of Vehicles(IoV... 详细信息
来源: 评论
A Privacy Preservation Method for Attributed Social network Based on Negative Representation of Information
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第7期140卷 1045-1075页
作者: Hao Jiang Yuerong Liao Dongdong Zhao Wenjian Luo Xingyi Zhang Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education School of Computer Science and TechnologyAnhui UniversityHefei230601China Chongqing Research Institute School of Computer Science and Artificial IntelligenceWuhan University of TechnologyWuhan430070China Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies School of Computer Science and TechnologyHarbin Institute of TechnologyShenzhen518055China
Due to the presence of a large amount of personal sensitive information in social networks,privacy preservation issues in social networks have attracted the attention of many *** by the self-nonself discrimination par... 详细信息
来源: 评论