咨询与建议

限定检索结果

文献类型

  • 2,000 篇 会议
  • 1,550 篇 期刊文献

馆藏范围

  • 3,550 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,327 篇 工学
    • 1,767 篇 计算机科学与技术...
    • 1,442 篇 软件工程
    • 578 篇 信息与通信工程
    • 316 篇 电气工程
    • 249 篇 控制科学与工程
    • 231 篇 生物工程
    • 225 篇 电子科学与技术(可...
    • 167 篇 网络空间安全
    • 136 篇 机械工程
    • 112 篇 光学工程
    • 95 篇 生物医学工程(可授...
    • 86 篇 化学工程与技术
    • 83 篇 安全科学与工程
    • 80 篇 仪器科学与技术
    • 79 篇 交通运输工程
    • 61 篇 建筑学
    • 59 篇 动力工程及工程热...
    • 58 篇 材料科学与工程(可...
  • 1,054 篇 理学
    • 601 篇 数学
    • 251 篇 物理学
    • 247 篇 生物学
    • 206 篇 统计学(可授理学、...
    • 101 篇 系统科学
    • 84 篇 化学
  • 586 篇 管理学
    • 323 篇 管理科学与工程(可...
    • 298 篇 图书情报与档案管...
    • 95 篇 工商管理
  • 118 篇 法学
    • 70 篇 社会学
  • 80 篇 医学
    • 70 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 43 篇 经济学
  • 31 篇 军事学
  • 16 篇 农学
  • 14 篇 教育学
  • 7 篇 艺术学
  • 6 篇 文学

主题

  • 151 篇 feature extracti...
  • 124 篇 semantics
  • 98 篇 accuracy
  • 97 篇 training
  • 93 篇 computational mo...
  • 91 篇 deep learning
  • 73 篇 federated learni...
  • 71 篇 privacy
  • 66 篇 cryptography
  • 63 篇 data models
  • 57 篇 authentication
  • 55 篇 protocols
  • 51 篇 security
  • 50 篇 data privacy
  • 49 篇 neural networks
  • 48 篇 object detection
  • 47 篇 information secu...
  • 47 篇 cloud computing
  • 45 篇 robustness
  • 44 篇 machine learning

机构

  • 219 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 93 篇 university of ch...
  • 80 篇 school of comput...
  • 80 篇 key laboratory o...
  • 64 篇 information secu...
  • 62 篇 cas key laborato...
  • 62 篇 school of cyber ...
  • 58 篇 guangdong provin...
  • 52 篇 tianjin key labo...
  • 50 篇 shandong fundame...
  • 48 篇 network and data...
  • 48 篇 state key labora...
  • 46 篇 shandong enginee...
  • 46 篇 peng cheng labor...
  • 45 篇 college of compu...
  • 45 篇 school of comput...
  • 44 篇 state key labora...
  • 42 篇 shandong provinc...
  • 42 篇 institute of inf...

作者

  • 97 篇 cheng xueqi
  • 47 篇 shen huawei
  • 46 篇 guo jiafeng
  • 42 篇 zheng wei-shi
  • 33 篇 yixian yang
  • 33 篇 xie xiaohua
  • 32 篇 huang qingming
  • 32 篇 cao xiaochun
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 24 篇 xinhong hei
  • 23 篇 jin hai
  • 21 篇 lai jianhuang
  • 21 篇 meng deyu
  • 21 篇 wang yichuan
  • 20 篇 xiaoming wu
  • 20 篇 shen yulong

语言

  • 3,284 篇 英文
  • 190 篇 其他
  • 82 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3550 条 记 录,以下是11-20 订阅
排序:
A Technique for Ensured Cross Chain IBC Transactions Using TPM  2
A Technique for Ensured Cross Chain IBC Transactions Using T...
收藏 引用
2nd International Conference on Big Data and Privacy computing, BDPC 2024
作者: Wang, YiChuan Yan, YiLiang Liu, XiaoXue Gao, Wen Wang, ZiYan School of Computer Science and Engineering Xi'an University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China
Cross chain contact across several blockchains becomes increasingly significant in importance with the increased use of blockchain technology. However, security cannot be assured when producing equivalent outputs thro... 详细信息
来源: 评论
Locally differentially private high-dimensional data synthesis
收藏 引用
Science China(Information Sciences) 2023年 第1期66卷 25-42页
作者: Xue CHEN Cheng WANG Qing YANG Teng HU Changjun JIANG Key Laboratory of Embedded System and Service Computing (Tongji University) Ministry of Education National (Province-Ministry Joint) Collaborative Innovation Center for Financial Network Security Tongji University
In local differential privacy(LDP), a challenging problem is the ability to generate highdimensional data while efficiently capturing the correlation between attributes in a dataset. Existing solutions for low-dimensi... 详细信息
来源: 评论
A Chain-of-Task Framework for Instruction Tuning of LLMs Based on Chinese Grammatical Error Correction  31
A Chain-of-Task Framework for Instruction Tuning of LLMs Bas...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Liu, Xinpeng Xu, Bing Yang, Muyun Cao, Hailong Zhu, Conghui Zhao, Tiejun Lu, Wenpeng Faculty of Computing Harbin Institute of Technology Harbin China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology Shandong Academy of Sciences Jinan China
Over-correction is a critical issue for large language models (LLMs) to address Grammatical Error Correction (GEC) task, esp. for Chinese. This paper proposes a Chain-of-Task (CoTask) framework to reduce over-correcti... 详细信息
来源: 评论
Threat Model and Defense Scheme for Side-Channel Attacks in Client-Side Deduplication
收藏 引用
Tsinghua Science and technology 2023年 第1期28卷 1-12页
作者: Guanxiong Ha Hang Chen Chunfu Jia Mingyue Li College of Cyber Science Nankai UniversityTianjin 300350China Tianjin Key Laboratory of Network and Data Security Technology Tianjin 300350China
In cloud storage,client-side deduplication is widely used to reduce storage and communication *** client-side deduplication,if the cloud server detects that the user’s outsourced data have been stored,then clients wi... 详细信息
来源: 评论
Efficient Multi-keyword Searchable and Verifiable Data Sharing for Cloud-Edge Collaboration Intelligent Transportation Systems
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 15869-15882页
作者: Liu, Peng He, Qian Chen, Yiting Jiang, Shan Guilin University of Electronic Technology Department of Guangxi Key Laboratory of Cryptograph and Information Security Guilin541004 China Guilin University of Electronic Technology Guangxi Key Laboratory of Cryptograph and Information Security Guilin541004 China The Hong Kong Polytechnic University Department of Computing Hong Kong
Intelligent transportation systems (ITS) are essential for the development of future smart cities. They can improve traffic management, mitigate urban congestion, and provide extensive social services by disseminating... 详细信息
来源: 评论
Fusion of Time-Frequency Features in Contrastive Learning for Shipboard Wind Speed Correction
收藏 引用
Journal of Ocean University of China 2025年 第2期24卷 377-386页
作者: SONG Jian HUANG Meng LI Xiang ZHANG Zhenqiang WANG Chunxiao ZHAO Zhigang Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science Center(National Supercomputer Center in Jinan)Qilu University of Technology(Shandong Academy of Sciences)Jinan 250000China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer ScienceJinan 250000China
Accurate wind speed measurements on maritime vessels are crucial for weather forecasting,sea state prediction,and safe ***,vessel motion and challenging environmental conditions often affect measurement *** address th... 详细信息
来源: 评论
Evaluation Method of Object Control Capability for Children Based on Nonlinear Dynamics  23
Evaluation Method of Object Control Capability for Children ...
收藏 引用
3rd International Conference on Bioinformatics and Intelligent computing, BIC 2023
作者: Wang, Huaijun Li, Chao Zhang, Dongsheng Li, Junhuai Key Laboratory of Network Computing and Security Technology School of Computer Science and Engineering Xi an University of Technology Xi'an China
DCD (Developmental Coordination Disorder) has become a global problem, and several studies have shown that early detection and intervention are important for the prevention and treatment of DCD in children. To address... 详细信息
来源: 评论
Enhancing Stance Detection on Social Media via Core Views Discovery  27
Enhancing Stance Detection on Social Media via Core Views Di...
收藏 引用
27th European Conference on Artificial Intelligence, ECAI 2024
作者: Yan, Yu Shen, Yinghan Liu, Teli Jiang, Xuhui Yin, Dechun School of Information and Network Security People Public Security University of China China Institute of Computing Technology Chinese Academy of Sciences China Key Laboratory of AI Safety Institute of Computing Technology Chinese Academy of Sciences China
Stance detection aims to identify the expressed attitude towards a target from the text, which is significant for learning public cognition from social media. The short and implicit nature of social media users' e... 详细信息
来源: 评论
DP-DID: A Dynamic and Proactive Decentralized Identity System
收藏 引用
IEEE Transactions on Information Forensics and security 2025年 20卷 4999-5014页
作者: Yin, Jie Xiao, Yang Chen, Qian Lim, Yong zhi Liu, Xuefeng Pei, Qingqi Zhou, Jianying Xidian University State Key Laboratory of Integrated Services Network Xi’an710071 China Singapore University of Technology and Design Department of Information Systems Technology and Design Tampines 487372 Singapore Xidian University State Key Laboratory of Integrated Services Network Shaanxi Key Laboratory of Blockchain and Secure Computing Xi’an710071 China
Decentralized identity (DID) is a transformative paradigm that leverages blockchain, decentralized identifiers and verifiable credentials (VCs) to enable self-sovereign and decentralized identity management with myria... 详细信息
来源: 评论
Never Lost keys:A Novel key Generation Scheme Based on Motor Imagery EEG in End-Edge-Cloud System
收藏 引用
China Communications 2022年 第7期19卷 172-184页
作者: Yichuan Wang Dan Wu Xiaoxue Liu Xinhong Hei School of computer science and Engineering Xi’an University of TechnologyXi’an 710048China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an 710048China
Biometric key is generated from the user’s unique biometric features,and can effectively solve the security problems in ***,the current prevailing biometric key generation techniques such as fingerprint recognition a... 详细信息
来源: 评论