咨询与建议

限定检索结果

文献类型

  • 2,101 篇 会议
  • 1,612 篇 期刊文献

馆藏范围

  • 3,713 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,413 篇 工学
    • 1,834 篇 计算机科学与技术...
    • 1,467 篇 软件工程
    • 603 篇 信息与通信工程
    • 346 篇 电气工程
    • 275 篇 控制科学与工程
    • 240 篇 电子科学与技术(可...
    • 232 篇 生物工程
    • 182 篇 网络空间安全
    • 141 篇 机械工程
    • 113 篇 光学工程
    • 94 篇 生物医学工程(可授...
    • 94 篇 安全科学与工程
    • 89 篇 交通运输工程
    • 88 篇 化学工程与技术
    • 83 篇 仪器科学与技术
    • 66 篇 材料科学与工程(可...
    • 61 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,089 篇 理学
    • 623 篇 数学
    • 263 篇 物理学
    • 250 篇 生物学
    • 207 篇 统计学(可授理学、...
    • 101 篇 系统科学
    • 90 篇 化学
  • 606 篇 管理学
    • 336 篇 管理科学与工程(可...
    • 306 篇 图书情报与档案管...
    • 100 篇 工商管理
  • 118 篇 法学
    • 72 篇 社会学
  • 80 篇 医学
    • 70 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 43 篇 经济学
  • 31 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 165 篇 feature extracti...
  • 129 篇 semantics
  • 125 篇 accuracy
  • 109 篇 training
  • 106 篇 computational mo...
  • 102 篇 federated learni...
  • 98 篇 deep learning
  • 80 篇 privacy
  • 72 篇 data models
  • 68 篇 cryptography
  • 62 篇 authentication
  • 61 篇 security
  • 59 篇 data privacy
  • 59 篇 robustness
  • 58 篇 protocols
  • 53 篇 object detection
  • 52 篇 neural networks
  • 52 篇 cloud computing
  • 50 篇 adaptation model...
  • 47 篇 optimization

机构

  • 271 篇 key laboratory o...
  • 206 篇 shandong provinc...
  • 97 篇 university of ch...
  • 83 篇 school of comput...
  • 83 篇 key laboratory o...
  • 66 篇 school of cyber ...
  • 65 篇 shandong provinc...
  • 64 篇 cas key laborato...
  • 64 篇 information secu...
  • 60 篇 guangdong provin...
  • 52 篇 shandong enginee...
  • 52 篇 tianjin key labo...
  • 50 篇 network and data...
  • 50 篇 shandong fundame...
  • 49 篇 state key labora...
  • 47 篇 peng cheng labor...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 46 篇 school of comput...
  • 44 篇 institute of inf...

作者

  • 100 篇 cheng xueqi
  • 49 篇 guo jiafeng
  • 47 篇 shen huawei
  • 43 篇 zheng wei-shi
  • 34 篇 xie xiaohua
  • 33 篇 huang qingming
  • 33 篇 yixian yang
  • 33 篇 cao xiaochun
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 25 篇 jin hai
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 21 篇 hu shengshan
  • 21 篇 lai jianhuang
  • 21 篇 wang yichuan
  • 20 篇 yang zhiyong

语言

  • 2,977 篇 英文
  • 661 篇 其他
  • 87 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3713 条 记 录,以下是2271-2280 订阅
排序:
Triple-view Learning for Predicting Antibiotic Resistance Genes
Triple-view Learning for Predicting Antibiotic Resistance Ge...
收藏 引用
2021 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2021
作者: Luo, Shujie Wu, Haifang Zhao, Weizhong Jiang, Xingpeng He, Tingting Central China Normal University Hubei Provincial Key Laboratory of Artificial Intelligence and Smart Learning Wuhan430079 China School of Computer Central China Normal University Hubei Wuhan430079 China National Language Resources Monitoring and Research Center for Network Media Central China Normal University Hubei Wuhan430079 China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin541004 China Guangxi Key Lab of Multi-source Information Mining and Security Guangxi Normal University Guilin541004 China
With the increasing resistance of bacteria to antibiotics, the problem of antibiotic resistance has become a major challenge in healthcare. Therefore, the accurate identification of antibiotic resistance genes (ARGs) ... 详细信息
来源: 评论
KnowCoder-X: Boosting Multilingual Information Extraction via Code
arXiv
收藏 引用
arXiv 2024年
作者: Zuo, Yuxin Jiang, Wenxuan Liu, Wenxuan Li, Zixuan Bai, Long Wang, Hanbin Zeng, Yutao Jin, Xiaolong Guo, Jiafeng Cheng, Xueqi Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China School of Software Northeastern University United States School of Software Peking University China
Empirical evidence indicates that LLMs exhibit spontaneous cross-lingual alignment. However, although LLMs show promising cross-lingual alignment in IE, a significant imbalance across languages persists, highlighting ... 详细信息
来源: 评论
Multimodal data fusion algorithm applied to robots  2
Multimodal data fusion algorithm applied to robots
收藏 引用
2019 2nd International Conference on Computer Information Science and Artificial Intelligence, CISAI 2019
作者: Zhang, Xin Feng, Zhiquan Tian, Jinglan Yang, Xiaohui College of Information Science and Engineering University of Jinan Jinan Shandong250022 China Shandong Provincial Key Laboratory of Network Environment Intelligent Computing Technology University of Jinan Jinan Shandong250022 China
In recent years, the use of multimodal human-computer interaction technology to achieve the enhancement of human intelligence has become a new topic in human-computer interaction research. When the robot can't rea... 详细信息
来源: 评论
Cache Design Effect on Microarchitecture security: A Contrast between Xuantie-910 and BOOM
Cache Design Effect on Microarchitecture Security: A Contras...
收藏 引用
IEEE International Conference on Trust, security and Privacy in computing and Communications (TrustCom)
作者: Zhe Zhou Xiaoyu Cheng Yang Sun Fang Jiang Fei Tong Yuxing Mao Ruilin Wang Southeast University Nanjing China Purple Mountain Laboratories Nanjing China School of Electrical Engineering Chongqing University Chongqin China State Key Laboratory of Power Transmission Equipment & System Security and New Technology Chongqing University Chongqing China School of Computing Newcastle University United Kingdom
Modern processors make use of optimization techniques such as cache and speculation mechanisms to greatly improve performance. But recent research has found that these techniques can also be exploited by attackers to ... 详细信息
来源: 评论
Deep learning-based forgery attack on document images
arXiv
收藏 引用
arXiv 2021年
作者: Zhao, Lin Chen, Changsheng Huang, Jiwu the Guangdong Key Laboratory of Intelligent Information Processing Shenzhen Key Laboratory of Media Security National Engineering Laboratory for Big Data System Computing Technology College of Electronics and Information Engineering Shenzhen University Shenzhen China Shenzhen Institute of Artificial Intelligence and Robotics for Society China
With the ongoing popularization of online services, the digital document images have been used in various applications. Meanwhile, there have emerged some deep learning-based text editing algorithms which alter the te... 详细信息
来源: 评论
CubeFlow: Money laundering detection with coupled tensors
arXiv
收藏 引用
arXiv 2021年
作者: Sun, Xiaobing Zhang, Jiabao Zhao, Qiming Liu, Shenghua Chen, Jinglei Zhuang, Ruoyu Shen, Huawei Cheng, Xueqi CAS Key Laboratory of Network Data Science and Technology Insititute of Computing Technology Chinese Academy of Sciences China University of Chinese Academy of Sciences Beijing China China Construction Bank Fintech China
Money laundering (ML) is the behavior to conceal the source of money achieved by illegitimate activities, and always be a fast process involving frequent and chained transactions. How can we detect ML and fraudulent a... 详细信息
来源: 评论
Real-Time multimodal emotion recognition system based on elderly accompanying robot  2
Real-Time multimodal emotion recognition system based on eld...
收藏 引用
2019 2nd International Conference on Computer Information Science and Artificial Intelligence, CISAI 2019
作者: Dou, Shaosong Feng, Zhiquan Yang, Xiaohui Tian, Jinglan College of Information Science and Engineering University of Jinan Jinan Shandong250022 China Shandong Provincial Key Laboratory of Network Environment Intelligent Computing Technology University of Jinan Jinan Shandong250022 China
In recent years, people have been paying more attention to the impact of technological development on human emotion recognition. At the same time, China has become the country with the most elderly population in the w... 详细信息
来源: 评论
A Review of Multimodal Explainable Artificial Intelligence: Past, Present and Future
arXiv
收藏 引用
arXiv 2024年
作者: Sun, Shilin An, Wenbin Tian, Feng Nan, Fang Liu, Qidong Liu, Jun Shah, Nazaraf Chen, Ping School of Computer Science and Technology Xi’an Jiaotong University Xi’an710049 China Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an710049 China Faculty of Electronic and Information Engineering Xi’an Jiaotong University Xi’an710049 China Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Xi’an Jiaotong University Xi’an710049 China Institute for Future Transport and Cities Coventry University Priory Street CoventryCV1 5FB United Kingdom Department of Engineering University of Massachusetts Boston BostonMA02125 United States
Artificial intelligence (AI) has rapidly developed through advancements in computational power and the growth of massive datasets. However, this progress has also heightened challenges in interpreting the "black-... 详细信息
来源: 评论
Domain generalization for document authentication against practical recapturing attacks
arXiv
收藏 引用
arXiv 2021年
作者: Chen, Changsheng Zhang, Shuzheng Lan, Fengbo Huang, Jiwu The Guangdong Key Laboratory of Intelligent Information Processing Shenzhen Key Laboratory of Media Security National Engineering Laboratory for Big Data System Computing Technology College of Electronics and Information Engineering Shenzhen University Shenzhen China Shenzhen Institute of Artificial Intelligence and Robotics for Society China
Recapturing attack can be employed as a simple but effective anti-forensic tool for digital document images. Inspired by the document inspection process that compares a questioned document against a reference sample, ... 详细信息
来源: 评论
A Fault Detection Method for Tree Contact Single-Phase-To-Ground Fault
SSRN
收藏 引用
SSRN 2023年
作者: Wu, Juping Xv, Huikai Jin, Min Gong, Guoliang Chen, Gang Mao, Wenyu Lu, Huaxiang Chen, Tianxiang Institute of Semiconductors CAS Beijing100083 China University of Chinese Academy of Sciences Beijing China Semiconductor Neural Network Intelligent Perception and Computing Technology Beijing Key Laboratory Beijing China Collage of Microelectronics University of Chinese Academy of Sciences Beijing China Materials and Optoelectronics Research Center University of Chinese Academy of Sciences Beijing China Tianjin University of Science and Technology Tianjin300457 China College of Nuclear Technology and Automation Engineering Chengdu University of Technology Chengdu610059 China
High impedance fault(HIF), especially tree contact single-phase-to-ground fault(TSF), often occurs in resonant grounding systems and are difficult to detect. Therefore, there is an urgent need for an effective TSF det... 详细信息
来源: 评论