咨询与建议

限定检索结果

文献类型

  • 2,101 篇 会议
  • 1,612 篇 期刊文献

馆藏范围

  • 3,713 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,413 篇 工学
    • 1,834 篇 计算机科学与技术...
    • 1,467 篇 软件工程
    • 603 篇 信息与通信工程
    • 346 篇 电气工程
    • 275 篇 控制科学与工程
    • 240 篇 电子科学与技术(可...
    • 232 篇 生物工程
    • 182 篇 网络空间安全
    • 141 篇 机械工程
    • 113 篇 光学工程
    • 94 篇 生物医学工程(可授...
    • 94 篇 安全科学与工程
    • 89 篇 交通运输工程
    • 88 篇 化学工程与技术
    • 83 篇 仪器科学与技术
    • 66 篇 材料科学与工程(可...
    • 61 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,089 篇 理学
    • 623 篇 数学
    • 263 篇 物理学
    • 250 篇 生物学
    • 207 篇 统计学(可授理学、...
    • 101 篇 系统科学
    • 90 篇 化学
  • 606 篇 管理学
    • 336 篇 管理科学与工程(可...
    • 306 篇 图书情报与档案管...
    • 100 篇 工商管理
  • 118 篇 法学
    • 72 篇 社会学
  • 80 篇 医学
    • 70 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 43 篇 经济学
  • 31 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 165 篇 feature extracti...
  • 129 篇 semantics
  • 125 篇 accuracy
  • 109 篇 training
  • 106 篇 computational mo...
  • 102 篇 federated learni...
  • 98 篇 deep learning
  • 80 篇 privacy
  • 72 篇 data models
  • 68 篇 cryptography
  • 62 篇 authentication
  • 61 篇 security
  • 59 篇 data privacy
  • 59 篇 robustness
  • 58 篇 protocols
  • 53 篇 object detection
  • 52 篇 neural networks
  • 52 篇 cloud computing
  • 50 篇 adaptation model...
  • 47 篇 optimization

机构

  • 271 篇 key laboratory o...
  • 206 篇 shandong provinc...
  • 97 篇 university of ch...
  • 83 篇 school of comput...
  • 83 篇 key laboratory o...
  • 66 篇 school of cyber ...
  • 65 篇 shandong provinc...
  • 64 篇 cas key laborato...
  • 64 篇 information secu...
  • 60 篇 guangdong provin...
  • 52 篇 shandong enginee...
  • 52 篇 tianjin key labo...
  • 50 篇 network and data...
  • 50 篇 shandong fundame...
  • 49 篇 state key labora...
  • 47 篇 peng cheng labor...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 46 篇 school of comput...
  • 44 篇 institute of inf...

作者

  • 100 篇 cheng xueqi
  • 49 篇 guo jiafeng
  • 47 篇 shen huawei
  • 43 篇 zheng wei-shi
  • 34 篇 xie xiaohua
  • 33 篇 huang qingming
  • 33 篇 yixian yang
  • 33 篇 cao xiaochun
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 25 篇 jin hai
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 21 篇 hu shengshan
  • 21 篇 lai jianhuang
  • 21 篇 wang yichuan
  • 20 篇 yang zhiyong

语言

  • 2,977 篇 英文
  • 661 篇 其他
  • 87 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3713 条 记 录,以下是2291-2300 订阅
排序:
ECAS: an efficient and conditional privacy preserving collision warning system in fog-based vehicular ad hoc networks
收藏 引用
CCF Transactions on networking 2020年 第3期3卷 205-217页
作者: Qin, Zhiguang Li, Yuedi Ye, Xin Zhou, Jin Cao, Minsheng Chen, Dajiang Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Chengdu China Peng Cheng Laboratory Shenzhen China
VANET is a prominent way to provide road security and prevent vehicles from collision by using various methods, such as message dissemination, traffic management, etc. However, the traditional vehicular network faces ...
来源: 评论
Modeling the Trade-off of Privacy Preservation and Activity Recognition on Low-Resolution Images
arXiv
收藏 引用
arXiv 2023年
作者: Wang, Yuntao Kong, Yan Yan, Yukang Cheng, Zirui Wang, Xueyang Yu, Chun Shi, Yuanchun Yi, Xin Xu, Xuhai Patel, Shwetak Key Laboratory of Pervasive Computing Ministry of Education Department of Computer Science and Technology Tsinghua University Beijing China Institute for Network Sciences and Cyberspace Tsinghua University Beijing China Department of Computer Science and Technology Tsinghua University Beijing China Qinghai University Qinghai Xining China Zhongguancun Laboratory Beijing China Information School University of Washington SeattleWA United States Paul G. Allen School of Computer Science and Engineering University of Washington SeattleWA United States
A computer vision system using low-resolution image sensors can provide intelligent services (e.g., activity recognition) but preserve unnecessary visual privacy information from the hardware level. However, preservin... 详细信息
来源: 评论
An Improved CTU-level Rate Control Algorithm Based on Temporal Domain Motion Intensity
An Improved CTU-level Rate Control Algorithm Based on Tempor...
收藏 引用
International Symposium on Communications and Information Technologies (ISCIT)
作者: Shaokang Wang Songlin Sun Jiaqi Zou Ruotong Wu Zhilei Ling Xingtong Liu School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education China Engineering Research Center of Blockchain and Network Convergence Technology Ministry of Education China Department of Electronics and Electrical Engineering University College London London UK Business School Beijing Normal University Beijing China
Rate control (RC) plays a vital role in Versatile Video Coding (VVC) and video transmission. However, the RC algorithm in VVC remains the problem that the process of updating model parameters only considers the impact...
来源: 评论
Graph-Based Terminal Ranking for Sparsification of Interference Coordination Parameters in Ultra-Dense networks  10th
Graph-Based Terminal Ranking for Sparsification of Interfere...
收藏 引用
10th EAI International Conference on Mobile networks and Management, MONAMI 2020
作者: Gou, Junxiang Wang, Lusheng Lin, Hai Peng, Min Ministry of Education School of Computer Science and Information Engineering Key Laboratory of Knowledge Engineering with Big Data Hefei University of Technology Hefei230601 China Ministry of Education School of Cyber Science and Engineering Key Laboratory of Aerospace Information Security and Trusted Computing Wuhan University Wuhan430072 China Anhui Province Key Laboratory of Industry Safety and Emergency Technology Hefei230601 China
In the future mobile communication system, inter-cell interference becomes a serious problem due to the intensive deployment of cells and terminals. Traditional interference coordination schemes take long time for opt... 详细信息
来源: 评论
ImLiDAR: Cross-Sensor Dynamic Message Propagation network for 3D Object Detection
arXiv
收藏 引用
arXiv 2022年
作者: Shen, Yiyang Yu, Rongwei Wu, Peng Xie, Haoran Gong, Lina Qin, Jing Wei, Mingqiang The Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Wuhan China The School of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China The Department of Computing and Decision Sciences Lingnan University Hong Kong Hong Kong The School of Nursing The Polytechnic University of Hong Kong Hong Kong Hong Kong
LiDAR and camera, as two different sensors, supply geometric (point clouds) and semantic (RGB images) information of 3D scenes. However, it is still challenging for existing methods to fuse data from the two cross sen... 详细信息
来源: 评论
Self-supervised GANs with label augmentation  21
Self-supervised GANs with label augmentation
收藏 引用
Proceedings of the 35th International Conference on Neural Information Processing Systems
作者: Liang Hou Huawei Shen Qi Cao Xueqi Cheng Data Intelligence System Research Center Institute of Computing Technology Chinese Academy of Sciences and University of Chinese Academy of Sciences Data Intelligence System Research Center Institute of Computing Technology Chinese Academy of Sciences CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences and University of Chinese Academy of Sciences
Recently, transformation-based self-supervised learning has been applied to generative adversarial networks (GANs) to mitigate catastrophic forgetting in the discriminator by introducing a stationary learning environm...
来源: 评论
From proof-of-concept to exploitable
收藏 引用
Cybersecurity 2019年 第1期2卷 189-213页
作者: Yan Wang WeiWu Chao Zhang Xinyu Xing Xiaorui Gong Wei Zou School of Cyber Security University of Chinese Academy of SciencesBeijingChina Institute for Network Sciences and Cyberspace Tsinghua UniversityBeijingChina College of Information Sciences and Technology Pennsylvania State UniversityUniversity ParkUnited States Institute of Information Engineering Chinese Academy of SciencesBeijingChina Key Laboratory of Network Assessment Technology CASBeijingChina Beijing Key Laboratory of Network Security and Protection Technology BeijingChina
Exploitability assessment of vulnerabilities is important for both defenders and *** ultimate way to assess the exploitability is crafting a working ***,it usually takes tremendous hours and significant manual *** add... 详细信息
来源: 评论
ms-PoSW: A multi-server aided proof of shared ownership scheme for secure deduplication in cloud
ms-PoSW: A multi-server aided proof of shared ownership sche...
收藏 引用
作者: Xiong, Jinbo Zhang, Yuanyuan Lin, Li Shen, Jian Li, Xuan Lin, Mingwei College of Mathematics and Informatics Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Normal University Fuzhou350117 China School of Computer and Software Nanjing University of Information Science & Technology Nanjing210044 China
Collaborative cloud applications have become the dominant application mode in the big data era. These applications usually generate plenty of cooperative files, which share their ownerships with all collaborative part... 详细信息
来源: 评论
Acq: Improving Generative Data-Free Quantization Via Attention Correction
SSRN
收藏 引用
SSRN 2023年
作者: Li, Jixing Guo, Xiaozhou Dai, Benzhe Gong, Guoliang Jin, Min Chen, Gang Mao, Wenyu Lu, Huaxiang Institute of Semiconductors Chinese Academy of Sciences Beijing100083 China University of Chinese Academy of Sciences Beijing100089 China Semiconductor Neural Network Intelligent Perception and Computing Technology Beijing Key Laboratory Beijing100083 China Materials and Optoelectronics Research Center University of Chinese Academy of Sciences Beijing100083 China College of Microelectronics University of Chinese Academy of Sciences Beijing China
Data-free quantization aims to achieve model quantization without accessing any authentic sample. It is significant in an application-oriented context involving data privacy. Converting noise vectors into synthetic sa... 详细信息
来源: 评论
VEIN: High Scalability Routing Algorithm for Blockchain-based Payment Channel networks
VEIN: High Scalability Routing Algorithm for Blockchain-base...
收藏 引用
IEEE International Conference on Trust, security and Privacy in computing and Communications (TrustCom)
作者: Qianyun Gong Chengjin Zhou Le Qi Jianbin Li Jianzhong Zhang Jingdong Xu Institute of Systems and Networks College of Computer Science Nankai University Tianjin China Tianjin Key Laboratory of Network and Data Security Technology Tianjin China Shijiazhuang Huayan Traffic Technology Co. Ltd.
The payment channel networks (PCNs), as the main method of blockchain off-chain expansion, have received extensive attention in recent years. Using the PCNs, two unconnected parties in a transaction can forward paymen... 详细信息
来源: 评论