咨询与建议

限定检索结果

文献类型

  • 2,101 篇 会议
  • 1,612 篇 期刊文献

馆藏范围

  • 3,713 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,413 篇 工学
    • 1,834 篇 计算机科学与技术...
    • 1,467 篇 软件工程
    • 603 篇 信息与通信工程
    • 346 篇 电气工程
    • 275 篇 控制科学与工程
    • 240 篇 电子科学与技术(可...
    • 232 篇 生物工程
    • 182 篇 网络空间安全
    • 141 篇 机械工程
    • 113 篇 光学工程
    • 94 篇 生物医学工程(可授...
    • 94 篇 安全科学与工程
    • 89 篇 交通运输工程
    • 88 篇 化学工程与技术
    • 83 篇 仪器科学与技术
    • 66 篇 材料科学与工程(可...
    • 61 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,089 篇 理学
    • 623 篇 数学
    • 263 篇 物理学
    • 250 篇 生物学
    • 207 篇 统计学(可授理学、...
    • 101 篇 系统科学
    • 90 篇 化学
  • 606 篇 管理学
    • 336 篇 管理科学与工程(可...
    • 306 篇 图书情报与档案管...
    • 100 篇 工商管理
  • 118 篇 法学
    • 72 篇 社会学
  • 80 篇 医学
    • 70 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 43 篇 经济学
  • 31 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 165 篇 feature extracti...
  • 129 篇 semantics
  • 125 篇 accuracy
  • 109 篇 training
  • 106 篇 computational mo...
  • 102 篇 federated learni...
  • 98 篇 deep learning
  • 80 篇 privacy
  • 72 篇 data models
  • 68 篇 cryptography
  • 62 篇 authentication
  • 61 篇 security
  • 59 篇 data privacy
  • 59 篇 robustness
  • 58 篇 protocols
  • 53 篇 object detection
  • 52 篇 neural networks
  • 52 篇 cloud computing
  • 50 篇 adaptation model...
  • 47 篇 optimization

机构

  • 271 篇 key laboratory o...
  • 206 篇 shandong provinc...
  • 97 篇 university of ch...
  • 83 篇 school of comput...
  • 83 篇 key laboratory o...
  • 66 篇 school of cyber ...
  • 65 篇 shandong provinc...
  • 64 篇 cas key laborato...
  • 64 篇 information secu...
  • 60 篇 guangdong provin...
  • 52 篇 shandong enginee...
  • 52 篇 tianjin key labo...
  • 50 篇 network and data...
  • 50 篇 shandong fundame...
  • 49 篇 state key labora...
  • 47 篇 peng cheng labor...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 46 篇 school of comput...
  • 44 篇 institute of inf...

作者

  • 100 篇 cheng xueqi
  • 49 篇 guo jiafeng
  • 47 篇 shen huawei
  • 43 篇 zheng wei-shi
  • 34 篇 xie xiaohua
  • 33 篇 huang qingming
  • 33 篇 yixian yang
  • 33 篇 cao xiaochun
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 25 篇 jin hai
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 21 篇 hu shengshan
  • 21 篇 lai jianhuang
  • 21 篇 wang yichuan
  • 20 篇 yang zhiyong

语言

  • 2,977 篇 英文
  • 661 篇 其他
  • 87 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3713 条 记 录,以下是2321-2330 订阅
排序:
User Profiling for CSDN:keyphrase Extraction,User Tagging and User Growth Value Prediction
收藏 引用
Data Intelligence 2019年 第2期1卷 137-159页
作者: Guoliang Xing Hao Gao Qi Cao Xinyu Yue Bingbing Xu Keting Cen Huawei Shen Key Laboratory of Network Data Science and Technology Institute of Computing TechnologyChinese Academy of SciencesBeijing 100190China University of Chinese Academy of Sciences Beijing 100049China
The Chinese Software Developer network(CSDN)is one of the largest information technology communities and service platforms in *** paper describes the user profiling for CSDN,an evaluation track of SMP Cup *** contains... 详细信息
来源: 评论
Research on Text Classification Based on BERT-BiGRU Model
收藏 引用
Journal of Physics: Conference Series 2021年 第1期1746卷
作者: Qing Yu Ziyin Wang Kaiwen Jiang Tianjin Key Laboratory of Intelligence Computing and Network Security Tianjin University of Technology Tianjin China
Text classification is a typical application of natural language processing. At present, the most commonly used text classification method is deep learning. Meanwhile there are many difficulties in natural language pr...
来源: 评论
A PUF-based Lightweight Authenticated Metering Data Collection Scheme with Privacy Protection in Smart Grid
A PUF-based Lightweight Authenticated Metering Data Collecti...
收藏 引用
IEEE International Conference on Big Data and Cloud computing (BdCloud)
作者: Ya-Nan Cao Yujue Wang Yong Ding Haibin Zheng Zhenyu Guan Huiyong Wang Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology Guilin China Hangzhou Innovation Institute Beihang University Hangzhou China Cyberspace Security Research Center Pengcheng Laboratory Shenzhen China School of Cyber Science and Technology Beihang University Beijing China School of Mathematics and Computing Science Guilin University of Electronic Technology Guilin China
The rapid development of information and communication technology has made great advancements to grid structure, but at the same time it has also brought new security and privacy challenges to smart grid. Metering dat... 详细信息
来源: 评论
Abnormality Detection in Chest X-Ray Images Using Uncertainty Prediction Autoencoders  23rd
Abnormality Detection in Chest X-Ray Images Using Uncertaint...
收藏 引用
23rd International Conference on Medical Image computing and Computer-Assisted Intervention, MICCAI 2020
作者: Mao, Yifan Xue, Fei-Fei Wang, Ruixuan Zhang, Jianguo Zheng, Wei-Shi Liu, Hongmei School of Data and Computer Science Sun Yat-sen University Guangzhou China Key Laboratory of Machine Intelligence and Advanced Computing MOE Guangzhou China Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen China Pazhou Lab Guangzhou China Guangdong Province Key Laboratory of Information Security Technology Guangzhou China
Chest radiography is widely used in annual medical screening to check whether lungs are healthy or not. Therefore it would be desirable to develop an intelligent system to help clinicians automatically detect potentia... 详细信息
来源: 评论
Analysis on the security of Satellite Internet  17th
Analysis on the Security of Satellite Internet
收藏 引用
17th International Annual Conference on Cyber security, CNCERT 2020
作者: Cao, Huan Wu, Lili Chen, Yue Su, Yongtao Lei, Zhengchao Zhao, Chunping Beijing Key Laboratory of Mobile Computing and Pervasive Device Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China National Computer Network Emergency Response Technical Team/Coordination Center of China Beijing100029 China Beijing Sylincom Technology Co. Ltd. Beijing China
Satellite Internet (SI) is a new way to provide internet access all over the world. It will bring great convenience to international communication. Compared with the traditional communication networks, SI has a signif... 详细信息
来源: 评论
CIR-Net: Cross-modality Interaction and Refinement for RGB-D Salient Object Detection
arXiv
收藏 引用
arXiv 2022年
作者: Cong, Runmin Lin, Qinwei Zhang, Chen Li, Chongyi Cao, Xiaochun Huang, Qingming Zhao, Yao Institute of Information Science Beijing Jiaotong University Beijing100044 China Beijing Key Laboratory of Advanced Information Science and Network Technology Beijing100044 China School of Computer Science and Engineering Nanyang Technological University Singapore School of Cyber Science and Technology Shenzhen Campus Sun Yat-sen University 518107 China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing101408 China Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China Peng Cheng Laboratory Shenzhen518055 China
Focusing on the issue of how to effectively capture and utilize cross-modality information in RGB-D salient object detection (SOD) task, we present a convolutional neural network (CNN) model, named CIR-Net, based on t... 详细信息
来源: 评论
A Collaborative Kernel Clustering Algorithm for Non-Linear Data in Peer-to-Peer networks  7
A Collaborative Kernel Clustering Algorithm for Non-Linear D...
收藏 引用
7th International Conference on Information, Cybernetics, and Computational Social Systems, ICCSS 2020
作者: Wang, Ting Wang, Rongrong Zhou, Jin Jiang, Hui Han, Shiyuan Wang, Lin Chen, Yuehui Shandong Provincial Key Laboratory of Network Based Intelligent Computing University of Jinan Jinan250022 China Development and Test Center Chinabond Fintech Information Technology Co. Ltd. Beijing100032 China
Clustering is a process of dividing data according to their similarity. The existing collaborative clustering methods do not consider the idea of kernel, which are more suitable to deal with segmentation of linear dat... 详细信息
来源: 评论
BABD: A Bitcoin Address Behavior Dataset for Pattern Analysis
arXiv
收藏 引用
arXiv 2022年
作者: Xiang, Yuexin Lei, Yuchen Bao, Ding Ren, Wei Li, Tiantian Yang, Qingqing Liu, Wenmao Zhu, Tianqing Choo, Kim-Kwang Raymond School of Computer Science China University of Geosciences Wuhan430074 China Hubei Key Laboratory of Intelligent Geo-Information Processing Wuhan430074 China NSFOCUS Technologies Group Co. Ltd China Henan Key Laboratory of Network Cryptography Technology Zhengzhou450001 China School of Computer Science University of Technology Sydney Sydney Australia Department of Information Systems and Cyber Security University of Texas at San Antonio San AntonioTX78249-0631 United States
Cryptocurrencies are no longer just the preferred option for cybercriminal activities on darknets, due to the increasing adoption in mainstream applications. This is partly due to the transparency associated with the ... 详细信息
来源: 评论
On The Uncertainty Principle of Neural networks
arXiv
收藏 引用
arXiv 2022年
作者: Zhang, Jun-Jie Zhang, Dong-Xiao Chen, Jian-Nan Pang, Long-Gang Meng, Deyu Division of Computational physics and Intelligent modeling Institute of Nuclear Technology Shaanxi Xi’an710024 China Key Laboratory of Quark & Lepton Physics Ministry of Education Central China Normal University Hubei Wuhan30079 China School of Mathematics and Statistics Ministry of Education Key Lab of Intelligent Networks and Network Security Xi’an Jiaotong University Shaanxi Xi’an710049 China
In this study, we explore the inherent trade-off between accuracy and robustness in neural networks, drawing an analogy to the uncertainty principle in quantum mechanics. We propose that neural networks are subject to... 详细信息
来源: 评论
Revisiting Token Dropping Strategy in Efficient BERT Pretraining
arXiv
收藏 引用
arXiv 2023年
作者: Zhong, Qihuang Ding, Liang Liu, Juhua Liu, Xuebo Zhang, Min Du, Bo Tao, Dacheng National Engineering Research Center for Multimedia Software Institute of Artificial Intelligence School of Computer Science Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University China JD Explore Academy China Research Center for Graphic Communication Printing and Packaging Institute of Artificial Intelligence Wuhan University China Institute of Computing and Intelligence Harbin Institute of Technology China University of Sydney Australia
Token dropping is a recently-proposed strategy to speed up the pretraining of masked language models, such as BERT, by skipping the computation of a subset of the input tokens at several middle layers. It can effectiv... 详细信息
来源: 评论