咨询与建议

限定检索结果

文献类型

  • 2,101 篇 会议
  • 1,612 篇 期刊文献

馆藏范围

  • 3,713 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,413 篇 工学
    • 1,834 篇 计算机科学与技术...
    • 1,467 篇 软件工程
    • 603 篇 信息与通信工程
    • 346 篇 电气工程
    • 275 篇 控制科学与工程
    • 240 篇 电子科学与技术(可...
    • 232 篇 生物工程
    • 182 篇 网络空间安全
    • 141 篇 机械工程
    • 113 篇 光学工程
    • 94 篇 生物医学工程(可授...
    • 94 篇 安全科学与工程
    • 89 篇 交通运输工程
    • 88 篇 化学工程与技术
    • 83 篇 仪器科学与技术
    • 66 篇 材料科学与工程(可...
    • 61 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,089 篇 理学
    • 623 篇 数学
    • 263 篇 物理学
    • 250 篇 生物学
    • 207 篇 统计学(可授理学、...
    • 101 篇 系统科学
    • 90 篇 化学
  • 606 篇 管理学
    • 336 篇 管理科学与工程(可...
    • 306 篇 图书情报与档案管...
    • 100 篇 工商管理
  • 118 篇 法学
    • 72 篇 社会学
  • 80 篇 医学
    • 70 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 43 篇 经济学
  • 31 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 165 篇 feature extracti...
  • 129 篇 semantics
  • 125 篇 accuracy
  • 109 篇 training
  • 106 篇 computational mo...
  • 102 篇 federated learni...
  • 98 篇 deep learning
  • 80 篇 privacy
  • 72 篇 data models
  • 68 篇 cryptography
  • 62 篇 authentication
  • 61 篇 security
  • 59 篇 data privacy
  • 59 篇 robustness
  • 58 篇 protocols
  • 53 篇 object detection
  • 52 篇 neural networks
  • 52 篇 cloud computing
  • 50 篇 adaptation model...
  • 47 篇 optimization

机构

  • 271 篇 key laboratory o...
  • 206 篇 shandong provinc...
  • 97 篇 university of ch...
  • 83 篇 school of comput...
  • 83 篇 key laboratory o...
  • 66 篇 school of cyber ...
  • 65 篇 shandong provinc...
  • 64 篇 cas key laborato...
  • 64 篇 information secu...
  • 60 篇 guangdong provin...
  • 52 篇 shandong enginee...
  • 52 篇 tianjin key labo...
  • 50 篇 network and data...
  • 50 篇 shandong fundame...
  • 49 篇 state key labora...
  • 47 篇 peng cheng labor...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 46 篇 school of comput...
  • 44 篇 institute of inf...

作者

  • 100 篇 cheng xueqi
  • 49 篇 guo jiafeng
  • 47 篇 shen huawei
  • 43 篇 zheng wei-shi
  • 34 篇 xie xiaohua
  • 33 篇 huang qingming
  • 33 篇 yixian yang
  • 33 篇 cao xiaochun
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 25 篇 jin hai
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 21 篇 hu shengshan
  • 21 篇 lai jianhuang
  • 21 篇 wang yichuan
  • 20 篇 yang zhiyong

语言

  • 2,977 篇 英文
  • 661 篇 其他
  • 87 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3713 条 记 录,以下是2341-2350 订阅
排序:
A Hybrid Fault Diagnosis Method for Rolling Bearing Based on Attention and CNN
A Hybrid Fault Diagnosis Method for Rolling Bearing Based on...
收藏 引用
Robotics, Intelligent Control and Artificial Intelligence (RICAI), International Conference on
作者: Songtao Wang Qianlong Liu Jun Li Kun Liang Hui Cai Hangwei Tian Shandong Hi-Speed Construction Management Group Co. Ltd. Jinan China SHANDONG SCICOM Information and Economy Research Institute Co. Ltd. Jinan China Shandong Hi-Speed Group Linteng Highway Co. Ltd. Jinan China School of Qilu Transportation Shandong University Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China
In the field of mechanical manufacturing, rolling bearings are important core components. To achieve stable rotational operation, improving diagnostic accuracy has become an urgent issue. In this paper, a hybrid fault...
来源: 评论
PathAFL: Path-Coverage Assisted Fuzzing  20
PathAFL: Path-Coverage Assisted Fuzzing
收藏 引用
15th ACM Asia Conference on Computer and Communications security, ASIA CCS 2020
作者: Yan, Shengbo Wu, Chenlu Li, Hang Shao, Wei Jia, Chunfu Nankai University College of Cyber Science TianJin China Nankai University College of Artificial Intelligence TianJin China Nankai University College of Cyber Science TianJin Key Laboratory of Network and Data Security Technology TianJin300350 China
Fuzzing is an effective method to find software bugs and vulnerabilities. One of the most useful techniques is the coverage-guided fuzzing, whose key element is the tracing code coverage information. Existing coverage... 详细信息
来源: 评论
Anomaly Detection Method for Satellite networks Based on Genetic Optimization Federated Learning
收藏 引用
Expert Systems with Applications 2025年
作者: Zhimin Wang Jinhui Cao Xiaoqiang Di School of Computer Science and Technology Changchun University of Science and Technology Changchun 130022 China Jilin Province Key Laboratory of Network and Information Security Changchun University of Science and Technology Changchun 130022 China Information Center Changchun University of Science and Technology Changchun 130022 China
Satellite networks are integral to global communications, however, they are increasingly targeted by sophisticated cyber-attacks due to their open-channel nature. Existing machine learning-based anomaly detection meth...
来源: 评论
Detection of Deepfake videos using long distance attention
arXiv
收藏 引用
arXiv 2021年
作者: Lu, Wei Liu, Lingyi Luo, Junwei Zhao, Xianfeng Zhou, Yicong Huang, Jiwu School of Computer Science and Engineering Guangdong Province Key Laboratory of Information Security Technology Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing Sun Yat-sen University Guangzhou510006 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100195 China School of Cyber Security University of Chinese Academy of Sciences Beijing100195 China Department of Computer and Information Science University of Macau 999078 China Guangdong Key Laboratory of Intelligent Information Processing Shenzhen Key Laboratory of Media Security Shenzhen University Shenzhen518060 China Shenzhen Institute of Artificial Intelligence and Robotics for Society Shenzhen518055 China
With the rapid progress of deepfake techniques in recent years, facial video forgery can generate highly deceptive video contents and bring severe security threats. And detection of such forgery videos is much more ur... 详细信息
来源: 评论
Application of BIM coding and example modelling for typical asphalt pavement diseases based on Omni Class  2
Application of BIM coding and example modelling for typical ...
收藏 引用
2nd International Conference on Advanced Materials and Intelligent Manufacturing, ICAMIM 2021
作者: Li, Xian Tong Zhang, Hong Wei Liu, Zhen Zheng Qu, Wan Ying Wu, Zhao Hui Wang, Liang China Academy of Transportation Sciences Beijing100029 China Inner Mongolia Autonomous Region Traffic Construction Engineering Quality Supervision Bureau Hohhot0110051 China Key laboratory of Transport Industry of Management Control and Cycle Repair Technology for Traffic Network Facilitates in Ecological Security Barrier Area Hohhot0110051 China Changchun Municipal Engineering Design and Research Institute Changchun130000 China
With the widespread application of BIM technology in highway engineering, the practice of coding asphalt pavement diseases and integrating it with BIM models in the highway management and maintenance stage can contrib... 详细信息
来源: 评论
A lightweight privacy-preserving scheme using label-based pixel block mixing for image classification in deep learning
arXiv
收藏 引用
arXiv 2021年
作者: Xiang, Yuexin Li, Tiantian Ren, Wei Zhu, Tianqing Raymond Choo, Kim-Kwang School of Computer Science China University of Geosciences Wuhan China Henan Key Laboratory of Network Cryptography Technology Zhengzhou China Key Laboratory of Network Assessment Technology CAS Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China Department of Information Systems and Cyber Security University of Texas at San Antonio San AntonioTX78249-0631 United States
To ensure the privacy of sensitive data used in the training of deep learning models, a number of privacy-preserving methods have been designed by the research community. However, existing schemes are generally design... 详细信息
来源: 评论
The theoretical study of Cs/O absorption on Ga0.9375Mg0.0625N (0001) surface: A first principle calculation  10
The theoretical study of Cs/O absorption on Ga0.9375Mg0.0625...
收藏 引用
2020 10th International Conference on Applied Physics and Mathematics, ICAPM 2020
作者: Ren, S.S. Ma, J. Fu, X.Q. Yang, M.Z. Zhao, H. School of Information Science and Engineering University of Jinan China Shandong Provincial Key Laboratory of Network Based Intelligent Computing University of Jinan China School of Physics and Optoelectronic Engineering Nanjing University of Information Science and Technology China
In order to theoretically study the adsorption process of GaN photocathode, the adsorption model on Ga0.9375Mg0.0625N is established. Then, the adsorption energy, work function, mullikeen charge distribution and densi... 详细信息
来源: 评论
Research on the status of industrial sewage equipment based on clustering ensemble
Research on the status of industrial sewage equipment based ...
收藏 引用
International Conference on Computational Science and Computational Intelligence (CSCI)
作者: Qinlu Li Tao Du Rui Zhang Jin Zhou Shouning Qu School of Information Science and Engineering University of Jinan Jinan China Shandong Provincial Key Laboratory of Network Based Intelligent Computing University of Jinan Jinan China Shandong Management University Jinan China State Key Laboratory of High-end Server and Storage Technology
The collected industrial data are usually unlabeled, and generally use clustering algorithm for data analysis. However, a single clustering algorithm can not guarantee a good analysis of industrial datasets, and there... 详细信息
来源: 评论
An efficient matrix multiplication with enhanced privacy protection in cloud computing and its applications
arXiv
收藏 引用
arXiv 2021年
作者: Liu, Chun Hu, Xuexian Chen, Xiaofeng Wei, Jianghong Liu, Wenfen State Key Laboratory of Mathematical Engineering and Advanced Computing PLA Strategic Support Force Information Engineering University Zhengzhou450001 China Xidian University China State Key Laboratory of Cryptology P.O. Box 5159 Beijing100878 China Xidian University China and State Key Laboratory of Mathematical Engineering and Advanced Computing PLA Strategic Support Force Information Engineering University Zhengzhou450001 China Guangxi Key Laboratory of Cryptogpraphy and Information Security School of Computer Science and Information Security Guilin University of Electronic Technology Guilin541004 China
As one of the most important basic operations, matrix multiplication computation (MMC) has varieties of applications in the scientific and engineering community such as linear regression, k-nearest neighbor classifica... 详细信息
来源: 评论
Research and Implementation of Hybrid Encryption System Based on SM2 and SM4 Algorithm
Research and Implementation of Hybrid Encryption System Base...
收藏 引用
作者: Zhiqiang Wang Hongyu Dong Yaping Chi Jianyi Zhang Tao Yang Qixu Liu Beijing Electronic Science and Technology Institute State Information Center Key Lab of Information Network Security Ministry of Public Security Key Laboratory of Network Assessment Technology Institute of Information EngineeringChinese Academy of Sciences
In recent years,the mobile platform network communication performance has made significant progress,with an increasingly large user base and market *** the same time,it also brings many problems such as the leakage of... 详细信息
来源: 评论