咨询与建议

限定检索结果

文献类型

  • 2,081 篇 会议
  • 1,579 篇 期刊文献

馆藏范围

  • 3,660 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,357 篇 工学
    • 1,793 篇 计算机科学与技术...
    • 1,442 篇 软件工程
    • 580 篇 信息与通信工程
    • 314 篇 电气工程
    • 260 篇 控制科学与工程
    • 231 篇 生物工程
    • 228 篇 电子科学与技术(可...
    • 168 篇 网络空间安全
    • 136 篇 机械工程
    • 106 篇 光学工程
    • 93 篇 生物医学工程(可授...
    • 87 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 81 篇 仪器科学与技术
    • 81 篇 交通运输工程
    • 60 篇 材料科学与工程(可...
    • 60 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,073 篇 理学
    • 613 篇 数学
    • 253 篇 物理学
    • 249 篇 生物学
    • 206 篇 统计学(可授理学、...
    • 101 篇 系统科学
    • 86 篇 化学
  • 592 篇 管理学
    • 325 篇 管理科学与工程(可...
    • 302 篇 图书情报与档案管...
    • 99 篇 工商管理
  • 118 篇 法学
    • 72 篇 社会学
  • 79 篇 医学
    • 69 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 43 篇 经济学
  • 31 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 163 篇 feature extracti...
  • 129 篇 semantics
  • 123 篇 accuracy
  • 107 篇 training
  • 106 篇 computational mo...
  • 97 篇 federated learni...
  • 95 篇 deep learning
  • 79 篇 privacy
  • 70 篇 data models
  • 68 篇 cryptography
  • 61 篇 authentication
  • 59 篇 security
  • 57 篇 data privacy
  • 57 篇 protocols
  • 57 篇 robustness
  • 52 篇 object detection
  • 52 篇 neural networks
  • 52 篇 cloud computing
  • 50 篇 adaptation model...
  • 47 篇 information secu...

机构

  • 264 篇 key laboratory o...
  • 206 篇 shandong provinc...
  • 95 篇 university of ch...
  • 83 篇 key laboratory o...
  • 82 篇 school of comput...
  • 65 篇 information secu...
  • 65 篇 school of cyber ...
  • 63 篇 cas key laborato...
  • 61 篇 shandong provinc...
  • 59 篇 guangdong provin...
  • 52 篇 shandong enginee...
  • 50 篇 tianjin key labo...
  • 49 篇 network and data...
  • 49 篇 shandong fundame...
  • 48 篇 state key labora...
  • 47 篇 peng cheng labor...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 45 篇 school of comput...
  • 43 篇 shandong provinc...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 34 篇 xie xiaohua
  • 33 篇 yixian yang
  • 32 篇 huang qingming
  • 32 篇 cao xiaochun
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 25 篇 xu qianqian
  • 25 篇 li wei
  • 25 篇 jin hai
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 21 篇 hu shengshan
  • 21 篇 lai jianhuang
  • 21 篇 meng deyu

语言

  • 3,103 篇 英文
  • 484 篇 其他
  • 82 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3660 条 记 录,以下是2381-2390 订阅
排序:
Attention-Based Hybrid Model for Automatic Short Answer Scoring  11th
Attention-Based Hybrid Model for Automatic Short Answer Scor...
收藏 引用
11th EAI International Conference on Simulation Tools and Techniques, SIMUTools 2019
作者: Qi, Hui Wang, Yue Dai, Jinyu Li, Jinqing Di, Xiaoqiang School of Computer Science and Technology Changchun University of Science and Technology Changchun China Jilin Province Key Laboratory of Network and Information Security Changchun China
Neural network models have played an important role in text applications, such as document summaries and automatic short answer questions. In previous existing works, questions and answers are together used as input i... 详细信息
来源: 评论
The Privacy Data Protection Model Based on Random Projection technology  2nd
The Privacy Data Protection Model Based on Random Projection...
收藏 引用
2nd International Conference on Big Data and security, ICBDS 2020
作者: Shen, Wen Guo, Qian Zhu, Hui Tang, Kejian Zhan, Shaohui Hao, Zhiguo Global Energy Interconnection Research Institute Co. Ltd. Nanjing210003 China State Grid Key Laboratory of Information & Network Security Nanjing210003 China State Grid Financial Technology Group Xiongan071000 China State Grid Jiangxi Electric Power Co. Ltd. Nanchang330000 China Xingtai Huancheng Power Supply Branch of State Grid Hebei Electric Power Co. Ltd. Xingtai054000 China
In general, as the technology developed, big data analysis provides opportunities to reduce the implementation time and budget. Compared with traditional methods, big data analysis has a greater advantage. It seeks to... 详细信息
来源: 评论
Burst image super-resolution based on dual branch fusion and adaptive frame selection
收藏 引用
Displays 2025年 89卷
作者: Duan, Lijuan Zuo, Wendi Gu, Ke Gong, Zhi School of Computer Science Beijing University of Technology Beijing100124 China Beijing Key Laboratory of Trusted Computing Beijing University of Technology Beijing100124 China National Engineering Laboratory for Critical Technologies of Information Security Classified Protection Beijing University of Technology Beijing100124 China School of Information Science and Technology Beijing University of Technology Beijing100124 China Chongqing Research Institute of Beijing University of Technology China
The modern handheld camera is capable of rapidly capturing multiple images and subsequently merging them into a single image. The extant methodologies typically select the first frame as the reference frame, utilising... 详细信息
来源: 评论
Data Anonymous Authentication for BIoMT with Proxy Group Signature
收藏 引用
Journal of Cyber security 2021年 第4期3卷 207-216页
作者: Chaoyang Li Yalan Wang Gang Xu Xiubo Chen Xiangjun Xin Jian Li College of Software Engineering Zhengzhou University of Light IndustryZhengzhou450001China Department of Computer Science University of SurreyGuildfordSurreyGU27XHUK School of Computing Science and Technology North China University of TechnologyBeijing100144China Information Security Centre State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijing100876China
Along with the increase of wearable medical device,the privacy leakage problem in the process of transmission between these edge medical *** blockchain-enabled Internet of Medical Things(BIoMT)has been developed to re... 详细信息
来源: 评论
Noise-Tolerant Learning for Audio-Visual Action Recognition
arXiv
收藏 引用
arXiv 2022年
作者: Han, Haochen Zheng, Qinghua Luo, Minnan Miao, Kaiyao Tian, Feng Chen, Yan The National Engineering Lab for Big Data Analytics Xi’an Jiaotong University Xi’an710049 China The School of Computer Science and Technology Xi’an Jiaotong University Xi’an710049 China The Key Laboratory of Intelligent Networks and Network Security Xi’an Jiaotong University Ministry of Education Xi’an710049 China The School of Cyber Science and Engineering Xi’an Jiaotong University Xi’an710049 China
Recently, video recognition is emerging with the help of multi-modal learning, which focuses on integrating distinct modalities to improve the performance or robustness of the model. Although various multi-modal learn... 详细信息
来源: 评论
Android Malicious Code Detection Based on Secondary Pruning Optimization  12
Android Malicious Code Detection Based on Secondary Pruning ...
收藏 引用
12th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics, CISP-BMEI 2019
作者: Yu, Qing Ma, Kuolang Wang, Zuohua Tianjin Key Laboratory of Intelligence Computing and Network Security Tianjin University of Technology Tianjin China Tianjin Times Shengshi Technology Co. Ltd. No. 216 Hongqi Road Nankai District Tianjin300000 China
In this paper, we propose a detection algorithm for Android malicious code based on integrated multi-feature. By decompiling and processing APK files, the multi-class behavior features of Android application are extra... 详细信息
来源: 评论
Internet of Things Terminal Access security Based on Zero Trust
Internet of Things Terminal Access Security Based on Zero Tr...
收藏 引用
International Symposium on Computer Science and Intelligent Controls (ISCSIC)
作者: RiXuan Qiu JunFeng Zhang Lu Chen Wei Li Nan Lin State Grid Jiangxi Electric Power Co. Ltd. Information & Telcommunication Branch Nanjing China Grid Digitizing Technology Department State Grid Key Laboratory of Information & Network Security State Grid Smart Grid Research Institute Co. Ltd Nanjing China State Grid Jiangxi Electric Power Co. Ltd Nanjing China
At present, production and daily life increasingly rely on the Internet of Things, and the network security problem of the Internet of Things is becoming increasingly prominent. Therefore, it is extremely important to... 详细信息
来源: 评论
network security Situation Awareness technology Based on Multi-source Heterogeneous Data  2020
Network Security Situation Awareness Technology Based on Mul...
收藏 引用
Proceedings of the 2020 International Conference on Cyberspace Innovation of Advanced Technologies
作者: Daojuan Zhang Kexiang Qian Wenhui Wang Fuyang fang Chonghua Wang Xi Luo State Grid Key Laboratory of Information & Network Security Global Energy Interconnection Research Institute co. Ltd Beijing China Information Science Academy China Electronics Technology Group Corporation Beijing China Department of Security Technology China Industrial Control Systems Cyber Emergency Response Team Beijing China Cyber space Institute of Advanced Technology Guangzhou University Guangzhou China
With the development of information technology, the scale of the network continues to expand, and the security issues continue to increase. The complexity of the network security situation is increasing and the import... 详细信息
来源: 评论
Does Thermal Really Always Matter for RGB-T Salient Object Detection?
arXiv
收藏 引用
arXiv 2022年
作者: Cong, Runmin Zhang, Kepu Zhang, Chen Zheng, Feng Zhao, Yao Huang, Qingming Kwong, Sam The Institute of Information Science Beijing Jiaotong University Beijing100044 China The Beijing Key Laboratory of Advanced Information Science and Network Technology Beijing100044 China The Department of Computer Science City University of Hong Kong China The Department of Computer Science and Technology Southern University of Science and Technology Shenzhen518055 China The Research Institute of Trustworthy Autonomous Systems Shenzhen518055 China The School of Computer Science and Technology University of Chinese Academy of Sciences Beijing101408 China The Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China Peng Cheng Laboratory Shenzhen518055 China The City University of Hong Kong Shenzhen Research Institute Shenzhen51800 China
In recent years, RGB-T salient object detection (SOD) has attracted continuous attention, which makes it possible to identify salient objects in environments such as low light by introducing thermal image. However, mo... 详细信息
来源: 评论
A Deep Single Image Rectification Approach for Pan-Tilt-Zoom Cameras
arXiv
收藏 引用
arXiv 2025年
作者: Xiao, Teng Hu, Qi Yan, Qingsong Liu, Wei Ye, Zhiwei Deng, Fei School of Computer Science Hubei University of Technology Wuhan China Hubei Key Laboratory of Green Intelligent Computing Power Network Wuhan China School of Surveying and Mapping Wuhan University Wuhan China Wuhan Tianjihang Information Technology Co. Ltd. Wuhan China
Pan-Tilt-Zoom (PTZ) cameras with wide-angle lenses are widely used in surveillance but often require image rectification due to their inherent nonlinear distortions. Current deep learning approaches typically struggle... 详细信息
来源: 评论