咨询与建议

限定检索结果

文献类型

  • 2,101 篇 会议
  • 1,612 篇 期刊文献

馆藏范围

  • 3,713 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,413 篇 工学
    • 1,834 篇 计算机科学与技术...
    • 1,467 篇 软件工程
    • 603 篇 信息与通信工程
    • 346 篇 电气工程
    • 275 篇 控制科学与工程
    • 240 篇 电子科学与技术(可...
    • 232 篇 生物工程
    • 182 篇 网络空间安全
    • 141 篇 机械工程
    • 113 篇 光学工程
    • 94 篇 生物医学工程(可授...
    • 94 篇 安全科学与工程
    • 89 篇 交通运输工程
    • 88 篇 化学工程与技术
    • 83 篇 仪器科学与技术
    • 66 篇 材料科学与工程(可...
    • 61 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,089 篇 理学
    • 623 篇 数学
    • 263 篇 物理学
    • 250 篇 生物学
    • 207 篇 统计学(可授理学、...
    • 101 篇 系统科学
    • 90 篇 化学
  • 606 篇 管理学
    • 336 篇 管理科学与工程(可...
    • 306 篇 图书情报与档案管...
    • 100 篇 工商管理
  • 118 篇 法学
    • 72 篇 社会学
  • 80 篇 医学
    • 70 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 43 篇 经济学
  • 31 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 165 篇 feature extracti...
  • 129 篇 semantics
  • 125 篇 accuracy
  • 109 篇 training
  • 106 篇 computational mo...
  • 102 篇 federated learni...
  • 98 篇 deep learning
  • 80 篇 privacy
  • 72 篇 data models
  • 68 篇 cryptography
  • 62 篇 authentication
  • 61 篇 security
  • 59 篇 data privacy
  • 59 篇 robustness
  • 58 篇 protocols
  • 53 篇 object detection
  • 52 篇 neural networks
  • 52 篇 cloud computing
  • 50 篇 adaptation model...
  • 47 篇 optimization

机构

  • 271 篇 key laboratory o...
  • 206 篇 shandong provinc...
  • 97 篇 university of ch...
  • 83 篇 school of comput...
  • 83 篇 key laboratory o...
  • 66 篇 school of cyber ...
  • 65 篇 shandong provinc...
  • 64 篇 cas key laborato...
  • 64 篇 information secu...
  • 60 篇 guangdong provin...
  • 52 篇 shandong enginee...
  • 52 篇 tianjin key labo...
  • 50 篇 network and data...
  • 50 篇 shandong fundame...
  • 49 篇 state key labora...
  • 47 篇 peng cheng labor...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 46 篇 school of comput...
  • 44 篇 institute of inf...

作者

  • 100 篇 cheng xueqi
  • 49 篇 guo jiafeng
  • 47 篇 shen huawei
  • 43 篇 zheng wei-shi
  • 34 篇 xie xiaohua
  • 33 篇 huang qingming
  • 33 篇 yixian yang
  • 33 篇 cao xiaochun
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 25 篇 jin hai
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 21 篇 hu shengshan
  • 21 篇 lai jianhuang
  • 21 篇 wang yichuan
  • 20 篇 yang zhiyong

语言

  • 2,977 篇 英文
  • 661 篇 其他
  • 87 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3713 条 记 录,以下是2391-2400 订阅
排序:
Uncertainty-Aware Deep Co-training for Semi-supervised Medical Image Segmentation
arXiv
收藏 引用
arXiv 2021年
作者: Zheng, Xu Fu, Chong Xie, Haoyu Chen, Jialei Wang, Xingwei Sham, Chiu-Wing School of Computer Science and Engineering Northeastern University Shenyang110819 China Engineering Research Center of Security Technology of Complex Network System Ministry of Education China Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Northeastern University Shenyang110819 China School of Computer Science The University of Auckland New Zealand
Semi-supervised learning has made significant strides in the medical domain since it alleviates the heavy burden of collecting abundant pixel-wise annotated data for semantic segmentation tasks. Existing semi-supervis... 详细信息
来源: 评论
Training, testing and benchmarking medical AI models using Clinical AIBench
收藏 引用
BenchCouncil Transactions on Benchmarks, Standards and Evaluations 2022年 第1期2卷 100037-100037页
作者: Huang, Yunyou Miao, Xiuxia Zhang, Ruchang Ma, Li Liu, Wenjing Zhang, Fan Guan, Xianglong Liang, Xiaoshuang Lu, Xiangjiang Tang, Suqing Zhang, Zhifei Guangxi Key Lab of Multi-Source Information Mining & Security School of Computer Science and Engineering & School of Software Guangxi Normal University Guilin China State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing China Guilin Medical University Guilin China Department of Physiology and Pathophysiology Capital Medical University Beijing China Faculty of Education Guangxi Normal University Guilin China International Open Benchmark Council Beijing China
AI technology has been used in many clinical research fields, but most AI technologies are difficult to land in real-world clinical settings. In most current clinical AI research settings, the diagnosis task is to ide... 详细信息
来源: 评论
Differentiating Malicious and Benign Android App Operations Using Second-Step Behavior Features
收藏 引用
Chinese Journal of Electronics 2019年 第5期28卷 944-952页
作者: LI Pengwei FU Jianming XU Chao CHENG Binlin ZHANG Huanguo School of Information Engineering Nanjing Audit University School of Cyber Science and Engineering Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education Wuhan University College of Computer Science and Technology Hubei Normal University
security-sensitive operations in Android applications(apps for short) can either be benign or malicious. In this work, we introduce an approach of static program analysis that extracts "second-step behavior featu... 详细信息
来源: 评论
Larger Receptive Field and Context Information for Pose Estimation: Larger Gaussian Kernel
Larger Receptive Field and Context Information for Pose Esti...
收藏 引用
High Performance Big Data and Intelligent Systems (HPBD&IS)
作者: Junxiao Ma Kai Yang Zunwang Ke Gang Wang Yugui Zhang Fengcai Cao Qi Zhou Yang Fei School of Information Beijing Forestry University Beijing China AnnLab Institute of Semiconductors Chinese Academy of Sciences Beijing China CGNPC Uranium Industry Development Co. Ltd. Beijing China School of Software Xinjiang University Urumqi China School of Computing and Data Engineering NingboTech University Ningbo China Beijing Key Laboratory of Semiconductor Neural Network Intelligent Sensing and Computing Technology Beijing China School of Integrated Circuits University of Chinese Academy of Sciences Beijing China Zhongke Shangyi Health Technology (Beijing) Co. Ltd. Beijing China School of Semiconductor Science and Technology South China Normal University GuangZhou China
The field of pose estimation has a wide range of application prospects in various industries in the current era. With the continuous development of deep learning techniques, the effects in the field of human pose esti...
来源: 评论
GSLB: the graph structure learning benchmark  23
GSLB: the graph structure learning benchmark
收藏 引用
Proceedings of the 37th International Conference on Neural Information Processing Systems
作者: Zhixun Li Liang Wang Xin Sun Yifan Luo Yanqiao Zhu Dingshuo Chen Yingtao Luo Xiangxin Zhou Qiang Liu Shu Wu Jeffrey Xu Yu Department of Systems Engineering and Engineering Management The Chinese University of Hong Kong Center for Research on Intelligent Perception and Computing State Key Laboratory of Multimodal Artificial Intelligence Systems Institute of Automation Chinese Academy of Sciences and School of Artificial Intelligence University of Chinese Academy of Sciences and Department of Automation University of Science and Technology of China Department of Automation University of Science and Technology of China School of Cyberspace Security Beijing University of Posts and Telecommunications Department of Computer Science University of California Los Angeles Center for Research on Intelligent Perception and Computing State Key Laboratory of Multimodal Artificial Intelligence Systems Institute of Automation Chinese Academy of Sciences and School of Artificial Intelligence University of Chinese Academy of Sciences Heinz College of Information Systems and Public Policy Machine Learning Department School of Computer Science Carnegie Mellon University
Graph Structure Learning (GSL) has recently garnered considerable attention due to its ability to optimize both the parameters of Graph Neural networks (GNNs) and the computation graph structure simultaneously. Despit...
来源: 评论
Research on SDN Multi Controller Deployment based on K-means++
Research on SDN Multi Controller Deployment based on K-means...
收藏 引用
2020 International Conference on 5G Mobile Communication and Information Science, MCIS-5G 2020
作者: Yue, Li Junyan, Chen Chuxin, Liang Xiaochun, Lei School of Computer and Information Security Guilin University of Electronic Technology Guilin541004 China Guangxi Cloud Computing and Big Data Collaborative Innovation Center Guilin541001 China Guangxi Key Laboratory of Image and Graphic Intelligent Processing Guilin541004 China
In large-scale SDN network, a single centralized controller can not meet the demand, and multiple controllers are needed to deal with the problem, which leads to the problem of multi control balanced deployment. In th... 详细信息
来源: 评论
Deep Learning Strategies for Addressing Anomalous Exposure in Image Processing: The FARDBUNet Approach
Deep Learning Strategies for Addressing Anomalous Exposure i...
收藏 引用
High Performance Big Data and Intelligent Systems (HPBD&IS)
作者: Qi Zhou Kai Yang Zunwang Ke Gang Wang Yugui Zhang Yizhen Jia Fengcai Cao Junxiao Ma Changlin Liu Kaijie Zhang Min Wu School of Semiconductor Science and Technology South China Normal University GuangZhou China AnnLab Institute of Semiconductors Chinese Academy of Sciences Beijing China Beijing Key Laboratory of Semiconductor Neural Network Intelligent Sensing and Computing Technology Beijing China CGNPC Uranium Industry Development Co. Ltd. Beijing China School of Software Xinjiang University Urumqi China School of Computing and Data Engineering NingboTech University Ningbo China School of Integrated Circuits University of Chinese Academy of Sciences Beijing China Zhongke Shangyi Health Technology (Beijing) Co. Ltd. Beijing China School of Information Beijing Forestry University Beijing China
In real-world scenarios, capturing scenes with excessive dynamic range often leads to the partial loss of highlight or dark area information due to irradiance variations and limitations in the capture capabilities of ...
来源: 评论
Data Access Control Method of Power Terminal Based on Trust and Reputation
Data Access Control Method of Power Terminal Based on Trust ...
收藏 引用
International Symposium on Computer Science and Intelligent Controls (ISCSIC)
作者: Sheng Wang JuLing Zhang Yong Li LingHao Zhang Qing Zhang Jian Zhou Electric Power Research Institute of State Grid Sichuan Electric Power Company Chengdu China Grid Digitizing Technology Department State Grid Smart Grid Research Institute Co. Ltd. State Grid Key Laboratory of Information & Network Security Nanjing State Grid Sichuan Electric Power Company Chengdu China
Aiming at the problems of poor data confidentiality, complex communication overhead and large amount of computation in traditional power terminal data access control, a data access control method of power terminal bas... 详细信息
来源: 评论
Event Data Association via Robust Model Fitting for Event-based Object Tracking
arXiv
收藏 引用
arXiv 2021年
作者: Chen, Haosheng Lin, Shuyuan Yan, Yan Wang, Hanzi Gao, Xinbo Chongqing Key Laboratory of Image Cognition College of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing400065 China College of Cyber Security College of Information Science and Technology Jinan University Guangzhou511436 China Fujian Key Laboratory of Sensing and Computing for Smart City School of Informatics Xiamen University Xiamen361005 China
Event-based approaches, which are based on bio-inspired asynchronous event cameras, have achieved promising performance on various computer vision tasks. However, the study of the fundamental event data association pr... 详细信息
来源: 评论
Design and Implementation of Feedback Cancellation Algorithm for Hearing Aids
Design and Implementation of Feedback Cancellation Algorithm...
收藏 引用
High Performance Big Data and Intelligent Systems (HPBD&IS)
作者: Yuyan Lan Ang Wang Weixin Zhou Wan’ang Xiao Institute of Semiconductors Chinese Academy of Sciences Beijing China School of Microelectronics University of Chinese Academy of Sciences Beijing China Beijing Key Laboratory of Semiconductor Neural Network Intelligent Sensing and Computing Technology Beijing China
This paper presents the optimization idea, hardware implementation architecture and low power optimization process of feedback cancellation algorithm applied in hearing aid chip. Based on the NLMS algorithm, three ban... 详细信息
来源: 评论