咨询与建议

限定检索结果

文献类型

  • 2,081 篇 会议
  • 1,579 篇 期刊文献

馆藏范围

  • 3,660 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,357 篇 工学
    • 1,793 篇 计算机科学与技术...
    • 1,442 篇 软件工程
    • 580 篇 信息与通信工程
    • 314 篇 电气工程
    • 260 篇 控制科学与工程
    • 231 篇 生物工程
    • 228 篇 电子科学与技术(可...
    • 168 篇 网络空间安全
    • 136 篇 机械工程
    • 106 篇 光学工程
    • 93 篇 生物医学工程(可授...
    • 87 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 81 篇 仪器科学与技术
    • 81 篇 交通运输工程
    • 60 篇 材料科学与工程(可...
    • 60 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,073 篇 理学
    • 613 篇 数学
    • 253 篇 物理学
    • 249 篇 生物学
    • 206 篇 统计学(可授理学、...
    • 101 篇 系统科学
    • 86 篇 化学
  • 592 篇 管理学
    • 325 篇 管理科学与工程(可...
    • 302 篇 图书情报与档案管...
    • 99 篇 工商管理
  • 118 篇 法学
    • 72 篇 社会学
  • 79 篇 医学
    • 69 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 43 篇 经济学
  • 31 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 163 篇 feature extracti...
  • 129 篇 semantics
  • 123 篇 accuracy
  • 107 篇 training
  • 106 篇 computational mo...
  • 97 篇 federated learni...
  • 95 篇 deep learning
  • 79 篇 privacy
  • 70 篇 data models
  • 68 篇 cryptography
  • 61 篇 authentication
  • 59 篇 security
  • 57 篇 data privacy
  • 57 篇 protocols
  • 57 篇 robustness
  • 52 篇 object detection
  • 52 篇 neural networks
  • 52 篇 cloud computing
  • 50 篇 adaptation model...
  • 47 篇 information secu...

机构

  • 264 篇 key laboratory o...
  • 206 篇 shandong provinc...
  • 95 篇 university of ch...
  • 83 篇 key laboratory o...
  • 82 篇 school of comput...
  • 65 篇 information secu...
  • 65 篇 school of cyber ...
  • 63 篇 cas key laborato...
  • 61 篇 shandong provinc...
  • 59 篇 guangdong provin...
  • 52 篇 shandong enginee...
  • 50 篇 tianjin key labo...
  • 49 篇 network and data...
  • 49 篇 shandong fundame...
  • 48 篇 state key labora...
  • 47 篇 peng cheng labor...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 45 篇 school of comput...
  • 43 篇 shandong provinc...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 34 篇 xie xiaohua
  • 33 篇 yixian yang
  • 32 篇 huang qingming
  • 32 篇 cao xiaochun
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 25 篇 xu qianqian
  • 25 篇 li wei
  • 25 篇 jin hai
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 21 篇 hu shengshan
  • 21 篇 lai jianhuang
  • 21 篇 meng deyu

语言

  • 3,103 篇 英文
  • 484 篇 其他
  • 82 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3660 条 记 录,以下是2401-2410 订阅
排序:
Dense-captioning events in videos: Sysu submission to Activitynet Challenge 2020
arXiv
收藏 引用
arXiv 2020年
作者: Wang, Teng Zheng, Huicheng Yu, Mingjing School of Data and Computer Science Sun Yat-sen University Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education Guangdong Province Key Laboratory of Information Security Technology China
This technical report presents a brief description of our submission to the dense video captioning task of ActivityNet Challenge 2020. Our approach follows a two-stage pipeline: first, we extract a set of temporal eve...
来源: 评论
Reliable Multi-Modal Object Re-Identification via Modality-Aware Graph Reasoning
arXiv
收藏 引用
arXiv 2025年
作者: Wan, Xixi Zheng, Aihua Wang, Zi Jiang, Bo Tang, Jin Ma, Jixin Information Materials and Intelligent Sensing Laboratory of Anhui Province Anhui Provincial Key Laboratory of Security Artificial Intelligence School of Artificial Intelligence Anhui University Hefei230601 China School of Biomedical Engineering Anhui Medical University Key Laboratory of Intelligent Computing & Signal Processing Ministry of Education Anhui University Hefei China Anhui Provincial Key Laboratory of Multimodal Cognitive Computation School of Computer Science and Technology Anhui University Hefei230601 China School of Computing and Mathematical Sciences University of Greenwich LondonSE10 9LS United Kingdom
Multi-modal data provides abundant and diverse object information, crucial for effective modal interactions in Re-Identification (ReID) tasks. However, existing approaches often overlook the quality variations in loca... 详细信息
来源: 评论
Lightweight deep reinforcement learning for dynamic resource allocation in vehicular edge computing
收藏 引用
Digital Communications and networks 2025年
作者: Dapeng Wu Sijun Wu Yaping Cui Ailing Zhong Tong Tang Ruyan Wang Xinqi Lin School of Communications and Information Engineering Chongqing University of Posts and Telecommunications Chongqing 400065 China Advanced Network and Intelligent Connection Technology Key Laboratory of Chongqing Education Commission of China Chongqing 400065 China Chongqing Key Laboratory of Ubiquitous Sensing and Networking Chongqing 400065 China College of Computer and Cyber Security Fujian Normal University Fuzhou 350117 China
Vehicular Edge computing (VEC) enhances the quality of user services by deploying wealth of resources near vehicles. However, due to highly dynamic and complex nature of vehicular networks, centralized decision-making... 详细信息
来源: 评论
Energy efficiency evaluation based on QoS parameter specification for cloud systems  22
Energy efficiency evaluation based on QoS parameter specific...
收藏 引用
22nd IEEE International Conference on High Performance computing and Communications, 18th IEEE International Conference on Smart City and 6th IEEE International Conference on Data Science and Systems, HPCC-SmartCity-DSS 2020
作者: Long, Saiqin Yu, Hao Li, Zhetao Tian, Shujuan Li, Yun Xiangtan University Key Laboratory of Hunan Province for Internet of Things and Information Security Hunan Intl. Sci. and Technol. Cooperation Base of Intelligent Network School of Computer Science Xiangtan China Nanjing University of Posts and Telecommunications School of Computer Science and Technology Nanjing China
Energy efficiency evaluation (EEE) is a research difficulty in the field of cloud computing. The current research mainly considers the relevant energy efficiency indicators of cloud systems and weights the interrelati... 详细信息
来源: 评论
Optimizing Two-way Partial AUC with an End-to-end Framework
arXiv
收藏 引用
arXiv 2022年
作者: Yang, Zhiyong Xu, Qianqian Bao, Shilong He, Yuan Cao, Xiaochun Huang, Qingming School of Computer Science and Technology University of Chinese Academy of Sciences Beijing100049 China The Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China School of Cyber Security University of Chinese Academy of Sciences Beijing100049 China The Security Department of Alibaba Group Hangzhou311121 China School of Cyber Science and Technology Shenzhen Campus Sun Yat-sen University Shenzhen518107 China The School of Computer Science and Technology University of Chinese Academy of Sciences Beijing101408 China University of Chinese Academy of Sciences Beijing101408 China Peng Cheng Laboratory Shenzhen518055 China
The Area Under the ROC Curve (AUC) is a crucial metric for machine learning, which evaluates the average performance over all possible True Positive Rates (TPRs) and False Positive Rates (FPRs). Based on the knowledge... 详细信息
来源: 评论
TVIDS: Trusted Virtual IDS With SGX
收藏 引用
China Communications 2019年 第10期16卷 133-150页
作者: Juan Wang Shirong Hao Yi Li Zhi Hong Fei Yan Bo Zhao Jing Ma Huanguo Zhang Key Laboratory of Aerospace Information Security and Trust Computing Ministry of EducationSchool of Cyber Science and EngineeringWuhan UniversityWuhan 430072HubeiChina School of Cyber Science and Engineering Wuhan UniversityWuhan 430072China Science and Technology on Information Assurance Laboratory Beijing 100072China
network functions such as intrusion detection systems (IDS) have been increasingly deployed as virtual network functions or outsourced to cloud service providers so as to achieve the scalability and agility, and reduc... 详细信息
来源: 评论
A Dynamic Collaborative Filtering Algorithm based on Convolutional Neural networks and Multi-layer Perceptron
A Dynamic Collaborative Filtering Algorithm based on Convolu...
收藏 引用
International Conference on Ubiquitous computing and Communications and International Symposium on Cyberspace and security (IUCC-CSS)
作者: Qiang Sun Lei-lei Shi Lu Liu Zi-xuan Han Liang Jiang Yao Lu John Panneerselvam School of Computer Science and Telecommunication Engineering Jiangsu University China Jiangsu Key Laboratory of Security Tech. for Industrial Cyberspace Jiangsu University China School of Computing and Mathematical Sciences University of Leicester UK School of Computer Jiangsu University of science and technology China
In the current information era of enormous amount of data generation, recommendation systems are increasingly used as an efficient way to mitigate information overload in networks. The recommendation systems are used ... 详细信息
来源: 评论
Sentiment Analysis of Web Text Based on Deep Learning with a Attention Mechanism
Sentiment Analysis of Web Text Based on Deep Learning with a...
收藏 引用
International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI)
作者: Qing Yu Hui Zhao Kaiwen Jiang Tianjin Key Laboratory of Intelligence Computing and Network Security Tianjin University of Technology Tianjin China
The sentiment analysis of online commentary is a hot research topic in the field of network information mining. Traditional text sentiment analysis methods are mainly based on emotional dictionaries or machine learnin...
来源: 评论
ON THE OPPORTUNITIES OF GREEN computing: A SURVEY
arXiv
收藏 引用
arXiv 2023年
作者: Zhou, You Lin, Xiujing Zhang, Xiang Wang, Maolin Jiang, Gangwei Lu, Huakang Wu, Yupeng Zhang, Kai Yang, Zhe Wang, Kehang Sui, Yongduo Jia, Fengwei Tang, Zuoli Zhao, Yao Zhang, Hongxuan Yang, Tiannuo Chen, Weibo Mao, Yunong Li, Yi Bao, De Li, Yu Liao, Hongrui Liu, Ting Liu, Jingwen Guo, Jinchi Zhao, Xiangyu Wei, Ying Qian, Hong Liu, Qi Wang, Xiang Chan, Wai Kin Li, Chenliang Li, Yusen Yang, Shiyu Yan, Jining Mou, Chao Han, Shuai Jin, Wuxia Zhang, Guannan Zeng, Xiaodong Tsinghua University China Shanghai Jiaotong University China University of Science and Technology of China China Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University China Huazhong University of Science and Technology China Shanghai Institute of AI for Education School of Computer Science and Technology East China Normal University China Xi’an Jiaotong University China College of Computer Science Nankai University China School of Computer Science China University of Geosciences China School of Information Science and Technology Beijing Forestry University China Engineering Research Center for Forestry-Oriented Intelligent Information Processing National Forestry and Grassland Administration China Guangzhou University China Nanyang Technological University Singapore City University of Hong Kong Hong Kong Wuhan University China State Key Laboratory for Novel Software Technology Nanjing University China Ant Group China
Artificial Intelligence (AI) has achieved significant advancements in technology and research with the development over several decades, and is widely used in many areas including computing vision, natural language pr... 详细信息
来源: 评论
Channel Estimation for Irregular Subarrayed RIS-Aided mmwave Communications
收藏 引用
IEEE Transactions on Vehicular technology 2025年
作者: Yu, Xiao Liu, Heng Gong, Shiqi Shen, Wenqian Zhao, Junhui Xing, Chengwen Beijing Institute of Technology School of Information and Electronics Beijing100081 China Xi'an University of Posts and Telecommunications Shaanxi Key Laboratory of Information Communication Network and Security Shaanxi Xi'an710121 China Beijing Jiaotong University School of Electronic and Information Engineering Beijing100044 China
Channel estimation is essential for reconfigurable intelligent surface (RIS)-aided wireless communications. Irregular RIS structures can provide more design degrees of freedom to enhance system performance. In this pa... 详细信息
来源: 评论