咨询与建议

限定检索结果

文献类型

  • 2,081 篇 会议
  • 1,579 篇 期刊文献

馆藏范围

  • 3,660 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,357 篇 工学
    • 1,793 篇 计算机科学与技术...
    • 1,442 篇 软件工程
    • 580 篇 信息与通信工程
    • 314 篇 电气工程
    • 260 篇 控制科学与工程
    • 231 篇 生物工程
    • 228 篇 电子科学与技术(可...
    • 168 篇 网络空间安全
    • 136 篇 机械工程
    • 106 篇 光学工程
    • 93 篇 生物医学工程(可授...
    • 87 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 81 篇 仪器科学与技术
    • 81 篇 交通运输工程
    • 60 篇 材料科学与工程(可...
    • 60 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,073 篇 理学
    • 613 篇 数学
    • 253 篇 物理学
    • 249 篇 生物学
    • 206 篇 统计学(可授理学、...
    • 101 篇 系统科学
    • 86 篇 化学
  • 592 篇 管理学
    • 325 篇 管理科学与工程(可...
    • 302 篇 图书情报与档案管...
    • 99 篇 工商管理
  • 118 篇 法学
    • 72 篇 社会学
  • 79 篇 医学
    • 69 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 43 篇 经济学
  • 31 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 163 篇 feature extracti...
  • 129 篇 semantics
  • 123 篇 accuracy
  • 107 篇 training
  • 106 篇 computational mo...
  • 97 篇 federated learni...
  • 95 篇 deep learning
  • 79 篇 privacy
  • 70 篇 data models
  • 68 篇 cryptography
  • 61 篇 authentication
  • 59 篇 security
  • 57 篇 data privacy
  • 57 篇 protocols
  • 57 篇 robustness
  • 52 篇 object detection
  • 52 篇 neural networks
  • 52 篇 cloud computing
  • 50 篇 adaptation model...
  • 47 篇 information secu...

机构

  • 264 篇 key laboratory o...
  • 206 篇 shandong provinc...
  • 95 篇 university of ch...
  • 83 篇 key laboratory o...
  • 82 篇 school of comput...
  • 65 篇 information secu...
  • 65 篇 school of cyber ...
  • 63 篇 cas key laborato...
  • 61 篇 shandong provinc...
  • 59 篇 guangdong provin...
  • 52 篇 shandong enginee...
  • 50 篇 tianjin key labo...
  • 49 篇 network and data...
  • 49 篇 shandong fundame...
  • 48 篇 state key labora...
  • 47 篇 peng cheng labor...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 45 篇 school of comput...
  • 43 篇 shandong provinc...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 34 篇 xie xiaohua
  • 33 篇 yixian yang
  • 32 篇 huang qingming
  • 32 篇 cao xiaochun
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 25 篇 xu qianqian
  • 25 篇 li wei
  • 25 篇 jin hai
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 21 篇 hu shengshan
  • 21 篇 lai jianhuang
  • 21 篇 meng deyu

语言

  • 3,103 篇 英文
  • 484 篇 其他
  • 82 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3660 条 记 录,以下是2411-2420 订阅
排序:
Passive beamforming design for intelligent reflecting surface assisted MIMO systems
arXiv
收藏 引用
arXiv 2021年
作者: Feng, Chenghao Shen, Wenqian Gao, Xinyu An, Jianping School of Information and Electronics Beijing Institute of Technology Beijing100081 China Shaanxi Key Laboratory of Information Communication Network and Security Xian University of Posts and Telecommunications Shaanxi Xian710121 China Huawei Technologies Co. Ltd. Beijing100085 China
Intelligent reflecting surfaces (IRSs) constitute passive devices, which are capable of adjusting the phase shifts of their reflected signals, and hence they are suitable for passive beamforming. In this paper, we con... 详细信息
来源: 评论
Velocity-Driven Particle Swarm Optimization  19
Velocity-Driven Particle Swarm Optimization
收藏 引用
Proceedings of the 2019 8th International Conference on computing and Pattern Recognition
作者: Wei Li Yaochi Fan Qiaoyong Jiang Qingzheng Xu School of Computer Science and Engineering Xi'an University of Technology and Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China School of Computer Science and Engineering Xi'an University of Technology Xi'an China College of Information and Communication National University of Defense Technology Xi'an China
Particle swarm optimization (PSO) is an efficient nature-inspired optimization algorithm, which has been widely applied in many engineering fields. The performance of particle swarm optimization (PSO) has been signifi... 详细信息
来源: 评论
Research on machine learning prediction of air quality index based on SPSS  3
Research on machine learning prediction of air quality index...
收藏 引用
3rd International Conference on Computer network, Electronic and Automation, ICCNEA 2020
作者: Ma, Limei Gao, Yijun Zhao, Chen College of Information Technology Hebei Normal University Shijiazhuang China School of Information Studies Dominican University River Forest United States Key Laboratory of Network and Information Security in Hebei Province Shijiazhuang China School of Information Studies Dominican University River Forest River ForestIN United States
Air From autumn to winter, air pollution in North China is very serious. If we can make effective prediction, we can achieve effective prevention. In this paper, SPSS is used to associate a phenomenon with multiple fa... 详细信息
来源: 评论
A Semantic-based Replacement for Event Image Privacy
A Semantic-based Replacement for Event Image Privacy
收藏 引用
IEEE International Conference on Computational Science and Engineering, CSE
作者: Zhenfei Chen Zhu Tianqing Bing Tian Yu Wang Wei Ren School of Computer Science China University of Geosciences Wuhan P.R. China Institute of Artificial Intelligence and Blockchain Guangzhou University Guangzhou P.R. China School of Computer Science China University of Geosciences Guangxi Key Laboratory of Cryptography and Information Security Key Laboratory of Network Assessment Technology CAS Beijing P.R. China
Thanks to the continuous development of deep learning and the updating of deep neural networks, the accuracy of various computer vision tasks continue improving. On the one hand, the accuracy of image recognition is s... 详细信息
来源: 评论
Two-phases detection scheme: Detecting android malware in android markets
Two-phases detection scheme: Detecting android malware in an...
收藏 引用
International Conference on Applications and Techniques in Cyber Intelligence, ATCI 2018
作者: Su, Xin Lin, Jiuchuan Shen, Fuhui Zheng, Yi Hunan Provincial Key Laboratory of Network Investigational Technology Hunan Police Academy Changsha China Department of Information Technology Hunan Police Academy Changsha China Key Lab of Information Network Security of Ministry of Public Security The Third Research Institute of Ministry of Public Security Shanghai China Zhejiang Economic Information Center Hangzhou China
Recently, Android application becomes popular and important in human’s daily work, life, entertainment. However, because of open source of Android application, more and more malware aim to this platform and launch va... 详细信息
来源: 评论
OPEN: orthogonal propagation with ego-network modeling  22
OPEN: orthogonal propagation with ego-network modeling
收藏 引用
Proceedings of the 36th International Conference on Neural Information Processing Systems
作者: Liang Yang Lina Kang Qiuliang Zhang Mengzhe Li Bingxin Niu Dongxiao He Zhen Wang Chuan Wang Xiaochun Cao Yuanfang Guo School of Artificial Intelligence Hebei University of Technology Tianjin China College of Intelligence and Computing Tianjin University Tianjin China School of Artificial Intelligence OPtics and ElectroNics (iOPEN) Northwestern Polytechnical University Xi'an China and School of Cybersecurity Northwestern Polytechnical University Xi'an China State Key Laboratory of Information Security IIE CAS Beijing China School of Cyber Science and Technology Sun Yat-sen University Shenzhen China School of Computer Science and Engineering Beihang University Beijing China and Zhongguancun Laboratory Beijing China
To alleviate the unfavorable effect of noisy topology in Graph Neural networks (GNNs), some efforts perform the local topology refinement through the pairwise propagation weight learning and the multi-channel extensio...
来源: 评论
On layer normalization in the transformer architecture  37
On layer normalization in the transformer architecture
收藏 引用
37th International Conference on Machine Learning, ICML 2020
作者: Xiong, Ruibin Yang, Yunchang He, Di Zheng, Kai Zheng, Shuxin Xing, Chen Zhang, Huishuai Lan, Yanyan Wang, Liwei Liu, Tie-Yan CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technolog Chinese Academy of Sciences China University of Chinese Academy of Sciences China Center for Data Science Peking University Beijing Institute of Big Data Research China Key Laboratory of Machine Perception MOE School of EECS Peking University China Microsoft Research College of Computer Science Nankai University China
The Transformer is widely used in natural language processing tasks. To train a Transformer however, one usually needs a carefully designed learning rate warm-up stage, which is shown to be crucial to the final perfor... 详细信息
来源: 评论
Exact distributed quantum algorithm for generalized Simon’s problem
arXiv
收藏 引用
arXiv 2023年
作者: Li, Hao Qiu, Daowen Luo, Le Mateus, Paulo Institute of Quantum Computing and Computer Theory School of Computer Science and Engineering Sun Yat-sen University Guangzhou510006 China The Guangdong Key Laboratory of Information Security Technology Sun Yat-sen University 510006 China QUDOOR Technologies Inc. Zhuhai China School of Physics and Astronomy Sun Yat-sen University Zhuhai519082 China Instituto de Telecomunicações Departamento de Matemática Instituto Superior Técnico Av. Rovisco Pais Lisbon1049-001 Portugal
Simon’s problem is one of the most important problems demonstrating the power of quantum algorithms, as it greatly inspired the proposal of Shor’s algorithm. The generalized Simon’s problem is a natural extension o... 详细信息
来源: 评论
Global-and-Local Collaborative Learning for Co-Salient Object Detection
arXiv
收藏 引用
arXiv 2022年
作者: Cong, Runmin Yang, Ning Li, Chongyi Fu, Huazhu Zhao, Yao Huang, Qingming Kwong, Sam The Institute of Information Science Beijing Jiaotong University Beijing100044 China The Beijing Key Laboratory of Advanced Information Science and Network Technology Beijing100044 China The Department of Computer Science City University of Hong Kong Hong Kong The School of Computer Science and Engineering Nanyang Technological University Singapore A*STAR Singapore The School of Computer Science and Technology University of Chinese Academy of Sciences Beijing101408 China University of Chinese Academy of Sciences Beijing101408 China The Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China Peng Cheng Laboratory Shenzhen518055 China The City University of Hong Kong Shenzhen Research Institute Shenzhen51800 China
The goal of co-salient object detection (CoSOD) is to discover salient objects that commonly appear in a query group containing two or more relevant images. Therefore, how to effectively extract inter-image correspond... 详细信息
来源: 评论
An Imbalanced Learning Based Method for Esophageal Squamous Cell Carcinoma (ESCC) Distant Metastasis Predicting  3rd
An Imbalanced Learning Based Method for Esophageal Squamous ...
收藏 引用
3rd International Conference on Machine Learning for Cyber security, ML4CS 2020
作者: Li, Xuemei Yang, Bo Peng, Lizhi Li, Baosheng Zhu, Jian Educational Technology Center Shandong College of Traditional Chinese Medicine Yantai264199 China Shandong Provincial Key Laboratory of Network Based Intelligent Computing University of Jinan Jinan250022 China Department of Radiation Oncology Shandong Cancer Hospital affiliated to Shandong University Jinan250117 China
Accurately predicting distant metastasis is very important for esophageal squamous cell carcinoma (ESCC) patients, as it is a key evidence to determine the degree of this disease. Traditional metastasis predictions ar... 详细信息
来源: 评论