咨询与建议

限定检索结果

文献类型

  • 2,081 篇 会议
  • 1,579 篇 期刊文献

馆藏范围

  • 3,660 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,357 篇 工学
    • 1,793 篇 计算机科学与技术...
    • 1,442 篇 软件工程
    • 580 篇 信息与通信工程
    • 314 篇 电气工程
    • 260 篇 控制科学与工程
    • 231 篇 生物工程
    • 228 篇 电子科学与技术(可...
    • 168 篇 网络空间安全
    • 136 篇 机械工程
    • 106 篇 光学工程
    • 93 篇 生物医学工程(可授...
    • 87 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 81 篇 仪器科学与技术
    • 81 篇 交通运输工程
    • 60 篇 材料科学与工程(可...
    • 60 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,073 篇 理学
    • 613 篇 数学
    • 253 篇 物理学
    • 249 篇 生物学
    • 206 篇 统计学(可授理学、...
    • 101 篇 系统科学
    • 86 篇 化学
  • 592 篇 管理学
    • 325 篇 管理科学与工程(可...
    • 302 篇 图书情报与档案管...
    • 99 篇 工商管理
  • 118 篇 法学
    • 72 篇 社会学
  • 79 篇 医学
    • 69 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 43 篇 经济学
  • 31 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 163 篇 feature extracti...
  • 129 篇 semantics
  • 123 篇 accuracy
  • 107 篇 training
  • 106 篇 computational mo...
  • 97 篇 federated learni...
  • 95 篇 deep learning
  • 79 篇 privacy
  • 70 篇 data models
  • 68 篇 cryptography
  • 61 篇 authentication
  • 59 篇 security
  • 57 篇 data privacy
  • 57 篇 protocols
  • 57 篇 robustness
  • 52 篇 object detection
  • 52 篇 neural networks
  • 52 篇 cloud computing
  • 50 篇 adaptation model...
  • 47 篇 information secu...

机构

  • 264 篇 key laboratory o...
  • 206 篇 shandong provinc...
  • 95 篇 university of ch...
  • 83 篇 key laboratory o...
  • 82 篇 school of comput...
  • 65 篇 information secu...
  • 65 篇 school of cyber ...
  • 63 篇 cas key laborato...
  • 61 篇 shandong provinc...
  • 59 篇 guangdong provin...
  • 52 篇 shandong enginee...
  • 50 篇 tianjin key labo...
  • 49 篇 network and data...
  • 49 篇 shandong fundame...
  • 48 篇 state key labora...
  • 47 篇 peng cheng labor...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 45 篇 school of comput...
  • 43 篇 shandong provinc...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 34 篇 xie xiaohua
  • 33 篇 yixian yang
  • 32 篇 huang qingming
  • 32 篇 cao xiaochun
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 25 篇 xu qianqian
  • 25 篇 li wei
  • 25 篇 jin hai
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 21 篇 hu shengshan
  • 21 篇 lai jianhuang
  • 21 篇 meng deyu

语言

  • 3,103 篇 英文
  • 484 篇 其他
  • 82 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3660 条 记 录,以下是2461-2470 订阅
排序:
An improved deep convolutionary neural network for bone marrow cancer detection using image processing
收藏 引用
Informatics in Medicine Unlocked 2023年 38卷
作者: Ramasamy, Manjula Devi Dhanaraj, Rajesh Kumar Pani, Subhendu Kumar Das, Rashmi Prava Movassagh, Ali Akbar Gheisari, Mehdi Liu, Yang Porkar, P. Banu, Sabitha Department of Computer Science and Engineering KPR Institute of Engineering and Technology India School of Computing Science and Engineering Galgotias University India Krupajal Engineering College Biju Patnaik University of Technology Odisha India Department of Computer Science and Engineering CV Raman Global University Bhubaneswar India Department of Biomedical Engineering School of Medicine Tehran University of medical sciences Tehran Iran Department of Computer Engineering Science and Research Branch Islamic Azad University Tehran Iran School of Computer Science and Technology Harbin Institute of Technology Shenzhen China Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies China Department of Cognitive Computing Institute of Computer Science and Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Chennai India Young researchers and elite club Islamic Azad University Parand Iran
Bone Marrow Cancer is a type of cancer that develops in the stem cells of the bone marrow that are responsible for blood formation. AML(Acute Myeloid Leukaemia) and MM(Multiple Myeloma) are both types of malignancy th... 详细信息
来源: 评论
On pure MDS asymmetric entanglement-assisted quantum error-correcting codes
arXiv
收藏 引用
arXiv 2021年
作者: Huang, Ziteng Fang, Weijun Fu, Fang-Wei Chern Institute of Mathematics and LPMC Nankai University Tianjin300071 China Shenzhen International Graduate School Tsinghua University PCL Research Center of Networks and Communications Peng Cheng Laboratory Shenzhen518055 China Chern Institute of Mathematics and LPMC Tianjin Key Laboratory of Network and Data Security Technology Nankai University Tianjin300071 China
Recently, Galindo et al. introduced the concept of asymmetric entanglement- assisted quantum error-correcting codes (AEAQECCs) from Calderbank- Shor-Steane (CSS) construction. In general, it's difficult to determi... 详细信息
来源: 评论
An Enhanced Vision Transformer with Autoencoder for Noise Reduction in Knee X-Rays
SSRN
收藏 引用
SSRN 2025年
作者: Mahmood, Jabar Hamza Abdulnabi, Mohamed Shabbir Pasha, Malaika Azeem, Muhammad Ali, Aitizaz Department of Computer Science International Institute of Science Art and Technology Punjab Gujranwala Pakistan Faculty of Computing and Information Technology University of Sialkot Daska Road Punjab Sialkot51040 Pakistan State Key Laboratory of Blockchain and Data Security School of Cyber Science and Technology College of Computer Science and Technology Zhejiang University Zhejiang Hangzhou310007 China Asia Pacific University of Technology and Innovation Kuala Lumpur57000 Malaysia
Traditional methods for medical image denoising, such as Filtering and Convolutional Neuralnetworks, have shown limitations, particularly in preserving image integrity. Recent developmentsin Vision Transformers (ViTs)... 详细信息
来源: 评论
Evaluation Method of Node Importance in Temporal Satellite networks Based on Time Slot Correlation
Research Square
收藏 引用
Research Square 2021年
作者: Xu, Rui Di, Xiaoqiang He, Xiongwen Qi, Hui School of Computer Science and Technology Changchun University of Science and Technology Changchun130022 China School of Computer Science and Technology Changchun University of Science and Technology Changchun130022 China Jilin Province Key Laboratory of Network and Information Security Changchun University of Science and Technology Changchun130022 China Information Center Changchun University of Science and Technology Changchun130022 China Beijing Institute of Spacecraft System Engineering Beijing100094 China
Temporal satellite networks can accurately describe the dynamic process of satellite networks by considering the interaction relationship and interaction sequence between satellite nodes. In addition, the measurement ... 详细信息
来源: 评论
FedPHE: A Secure and Efficient Federated Learning via Packed Homomorphic Encryption
收藏 引用
IEEE Transactions on Dependable and Secure computing 2025年
作者: Li, Yuqing Yan, Nan Chen, Jing Wang, Xiong Hong, Jianan He, Kun Wang, Wei Li, Bo Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan430072 China Wuhan University RiZhao Information Technology Institute Rizhao276800 China Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan430074 China Shanghai Jiao Tong University School of Cyber Science and Engineering Shanghai200240 China Hong Kong University of Science and Technology Department of Computer Science and Engineering Hong Kong
Cross-silo federated learning (FL) enables multiple institutions (clients) to collaboratively build a global model without sharing private data. To prevent privacy leakage during aggregation, homomorphic encryption (H... 详细信息
来源: 评论
A conditional-probability zone transformation coding method for categorical features  19
A conditional-probability zone transformation coding method ...
收藏 引用
2019 ACM Turing Celebration Conference - China, ACM TURC 2019
作者: He, Liang Shen, Chao Li, Yun National Key Laboratory of Science and Technology on Blind Signal Processing Chengdu Sichuan China MOE Key Lab for Intelligent Networks and Network Security Xi'an Jiaotong University Shaanxi Xi'an China
It has been a key issue for solving problems efficiently by machine learning models with code categorical features. The state-of-the-art one-hot coding is a widely accepted method to convert the categorical features i... 详细信息
来源: 评论
Velocity-driven particle swarm optimization  8
Velocity-driven particle swarm optimization
收藏 引用
8th International Conference on computing and Pattern Recognition, ICCPR 2019
作者: Li, Wei Fan, Yaochi Jiang, Qiaoyong Xu, Qingzheng School of Computer Science and Engineering Xi'An University of Technology China Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an710048 China School of Computer Science and Engineering Xi'An University of Technology Xi'an710048 China College of Information and Communication National University of Defense Technology Xi'an710106 China
Particle swarm optimization (PSO) is an efficient nature-inspired optimization algorithm, which has been widely applied in many engineering fields. The performance of particle swarm optimization (PSO) has been signifi... 详细信息
来源: 评论
Defence Against Adversarial Attacks Using Clustering Algorithm  5th
Defence Against Adversarial Attacks Using Clustering Algorit...
收藏 引用
5th International Conference of Pioneer Computer Scientists, Engineers and Educators, ICPCSEE 2019
作者: Zheng, Yanbin Yun, Hongxu Wang, Fu Ding, Yong Huang, Yongzhong Liu, Wenfen Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology Guilin China School of Computer Science and Engineering South China University of Technology Guangzhou China School of Computer Science and Network Security Dongguan University of Technology Dongguan China
Deep learning model is vulnerable to adversarial examples in the task of image classification. In this paper, a cluster-based method for defending against adversarial examples is proposed. Each adversarial example bef... 详细信息
来源: 评论
Controlled Secure Direct Communication Protocol via the Three-Qubit Partially Entangled Set of States
收藏 引用
Computers, Materials & Continua 2019年 第3期58卷 809-827页
作者: Gang Xu Ke Xiao Zongpeng Li Xin-Xin Niu Michael Ryan School of Information Science and Technology North China University of TechnologyBeijing100144China Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijing100876China School of Computer Science Wuhan UniversityHubei430072China Guizhou Provincial Key Laboratory of Public Big Data GuiZhou UniversityGuiyangGuizhou550025China School of Computing Dublin City UniversityDublin 9Ireland.
In this paper,we first re-examine the previous protocol of controlled quantum secure direct communication of Zhang et al.’s scheme,which was found insecure under two kinds of attacks,fake entangled particles attack a... 详细信息
来源: 评论
Metric Learning-based Few-Shot Malicious Node Detection for IoT Backhaul/Fronthaul networks
Metric Learning-based Few-Shot Malicious Node Detection for ...
收藏 引用
GLOBECOM 2022 - 2022 IEEE Global Communications Conference
作者: Ke Zhou Xi Lin Jun Wu Ali Kashif Bashir Jianhua Li Muhammad Imran School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University Shanghai China Shanghai Key Laboratory of Integrated Administration Technologies for Information Security Shanghai China Collaborative Innovation Center of Shanghai Industrial Internet Shanghai China Faculty of Science and Engineering Waseda University Japan Department of Computing and Mathematics Manchester Metropolitan University Manchester U.K. School of Engineering Information Technology and Physical Sciences Federation University Australia
The development of backhaul/fronthaul networks can enable low latency and high reliability, but nodes in future networks like Internet of Things (IoT) can conduct malicious activities like flooding attack and DDoS att... 详细信息
来源: 评论