咨询与建议

限定检索结果

文献类型

  • 2,101 篇 会议
  • 1,612 篇 期刊文献

馆藏范围

  • 3,713 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,413 篇 工学
    • 1,834 篇 计算机科学与技术...
    • 1,467 篇 软件工程
    • 603 篇 信息与通信工程
    • 346 篇 电气工程
    • 275 篇 控制科学与工程
    • 240 篇 电子科学与技术(可...
    • 232 篇 生物工程
    • 182 篇 网络空间安全
    • 141 篇 机械工程
    • 113 篇 光学工程
    • 94 篇 生物医学工程(可授...
    • 94 篇 安全科学与工程
    • 89 篇 交通运输工程
    • 88 篇 化学工程与技术
    • 83 篇 仪器科学与技术
    • 66 篇 材料科学与工程(可...
    • 61 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,089 篇 理学
    • 623 篇 数学
    • 263 篇 物理学
    • 250 篇 生物学
    • 207 篇 统计学(可授理学、...
    • 101 篇 系统科学
    • 90 篇 化学
  • 606 篇 管理学
    • 336 篇 管理科学与工程(可...
    • 306 篇 图书情报与档案管...
    • 100 篇 工商管理
  • 118 篇 法学
    • 72 篇 社会学
  • 80 篇 医学
    • 70 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 43 篇 经济学
  • 31 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 165 篇 feature extracti...
  • 129 篇 semantics
  • 125 篇 accuracy
  • 109 篇 training
  • 106 篇 computational mo...
  • 102 篇 federated learni...
  • 98 篇 deep learning
  • 80 篇 privacy
  • 72 篇 data models
  • 68 篇 cryptography
  • 62 篇 authentication
  • 61 篇 security
  • 59 篇 data privacy
  • 59 篇 robustness
  • 58 篇 protocols
  • 53 篇 object detection
  • 52 篇 neural networks
  • 52 篇 cloud computing
  • 50 篇 adaptation model...
  • 47 篇 optimization

机构

  • 271 篇 key laboratory o...
  • 206 篇 shandong provinc...
  • 97 篇 university of ch...
  • 83 篇 school of comput...
  • 83 篇 key laboratory o...
  • 66 篇 school of cyber ...
  • 65 篇 shandong provinc...
  • 64 篇 cas key laborato...
  • 64 篇 information secu...
  • 60 篇 guangdong provin...
  • 52 篇 shandong enginee...
  • 52 篇 tianjin key labo...
  • 50 篇 network and data...
  • 50 篇 shandong fundame...
  • 49 篇 state key labora...
  • 47 篇 peng cheng labor...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 46 篇 school of comput...
  • 44 篇 institute of inf...

作者

  • 100 篇 cheng xueqi
  • 49 篇 guo jiafeng
  • 47 篇 shen huawei
  • 43 篇 zheng wei-shi
  • 34 篇 xie xiaohua
  • 33 篇 huang qingming
  • 33 篇 yixian yang
  • 33 篇 cao xiaochun
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 25 篇 jin hai
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 21 篇 hu shengshan
  • 21 篇 lai jianhuang
  • 21 篇 wang yichuan
  • 20 篇 yang zhiyong

语言

  • 2,977 篇 英文
  • 661 篇 其他
  • 87 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3713 条 记 录,以下是2481-2490 订阅
排序:
On layer normalization in the transformer architecture  37
On layer normalization in the transformer architecture
收藏 引用
37th International Conference on Machine Learning, ICML 2020
作者: Xiong, Ruibin Yang, Yunchang He, Di Zheng, Kai Zheng, Shuxin Xing, Chen Zhang, Huishuai Lan, Yanyan Wang, Liwei Liu, Tie-Yan CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technolog Chinese Academy of Sciences China University of Chinese Academy of Sciences China Center for Data Science Peking University Beijing Institute of Big Data Research China Key Laboratory of Machine Perception MOE School of EECS Peking University China Microsoft Research College of Computer Science Nankai University China
The Transformer is widely used in natural language processing tasks. To train a Transformer however, one usually needs a carefully designed learning rate warm-up stage, which is shown to be crucial to the final perfor... 详细信息
来源: 评论
Global-and-Local Collaborative Learning for Co-Salient Object Detection
arXiv
收藏 引用
arXiv 2022年
作者: Cong, Runmin Yang, Ning Li, Chongyi Fu, Huazhu Zhao, Yao Huang, Qingming Kwong, Sam The Institute of Information Science Beijing Jiaotong University Beijing100044 China The Beijing Key Laboratory of Advanced Information Science and Network Technology Beijing100044 China The Department of Computer Science City University of Hong Kong Hong Kong The School of Computer Science and Engineering Nanyang Technological University Singapore A*STAR Singapore The School of Computer Science and Technology University of Chinese Academy of Sciences Beijing101408 China University of Chinese Academy of Sciences Beijing101408 China The Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China Peng Cheng Laboratory Shenzhen518055 China The City University of Hong Kong Shenzhen Research Institute Shenzhen51800 China
The goal of co-salient object detection (CoSOD) is to discover salient objects that commonly appear in a query group containing two or more relevant images. Therefore, how to effectively extract inter-image correspond... 详细信息
来源: 评论
Exact distributed quantum algorithm for generalized Simon’s problem
arXiv
收藏 引用
arXiv 2023年
作者: Li, Hao Qiu, Daowen Luo, Le Mateus, Paulo Institute of Quantum Computing and Computer Theory School of Computer Science and Engineering Sun Yat-sen University Guangzhou510006 China The Guangdong Key Laboratory of Information Security Technology Sun Yat-sen University 510006 China QUDOOR Technologies Inc. Zhuhai China School of Physics and Astronomy Sun Yat-sen University Zhuhai519082 China Instituto de Telecomunicações Departamento de Matemática Instituto Superior Técnico Av. Rovisco Pais Lisbon1049-001 Portugal
Simon’s problem is one of the most important problems demonstrating the power of quantum algorithms, as it greatly inspired the proposal of Shor’s algorithm. The generalized Simon’s problem is a natural extension o... 详细信息
来源: 评论
An Imbalanced Learning Based Method for Esophageal Squamous Cell Carcinoma (ESCC) Distant Metastasis Predicting  3rd
An Imbalanced Learning Based Method for Esophageal Squamous ...
收藏 引用
3rd International Conference on Machine Learning for Cyber security, ML4CS 2020
作者: Li, Xuemei Yang, Bo Peng, Lizhi Li, Baosheng Zhu, Jian Educational Technology Center Shandong College of Traditional Chinese Medicine Yantai264199 China Shandong Provincial Key Laboratory of Network Based Intelligent Computing University of Jinan Jinan250022 China Department of Radiation Oncology Shandong Cancer Hospital affiliated to Shandong University Jinan250117 China
Accurately predicting distant metastasis is very important for esophageal squamous cell carcinoma (ESCC) patients, as it is a key evidence to determine the degree of this disease. Traditional metastasis predictions ar... 详细信息
来源: 评论
Safeguarding Next Generation Multiple Access Using Physical Layer security Techniques: A Tutorial
arXiv
收藏 引用
arXiv 2024年
作者: Lv, Lu Xu, Dongyang Hu, Rose Qingyang Ye, Yinghui Yang, Long Lei, Xianfu Wang, Xianbin Kim, Dong In Nallanathan, Arumugam The State Key Laboratory of Integrated Services Networks Xidian University Xi’an710071 China The School of Information and Communications Engineering Xi’an Jiaotong University Xi’an710049 China The Department of Electrical and Computer Engineering Utah State University LoganUT84322 United States The Shaanxi Key Laboratory of Information Communication Network and Security Xi’an University of Posts & Telecommunications Xi’an710121 China The School of Information Science and Technology Southwest Jiaotong University Chengdu610031 China The Department of Electrical and Computer Engineering Western University LondonONN6A 5B9 Canada The Department of Electrical and Computer Engineering Sungkyunkwan University Suwon16419 Korea Republic of School of Electronic Engineering and Computer Science Queen Mary University of London E1 4NS United Kingdom
Driven by the ever-increasing requirements of ultrahigh spectral efficiency, ultra-low latency, and massive connectivity, the forefront of wireless research calls for the design of advanced next generation multiple ac... 详细信息
来源: 评论
Learning with multiclass AUC: Theory and algorithms
arXiv
收藏 引用
arXiv 2021年
作者: Yang, Zhiyong Xu, Qianqian Bao, Shilong Cao, Xiaochun Huang, Qingming The School of Computer Science and Technology University of Chinese Academy of Sciences Beijing101408 China The Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China The State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China The School of Cyber Security University of Chinese Academy of Sciences Beijing100049 China School of Cyber Science and Technology Sun Yat-sen University Shenzhen518100 China University of Chinese Academy of Sciences Beijing101408 China Peng Cheng Laboratory Shenzhen518055 China
The Area under the ROC curve (AUC) is a well-known ranking metric for problems such as imbalanced learning and recommender systems. The vast majority of existing AUC-optimization-based machine learning methods only fo... 详细信息
来源: 评论
Respiratory Sound Classification Based on BiGRU-Attention network with XGBoost
Respiratory Sound Classification Based on BiGRU-Attention Ne...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Xuesong Zhao Yanbo Shao Juanyun Mai Airu Yin Sihan Xu College of Computer Science Nankai University Tianjin China Tianjin Key Laboratory of Network and Data Security Technology Tianjin China KLMDASR Tianjin China
In recent years, the mortality rate of respiratory diseases ranks high among the major diseases. Early detection of respiratory diseases is a key factor in reducing the mortality rate and curing diseases. In this pape... 详细信息
来源: 评论
Cipherchain:A Secure and Efficient Ciphertext Blockchain via mPECK
收藏 引用
Journal of Quantum computing 2020年 第1期2卷 57-83页
作者: Hailin Chen Gang Xu Yuling Chen Xiubo Chen Yixian Yang Ruibin Fan Kaixiang Zhang Huizhong Li Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijing100876China Guizhou University Sate Key Laboratory of Public Big DataGuizhou550025China North China University of Technology School of Computing Science and TechnologyBeijingChina Webank Shenzhen518000China
Most existing blockchain schemes are based on the design concept“openness and transparency”to realize data security,which usually require transaction data to be presented in the form of ***,it inevitably brings the ... 详细信息
来源: 评论
Adversity-Based Social Circles Inference via Context-Aware Mobility
Adversity-Based Social Circles Inference via Context-Aware M...
收藏 引用
GLOBECOM 2020 - 2020 IEEE Global Communications Conference
作者: Qiang Gao Fan Zhou Goce Trajcevski Fengli Zhang Xucheng Luo Network and Data Security Key Laboratory of Sichuan Province China University of Electronic Science and Technology of China China Iowa State University Ames USA
The ubiquity of mobile devices use has generated huge volumes of location-aware contextual data, providing opportunities enriching various location-based social network (LBSN) applications - e.g., trip recommendation,... 详细信息
来源: 评论
SPECBOX: A label-based transparent speculation scheme against transient execution attacks
arXiv
收藏 引用
arXiv 2021年
作者: Tang, Bowen Wu, Chenggang Wang, Zhe Jia, Lichen Yew, Pen-Chung Cheng, Yueqiang Zhang, Yinqian Wang, Chenxi Xu, Guoqing Harry State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences China University of the Chinese Academy of Sciences China University of Minnesota Twin Cities United States NIO Security Research United States Southern University of Science and Technology China University of California Los Angeles United States
Speculative execution techniques have been a cornerstone of modern processors to improve instruction-level parallelism. However, recent studies showed that this kind of techniques could be exploited by attackers to le... 详细信息
来源: 评论