咨询与建议

限定检索结果

文献类型

  • 2,081 篇 会议
  • 1,579 篇 期刊文献

馆藏范围

  • 3,660 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,357 篇 工学
    • 1,793 篇 计算机科学与技术...
    • 1,442 篇 软件工程
    • 580 篇 信息与通信工程
    • 314 篇 电气工程
    • 260 篇 控制科学与工程
    • 231 篇 生物工程
    • 228 篇 电子科学与技术(可...
    • 168 篇 网络空间安全
    • 136 篇 机械工程
    • 106 篇 光学工程
    • 93 篇 生物医学工程(可授...
    • 87 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 81 篇 仪器科学与技术
    • 81 篇 交通运输工程
    • 60 篇 材料科学与工程(可...
    • 60 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,073 篇 理学
    • 613 篇 数学
    • 253 篇 物理学
    • 249 篇 生物学
    • 206 篇 统计学(可授理学、...
    • 101 篇 系统科学
    • 86 篇 化学
  • 592 篇 管理学
    • 325 篇 管理科学与工程(可...
    • 302 篇 图书情报与档案管...
    • 99 篇 工商管理
  • 118 篇 法学
    • 72 篇 社会学
  • 79 篇 医学
    • 69 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 43 篇 经济学
  • 31 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 163 篇 feature extracti...
  • 129 篇 semantics
  • 123 篇 accuracy
  • 107 篇 training
  • 106 篇 computational mo...
  • 97 篇 federated learni...
  • 95 篇 deep learning
  • 79 篇 privacy
  • 70 篇 data models
  • 68 篇 cryptography
  • 61 篇 authentication
  • 59 篇 security
  • 57 篇 data privacy
  • 57 篇 protocols
  • 57 篇 robustness
  • 52 篇 object detection
  • 52 篇 neural networks
  • 52 篇 cloud computing
  • 50 篇 adaptation model...
  • 47 篇 information secu...

机构

  • 264 篇 key laboratory o...
  • 206 篇 shandong provinc...
  • 95 篇 university of ch...
  • 83 篇 key laboratory o...
  • 82 篇 school of comput...
  • 65 篇 information secu...
  • 65 篇 school of cyber ...
  • 63 篇 cas key laborato...
  • 61 篇 shandong provinc...
  • 59 篇 guangdong provin...
  • 52 篇 shandong enginee...
  • 50 篇 tianjin key labo...
  • 49 篇 network and data...
  • 49 篇 shandong fundame...
  • 48 篇 state key labora...
  • 47 篇 peng cheng labor...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 45 篇 school of comput...
  • 43 篇 shandong provinc...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 34 篇 xie xiaohua
  • 33 篇 yixian yang
  • 32 篇 huang qingming
  • 32 篇 cao xiaochun
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 25 篇 xu qianqian
  • 25 篇 li wei
  • 25 篇 jin hai
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 21 篇 hu shengshan
  • 21 篇 lai jianhuang
  • 21 篇 meng deyu

语言

  • 3,103 篇 英文
  • 484 篇 其他
  • 82 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3660 条 记 录,以下是2511-2520 订阅
排序:
Joint resource management for MC-NOMA: A deep reinforcement learning approach
arXiv
收藏 引用
arXiv 2021年
作者: Wang, Shaoyang Lv, Tiejun Ni, Wei Beaulieu, Norman C. Guo, Y. Jay Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing100876 China Sydney2122 Australia Beijing Key Laboratory for Network System Architecture and Convergence School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing100876 China Global Big Data Technologies Centre University of Technology Sydney UltimoNSW2007 Australia
This paper presents a novel and effective deep reinforcement learning (DRL)-based approach to addressing joint resource management (JRM) in a practical multi-carrier non-orthogonal multiple access (MC-NOMA) system, wh... 详细信息
来源: 评论
A more compact object detector head network with feature enhancement and relational reasoning
arXiv
收藏 引用
arXiv 2021年
作者: Zhang, Wenchao Fu, Chong Chang, Xiangshi Zhao, Tengfei Li, Xiang Sham, Chiu-Wing School of Computer Science and Engineering Northeastern University Shenyang110819 China Engineering Research Center of Security Technology of Complex Network System Ministry of Education China Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Northeastern University Shenyang110819 China Baidu Smart Life Group NO. 10 Xibeiwang East Street Ke Ji Yuan Haidian District Beijing100193 China School of Computer Science University of Auckland New Zealand
Modeling implicit feature interaction patterns is of significant importance to object detection tasks. However, in the two-stage detectors, due to the excessive use of hand-crafted components, it is very difficult to ... 详细信息
来源: 评论
A Dual-Band Tunable Electromagnetically Induced Transparency (EIT) Metamaterial Based on Vanadium Dioxide
收藏 引用
Photonics 2025年 第5期12卷
作者: Zhu, Lei Wang, Shujie Wang, Yun Dong, Liang Li, Hailong Wang, Yiya Ding, Xumin School of Computer and Control Engineering Qiqihar University Qiqihar161006 China Heilongjiang Key Laboratory of Big Data Network Security Detection and Analysis Qiqihar University Qiqihar161006 China Communication and Electronics Engineering Institute Qiqihar University Qiqihar161006 China Advanced Microscopy and Instrumentation Research Center Harbin Institute of Technology Harbin150080 China
A dual-band tunable terahertz electromagnetically induced transparency (EIT) metamaterial is introduced. The EIT metamaterial consists of two rectangular split rings, two metal strips, and a patterned vanadium dioxide... 详细信息
来源: 评论
Identification of important nodes on large-scale Internet based on unsupervised learning  2020
Identification of important nodes on large-scale Internet ba...
收藏 引用
Proceedings of the 2020 International Conference on Cyberspace Innovation of Advanced Technologies
作者: Fuyang Fang Daojuan Zhang Chonghua Wang De Zhang Yuanfei Zhang Chao Li Xi Luo Ye Fu Information Science Academy of China Electronics Technology Group Corporation Beijing China State Grid Key Laboratory of Information & Network Security Global Energy Interconnection Research Institute co. Ltd Beijing China China Industrial Control Systems Cyber Emergency Response Team Beijing China Cyber space Institute of Advanced Technology Guangzhou University Guangzhou China
In recent years, scholars have conducted in-depth researches on the robustness, structural vulnerability, and detection and identification of devices in cyberspace from different perspectives such as complex networks ... 详细信息
来源: 评论
An effective verifiable symmetric searchable encryption scheme in cloud computing  7
An effective verifiable symmetric searchable encryption sche...
收藏 引用
7th International Conference on Information technology: IoT and Smart City, ICIT 2019
作者: Wang, Kangle Dong, Xiaolei Shen, Jiachen Cao, Zhenfu Shanghai Key Laboratory of Trustworthy Computing East China Normal University Shanghai China Cyberspace Security Research Center Peng Cheng Laboratory Shenzhen Shanghai Institute of Intelligent Science and Technology Tongji University Shanghai China
With the booming Internet industry, users' demand for resources is also increasing. In order to meet the needs of users, cloud computing came into being. In today's era, cloud storage is already the most popul... 详细信息
来源: 评论
Interactive Two-Stream Decoder for Accurate and Fast Saliency Detection
Interactive Two-Stream Decoder for Accurate and Fast Salienc...
收藏 引用
Conference on Computer Vision and Pattern Recognition (CVPR)
作者: Huajun Zhou Xiaohua Xie Jian-Huang Lai Zixuan Chen Lingxiao Yang School of Data and Computer Science Sun Yat-sen University China Guangdong Province Key Laboratory of Information Security Technology China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China Sun Yat-sen University Guangzhou China
Recently, contour information largely improves the performance of saliency detection. However, the discussion on the correlation between saliency and contour remains scarce. In this paper, we first analyze such correl... 详细信息
来源: 评论
Slimmable generative adversarial networks
arXiv
收藏 引用
arXiv 2020年
作者: Hou, Liang Yuan, Zehuan Huang, Lei Shen, Huawei Cheng, Xueqi Wang, Changhu CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences University of Chinese Academy of Sciences ByteDance AI Lab SKLSDE Institute of Artificial Intelligence Beihang University
Generative adversarial networks (GANs) have achieved remarkable progress in recent years, but the continuously growing scale of models makes them challenging to deploy widely in practical applications. In particular, ... 详细信息
来源: 评论
DMU-ABSE: Dynamic multi-user attribute-based searchable encryption with file deletion and user revocation  1
收藏 引用
5th International Symposium on security and Privacy in Social networks and Big Data, SocialSec 2019
作者: Liu, Jiming Cao, Zhenfu Dong, Xiaolei Shen, Jiachen Shanghai Key Laboratory of Trustworthy Computing East China Normal University Shanghai China Cyberspace Security Research Center Peng Cheng Laboratory Shenzhen Shanghai Institute of Intelligent Science and Technology Tongji University Shanghai China
Searchable encryption (SE) is a new cryptographic technique that allows data users searching for the files of their interests over huge amounts of encrypted files on the cloud. When it comes to multi-user setting, mor... 详细信息
来源: 评论
Poisoning attack against estimating from pairwise comparisons
arXiv
收藏 引用
arXiv 2021年
作者: Ma, Ke Xu, Qianqian Zeng, Jinshan Cao, Xiaochun Huang, Qingming The School of Computer Science and Technology University of Chinese Academy of Sciences Beijing100049 China The Artificial Intelligence Research Center Peng Cheng Laboratory Shenzhen518055 China The Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China The School of Computer and Information Engineering Jiangxi Normal University Jiangxi Nanchang330022 China Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China The School of Cyber Security University of Chinese Academy of Sciences Beijing100049 China The Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China The School of Computer Science and Technology University of Chinese Academy of Sciences Beijing100049 China The Key Laboratory of Big Data Mining and Knowledge Management The School of Economics and Management University of Chinese Academy of Sciences Beijing100049 China
As pairwise ranking becomes broadly employed for elections, sports competitions, recommendation, information retrieval and so on, attackers have strong motivation and incentives to manipulate or disrupt the ranking li... 详细信息
来源: 评论
GSLB: The Graph Structure Learning Benchmark
arXiv
收藏 引用
arXiv 2023年
作者: Li, Zhixun Wang, Liang Sun, Xin Luo, Yifan Zhu, Yanqiao Chen, Dingshuo Luo, Yingtao Zhou, Xiangxin Liu, Qiang Wu, Shu Yu, Jeffrey Xu Department of Systems Engineering and Engineering Management The Chinese University of Hong Kong Hong Kong Center for Research on Intelligent Perception Computing State Key Laboratory of Multimodal Artificial Intelligence Systems Institute of Automation Chinese Academy of Sciences China School of Artificial Intelligence University of Chinese Academy of Sciences China Department of Automation University of Science and Technology of China China School of Cyberspace Security Beijing University of Posts and Telecommunications China Department of Computer Science University of California Los Angeles United States Heinz College of Information Systems and Public Policy Machine Learning Department School of Computer Science Carnegie Mellon University United States
Graph Structure Learning (GSL) has recently garnered considerable attention due to its ability to optimize both the parameters of Graph Neural networks (GNNs) and the computation graph structure simultaneously. Despit... 详细信息
来源: 评论