咨询与建议

限定检索结果

文献类型

  • 2,081 篇 会议
  • 1,579 篇 期刊文献

馆藏范围

  • 3,660 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,357 篇 工学
    • 1,793 篇 计算机科学与技术...
    • 1,442 篇 软件工程
    • 580 篇 信息与通信工程
    • 314 篇 电气工程
    • 260 篇 控制科学与工程
    • 231 篇 生物工程
    • 228 篇 电子科学与技术(可...
    • 168 篇 网络空间安全
    • 136 篇 机械工程
    • 106 篇 光学工程
    • 93 篇 生物医学工程(可授...
    • 87 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 81 篇 仪器科学与技术
    • 81 篇 交通运输工程
    • 60 篇 材料科学与工程(可...
    • 60 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,073 篇 理学
    • 613 篇 数学
    • 253 篇 物理学
    • 249 篇 生物学
    • 206 篇 统计学(可授理学、...
    • 101 篇 系统科学
    • 86 篇 化学
  • 592 篇 管理学
    • 325 篇 管理科学与工程(可...
    • 302 篇 图书情报与档案管...
    • 99 篇 工商管理
  • 118 篇 法学
    • 72 篇 社会学
  • 79 篇 医学
    • 69 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 43 篇 经济学
  • 31 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 163 篇 feature extracti...
  • 129 篇 semantics
  • 123 篇 accuracy
  • 107 篇 training
  • 106 篇 computational mo...
  • 97 篇 federated learni...
  • 95 篇 deep learning
  • 79 篇 privacy
  • 70 篇 data models
  • 68 篇 cryptography
  • 61 篇 authentication
  • 59 篇 security
  • 57 篇 data privacy
  • 57 篇 protocols
  • 57 篇 robustness
  • 52 篇 object detection
  • 52 篇 neural networks
  • 52 篇 cloud computing
  • 50 篇 adaptation model...
  • 47 篇 information secu...

机构

  • 264 篇 key laboratory o...
  • 206 篇 shandong provinc...
  • 95 篇 university of ch...
  • 83 篇 key laboratory o...
  • 82 篇 school of comput...
  • 65 篇 information secu...
  • 65 篇 school of cyber ...
  • 63 篇 cas key laborato...
  • 61 篇 shandong provinc...
  • 59 篇 guangdong provin...
  • 52 篇 shandong enginee...
  • 50 篇 tianjin key labo...
  • 49 篇 network and data...
  • 49 篇 shandong fundame...
  • 48 篇 state key labora...
  • 47 篇 peng cheng labor...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 45 篇 school of comput...
  • 43 篇 shandong provinc...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 34 篇 xie xiaohua
  • 33 篇 yixian yang
  • 32 篇 huang qingming
  • 32 篇 cao xiaochun
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 25 篇 xu qianqian
  • 25 篇 li wei
  • 25 篇 jin hai
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 21 篇 hu shengshan
  • 21 篇 lai jianhuang
  • 21 篇 meng deyu

语言

  • 3,103 篇 英文
  • 484 篇 其他
  • 82 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3660 条 记 录,以下是2591-2600 订阅
排序:
Epilepsy Classification for Mining Deeper Relationships between EEG Channels based on GCN
Epilepsy Classification for Mining Deeper Relationships betw...
收藏 引用
Computer Vision, Image and Deep Learning (CVIDL), International Conference on
作者: Xin Chen Yuanjie Zheng Yi Niu Chengiiang Li School of Information Science and Engineering Shandong Normal University Jinan China Key Lab of Intelligent Computing and Information Security Universities of Shandong Jinan China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Institute of Biomedical Sciences Jinan China Shandong University of Science and Technology Jinan China
Epilepsy is a brain disorder caused by abnormal discharges of neurons in brain. It is one of the most commonly studied disorders in neurology. The research of epilepsy electroencephalogram (EEG) has become a hot resea... 详细信息
来源: 评论
ReGO: Reference-Guided Outpainting for Scenery Image
arXiv
收藏 引用
arXiv 2021年
作者: Wang, Yaxiong Wei, Yunchao Qian, Xueming Zhu, Li Yang, Yi The School of Software Engineering Xi’an Jiaotong University Xi'An710049 China Institute of Information Science Beijing Jiaotong University Beijing100000 China The Key Laboratory for Intelligent Networks and Network Security Ministry of Education Xi’an Jiaotong University Xi'An710049 China The SMILES Laboratory Xi’an Jiaotong University Xi'An710049 China Zhibian Technology Co. Ltd. Taizhou317000 China The School of Software Xi’an Jiaotong University Xi'An710049 China School of Computer Science and Technology Zhejiang University Hangzhou310000 China
We aim to tackle the challenging yet practical scenery image outpainting task in this work. Recently, generative adversarial learning has significantly advanced the image outpainting by producing semantic consistent c... 详细信息
来源: 评论
Weakly supervised learning for textbook question answering
TechRxiv
收藏 引用
TechRxiv 2021年
作者: Ma, Jie Chai, Qi Huang, Jingyue Liu, Jun You, Yang Zheng, Qinghua National Engineering Lab for Big Data Analytics School of Computer Science and Technology Xi’an Jiaotong University Shaanxi Xi’an710049 China Shaanxi Province Key Laboratory of Satellite and Terrestrial Network Tech. R&D School of Computer Science and Technology Xi’an Jiaotong University Shaanxi Xi’an710049 China The High Performance Computing for Artificial intelligence Lab Department of Computer Science National University of Singapore 117417 Singapore
Textbook Question Answering (TQA) is the task of answering diagram and non-diagram questions given large multimodal contexts consisting of abundant text and diagrams. Deep text understandings and effective learning of... 详细信息
来源: 评论
Golden grain: Building a secure and decentralized model marketplace for MLaaS
arXiv
收藏 引用
arXiv 2020年
作者: Weng, Jiasi Weng, Jian Cai, Chengjun Huang, Hongwei Wang, Cong The College of Information Science and Technology College of Cyber security National Joint Engineering Research Center of Network Security Detection and Protection Technology Guangdong Key Laboratory of Data Security and Privacy Preserving Jinan University Guangzhou510632 China The Department of Computer Science City University of Hong Kong Hong Kong Hong Kong The City University of Hong Kong Shenzhen Research Institute Shenzhen518057 China
ML-as-a-service (MLaaS) becomes increasingly popular and revolutionizes the lives of people. A natural requirement for MLaaS is, however, to provide highly accurate prediction services. To achieve this, current MLaaS ... 详细信息
来源: 评论
TPTVer: A Trusted Third Party Based Trusted Verifier for Multi-Layered Outsourced Big Data System in Cloud Environment
收藏 引用
China Communications 2018年 第2期15卷 122-137页
作者: Jing Zhan Xudong Fan Lei Cai Yaqi Gao Junxi Zhuang College of Computer Science Faculty of Information Technology Beijing University of Technology Beijing China Beijing Key Laboratory of Trusted Computing Beijing China National Engineering Laboratory for Critical Technologies of Information Security Classified Protection Beijing China
Cloud computing is very useful for big data owner who doesn't want to manage IT infrastructure and big data technique details. However, it is hard for big data owner to trust multi-layer outsourced big data system... 详细信息
来源: 评论
Semantically Secure and Verifiable Multi-keyword Search in Cloud computing  1
收藏 引用
2nd International Conference on Machine Learning for Cyber security, ML4CS 2019
作者: Zhang, Lili Wang, Wenjie Zhang, Yuqing National Key Laboratory of Integrated Services Networks Xidian University Xi’an710071 China Henan International Joint Laboratory of Cyberspace Security Applications Information Engineering College Henan University of Science and Technology Luoyang471023 China National Computer Network Intrusion Protection Center University of Chinese Academy of Sciences Beijing100049 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China
In cloud computing model, the data are usually encrypted before outsourced to the cloud server, which protects the data privacy, but also leaves keyword searches over ciphertext data a challenging problem. A keyword s... 详细信息
来源: 评论
A novel deep learning approach for lung cancer recognition based on 1-D deep convolutional neural network  2019
A novel deep learning approach for lung cancer recognition b...
收藏 引用
4th International Conference on Mathematics and Artificial Intelligence, ICMAI 2019
作者: Mubashir, Muhammad Ahmed, Md Rishad Ahmad, Maqsood Siddiqui, Sarah Ali Ahmad, Mudaser Shandong Provincial Key Laboratory of Network Based Intelligent Computing University of Jinan Jinan250022 China Khwaja Fareed University of Engineering and Information Technology Pakistan Macquarie University Sydney Australia. The Islamia University of Bahawalpur Pakistan
Pulse diagnosis has been a requisite facet in traditional Chinese medicine as well as in western medicine, yet the prognosis of lung cancer hinged on wrist pulse analysis entails the quotidian approaches. In spite of ... 详细信息
来源: 评论
ACWB: Access-characteristic write buffer management scheme for flash memory  21
ACWB: Access-characteristic write buffer management scheme f...
收藏 引用
21st IEEE International Conference on High Performance computing and Communications, 17th IEEE International Conference on Smart City and 5th IEEE International Conference on Data Science and Systems, HPCC/SmartCity/DSS 2019
作者: Zhu, Lei Liu, Yan Zhang, Zaimei Key Laboratory for Embedded and Network Computing of Hunan Province College of Computer Science and Electronic Engineering Hunan University Changsha Hunan410082 China School of Economics and Management Changsha University of Science and Technology Changsha Hunan410076 China
Compared with traditional hard disk drives (HDD), solid state drives (SDD) have distinct characteristics, such as efficient continuous access and random reading capability. Using of SSD is greatly limited due to the o... 详细信息
来源: 评论
B2SFinder: Detecting Open-Source Software Reuse in COTS Software
B2SFinder: Detecting Open-Source Software Reuse in COTS Soft...
收藏 引用
IEEE International Conference on Automated Software Engineering (ASE)
作者: Zimu Yuan Muyue Feng Feng Li Gu Ban Yang Xiao Shiyang Wang Qian Tang He Su Chendong Yu Jiahuan Xu Aihua Piao Jingling Xuey Wei Huo Institute of Information Engineering Chinese Academy of Sciences Key Laboratory of Network Assessment Technology Chinese Academy of Sciences Beijing Key Laboratory of Network Security and Protection Technology and School of Cyber Security University of Chinese Academy of Sciences University of New South Wales
COTS software products are developed extensively on top of OSS projects, resulting in OSS reuse vulnerabilities. To detect such vulnerabilities, finding OSS reuses in COTS software has become imperative. While scalabl... 详细信息
来源: 评论
Few-shot Object Detection with Camouflage Animals
收藏 引用
Journal of Physics: Conference Series 2021年 第1期1961卷
作者: Yi Lei Lei Lei Network and Data Security Key Laboratory of Sichuan Province University of Electr onic Science and Technology of China Primary school in Gao sheng Zi yang China
Object detection is a hot issue in the field of computer vision, which is widely used in intelligent video surveillance, medical image analysis, and practice in the fields of military strategy. Previous object detecti...
来源: 评论