咨询与建议

限定检索结果

文献类型

  • 2,081 篇 会议
  • 1,571 篇 期刊文献

馆藏范围

  • 3,652 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,357 篇 工学
    • 1,792 篇 计算机科学与技术...
    • 1,441 篇 软件工程
    • 579 篇 信息与通信工程
    • 314 篇 电气工程
    • 260 篇 控制科学与工程
    • 231 篇 生物工程
    • 228 篇 电子科学与技术(可...
    • 167 篇 网络空间安全
    • 136 篇 机械工程
    • 106 篇 光学工程
    • 93 篇 生物医学工程(可授...
    • 87 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 81 篇 仪器科学与技术
    • 81 篇 交通运输工程
    • 60 篇 材料科学与工程(可...
    • 60 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,073 篇 理学
    • 613 篇 数学
    • 253 篇 物理学
    • 249 篇 生物学
    • 206 篇 统计学(可授理学、...
    • 101 篇 系统科学
    • 86 篇 化学
  • 591 篇 管理学
    • 324 篇 管理科学与工程(可...
    • 302 篇 图书情报与档案管...
    • 99 篇 工商管理
  • 118 篇 法学
    • 72 篇 社会学
  • 79 篇 医学
    • 69 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 43 篇 经济学
  • 31 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 165 篇 feature extracti...
  • 129 篇 semantics
  • 123 篇 accuracy
  • 107 篇 training
  • 106 篇 computational mo...
  • 97 篇 federated learni...
  • 95 篇 deep learning
  • 79 篇 privacy
  • 70 篇 data models
  • 70 篇 cryptography
  • 61 篇 authentication
  • 59 篇 security
  • 58 篇 protocols
  • 57 篇 data privacy
  • 57 篇 robustness
  • 52 篇 object detection
  • 52 篇 neural networks
  • 52 篇 cloud computing
  • 50 篇 adaptation model...
  • 47 篇 information secu...

机构

  • 263 篇 key laboratory o...
  • 205 篇 shandong provinc...
  • 95 篇 university of ch...
  • 83 篇 key laboratory o...
  • 82 篇 school of comput...
  • 65 篇 information secu...
  • 65 篇 school of cyber ...
  • 63 篇 cas key laborato...
  • 61 篇 shandong provinc...
  • 59 篇 guangdong provin...
  • 52 篇 shandong enginee...
  • 50 篇 tianjin key labo...
  • 49 篇 network and data...
  • 49 篇 shandong fundame...
  • 48 篇 state key labora...
  • 47 篇 peng cheng labor...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 45 篇 school of comput...
  • 44 篇 shandong provinc...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 33 篇 yixian yang
  • 33 篇 xie xiaohua
  • 32 篇 huang qingming
  • 32 篇 cao xiaochun
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 27 篇 xu qianqian
  • 25 篇 li wei
  • 25 篇 jin hai
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 21 篇 hu shengshan
  • 21 篇 lai jianhuang
  • 21 篇 meng deyu

语言

  • 3,095 篇 英文
  • 484 篇 其他
  • 82 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3652 条 记 录,以下是2631-2640 订阅
排序:
Research on unified recognition model and algorithm for multi-modal gestures
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2019年 第2期26卷 30-42页
作者: Guo Xiaopei Feng Zhiquan Sun Kaiyun Liu Hong Xie Wei Bi Jianping School of Information Science and Engineering University of JinanJinan 250022China Shandong Provincial Key Laboratory of Network-based Intelligent Computing Jinan 250022China School of Information Science and Engineering Shandong Normal UniversityJinan 250014China School of Information and Electrical Engineering Harbin Institute of Technology at WeihaiWeihai 264209China Affiliated Hospital of Shandong University of Traditional Chinese Medicine Jinan 250022China
In gesture recognition,static gestures,dynamic gestures and trajectory gestures are collectively known as multi-modal *** solve the existing problem in different recognition methods for different modal gestures,a unif... 详细信息
来源: 评论
Transferring knowledge distillation for multilingual social event detection
arXiv
收藏 引用
arXiv 2021年
作者: Ren, Jiaqian Peng, Hao Jiang, Lei Wu, Jia Tong, Yongxin Wang, Lihong Bai, Xu Wang, Bo Yang, Qiang Institute of Information Engineering Chinese Academy of Sciences The School of Cyber Security University of Chinese Academy of Sciences Beijing100041 China Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University Beijing100083 China The School of Cyber Science and Technology Beihang University Beijing100083 China Institute of Information Engineering Chinese Academy of Sciences Beijing100041 China The Department of Computing Macquarie University Sydney Australia The State Key Laboratory of Software Development Environment The School of Computer Science and Engineering Beihang University Beijing100083 China The National Computer Network Emergency Response Technical Team Coordination Center of China Beijing100029 China The Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong AI Group WeBank Co. Ltd. China
Recently published graph neural networks (GNNs) show promising performance at social event detection tasks. However, most studies are oriented toward monolingual data in languages with abundant training samples. This ... 详细信息
来源: 评论
Some Results on Critical ( P 5 , H )-free Graphs
收藏 引用
Theoretical Computer Science 2025年 1051卷
作者: Wen Xia Jorik Jooken Jan Goedgebeur Shenwei Huang School of Mathematics and Statistics Ankang University Ankang 725000 China College of Computer Science Nankai University Tianjin 300071 China Tianjin Key Laboratory of Network and Data Security Technology Nankai University Tianjin 300071 China Department of Computer Science KU Leuven Campus Kulak-Kortrijk 8500 Kortrijk Belgium Department of Applied Mathematics Computer Science and Statistics Ghent University 9000 Ghent Belgium School of Mathematical Sciences and LPMC Nankai University Tianjin 300071 China
Given two graphs H 1 and H 2 , a graph is ( H 1 , H 2 ) -free if it contains no induced subgraph isomorphic to H 1 or H 2 . A graph G is k -vertex-critical if every proper induced subgraph of G has chromatic number le...
来源: 评论
STR: Secure computation on additive shares using the share-transform-reveal strategy
arXiv
收藏 引用
arXiv 2020年
作者: Xia, Zhihua Gu, Qi Zhou, Wenhao Xiong, Lizhi Weng, Jian Xiong, Naixue N. College of Cyber Security Jinan University Guangzhou510632 China Engineering Research Center of Digital Forensics Ministry of Education School of Computer and Software Jiangsu Engineering Center of Network Monitoring Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology Nanjing University of Information Science & Technology Nanjing210044 China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin541004 China The College of Intelligence and Computing Tianjin University Tianjin300350 China
The rapid development of cloud computing probably benefits many of us while the privacy risks brought by semi-honest cloud servers have aroused the attention of more and more people and legislatures. In the last two d... 详细信息
来源: 评论
Research on System Dynamics and Agent Hybrid Modeling Method for Multi-Energy Collaborative Control under Ubiquitous Power Internet  3
Research on System Dynamics and Agent Hybrid Modeling Method...
收藏 引用
3rd IEEE Conference on Energy Internet and Energy System Integration, EI2 2019
作者: Zhang, Fuxing Zhang, Yingjie Zhan, Xiong Luo, Juan Miao, Honglei Gui, Yonghua Hunan University College of Computer Science and Electronic Engineering Changsha China Global Energy Interconnection Research Institute State Grid Key Laboratory of Information Network Security Beijing China HNAC Technology Co. Ltd. Hardware RD Department Changsha China
In order to promote the study of system dynamics (SD) and multi-agent theory and its wide application in the field of renewable energy, a hybrid modeling method of SD and Agent is proposed in this paper, which is suit... 详细信息
来源: 评论
Deep learning techniques for DDoS attack detection: Concepts, analyses, challenges, and future directions
收藏 引用
Expert Systems with Applications 2025年 291卷
作者: Xingbing Fu Supeng Lou Jiaming Zheng Cheng Chi Jie Yang Dong Wang Chenming Zhu Butian Huang Xiatian Zhu School of Cyberspace Hangzhou Dianzi University Hangzhou 310018 PR China Zhejiang Electronic Information Products Inspection and Research Institute (Key Laboratory of Information Security of Zhejiang Province) Hangzhou 310007 PR China China Academy of Information and Communications Technology Beijing 100195 PR China School of Management Hangzhou Dianzi University Hangzhou 310018 PR China Hangzhou Yunphant Network Technology Co. LTD Hangzhou 311121 PR China Surrey Institute for People-Centred Artificial Intelligence CVSSP University of Surrey Guildford UK
DDoS (Distributed Denial of Service) attacks are increasingly becoming a major threat in the field of cybersecurity. They overwhelm target servers by sending large-scale requests from multiple locations, causing the s...
来源: 评论
Identity-aware attribute recognition via real-time distributed inference in mobile edge clouds
arXiv
收藏 引用
arXiv 2020年
作者: Xu, Zichuan Zhou, Pan Wu, Jiangkai Ren, Jiankang Xia, Qiufen Liang, Huizhi Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province School of Software Dalian University of Technology Dalian China Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China School of Software Dalian University of Technology Dalian China School of Computer Science Dalian University of Technology Dalian China Key Laboratory for Ubiquitous Network Service Software of Liaoning Province International School of Information Science and Engineering Dalian University of Technology Dalian China Department of Computer Science University of Reading Reading United Kingdom
With the development of deep learning technologies, attribute recognition and person re-identification (re-ID) have attracted extensive attention and achieved continuous improvement via executing computing-intensive d... 详细信息
来源: 评论
Android Malicious Code Detection Based on Secondary Pruning Optimization
Android Malicious Code Detection Based on Secondary Pruning ...
收藏 引用
International Congress on Image and Signal Processing, BioMedical Engineering and Informatics
作者: Qing Yu Kuolang Ma Zuohua Wang Tianjin Key Laboratory of Intelligence Computing and Network Security Tianjin University of Technology Tianjin China Tianjin Times Shengshi Technology Co. Ltd. No. 216 Hongqi Road Nankai District Tianjin China
In this paper, we propose a detection algorithm for Android malicious code based on integrated multi-feature. By decompiling and processing APK files, the multi-class behavior features of Android application are extra... 详细信息
来源: 评论
Application of Mixed Reality technology in Education with the case of a Huangmei Opera Cultural Education System
Application of Mixed Reality Technology in Education with th...
收藏 引用
IEEE International Conference on Computer Science and Educational Informatization (CSEI)
作者: Guangjun Wang Zhichao Lu Yufei Zhang Yu Qian Haiying Zhao Deyang Liu The University Key Laboratory of Intelligent Perception and Computing of Anhui Province Anqing Normal University Anqing China Institute of Network Technology Beijing University of Posts and Telecommunications Beijing China School of Computer and Information Anqing Normal University Anqing China Mobile media and cultural calculation Key Laboratory of Beijing Century college Beijing University of Posts and Telecommunications Beijing China
Mixed reality is an emerging technology that allows virtual world objects and real world objects to coexist and interact in real time. Its positioning lies between virtual reality and augmented reality, providing user... 详细信息
来源: 评论
Quantum memory assisted entropic uncertainty and entanglement dynamics: Two qubits coupled with local fields and Ornstein Uhlenbeck noise
arXiv
收藏 引用
arXiv 2021年
作者: Khan, Atta Ur Rahman Zidan, Nour Zangi, S.M. Ali, Hazrat Key Laboratory of Aerospace Information Security and Trusted Computing School of Cyber Science and Engineering Wuhan University P.O. Box 430072 Wuhan China Mathematics Department College of Science Jouf University P.O. Box 2014 Sakaka Saudi Arabia School of Physics and Astronomy Yunnan University P.O. Box 650500 Kunming China Abbottabad University of Science and technology P.O. Box 22500 Havellian KP Pakistan
Entropic uncertainty and entanglement are two distinct aspects of quantum mechanical procedures. To estimate entropic uncertainty relations, entropies are used: the greater the entropy bound, the less effective the qu... 详细信息
来源: 评论