咨询与建议

限定检索结果

文献类型

  • 2,081 篇 会议
  • 1,571 篇 期刊文献

馆藏范围

  • 3,652 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,357 篇 工学
    • 1,792 篇 计算机科学与技术...
    • 1,441 篇 软件工程
    • 579 篇 信息与通信工程
    • 314 篇 电气工程
    • 260 篇 控制科学与工程
    • 231 篇 生物工程
    • 228 篇 电子科学与技术(可...
    • 167 篇 网络空间安全
    • 136 篇 机械工程
    • 106 篇 光学工程
    • 93 篇 生物医学工程(可授...
    • 87 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 81 篇 仪器科学与技术
    • 81 篇 交通运输工程
    • 60 篇 材料科学与工程(可...
    • 60 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,073 篇 理学
    • 613 篇 数学
    • 253 篇 物理学
    • 249 篇 生物学
    • 206 篇 统计学(可授理学、...
    • 101 篇 系统科学
    • 86 篇 化学
  • 591 篇 管理学
    • 324 篇 管理科学与工程(可...
    • 302 篇 图书情报与档案管...
    • 99 篇 工商管理
  • 118 篇 法学
    • 72 篇 社会学
  • 79 篇 医学
    • 69 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 43 篇 经济学
  • 31 篇 军事学
  • 17 篇 农学
  • 16 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 165 篇 feature extracti...
  • 129 篇 semantics
  • 123 篇 accuracy
  • 107 篇 training
  • 106 篇 computational mo...
  • 97 篇 federated learni...
  • 95 篇 deep learning
  • 79 篇 privacy
  • 70 篇 data models
  • 70 篇 cryptography
  • 61 篇 authentication
  • 59 篇 security
  • 58 篇 protocols
  • 57 篇 data privacy
  • 57 篇 robustness
  • 52 篇 object detection
  • 52 篇 neural networks
  • 52 篇 cloud computing
  • 50 篇 adaptation model...
  • 47 篇 information secu...

机构

  • 263 篇 key laboratory o...
  • 205 篇 shandong provinc...
  • 95 篇 university of ch...
  • 83 篇 key laboratory o...
  • 82 篇 school of comput...
  • 65 篇 information secu...
  • 65 篇 school of cyber ...
  • 63 篇 cas key laborato...
  • 61 篇 shandong provinc...
  • 59 篇 guangdong provin...
  • 52 篇 shandong enginee...
  • 50 篇 tianjin key labo...
  • 49 篇 network and data...
  • 49 篇 shandong fundame...
  • 48 篇 state key labora...
  • 47 篇 peng cheng labor...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 45 篇 school of comput...
  • 44 篇 shandong provinc...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 33 篇 yixian yang
  • 33 篇 xie xiaohua
  • 32 篇 huang qingming
  • 32 篇 cao xiaochun
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 27 篇 xu qianqian
  • 25 篇 li wei
  • 25 篇 jin hai
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 21 篇 hu shengshan
  • 21 篇 lai jianhuang
  • 21 篇 meng deyu

语言

  • 3,095 篇 英文
  • 484 篇 其他
  • 82 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3652 条 记 录,以下是2721-2730 订阅
排序:
Knowledge-aware Few-shot Learning Framework for Biomedical Event Trigger Identification
Knowledge-aware Few-shot Learning Framework for Biomedical E...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Shujuan Yin Weizhong Zhao Xingpeng Jiang Tingting He Hubei Provincial Key Laboratory of Artificial Intelligence and Smart Learning Central China Normal University Wuhan Hubei PR China School of Computer Central China Normal University Wuhan Hubei PR China National Language Resources Monitoring & Research Center for Network Media Central China Normal University Wuhan Hubei PR China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin China Guangxi Key Lab of Multi-source Information Mining & Security Guangxi Normal University Guilin China
Biomedical event extraction aims to detect fine-grained interactions between biomedical entities in biomedical texts, and has become a research hotspot for researchers in the biomedical field. As the first step in bio... 详细信息
来源: 评论
Copyright Protection Application Based on Blockchain technology
Copyright Protection Application Based on Blockchain Technol...
收藏 引用
IEEE International Conference on Big Data and Cloud computing (BdCloud)
作者: Yi Ouyang Xianghan Zheng Xiaoliang Lu Lin Xiaowei Shengyin Zhang Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou China MingByte Technology (Qingdao) Co. Ltd MingByte Technology Co. Ltd Qingdao China
In the traditional copyright protection platform, there are problems such as copyright information security and high registration cost. With the rapid development of blockchain technology, blockchain technology, as a ... 详细信息
来源: 评论
Deep Variational network Toward Blind Image Restoration
arXiv
收藏 引用
arXiv 2020年
作者: Yue, Zongsheng Yong, Hongwei Zhao, Qian Zhang, Lei Meng, Deyu Wong, Kwan-Yee K. The School of Mathematics and Statistics Xi’an Jiaotong University Xi’an China The Department of Computer Science The University of Hong Kong Hong Kong The Department of Computing The Hong Kong Polytechnic University Hong Kong The School of Mathematics and Statistics Ministry of Education Key Lab of Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an China The Macau Institute of Systems Engineering Macau University of Science and Technology Taipa China
Blind image restoration (IR) is a common yet challenging problem in computer vision. Classical model-based methods and recent deep learning (DL)-based methods represent two different methodologies for this problem, ea... 详细信息
来源: 评论
内蒙古深季节冻土区公路水热过程的实体工程试验
收藏 引用
Journal of Central South University 2020年 第7期 2082-2093页
作者: 张洪伟 王学营 赵鑫 刘鹏飞 Key Laboratory of Transport Industry of Management Control and Cycle Repair Technology for Traffic Network Facilities in Ecological Security Barrier Area Inner Mongolia Transport Construction Engineering Quality Supervision Bureau Institute of Highway Engineering RWTH Aachen University
季节冻土区道路工程冻融病害频繁,路基的水热耦合作用是病害发育的控制因素。为揭示该地区公路路基的水热作用过程,分析其影响因素和变化规律,基于内蒙古深季节冻土区室韦—拉布达林公路实体工程3年的观测数据,分析了沥青路面结构层和... 详细信息
来源: 评论
Artificial unintelligence: Anti-intelligence of intelligent algorithms  3rd
Artificial unintelligence: Anti-intelligence of intelligent ...
收藏 引用
3rd International Conference on Intelligence Science, ICIS 2018
作者: Zhang, Yuhong Nauman, Umer Information Science and Engineering College Henan University of Technology Zhengzhou450001 China Network and Data Security Key Laboratory of Sichuan University of Electronic Science and Technology Chengdu610054 China
In the age of big data, artificial intelligence (AI) algorithms play an important role in demonstrating the value of data, but its negative effects are increasingly prominent. Researchers focus more on the obvious iss... 详细信息
来源: 评论
Sparse code multiple access for 6G wireless communication networks: Recent advances and future directions
arXiv
收藏 引用
arXiv 2021年
作者: Yu, Lisu Liu, Zilong Wen, Miaowen Cai, Donghong Dang, Shuping Wang, Yuhao Xiao, Pei School of Information Engineering Nanchang University Nanchang330031 China State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China School of Computer Science and Electronics Engineering University of Essex ColchesterCO4 3SQ United Kingdom School of Electronic and Information Engineering South China University of Technology Guangzhou510640 China College of Cyber Security Jinan University Guangzhou510632 China Thuwal23955-6900 Saudi Arabia Institute for Communication Systems 5G Innovation Centre University of Surrey GuildfordGU2 7XH United Kingdom
As 5G networks rolling out in many different countries nowadays, the time has come to investigate how to upgrade and expand them towards 6G, where the latter is expected to realize the interconnection of everything as... 详细信息
来源: 评论
Improved heuristic algorithms for UAVs path planning in hazardous environment  14
Improved heuristic algorithms for UAVs path planning in haza...
收藏 引用
14th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery, ICNC-FSKD 2018
作者: Li, Zhenghao Yang, Peng Tong, Cen Shen, Jiaqi Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Tianjin300384 China Explosive Case Laboratory Institute of Forensic Science Tianjin Public Security Bureau Tianjin300020 China
As the route planning of UAV searching in a risky environment is a complicated combinatorial optimization problem, which is characterized by a variety of unpredictable factors. Heuristic methods can be used to speed u... 详细信息
来源: 评论
Multi-view graph learning by joint modeling of consistency and inconsistency
arXiv
收藏 引用
arXiv 2020年
作者: Liang, Youwei Huang, Dong Wang, Chang-Dong Yu, Philip S. College of Mathematics and Informatics South China Agricultural University Guangzhou China Tencent Shenzhen China College of Mathematics and Informatics South China Agricultural University Guangzhou China Pazhou Lab Guangzhou China School of Data and Computer Science Sun Yat-sen University Guangzhou China Guangdong Key Laboratory of Information Security Technology Guangzhou China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China Department of Computer Science University of Illinois at Chicago ChicagoIL60607 United States
—Graph learning has emerged as a promising technique for multi-view clustering due to its ability to learn a unified and robust graph from multiple views. However, existing graph learning methods mostly focus on the ... 详细信息
来源: 评论
On the Secrecy of UAV Systems With Linear Trajectory
arXiv
收藏 引用
arXiv 2020年
作者: Pan, Gaofeng Lei, Hongjiang An, Jianping Zhang, Shuo Alouini, Mohamed-Slim School of Information and Electronics Engineering Beijing Institute of Technology Beijing100081 China Thuwal23955-6900 Saudi Arabia School of Communication and Information Engineering Chongqing University of Posts and Telecommunications Chongqing400065 China Shannxi Key Laboratory of Information Communication Network and Security Xi’an University of Posts and Telecommunications Xi’anShaanxi710121 China School of Information and Electronics Engineering Beijing Institute of Technology Beijing100081 China National Key Laboratory of Science and Technology on Aerospace Intelligence Control Beijing100854 China Beijing Aerospace Automatic Control Institute Beijing100854 China Thuwal23955-6900 Saudi Arabia
By observing the fact that moving in a straight line is a common flying behavior of unmanned aerial vehicles (UAVs) in normal applications, e.g., power line inspections, and air patrols along with highway/streets/bord... 详细信息
来源: 评论
Progressive Teacher-Student Learning for Early Action Prediction
Progressive Teacher-Student Learning for Early Action Predic...
收藏 引用
Conference on Computer Vision and Pattern Recognition (CVPR)
作者: Xionghui Wang Jian-Fang Hu Jian-Huang Lai Jianguo Zhang Wei-Shi Zheng Sun Yat-sen University China Guangdong Province Key Laboratory of Information Security Technology China Sun Yat-sen University Guangzhou China University of Dundee United Kingdom Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China
The goal of early action prediction is to recognize actions from partially observed videos with incomplete action executions, which is quite different from action recognition. Predicting early actions is very challeng... 详细信息
来源: 评论