咨询与建议

限定检索结果

文献类型

  • 2,000 篇 会议
  • 1,550 篇 期刊文献

馆藏范围

  • 3,550 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,327 篇 工学
    • 1,767 篇 计算机科学与技术...
    • 1,442 篇 软件工程
    • 578 篇 信息与通信工程
    • 316 篇 电气工程
    • 249 篇 控制科学与工程
    • 231 篇 生物工程
    • 225 篇 电子科学与技术(可...
    • 167 篇 网络空间安全
    • 136 篇 机械工程
    • 112 篇 光学工程
    • 95 篇 生物医学工程(可授...
    • 86 篇 化学工程与技术
    • 83 篇 安全科学与工程
    • 80 篇 仪器科学与技术
    • 79 篇 交通运输工程
    • 61 篇 建筑学
    • 59 篇 动力工程及工程热...
    • 58 篇 材料科学与工程(可...
  • 1,054 篇 理学
    • 601 篇 数学
    • 251 篇 物理学
    • 247 篇 生物学
    • 206 篇 统计学(可授理学、...
    • 101 篇 系统科学
    • 84 篇 化学
  • 586 篇 管理学
    • 323 篇 管理科学与工程(可...
    • 298 篇 图书情报与档案管...
    • 95 篇 工商管理
  • 118 篇 法学
    • 70 篇 社会学
  • 80 篇 医学
    • 70 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 43 篇 经济学
  • 31 篇 军事学
  • 16 篇 农学
  • 14 篇 教育学
  • 7 篇 艺术学
  • 6 篇 文学

主题

  • 151 篇 feature extracti...
  • 124 篇 semantics
  • 98 篇 accuracy
  • 97 篇 training
  • 93 篇 computational mo...
  • 91 篇 deep learning
  • 73 篇 federated learni...
  • 71 篇 privacy
  • 66 篇 cryptography
  • 63 篇 data models
  • 57 篇 authentication
  • 55 篇 protocols
  • 51 篇 security
  • 50 篇 data privacy
  • 49 篇 neural networks
  • 48 篇 object detection
  • 47 篇 information secu...
  • 47 篇 cloud computing
  • 45 篇 robustness
  • 44 篇 machine learning

机构

  • 219 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 93 篇 university of ch...
  • 80 篇 school of comput...
  • 80 篇 key laboratory o...
  • 64 篇 information secu...
  • 62 篇 cas key laborato...
  • 62 篇 school of cyber ...
  • 58 篇 guangdong provin...
  • 52 篇 tianjin key labo...
  • 50 篇 shandong fundame...
  • 48 篇 network and data...
  • 48 篇 state key labora...
  • 46 篇 shandong enginee...
  • 46 篇 peng cheng labor...
  • 45 篇 college of compu...
  • 45 篇 school of comput...
  • 44 篇 state key labora...
  • 42 篇 shandong provinc...
  • 42 篇 institute of inf...

作者

  • 97 篇 cheng xueqi
  • 47 篇 shen huawei
  • 46 篇 guo jiafeng
  • 42 篇 zheng wei-shi
  • 33 篇 yixian yang
  • 33 篇 xie xiaohua
  • 32 篇 huang qingming
  • 32 篇 cao xiaochun
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 24 篇 xinhong hei
  • 23 篇 jin hai
  • 21 篇 lai jianhuang
  • 21 篇 meng deyu
  • 21 篇 wang yichuan
  • 20 篇 xiaoming wu
  • 20 篇 shen yulong

语言

  • 3,284 篇 英文
  • 190 篇 其他
  • 82 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3550 条 记 录,以下是3541-3550 订阅
排序:
Dynamic right-sizing in FTP (drsFTP): Enhancing Grid performance in user-space
Dynamic right-sizing in FTP (drsFTP): Enhancing Grid perform...
收藏 引用
International Symposium on High Performance Distributed computing
作者: M.K. Gardner Wu-chun Feng M. Fisk Research & Development in Advanced Network Technology (RADIANT) Computer & Computational Sciences Division Los Alamos National Laboratory Los Alamos NM USA Network Security Team Network Engineering Group Computing Communications & Networking Division Los Alamos National Laboratory Los Alamos NM USA
With the advent of computational grids, networking performance over the wide-area network (WAN) has become a critical component in the grid infrastructure. Unfortunately, many high-performance grid applications only u... 详细信息
来源: 评论
Multisequence synthesis over an integral domain  1
收藏 引用
International Conference on Cryptography and Lattices, CaLC 2001
作者: Wang, Li-Ping Zhu, Yue-Fei State Key Laboratory of Information Security Graduate School University of Science and Technology of China Beijing100039 China Department of Network Engineering Information Engineering University Zhengzhou450002 China
We first give an extension of F[x]-lattice basis reduction algorithm to the polynomial ring R[x] where F is a field and R an arbitrary integral domain. So a new algorithm is presented for synthesizing minimum length l... 详细信息
来源: 评论
GAHE: Geometry-Aware Embedding for Hyper-Relational Knowledge Graph Representation
收藏 引用
ACM Transactions on Multimedia computing, Communications, and Applications 1000年
作者: Zongsheng Cao Qianqian Xu Zhiyong Yang Yuan He Xiaochun Cao Qingming Huang State Key Laboratory of Information Security SKLOIS) Institute of Information Engineering Chinese Academy of Sciences China Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences China School of Computer Science and Technology University of Chinese Academy of Sciences China Security Department of Alibaba Group China School of Cyber Science and Technology Shenzhen Campus Sun Yat-sen University China
Knowledge graphs have proven highly effective for learning representations of entities and relations, with hyper-relational knowledge graphs (HKGs) gaining increased attention due to their enhanced representation capa... 详细信息
来源: 评论
A Systematic Literature Review of Robust Federated Learning: Issues, Solutions, and Future Research Directions
收藏 引用
ACM computing Surveys 1000年
作者: Md Palash Uddin Yong Xiang Mahmudul Hasan Jun Bai Yao Zhao Longxiang Gao School of Information Technology Deakin University Burwood Australia Deakin University Burwood Australia Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Shandong Academy of Sciences Qilu University of Technology Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China
Federated Learning (FL) has emerged as a promising paradigm for training machine learning models across distributed devices while preserving their data privacy. However, the robustness of FL models against adversarial... 详细信息
来源: 评论
IBAQ: Frequency-Domain Backdoor Attack Threatening Autonomous Driving via Quadratic Phase
收藏 引用
ACM Transactions on Autonomous and Adaptive Systems 1000年
作者: Jinghan Qiu Honglong Chen Junjian Li Yudong Gao Junwei Li Xingang Wang College of Control Science and Engineering China University of Petroleum China the Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology China
The rapid evolution of backdoor attacks has emerged as a significant threat to the security of autonomous driving models. An attacker injects a backdoor into the model by adding triggers to the samples, which can be a... 详细信息
来源: 评论
End-to-End Explainable Fake News Detection Via Evidence-Claim Variational Causal Inference
收藏 引用
ACM Transactions on Information Systems 1000年
作者: Jinguang Wang Shengsheng Qian Jun Hu Wenxiang Dong Xudong Huang Richang Hong School of Public Security and Emergency Management Anhui University of Science and Technology China and State Key Laboratory of Digital Intelligent Technology for Unmanned Coal Mining Anhui University of Science and Technology China State Key Laboratory of Multimodal Artificial Intelligence Systems Institute of Automation Chinese Academy of Sciences China and School of Artificial Intelligence University of Chinese Academy of Sciences China School of Computing National University of Singapore Singapore Institute of Dataspace Hefei Comprehensive National Science Center China School of Computer Science and Information Engineering Hefei University of Technology China
Explainable Fake News Detection (EFND) is a new challenge that aims to verify news authenticity and provide clear explanations for its decisions. Traditional EFND methods often treat the tasks of classification and ex... 详细信息
来源: 评论
Edge-Adaptive Dynamic Scalable Convolution for Efficient Remote Mobile Pathology Analysis
收藏 引用
ACM Transactions on Autonomous and Adaptive Systems 1000年
作者: Peng Xiao Dajiang Chen Zhen Qin Mingsheng Cao Ruidong Chen Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China China School of Computer Science & Engineering University of Electronic Science and Technology of China China
With the emergence of edge computing, there’s a growing need for advanced technologies capable of real-time, efficient processing of complex data on edge devices, particularly in mobile health systems handling pathol... 详细信息
来源: 评论
S3 Agent: Unlocking the Power of VLLM for Zero-Shot Multi-modal Sarcasm Detection
收藏 引用
ACM Transactions on Multimedia computing, Communications, and Applications 1000年
作者: Peng Wang Yongheng Zhang Hao Fei Qiguang Chen Yukai Wang Jiasheng Si Wenpeng Lu Min Li Libo Qin School of Computer Science and Engineering Central South University China National University of Singapore Singapore Harbin Institute of Technology China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology (Shandong Academy of Sciences) China
Multi-modal sarcasm detection involves determining whether a given multi-modal input conveys sarcastic intent by analyzing the underlying sentiment. Recently, vision large language models have shown remarkable success... 详细信息
来源: 评论
Federated Semantic Learning for Privacy-preserving Cross-domain Recommendation
收藏 引用
ACM Transactions on Information Systems 1000年
作者: Ziang Lu Lei Guo Xu Yu Zhiyong Cheng Xiaohui Han Lei Zhu Shandong Normal University China China University of Petroleum (East China) China Hefei University of Technology China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology (Shandong Academy of Sciences) China Tongji University China
In the evolving landscape of recommender systems, the challenge of effectively conducting privacy-preserving Cross-Domain Recommendation (CDR), especially under strict non-overlapping constraints, has emerged as a key... 详细信息
来源: 评论
Semantic-enhanced Co-attention Prompt Learning for Non-overlapping Cross-Domain Recommendation
收藏 引用
ACM Transactions on Information Systems 1000年
作者: Lei Guo Chenlong Song Feng Guo Xiaohui Han Xiaojun Chang Lei Zhu Shandong Normal University China Liaocheng University China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology Shandong Academy of Sciences) China and Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science China Tongji University China
Non-overlapping Cross-domain Sequential Recommendation (NCSR) is the task that focuses on domain knowledge transfer without overlapping entities. Compared with traditional Cross-domain Sequential Recommendation (CSR),... 详细信息
来源: 评论