咨询与建议

限定检索结果

文献类型

  • 2,087 篇 会议
  • 1,620 篇 期刊文献

馆藏范围

  • 3,707 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,418 篇 工学
    • 1,833 篇 计算机科学与技术...
    • 1,472 篇 软件工程
    • 594 篇 信息与通信工程
    • 340 篇 电气工程
    • 272 篇 控制科学与工程
    • 242 篇 电子科学与技术(可...
    • 233 篇 生物工程
    • 177 篇 网络空间安全
    • 155 篇 机械工程
    • 113 篇 光学工程
    • 96 篇 生物医学工程(可授...
    • 91 篇 化学工程与技术
    • 86 篇 仪器科学与技术
    • 86 篇 安全科学与工程
    • 78 篇 交通运输工程
    • 69 篇 材料科学与工程(可...
    • 64 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,083 篇 理学
    • 612 篇 数学
    • 268 篇 物理学
    • 252 篇 生物学
    • 207 篇 统计学(可授理学、...
    • 100 篇 系统科学
    • 91 篇 化学
  • 606 篇 管理学
    • 333 篇 管理科学与工程(可...
    • 301 篇 图书情报与档案管...
    • 101 篇 工商管理
  • 121 篇 法学
    • 72 篇 社会学
  • 82 篇 医学
    • 72 篇 临床医学
    • 66 篇 基础医学(可授医学...
  • 45 篇 经济学
  • 34 篇 军事学
  • 19 篇 农学
  • 18 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 168 篇 feature extracti...
  • 129 篇 semantics
  • 127 篇 accuracy
  • 112 篇 training
  • 110 篇 computational mo...
  • 103 篇 federated learni...
  • 98 篇 deep learning
  • 80 篇 privacy
  • 73 篇 data models
  • 69 篇 cryptography
  • 62 篇 authentication
  • 61 篇 security
  • 60 篇 robustness
  • 59 篇 data privacy
  • 59 篇 protocols
  • 52 篇 neural networks
  • 51 篇 object detection
  • 51 篇 adaptation model...
  • 50 篇 cloud computing
  • 48 篇 data mining

机构

  • 278 篇 key laboratory o...
  • 207 篇 shandong provinc...
  • 98 篇 university of ch...
  • 83 篇 school of comput...
  • 82 篇 key laboratory o...
  • 67 篇 shandong provinc...
  • 66 篇 school of cyber ...
  • 64 篇 information secu...
  • 63 篇 cas key laborato...
  • 60 篇 guangdong provin...
  • 53 篇 shandong enginee...
  • 51 篇 tianjin key labo...
  • 49 篇 network and data...
  • 49 篇 state key labora...
  • 47 篇 peng cheng labor...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 46 篇 school of comput...
  • 46 篇 shandong provinc...
  • 44 篇 institute of inf...

作者

  • 101 篇 cheng xueqi
  • 50 篇 guo jiafeng
  • 47 篇 shen huawei
  • 43 篇 zheng wei-shi
  • 33 篇 huang qingming
  • 33 篇 yixian yang
  • 33 篇 xie xiaohua
  • 33 篇 cao xiaochun
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 27 篇 jin xiaolong
  • 27 篇 xu qianqian
  • 25 篇 xiaoming wu
  • 25 篇 jin hai
  • 24 篇 xinhong hei
  • 24 篇 li wei
  • 21 篇 hu shengshan
  • 21 篇 lai jianhuang
  • 20 篇 yang zhiyong
  • 20 篇 shen yulong

语言

  • 3,242 篇 英文
  • 390 篇 其他
  • 86 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3707 条 记 录,以下是51-60 订阅
OpenViewer: Openness-Aware Multi-View Learning  39
OpenViewer: Openness-Aware Multi-View Learning
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Du, Shide Fang, Zihan Tan, Yanchao Wang, Changwei Wang, Shiping Guo, Wenzhong College of Computer and Data Science Fuzhou University Fuzhou China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Jinan China
Multi-view learning methods leverage multiple data sources to enhance perception by mining correlations across views, typically relying on predefined categories. However, deploying these models in real-world scenarios... 详细信息
来源: 评论
An Improved YOLOv5s-Based Smoke Detection System for Outdoor Parking Lots
收藏 引用
Computers, Materials & Continua 2024年 第8期80卷 3333-3349页
作者: Ruobing Zuo Xiaohan Huang Xuguo Jiao Zhenyong Zhang State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang550025China School of Information and Control Engineering Qingdao University of TechnologyQingdao266520China State Key Laboratory of Industrial Control Technology College of Control Science and EngineeringZhejiang UniversityHangzhou310027China Key Laboratory of Computing Power Network and Information Security Ministry of EducationQilu University of Technology(Shandong Academy of Sciences)Jinan250353China Text Computing&Cognitive Intelligence Engineering Research Center of National Education Ministry Guizhou UniversityGuiyang550025China
In the rapidly evolving urban landscape,outdoor parking lots have become an indispensable part of the city’s transportation *** growth of parking lots has raised the likelihood of spontaneous vehicle combus-tion,a si... 详细信息
来源: 评论
Blockchain-Based Data Acquisition with Privacy Protection in UAV Cluster network
收藏 引用
Computer Modeling in Engineering & Sciences 2023年 第10期137卷 879-902页
作者: Lemei Da Hai Liang Yong Ding Yujue Wang Changsong Yang Huiyong Wang Guangxi Key Laboratory of Cryptography and Information Security School of Computer Science and Information SecurityGuilin University of Electronic TechnologyGuilin541004China Cyberspace Security Research Center Pengcheng LaboratoryShenzhen518055China School of Mathematics and Computing Science Guilin University of Electronic TechnologyGuilin541004China
The unmanned aerial vehicle(UAV)self-organizing network is composed of multiple UAVs with autonomous capabilities according to a certain structure and scale,which can quickly and accurately complete complex tasks such... 详细信息
来源: 评论
key Management and Authentication Scheme Forward Trusted Pervasive Container computing  2
Key Management and Authentication Scheme Forward Trusted Per...
收藏 引用
2nd International Conference on Big Data and Privacy computing, BDPC 2024
作者: Hei, XinHong Xue, YuZhan Wang, YiChuan Liu, YiFan Peng, Chen Sun, Xiang School of Computer Science and Engineering Xi'an University of Technology Xi'an China School of Computer Science and Engineering Xi'an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China
Cloud computing technology is an internet-based computing model that provides high reliability and security measures, including data backup, secure access control, etc. As Docker containers play a increasingly importa... 详细信息
来源: 评论
Machine learning empowered UAV-based beamforming design in ISAC systems
收藏 引用
Science China(Information Sciences) 2025年 第5期68卷 285-286页
作者: Xiangyang DUAN Xiaoqi ZHANG Shuqiang XIA Zhongbin WANG Yihua MA Weijie YUAN State Key Laboratory of Mobile Network and Mobile Multimedia Technology Wireless and Computing Research InstituteZTE Corporation School of Electrical and Data Engineering University of Technology Sydney School of Automation and Intelligent Manufacturing Southern University of Science and Technology
Integrated sensing and communication (ISAC) has been proposed as an enabling technology for the realization of the next-generation wireless system,which focuses on performing wireless communication and sensing *** the...
来源: 评论
How to Construct Public Timeline for RSA-Formed Time-Lock Cryptography  20th
How to Construct Public Timeline for RSA-Formed Time-Lock ...
收藏 引用
20th International Conference on Information security and Cryptology, Inscrypt 2024
作者: Jin, Huixuan Peng, Cong Fu, Jintao Luo, Min Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Wuhan China Henan Key Laboratory of Network Cryptography Technology Henan Zhengzhou China Inspur Academy of Science and Technology Jinan China
Time-Locked Puzzle (TLP) and timed-release encryption (T-RE) are both time-based locking mechanisms. The former requires the decryptor to perform a predetermined amount of computation, while the latter requires a trus... 详细信息
来源: 评论
Conditional selection with CNN augmented transformer for multimodal affective analysis
收藏 引用
CAAI Transactions on Intelligence technology 2024年 第4期9卷 917-931页
作者: Jianwen Wang Shiping Wang Shunxin Xiao Renjie Lin Mianxiong Dong Wenzhong Guo College of Computer and Data Science Fuzhou UniversityFuzhouChina College of Computer and Cyber Security Fujian Normal UniversityFuzhouChina Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou UniversityFuzhouChina Digital Fujian Institute of Big Data Security Technology Fujian Normal UniversityFuzhouChina Department of Sciences and Informatics Muroran Institute of TechnologyMuroranJapan
Attention mechanism has been a successful method for multimodal affective analysis in recent years. Despite the advances, several significant challenges remain in fusing language and its nonverbal context information.... 详细信息
来源: 评论
ADLT: a novel method for effective detection of adversarial attacks in image retrieval
ADLT: a novel method for effective detection of adversarial ...
收藏 引用
2024 International Conference on Computer Vision and Image Processing, CVIP 2024
作者: Xu, Shiyue Zhang, Yu College of Cyber Science Tianjin Key Laboratory of Network and Data Security Technology Nankai University Tianjin300350 China
The versatile application of deep learning has made it prone to vulnerabilities, particularly adversarial attacks, which have been increasingly prevalent as its scope expands. Attack methods based on adversarial queri... 详细信息
来源: 评论
A High-Quality and Efficient Bus-Aware Global Router
收藏 引用
Chinese Journal of Electronics 2025年 第2期34卷 444-456页
作者: Liu Genggeng Wei Ling Yu Yantao Xu Ning College of Computer and Data Science Fuzhou University Fuzhou 350108 China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou 350108 China School of Information Engineering Wuhan University of Technology Wuhan 430070 China
As advanced technology nodes enter the nanometer era, the complexity of integrated circuit design is increasing, and the proportion of bus in the net is also increasing. The bus routing has become a key factor affecti... 详细信息
来源: 评论
Source-free Domain Adaptation with Multiple Alignment for Efficient Image Retrieval
Source-free Domain Adaptation with Multiple Alignment for Ef...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Ni, Jinghui Cui, Hui Zhao, Lihai Li, Fengling Han, Xiaohui Xu, Lijuan Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science China Quan Cheng Laboratory China Shandong Open University China University of Technology Sydney Australia
Domain adaptation techniques help models generalize to target domains by addressing domain discrepancies between the source and target domain data distributions. These techniques are particularly valuable for cross-do... 详细信息
来源: 评论