咨询与建议

限定检索结果

文献类型

  • 2,087 篇 会议
  • 1,620 篇 期刊文献

馆藏范围

  • 3,707 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,418 篇 工学
    • 1,833 篇 计算机科学与技术...
    • 1,472 篇 软件工程
    • 594 篇 信息与通信工程
    • 340 篇 电气工程
    • 272 篇 控制科学与工程
    • 242 篇 电子科学与技术(可...
    • 233 篇 生物工程
    • 177 篇 网络空间安全
    • 155 篇 机械工程
    • 113 篇 光学工程
    • 96 篇 生物医学工程(可授...
    • 91 篇 化学工程与技术
    • 86 篇 仪器科学与技术
    • 86 篇 安全科学与工程
    • 78 篇 交通运输工程
    • 69 篇 材料科学与工程(可...
    • 64 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,083 篇 理学
    • 612 篇 数学
    • 268 篇 物理学
    • 252 篇 生物学
    • 207 篇 统计学(可授理学、...
    • 100 篇 系统科学
    • 91 篇 化学
  • 606 篇 管理学
    • 333 篇 管理科学与工程(可...
    • 301 篇 图书情报与档案管...
    • 101 篇 工商管理
  • 121 篇 法学
    • 72 篇 社会学
  • 82 篇 医学
    • 72 篇 临床医学
    • 66 篇 基础医学(可授医学...
  • 45 篇 经济学
  • 34 篇 军事学
  • 19 篇 农学
  • 18 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 168 篇 feature extracti...
  • 129 篇 semantics
  • 127 篇 accuracy
  • 112 篇 training
  • 110 篇 computational mo...
  • 103 篇 federated learni...
  • 98 篇 deep learning
  • 80 篇 privacy
  • 73 篇 data models
  • 69 篇 cryptography
  • 62 篇 authentication
  • 61 篇 security
  • 60 篇 robustness
  • 59 篇 data privacy
  • 59 篇 protocols
  • 52 篇 neural networks
  • 51 篇 object detection
  • 51 篇 adaptation model...
  • 50 篇 cloud computing
  • 48 篇 data mining

机构

  • 278 篇 key laboratory o...
  • 207 篇 shandong provinc...
  • 98 篇 university of ch...
  • 83 篇 school of comput...
  • 82 篇 key laboratory o...
  • 67 篇 shandong provinc...
  • 66 篇 school of cyber ...
  • 64 篇 information secu...
  • 63 篇 cas key laborato...
  • 60 篇 guangdong provin...
  • 53 篇 shandong enginee...
  • 51 篇 tianjin key labo...
  • 49 篇 network and data...
  • 49 篇 state key labora...
  • 47 篇 peng cheng labor...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 46 篇 school of comput...
  • 46 篇 shandong provinc...
  • 44 篇 institute of inf...

作者

  • 101 篇 cheng xueqi
  • 50 篇 guo jiafeng
  • 47 篇 shen huawei
  • 43 篇 zheng wei-shi
  • 33 篇 huang qingming
  • 33 篇 yixian yang
  • 33 篇 xie xiaohua
  • 33 篇 cao xiaochun
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 27 篇 jin xiaolong
  • 27 篇 xu qianqian
  • 25 篇 xiaoming wu
  • 25 篇 jin hai
  • 24 篇 xinhong hei
  • 24 篇 li wei
  • 21 篇 hu shengshan
  • 21 篇 lai jianhuang
  • 20 篇 yang zhiyong
  • 20 篇 shen yulong

语言

  • 3,242 篇 英文
  • 390 篇 其他
  • 86 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3707 条 记 录,以下是71-80 订阅
Self-Evaluation of Large Language Model based on Glass-box Features
Self-Evaluation of Large Language Model based on Glass-box F...
收藏 引用
2024 Findings of the Association for Computational Linguistics, EMNLP 2024
作者: Huang, Hui Qu, Yingqi Liu, Jing Yang, Muyun Xu, Bing Zhao, Tiejun Lu, Wenpeng Faculty of Computing Harbin Institute of Technology Harbin China Baidu Inc. Beijing China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Jinan China
The proliferation of open-source Large Language Models (LLMs) underscores the pressing need for evaluation methods. Existing works primarily rely on external evaluators, focusing on training and prompting strategies. ... 详细信息
来源: 评论
CausalDiff: Causality-Inspired Disentanglement via Diffusion Model for Adversarial Defense  38
CausalDiff: Causality-Inspired Disentanglement via Diffusion...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Zhang, Mingkun Bi, Keping Chen, Wei Chen, Quanrun Guo, Jiafeng Cheng, Xueqi CAS Key Laboratory of AI Safety Institute of Computing Technology CAS China Key Laboratory of Network Data Science and Technology Institute of Computing Technology CAS China School of Statistics University of International Business and Economics China
Despite ongoing efforts to defend neural classifiers from adversarial attacks, they remain vulnerable, especially to unseen attacks. In contrast, humans are difficult to be cheated by subtle manipulations, since we ma...
来源: 评论
Robust Generative Steganography for Image Hiding Using Concatenated Mappings
收藏 引用
IEEE Transactions on Information Forensics and security 2025年 20卷 5952-5965页
作者: Chen, Liyan Feng, Bingwen Xia, Zhihua Lu, Wei Weng, Jian Jinan University College of Cyber Security Guangzhou510632 China Jinan University College of Cyber Security Engineering Research Center of Trustworthy AI Ministry of Education Guangzhou510632 China Sun Yat-sen University School of Computer Science and Engineering Guangdong Province Key Laboratory of Information Security Technology Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing Guangzhou510006 China
Generative steganography stands as a promising technique for information hiding, primarily due to its remarkable resistance to steganalysis detection. Despite its potential, hiding a secret image using existing genera... 详细信息
来源: 评论
Trust Assessment Under the Integrated Air-Space-Ground network Environment
收藏 引用
Tsinghua Science and technology 2023年 第2期28卷 405-420页
作者: Zhe Liu Yinghao Yuan Bo Zhao Xiaoyan Peng Key Laboratory of Aerospace Information Security and Trust Computing Ministry of EducationSchool of Cyber Science and EngineeringWuhan UniversityWuhan 430072China Shanghai Academy of Spaceflight Technology Shanghai 210000China
While playing an increasing role in the field of air-space integrated networks,terminal entities are exposed to more serious security risks than ordinary terminal entities on the ground,including but not limited to as... 详细信息
来源: 评论
Voiceprint recognition model based on Ecapa-Tdnn and ResNet  5
Voiceprint recognition model based on Ecapa-Tdnn and ResNet
收藏 引用
5th International Conference on Telecommunications, Optics, and Computer Science, TOCS 2024
作者: Jia, Chengjie Fei, Rong Li, Xiaomeng School of Computer Science and Engineering Xi'an University of Technology Shaanxi Xi'an710004 China Shaanxi Key Laboratory for Network Computing and Security Technology School of Computer Science and Engineering Xi'an University of Technology Shaanxi Xi'an710048 China
In recent years, with the continuous progress of deep learning neural networks and the construction of large data sets, new breakthroughs in voiceprint verification technology for voice calls have been rapidly achieve... 详细信息
来源: 评论
A New CP-Based Non-Overlapping FBMC-QAM System for Future Wireless Communications
收藏 引用
China Communications 2025年 第5期22卷 108-127页
作者: Ren Defeng Li Jing Sun Chuiqiang Zhang Guohua Shaanxi Key Laboratory of Information Communication Network and Security Xi’an University of Posts and TelecommunicationsXi’an 710121China State Key Laboratory of Integrated Services Networks Xidian UniversityXi’an 710071China China Academy of Space Technology(Xi’an) Xi’an 710000China
A new cyclic prefix(CP)-based nonoverlapping FBMC-QAM(CP-NO-FBMC-QAM)system with two prototype filters is proposed in this paper,which satisfies complex orthogonality conditions and good frequency energy confinement a... 详细信息
来源: 评论
Enhanced Practical Byzantine Fault Tolerance for Service Function Chain Deployment:Advancing Big Data Intelligence in Control Systems
收藏 引用
Computers, Materials & Continua 2025年 第6期83卷 4393-4409页
作者: Peiying Zhang Yihong Yu Jing Liu ChongLv Lizhuang Tan Yulin Zhang Qingdao Institute of Software College of Computer Science and TechnologyChina University of Petroleum(East China)Qingdao266580China Shandong Key Laboratory of Intelligent Oil&Gas Industrial Software Qingdao266580China Library of Shanghai Lixin University of Accounting and Finance Shanghai201209China Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science Center(National Supercomputer Center in Jinan)Qilu University of Technology(Shandong Academy of Sciences)Jinan250014China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer ScienceJinan250014China Key Laboratory of Ethnic Language Intelligent Analysis and Security Governance of MOE Minzu University of ChinaBeijing100081China Key Laboratory of Intelligent Game Yangtze River Delta Research Institute of NPUTaicang215400China Key Laboratory of Education Informatization for Nationalities(Yunnan Normal University) Ministry of EducationKunming650092China
As Internet ofThings(IoT)technologies continue to evolve at an unprecedented pace,intelligent big data control and information systems have become critical enablers for organizational digital transformation,facilitati... 详细信息
来源: 评论
Design and implementation of handlebar defect detection method based on machine recognition
Design and implementation of handlebar defect detection meth...
收藏 引用
2024 International Conference on Computer Graphics, Artificial Intelligence, and Data Processing, ICCAID 2024
作者: Zhang, Tong Ren, Sunan Zhang, Wenjing Liu, Yajun School of Computer Science and Engineering Xi’an University of Technology Shaanxi Xi’an710048 China Shaanxi Key Laboratory for Network Computing and Security Technology School of Computer Science and Engineering Xi’an University of Technology Shaanxi Xi’an710048 China
As an important part of electric vehicles, handlebar installation defects are an important factor in the failure of electric vehicles. In the production process, many large-scale manufacturers still assemble the handl... 详细信息
来源: 评论
A perspective on Petri Net learning
收藏 引用
Frontiers of Computer Science 2023年 第6期17卷 1-3页
作者: Hongda QI Changjun JIANG Key Laboratory of Embedded System and Service Computing(Ministry of Education) Tongji UniversityShanghai 201804China National(Province-Ministry Joint)Collaborative Innovation Center for Financial Network Security Tongji UniversityShanghai 201804China
Petri Nets(PNs)are used for modeling and analyzing discreteevent systems,such as communication protocols,trafficsystems,human-computer interaction,and fault ***’state space explosion problem means that the state spac... 详细信息
来源: 评论
Methods for solving equations with errors based on the HHL algorithm
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2022年 第4期29卷 9-20页
作者: LüLihui Wang Hong Ma Zhi Duan Qianheng Fei Yangyang Meng Xiangdong State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001China Henan Key Laboratory of Network Cryptography Technology Zhengzhou 450001China
To solve polynomial systems,Harrow,Hassidim,and Lloyd(HHL)proposed a quantum algorithm called HHL *** on the HHL algorithm,Chen et *** an algorithm,the solving the Boolean solutions of polynomial systems(PoSSoB)***,Di... 详细信息
来源: 评论