咨询与建议

限定检索结果

文献类型

  • 2,087 篇 会议
  • 1,620 篇 期刊文献

馆藏范围

  • 3,707 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,418 篇 工学
    • 1,833 篇 计算机科学与技术...
    • 1,472 篇 软件工程
    • 594 篇 信息与通信工程
    • 340 篇 电气工程
    • 272 篇 控制科学与工程
    • 242 篇 电子科学与技术(可...
    • 233 篇 生物工程
    • 177 篇 网络空间安全
    • 155 篇 机械工程
    • 113 篇 光学工程
    • 96 篇 生物医学工程(可授...
    • 91 篇 化学工程与技术
    • 86 篇 仪器科学与技术
    • 86 篇 安全科学与工程
    • 78 篇 交通运输工程
    • 69 篇 材料科学与工程(可...
    • 64 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,083 篇 理学
    • 612 篇 数学
    • 268 篇 物理学
    • 252 篇 生物学
    • 207 篇 统计学(可授理学、...
    • 100 篇 系统科学
    • 91 篇 化学
  • 606 篇 管理学
    • 333 篇 管理科学与工程(可...
    • 301 篇 图书情报与档案管...
    • 101 篇 工商管理
  • 121 篇 法学
    • 72 篇 社会学
  • 82 篇 医学
    • 72 篇 临床医学
    • 66 篇 基础医学(可授医学...
  • 45 篇 经济学
  • 34 篇 军事学
  • 19 篇 农学
  • 18 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 168 篇 feature extracti...
  • 129 篇 semantics
  • 127 篇 accuracy
  • 112 篇 training
  • 110 篇 computational mo...
  • 103 篇 federated learni...
  • 98 篇 deep learning
  • 80 篇 privacy
  • 73 篇 data models
  • 69 篇 cryptography
  • 62 篇 authentication
  • 61 篇 security
  • 60 篇 robustness
  • 59 篇 data privacy
  • 59 篇 protocols
  • 52 篇 neural networks
  • 51 篇 object detection
  • 51 篇 adaptation model...
  • 50 篇 cloud computing
  • 48 篇 data mining

机构

  • 278 篇 key laboratory o...
  • 207 篇 shandong provinc...
  • 98 篇 university of ch...
  • 83 篇 school of comput...
  • 82 篇 key laboratory o...
  • 67 篇 shandong provinc...
  • 66 篇 school of cyber ...
  • 64 篇 information secu...
  • 63 篇 cas key laborato...
  • 60 篇 guangdong provin...
  • 53 篇 shandong enginee...
  • 51 篇 tianjin key labo...
  • 49 篇 network and data...
  • 49 篇 state key labora...
  • 47 篇 peng cheng labor...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 46 篇 school of comput...
  • 46 篇 shandong provinc...
  • 44 篇 institute of inf...

作者

  • 101 篇 cheng xueqi
  • 50 篇 guo jiafeng
  • 47 篇 shen huawei
  • 43 篇 zheng wei-shi
  • 33 篇 huang qingming
  • 33 篇 yixian yang
  • 33 篇 xie xiaohua
  • 33 篇 cao xiaochun
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 27 篇 jin xiaolong
  • 27 篇 xu qianqian
  • 25 篇 xiaoming wu
  • 25 篇 jin hai
  • 24 篇 xinhong hei
  • 24 篇 li wei
  • 21 篇 hu shengshan
  • 21 篇 lai jianhuang
  • 20 篇 yang zhiyong
  • 20 篇 shen yulong

语言

  • 3,242 篇 英文
  • 390 篇 其他
  • 86 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3707 条 记 录,以下是81-90 订阅
Underwater target recognition based on adaptive multi-feature fusion network
收藏 引用
Multimedia Tools and Applications 2025年 第10期84卷 7297-7317页
作者: Pan, Xiaoying Sun, Jia Feng, TianHao Lei, MingZhu Wang, Hao Zhang, WuXia Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi’an710121 China Xi’an Key Laboratory of Big Data and Intelligent Computing Xi’an710121 China School of Computer Science and Technology Xi’an University of Post & Telecommunications Xi’an710121 China
Due to the complexity of the underwater environment, underwater acoustic target recognition is more challenging than ordinary target recognition, and has become a hot topic in the field of underwater acoustics researc... 详细信息
来源: 评论
Plot Retrieval as an Assessment of Abstract Semantic Association  62
Plot Retrieval as an Assessment of Abstract Semantic Associa...
收藏 引用
62nd Annual Meeting of the Association for Computational Linguistics, ACL 2024
作者: Xu, Shicheng Pang, Liang Li, Jiangnan Yu, Mo Meng, Fandong Shen, Huawei Cheng, Xueqi Zhou, Jie CAS Key Laboratory of AI Security Institute of Computing Technology CAS China Pattern Recognition Center WeChat AI
Retrieving relevant plots from the book for a query is a critical task, which can improve the reading experience and efficiency of readers. Readers usually only give an abstract and vague description as the query base... 详细信息
来源: 评论
LLM-Driven Knowledge Injection Advances Zero-Shot and Cross-Target Stance Detection
LLM-Driven Knowledge Injection Advances Zero-Shot and Cross-...
收藏 引用
2024 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, NAACL 2024
作者: Zhang, Zhao Li, Yiming Zhang, Jin Xu, Hui CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China Beijing Key Laboratory of Mobile Computing and Pervasive Device Institute of Computing Technology Chinese Academy of Sciences China University of Chinese Academy of Sciences China
Stance detection aims at inferring an author’s attitude towards a specific target in a text. Prior methods mainly consider target-related background information for a better understanding of targets while neglecting ... 详细信息
来源: 评论
A bitcoin service community classification method based on Random Forest and improved KNN algorithm
IET Blockchain
收藏 引用
IET Blockchain 2024年 第3期4卷 276-286页
作者: Gao, Muyun Lin, Shenwen Tian, Xin He, Xi He, Ketai Chen, Shifeng School of Mechanical Engineering University of Science and Technology Beijing Beijing China Internet Financial Security Technology Key Laboratory National Computer Network Emergency Response Technical Team/Coordination Center of China Beijing China
There are service communities with different functions in the Bitcoin transactions system. Identifying community categories helps to further understand the Bitcoin transactions system and facilitates targeted regulati... 详细信息
来源: 评论
Research and Application of Speech Transmission Index in Acoustic Leakage Detection  17
Research and Application of Speech Transmission Index in Aco...
收藏 引用
17th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics, CISP-BMEI 2024
作者: Hao, Qiuyun Wang, FuQiang Zhang, Peng Ma, XiaoFeng Zhang, Jianqiang Zhao, Wei Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
Acoustic information in confidential premise can be leaked through channels such as walls, pipes, doors and windows. Acoustic leakage level needs to be measured through specific indicators. Acoustic leakage evaluation... 详细信息
来源: 评论
A Method for Removing Reflections from Water Surface Images Based on Pre-trained Image Restoration
A Method for Removing Reflections from Water Surface Images ...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Minghua Zhao Rui Zhi Shuangli Du Jing Hu Cheng Shi Lin Wang Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an University of Technology Xi’an China
Reflections on the water surface hinder the extraction of valuable information from water surface images. To remove reflections from water surface images, we construct a synthetic dataset and propose a multi-task netw... 详细信息
来源: 评论
Reputation based Adaptive Federated Learning in Medical Scenarios  9
Reputation based Adaptive Federated Learning in Medical Scen...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Wang, Lianhai Liu, Tianrui Wang, Yingxiaochun Wang, Xinlei Li, Qi Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
Federated Learning (FL) is a distributed machine learning paradigm designed to address data silos and protect data privacy. However, in medical scenarios, the heterogeneity in data quality and the non-independent and ... 详细信息
来源: 评论
A Novel Neighborhood-Weighted Sampling Method for Imbalanced Datasets
收藏 引用
Chinese Journal of Electronics 2022年 第5期31卷 969-979页
作者: GUANG Mingjian YAN Chungang LIU Guanjun WANG Junli JIANG Changjun Key Laboratory of Embedded System and Service Computing Tongji University Ministry of Education National (Province-Ministry Joint) Collaborative Innovation Center for Financial Network Security Tongji University
The weighted sampling methods based on k-nearest neighbors have been demonstrated to be effective in solving the class imbalance problem. However,they usually ignore the positional relationship between a sample and th... 详细信息
来源: 评论
Augmentation-Aware Self-Supervision for Data-Efficient GAN Training  37
Augmentation-Aware Self-Supervision for Data-Efficient GAN T...
收藏 引用
37th Conference on Neural Information Processing Systems, NeurIPS 2023
作者: Hou, Liang Cao, Qi Yuan, Yige Zhao, Songtao Ma, Chongyang Pan, Siyuan Wan, Pengfei Wang, Zhongyuan Shen, Huawei Cheng, Xueqi CAS Key Laboratory of AI Safety and Security Institute of Computing Technology Chinese Academy of Sciences China CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China University of Chinese Academy of Sciences China Kuaishou Technology China
Training generative adversarial networks (GANs) with limited data is challenging because the discriminator is prone to overfitting. Previously proposed differentiable augmentation demonstrates improved data efficiency... 详细信息
来源: 评论
SSpose: Self-Supervised Spatial-Aware Model for Human Pose Estimation
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第11期5卷 5403-5417页
作者: Yu, Linfang Qin, Zhen Xu, Liqun Qin, Zhiguang Choo, Kim-Kwang Raymond University of Electronic Science and Technology of China Network and Data Security Key Laboratory of Sichuan Province Chengdu610054 China Industrial Research Institute Chengdu610213 China University of Electronic Science and Technology of China Network and Data Security Key Laboratory of Sichuan Province School of Information and Software Engineering Chengdu610054 China Industrial Research Institute Chengdu610213 China University of Texas at San Antonio Department of Information Systems and Cyber Security San AntonioTX78249 United States
Human pose estimation (HPE) relies on the anatomical relationships among different body parts to locate keypoints. Despite the significant progress achieved by convolutional neural networks (CNN)-based models in HPE, ... 详细信息
来源: 评论