咨询与建议

限定检索结果

文献类型

  • 565 篇 期刊文献
  • 541 篇 会议
  • 1 册 图书

馆藏范围

  • 1,107 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 769 篇 工学
    • 608 篇 计算机科学与技术...
    • 483 篇 软件工程
    • 142 篇 信息与通信工程
    • 94 篇 控制科学与工程
    • 84 篇 网络空间安全
    • 65 篇 生物工程
    • 64 篇 电气工程
    • 56 篇 电子科学与技术(可...
    • 45 篇 光学工程
    • 33 篇 机械工程
    • 30 篇 安全科学与工程
    • 27 篇 建筑学
    • 27 篇 土木工程
    • 27 篇 化学工程与技术
    • 22 篇 仪器科学与技术
    • 20 篇 生物医学工程(可授...
    • 15 篇 动力工程及工程热...
  • 295 篇 理学
    • 144 篇 数学
    • 79 篇 物理学
    • 73 篇 生物学
    • 39 篇 统计学(可授理学、...
    • 30 篇 化学
    • 17 篇 系统科学
  • 206 篇 管理学
    • 110 篇 图书情报与档案管...
    • 109 篇 管理科学与工程(可...
    • 31 篇 工商管理
  • 22 篇 法学
    • 20 篇 社会学
  • 18 篇 军事学
    • 18 篇 军队指挥学
  • 16 篇 医学
    • 16 篇 临床医学
    • 15 篇 基础医学(可授医学...
  • 13 篇 经济学
  • 6 篇 农学
  • 3 篇 教育学
  • 2 篇 艺术学

主题

  • 36 篇 semantics
  • 23 篇 training
  • 20 篇 security
  • 20 篇 cryptography
  • 19 篇 feature extracti...
  • 18 篇 contrastive lear...
  • 17 篇 trusted computin...
  • 15 篇 speech processin...
  • 14 篇 reinforcement le...
  • 14 篇 image segmentati...
  • 14 篇 information secu...
  • 14 篇 machine learning
  • 13 篇 deep learning
  • 13 篇 cloud computing
  • 12 篇 object detection
  • 12 篇 semantic segment...
  • 12 篇 deep neural netw...
  • 12 篇 privacy
  • 11 篇 computational mo...
  • 10 篇 access control

机构

  • 242 篇 key laboratory o...
  • 201 篇 key laboratory o...
  • 68 篇 institute of art...
  • 55 篇 key laboratory o...
  • 47 篇 beijing key labo...
  • 43 篇 school of inform...
  • 41 篇 key laboratory o...
  • 39 篇 school of cyber ...
  • 38 篇 faculty of infor...
  • 38 篇 tencent youtu la...
  • 38 篇 school of comput...
  • 33 篇 peng cheng labor...
  • 29 篇 fujian key labor...
  • 27 篇 trusted computin...
  • 25 篇 key laboratory o...
  • 24 篇 school of comput...
  • 21 篇 key laboratory o...
  • 20 篇 fujian key labor...
  • 19 篇 guangxi key labo...
  • 19 篇 national univers...

作者

  • 157 篇 ji rongrong
  • 68 篇 sun xiaoshuai
  • 55 篇 ji donghong
  • 48 篇 rongrong ji
  • 42 篇 fei hao
  • 40 篇 cao liujuan
  • 38 篇 li fei
  • 37 篇 ji jiayi
  • 34 篇 wang cheng
  • 34 篇 zhang shengchuan
  • 32 篇 zhou yiyi
  • 30 篇 zhang huanguo
  • 27 篇 zhang yuxin
  • 26 篇 teng chong
  • 26 篇 zheng xiawu
  • 26 篇 ma yiwei
  • 25 篇 wang lina
  • 23 篇 lin mingbao
  • 23 篇 chao fei
  • 22 篇 li bobo

语言

  • 763 篇 英文
  • 334 篇 其他
  • 10 篇 中文
检索条件"机构=Key Laboratory of Trusted Computing"
1107 条 记 录,以下是81-90 订阅
排序:
JSVulExplorer:A JavaScript Vulnerability Detection Model Based on Transfer Learning  5
JSVulExplorer:A JavaScript Vulnerability Detection Model Ba...
收藏 引用
5th International Conference on Computer Information Science and Artificial Intelligence, CISAI 2022
作者: Chen, Shengquan Jiang, Nan Wu, Zheng Wang, Zichen Faculty of Information Technology Beijing University of Technology Beijing100124 China Beijing Key Laboratory of Trusted Computing Beijing100124 China
Software vulnerabilities will make the system vulnerable to attack, affect the reliability of the software and cause information leakage, which will have a huge impact on enterprises or individuals. Vulnerabilities ar... 详细信息
来源: 评论
SAM as the Guide: Mastering Pseudo-Label Refinement in Semi-Supervised Referring Expression Segmentation  41
SAM as the Guide: Mastering Pseudo-Label Refinement in Semi-...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Yang, Danni Ji, Jiayi Ma, Yiwei Guo, Tianyu Wang, Haowei Sun, Xiaoshuai Ji, Rongrong Key Laboratory of Multimedia Trusted Perception and Efficient Computing Ministry of Education of China School of Informatics Xiamen University 361005 China Youtu Lab Tencent Shanghai China
In this paper, we introduce SemiRES, a semi-supervised framework that effectively leverages a combination of labeled and unlabeled data to perform RES. A significant hurdle in applying semi-supervised techniques to RE... 详细信息
来源: 评论
Inductive Relation Prediction by Disentangled Subgraph Structure
收藏 引用
Tsinghua Science and Technology 2024年 第5期29卷 1566-1579页
作者: Guiduo Duan Rui Guo Wenlong Luo Guangchun Luo Tianxi Huang Laboratory of Intelligent Collaborative Computing University of Electronic Science and Technology of ChinaChengdu 611731Chinaand also with Trusted Cloud Computing and Big Data Key Laboratory of Sichuan ProvinceChengdu 611731China School of Computer Science and Engineering University of Electronic Science and Technology of ChinaChengdu 611731China Hangzhou NetEase Cloud Music Technology Co. Ltd.Hangzhou 310052China Department of Fundamental Courses Chengdu Textile CollegeChengdu 611700China
Currently,most existing inductive relation prediction approaches are based on subgraph structures,with subgraph features extracted using graph neural networks to predict ***,subgraphs may contain disconnected regions,... 详细信息
来源: 评论
Analysis and Research on Dynamic Measurements Technology  11th
Analysis and Research on Dynamic Measurements Technology
收藏 引用
11th International Conference on Communications, Signal Processing, and Systems, CSPS 2022
作者: Fu, Yingfang Huang, Haoxiang Zhang, Jianbiao Trusted Native Technology Department of Ant Group Beijing Beijing China Faculty of Information Technology Beijing University of Technology Beijing China Beijing Key Laboratory of Trusted Computing Beijing China
In cloud computing environments characterized by "dynamics", the traditional static measurement to ensure the trust of the platform system is difficult to guarantee the trust of four dimensions in the cloud ... 详细信息
来源: 评论
PowerDetector:Malicious PowerShell Script Family Classification Based on Multi-Modal Semantic Fusion and Deep Learning
收藏 引用
China Communications 2023年 第11期20卷 202-224页
作者: Xiuzhang Yang Guojun Peng Dongni Zhang Yuhang Gao Chenguang Li School of Cyber Science and Engineering Wuhan UniversityWuhan 430072China Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of EducationWuhan 430072China School of Information Guizhou University of Finance and EconomicsGuiyang 550025China
Power Shell has been widely deployed in fileless malware and advanced persistent threat(APT)attacks due to its high stealthiness and live-off-theland ***,existing works mainly focus on deobfuscation and malicious dete... 详细信息
来源: 评论
MMAPS: End-to-End Multi-Grained Multi-Modal Attribute-Aware Product Summarization  30
MMAPS: End-to-End Multi-Grained Multi-Modal Attribute-Aware ...
收藏 引用
Joint 30th International Conference on Computational Linguistics and 14th International Conference on Language Resources and Evaluation, LREC-COLING 2024
作者: Chen, Tao Lin, Ze Li, Hui Ji, Jiayi Zhou, Yiyi Li, Guanbin Ji, Rongrong Key Laboratory of Multimedia Trusted Perception and Efficient Computing Ministry of Education of China Xiamen University China School of Computer Science and Engineering Sun Yat-sen University China
Given the long textual product information and the product image, Multi-modal Product Summarization (MPS) aims to increase customers' desire to purchase by highlighting product characteristics with a short textual... 详细信息
来源: 评论
Attention Mixup: An Accurate Mixup Scheme Based On Interpretable Attention Mechanism for Multi-Label Audio Classification  48
Attention Mixup: An Accurate Mixup Scheme Based On Interpret...
收藏 引用
48th IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2023
作者: Liu, Wuyang Ren, Yanzhen Wang, Jingru Ministry of Education Key Laboratory of Aerospace Information Security and Trusted Computing China Wuhan University School of Cyber Science and Engineering China
Mixup proves to be an efficient data augmentation method on audio classification tasks. Original mixup scheme directly mixes the waveform of two random samples, which not only ignores the temporal distribution of the ... 详细信息
来源: 评论
Adapting Hierarchical Transformer for Scene-Level Sketch-Based Image Retrieval  5
Adapting Hierarchical Transformer for Scene-Level Sketch-Bas...
收藏 引用
5th ACM International Conference on Multimedia in Asia, MMAsia 2023
作者: Yang, Jie Ke, Aihua Cai, Bo Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Wuhan China
Sketch-based image retrieval (SBIR) is an essential application of sketches. Research on object-level SBIR is relatively mature, but the study of more complex scene-level SBIR is still in its early stages. In order to... 详细信息
来源: 评论
How to Construct Public Timeline for RSA-Formed Time-Lock Cryptography  20th
How to Construct Public Timeline for RSA-Formed Time-Lock ...
收藏 引用
20th International Conference on Information Security and Cryptology, Inscrypt 2024
作者: Jin, Huixuan Peng, Cong Fu, Jintao Luo, Min Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Wuhan China Henan Key Laboratory of Network Cryptography Technology Henan Zhengzhou China Inspur Academy of Science and Technology Jinan China
Time-Locked Puzzle (TLP) and timed-release encryption (T-RE) are both time-based locking mechanisms. The former requires the decryptor to perform a predetermined amount of computation, while the latter requires a trus... 详细信息
来源: 评论
Accelerated Diffusion via High-Low Frequency Decomposition for Pan-Sharpening  39
Accelerated Diffusion via High-Low Frequency Decomposition f...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Meng, Ge Huang, Jingjia Tu, Jingyan Wang, Yingying Lin, Yunlong Tu, Xiaotong Huang, Yue Ding, Xinghao Key Laboratory of Multimedia Trusted Perception and Efficient Computing Ministry of Education of China Xiamen University China School of Informatics Xiamen University China Institute of Artificial Intelligence Xiamen University China
Pan-sharpening aims to preserve the spectral information of the multi-spectral (MS) image while leveraging the high-frequency details from the guided high-resolution panchromatic (PAN) image to enhance its spatial res... 详细信息
来源: 评论