咨询与建议

限定检索结果

文献类型

  • 2,809 篇 会议
  • 2,358 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 5,170 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,455 篇 工学
    • 2,599 篇 计算机科学与技术...
    • 2,076 篇 软件工程
    • 923 篇 信息与通信工程
    • 446 篇 电气工程
    • 366 篇 电子科学与技术(可...
    • 358 篇 控制科学与工程
    • 299 篇 生物工程
    • 285 篇 网络空间安全
    • 196 篇 机械工程
    • 152 篇 光学工程
    • 139 篇 仪器科学与技术
    • 125 篇 生物医学工程(可授...
    • 103 篇 动力工程及工程热...
    • 96 篇 化学工程与技术
    • 88 篇 交通运输工程
    • 88 篇 安全科学与工程
    • 82 篇 建筑学
    • 75 篇 土木工程
  • 1,497 篇 理学
    • 905 篇 数学
    • 321 篇 物理学
    • 321 篇 生物学
    • 279 篇 统计学(可授理学、...
    • 132 篇 系统科学
    • 105 篇 化学
  • 893 篇 管理学
    • 533 篇 管理科学与工程(可...
    • 393 篇 图书情报与档案管...
    • 179 篇 工商管理
  • 175 篇 法学
    • 104 篇 社会学
  • 104 篇 医学
    • 86 篇 临床医学
    • 77 篇 基础医学(可授医学...
  • 65 篇 军事学
  • 61 篇 经济学
  • 31 篇 农学
  • 25 篇 教育学
  • 12 篇 文学
  • 8 篇 艺术学

主题

  • 188 篇 feature extracti...
  • 161 篇 semantics
  • 139 篇 accuracy
  • 131 篇 cryptography
  • 117 篇 computational mo...
  • 117 篇 training
  • 103 篇 authentication
  • 103 篇 security
  • 99 篇 federated learni...
  • 96 篇 privacy
  • 94 篇 deep learning
  • 94 篇 information secu...
  • 92 篇 protocols
  • 79 篇 data models
  • 72 篇 cloud computing
  • 68 篇 robustness
  • 65 篇 object detection
  • 65 篇 neural networks
  • 63 篇 machine learning
  • 62 篇 optimization

机构

  • 259 篇 key laboratory o...
  • 206 篇 shandong provinc...
  • 161 篇 state key labora...
  • 160 篇 school of comput...
  • 144 篇 school of comput...
  • 118 篇 school of cyber ...
  • 83 篇 institute of inf...
  • 81 篇 guangdong provin...
  • 74 篇 key laboratory o...
  • 67 篇 key laboratory o...
  • 63 篇 shandong provinc...
  • 54 篇 information secu...
  • 53 篇 peng cheng labor...
  • 52 篇 shandong enginee...
  • 51 篇 school of comput...
  • 50 篇 key laboratory o...
  • 48 篇 shandong fundame...
  • 46 篇 key laboratory o...
  • 45 篇 college of compu...
  • 44 篇 school of comput...

作者

  • 39 篇 yang xiaoyuan
  • 38 篇 cao xiaochun
  • 36 篇 yang yang
  • 36 篇 huang qingming
  • 34 篇 zheng wei-shi
  • 34 篇 zhou deyu
  • 33 篇 xie xiaohua
  • 28 篇 cong runmin
  • 28 篇 jianfeng ma
  • 28 篇 yichuan wang
  • 27 篇 xu an wang
  • 27 篇 xiaoyuan yang
  • 26 篇 xiaoming wu
  • 25 篇 zhang minqing
  • 24 篇 xinhong hei
  • 23 篇 min-ling zhang
  • 23 篇 yang jian
  • 23 篇 zhang min-ling
  • 22 篇 ma jianfeng
  • 22 篇 ma xiao

语言

  • 4,416 篇 英文
  • 634 篇 其他
  • 140 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of computer Network and Information Security of Engineering"
5170 条 记 录,以下是121-130 订阅
排序:
DRSC: Dual-Reweighted Siamese Contrastive Learning network for Cross-Domain Rotating Machinery Fault Diagnosis With Multi-Source Domain Imbalanced Data
收藏 引用
IEEE Internet of Things Journal 2025年 第13期12卷 23678-23693页
作者: Bi, Yuanguo Fu, Rao Jiang, Cunyu Zhang, Xiaoling Li, Fengyun Zhao, Liang Han, Guangjie Northeastern University School of Computer Science and Engineering Shenyang110169 China Ministry of Education Engineering Research Center of Security Technology of Complex Network System Shenyang110169 China Shenyang University of Technology Institute of Artificial Intelligence Shenyang110870 China Shenyang Aerospace University School of Computer Science Shenyang110135 China Hohai University Key Laboratory of Maritime Intelligent Network Information Technology Ministry of Education China
To enhance the reliability of rotating machinery, cross-domain fault diagnosis becomes vital for detecting faults under unknown operating conditions. However, multi-source domain imbalanced data present significant ch... 详细信息
来源: 评论
Offloading Mode Hidden for Delay Sensitive Tasks in Edge Computing networks  5
Offloading Mode Hidden for Delay Sensitive Tasks in Edge Com...
收藏 引用
5th International Seminar on Artificial Intelligence, networking and information Technology, AINIT 2024
作者: Zhang, Guowei Du, Jiayuan Qufu Normal University School of Cyber Science and Engineering Qufu China Key Laboratory of Computing Power Network and Information Security Jinan China
Edge computing has been developed to support local services with lower burden to the core network. However, privacy issues deteriorate when terminal users enjoy the high-quality services with the price of sending thei... 详细信息
来源: 评论
Review of Static Image Compression Algorithms  7
Review of Static Image Compression Algorithms
收藏 引用
7th IEEE Advanced information Technology, Electronic and Automation Control Conference, IAEAC 2024
作者: Liang, Yanxia Jia, Tong Li, Na Liu, Xin Jiang, Jing Lu, Guangyue Zhao, Meng Xi'an University of Posts and Telecommunications Shaanxi Key Laboratory of Information Communication Network and Security Xi'an China Xi'an Eurasia University College of Information Engineering Xi'an China
With the increasing development of digital image communication technology, the requirements for image quality, such as texture details, color levels, and dynamic range, are gradually increasing. This presents unpreced... 详细信息
来源: 评论
Spatio-temporal Constrained Geomagnetic Indoor Localization with Arbitrary Walking Speed
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 21740-21756页
作者: Liu, Ning Peng, Gezhi Ling, Hua-Bao Niu, Qun He, Tao Sun Yat-sen University Guangdong Key Laboratory of Information Security Technology School of Computer Science and Engineering Guangzhou510006 China Sun Yat-sen University School of Artificial Intelligence Zhuhai519000 China
This paper focuses on the accuracy and practicality of geomagnetic-based indoor localization in large-scale real-world sites. Previous studies often use continuous geomagnetic sequences for better discriminability but... 详细信息
来源: 评论
Defending Against Poisoning Attacks in Federated Prototype Learning on Non-IID Data  18th
Defending Against Poisoning Attacks in Federated Prototype ...
收藏 引用
18th International Conference on Wireless Artificial Intelligent Computing Systems and Applications, WASA 2024
作者: Zhang, Jie Zhang, Hongliang Wang, Guijuan Dong, Anming Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan250353 China
Federated learning (FL) is an emerging distributed machine learning paradigm that enables participants to cooperatively train learning tasks without revealing the raw data. However, the distributed nature of FL makes ... 详细信息
来源: 评论
An Efficient and Provably Secure SM2 key-Insulated Signature Scheme for Industrial Internet of Things
收藏 引用
computer Modeling in engineering & Sciences 2024年 第1期138卷 903-915页
作者: Senshan Ouyang Xiang Liu Lei Liu Shangchao Wang Baichuan Shao Yang Zhao School of Mechanical Engineering Northwestern Polytechnical UniversityXi’anChina Department of Process and Information Technology Chengdu Aircraft Industrial(Group)Co.Ltd.ChengduChina School of Information and Software Engineering The Network and Data Security Key Laboratory of Sichuan ProvinceUniversity of Electronic Science and Technology of ChinaChengduChina
With the continuous expansion of the Industrial Internet of Things(IIoT),more andmore organisations are placing large amounts of data in the cloud to reduce ***,the channel between cloud servers and smart equipment is... 详细信息
来源: 评论
A Technique for Ensured Cross Chain IBC Transactions Using TPM  2
A Technique for Ensured Cross Chain IBC Transactions Using T...
收藏 引用
2nd International Conference on Big Data and Privacy Computing, BDPC 2024
作者: Wang, YiChuan Yan, YiLiang Liu, XiaoXue Gao, Wen Wang, ZiYan School of Computer Science and Engineering Xi'an University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China
Cross chain contact across several blockchains becomes increasingly significant in importance with the increased use of blockchain technology. However, security cannot be assured when producing equivalent outputs thro... 详细信息
来源: 评论
AR-CNN: an attention ranking network for learning urban perception
收藏 引用
Science China(information Sciences) 2022年 第1期65卷 164-174页
作者: Zhetao LI Ziwen CHEN Wei-Shi ZHENG Sangyoon OH Kien NGUYEN Key Laboratory of Hunan Province for Internet of Things and Information Security Xiangtan University Key Laboratory of Intelligent Computing & Information Processing of Ministry of Education Xiangtan University School of Data and Computer Science Sun Yat-sen University Department of Computer and Information Engineering Ajou University Graduate School of Engineering Chiba University
An increasing number of deep learning methods is being applied to quantify the perception of urban environments, study the relationship between urban appearance and resident safety, and improve urban appearance. Most ... 详细信息
来源: 评论
A New Model for network security Situation Assessment of the Industrial Internet
收藏 引用
computers, Materials & Continua 2023年 第5期75卷 2527-2555页
作者: Ming Cheng Shiming Li Yuhe Wang Guohui Zhou Peng Han Yan Zhao College of Computer Science and Information Engineering Harbin Normal UniversityHarbin150025China School of Information Technology Luoyang Normal UniversityLuoyang471934China Shanghai Key Laboratory of Integrated Administration Technologies for Information Security Shanghai200240China
To address the problem of network security situation assessment in the Industrial Internet,this paper adopts the evidential reasoning(ER)algorithm and belief rule base(BRB)method to establish an assessment ***,this pa... 详细信息
来源: 评论
Internet of Things Intrusion Detection System Based on Convolutional Neural network
收藏 引用
computers, Materials & Continua 2023年 第4期75卷 2119-2135页
作者: Jie Yin Yuxuan Shi Wen Deng Chang Yin Tiannan Wang Yuchen Song Tianyao Li Yicheng Li Department of Computer Information and Cyber Security Jiangsu Police InstituteNanjingChina Engineering Research Center of Electronic Data Forensics Analysis NanjingChina Key Laboratory of Digital Forensics Department of Public Security of Jiangsu ProvinceNanjingChina
In recent years, the Internet of Things (IoT) technology has developedby leaps and bounds. However, the large and heterogeneous networkstructure of IoT brings high management costs. In particular, the low costof IoT d... 详细信息
来源: 评论