咨询与建议

限定检索结果

文献类型

  • 2,836 篇 会议
  • 2,409 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 5,248 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,531 篇 工学
    • 2,657 篇 计算机科学与技术...
    • 2,109 篇 软件工程
    • 959 篇 信息与通信工程
    • 503 篇 电气工程
    • 385 篇 控制科学与工程
    • 384 篇 电子科学与技术(可...
    • 307 篇 网络空间安全
    • 301 篇 生物工程
    • 200 篇 机械工程
    • 161 篇 光学工程
    • 143 篇 仪器科学与技术
    • 126 篇 生物医学工程(可授...
    • 104 篇 动力工程及工程热...
    • 101 篇 交通运输工程
    • 101 篇 安全科学与工程
    • 98 篇 化学工程与技术
    • 83 篇 建筑学
    • 76 篇 土木工程
  • 1,518 篇 理学
    • 913 篇 数学
    • 333 篇 物理学
    • 324 篇 生物学
    • 279 篇 统计学(可授理学、...
    • 132 篇 系统科学
    • 110 篇 化学
  • 916 篇 管理学
    • 552 篇 管理科学与工程(可...
    • 398 篇 图书情报与档案管...
    • 181 篇 工商管理
  • 175 篇 法学
    • 104 篇 社会学
  • 109 篇 医学
    • 90 篇 临床医学
    • 78 篇 基础医学(可授医学...
  • 65 篇 军事学
  • 62 篇 经济学
  • 31 篇 农学
  • 26 篇 教育学
  • 12 篇 文学
  • 8 篇 艺术学

主题

  • 188 篇 feature extracti...
  • 161 篇 semantics
  • 140 篇 accuracy
  • 128 篇 cryptography
  • 117 篇 computational mo...
  • 117 篇 training
  • 105 篇 security
  • 104 篇 authentication
  • 104 篇 federated learni...
  • 98 篇 privacy
  • 96 篇 deep learning
  • 94 篇 information secu...
  • 92 篇 protocols
  • 81 篇 data models
  • 71 篇 cloud computing
  • 70 篇 robustness
  • 66 篇 object detection
  • 66 篇 machine learning
  • 65 篇 neural networks
  • 64 篇 optimization

机构

  • 263 篇 key laboratory o...
  • 207 篇 shandong provinc...
  • 164 篇 state key labora...
  • 162 篇 school of comput...
  • 141 篇 school of comput...
  • 119 篇 school of cyber ...
  • 84 篇 institute of inf...
  • 80 篇 guangdong provin...
  • 74 篇 key laboratory o...
  • 67 篇 shandong provinc...
  • 67 篇 key laboratory o...
  • 53 篇 peng cheng labor...
  • 53 篇 information secu...
  • 52 篇 shandong enginee...
  • 51 篇 school of comput...
  • 51 篇 key laboratory o...
  • 49 篇 shandong fundame...
  • 47 篇 key laboratory o...
  • 44 篇 school of comput...
  • 44 篇 college of compu...

作者

  • 40 篇 cao xiaochun
  • 37 篇 huang qingming
  • 36 篇 yang yang
  • 35 篇 yang xiaoyuan
  • 34 篇 zheng wei-shi
  • 34 篇 zhou deyu
  • 30 篇 xie xiaohua
  • 28 篇 cong runmin
  • 28 篇 jianfeng ma
  • 28 篇 xu an wang
  • 26 篇 xiaoming wu
  • 26 篇 yichuan wang
  • 26 篇 xiaoyuan yang
  • 25 篇 zhang minqing
  • 24 篇 xinhong hei
  • 24 篇 yang jian
  • 23 篇 min-ling zhang
  • 22 篇 ma jianfeng
  • 21 篇 wang wei
  • 21 篇 yang yixian

语言

  • 4,280 篇 英文
  • 844 篇 其他
  • 147 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of computer Network and Information Security of Engineering"
5248 条 记 录,以下是141-150 订阅
排序:
Optimization Strategy for Remote Differential Upgrade of IoT Firmware  11
Optimization Strategy for Remote Differential Upgrade of IoT...
收藏 引用
11th Joint International information Technology and Artificial Intelligence Conference, ITAIC 2023
作者: Ding, Wenkang Sun, Ruirui Meng, Qinglong Wan, Zhong Cheng, Guanghe Hao, Huijuan Bai, Jinqiang Key Laboratory of Computing Power Network and Information Security Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
With the continuous increase of IoT devices, the management and optimization of devices become particularly important. The update cycle of device functions is short, and in order to facilitate management and optimize ... 详细信息
来源: 评论
JTEA: Implementing Semi-Supervised Entity Alignment Using Joint Teaching Strategies
JTEA: Implementing Semi-Supervised Entity Alignment Using Jo...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Lu, Kai Zhao, Jing Ding, Lichao Hao, Zenghao Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan China Faculty of Computer Science and Technology Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
Entity alignment(EA) aims to identify equivalent entities in different knowledge graphs or data sources and establish correspondences between them. In recent years, embedding-based methods have made significant progre... 详细信息
来源: 评论
Privacy-Preserving Multi-keyword Fuzzy Adjacency Search Strategy for Encrypted Graph in Cloud Environment
收藏 引用
computers, Materials & Continua 2024年 第3期78卷 3177-3194页
作者: Bin Wu Xianyi Chen Jinzhou Huang Caicai Zhang Jing Wang Jing Yu Zhiqiang Zhao Zhuolin Mei School of Computer and Big Data Science Jiujiang UniversityJiujiang332005China Jiujiang Key Laboratory of Network and Information Security Jiujiang332005China School of Computer and Software Nanjing University of Information Science&TechnologyNanjing210044China School of Computer Engineering Hubei University of Arts and ScienceXiangyang441053China School of Modern Information Technology Zhejiang Institute of Mechanical and Electrical EngineeringHangzhou310053China Information Center Jiangxi Changjiang Chemical Co.Ltd.Jiujiang332005China School of Mathematics and Computer Science Ningxia Normal UniversityGuyuan756099China
In a cloud environment,outsourced graph data is widely used in companies,enterprises,medical institutions,and so *** owners and users can save costs and improve efficiency by storing large amounts of graph data on clo... 详细信息
来源: 评论
Semantic Relation-Based Cross Attention network for Image-Text Retrieval
Semantic Relation-Based Cross Attention Network for Image-Te...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Zhou, Huanxiao Geng, Yushui Zhao, Jing Ma, Xishan Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan China Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China Jinan China
Image-text retrieval refers to querying the text or image of another modality given an image or text, and its key lies in the ability to accurately measure the similarity between text and image. Most of the existing r...
来源: 评论
Received value flipping based sphere decoding algorithm for polar codes
收藏 引用
Intelligent and Converged networks 2024年 第4期5卷 370-379页
作者: Rui Wang Haiqiang Chen Yan Chen Yuanbo Liu Xiangcheng Li Youming Sun Qingnian Li School of Computer and Electronic Information Guangxi UniversityNanning 530004China Guangxi Key Laboratory of Multimedia Communications and Network Technology Guangxi UniversityNanning 530004China College of Information Engineering Nanning UniversityNanning 530004China
Polar codes are considered as one of the most competitive channel coding schemes for the future wireless communication *** improve the performance of polar codes with short code-length for control channels,a sphere de... 详细信息
来源: 评论
Improving User QoE via Joint Trajectory and Resource Optimization in Multi-UAV Assisted MEC
收藏 引用
IEEE Transactions on Services Computing 2025年 第3期18卷 1472-1486页
作者: Gao, Yang Tao, Jun Xu, Yifan Wang, Zuyan Gao, Yu Wang, Meiling Hainan University School of Cyberspace Security Haikou570228 China Ministry of Education Key Laboratory of Computer Network and Information Integration Southeast University Nanjing211189 China Southeast University School of Cyber Science and Engineering Nanjing211189 China ZTE Communications Co. Ltd Nanjing210012 China
As a promising network architecture, Mobile Edge Computing (MEC), has been proven that can effectively reduce the end-to-end latency and the energy consumption. The Unmanned Aerial Vehicle (UAV) assisted MEC network, ... 详细信息
来源: 评论
Knowledge Distillation Using Global Fusion and Feature Restoration for Industrial Defect Detectors
Knowledge Distillation Using Global Fusion and Feature Resto...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Feng, Zhengqian Yue, Xiyao Li, Wang Zhou, Mingle Han, Delong Li, Gang Shandong Scicom Information and Economy Research Institute CO.. Ltd China Key Laboratory of Computing Power Network and Information Security Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
Deep learning technology has been widely applied in industrial quality inspection tasks to improve the accuracy of defect detection, object recognition, and classification. However, in the task of object detection, bo... 详细信息
来源: 评论
A Semi-supervised Protein Complex Identification Algorithm Based on Sparseness Constraint
A Semi-supervised Protein Complex Identification Algorithm B...
收藏 引用
2024 International Conference on Applied Mathematics, Modelling and Statistics Application, AMMSA 2024
作者: Liu, Guangming Dang, Fengqing Wang, Bin Peng, Yonghong Wang, Xiaofan Tan, Li School of Computer Science and Engineering Shaanxi Key Laboratory for Network Computing and Security Technology Xi'An University of Technology Shaanxi Xi'an China Faculty of Science and Engineering Computing and Information Science Cambridge United Kingdom School of Computer and Information Engineering Beijing Technology and Business University Beijing China
Recognising protein complexes in protein interaction networks is crucial, but poses a major challenge due to the frequency of noisy interactions. These networks typically involve numerous protein complexes, with each ... 详细信息
来源: 评论
Dynamic detection technology of encryption algorithm based on Pin  9
Dynamic detection technology of encryption algorithm based o...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Qu, Junpeng Du, Gaolei Sun, Yunge Fu, Yong Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan250014 China Quan Cheng Laboratory Jinan250103 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
Aiming at the problem that malicious software uses encryption algorithm to hide its own malicious code and avoid detection, a dynamic detection technology based on Pin encryption algorithm is proposed. Use Pin to get ... 详细信息
来源: 评论
Speed Master: Quick or Slow Play to Attack Speaker Recognition  39
Speed Master: Quick or Slow Play to Attack Speaker Recogniti...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Ye, Zhe Zhang, Wenjie Ren, Ying Kang, Xiangui Yan, Diqun Ma, Bin Wang, Shiqi Guangdong Key Lab of Information Security School of Computer Science and Engineering Sun Yat-sen University Guangzhou China Faculty of Electrical Engineering and Computer Science Ningbo University Ningbo China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology Shandong Academy of Sciences Jinan China Department of Computer Science City University of Hong Kong Hong Kong
Backdoor attacks pose a significant threat during the model’s training phase. Attackers craft pre-defined triggers to break deep neural networks, ensuring the model accurately classifies clean samples during inferenc... 详细信息
来源: 评论