咨询与建议

限定检索结果

文献类型

  • 2,809 篇 会议
  • 2,365 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 5,177 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,454 篇 工学
    • 2,599 篇 计算机科学与技术...
    • 2,076 篇 软件工程
    • 923 篇 信息与通信工程
    • 446 篇 电气工程
    • 366 篇 电子科学与技术(可...
    • 358 篇 控制科学与工程
    • 299 篇 生物工程
    • 285 篇 网络空间安全
    • 196 篇 机械工程
    • 152 篇 光学工程
    • 139 篇 仪器科学与技术
    • 125 篇 生物医学工程(可授...
    • 103 篇 动力工程及工程热...
    • 96 篇 化学工程与技术
    • 88 篇 交通运输工程
    • 88 篇 安全科学与工程
    • 82 篇 建筑学
    • 75 篇 土木工程
  • 1,497 篇 理学
    • 904 篇 数学
    • 321 篇 物理学
    • 321 篇 生物学
    • 278 篇 统计学(可授理学、...
    • 132 篇 系统科学
    • 105 篇 化学
  • 893 篇 管理学
    • 533 篇 管理科学与工程(可...
    • 393 篇 图书情报与档案管...
    • 179 篇 工商管理
  • 175 篇 法学
    • 104 篇 社会学
  • 104 篇 医学
    • 86 篇 临床医学
    • 77 篇 基础医学(可授医学...
  • 65 篇 军事学
  • 61 篇 经济学
  • 31 篇 农学
  • 25 篇 教育学
  • 12 篇 文学
  • 8 篇 艺术学

主题

  • 186 篇 feature extracti...
  • 161 篇 semantics
  • 137 篇 accuracy
  • 127 篇 cryptography
  • 117 篇 computational mo...
  • 117 篇 training
  • 103 篇 authentication
  • 103 篇 security
  • 99 篇 federated learni...
  • 96 篇 privacy
  • 94 篇 deep learning
  • 94 篇 information secu...
  • 91 篇 protocols
  • 79 篇 data models
  • 71 篇 cloud computing
  • 68 篇 robustness
  • 65 篇 object detection
  • 65 篇 neural networks
  • 63 篇 machine learning
  • 62 篇 optimization

机构

  • 258 篇 key laboratory o...
  • 207 篇 shandong provinc...
  • 164 篇 state key labora...
  • 160 篇 school of comput...
  • 141 篇 school of comput...
  • 117 篇 school of cyber ...
  • 83 篇 institute of inf...
  • 80 篇 guangdong provin...
  • 74 篇 key laboratory o...
  • 67 篇 key laboratory o...
  • 63 篇 shandong provinc...
  • 54 篇 information secu...
  • 53 篇 peng cheng labor...
  • 52 篇 shandong enginee...
  • 51 篇 school of comput...
  • 50 篇 key laboratory o...
  • 49 篇 shandong fundame...
  • 46 篇 key laboratory o...
  • 44 篇 school of comput...
  • 44 篇 college of compu...

作者

  • 39 篇 cao xiaochun
  • 36 篇 yang yang
  • 36 篇 huang qingming
  • 36 篇 yang xiaoyuan
  • 34 篇 zheng wei-shi
  • 34 篇 zhou deyu
  • 30 篇 xie xiaohua
  • 28 篇 cong runmin
  • 28 篇 jianfeng ma
  • 28 篇 xu an wang
  • 27 篇 xiaoyuan yang
  • 26 篇 xiaoming wu
  • 26 篇 yichuan wang
  • 25 篇 zhang minqing
  • 24 篇 xinhong hei
  • 24 篇 yang jian
  • 23 篇 min-ling zhang
  • 22 篇 ma jianfeng
  • 21 篇 wang wei
  • 21 篇 yang yixian

语言

  • 4,423 篇 英文
  • 634 篇 其他
  • 140 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of computer Network and Information Security of Engineering"
5177 条 记 录,以下是201-210 订阅
排序:
MemADet: A Representative Memory Bank Approach for Industrial Image Anomaly Detection
MemADet: A Representative Memory Bank Approach for Industria...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Li, Min He, Jinghui Ying, Zuobin Li, Gang Zhou, Mingle Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China City University of Macau Faculty of Data Science China
In the field of industrial production, anomaly detection is crucial for ensuring product quality and maintaining production efficiency. With the continuous advancement of computer vision technology, it has shown treme...
来源: 评论
BAV-DSS: Blockchain Assisted Verifiable Data Sharing Scheme with Fast Encryption and Outsourced Decryption for IoT  24th
BAV-DSS: Blockchain Assisted Verifiable Data Sharing Scheme ...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Huang, Yao Yu, Zhongyuan Wang, Guijuan Chai, Baobao Zhang, Hongliang Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan250353 China School of Information Science and Engineering Lanzhou University Lanzhou730000 China School of Computer Science and Engineering Shandong University of Science and Technology Qingdao266590 China
Many sophisticated cloud platforms are available to provide services such as storage and computation for Internet of Things (IoT) applications. However, with the concerns about the semi-trusted nature of cloud platfor... 详细信息
来源: 评论
Non-Deterministic Symmetric Encryption Communication System Based on Generative Adversarial networks
收藏 引用
China Communications 2025年 第5期22卷 273-284页
作者: Wu Xuguang Han Yiliang Zhang Minqing Zhu Shuaishuai Li Yu College of Cryptography Engineering Engineering University of People’s Armed PoliceXi’an 710086China Key Laboratory of Network and Information Security Under the People’s Armed Police Xi’an 710086China
Symmetric encryption algorithms learned by the previous proposed end-to-end adversarial network encryption communication systems are *** the same key and same plaintext,the deterministic algorithm will lead to the sam... 详细信息
来源: 评论
A New HARQ Scheme for 5G Systems via Interleaved Superposition Retransmission
收藏 引用
China Communications 2023年 第4期20卷 1-11页
作者: Qianfan Wang Li Chen Xiao Ma School of Computer Science and Engineering Guangdong Key Laboratory of Information Security TechnologySun Yat-sen UniversityGuangzhou 510006China College of Computer Science Jiaying UniversityMeizhou 514015China School of Electronics and Information Technology Sun Yat-sen UniversityGuangzhou 510006China
Within the framework of the 5G new radio(NR),we propose a new hybrid automatic repeat request(HARQ)scheme to improve the throughput *** difference between the proposed scheme and the conventional one lies in the first... 详细信息
来源: 评论
Improving long-tail classification via decoupling and regularisation
收藏 引用
CAAI Transactions on Intelligence Technology 2025年 第1期10卷 62-71页
作者: Shuzheng Gao Chaozheng Wang Cuiyun Gao Wenjian Luo Peiyi Han Qing Liao Guandong Xu School of Computer Science and Technology Harbin Institute of TechnologyShenzhenChina Peng Cheng Laboratory ShenzhenChina Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies Harbin Institute of TechnologyShenzhenChina Faculty of Engineering and Information Technology University of Technology SydneySydneyNew South WalesAustralia
Real-world data always exhibit an imbalanced and long-tailed distribution,which leads to poor performance for neural network-based *** methods mainly tackle this problem by reweighting the loss function or rebalancing... 详细信息
来源: 评论
Prediction of miRNA family based on class-incremental learning
Prediction of miRNA family based on class-incremental learni...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Liu, Yajun Qiu, Lulu Li, Aimin Fei, Rong Li, Junhuai Wu, Fang-Xiang Xi'an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China Division of Biomedical Engineering Department of Mechanical Engineering Department of Computer Science Saskatoon Canada
With the development of deep sequencing, recent studies indicate that a miRNA precursor can generate multiple miRNA isoforms (isomiRs). The family prediction of canonical miRNAs and isomiRs could provide a basis for m... 详细信息
来源: 评论
SpliceMix: A Cross-scale and Semantic Blending Augmentation Strategy for Multi-label Image Classification
收藏 引用
IEEE Transactions on Multimedia 2025年 27卷 3251-3265页
作者: Wang, Lei Zhan, Yibing Ma, Leilei Tao, Dapeng Ding, Liang Gong, Chen Nanjing University of Science and Technology Key Laboratory of Intelligent Perception and Systems for High-Dimensional Information of Ministry of Education Jiangsu Key Laboratory of Image and Video Understanding for Social Security School of Computer Science and Engineering Jiangsu Nanjing210094 China JD Explore Academy Beijing100000 China Anhui University School of Computer Science and Technology Anhui Heifei230601 China Yunnan University FIST LAB School of Information Science and Engineering Yunnan Kunming650091 China
Recently, Mix-style data augmentation methods (e.g., Mixup and CutMix) have shown promising performance in various visual tasks. However, these methods are primarily designed for single-label images, ignoring the cons... 详细信息
来源: 评论
Pseudorandom number generator based on supersingular elliptic curve isogenies
收藏 引用
Science China(information Sciences) 2022年 第5期65卷 267-269页
作者: Yan HUANG Fangguo ZHANG Zhijie LIU Haibo TIAN School of Electronic and Information Engineering Sun Yat-sen University School of Data and Computer Science Sun Yat-sen University Guangdong Key Laboratory of Information Security
Dear editor,Pseudorandom number generator(PRNG) is very important for the randomness study in some cryptographic algorithms.A PRNG is a deterministic function that takes a uniform random bit string as input and output... 详细信息
来源: 评论
Mobility-Aware Multi-Task Migration and Offloading Scheme for Internet of Vehicles
收藏 引用
Chinese Journal of Electronics 2023年 第6期32卷 1192-1202页
作者: LI Xujie TANG Jing XU Yuan SUN Ying College of Computer and Information Hohai University State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Key Lab for Wireless Sensor Network and Communication Shanghai Institute of Microsystem School of Information Engineering Jiangsu Open University
In Internet of vehicles, vehicular edge computing(VEC) as a new paradigm can effectively accomplish various tasks. Due to limited computing resources of the roadside units(RSUs), computing ability of vehicles can be a... 详细信息
来源: 评论
Image Super-Resolution via Deep Dictionary Learning  1
收藏 引用
12th International Conference on Image and Graphics, ICIG 2023
作者: Huang, Yi Bian, Weixin Jie, Biao Zhu, Zhiqiang Li, Wenhu School of Computer and Information Anhui Normal University Anhui Wuhu241002 China Anhui Provincial Key Laboratory of Network and Information Security Anhui Wuhu241002 China
The method of image super-resolution reconstruction through a dictionary usually only uses a single-layer dictionary, which not only fails to extract the deep features of the image, but also the trained dictionary may... 详细信息
来源: 评论