咨询与建议

限定检索结果

文献类型

  • 2,809 篇 会议
  • 2,365 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 5,177 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,454 篇 工学
    • 2,599 篇 计算机科学与技术...
    • 2,076 篇 软件工程
    • 923 篇 信息与通信工程
    • 446 篇 电气工程
    • 366 篇 电子科学与技术(可...
    • 358 篇 控制科学与工程
    • 299 篇 生物工程
    • 285 篇 网络空间安全
    • 196 篇 机械工程
    • 152 篇 光学工程
    • 139 篇 仪器科学与技术
    • 125 篇 生物医学工程(可授...
    • 103 篇 动力工程及工程热...
    • 96 篇 化学工程与技术
    • 88 篇 交通运输工程
    • 88 篇 安全科学与工程
    • 82 篇 建筑学
    • 75 篇 土木工程
  • 1,497 篇 理学
    • 904 篇 数学
    • 321 篇 物理学
    • 321 篇 生物学
    • 278 篇 统计学(可授理学、...
    • 132 篇 系统科学
    • 105 篇 化学
  • 893 篇 管理学
    • 533 篇 管理科学与工程(可...
    • 393 篇 图书情报与档案管...
    • 179 篇 工商管理
  • 175 篇 法学
    • 104 篇 社会学
  • 104 篇 医学
    • 86 篇 临床医学
    • 77 篇 基础医学(可授医学...
  • 65 篇 军事学
  • 61 篇 经济学
  • 31 篇 农学
  • 25 篇 教育学
  • 12 篇 文学
  • 8 篇 艺术学

主题

  • 186 篇 feature extracti...
  • 161 篇 semantics
  • 137 篇 accuracy
  • 127 篇 cryptography
  • 117 篇 computational mo...
  • 117 篇 training
  • 103 篇 authentication
  • 103 篇 security
  • 99 篇 federated learni...
  • 96 篇 privacy
  • 94 篇 deep learning
  • 94 篇 information secu...
  • 91 篇 protocols
  • 79 篇 data models
  • 71 篇 cloud computing
  • 68 篇 robustness
  • 65 篇 object detection
  • 65 篇 neural networks
  • 63 篇 machine learning
  • 62 篇 optimization

机构

  • 258 篇 key laboratory o...
  • 207 篇 shandong provinc...
  • 164 篇 state key labora...
  • 160 篇 school of comput...
  • 141 篇 school of comput...
  • 117 篇 school of cyber ...
  • 83 篇 institute of inf...
  • 80 篇 guangdong provin...
  • 74 篇 key laboratory o...
  • 67 篇 key laboratory o...
  • 63 篇 shandong provinc...
  • 54 篇 information secu...
  • 53 篇 peng cheng labor...
  • 52 篇 shandong enginee...
  • 51 篇 school of comput...
  • 50 篇 key laboratory o...
  • 49 篇 shandong fundame...
  • 46 篇 key laboratory o...
  • 44 篇 school of comput...
  • 44 篇 college of compu...

作者

  • 39 篇 cao xiaochun
  • 36 篇 yang yang
  • 36 篇 huang qingming
  • 36 篇 yang xiaoyuan
  • 34 篇 zheng wei-shi
  • 34 篇 zhou deyu
  • 30 篇 xie xiaohua
  • 28 篇 cong runmin
  • 28 篇 jianfeng ma
  • 28 篇 xu an wang
  • 27 篇 xiaoyuan yang
  • 26 篇 xiaoming wu
  • 26 篇 yichuan wang
  • 25 篇 zhang minqing
  • 24 篇 xinhong hei
  • 24 篇 yang jian
  • 23 篇 min-ling zhang
  • 22 篇 ma jianfeng
  • 21 篇 wang wei
  • 21 篇 yang yixian

语言

  • 4,423 篇 英文
  • 634 篇 其他
  • 140 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of computer Network and Information Security of Engineering"
5177 条 记 录,以下是261-270 订阅
排序:
Unmanned Aerial Vehicle Assisted Timely Data Collection in IoT networks with Faulty Sensors  16
Unmanned Aerial Vehicle Assisted Timely Data Collection in I...
收藏 引用
16th International Conference on Wireless Communications and Signal Processing, WCSP 2024
作者: Zhang, Dongliang Gong, Jie School of Computer Science and Engineering Sun Yat-sen University Guangzhou510006 China Guangdong Province Key Laboratory of Information Security Technology Guangzhou510006 China
Thanks to their low deployment costs and high flexibility, unmanned aerial vehicles (UAVs) have been widely applied for data collection in Internet of Things (IoT) networks. However, the unpredictable status updates f... 详细信息
来源: 评论
Fine-Grained Zero-Shot Object Detection via Semantic Decoupling  24
Fine-Grained Zero-Shot Object Detection via Semantic Decoupl...
收藏 引用
8th International Conference on computer Science and Artificial Intelligence, CSAI 2024
作者: Duan, Lijuan Zhang, Zichen Gong, Zhi Beijing Key Laboratory of Trusted Computing Beijing University of Technology Beijing China School of Computer Science Beijing University of Technology Beijing China National Engineering Laboratory for Key Technologies of Information Security Level Protection Beijing China
Recent deep learning models have advanced object detection capabilities, but their reliance on labeled data limits scalability. Fine-grained zero-shot detection remains challenging due to the need to generalize to uns... 详细信息
来源: 评论
Node Importance Recognition Algorithm Based on the Correlation Degree Transmission Contribution Matrix  2
Node Importance Recognition Algorithm Based on the Correlati...
收藏 引用
2022 2nd International Conference on Mechanical Automation and Electronic information engineering, MAEIE 2022
作者: Lin, Shengnan Li, Shuai Su, Yang College of Cryptographic Engineering Engineering University of PAP Xi'an710086 China Key Laboratory of Network and Information Security under the Armed Police Force Xi'an710086 China
Based on the importance identification of nodes in a directed weighted network, a node importance recognition algorithm based on the correlation transmission contribution matrix is proposed. The proposed algorithm com... 详细信息
来源: 评论
Reflectance Recovery Guided Learning of Illumination-Invariant Features for Person Re-Identification  18th
Reflectance Recovery Guided Learning of Illumination-Invari...
收藏 引用
18th Chinese Conference on Biometric Recognition, CCBR 2024
作者: Chen, Xianbiao Xie, Xiaohua School of Computer Science and Engineering Sun Yat-sen University Guangzhou China Guangdong Province Key Laboratory of Information Security Technology Guangzhou China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education Guangzhou China
In real-world scenarios, the changes of illumination are noticeable and can significantly impact the performance of re-identification (ReID) algorithms. However, the existing person ReID methods predominantly concentr... 详细信息
来源: 评论
StarMFND: Star Topology Multi-Domain Fake News Detection  7
StarMFND: Star Topology Multi-Domain Fake News Detection
收藏 引用
7th International Conference on Data Science and information Technology, DSIT 2024
作者: Gu, Pengfei Chen, Yibing Bing, Wanlong Liu, Yahui Ma, Hongliang Wang, Wei Shihezi University School of Information Science and Technology Shihezi China Xinjiang Production and Construction Corps Key Laboratory of Computing Intelligence and Network Information Security Shihezi China Beijing Jiaotong University School of Computer Science and Information Technology Beijing China
The proliferation of the Internet and the emergence of social media platforms have greatly accelerated the speed and scope of information dissemination, while also introducing the peril of fake news propagation, parti... 详细信息
来源: 评论
Image Compression Algorithm Based on Region of Interest Extraction for Unmanned Aerial Vehicles Communication  8
Image Compression Algorithm Based on Region of Interest Extr...
收藏 引用
8th IEEE information Technology and Mechatronics engineering Conference, ITOEC 2025
作者: Liang, Yanxia Jia, Tong Liu, Xin Zhang, Huanhuan Xi'an University of Posts and Telecommunications Shaanxi Key Laboratory of Information Communication Network and Security Xi'an China Xi'an Eurasia University College of Information Engineering Xi'an China
The flexibility and maneuverability of unmanned aerial vehicles (UAVs) have led to their widespread use, but the challenge of limited storage space and bandwidth in emergency scenarios necessitates efficient image com... 详细信息
来源: 评论
Design and implementation of cooperative multi-agent based on MAPPO  5
Design and implementation of cooperative multi-agent based o...
收藏 引用
5th International Conference on Telecommunications, Optics, and computer Science, TOCS 2024
作者: Wang, Haolong Fei, Rong Chen, Ruizhu School of Computer Science and Engineering Xi'an University of Technology Xi'an China Shannxi Key Laboratory for Network Computing and Security Technology Xi'an University of Technology Xi'an China
In the past few years, with the continuous development of deep reinforcement learning, the application of deep reinforcement has been set off within the realms of self-driving vehicle technology, game games, and natur... 详细信息
来源: 评论
Uplink Control information Based Clustered Access and Discontinuous Reception Management for mMTC
收藏 引用
IEEE Communications Letters 2025年 第6期29卷 1380-1384页
作者: Wang, Shao-Di Wang, Chang-Long Wang, Hui-Ming Zhou, Feng Leung, Victor C. M. Xidian University Key Laboratory of Electronic Information Countermeasure and Simulation Technology of Ministry of Education Xi’an710071 China Xi’an Jiaotong University School of Information and Communication Engineering Ministry of Education Key Lab for Intelligent Networks and Network Security Xi’an710049 China Shenzhen MSU BIT University Artificial Intelligence Research Institute Shenzhen518172 China Shenzhen University College of Computer Science and Software Engineering Shenzhen518060 China The University of British Columbia Department of Electrical and Computer Engineering VancouverBCV6T 1Z4 Canada
Uplink control information (UCI) and discontinuous reception (DRX) play important roles for massive machine type communication (mMTC). Despite their standalone significance, a conspicuous gap exists in comprehensively... 详细信息
来源: 评论
GAN-based Symmetric Embedding Costs Adjustment for Enhancing Image Steganographic security  24
GAN-based Symmetric Embedding Costs Adjustment for Enhancing...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Ye, Miaoxin Zhou, Saixing Luo, Weiqi Tan, Shunquan Huang, Jiwu Guangdong Provincial Key Laboratory of Information Security Technology Sun Yat-Sen University Guangzhou China Shenzhen Key Laboratory of Media Security College of Computer Science and Software Engineering Shenzhen University Shenzhen China Guangdong Laboratory of Machine Perception and Intelligent Computing Faculty of Engineering Shenzhen MSU-BIT University Shenzhen China
Designing embedding costs is pivotal in modern image steganography. Many studies have shown adjusting symmetric embedding costs to asymmetric ones can enhance steganographic security. However, most existing methods he... 详细信息
来源: 评论
Distributed acoustic sensing signal event recognition and localization based on improved YOLOv7
Distributed acoustic sensing signal event recognition and lo...
收藏 引用
2023 International Congress on Ultrasonics, ICU Beijing 2023
作者: Zhang, Hongyu Wang, Chang Zhang, Faxiang Jiang, Shaodong Sun, Zhihui Wang, Xiaodong Duan, Zhenhui Gao, Fengxia Liu, Zhaoying Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
The distributed acoustic sensing (DAS) system based on phase-sensitive optical time domain reflection (Φ -OTDR) technology is widely used in pipeline safety monitoring, perimeter security, structure monitoring, etc. ... 详细信息
来源: 评论