咨询与建议

限定检索结果

文献类型

  • 2,836 篇 会议
  • 2,409 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 5,248 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,531 篇 工学
    • 2,657 篇 计算机科学与技术...
    • 2,109 篇 软件工程
    • 959 篇 信息与通信工程
    • 503 篇 电气工程
    • 385 篇 控制科学与工程
    • 384 篇 电子科学与技术(可...
    • 307 篇 网络空间安全
    • 301 篇 生物工程
    • 200 篇 机械工程
    • 161 篇 光学工程
    • 143 篇 仪器科学与技术
    • 126 篇 生物医学工程(可授...
    • 104 篇 动力工程及工程热...
    • 101 篇 交通运输工程
    • 101 篇 安全科学与工程
    • 98 篇 化学工程与技术
    • 83 篇 建筑学
    • 76 篇 土木工程
  • 1,518 篇 理学
    • 913 篇 数学
    • 333 篇 物理学
    • 324 篇 生物学
    • 279 篇 统计学(可授理学、...
    • 132 篇 系统科学
    • 110 篇 化学
  • 916 篇 管理学
    • 552 篇 管理科学与工程(可...
    • 398 篇 图书情报与档案管...
    • 181 篇 工商管理
  • 175 篇 法学
    • 104 篇 社会学
  • 109 篇 医学
    • 90 篇 临床医学
    • 78 篇 基础医学(可授医学...
  • 65 篇 军事学
  • 62 篇 经济学
  • 31 篇 农学
  • 26 篇 教育学
  • 12 篇 文学
  • 8 篇 艺术学

主题

  • 188 篇 feature extracti...
  • 161 篇 semantics
  • 140 篇 accuracy
  • 128 篇 cryptography
  • 117 篇 computational mo...
  • 117 篇 training
  • 105 篇 security
  • 104 篇 authentication
  • 104 篇 federated learni...
  • 98 篇 privacy
  • 96 篇 deep learning
  • 94 篇 information secu...
  • 92 篇 protocols
  • 81 篇 data models
  • 71 篇 cloud computing
  • 70 篇 robustness
  • 66 篇 object detection
  • 66 篇 machine learning
  • 65 篇 neural networks
  • 64 篇 optimization

机构

  • 263 篇 key laboratory o...
  • 207 篇 shandong provinc...
  • 164 篇 state key labora...
  • 162 篇 school of comput...
  • 141 篇 school of comput...
  • 119 篇 school of cyber ...
  • 84 篇 institute of inf...
  • 80 篇 guangdong provin...
  • 74 篇 key laboratory o...
  • 67 篇 shandong provinc...
  • 67 篇 key laboratory o...
  • 53 篇 peng cheng labor...
  • 53 篇 information secu...
  • 52 篇 shandong enginee...
  • 51 篇 school of comput...
  • 51 篇 key laboratory o...
  • 49 篇 shandong fundame...
  • 47 篇 key laboratory o...
  • 44 篇 school of comput...
  • 44 篇 college of compu...

作者

  • 40 篇 cao xiaochun
  • 37 篇 huang qingming
  • 36 篇 yang yang
  • 35 篇 yang xiaoyuan
  • 34 篇 zheng wei-shi
  • 34 篇 zhou deyu
  • 30 篇 xie xiaohua
  • 28 篇 cong runmin
  • 28 篇 jianfeng ma
  • 28 篇 xu an wang
  • 26 篇 xiaoming wu
  • 26 篇 yichuan wang
  • 26 篇 xiaoyuan yang
  • 25 篇 zhang minqing
  • 24 篇 xinhong hei
  • 24 篇 yang jian
  • 23 篇 min-ling zhang
  • 22 篇 ma jianfeng
  • 21 篇 wang wei
  • 21 篇 yang yixian

语言

  • 4,280 篇 英文
  • 844 篇 其他
  • 147 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of computer Network and Information Security of Engineering"
5248 条 记 录,以下是371-380 订阅
排序:
An Adaptive Heterogeneous Credit Card Fraud Detection Model Based on Deep Reinforcement Training Subset Selection
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第8期5卷 4026-4041页
作者: Zhu, Kun Zhang, Nana Ding, Weiping Jiang, Changjun the Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai201804 China Collaborative Innovation Center for Financial Network Security Tongji University Shanghai201804 China the School of Computer Science and Technology Donghua University Shanghai201620 China the School of Information Science and Technology Nantong University Nantong226019 China
Heterogeneous fraud detection is an important means of credit card security assurance, which can utilize historical transaction records in a source and target domain to build an effective fraud detection model. Nevert... 详细信息
来源: 评论
Research on the Application of Digital Signature in University Electronic Government System  6
Research on the Application of Digital Signature in Universi...
收藏 引用
6th International Conference on computer network, Electronic and Automation, ICCNEA 2023
作者: Wang, Tianma Zhao, Dongmei Qi, Jianjun North China Electric Power University International Education Institute Beijing China Hebei Normal University College of Computer and Cyber Security Shijiazhuang China Key Laboratory of Network and Information Security in Hebei Province Shijiazhuang China
This article analyzes the principles and processes of digital signature technology, as well as its application methods in the university e-government system. On the one hand, it meets the business management needs of ... 详细信息
来源: 评论
Elevating Predictions: Sculpting Flight Delay Predictions with Recursive Feature Elimination  5
Elevating Predictions: Sculpting Flight Delay Predictions wi...
收藏 引用
5th International Conference on computers and Artificial Intelligence Technology, CAIT 2024
作者: Wei, Wei Yu, Chenchen Yang, Zhao Bo, Fu Xi'an University Of Technology School of Computer Science and Engineering Shaanxi Key Laboratory for Network Computing and Security Xi'an China Xi'an University Of Technology School of Computer Science and Engineering Xi'an China
With the rapid development of the aviation industry and the significant growth of aviation data, how to use big data technology to accurately predict flight delays has become a problem that needs to be solved in the c... 详细信息
来源: 评论
LASS: A Novel and Economical Data Augmentation Framework Based on Language Models for Debiasing Opinion Summarization  31
LASS: A Novel and Economical Data Augmentation Framework Bas...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Zhang, Yanyue Li, Pengfei Lai, Yilong He, Yulan Zhou, Deyu School of Computer Science and Engineering Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University China Department of Informatics King's College London United Kingdom The Alan Turing Institute United Kingdom
As more than 70% of reviews in the existing opinion summary data set are positive, current opinion summarization approaches are hesitant to generate negative summaries given the input of negative texts. To address suc... 详细信息
来源: 评论
A Competition-Based Clustering Algorithm in Ultra-Dense network  11
A Competition-Based Clustering Algorithm in Ultra-Dense Netw...
收藏 引用
2023 IEEE 11th International Conference on information, Communication and networks, ICICN 2023
作者: Liang, Yanxia Zhao, Zhiheng Liu, Xin Zhao, Meng Zhao, Songlin Xi'An University of Posts and Telecommunications Dept. Shaanxi Key Laboratory of Information Communication Network and Security Xi'an China Xi'An Eurasia University Dept. School of Information Engineering Xi'an China
Ultra-dense network (UDN) is the key technology to meet the future trend of network densification. In order to solve the serious interference problem between users in UDN, a competition-based clustering algorithm is p... 详细信息
来源: 评论
Hybrid Digital-Analog Semantic Communications
收藏 引用
IEEE Journal on Selected Areas in Communications 2025年 第7期43卷 2478-2492页
作者: Xie, Huiqiang Qin, Zhijin Han, Zhu Letaief, Khaled B. Jinan University College of Information Science and Technology Guangzhou China Tsinghua University Department of Electronic Engineering Beijing100084 China State Key Laboratory of Space Network and Communications Beijing100084 China Beijing National Research Center for Information Science and Technology Beijing100084 China University of Houston Department of Electrical and Computer Engineering Houston United States The Hong Kong University of Science and Technology Department of Electronic and Computer Engineering Hong Kong Hong Kong
Digital and analog semantic communications (SemCom) face inherent limitations such as data security concerns in analog SemCom, as well as leveling-off and cliff-edge effects in digital SemCom. In order to overcome the... 详细信息
来源: 评论
Causal Prompting: Debiasing Large Language Model Prompting Based on Front-Door Adjustment  39
Causal Prompting: Debiasing Large Language Model Prompting B...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Zhang, Congzhi Zhang, Linhai Wu, Jialong He, Yulan Zhou, Deyu School of Computer Science and Engineering Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University China Department of Informatics King’s College London United Kingdom The Alan Turing Institute United Kingdom
Despite the notable advancements of existing prompting methods, such as In-Context Learning and Chain-of-Thought for Large Language Models (LLMs), they still face challenges related to various biases. Traditional debi... 详细信息
来源: 评论
iGrasp: An Interactive 2D-3D Framework for 6-DoF Grasp Detection  27th
iGrasp: An Interactive 2D-3D Framework for 6-DoF Grasp Detec...
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Jiang, Jian-Jian Wu, Xiao-Ming Chen, Zibo Wei, Yi-Lin Zheng, Wei-Shi School of Computer Science and Engineering Sun Yat-sen University Guangzhou China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education Guangzhou China Guangdong Province Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou China
For 6-DoF grasp detection, we aim at introducing a new interactive 2D-3D framework which filters out irrelevant information and makes both modalities collaborate effectively to generate robust grasps and accelerate in... 详细信息
来源: 评论
NI-GDBA: Non-Intrusive Distributed Backdoor Attack Based on Adaptive Perturbation on Federated Graph Learning  25
NI-GDBA: Non-Intrusive Distributed Backdoor Attack Based on ...
收藏 引用
34th ACM Web Conference, WWW 2025
作者: Li, Ken Shi, Bin Wei, Jiazhe Dong, Bo School of Computer Science and Technology Xi’an Jiaotong University Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi’an China School of Computer Science and Technology Xi’an Jiaotong University Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Xi’an China School of Distance Education Xi’an Jiaotong University Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Xi’an China
Federated Graph Learning (FedGL) is an emerging Federated Learning (FL) framework that learns the graph data from various clients to train better Graph Neural networks(GNNs) model. Owing to concerns regarding the secu... 详细信息
来源: 评论
Cross-Layer-Optimized Link Selection for Hologram Video Streaming Over Millimeter Wave networks
Cross-Layer-Optimized Link Selection for Hologram Video Stre...
收藏 引用
2025 IEEE Wireless Communications and networking Conference, WCNC 2025
作者: Jiang, Yiming Liu, Yanwei Liu, Jinxia Argyriou, Antonios Chen, Yifei Zhang, Wen Institute of Information Engineering Chinese Academy of Sciences State Key Laboratory of Cyberspace Security Defense Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Zhejiang Wanli University Ningbo China University of Thessaly Department of Electrical and Computer Engineering Greece
Holographic-type communication brings an immersive tele-holography experience by delivering holographic contents to users. As the direct representation of holographic contents, hologram videos are naturally three-dime... 详细信息
来源: 评论