咨询与建议

限定检索结果

文献类型

  • 606 篇 会议
  • 179 篇 期刊文献

馆藏范围

  • 785 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 345 篇 工学
    • 272 篇 计算机科学与技术...
    • 230 篇 软件工程
    • 82 篇 信息与通信工程
    • 72 篇 电气工程
    • 42 篇 控制科学与工程
    • 27 篇 电子科学与技术(可...
    • 26 篇 生物工程
    • 26 篇 网络空间安全
    • 23 篇 机械工程
    • 20 篇 光学工程
    • 19 篇 交通运输工程
    • 17 篇 安全科学与工程
    • 15 篇 生物医学工程(可授...
    • 12 篇 化学工程与技术
    • 11 篇 仪器科学与技术
    • 9 篇 土木工程
    • 8 篇 建筑学
  • 159 篇 理学
    • 97 篇 数学
    • 39 篇 物理学
    • 27 篇 统计学(可授理学、...
    • 25 篇 生物学
    • 10 篇 化学
    • 10 篇 系统科学
  • 81 篇 管理学
    • 50 篇 管理科学与工程(可...
    • 45 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 25 篇 法学
    • 15 篇 社会学
    • 12 篇 法学
  • 13 篇 医学
    • 12 篇 临床医学
    • 9 篇 基础医学(可授医学...
  • 5 篇 教育学
  • 4 篇 经济学
  • 4 篇 军事学
  • 2 篇 农学
  • 1 篇 文学

主题

  • 99 篇 feature extracti...
  • 93 篇 accuracy
  • 61 篇 federated learni...
  • 59 篇 computational mo...
  • 58 篇 semantics
  • 50 篇 data models
  • 44 篇 training
  • 35 篇 transformers
  • 33 篇 neural networks
  • 30 篇 deep learning
  • 30 篇 adaptation model...
  • 28 篇 robustness
  • 24 篇 privacy
  • 23 篇 data mining
  • 23 篇 predictive model...
  • 23 篇 attention mechan...
  • 21 篇 optimization
  • 21 篇 visualization
  • 21 篇 measurement
  • 20 篇 real-time system...

机构

  • 265 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 56 篇 shandong provinc...
  • 51 篇 shandong enginee...
  • 43 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 37 篇 school of comput...
  • 36 篇 shandong fundame...
  • 32 篇 shandong provinc...
  • 32 篇 shaanxi key labo...
  • 27 篇 qilu university ...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 faculty of data ...
  • 14 篇 tianjin key labo...
  • 14 篇 qilu university ...
  • 13 篇 key laboratory o...
  • 13 篇 key laboratory o...
  • 11 篇 xi'an university...

作者

  • 29 篇 yichuan wang
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 24 篇 wang yichuan
  • 19 篇 hei xinhong
  • 18 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 14 篇 li wei
  • 14 篇 aimin li
  • 13 篇 guohua lv
  • 13 篇 lianhai wang
  • 13 篇 xiaohui han
  • 13 篇 mingle zhou
  • 13 篇 jin haiyan
  • 12 篇 lu wenpeng
  • 12 篇 jing zhao
  • 12 篇 delong han
  • 12 篇 chunxiao wang
  • 12 篇 zhenyu yang
  • 12 篇 lei zhu

语言

  • 676 篇 英文
  • 107 篇 其他
  • 8 篇 中文
检索条件"机构=Laboratory for Network Computing and Security Technology"
785 条 记 录,以下是191-200 订阅
排序:
SMGC-SBERT: A Multi-Feature Fusion Chinese Short Text Similarity Computation Model Based on Optimised SBERT
SMGC-SBERT: A Multi-Feature Fusion Chinese Short Text Simila...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Zhao, Shuo Gu, Qiliang Zhang, Jianqiang Song, Gongpeng Lu, Qin Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Shandong Branch of China Mobile Communication Group Design Institute Co. Jinan China
Chinese short text similarity computation stands as a pivotal task within natural language processing, garnering significant attention. However, existing models grapple with limitations in handling intricate semantic ... 详细信息
来源: 评论
Cetus: an efficient symmetric searchable encryption against file-injection attack with SGX
收藏 引用
Science China(Information Sciences) 2021年 第8期64卷 195-212页
作者: Yanyu HUANG Siyi LV Zheli LIU Xiangfu SONG Jin LI Yali YUAN Changyu Dong College of Cyber Science and the College of Computer Science Tianjin Key Laboratory of Network and Data Security TechnologyNankai University School of Computer Science and Technology Shandong University School of Computer Science Guangzhou University Department of Computer Science University of G?ttingen School of Computing Newcastle University
Symmetric searchable encryption(SSE) allows the users to store and query their private data in the encrypted database. Many SSE schemes for different scenarios have been proposed in the past few years, however, most o... 详细信息
来源: 评论
Petri Net Model of MITM Attack Based on NDP Protocol
Petri Net Model of MITM Attack Based on NDP Protocol
收藏 引用
2022 International Conference on networking and network Applications, NaNA 2022
作者: Zhang, Liumei Han, Yu Wang, Yichuan Quan, Ruiqin School of Computer Science Xi’an Shiyou University Xi’an China School of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China Xinjiang Institute of Engineering China
Neighbor Discovery Protocol (NDP) is one of the core protocols of IPv6 networks. Since NDP messages are an unauthenticated stateless protocol, they are vulnerable to various types of attacks, and Man-In-The-Middle (MI... 详细信息
来源: 评论
DetecVFuzz: Enhancing security in Consumer Electronic Devices Through Scalable Vulnerability Testing of Virtual Devices
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Xiao, Xi Guo, Yongjian Jolfaei, Alireza Chen, Chuan Haghighi, Mohammad Sayad Wen, Sheng Lin, Yuanyi Tsinghua University Shenzhen International Graduate School Shenzhen China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education China Peng Cheng Laboratory Guangdong Shenzhen China Flinders University College of Science and Engineering SA5042 Australia Shandong Computer Science Center Key Laboratory of Computing Power Network and Information Security Ministry of Education China Qilu University of Technology Shandong Academy of Sciences National Supercomputer Center in Jinan Jinan China Swinburne University of Technology School of Science Computing and Engineering Technologies MelbourneVIC3122 Australia
The interconnection facilitated by consumer electronics has led to the creation of a complex network of devices. Testing efficiency of such consumer electronic devices can be improved through hardware emulation. QEMU ... 详细信息
来源: 评论
LGDB-Net: Dual-Branch Path for Building Extraction from Remote Sensing Image  30
LGDB-Net: Dual-Branch Path for Building Extraction from Remo...
收藏 引用
30th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2024
作者: Zhang, Ronghuan Zhao, Jing Li, Ming Zou, Qingzhi Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China Shandong University of Traditional Chinese Medicine School of Intelligence and Information Engineering Jinan China
Extracting buildings from remote sensing images using deep learning techniques is a widely applied and crucial task. Convolutional Neural networks (CNNs) adopt hierarchical feature representation, showcasing powerful ... 详细信息
来源: 评论
Apple Leaf Disease Detection Based on Yolov7 with Parameter-Free Attention Mechanism
SSRN
收藏 引用
SSRN 2023年
作者: Zhao, Minghua Han, Siqi Du, Shuangli Hu, Jing Lv, Zhiyong Wang, Lin Li, Peng School of Computer Science and Engineering Xi’an University of Technology Xi’an710048 China Shaanxi Key Laboratory of Network Computing and Security Technology Xi’an710048 China
China is an argicultural country, and apples are one of the most prominentfruits with high production volume. Apple leaf diseases are the major factors that affect both the quantity and quality of apple production. Usu... 详细信息
来源: 评论
Research on long and short-term social recommendation based on convolutional and gated recurrent units  29
Research on long and short-term social recommendation based ...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Jia, Zihe Xue, Peng Dai, Zhiqiang Gao, Qian Zhang, Xiaomeng Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250014 China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan250014 China
The development of the Internet has made people more closely related and has put forward higher requirements for recommendation models. Most recommendation models are studied only for the long-term interests of users.... 详细信息
来源: 评论
Augmentation-aware self-supervision for data-efficient GAN training  23
Augmentation-aware self-supervision for data-efficient GAN t...
收藏 引用
Proceedings of the 37th International Conference on Neural Information Processing Systems
作者: Liang Hou Qi Cao Yige Yuan Songtao Zhao Chongyang Ma Siyuan Pan Pengfei Wan Zhongyuan Wang Huawei Shen Xueqi Cheng CAS Key Laboratory of AI Safety and Security Institute of Computing Technology Chinese Academy of Sciences and University of Chinese Academy of Sciences and Kuaishou Technology CAS Key Laboratory of AI Safety and Security Institute of Computing Technology Chinese Academy of Sciences CAS Key Laboratory of AI Safety and Security Institute of Computing Technology Chinese Academy of Sciences and University of Chinese Academy of Sciences Kuaishou Technology CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences and University of Chinese Academy of Sciences
Training generative adversarial networks (GANs) with limited data is challenging because the discriminator is prone to overfitting. Previously proposed differentiable augmentation demonstrates improved data efficiency...
来源: 评论
A Trusted Privacy-Preserving Model for Cross-Chain Transactions Based on zk_SNARKs
A Trusted Privacy-Preserving Model for Cross-Chain Transacti...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Yichuan Wang Jianhuan Tie Xinhong Hei Li Zhao Xiaohui Zhang School of Computer Science and Engineering Xi'an University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technolog Xi'an China
Currently, the privacy protection technology of blockchain is not mature enough, such as user data leakage and lack of anonymity exist, and these problems are especially serious when conducting cross-chain transaction...
来源: 评论
Malicious Client Detection with Differential Privacy Constraints Based on Model Update Slicing and K-Means Clustering
Malicious Client Detection with Differential Privacy Constra...
收藏 引用
Frontiers technology of Information and Computer (ICFTIC), IEEE International Conference on
作者: Mengshi Qi Xin Wang Yunpeng He Ming Yang Xiaoming Wu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
Federated learning (FL) is a decentralized machine learning technique that protects data privacy by trainng models locally on devices and sharing only model updates instead of raw data. However, FL also faces multiple... 详细信息
来源: 评论