咨询与建议

限定检索结果

文献类型

  • 456 篇 会议
  • 179 篇 期刊文献

馆藏范围

  • 635 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 310 篇 工学
    • 241 篇 计算机科学与技术...
    • 182 篇 软件工程
    • 73 篇 信息与通信工程
    • 72 篇 电气工程
    • 45 篇 控制科学与工程
    • 42 篇 网络空间安全
    • 27 篇 电子科学与技术(可...
    • 17 篇 交通运输工程
    • 17 篇 安全科学与工程
    • 15 篇 机械工程
    • 12 篇 光学工程
    • 12 篇 生物工程
    • 7 篇 仪器科学与技术
    • 7 篇 建筑学
    • 6 篇 生物医学工程(可授...
    • 5 篇 材料科学与工程(可...
    • 5 篇 土木工程
  • 97 篇 理学
    • 68 篇 数学
    • 18 篇 统计学(可授理学、...
    • 17 篇 物理学
    • 12 篇 生物学
    • 9 篇 系统科学
    • 5 篇 化学
  • 72 篇 管理学
    • 48 篇 管理科学与工程(可...
    • 37 篇 图书情报与档案管...
    • 10 篇 工商管理
  • 17 篇 法学
    • 10 篇 社会学
    • 8 篇 法学
  • 7 篇 医学
    • 7 篇 临床医学
    • 6 篇 基础医学(可授医学...
  • 4 篇 经济学
  • 2 篇 军事学

主题

  • 72 篇 feature extracti...
  • 65 篇 accuracy
  • 46 篇 semantics
  • 39 篇 computational mo...
  • 38 篇 federated learni...
  • 35 篇 data models
  • 33 篇 training
  • 24 篇 neural networks
  • 24 篇 privacy
  • 23 篇 transformers
  • 23 篇 information secu...
  • 22 篇 deep learning
  • 20 篇 security
  • 20 篇 cryptography
  • 20 篇 adaptation model...
  • 19 篇 visualization
  • 18 篇 data mining
  • 18 篇 protocols
  • 18 篇 robustness
  • 18 篇 attention mechan...

机构

  • 230 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 45 篇 shandong fundame...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 27 篇 shandong provinc...
  • 20 篇 key laboratory o...
  • 16 篇 qilu university ...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 shandong fundame...
  • 14 篇 key laboratory o...
  • 13 篇 key laboratory o...
  • 12 篇 key laboratory o...
  • 11 篇 faculty of data ...
  • 10 篇 shandong enginee...
  • 10 篇 shandong fundame...
  • 9 篇 key laboratory o...

作者

  • 19 篇 xiaoming wu
  • 15 篇 xiangzhi liu
  • 13 篇 lu wenpeng
  • 13 篇 guohua lv
  • 13 篇 mingle zhou
  • 12 篇 delong han
  • 12 篇 wang changwei
  • 12 篇 wenpeng lu
  • 11 篇 jing zhao
  • 11 篇 xiaohui han
  • 11 篇 wei zhang
  • 10 篇 xu rongtao
  • 9 篇 guixin zhao
  • 9 篇 wenbo zuo
  • 9 篇 lianhai wang
  • 9 篇 jianfeng ma
  • 9 篇 gang li
  • 9 篇 wang kun
  • 9 篇 min li
  • 9 篇 chunxiao wang

语言

  • 567 篇 英文
  • 57 篇 其他
  • 12 篇 中文
检索条件"机构=Ministry of Edu. Key Laboratory of Computer Network and Information Security"
635 条 记 录,以下是1-10 订阅
排序:
Fusion of Time-Frequency Features in Contrastive Learning for Shipboard Wind Speed Correction
收藏 引用
Journal of Ocean University of China 2025年 第2期24卷 377-386页
作者: SONG Jian HUANG Meng LI Xiang ZHANG Zhenqiang WANG Chunxiao ZHAO Zhigang Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science Center(National Supercomputer Center in Jinan)Qilu University of Technology(Shandong Academy of Sciences)Jinan 250000China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer ScienceJinan 250000China
Accurate wind speed measurements on maritime vessels are crucial for weather forecasting,sea state prediction,and safe ***,vessel motion and challenging environmental conditions often affect measurement *** address th... 详细信息
来源: 评论
Cross-chain Transaction Tracking Protocol based on Multi-dimensional Digital Watermarking Fingerprints  6
Cross-chain Transaction Tracking Protocol based on Multi-dim...
收藏 引用
6th International Conference on Frontier Technologies of information and computer, ICFTIC 2024
作者: Li, Duanzhen Xu, Shujiang He, Haochen Xue, Hongrui Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan250014 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250014 China
Cross-chain technology plays a critical role in the process of interconnecting blockchains. However, all attention has been focused on how to achieve efficient cross-chain interoperability protocols, thus neglecting t... 详细信息
来源: 评论
The Study of Multi-type Computing Power Trading Mechanism in Computing Power network Based on Blockchain and Combinatorial Double Auction  24
The Study of Multi-type Computing Power Trading Mechanism in...
收藏 引用
4th International Conference on Artificial Intelligence, Big Data and Algorithms, CAIBDA 2024
作者: Zhao, Yue Wang, Jizhi Kong, Lingrui Sui, Tongtong Shandong Computer Science Center National Supercomputer Center in Jinan Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Provincial Key Laboratory of Industrial Network and Information System Security Qilu University of Technology Shandong Academy of Sciences Jinan Shandong China Quancheng Laboratory Jinan Key Laboratory of Digital Security Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan Shandong China
The advancement of 5G and mobile internet technologies has propelled the development of emerging businesses and applications, demanding higher requirements for network bandwidth and computational resources. To address... 详细信息
来源: 评论
BTP-CAResNet: An Encrypted Traffic Classification Method Based on Byte Transfer Probability and Coordinate Attention Mechanism
BTP-CAResNet: An Encrypted Traffic Classification Method Bas...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Li, Junhao Shi, Huiling Zhang, Wei Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
With the extensive application of network traffic encryption technology, the accurate and efficient classification of encrypted traffic has become a critical need for network management. Deep learning has become the p... 详细信息
来源: 评论
CB-YOLO: A Small Object Detection Algorithm for Industrial Scenarios
CB-YOLO: A Small Object Detection Algorithm for Industrial S...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Chen, Hao Wu, Xiaoming Su, Zhanzhi Zhao, Ying Dong, Yunfeng Liu, Xiangzhi Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
In certain specific industrial scenarios, smoking and cellphone usage are strictly prohibited behaviors. In these scenarios, it is crucial to rapidly and accurately detect smoking and cell phone usage, and promptly is... 详细信息
来源: 评论
RFSD-YOLO: An Enhanced X-Ray Object Detection Model for Prohibited Items
RFSD-YOLO: An Enhanced X-Ray Object Detection Model for Proh...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Kong, Xiaotong Li, Aimin Li, Wenqiang Li, Zhiyao Zhang, Yuechen Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
X-ray image detection is essential for ensuring public safety, but traditional methods rely heavily on human analysis and are relatively inefficient. To address this issue, this paper proposes a new object detection m... 详细信息
来源: 评论
A Sharding Scheme Based on Graph Partitioning Algorithm for Public Blockchain
收藏 引用
computer Modeling in Engineering & Sciences 2024年 第6期139卷 3311-3327页
作者: Shujiang Xu Ziye Wang Lianhai Wang Miodrag J.Mihaljevi′c Shuhui Zhang Wei Shao Qizheng Wang Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science CenterQilu University of Technology(Shandong Academy of Sciences)Jinan250014China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer ScienceJinan250014China Mathematical Institute The Serbian Academy of Sciences and ArtsBelgrade11000Serbia
Blockchain technology,with its attributes of decentralization,immutability,and traceability,has emerged as a powerful catalyst for enhancing traditional industries in terms of optimizing business ***,transaction perfo... 详细信息
来源: 评论
Neural network-Based State Estimation for Nonlinear Systems With Denial-of-Service Attack Under Try-Once-Discard Protocol
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第10期11卷 2182-2184页
作者: Xueli Wang Shangwei Zhao Ming Yang Xin Wang Xiaoming Wu the Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science CenterQilu University of Technology(Shandong Academy of Sciences)Jinan 250014 Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer ScienceJinan 250014China Department of Automation Shanghai Jiao Tong UniversityShanghai 200240China
Dear Editor,This letter deals with state estimation issues of discrete-time nonlinear systems subject to denial-of-service(DoS)attacks under the try-once-discard(TOD)*** specifically,to redu.e the communication burden... 详细信息
来源: 评论
Decoupled knowledge distillation method based on meta-learning
收藏 引用
High-Confidence Computing 2024年 第1期4卷 1-6页
作者: Wenqing Du Liting Geng Jianxiong Liu Zhigang Zhao Chunxiao Wang Jidong Huo Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science Center(National Supercomputer Center in Jinan)Qilu University of Technology(Shandong Academy of Sciences)Jinan 250014China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer ScienceJinan 250014China Aerospace Science&Industry Network Information Development Co. LTDBeijing 100854China
With the advancement of deep learning techniques,the number of model parameters has been increasing,leading to significant memory consumption and limits in the deployment of such models in real-time *** redu.e the num... 详细信息
来源: 评论
MMH-FE:AMulti-Precision and Multi-Sourced Heterogeneous Privacy-Preserving Neural network Training Based on Functional Encryption
收藏 引用
computers, Materials & Continua 2025年 第3期82卷 5387-5405页
作者: Hao Li Kuan Shao Xin Wang Mufeng Wang Zhenyong Zhang The State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang550025China Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science CenterQilu University of Technology(Shandong Academy of Sciences)Jinan250014China China Industrial Control Systems Cyber Emergency Response Team Beijing100040China
Due to the development of cloud computing and machine learning,users can upload their data to the cloud for machine learning model ***,dishonest clouds may infer user data,resulting in user data *** schemes have achie... 详细信息
来源: 评论