咨询与建议

限定检索结果

文献类型

  • 722 篇 会议
  • 481 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,204 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 729 篇 工学
    • 549 篇 计算机科学与技术...
    • 447 篇 软件工程
    • 205 篇 信息与通信工程
    • 104 篇 电气工程
    • 102 篇 控制科学与工程
    • 77 篇 电子科学与技术(可...
    • 54 篇 网络空间安全
    • 53 篇 生物工程
    • 52 篇 机械工程
    • 37 篇 仪器科学与技术
    • 29 篇 光学工程
    • 29 篇 安全科学与工程
    • 26 篇 交通运输工程
    • 20 篇 生物医学工程(可授...
    • 17 篇 建筑学
    • 15 篇 动力工程及工程热...
    • 13 篇 土木工程
  • 288 篇 理学
    • 191 篇 数学
    • 57 篇 统计学(可授理学、...
    • 55 篇 生物学
    • 47 篇 物理学
    • 37 篇 系统科学
    • 13 篇 化学
  • 186 篇 管理学
    • 107 篇 管理科学与工程(可...
    • 92 篇 图书情报与档案管...
    • 32 篇 工商管理
  • 32 篇 法学
    • 19 篇 社会学
    • 14 篇 法学
  • 23 篇 医学
    • 17 篇 临床医学
    • 15 篇 基础医学(可授医学...
  • 12 篇 经济学
  • 9 篇 军事学
  • 4 篇 教育学
  • 3 篇 农学
  • 2 篇 文学

主题

  • 78 篇 feature extracti...
  • 67 篇 accuracy
  • 62 篇 semantics
  • 45 篇 federated learni...
  • 44 篇 training
  • 42 篇 computational mo...
  • 39 篇 data models
  • 32 篇 cryptography
  • 31 篇 deep learning
  • 29 篇 privacy
  • 28 篇 transformers
  • 28 篇 security
  • 26 篇 object detection
  • 26 篇 neural networks
  • 25 篇 visualization
  • 25 篇 information secu...
  • 24 篇 robustness
  • 24 篇 adaptation model...
  • 23 篇 protocols
  • 20 篇 convolution

机构

  • 218 篇 key laboratory o...
  • 199 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 43 篇 shandong fundame...
  • 28 篇 key lab of educa...
  • 28 篇 qilu university ...
  • 28 篇 shandong provinc...
  • 27 篇 school of comput...
  • 26 篇 pca lab key lab ...
  • 21 篇 key lab of infor...
  • 21 篇 shandong provinc...
  • 20 篇 key laboratory o...
  • 19 篇 college of compu...
  • 18 篇 guangxi key lab ...
  • 17 篇 pca lab key lab ...
  • 16 篇 ministry of educ...
  • 16 篇 school of comput...
  • 15 篇 shandong fundame...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...

作者

  • 69 篇 yang jian
  • 32 篇 jian yang
  • 30 篇 meng deyu
  • 22 篇 wang hui-ming
  • 22 篇 xie jin
  • 19 篇 xiaoming wu
  • 16 篇 jianfeng ma
  • 16 篇 li hui
  • 15 篇 xiangzhi liu
  • 15 篇 cao xiangyong
  • 15 篇 jiang haobo
  • 13 篇 ma jianfeng
  • 13 篇 guohua lv
  • 13 篇 hu yupu
  • 12 篇 pei qingqi
  • 12 篇 qian jianjun
  • 12 篇 li xiang
  • 12 篇 li jun
  • 12 篇 gong chen
  • 11 篇 lu wenpeng

语言

  • 1,117 篇 英文
  • 61 篇 其他
  • 27 篇 中文
检索条件"机构=Ministry of Education Key Lab. of Computer Network and Information Security"
1204 条 记 录,以下是1-10 订阅
排序:
Fusion of Time-Frequency Features in Contrastive Learning for Shipboard Wind Speed Correction
收藏 引用
Journal of Ocean University of China 2025年 第2期24卷 377-386页
作者: SONG Jian HUANG Meng LI Xiang ZHANG Zhenqiang WANG Chunxiao ZHAO Zhigang Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science Center(National Supercomputer Center in Jinan)Qilu University of Technology(Shandong Academy of Sciences)Jinan 250000China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer ScienceJinan 250000China
Accurate wind speed measurements on maritime vessels are crucial for weather forecasting,sea state prediction,and safe ***,vessel motion and challenging environmental conditions often affect measurement *** address th... 详细信息
来源: 评论
MUNE: A Multi-Level User-News Embedding Model for Personalised News Recommendations  24
MUNE: A Multi-Level User-News Embedding Model for Personalis...
收藏 引用
8th International Conference on computer Science and Artificial Intelligence, CSAI 2024
作者: Long, Haixiang Luo, Xudong School of Computer Science and Engineering Guangxi Key Lab of Multi-Source Information Mining & Security Key Lab of Education Blockchain and Intelligent Technology of Ministry of Education Guangxi Normal University Guangxi Guilin China
Personalised news recommendation systems are critical for delivering relevant content, but effectively capturing and modelling users’ diverse and evolving interests is challenging. In this paper, we introduce a Multi... 详细信息
来源: 评论
Lip-Audio Modality Fusion for Deep Forgery Video Detection
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 3499-3515页
作者: Yong Liu Zhiyu Wang Shouling Ji Daofu Gong Lanxin Cheng Ruosi Cheng College of Cyberspace Security Information Engineering UniversityZhengzhou450001China Research Institute of Intelligent Networks Zhejiang LabHangzhou311121China College of Computer Science and Technology Zhejiang UniversityHangzhou310027China Henan Key Laboratory of Cyberspace Situation Awareness Zhengzhou450001China Key Laboratory of Cyberspace Security Ministry of EducationZhengzhou450001China
In response to the problem of traditional methods ignoring audio modality tampering, this study aims to explore an effective deep forgery video detection technique that improves detection precision and reliability by ... 详细信息
来源: 评论
MMH-FE:AMulti-Precision and Multi-Sourced Heterogeneous Privacy-Preserving Neural network Training Based on Functional Encryption
收藏 引用
computers, Materials & Continua 2025年 第3期82卷 5387-5405页
作者: Hao Li Kuan Shao Xin Wang Mufeng Wang Zhenyong Zhang The State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang550025China Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science CenterQilu University of Technology(Shandong Academy of Sciences)Jinan250014China China Industrial Control Systems Cyber Emergency Response Team Beijing100040China
Due to the development of cloud computing and machine learning,users can upload their data to the cloud for machine learning model ***,dishonest clouds may infer user data,resulting in user data *** schemes have achie... 详细信息
来源: 评论
Source-free Domain Adaptation with Multiple Alignment for Efficient Image Retrieval
Source-free Domain Adaptation with Multiple Alignment for Ef...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Ni, Jinghui Cui, Hui Zhao, Lihai Li, Fengling Han, Xiaohui Xu, Lijuan Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science China Quan Cheng Laboratory China Shandong Open University China University of Technology Sydney Australia
Domain adaptation techniques help models generalize to target domains by addressing domain discrepancies between the source and target domain data distributions. These techniques are particularly valuable for cross-do... 详细信息
来源: 评论
Cascaded Sliding-Window-Based Relativistic GAN Fusion for Perceptual and Consistent Video Super-Resolution  6th
Cascaded Sliding-Window-Based Relativistic GAN Fusion for P...
收藏 引用
6th IFIP TC 12 International Conference on Intelligence Science, ICIS 2024
作者: Li, Dingyi PCA Lab Key Lab of Intelligent Perception and Systems for High-Dimensional Information of Ministry of Education and Jiangsu Key Lab of Image and Video Understanding for Social Security School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing210094 China
Perceptual video super-resolution aims at converting low-resolution videos to visually appealing high-resolution ones. It may lead to temporal inconsistency due to the drastically changing outputs. In this paper, we p... 详细信息
来源: 评论
Modeling High-Order Relationships Between Human and Video for Emotion Recognition in Video Learning  31st
Modeling High-Order Relationships Between Human and Video f...
收藏 引用
31st International Conference on Multimedia Modeling, MMM 2025
作者: Ai, Hanxu Tao, Xiaomei Li, Xingbing Gan, Yanling Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guangxi Normal University Guilin541004 China Guangxi Key Lab of Multi-Source Information Mining and Security Guangxi Normal University Guilin541004 China School of Computer Science and Engineering Guangxi Normal University Guilin541004 China
In video learning, accurately identifying learners’ emotional state is fundamental for enhancing the learner experience and improving teaching effectiveness. Most existing methods focus on analyzing learners’ physio... 详细信息
来源: 评论
A Byzantine Client Detection Method for Federated Learning Based on Encrypted Repeated Median Linear Regression  24
A Byzantine Client Detection Method for Federated Learning B...
收藏 引用
5th International Conference on computer Science and Management Technology, ICCSMT 2024
作者: Guo, Jinlong Yang, Ming Li, Huijuan Wu, Xiaoming He, Yunpeng Wang, Xin Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Shandong Jinan China Shandong Evayinfo Technology Co. Ltd. Shandong Jinan China
Federated learning is an emerging distributed machine learning technology that allows participants to jointly train machine learning models locally without the need for large-scale data transmission and sharing, there... 详细信息
来源: 评论
CurMIM: Curriculum Masked Image Modeling
CurMIM: Curriculum Masked Image Modeling
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Liu, Hao Wang, Kun Han, Yudong Wang, Haocong Hu, Yupeng Wang, Chunxiao Nie, Liqiang School of Software Shandong University Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology Shandong Academy of Sciences Jinan China School of Computer Science and Technology Harbin Institute of Technology Shenzhen China
Masked Image Modeling (MIM), following "mask-and-reconstruct" scheme, is a promising self-supervised method to learn scalab.e visual representation. Studies indicate that selecting an effective mask strategy... 详细信息
来源: 评论
Maximizing Area Coverage in Privacy-Preserving Worker Recruitment: A Prior Knowledge-Enhanced Geo-indistinguishable Approach
收藏 引用
IEEE Transactions on information Forensics and security 2025年 20卷 5138-5151页
作者: Zhang, Pengfei Cheng, Xiang Zhang, Zhikun Zhu, Youwen Zhang, Ji Anhui University of Science and Technology State Key Laboratory of Digital Intelligent Technology for Unmanned Coal Mining the School of Computer Science and Engineering Anhui University of Science and Technology Huainan232001 China Yunnan University of Finance and Economics Yunnan Key Laboratory of Service Computing Yunnan 650221 China Key Laboratory of Equipment Data Security and Guarantee Technology Ministry of Education Key Laboratory of Computing Power Network and Information Security Ministry of Education China Beijing University of Posts and Telecommunications China Zhejiang University China Nanjing University of Aeronautics and Astronautics China University of Southern Queensland China
Worker recruitment for area coverage maximization, typically requires participants to upload location information, which can deter potential participation without proper protection. While existing studies resort to ge... 详细信息
来源: 评论