咨询与建议

限定检索结果

文献类型

  • 451 篇 会议
  • 210 篇 期刊文献

馆藏范围

  • 661 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 324 篇 工学
    • 249 篇 计算机科学与技术...
    • 200 篇 软件工程
    • 87 篇 电气工程
    • 72 篇 信息与通信工程
    • 43 篇 控制科学与工程
    • 31 篇 网络空间安全
    • 29 篇 电子科学与技术(可...
    • 19 篇 安全科学与工程
    • 16 篇 光学工程
    • 15 篇 机械工程
    • 15 篇 交通运输工程
    • 14 篇 生物工程
    • 12 篇 生物医学工程(可授...
    • 9 篇 建筑学
    • 7 篇 仪器科学与技术
    • 5 篇 动力工程及工程热...
    • 5 篇 土木工程
  • 118 篇 理学
    • 82 篇 数学
    • 27 篇 统计学(可授理学、...
    • 24 篇 物理学
    • 14 篇 生物学
    • 14 篇 系统科学
    • 5 篇 化学
  • 76 篇 管理学
    • 49 篇 管理科学与工程(可...
    • 41 篇 图书情报与档案管...
    • 11 篇 工商管理
  • 15 篇 法学
    • 8 篇 法学
    • 8 篇 社会学
  • 7 篇 医学
    • 7 篇 临床医学
    • 6 篇 基础医学(可授医学...
  • 3 篇 经济学
  • 2 篇 教育学
  • 1 篇 军事学

主题

  • 73 篇 feature extracti...
  • 66 篇 accuracy
  • 55 篇 semantics
  • 40 篇 computational mo...
  • 38 篇 federated learni...
  • 35 篇 data models
  • 33 篇 training
  • 25 篇 deep learning
  • 24 篇 neural networks
  • 23 篇 transformers
  • 22 篇 privacy
  • 20 篇 adaptation model...
  • 19 篇 speech processin...
  • 19 篇 visualization
  • 19 篇 information secu...
  • 19 篇 security
  • 18 篇 noise
  • 18 篇 robustness
  • 18 篇 attention mechan...
  • 17 篇 object detection

机构

  • 227 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 45 篇 shandong fundame...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 24 篇 shandong provinc...
  • 20 篇 key laboratory o...
  • 16 篇 qilu university ...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 shandong fundame...
  • 14 篇 key laboratory o...
  • 13 篇 key laboratory o...
  • 11 篇 faculty of data ...
  • 10 篇 shandong enginee...
  • 10 篇 shandong fundame...
  • 10 篇 engineering rese...
  • 10 篇 key laboratory o...

作者

  • 19 篇 xiaoming wu
  • 15 篇 xiangzhi liu
  • 13 篇 guohua lv
  • 13 篇 mingle zhou
  • 12 篇 lu wenpeng
  • 12 篇 delong han
  • 12 篇 meng deyu
  • 12 篇 wenpeng lu
  • 11 篇 jing zhao
  • 11 篇 xiaohui han
  • 11 篇 fu chong
  • 11 篇 wang changwei
  • 11 篇 wei zhang
  • 10 篇 chen zhong
  • 9 篇 liu jun
  • 9 篇 guixin zhao
  • 9 篇 wenbo zuo
  • 9 篇 lianhai wang
  • 9 篇 gang li
  • 9 篇 min li

语言

  • 585 篇 英文
  • 64 篇 其他
  • 13 篇 中文
检索条件"机构=Ministry of Education Key Laboratory of Computer Network and InfoT~mation Security"
661 条 记 录,以下是21-30 订阅
排序:
LCLB: Low Cross-Chain Transaction Ratio and Load Balancing for Blockchain Sharding  6
LCLB: Low Cross-Chain Transaction Ratio and Load Balancing f...
收藏 引用
6th International Conference on Robotics, Intelligent Control and Artificial Intelligence, RICAI 2024
作者: Wang, Yu Wu, Xiaoming Yuan, Qile Dong, Yunfeng Liu, Xiangzhi Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
As blockchain technology becomes widely applied, handling high volumes of transactions has become a critical challenge. Sharding has emerged as an effective solution to enhance the throughput of blockchain systems. Ye... 详细信息
来源: 评论
MBC-DTA: A Multi-Scale Bilinear Attention with Contrastive Learning Framework for Drug-Target Binding Affinity Prediction
MBC-DTA: A Multi-Scale Bilinear Attention with Contrastive L...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Li, Huiting Zhang, Weiyu Shang, Yong Lu, Wenpeng Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Jinan China
Drug-target binding affinity prediction is critical to drug design. Some existing computational methods rely on single-scale data and cannot fully integrate the rich information of multi-scale data, such as molecular ... 详细信息
来源: 评论
MemADet: A Representative Memory Bank Approach for Industrial Image Anomaly Detection
MemADet: A Representative Memory Bank Approach for Industria...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Li, Min He, Jinghui Ying, Zuobin Li, Gang Zhou, Mingle Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China City University of Macau Faculty of Data Science China
In the field of industrial production, anomaly detection is crucial for ensuring product quality and maintaining production efficiency. With the continuous advancement of computer vision technology, it has shown treme...
来源: 评论
Anomaly-Free Prior Guided Knowledge Distillation for Industrial Anomaly Detection
Anomaly-Free Prior Guided Knowledge Distillation for Industr...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Li, Gang Chen, Tianjiao Li, Min Han, Delong Zhou, MingLe Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China City University of Macau Faculty of Data Science China
In industrial manufacturing, visual anomaly detection is critical for maintaining product quality by detecting and preventing production anomalies. Anomaly detection methods based on knowledge distillation demonstrate... 详细信息
来源: 评论
Maximizing Area Coverage in Privacy-Preserving Worker Recruitment: A Prior Knowledge-Enhanced Geo-Indistinguishable Approach
收藏 引用
IEEE Transactions on Information Forensics and security 2025年 20卷 5138-5151页
作者: Zhang, Pengfei Cheng, Xiang Zhang, Zhikun Zhu, Youwen Zhang, Ji Yunnan University of Finance and Economics Yunnan Key Laboratory of Service Computing Yunnan Kunming650221 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan250316 China Ministry of Education Key Laboratory of Equipment Data Security and Guarantee Technology Guilin541004 China Beijing University of Posts and Telecommunications Beijing100876 China Zhejiang University School of Computer Science and Technology Hangzhou310027 China Nanjing University of Aeronautics and Astronautics School of Computer Science and Technology Nanjing210016 China University of Southern Queensland School of Mathematics Physics and Computing ToowoombaQLD4350 Australia
Worker recruitment for area coverage maximization, typically requires participants to upload location information, which can deter potential participation without proper protection. While existing studies resort to ge... 详细信息
来源: 评论
Multi-Label Text Classification for Judicial Texts via Dual Graph and Label Feature Fusion  10
Multi-Label Text Classification for Judicial Texts via Dual ...
收藏 引用
10th IEEE Smart World Congress, SWC 2024
作者: Gu, Qiliang Lu, Qin Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
The legal judgement prediction (LJP) of judicial texts represents a multi-label text classification (MLTC) problem, which in turn involves three distinct tasks: the prediction of charges, legal articles, and terms of ... 详细信息
来源: 评论
Online Queue-Aware Service Migration and Resource Allocation in Mobile Edge Computing
收藏 引用
IEEE Transactions on Vehicular Technology 2025年 第5期74卷 8063-8078页
作者: Du, An Jia, Jie Chen, Jian Wang, Xingwei Huang, Min Northeastern University School of Computer Science and Engineering The Engineering Research Center of Security Technology of Complex Network System Shenyang110819 China Northeastern University Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Shenyang110819 China Northeastern University College of Information Science and Engineering State Key Laboratory of Synthetical Automation for Process Industries Shenyang110819 China
Mobile edge computing (MEC) integrated with network Functions Virtualization (NFV) helps run a wide range of services implemented by Virtual network Functions (VNFs) deployed at MEC networks. This emerging paradigm of... 详细信息
来源: 评论
DSDIR: A Two-Stage Method for Addressing Noisy Long-Tailed Problems in Malicious Traffic Detection
DSDIR: A Two-Stage Method for Addressing Noisy Long-Tailed P...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Li, Guoliang Zhang, Ruiqi Sun, Zhe Xing, Lingkai Zhang, Yu College of Cyber Science Nankai University Tianjin China College of Computer Science Nankai University Tianjin China Tianjin Key Laboratory of Network and Data Security Technology Tianjin China Key Laboratory of Data and Intelligent System Security Ministry of Education Tianjin China
In recent years, deep learning based malicious traffic detection (MTD) systems have demonstrated remarkable success. However, their effectiveness tend to decrease because most malicious traffic datasets are suffered f... 详细信息
来源: 评论
Dynamic detection technology of encryption algorithm based on Pin  9
Dynamic detection technology of encryption algorithm based o...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Qu, Junpeng Du, Gaolei Sun, Yunge Fu, Yong Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan250014 China Quan Cheng Laboratory Jinan250103 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
Aiming at the problem that malicious software uses encryption algorithm to hide its own malicious code and avoid detection, a dynamic detection technology based on Pin encryption algorithm is proposed. Use Pin to get ... 详细信息
来源: 评论
Robust Voice Activity Detection using Locality-Sensitive Hashing and Residual Frequency-Temporal Attention  25
Robust Voice Activity Detection using Locality-Sensitive Has...
收藏 引用
25th Interspeech Conferece 2024
作者: Li, Shu Zhang, Peng Li, Ye Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science China
For voice activity detection (VAD), recent works focus on learning the attention distribution on contextual information of speech to reduce the impact of irrelevant noise. However, contextual frames selected with spec... 详细信息
来源: 评论