咨询与建议

限定检索结果

文献类型

  • 589 篇 会议
  • 420 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,010 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 651 篇 工学
    • 494 篇 计算机科学与技术...
    • 400 篇 软件工程
    • 165 篇 信息与通信工程
    • 127 篇 电气工程
    • 62 篇 网络空间安全
    • 61 篇 电子科学与技术(可...
    • 60 篇 控制科学与工程
    • 52 篇 生物工程
    • 28 篇 生物医学工程(可授...
    • 28 篇 安全科学与工程
    • 26 篇 机械工程
    • 24 篇 仪器科学与技术
    • 21 篇 光学工程
    • 17 篇 建筑学
    • 17 篇 交通运输工程
    • 16 篇 动力工程及工程热...
    • 16 篇 化学工程与技术
  • 278 篇 理学
    • 170 篇 数学
    • 56 篇 生物学
    • 50 篇 统计学(可授理学、...
    • 49 篇 物理学
    • 29 篇 系统科学
    • 18 篇 化学
  • 166 篇 管理学
    • 94 篇 管理科学与工程(可...
    • 78 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 40 篇 法学
    • 24 篇 法学
    • 17 篇 社会学
  • 22 篇 医学
    • 19 篇 临床医学
    • 16 篇 基础医学(可授医学...
  • 15 篇 经济学
  • 14 篇 军事学
  • 6 篇 农学
  • 3 篇 教育学
  • 3 篇 文学

主题

  • 38 篇 feature extracti...
  • 35 篇 semantics
  • 34 篇 cryptography
  • 28 篇 protocols
  • 27 篇 computational mo...
  • 27 篇 security
  • 27 篇 accuracy
  • 27 篇 cloud computing
  • 25 篇 privacy
  • 24 篇 authentication
  • 21 篇 deep learning
  • 20 篇 network security
  • 19 篇 encryption
  • 19 篇 computer network...
  • 18 篇 federated learni...
  • 18 篇 training
  • 17 篇 data privacy
  • 17 篇 data models
  • 16 篇 neural networks
  • 15 篇 servers

机构

  • 67 篇 key laboratory o...
  • 65 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 31 篇 school of cyber ...
  • 31 篇 shaanxi key labo...
  • 29 篇 institute of inf...
  • 22 篇 state key labora...
  • 18 篇 national enginee...
  • 18 篇 shandong fundame...
  • 15 篇 school of comput...
  • 15 篇 college of compu...
  • 15 篇 school of comput...
  • 13 篇 key laboratory o...
  • 13 篇 national compute...
  • 12 篇 heilongjiang key...
  • 12 篇 shaanxi key labo...
  • 12 篇 national compute...

作者

  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 19 篇 baojiang cui
  • 18 篇 hei xinhong
  • 13 篇 li wei
  • 13 篇 yang xiaoyuan
  • 12 篇 jianfeng ma
  • 12 篇 xu li
  • 11 篇 jing zhao
  • 11 篇 fu chong
  • 11 篇 lei zhu
  • 11 篇 wei wei
  • 10 篇 zhang yuqing
  • 10 篇 chen zhong
  • 10 篇 liu jun
  • 10 篇 xiaoxue liu
  • 10 篇 li qi
  • 9 篇 wang lei
  • 9 篇 ma jianfeng

语言

  • 907 篇 英文
  • 75 篇 其他
  • 30 篇 中文
检索条件"机构=Network Security Laboratory Computer Engineering"
1010 条 记 录,以下是111-120 订阅
排序:
Secure and Efficient Blockchain-Based Access Control Scheme with Attribute Update
收藏 引用
IEEE Transactions on Consumer Electronics 2024年
作者: Zuo, Yuting Xu, Li Li, Jiguo Li, Jie Wang, Xiaoding Piran, Md. Jalil Fujian Normal University College of Computer and Cyber Security Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou350117 China Lab Shanghai200240 China Sejong University Department of Computer Science and Engineering Seoul05006 Korea Republic of
Secure data access control is widely concerned in Cyber Physical Systems (CPSs) to protect consumer rights. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is an ideal solution that supports fine-grained access ... 详细信息
来源: 评论
A Cloud Computing User Experience Focused Load Balancing Method Based on Modified CMA-ES Algorithm  18th
A Cloud Computing User Experience Focused Load Balancing Met...
收藏 引用
18th International Conference on Green, Pervasive, and Cloud Computing, GPC 2023
作者: Luo, Jihai Dong, Chen Chen, Zhenyi Xu, Li Chen, Tianci College of Computer and Data Science - Fuzhou University Xueyuan Road Fujian Fuzhou360108 China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou China Department of Computer Science and Engineering University of South Florida TampaFL33620 United States College of Computer and Cyber Security Fujian Normal University Fuzhou350007 China
The development of the software and hardware has brought about the abundance and overflow of computing resources. Many Internet companies can lease idle computing resources based on the peak and valley cycles of usage... 详细信息
来源: 评论
Leveraging High-Order Similar Nodes and Structural Correlation for Attention-Based Graph Embedding
Leveraging High-Order Similar Nodes and Structural Correlati...
收藏 引用
2023 International Conference on Machine Learning and Cybernetics, ICMLC 2023
作者: Wang, Jing-Hong Li, Chang-Xin Yang, Jia-Teng College of Computer and Cyber Security Hebei Normal University Shijiazhuang050024 China Hebei Normal University Hebei Key Laboratory of Network and Information Security Shijiazhuang050024 China Hebei Provincial Engineering Research Center for Supply Chain Big Data Analytics & Security Hebei Normal University Shijiazhuang050024 China Hebei Polytechnic Institute Shijiazhuang050020 China
Graph Attention network (GAT) is a popular method for graph embedding as they effectively leverage attention mechanisms to aggregate first-order neighborhood node information. However, they have limitations in their a... 详细信息
来源: 评论
Sequence-to-Sequence Knowledge Graph Completion Based on Gated Attention Unit  29
Sequence-to-Sequence Knowledge Graph Completion Based on Gat...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Yi, Fengge Wei, Xiumei Liu, Xiaojing Jiang, Xuesong Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China State Key Laboratory of High-end Server & Storage Technology Jinan China
We present GauKGT5, a sequence-to-sequence model proposed for knowledge graph completion (KGC). Our research extends the KGT5 model, a recent sequence-to-sequence link prediction (LP) model. GauKGT5 takes advantage of... 详细信息
来源: 评论
Prediction of piRNA-mRNA interactions based on an interactive inference network
Prediction of piRNA-mRNA interactions based on an interactiv...
收藏 引用
2023 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2023
作者: Liu, Yajun Li, Ru Li, Aimin Fei, Rong Guo, Xie Wu, Fang-Xiang Xi'an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China Xi'an University of Technology Shaanxi Key Laboratory of Complex System Control and Intelligent Information Processing Xi'an China University of Saskatchewan Division of Biomedical Engineering Department of Computer Science Department of Mechanical Engineering Saskatoon Canada
As the largest class of small non-coding RNAs, piRNAs primarily present in the reproductive cells of mammals, which influence post-transcriptional processes of mRNAs in multiple ways. Effective methods for predicting ... 详细信息
来源: 评论
UAV Swarm Path Planning for Sensor Data Collection via Double Pre-Partitioned Deep Q-network
收藏 引用
IEEE Sensors Journal 2025年
作者: Zhang, Heng Gao, Yuan Wang, Xin He, Yunpeng Yang, Ming Wu, Xiaoming Yang, Chaoqun Cao, Xianghui Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250014 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250014 China Jiangsu Ocean University School of Computer Engineering Lianyungang222000 China Southeast University School of Automation Nanjing210096 China
Collision-free path planning is a significant challenge in deploying unmanned aerial vehicle (UAV) swarms for sensor data collection tasks, particularly in uncertain environments. This paper addresses the problem of d... 详细信息
来源: 评论
DCGSD: Low-Light Image Enhancement with Dual-Conditional Guidance Sparse Diffusion Model
收藏 引用
IEEE Transactions on Circuits and Systems for Video Technology 2025年
作者: Jin, Haiyan Wang, Jing Zuo, Fengyuan Su, Haonan Xiao, Zhaolin Wang, Bin Zhang, Yuanlin Xi'an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology Department of Computer Science and Engineering NO. 5 South Jinhua Road Shaanxi Xi'an710048 China
When restoring low-light images, most methods largely overlook the ambiguity due to dark noise and lack discrimination for region and shape representations, resulting in invalid feature enhancement. In this work, we p... 详细信息
来源: 评论
Mixed Color Channels (MCC): A Universal Module for Mixed Sample Data Augmentation Methods
Mixed Color Channels (MCC): A Universal Module for Mixed Sam...
收藏 引用
2022 IEEE International Conference on Multimedia and Expo, ICME 2022
作者: Wei, Yang Ma, Jianfeng Jiang, Zhongyuan Xiao, Bin School of Cyber Engineering Xidian University China Shaanxi Key Laboratory of Network and System Security China School of Computer Science and Technology Chongqing University of Posts and Telecommunication China
Color invariance is critical for computer vision systems since it significantly increases the robustness and effectiveness of the system. MSDA approaches (e.g., FMix and CutMix) have attracted considerable attention i... 详细信息
来源: 评论
Predicting metabolite-disease associations based on dynamic adaptive feature learning architecture
收藏 引用
computer Methods and Programs in Biomedicine 2025年 268卷 108867-108867页
作者: Wang, Bo Liu, Shiyu Du, Xiaoxin Zang, Jianfei Zhang, Chunyu Yang, Xue He, Yang School of Computer and Control Engineering Qiqihar University Qiqihar161006 China Heilongjiang Key Laboratory of Big Data Network Security Detection and Analysis Qiqihar University Qiqihar161006 China
Background and Objective: In recent years, the association between metabolites and complex human diseases has increasingly been recognized as a major research focus. Traditional wet-lab experiments are considered time... 详细信息
来源: 评论
Wrong-of-Thought: An Integrated Reasoning Framework with Multi-Perspective Verification and Wrong Information
Wrong-of-Thought: An Integrated Reasoning Framework with Mul...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Zhang, Yongheng Chen, Qiguang Zhou, Jingxuan Wang, Peng Si, Jiasheng Wang, Jin Lu, Wenpeng Qin, Libo School of Computer Science and Engineering Central South University China Research Center for SCIR Harbin Institute of Technology Harbin China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology Shandong Academy of Sciences China Yunnan University Kunming China
Chain-of-Thought (CoT) has become a vital technique for enhancing the performance of Large Language Models (LLMs), attracting increasing attention from researchers. One stream of approaches focuses on the iterative en...
来源: 评论