咨询与建议

限定检索结果

文献类型

  • 589 篇 会议
  • 420 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,010 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 651 篇 工学
    • 494 篇 计算机科学与技术...
    • 400 篇 软件工程
    • 165 篇 信息与通信工程
    • 127 篇 电气工程
    • 62 篇 网络空间安全
    • 61 篇 电子科学与技术(可...
    • 60 篇 控制科学与工程
    • 52 篇 生物工程
    • 28 篇 生物医学工程(可授...
    • 28 篇 安全科学与工程
    • 26 篇 机械工程
    • 24 篇 仪器科学与技术
    • 21 篇 光学工程
    • 17 篇 建筑学
    • 17 篇 交通运输工程
    • 16 篇 动力工程及工程热...
    • 16 篇 化学工程与技术
  • 278 篇 理学
    • 170 篇 数学
    • 56 篇 生物学
    • 50 篇 统计学(可授理学、...
    • 49 篇 物理学
    • 29 篇 系统科学
    • 18 篇 化学
  • 166 篇 管理学
    • 94 篇 管理科学与工程(可...
    • 78 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 40 篇 法学
    • 24 篇 法学
    • 17 篇 社会学
  • 22 篇 医学
    • 19 篇 临床医学
    • 16 篇 基础医学(可授医学...
  • 15 篇 经济学
  • 14 篇 军事学
  • 6 篇 农学
  • 3 篇 教育学
  • 3 篇 文学

主题

  • 38 篇 feature extracti...
  • 35 篇 semantics
  • 34 篇 cryptography
  • 28 篇 protocols
  • 27 篇 computational mo...
  • 27 篇 security
  • 27 篇 accuracy
  • 27 篇 cloud computing
  • 25 篇 privacy
  • 24 篇 authentication
  • 21 篇 deep learning
  • 20 篇 network security
  • 19 篇 encryption
  • 19 篇 computer network...
  • 18 篇 federated learni...
  • 18 篇 training
  • 17 篇 data privacy
  • 17 篇 data models
  • 16 篇 neural networks
  • 15 篇 servers

机构

  • 67 篇 key laboratory o...
  • 65 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 31 篇 school of cyber ...
  • 31 篇 shaanxi key labo...
  • 29 篇 institute of inf...
  • 22 篇 state key labora...
  • 18 篇 national enginee...
  • 18 篇 shandong fundame...
  • 15 篇 school of comput...
  • 15 篇 college of compu...
  • 15 篇 school of comput...
  • 13 篇 key laboratory o...
  • 13 篇 national compute...
  • 12 篇 heilongjiang key...
  • 12 篇 shaanxi key labo...
  • 12 篇 national compute...

作者

  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 19 篇 baojiang cui
  • 18 篇 hei xinhong
  • 13 篇 li wei
  • 13 篇 yang xiaoyuan
  • 12 篇 jianfeng ma
  • 12 篇 xu li
  • 11 篇 jing zhao
  • 11 篇 fu chong
  • 11 篇 lei zhu
  • 11 篇 wei wei
  • 10 篇 zhang yuqing
  • 10 篇 chen zhong
  • 10 篇 liu jun
  • 10 篇 xiaoxue liu
  • 10 篇 li qi
  • 9 篇 wang lei
  • 9 篇 ma jianfeng

语言

  • 907 篇 英文
  • 75 篇 其他
  • 30 篇 中文
检索条件"机构=Network Security Laboratory Computer Engineering"
1010 条 记 录,以下是271-280 订阅
排序:
Bi-layered coded metasurface for multi-functional hologram with broadband transmission and efficient reflection
收藏 引用
Chinese Optics Letters 2024年 第5期22卷 8-16页
作者: 朱磊 李绪胜 董亮 谢文静 尚关玉 Shah Nawaz Burokur 丁旭旻 School of Computer and Control Engineering Qiqihar UniversityQiqihar 161006China Communication and Electronics Engineering Institute Qiqihar UniversityQiqihar 161006China Heilongjiang Key Laboratory of Big Data Network Security Detection and Analysis Qiqihar UniversityQiqihar 161000China Department of Microwave Engineering Harbin Institute of TechnologyHarbin 150001China LEME UPLUniversitéParis NanterreF92410 Ville d’AvrayFrance Advanced Microscopy and Instrumentation Research Center Harbin Institute of TechnologyHarbin 150080China Key Laboratory of Millimeter Waves Southeast UniversityNanjing 210096China
A multi-functional full-space metasurface based on frequency and polarization multiplexing is *** metasurface unit consists of metallic patterns printed on the two faces of a single-layered dielectric *** unit cell ca... 详细信息
来源: 评论
Monocular Camera-Based Visual Truck Type Recognition
SSRN
收藏 引用
SSRN 2024年
作者: Luo, Haibo Ye, Huaisheng Feng, Chao Shi, Xin Xie, Guoqi School of Computer and Data Science Minjiang University Fuzhou350018 China College of Computer and Data Science Fuzhou University Fuzhou350018 China College of Network and Information Security Fujian Agriculture and Forestry University Fuzhou350018 China Key Laboratory for Embedded and Network Computing of Hunan Province College of Computer Science and Electronic Engineering Hunan University Changsha410082 China College of Computer Science and Electronic Engineering Hunan University Changsha410082 China
Truck overload and over-limit are the primary causes of infrastructure damage and traffic safety accidents. In the past 2 years, researchers have started to deploy intelligent Internet of Things system at the source o... 详细信息
来源: 评论
Energy Efficiency Optimization for RF Energy Harvesting Relay System  11th
Energy Efficiency Optimization for RF Energy Harvesting Rela...
收藏 引用
11th EAI International Conference on Broadband Communications, networks, and Systems, BROADNETS 2020
作者: Liang, Guangjun Xin, Jianfang Wang, Qun Xia, Lingling Li, Meng Department of Computer Information and Network Security Jiangsu Police Institute Nanjing China Jiangsu Provincial Public Security Department Key Laboratory of Digital Forensics Nanjing China Electrical Engineering School Anhui Polytechnic University Wuhu China
This paper conducts research on the RF energy harvesting relay network, and proposes an improved energy harvesting relay protocol, which allows the energy harvesting source node to retransmit data to improve the syste... 详细信息
来源: 评论
FCDSB: A Fog Computing network Architecture Based on Dynamic Sharding Blockchain for Consumer Electronics in AIoT
收藏 引用
IEEE Transactions on Consumer Electronics 2024年
作者: Wei, Chenxiang Lin, Hui Que, Youxiong Wang, Xiaoding Fujian Normal University College of Computer and Cyber Security Fujian Fuzhou350117 China Fujian Province University Engineering Research Center of Cyber Security and Education Informatization Fujian Fuzhou350117 China Chinese Academy of Tropical Agricultural Sciences National Key Laboratory for Tropical Crop Breeding Institute of Tropical Bioscience and Biotechnology Sanya Research Institute Hainan Sanya572024 China Fujian Agriculture and Forestry University Key Laboratory of Sugarcane Biology and Genetic Breeding Ministry of Agriculture and Rural Affairs Fujian Fuzhou350002 China Fujian Normal University College of Computer and Cyber Security Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Fuzhou350117 China
The Artificial Intelligence of Things (AIoT) is revolutionizing the consumer electronics sector by enabling intelligent interaction and real-time adjustments in consumer electronics products to provide personalized se... 详细信息
来源: 评论
Lombard-VLD: Voice Liveness Detection Based on Human Auditory Feedback
Lombard-VLD: Voice Liveness Detection Based on Human Auditor...
收藏 引用
IEEE Symposium on security and Privacy
作者: Hongcheng Zhu Zongkun Sun Yanzhen Ren Kun He Yongpeng Yan Zixuan Wang Wuyang Liu Yuhong Yang Weiping Tu School of Cyber Science and Engineering Wuhan University Wuhan China State Grid Wuhan Electric Power Supply Company Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education Wuhan China National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan
Voice Liveness Detection (VLD) aims to protect speaker authentication from speech spoofing by determining whether speeches come from live speakers or loudspeakers. Previous methods mainly focus on their differences at... 详细信息
来源: 评论
Semi-Supervised Federated Learning with non-IID Data: Algorithm and System Design  23
Semi-Supervised Federated Learning with non-IID Data: Algori...
收藏 引用
23rd IEEE International Conference on High Performance Computing and Communications, 7th IEEE International Conference on Data Science and Systems, 19th IEEE International Conference on Smart City and 7th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC-DSS-SmartCity-DependSys 2021
作者: Zhang, Zhe Ma, Shiyao Nie, Jiangtian Wu, Yi Yan, Qiang Xu, Xiaoke Niyato, Dusit School of Data Science and Technology Heilongjiang University Harbin150080 China Cryptology and Network Security Laboratory of Heilongjiang University Harbin150080 China College of Information and Communication Engineering Dalian Minzu University China School of Computer Science and Engineering Nanyang Technological University Singapore WeBank Co. Ltd. China
Federated Learning (FL) allows edge devices (or clients) to keep data locally while simultaneously training a shared high-quality global model. However, current research is generally based on an assumption that the tr... 详细信息
来源: 评论
Exploration and practice on the construction of computer first-class major  16
Exploration and practice on the construction of computer fir...
收藏 引用
16th IEEE International Conference on computer Science and Education, ICCSE 2021
作者: Li, Wei Hei, Xinhong Wang, Lei Wang, Xiaofan Xi'An University of Technology School of Computer Science and Engineering Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China Shaanxi University of Technology School of Mathematics and Computer Science Hanzhong China
This paper analyzes the current situation of the construction of the first-class computer major, and puts forward the construction scheme of the first-class computer major in local colleges based on the concept of out... 详细信息
来源: 评论
A Triangular Stable Node network based on Self-supervised Learning for personalized prediction
A Triangular Stable Node Network based on Self-supervised Le...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Qing Liu Qian Gao Jun Fan Zhiqiang Zhang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China China Telecom Digital Intelligence Techonology Co Ltd Jinan China
In recent years, research has illuminated the potency of implicit data processing in enhancing user preferences. Nevertheless, barriers remain in breaking through the constraints of implicit information. This study ai... 详细信息
来源: 评论
Each Fake News is Fake in its Own Way: An Attribution Multi-Granularity Benchmark for Multimodal Fake News Detection  39
Each Fake News is Fake in its Own Way: An Attribution Multi-...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Guo, Hao Ma, Zihan Zeng, Zhi Luo, Minnan Zeng, Weixin Tang, Jiuyang Zhao, Xiang Laboratory for Big Data and Decision Nation University of Defense Technology China School of Computer Science and Technology Xi’an Jiaotong University China Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi’an Jiaotong University China Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Xi’an Jiaotong University China
Social platforms, while facilitating access to information, have also become saturated with a plethora of fake news, resulting in negative consequences. Automatic multimodal fake news detection is a worthwhile pursuit...
来源: 评论
CoG-DQA: Chain-of-Guiding Learning with Large Language Models for Diagram Question Answering
CoG-DQA: Chain-of-Guiding Learning with Large Language Model...
收藏 引用
Conference on computer Vision and Pattern Recognition (CVPR)
作者: Shaowei Wang Lingling Zhang Longji Zhu Tao Qin Kim-Hui Yap Xinyu Zhang Jun Liu School of Computer Science and Technology Xi'an Jiaotong University China Key Laboratory of Intelligent Networks and Network Security Xi'an Jiaotong University Ministry of Education Xi'an Shaanxi China School of Electrical & Electronic Engineering Nanyang Technological University Singapore
Diagram Question Answering (DQA) is a challenging task, requiring models to answer natural language questions based on visual diagram contexts. It serves as a crucial basis for academic tutoring, technical support, an... 详细信息
来源: 评论