咨询与建议

限定检索结果

文献类型

  • 614 篇 会议
  • 428 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,043 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 664 篇 工学
    • 508 篇 计算机科学与技术...
    • 410 篇 软件工程
    • 171 篇 信息与通信工程
    • 141 篇 电气工程
    • 70 篇 网络空间安全
    • 67 篇 控制科学与工程
    • 63 篇 电子科学与技术(可...
    • 52 篇 生物工程
    • 37 篇 安全科学与工程
    • 28 篇 机械工程
    • 28 篇 生物医学工程(可授...
    • 25 篇 交通运输工程
    • 24 篇 仪器科学与技术
    • 23 篇 光学工程
    • 18 篇 化学工程与技术
    • 17 篇 建筑学
    • 16 篇 动力工程及工程热...
  • 280 篇 理学
    • 173 篇 数学
    • 54 篇 生物学
    • 51 篇 统计学(可授理学、...
    • 50 篇 物理学
    • 29 篇 系统科学
    • 19 篇 化学
  • 171 篇 管理学
    • 101 篇 管理科学与工程(可...
    • 76 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 38 篇 法学
    • 22 篇 法学
    • 17 篇 社会学
  • 23 篇 医学
    • 20 篇 临床医学
  • 15 篇 经济学
    • 15 篇 应用经济学
  • 14 篇 军事学
  • 6 篇 农学
  • 3 篇 教育学
  • 3 篇 文学

主题

  • 42 篇 feature extracti...
  • 39 篇 semantics
  • 36 篇 accuracy
  • 35 篇 cryptography
  • 31 篇 computational mo...
  • 28 篇 security
  • 28 篇 protocols
  • 27 篇 federated learni...
  • 27 篇 cloud computing
  • 26 篇 privacy
  • 25 篇 authentication
  • 23 篇 training
  • 22 篇 network security
  • 21 篇 deep learning
  • 20 篇 encryption
  • 19 篇 data privacy
  • 19 篇 computer network...
  • 18 篇 servers
  • 18 篇 data models
  • 17 篇 neural networks

机构

  • 82 篇 key laboratory o...
  • 66 篇 shandong provinc...
  • 51 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 shaanxi key labo...
  • 37 篇 school of comput...
  • 33 篇 school of cyber ...
  • 31 篇 institute of inf...
  • 30 篇 shaanxi key labo...
  • 22 篇 state key labora...
  • 21 篇 shandong provinc...
  • 18 篇 national enginee...
  • 18 篇 shandong fundame...
  • 17 篇 school of comput...
  • 17 篇 college of compu...
  • 15 篇 school of comput...
  • 14 篇 national compute...
  • 13 篇 xi'an university...
  • 13 篇 key laboratory o...
  • 13 篇 shaanxi key labo...

作者

  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 19 篇 baojiang cui
  • 18 篇 hei xinhong
  • 13 篇 jianfeng ma
  • 13 篇 li wei
  • 13 篇 wei wei
  • 12 篇 jing zhao
  • 12 篇 xu li
  • 12 篇 zhenyu yang
  • 12 篇 yang xiaoyuan
  • 11 篇 fu chong
  • 11 篇 li qi
  • 11 篇 lei zhu
  • 10 篇 zhang yuqing
  • 10 篇 chen zhong
  • 10 篇 liu jun
  • 10 篇 xiaoxue liu
  • 9 篇 wang lei

语言

  • 854 篇 英文
  • 160 篇 其他
  • 34 篇 中文
检索条件"机构=Network Security Laboratory Computer Engineering"
1043 条 记 录,以下是561-570 订阅
排序:
Multi-Channel Hypergraph Convolution Group Recommendation with Member Information Enhancement
Multi-Channel Hypergraph Convolution Group Recommendation wi...
收藏 引用
IEEE International Conference on High Performance Computing and Communications (HPCC)
作者: Tianhao Chen Qian Gao Jun Fan Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan Shandong China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan Shandong China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan Shandong China China Telecom Digital Intelligence Techonology Co Ltd Jinan Shandong China
Group recommendation involves comprehensively considering various aspects, including members and items, to predict the overall interests of a group and recommend suitable items through a recommendation system. With th...
来源: 评论
Wireless Powered Backscatter Communications with Spatially Random Tags
Wireless Powered Backscatter Communications with Spatially R...
收藏 引用
IEEE International Conference on Communications in China (ICCC)
作者: Yingting Liu Yinghui Ye Xingwang Li Zhongyu Ma Zhiyang Zhou School of Electronic and Information Engineering Lanzhou Jiaotong University Lanzhou China State Grid Gansu Electric Power Research Institute Lanzhou China School of Electronic Engineering Beijing University of Posts and Telecommunications Beijing China Shaanxi Key Laboratory of Information Communication Network and Security Xi’an University of Posts & Telecommunications Xi’an China School of Physics and Electronic Information Engineering Henan Polytechnic University Jiaozuo China College of Computer Science and Engineering Northwest Normal University Lanzhou China
In this paper, a wireless powered backscatter communication (BackCom) system is considered, which consists of one dedicated radio-frequency source node (S), one destination node and multiple tags randomly located in t...
来源: 评论
Signature Scheme Based on The SM2 Algorithm in Fabric
Signature Scheme Based on The SM2 Algorithm in Fabric
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Yaling Zhang Hongyun Wang Yichuan Wang Wenjiang Ji Lei Zhu School of computer science and engineering Xi’an University of technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an University of technology Xi’an China
Based on the analysis and research of the widely used Hyperledger Fabric alliance chain structure, this paper proposes a digital signature scheme based on the national cryptographic algorithm SM2 which can be applied ... 详细信息
来源: 评论
Prediction of exosomal piRNAs based on deep learning for sequence embedding with attention mechanism
Prediction of exosomal piRNAs based on deep learning for seq...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Yajun Liu Yulian Ding Aimin Li Rong Fei Xie Guo Fangxiang Wu Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an University of Technology Xi'an China Division of Biomedical Engineering University of Saskatchewan Saskatoon Canada Shaanxi Key Laboratory of Complex System Control and Intelligent Information Processing Xi'an University of Technology Xi'an China Department of Computer Science Department of Mechanical Engineering Division of Biomedical Engineering University of Saskatchewan Saskatoon Canada
PIWI-interacting RNAs (piRNAs) are a type of small non-coding RNAs which bind with the PIWI proteins to exert biological effects in various regulatory mechanisms. A growing amount of evidence reveals that exosomal piR... 详细信息
来源: 评论
SAR Image Scene Classification Based on Metric Learning and CNNs
SAR Image Scene Classification Based on Metric Learning and ...
收藏 引用
Information Communication and Software engineering (ICICSE), IEEE International Conference on
作者: Yaozhong Wang Zhiqiang Zhao Lei Wang School of Computer Science and Engineering and the Shaanxi Key Laboratory of Network Computing and Security Technology Xi‘an University of Technology Xi'an China School of Mathematics and Computer Science Shaanxi University of Technology Hanzhong China
With the development of synthetic aperture radar (SAR) imaging techniques, many high-quality images are acquired for exactly earth observation. As a result of heavy speckle, it is difficult to extract effective repres... 详细信息
来源: 评论
A Deep Learning-Based Framework for the Normalization of WOS Institutional Names
A Deep Learning-Based Framework for the Normalization of WOS...
收藏 引用
Artificial Intelligence, Internet and Digital Economy (ICAID), International Conference on
作者: Lin Shi Yan Lu Chuan Zhou Weiliu Chenxi Yi Zhou School of Cyber Science and Engineering Southeast University Nanjing China School of Microelectronics Tianjin University Tianjin China Minzu University of China Beijing China Inspur software Co. Ltd. Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Jinan China
Academic evaluation assesses the contributions and influence of researchers, institutions, or disciplines, determining their reputation and standing within a specific field. As a leading citation database, Web of Scie... 详细信息
来源: 评论
Algorithm Application of Speech Recognition Technology Based on Multimodal Information in Human-computer Interaction
Algorithm Application of Speech Recognition Technology Based...
收藏 引用
Artificial Intelligence, Internet and Digital Economy (ICAID), International Conference on
作者: Lin Shi Yan Lu Yi Zhou Weiliu Chenxi Chuan Zhou School of Cyber Science and Engineering Southeast University Nanjing China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Jinan China Inspur software Co. Ltd. Jinan China School of Microelectronics Tianjin University Tianjin China Beijing Minzu University of China Beijing China
Multimodal human-computer interaction (MMHCI) has been considered a key direction during the evolution of the human-computer interaction (HCI) domain. To speed up the technical advancement of HCI systems, this investi... 详细信息
来源: 评论
Density-aware and Depth-aware Visual Representation for Zero-Shot Object Counting
Density-aware and Depth-aware Visual Representation for Zero...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Fang Nan Feng Tian Ni Zhang Nian Liu Haonan Miao Guang Dai Mengmeng Wang Faculty of Electronic and Information Engineering Xi’an Jiaotong University Xi’an China Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an China School of Automation Northwestern Polytechnical University Xi’an China Computer Vision Department Mohamed bin Zayed University of Artificial Intelligence Abu Dhabi UAE SGIT AI Lab State Grid Corporation of China Zhejiang University of Technology Hang Zhou China
Previous methods often utilize CLIP semantic classifiers with class names for zero-shot object counting. However, they ignore crucial density and depth knowledge for counting tasks. Thus, we propose a density-aware an... 详细信息
来源: 评论
A Review of Multimodal Explainable Artificial Intelligence: Past, Present and Future
arXiv
收藏 引用
arXiv 2024年
作者: Sun, Shilin An, Wenbin Tian, Feng Nan, Fang Liu, Qidong Liu, Jun Shah, Nazaraf Chen, Ping School of Computer Science and Technology Xi’an Jiaotong University Xi’an710049 China Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an710049 China Faculty of Electronic and Information Engineering Xi’an Jiaotong University Xi’an710049 China Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Xi’an Jiaotong University Xi’an710049 China Institute for Future Transport and Cities Coventry University Priory Street CoventryCV1 5FB United Kingdom Department of Engineering University of Massachusetts Boston BostonMA02125 United States
Artificial intelligence (AI) has rapidly developed through advancements in computational power and the growth of massive datasets. However, this progress has also heightened challenges in interpreting the "black-... 详细信息
来源: 评论
Cell Manipulation Attack Against Onion Services
Cell Manipulation Attack Against Onion Services
收藏 引用
IEEE International Conference on High Performance Computing and Communications (HPCC)
作者: Jianjun Lin Yinliang Yue Yijing Zhang Xiaoyu Liu XiaoDu Yang Weilin Gai Bo Sun Chinese Academy of Sciences Institute of Information Engineering Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Zhongguancun Laboratory Beijing China Chinese Academy of Sciences Institute of Software Beijing China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China National Computer Network Emergency Response Technical Team/Coordination Center of China (CNCERT/CC) Beijing China
In this study, we proposed OREA-OS, a cell manipulation attack devised to compromise Onion Services. Through the manipulation of cells, two collaborating nodes within a circuit exchange information to unveil the anony...
来源: 评论