咨询与建议

限定检索结果

文献类型

  • 606 篇 会议
  • 417 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,024 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 641 篇 工学
    • 488 篇 计算机科学与技术...
    • 395 篇 软件工程
    • 158 篇 信息与通信工程
    • 123 篇 电气工程
    • 61 篇 网络空间安全
    • 59 篇 电子科学与技术(可...
    • 56 篇 控制科学与工程
    • 52 篇 生物工程
    • 30 篇 安全科学与工程
    • 28 篇 生物医学工程(可授...
    • 26 篇 机械工程
    • 23 篇 仪器科学与技术
    • 22 篇 光学工程
    • 18 篇 交通运输工程
    • 17 篇 化学工程与技术
    • 16 篇 动力工程及工程热...
    • 16 篇 建筑学
  • 277 篇 理学
    • 170 篇 数学
    • 54 篇 生物学
    • 50 篇 统计学(可授理学、...
    • 49 篇 物理学
    • 29 篇 系统科学
    • 17 篇 化学
  • 163 篇 管理学
    • 93 篇 管理科学与工程(可...
    • 76 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 38 篇 法学
    • 22 篇 法学
    • 17 篇 社会学
  • 20 篇 医学
    • 18 篇 临床医学
  • 15 篇 经济学
    • 15 篇 应用经济学
  • 14 篇 军事学
  • 6 篇 农学
  • 3 篇 教育学
  • 3 篇 文学

主题

  • 42 篇 feature extracti...
  • 39 篇 semantics
  • 36 篇 accuracy
  • 35 篇 cryptography
  • 31 篇 computational mo...
  • 28 篇 security
  • 28 篇 protocols
  • 27 篇 cloud computing
  • 26 篇 federated learni...
  • 26 篇 privacy
  • 25 篇 authentication
  • 23 篇 training
  • 21 篇 network security
  • 20 篇 deep learning
  • 20 篇 encryption
  • 19 篇 data privacy
  • 19 篇 computer network...
  • 18 篇 servers
  • 18 篇 data models
  • 17 篇 neural networks

机构

  • 82 篇 key laboratory o...
  • 66 篇 shandong provinc...
  • 51 篇 shandong enginee...
  • 41 篇 school of comput...
  • 38 篇 shaanxi key labo...
  • 37 篇 school of comput...
  • 33 篇 school of cyber ...
  • 31 篇 institute of inf...
  • 30 篇 shaanxi key labo...
  • 22 篇 state key labora...
  • 21 篇 shandong provinc...
  • 18 篇 college of compu...
  • 18 篇 national enginee...
  • 18 篇 shandong fundame...
  • 17 篇 school of comput...
  • 15 篇 school of comput...
  • 14 篇 national compute...
  • 13 篇 key laboratory o...
  • 13 篇 shaanxi key labo...
  • 13 篇 national compute...

作者

  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 19 篇 baojiang cui
  • 18 篇 hei xinhong
  • 13 篇 jianfeng ma
  • 13 篇 li wei
  • 12 篇 jing zhao
  • 12 篇 xu li
  • 12 篇 zhenyu yang
  • 12 篇 yang xiaoyuan
  • 11 篇 fu chong
  • 11 篇 lei zhu
  • 11 篇 wei wei
  • 10 篇 zhang yuqing
  • 10 篇 chen zhong
  • 10 篇 liu jun
  • 10 篇 xiaoxue liu
  • 10 篇 li qi
  • 9 篇 wang lei

语言

  • 878 篇 英文
  • 117 篇 其他
  • 33 篇 中文
检索条件"机构=Network Security Laboratory Computer Engineering"
1024 条 记 录,以下是571-580 订阅
排序:
Uncertainty-Aware Relational Graph Neural network for Few-Shot Knowledge Graph Completion
arXiv
收藏 引用
arXiv 2024年
作者: Li, Qian Guo, Shu Chen, Yingjia Ji, Cheng Sheng, Jiawei Li, Jianxin Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University Beijing100083 China The State Key Laboratory of Software Development Environment Beihang University Beijing100083 China National Computer Network Emergency Response Technical Team Coordination Center of China Beijing100083 China School of Mathematics Edinburgh University Edinburgh United Kingdom Institute of Information Engineering Chinese Academy of Sciences Beijing100083 China School of Cyber Security University of Chinese Academy of Sciences Beijing100083 China
Few-shot knowledge graph completion (FKGC) aims to query the unseen facts of a relation given its few-shot reference entity pairs. The side effect of noises due to the uncertainty of entities and triples may limit the... 详细信息
来源: 评论
ResfEANet: ResNet-fused External Attention network for Tuberculosis Diagnosis using Chest X-ray Images
收藏 引用
computer Methods and Programs in Biomedicine Update 2024年 5卷
作者: Ejiyi, Chukwuebuka Joseph Qin, Zhen Nnani, Ann O Deng, Fuhu Ejiyi, Thomas Ugochukwu Ejiyi, Makuachukwu Bennedith Agbesi, Victor Kwaku Bamisile, Olusola Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Chengdu China College of Environmental Science and Engineering Hohai University Nanjing China Department of Pure and Industrial Chemistry University of Nigeria Nsukka Enugu Nigeria Pharmacy Department University of Nigeria Nsukka Enugu Nigeria School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China Sichuan Industrial Internet Intelligent Monitoring and Application Engineering Technology Research Centre Chengdu University of Technology Chengdu China
Pulmonary tuberculosis (TB), the most prevalent form of TB, remains a major global public health concern, contributing to more than a million deaths each year. The accurate and timely diagnosis of this disease is of p... 详细信息
来源: 评论
A Secure Beamforming Design: When Fluid Antenna Meets NOMA
arXiv
收藏 引用
arXiv 2024年
作者: Mai, Lifeng Yao, Junteng Tang, Jie Wu, Tuo Wong, Kai-Kit Shin, Hyundong Adachi, Fumiyuki The Electric Power Research Institute China Southern Power Grid Guangzhou510663 China The Guangdong Provincial Key Laboratory of Power System Network Security Guangdong Guangzhou China The Faculty of Electrical Engineering and Computer Science Ningbo University Ningbo315211 China The School of Electronic and Information Engineering South China University of Technology Guangzhou510006 China The School of Electrical and Electronic Engineering Nanyang Technological University 639798 Singapore The Department of Electronic and Electrical Engineering University College London Torrington Place WC1E 7JE United Kingdom The Department of Electronic Engineering Kyung Hee University Gyeonggi-do Yongin-si17104 Korea Republic of Tohoku University Sendai Japan
This letter proposes a secure beamforming design for downlink non-orthogonal multiple access (NOMA) systems utilizing fluid antenna systems (FAS). We consider a setup where a base station (BS) with M fluid antennas (F... 详细信息
来源: 评论
Intelligent decoding method for Ground-penetrating radar based on improved YOLOv5
Intelligent decoding method for Ground-penetrating radar bas...
收藏 引用
computer, Big Data and Artificial Intelligence (ICCBD+AI), International Conference on
作者: ZeYu Chen YongKang Wang HongLiang Liu Chuan Wang XinBo Jiang Ning Zhang Zhen Huang Lei Jiang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) JiNan China Technological Innovation Department Shandong Hi-Speed Group Co Ltd JiNan China School of Qilu Transportation Shandong University JiNan China No.1 Engineering Development Co. Ltd. of China Railway 14Th Bureau Group RiZhao China
Ground-penetrating radar (GPR) is a non-invasive detection technique that effectively gathers information about subsurface materials. In tunneling projects, GPR can provide a fast and accurate forecast of the geologic... 详细信息
来源: 评论
A permission generation and configuration method based on Rules and FP-Growth algorithm
A permission generation and configuration method based on Ru...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Lei Zhu Ziheng Zhang Xinhong Hei Yichuan Wang Ziliang Yang Feixiong Hu Ping He School of Computer Science and Engineering Xi’an University of technology1 Xi’an Shaanxi China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an Shaanxi China Shenzhen Tencent Computer System Co. Ltd Shenzhen China
With the development of computer technology, lots of enterprises had begun to build a data platform, and the data and its services already paly the import role in enterprises. However, the guarantee the data security ... 详细信息
来源: 评论
Enhanced competitive swarm optimizer for multi-task optimization  9
Enhanced competitive swarm optimizer for multi-task optimiza...
收藏 引用
9th International Conference on Computing and Pattern Recognition, ICCPR 2020
作者: Li, Wei Yuan, Junqing Luo, Haonan Lei, Zhou Xu, Qingzheng School of Computer Science and Engineering Xi'An University of Technology Xi'an710048 China Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an710048 China College of Information and Communication National University of Defense Technology Xi'an710106 China
In the real world, many problems possess the high degree of similarity. Inspired by multifactorial inheritance model, evolutionary multi-task optimization paradigm is proposed to simultaneously solve multiple optimiza... 详细信息
来源: 评论
Towards Efficient Co-audit of Privacy-Preserving Data on Consortium Blockchain via Group Key Agreement
Towards Efficient Co-audit of Privacy-Preserving Data on Con...
收藏 引用
International Conference on Mobile Ad-hoc and Sensor networks, MSN
作者: Xiaoyan Hu Xiaoyi Song Guang Cheng Jian Gong Lu Yang Honggang Chen Zhichao Liang School of Cyber Science & Engineering Southeast University Nanjing China Ministry of Education Key Laboratory of Computer Network and Information Integration (Southeast University) China Research Base of International Cyberspace Governance (Southeast University) Nanjing China Purple Mountain Laboratories for Network and Communication Security Nanjing China Jiangsu Province Engineering Research Center of Security for Ubiquitous Network Nanjing China JiangSu Peerfintech Technology Co. Ltd.
Blockchain is well known for its storage consistency, decentralization and tamper-proof, but the privacy disclosure and difficulty in auditing discourage the innovative application of blockchain technology. As compare... 详细信息
来源: 评论
The Initial Screening of Laryngeal Tumors via Voice Acoustic Analysis Based on Siamese network Under Small Samples
收藏 引用
Journal of Voice 2025年
作者: You, Zhenzhen Sun, Delong Shi, Zhenghao Du, Shuangli Hei, Xinhong Kong, Demin Du, Xiaoying Yan, Jing Ren, Xiaoyong Hou, Jin Shaanxi Key Laboratory for Network Computing and Security Technology School of Computer Science and Engineering Xi'an University of Technology Xi'an China Department of Otolaryngology Second Affiliated Hospital of Medical College Xi'an Jiaotong University Xi'an China
Objective: The initial screening of laryngeal tumors via voice acoustic analysis is based on the clinician's experience that is subjective. This article introduces a Siamese network with an auxiliary gender classi... 详细信息
来源: 评论
Noise-Tolerant Learning for Audio-Visual Action Recognition
arXiv
收藏 引用
arXiv 2022年
作者: Han, Haochen Zheng, Qinghua Luo, Minnan Miao, Kaiyao Tian, Feng Chen, Yan The National Engineering Lab for Big Data Analytics Xi’an Jiaotong University Xi’an710049 China The School of Computer Science and Technology Xi’an Jiaotong University Xi’an710049 China The Key Laboratory of Intelligent Networks and Network Security Xi’an Jiaotong University Ministry of Education Xi’an710049 China The School of Cyber Science and Engineering Xi’an Jiaotong University Xi’an710049 China
Recently, video recognition is emerging with the help of multi-modal learning, which focuses on integrating distinct modalities to improve the performance or robustness of the model. Although various multi-modal learn... 详细信息
来源: 评论
Disentangled Representation Learning with Transmitted Information Bottleneck
arXiv
收藏 引用
arXiv 2023年
作者: Dang, Zhuohang Luo, Minnan Jia, Chengyou Dai, Guang Wang, Jihong Chang, Xiaojun Wang, Jingdong The School of Computer Science and Technology The Ministry of Education Key Laboratory of Intelligent Networks and Network Security The Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Xi'an Jiaotong University Shaanxi Xi’an710049 China The SGIT AI Laboratory Xi’an710048 China The State Grid Shaanxi Electric Power Company Ltd. State Grid Corporation of China Xi’an710048 China The School of Information Science and Technology University of Science and Technology of China Hefei230026 China Abu Dhabi United Arab Emirates Baidu Inc Beijing100085 China
Encoding only the task-related information from the raw data, i.e., disentangled representation learning, can greatly contribute to the robustness and generalizability of models. Although significant advances have bee... 详细信息
来源: 评论