咨询与建议

限定检索结果

文献类型

  • 424 篇 会议
  • 332 篇 期刊文献

馆藏范围

  • 756 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 470 篇 工学
    • 374 篇 计算机科学与技术...
    • 303 篇 软件工程
    • 116 篇 信息与通信工程
    • 75 篇 电气工程
    • 51 篇 生物工程
    • 42 篇 控制科学与工程
    • 42 篇 网络空间安全
    • 34 篇 机械工程
    • 28 篇 生物医学工程(可授...
    • 28 篇 安全科学与工程
    • 27 篇 电子科学与技术(可...
    • 23 篇 光学工程
    • 20 篇 交通运输工程
    • 18 篇 化学工程与技术
    • 14 篇 仪器科学与技术
    • 14 篇 动力工程及工程热...
  • 202 篇 理学
    • 116 篇 数学
    • 61 篇 生物学
    • 38 篇 统计学(可授理学、...
    • 36 篇 物理学
    • 20 篇 化学
    • 15 篇 系统科学
  • 121 篇 管理学
    • 79 篇 管理科学与工程(可...
    • 54 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 36 篇 医学
    • 31 篇 临床医学
    • 30 篇 基础医学(可授医学...
    • 28 篇 公共卫生与预防医...
  • 29 篇 法学
    • 18 篇 社会学
  • 18 篇 经济学
    • 18 篇 应用经济学
  • 11 篇 农学
  • 8 篇 军事学
  • 6 篇 教育学
  • 1 篇 艺术学

主题

  • 33 篇 feature extracti...
  • 32 篇 semantics
  • 31 篇 accuracy
  • 26 篇 deep learning
  • 26 篇 privacy
  • 25 篇 training
  • 23 篇 federated learni...
  • 22 篇 computational mo...
  • 21 篇 data privacy
  • 18 篇 data models
  • 17 篇 neural networks
  • 15 篇 network security
  • 14 篇 protocols
  • 14 篇 cloud computing
  • 13 篇 predictive model...
  • 12 篇 internet of thin...
  • 12 篇 image segmentati...
  • 12 篇 correlation
  • 12 篇 cryptography
  • 11 篇 speech processin...

机构

  • 69 篇 shandong provinc...
  • 66 篇 key laboratory o...
  • 51 篇 tianjin key labo...
  • 49 篇 network and data...
  • 45 篇 shandong enginee...
  • 41 篇 college of compu...
  • 35 篇 college of cyber...
  • 22 篇 college of compu...
  • 20 篇 shandong fundame...
  • 19 篇 faculty of data ...
  • 18 篇 network and data...
  • 18 篇 state key labora...
  • 17 篇 fujian provincia...
  • 16 篇 tianjin key labo...
  • 15 篇 college of compu...
  • 14 篇 city university ...
  • 11 篇 shandong enginee...
  • 10 篇 key laboratory o...
  • 10 篇 school of inform...
  • 10 篇 college of compu...

作者

  • 17 篇 qin zhen
  • 15 篇 qin zhiguang
  • 14 篇 liu ximeng
  • 13 篇 xiong jinbo
  • 12 篇 jinbo xiong
  • 12 篇 zhen qin
  • 12 篇 fu fang-wei
  • 12 篇 jia chunfu
  • 11 篇 liu jun
  • 11 篇 li tao
  • 11 篇 ding yi
  • 11 篇 jing zhao
  • 11 篇 wang bin
  • 11 篇 tian youliang
  • 11 篇 youliang tian
  • 10 篇 liu bin
  • 10 篇 karsai márton
  • 10 篇 zhao dongmei
  • 9 篇 yi ding
  • 9 篇 luo minnan

语言

  • 706 篇 英文
  • 44 篇 其他
  • 7 篇 中文
检索条件"机构=Network and Data Security"
756 条 记 录,以下是71-80 订阅
排序:
Hierarchical Alignment-enhanced Adaptive Grounding network for Generalized Referring Expression Comprehension
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Yaxian Ding, Henghui He, Shuting Jiang, Xudong Wei, Bifan Liu, Jun School of Computer Science and Technology Xi'an Jiaotong University China Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi'an Jiaotong University China Institute of Big Data Fudan University China Shanghai University of Finance and Economics China Nanyang Technological University Singapore School of Continuing Education Xi'an Jiaotong University China Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Xi'an Jiaotong University China
In this work, we address the challenging task of Generalized Referring Expression Comprehension (GREC). Compared to the classic Referring Expression Comprehension (REC) that focuses on single-target expressions, GREC ... 详细信息
来源: 评论
Spatio-temporal GNN-Based Cell-Free Massive MIMO network with Maximal Benefit-Cost Ratio
收藏 引用
IEEE Transactions on Vehicular Technology 2025年
作者: Jiang, Jing Li, Yanni Ye, Yinghui Feng, Dan Zhang, Jiayi Sutthiphan, Worakrin Niyato, Dusit Xi'an Uni versity of Posts and Telecommunications Shaanxi Key Laboratory of Information Communication Network and Security Xi'an710121 China Beijing Jiaotong University Frontiers Science Center for Smart High-Speed Railway System Beijing100044 China National Telecommunication Public Company Mobile System Development Department Bangkok10210 Thailand Nanyang Technological University College of Computing and Data Science Singapore
Due to the network's rapid expansion, mobile networks bear extra high deployment costs. Being a key enabler of 6th generation (6G) mobile networks, it is crucial that cell-free massive MIMO (CF mMIMO) networks ach... 详细信息
来源: 评论
WiViPose: A Video-aided Wi-Fi Framework for Environment-Independent 3D Human Pose Estimation
收藏 引用
IEEE Transactions on Multimedia 2025年
作者: Zhang, Lei Ning, Haoran Tang, Jiaxin Chen, Zhenxiang Zhong, Yaping Han, Yahong Tianjin University College of Intelligence and Computing the Tianjin Key Laboratory of Advanced Network Technology and Application Tianjin300050 China Key Laboratory of Computing Power Network and Information Security Ministry of Education China University of Jinan Shandong Provincial Key Laboratory of Ubiquitous Intelligent Computing the School of Information Science and Engineering Jinan250022 China Wuhan Sports University Sports Big-data Research Center Wuhan430079 China Tianjin University College of Intelligence and Computing the Tianjin Key Laboratory of Machine Learning Tianjin300350 China
The inherent complexity of Wi-Fi signals makes video-aided Wi-Fi 3D pose estimation difficult. The challenges include the limited generalizability of the task across diverse environments, its significant signal hetero... 详细信息
来源: 评论
Provably Secure Authenticated Key-Management Mechanism for e-Healthcare Environment
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Saleem, Muhammad Asad Li, Xiong Mahmood, Khalid Ghaffar, Zahid Xie, Yong Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu611731 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan National Yunlin University of Science and Technology Graduate School of Engineering Science and Technology Douliu64002 Taiwan Qinghai Institute of Technology School of Computer and Information Science China Qinghai Provincial Laboratory for Intelligent Computing and Application China Key Laboratory of Computing Power Network and Information Security Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security China Shandong Fundamental Research Center for Computer Science Jinan250353 China
The Internet of Things (IoT) is rapidly permeating all aspects of human life, involving a network of devices that share sensitive data. A notable application is the e-healthcare systems, which employ connected sensors... 详细信息
来源: 评论
Using Depth-Enhanced Spatial Transformation for Student Gaze Target Estimation in Dual-View Classroom Images
Using Depth-Enhanced Spatial Transformation for Student Gaze...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Haonan Miao Peizheng Zhao Yuqi Sun Fang Nan Xiaolong Zhang Yaqiang Wu Feng Tian School of Computer Science and Technology Xi’an Jiaotong University Xi’an China Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an China School of Advanced Technology Xi’an Jiaotong-Liverpool University Suzhou China Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Xi’an Jiaotong University Xi’an China
Dual-view gaze target estimation in classroom environments has not been thoroughly explored. Existing methods lack consideration of depth information, primarily focusing on 2D image information and neglecting the late... 详细信息
来源: 评论
A Hybrid-Feature-Based Autoencoder Model for Predicting Traffic Flow to Accelerate Ambulance Medical Response Time in Internet of Vehicles
收藏 引用
IEEE Internet of Things Journal 2025年 第9期12卷 11397-11407页
作者: Li, Yongmeng Tian, Yu Liu, Wenjian Gao, Longxiang Tian, Hui Xing, Lumin The First Affiliated Hospital of Shandong First Medical University Shandong Provincial Qianfoshan Hospital Shandong Key Laboratory of Digital Diagnosis and Treatment of Thoracic Oncology Shandong Engineering Research Center of Intelligent Surgery Shandong Jinan250014 China Qilu Hospital of Shandong University Department of Thoracic Surgery Shandong Jinan250012 China City University of Macau Faculty of Data Science China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250014 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan250000 China The First Affiliated Hospital of Shandong First Medical University Shandong Provincial Qianfoshan Hospital Shandong Key Laboratory of Digital Diagnosis and Treatment of Thoracic Oncology Shandong Jinan250014 China
Traffic congestion during ambulance travel can delay medical response times. With the growing availability of traffic data, computational methods for traffic flow prediction are attracting significant attention. Howev... 详细信息
来源: 评论
On the -differential spectra of two classes of power functions over finite fields
收藏 引用
Applicable Algebra in Engineering, Communication and Computing 2025年 1-30页
作者: Liu, Qian Huang, Zhiwei Chen, Zhixiong Jiang, Rong Zhang, Liupiao Key Laboratory of Information Security of Network Systems College of Computer and Data Science Fuzhou University Fuzhou China Hubei Key Laboratory of Applied Mathematics Faculty of Mathematics and Statistics Hubei University Wuhan China Yunnan Key Laboratory of Service Computing Yunnan University of Finance and Economics Kunming China Fujian Key Laboratory of Financial Information Processing Putian University Putian China School of Computer Science and Technology Dongguan University of Technology Dongguan China
Recently, a new concept called multiplicative differential was introduced by Ellingsen et al. [7]. As an extension of the differential uniformity, it is theoretically appealing to determine the properties of c-differe...
来源: 评论
MIA-UNet:Multi-Scale Iterative Aggregation U-network for Retinal Vessel Segmentation
收藏 引用
Computer Modeling in Engineering & Sciences 2021年 第11期129卷 805-828页
作者: Linfang Yu Zhen Qin Yi Ding Zhiguang Qin Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of ChinaChengdu610054China
As an important part of the new generation of information technology,the Internet of Things(IoT)has been widely concerned and regarded as an enabling technology of the next generation of health care *** fundus photogr... 详细信息
来源: 评论
CroPrompt: Cross-task Interactive Prompting for Zero-shot Spoken Language Understanding
CroPrompt: Cross-task Interactive Prompting for Zero-shot Sp...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Libo Qin Fuxuan Wei Qiguang Chen Jingxuan Zhou Shijue Huang Jiasheng Si Wenpeng Lu Wanxiang Che School of Computer Science and Engineering Central South University China Key Laboratory of Data Intelligence and Advanced Computing in Provincial Universities Soochow University China Research Center for Social Computing and Information Retrieval Harbin Institute of Technology China Harbin Institute of Technology Shenzhen China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology (Shandong Academy of Sciences)
Slot filling and intent detection are two highly correlated tasks in spoken language understanding (SLU). Recent SLU research attempts to explore zero-shot prompting techniques in large language models to alleviate th... 详细信息
来源: 评论
Threat Model and Defense Scheme for Side-Channel Attacks in Client-Side Deduplication
收藏 引用
Tsinghua Science and Technology 2023年 第1期28卷 1-12页
作者: Guanxiong Ha Hang Chen Chunfu Jia Mingyue Li College of Cyber Science Nankai UniversityTianjin 300350China Tianjin Key Laboratory of Network and Data Security Technology Tianjin 300350China
In cloud storage,client-side deduplication is widely used to reduce storage and communication *** client-side deduplication,if the cloud server detects that the user’s outsourced data have been stored,then clients wi... 详细信息
来源: 评论