咨询与建议

限定检索结果

文献类型

  • 2,061 篇 期刊文献
  • 1,853 篇 会议
  • 1 册 图书

馆藏范围

  • 3,915 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,593 篇 工学
    • 1,673 篇 计算机科学与技术...
    • 1,354 篇 软件工程
    • 657 篇 信息与通信工程
    • 356 篇 电气工程
    • 293 篇 电子科学与技术(可...
    • 283 篇 生物工程
    • 280 篇 控制科学与工程
    • 254 篇 光学工程
    • 195 篇 机械工程
    • 186 篇 生物医学工程(可授...
    • 155 篇 化学工程与技术
    • 125 篇 仪器科学与技术
    • 87 篇 网络空间安全
    • 83 篇 动力工程及工程热...
    • 70 篇 交通运输工程
    • 65 篇 材料科学与工程(可...
    • 62 篇 安全科学与工程
    • 61 篇 建筑学
  • 1,496 篇 理学
    • 705 篇 数学
    • 562 篇 物理学
    • 310 篇 生物学
    • 222 篇 统计学(可授理学、...
    • 165 篇 化学
    • 100 篇 系统科学
  • 602 篇 管理学
    • 346 篇 管理科学与工程(可...
    • 269 篇 图书情报与档案管...
    • 115 篇 工商管理
  • 160 篇 医学
    • 128 篇 临床医学
    • 108 篇 基础医学(可授医学...
    • 67 篇 药学(可授医学、理...
  • 90 篇 法学
  • 45 篇 教育学
  • 41 篇 农学
  • 35 篇 经济学
  • 13 篇 军事学
  • 12 篇 文学
  • 11 篇 艺术学

主题

  • 129 篇 feature extracti...
  • 112 篇 semantics
  • 95 篇 deep learning
  • 80 篇 training
  • 79 篇 accuracy
  • 74 篇 computational mo...
  • 55 篇 neural networks
  • 53 篇 federated learni...
  • 50 篇 convolution
  • 48 篇 data mining
  • 48 篇 data models
  • 42 篇 object detection
  • 40 篇 image segmentati...
  • 40 篇 visualization
  • 39 篇 contrastive lear...
  • 38 篇 convolutional ne...
  • 37 篇 optimization
  • 37 篇 predictive model...
  • 37 篇 cryptography
  • 36 篇 machine learning

机构

  • 269 篇 iccub universita...
  • 269 篇 university of ch...
  • 265 篇 department of ph...
  • 263 篇 infn sezione di ...
  • 261 篇 universiteit maa...
  • 261 篇 school of physic...
  • 257 篇 infn sezione di ...
  • 257 篇 cavendish labora...
  • 257 篇 infn sezione di ...
  • 254 篇 h.h. wills physi...
  • 253 篇 van swinderen in...
  • 253 篇 infn sezione di ...
  • 250 篇 horia hulubei na...
  • 243 篇 department of ph...
  • 236 篇 imperial college...
  • 236 篇 institute of par...
  • 233 篇 stfc rutherford ...
  • 225 篇 shandong provinc...
  • 218 篇 infn sezione di ...
  • 207 篇 ds4ds la salle u...

作者

  • 181 篇 barter w.
  • 180 篇 brundu d.
  • 160 篇 aliouche z.
  • 160 篇 blake t.
  • 160 篇 betancourt c.
  • 160 篇 belin s.
  • 160 篇 amato s.
  • 159 篇 borsato m.
  • 159 篇 birch m.
  • 159 篇 boettcher t.
  • 158 篇 bellee v.
  • 158 篇 atzeni m.
  • 156 篇 cali s.
  • 153 篇 andreianov a.
  • 152 篇 boelhauve j.a.
  • 152 篇 beck a.
  • 151 篇 bowcock t.j.v.
  • 150 篇 barbetti m.
  • 150 篇 byczynski w.
  • 150 篇 bencivenni g.

语言

  • 3,497 篇 英文
  • 331 篇 其他
  • 94 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=School of Computer Science and Technology Shaanxi Provincial Key Laboratory of Computer Networks"
3915 条 记 录,以下是511-520 订阅
排序:
Collaborative Teams Recruitment Based on Dual Constraints of Willingness and Trust for Crowd Sensing  25
Collaborative Teams Recruitment Based on Dual Constraints of...
收藏 引用
25th IEEE International Conference on computer Supported Cooperative Work in Design, CSCWD 2022
作者: Song, Nianyun Lu, Dianjie Shi, Yepeng Zhang, Guijuan Liu, Hong School of Information Science and Engineering Shandong Normal University Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology State Key Laboratory of High-end Server and Storage Technology Shandong Jinan China
As crowd sensing tasks become more complex, it is increasingly needed for participants to form teams to collaborate interactively in order to complete tasks more efficiently. It is valuable to fully understand user be... 详细信息
来源: 评论
Data-Driven Crowd Motion Modeling With Group Properties Analysis  25
Data-Driven Crowd Motion Modeling With Group Properties Anal...
收藏 引用
25th IEEE International Conference on computer Supported Cooperative Work in Design, CSCWD 2022
作者: Jia, Chuanhua Lu, Dianjie Zhang, Guijuan Liu, Hong School of Information Science and Engineering Shandong Normal University Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology State Key Laboratory of High-end Server and Storage Technology Shandong Jinan China
Traditional crowd evacuation simulation methods focus on the analysis of individual behavior in the crowd, but ignore the analysis of potential group properties in the process of crowd motion, which reduces the visual... 详细信息
来源: 评论
A New Approach to Detecting and Analyzing Monkey Activities Using the Improved YOLOv5  3
A New Approach to Detecting and Analyzing Monkey Activities ...
收藏 引用
3rd International Conference on Machine Learning and computer Application, ICMLCA 2022
作者: Shen, Biao Zhang, Zhiyi Wang, Qishun Tu, Zhengzheng Liu, Ning Anhui Provincial Key Laboratory of Multimodal Cognitive Computation School of Computer Science and Technology Anhui University Hefei230601 China Institute of Artificial Intelligence Hefei Comprehensive National Science Center Hefei230088 China State Key Laboratory of Brain and Cognitive Science Institute of Biophysics Chinese Academy of Sciences Beijing100101 China
With the development of science and technology, video equipment has become popular in laboratories. Researchers using animals (e.g., macaques) as models often collect a large number of animal behavior videos for the r... 详细信息
来源: 评论
A Community Detection Approach for Academic Social Network: The Case of the Cross-Strait Academic Conference Network  3
A Community Detection Approach for Academic Social Network: ...
收藏 引用
3rd International Conference on Electronics, Communications and Information technology, CECIT 2022
作者: Zhang, Xinxin Xu, Li Gao, Min Fan, Jianxi Sun, Hung-Min Fujian Normal University College of Computer and Cyber Security Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou China Fudan University The School of Computer Science Shanghai China Soochow University The School of Computer Science and Technology Suzhou China National Tsing Hua University The Department of Computer Science Hsinchu Taiwan
With the fast development of information networks, academic social network analysis has attracted significant attention, we regard these researchers sharing common interests as a research community. The community has ... 详细信息
来源: 评论
GS-Hider: hiding messages into 3D Gaussian splatting  24
GS-Hider: hiding messages into 3D Gaussian splatting
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing Systems
作者: Xuanyu Zhang Jiarui Meng Runyi Li Zhipei Xu Yongbing Zhang Jian Zhang School of Electronic and Computer Engineering Peking University and Guangdong Provincial Key Laboratory of Ultra High Definition Immersive Media Technology Peking University Shenzhen Graduate School School of Computer Science and Technology Harbin Institute of Technology (Shenzhen)
3D Gaussian Splatting (3DGS) has already become the emerging research focus in the fields of 3D scene reconstruction and novel view synthesis. Given that training a 3DGS requires a significant amount of time and compu...
来源: 评论
Find the Bad Apples: An efficient method for perfect key recovery under imperfect SCA oracles – A case study of Kyber
IACR Transactions on Cryptographic Hardware and Embedded Sys...
收藏 引用
IACR Transactions on Cryptographic Hardware and Embedded Systems 2022年 第1期2023卷 89-112页
作者: Shen, Muyan Cheng, Chi Zhang, Xiaohan Guo, Qian Jiang, Tao Hubei Key Laboratory of Intelligent Geo-Information Processing School of Computer Science China University of Geosciences Wuhan China State Key Laboratory of Integrated Services Networks Xidian University Xian China Lund University Lund Sweden Research Center of 6G Mobile Communications School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China
Side-channel resilience is a crucial feature when assessing whether a post-quantum cryptographic proposal is sufficiently mature to be deployed. In this paper, we propose a generic and efficient adaptive approach to i... 详细信息
来源: 评论
A Multi-direction Prediction Multi-objective Hybrid Chemical Reaction Optimization Algorithm for Dynamic Multi-objective Optimization  16th
A Multi-direction Prediction Multi-objective Hybrid Chemical...
收藏 引用
16th International Conference on Bio-Inspired Computing: Theories and Applications, BIC-TA 2021
作者: Li, Hongye Pan, Xiaoying Gan, Wei Wang, Lei School of Computer Science and Technology Xi’an University of Posts and Telecommunications Shaanxi Xi’an710121 China Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Shaanxi Xi’an710121 China Xi’an Key Laboratory of Big Data and Intelligent Computing Shaanxi Xi’an710121 China Xi’an Shiyou University Shaanxi Xi’an710065 China School of Computer Science and Engineering Xi’an University of Technology Xi’an710048 China Shaanxi University of Technology Shaanxi Han Zhong723001 China
The challenge of solving dynamic multi-objective optimization problems is to trace the varying Pareto optimal front and/or Pareto optimal set quickly and efficiently. This paper proposes a multi-direction prediction s... 详细信息
来源: 评论
Joint Waveform and Passive Beamforming Design for IRS-Aided ISAC via Deep Unfolding  16
Joint Waveform and Passive Beamforming Design for IRS-Aided ...
收藏 引用
16th International Conference on Wireless Communications and Signal Processing, WCSP 2024
作者: Zhang, Jifa Liu, Mingqian Tang, Jie Zhao, Nan Niyato, Dusit Wang, Xianbin School of Information and Communication Engineering Dalian University of Technology Dalian China Xidian University State Key Laboratory of Integrated Service Networks Xi'an China School of Electronic and Information Engineering South China University of Technology Guangzhou China School of Computer Science and Engineering Nanyang Technological University Singapore Western University Department of Electrical and Computer Engineering LondonONN6A 5B9 Canada
Integrated sensing and communication (ISAC) has become a promising technique to alleviate the spectrum congestion via sharing the same spectrum for communication and sensing. Nevertheless, many ISAC schemes encounter ... 详细信息
来源: 评论
A Chaotic Encryption Algorithm with Dynamic key Enabled by Power-Division Multiplexed Transmission
A Chaotic Encryption Algorithm with Dynamic Key Enabled by P...
收藏 引用
2023 Asia Communications and Photonics Conference/2023 International Photonics and Optoelectronics Meetings, ACP/POEM 2023
作者: Ding, Yinchen Lei, Yi Lu, Qi Guo, Zhongyi Chen, Bin School of Computer Science and Information Engineering Hefei University of Technology Hefei China Hefei University of Technology Intelligent Interconnected Systems Laboratory of Anhui Province Hefei China Shanghai Jiao Tong University State Key Laboratory of Advanced Optical Communication Systems and Networks China
Using power-division multiplexing, a chaotic encryption method is proposed based on dynamic key generated from the instantaneously transmitted information. The influence of power allocation is analyzed and the securit... 详细信息
来源: 评论
Unknown-Aware Bilateral Dependency Optimization for Defending Against Model Inversion Attacks
收藏 引用
IEEE Transactions on Pattern Analysis and Machine Intelligence 2025年 PP卷 PP页
作者: Peng, Xiong Liu, Feng Wang, Nannan Lan, Long Liu, Tongliang Cheung, Yiu-Ming Han, Bo Hong Kong Baptist University Department of Computer Science Hong Kong The University of Melbourne School of Computing and Information Systems Australia Xidian University State Key Laboratory of Integrated Services Networks School of Telecommunications Engineering Shaanxi Xi'an710071 China National University of Defense Technology State Key Laboratory of High Performance Computing School of Computer Hunan Changsha410000 China The University of Sydney Sydney AI Centre School of Computer Science Faculty of Engineering Australia
By abusing access to a well-trained classifier, model inversion (MI) attacks pose a significant threat as they can recover the original training data, leading to privacy leakage. Previous studies mitigated MI attacks ... 详细信息
来源: 评论