咨询与建议

限定检索结果

文献类型

  • 2,051 篇 期刊文献
  • 1,850 篇 会议
  • 1 册 图书

馆藏范围

  • 3,902 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,582 篇 工学
    • 1,654 篇 计算机科学与技术...
    • 1,368 篇 软件工程
    • 647 篇 信息与通信工程
    • 346 篇 电气工程
    • 289 篇 电子科学与技术(可...
    • 282 篇 生物工程
    • 264 篇 光学工程
    • 259 篇 控制科学与工程
    • 198 篇 机械工程
    • 188 篇 生物医学工程(可授...
    • 155 篇 化学工程与技术
    • 127 篇 仪器科学与技术
    • 86 篇 网络空间安全
    • 83 篇 动力工程及工程热...
    • 71 篇 交通运输工程
    • 65 篇 材料科学与工程(可...
    • 62 篇 建筑学
    • 61 篇 安全科学与工程
  • 1,491 篇 理学
    • 699 篇 数学
    • 563 篇 物理学
    • 310 篇 生物学
    • 224 篇 统计学(可授理学、...
    • 165 篇 化学
    • 100 篇 系统科学
  • 604 篇 管理学
    • 349 篇 管理科学与工程(可...
    • 270 篇 图书情报与档案管...
    • 117 篇 工商管理
  • 158 篇 医学
    • 129 篇 临床医学
    • 108 篇 基础医学(可授医学...
    • 67 篇 药学(可授医学、理...
  • 91 篇 法学
  • 49 篇 教育学
  • 41 篇 农学
  • 35 篇 经济学
  • 13 篇 军事学
  • 12 篇 文学
  • 11 篇 艺术学

主题

  • 128 篇 feature extracti...
  • 112 篇 semantics
  • 93 篇 deep learning
  • 81 篇 training
  • 79 篇 accuracy
  • 74 篇 computational mo...
  • 55 篇 neural networks
  • 53 篇 federated learni...
  • 50 篇 convolution
  • 48 篇 data mining
  • 48 篇 data models
  • 42 篇 object detection
  • 42 篇 image segmentati...
  • 40 篇 visualization
  • 39 篇 contrastive lear...
  • 38 篇 convolutional ne...
  • 37 篇 optimization
  • 37 篇 predictive model...
  • 37 篇 cryptography
  • 36 篇 machine learning

机构

  • 269 篇 iccub universita...
  • 269 篇 university of ch...
  • 265 篇 department of ph...
  • 263 篇 infn sezione di ...
  • 261 篇 universiteit maa...
  • 261 篇 school of physic...
  • 257 篇 infn sezione di ...
  • 257 篇 cavendish labora...
  • 257 篇 infn sezione di ...
  • 254 篇 h.h. wills physi...
  • 253 篇 van swinderen in...
  • 253 篇 infn sezione di ...
  • 250 篇 horia hulubei na...
  • 243 篇 department of ph...
  • 238 篇 imperial college...
  • 238 篇 institute of par...
  • 235 篇 stfc rutherford ...
  • 225 篇 shandong provinc...
  • 218 篇 infn sezione di ...
  • 207 篇 ds4ds la salle u...

作者

  • 181 篇 barter w.
  • 180 篇 brundu d.
  • 160 篇 aliouche z.
  • 160 篇 blake t.
  • 160 篇 betancourt c.
  • 160 篇 belin s.
  • 160 篇 amato s.
  • 159 篇 borsato m.
  • 159 篇 birch m.
  • 159 篇 boettcher t.
  • 158 篇 bellee v.
  • 158 篇 atzeni m.
  • 156 篇 cali s.
  • 153 篇 andreianov a.
  • 152 篇 boelhauve j.a.
  • 152 篇 beck a.
  • 151 篇 bowcock t.j.v.
  • 151 篇 bencivenni g.
  • 150 篇 barbetti m.
  • 150 篇 byczynski w.

语言

  • 3,522 篇 英文
  • 292 篇 其他
  • 95 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=School of Computer Science and Technology Shaanxi Provincial Key Laboratory of Computer Networks"
3902 条 记 录,以下是691-700 订阅
排序:
Impact Analysis of Moving Target Defense on the Small-Signal Stability in Power Systems
Impact Analysis of Moving Target Defense on the Small-Signal...
收藏 引用
Industrial Cyber-Physical Systems (ICPS)
作者: Bingdong Wang Junjie Song Liang Wan Youliang Tian Xin Wang Zhenyong Zhang State Key Laboratory of Public Big Data and the College of Computer Science and Technology Guizhou University Guiyang China Shandong Provincial Key Laboratory of Computer Networks Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan P. R. China
Advanced communication infrastructure makes the power system smarter but also introduces cybersecurity issues. False data injection attack (FDIA) is a kind of cyberattack that can cause significant damage to the power... 详细信息
来源: 评论
DDoS Attack Detection Based on Information Entropy Feature Extraction in Software Defined networks
DDoS Attack Detection Based on Information Entropy Feature E...
收藏 引用
International Conference on Networking and Network Applications (NaNA)
作者: Wenjiang Ji Yixin Yang Yaling Zhang Yichuan Wang Mengjie Tian Yuan Qiu School of computer science and engineering Xi'an University of technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology
Distributed Denial of Service(DDoS) attacks target the forwarding-control separation feature of Software-Defined Networking(SDN) to launch attacks, causing network disruptions. Therefore security against DDoS attack d...
来源: 评论
Fairness of Large Music Models: From a Culturally Diverse Perspective
Fairness of Large Music Models: From a Culturally Diverse Pe...
收藏 引用
IEEE International Conference on Data science in Cyberspace (DSC)
作者: Qinyuan Wang Bruce Gu He Zhang Yunfeng Li School of Music University of Sydney NSW Australia Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China CNPIEC KEXIN Ltd Beijing China
This paper explores the fairness of large music models in generating culturally diverse musical compositions, emphasizing the need for inclusivity and equity in AI-generated music. By analyzing popular datasets such a... 详细信息
来源: 评论
HUNTER: Releasing Persistent Memory Write Performance with A Novel PM-DRAM Collaboration Architecture
HUNTER: Releasing Persistent Memory Write Performance with A...
收藏 引用
Design Automation Conference
作者: Yanqi Pan Yifeng Zhang Wen Xia Xiangyu Zou Cai Deng School of Computer Science and Technology Harbin Institute of Technology Shenzhen China Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies
We present HUNTER, a POSIX-compliant persistent memory (PM) file system that fully releases PM’s write performance. Compared to state-of-the-art ones, HUNTER proposes a novel PM-DRAM collaboration architecture to sig...
来源: 评论
Evolutionary Trigger Detection and Lightweight Model Repair Based Backdoor Defense
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Qi Ye, Zipeng Tang, Yubo Luo, Wenjian Shi, Yuhui Jia, Yan Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies School of Computer Science and Technology Harbin Institute of Technology Guangdong Shenzhen518055 China The Peng Cheng Laboratory Guangdong Shenzhen518055 China School of Computer Science and Engineering Southern University of Science and Technology Guangdong Shenzhen518055 China
Deep Neural networks (DNNs) have been widely used in many areas. However, DNN model is fragile to backdoor attacks. A backdoor in the DNN model can be activated by a poisoned input with trigger and leads to wrong pred... 详细信息
来源: 评论
Joint Extraction of Entities and Relationships from Cyber Threat Intelligence based on Task-specific Fourier Network
Joint Extraction of Entities and Relationships from Cyber Th...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Haiqing Lv Xiaohui Han Hui Cui Peipei Wang Wenbo Zuo Yang Zhou Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Quan Cheng Laboratory Jinan China
The increasing complexity of cyber threats and the emergence of new attack technologies have brought huge challenges to attack incident analysis and source tracing. Using cyber threat intelligence to build a Cyber sec... 详细信息
来源: 评论
Enhance Sketch Recognition’s Explainability via Semantic Component-Level Parsing
arXiv
收藏 引用
arXiv 2023年
作者: Zhu, Guangming Wang, Siyuan Wu, Tianci Zhang, Liang School of Computer Science and Technology Xidian University China Key Laboratory of Smart Human-Computer Interaction and Wearable Technology of Shaanxi Province China Xi’an Key Laboratory of Intelligent Software Engineering China
Free-hand sketches are appealing for humans as a universal tool to depict the visual world. Humans can recognize varied sketches of a category easily by identifying the concurrence and layout of the intrinsic semantic... 详细信息
来源: 评论
Deny Whatever You Want: Dual-Deniable Public-key Encryption  28th
Deny Whatever You Want: Dual-Deniable Public-Key Encryption
收藏 引用
28th IACR International Conference on Practice and Theory of Public key Cryptography, PKC 2025
作者: An, Zhiyuan Zhang, Fangguo School of Computer Science and Engineering Sun Yat-sen University Guangzhou510006 China Guangdong Provincial Key Laboratory of Information Security Technology Guangzhou510006 China
We introduce an enhanced requirement of deniable public key encryption that we call dual-deniability. It asks that a sender who is coerced should be able to produce fake randomness, which can explain the target cipher... 详细信息
来源: 评论
Internet of Digital Twin: Framework, Applications and Enabling Technologies
收藏 引用
IEEE Communications Surveys and Tutorials 2025年
作者: Liu, Ruhan Luan, Tom H. Qu, Youyang Xiang, Yong Gao, Longxiang Zhao, Dongmei Deakin University School of Info Technology MelbourneVIC3125 Australia Xi'an Jiaotong University School of Cyber Science and Engineering Shaanxi Xi'an710049 China Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Jinan China McMaster University Department of Electrical and Computer Engineering HamiltonON Canada
Intelligent physical systems, such as smart vehicles and robotic arms, are increasingly integrated into both industrial and everyday applications. However, the systems typically face hardware limitations that constrai... 详细信息
来源: 评论
Loc4Plan: Locating Before Planning for Outdoor Vision and Language Navigation
arXiv
收藏 引用
arXiv 2024年
作者: Tian, Huilin Meng, Jingke Zheng, Wei-Shi Li, Yuan-Ming Yan, Junkai Zhang, Yunong School of Computer Science and Engineering Sun Yat-sen University Guangzhou China School of Computer Science and Engineering Sun Yat-sen University Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education Guangdong Provincial Key Laboratory of Information Security Technology Guangzhou China
Vision and Language Navigation (VLN) is a challenging task that requires agents to understand instructions and navigate to the destination in a visual environment. One of the key challenges in outdoor VLN is keeping t... 详细信息
来源: 评论