咨询与建议

限定检索结果

文献类型

  • 700 篇 会议
  • 309 篇 期刊文献

馆藏范围

  • 1,009 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 521 篇 工学
    • 393 篇 计算机科学与技术...
    • 333 篇 软件工程
    • 140 篇 信息与通信工程
    • 104 篇 电气工程
    • 56 篇 控制科学与工程
    • 53 篇 电子科学与技术(可...
    • 44 篇 生物工程
    • 34 篇 机械工程
    • 33 篇 网络空间安全
    • 26 篇 光学工程
    • 24 篇 交通运输工程
    • 24 篇 生物医学工程(可授...
    • 24 篇 安全科学与工程
    • 22 篇 仪器科学与技术
    • 20 篇 化学工程与技术
    • 11 篇 动力工程及工程热...
    • 11 篇 土木工程
  • 238 篇 理学
    • 148 篇 数学
    • 49 篇 统计学(可授理学、...
    • 47 篇 物理学
    • 43 篇 生物学
    • 21 篇 系统科学
    • 18 篇 化学
  • 123 篇 管理学
    • 72 篇 管理科学与工程(可...
    • 66 篇 图书情报与档案管...
    • 22 篇 工商管理
  • 28 篇 法学
    • 16 篇 社会学
    • 14 篇 法学
  • 26 篇 医学
    • 22 篇 临床医学
    • 19 篇 基础医学(可授医学...
  • 7 篇 教育学
  • 6 篇 经济学
  • 6 篇 军事学
  • 3 篇 农学
  • 1 篇 文学

主题

  • 101 篇 feature extracti...
  • 96 篇 accuracy
  • 66 篇 semantics
  • 65 篇 computational mo...
  • 64 篇 federated learni...
  • 51 篇 data models
  • 49 篇 training
  • 37 篇 deep learning
  • 35 篇 transformers
  • 34 篇 neural networks
  • 31 篇 adaptation model...
  • 29 篇 robustness
  • 25 篇 optimization
  • 25 篇 predictive model...
  • 24 篇 data mining
  • 24 篇 privacy
  • 23 篇 measurement
  • 23 篇 attention mechan...
  • 22 篇 object detection
  • 22 篇 visualization

机构

  • 267 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 56 篇 shandong provinc...
  • 51 篇 shandong enginee...
  • 43 篇 shaanxi key labo...
  • 39 篇 school of comput...
  • 38 篇 school of comput...
  • 36 篇 shandong fundame...
  • 33 篇 shandong provinc...
  • 32 篇 shaanxi key labo...
  • 27 篇 qilu university ...
  • 20 篇 school of comput...
  • 19 篇 school of comput...
  • 17 篇 shaanxi key labo...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 15 篇 xi'an key labora...
  • 14 篇 key laboratory o...
  • 14 篇 faculty of data ...
  • 14 篇 shaanxi key labo...

作者

  • 29 篇 yichuan wang
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 23 篇 wang yichuan
  • 18 篇 xiangzhi liu
  • 18 篇 hei xinhong
  • 17 篇 shen yulong
  • 15 篇 haiyan jin
  • 14 篇 meng deyu
  • 14 篇 li wei
  • 14 篇 aimin li
  • 13 篇 guohua lv
  • 13 篇 lianhai wang
  • 13 篇 xiaohui han
  • 13 篇 mingle zhou
  • 13 篇 jin haiyan
  • 12 篇 lu wenpeng
  • 12 篇 jing zhao
  • 12 篇 delong han
  • 12 篇 chunxiao wang

语言

  • 863 篇 英文
  • 136 篇 其他
  • 16 篇 中文
检索条件"机构=Shaanxi Key Laboratory for Network Computing and Security Technology"
1009 条 记 录,以下是1001-1010 订阅
排序:
A pairing-based signcryption scheme using self-certified public keys
收藏 引用
International Journal of Computers and Applications 2007年 第3期29卷 278-282页
作者: Li, F. Xin, X. Hu, Y. School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu Sichuan 610054 China Department of Information and Computing Science Zhengzhou University of Light Industry Zhengzhou Henan 450002 China Key Laboratory of Computer Networks and Information Security Xidian University Xi'an Shaanxi 710071 China
In recent years, many pairing-based signcryption schemes have been proposed. There is, however, an inherent weakness in these schemes: the private key escrow problem, in which the "trusted" private key gener... 详细信息
来源: 评论
Robust Disaster Recovery System Model
收藏 引用
Wuhan University Journal of Natural Sciences 2006年 第1期11卷 170-174页
作者: WANG Kun SU Rui-dan LI Zeng-xin CAI Zhen ZHOU Li-hua Key Laboratory of Computer Network and Information Security of the Ministry of Education Xidian University Xi' an 710071 Shaanxi China National Information Security Engineering and Technology Research Center Beijing 100093 China
Highly security-critical system should possess features of continuous service. We present a new Robust Disaster Recovery System Model (RDRSM). Through strengthening the ability of safe communications, RDRSM guarante... 详细信息
来源: 评论
Information-Theoretic Secure Verifiable Secret Sharing over RSA Modulus
收藏 引用
Wuhan University Journal of Natural Sciences 2006年 第6期11卷 1849-1852页
作者: QIU Gang WANG Hong WEI Shimin XIAO Guozhen State Key Laboratory of Integrated Sevice Network Xidian University Xi'an 710071 Shaanxi China State Key Laboratory of Information Security Graduate University of Chinese Academy of Sciences Beijing 100049 China Department of Computer Science and Technology Huaibei Coal Normal College Huaibei 235000 Anhui China
The well-known non-interactive and information-theoretic secure verifiable secret sharing scheme presented by Pedersen is over a large prime. In this paper, we construct a novel non-interactive and information-theoret... 详细信息
来源: 评论
Disaster recovery system model with e-government case study
收藏 引用
Natural Hazards Review 2006年 第4期7卷 145-149页
作者: Wang, Kun Li, Long-Hai Yuan, Feng Zhou, Li-Hua Key Laboratory of Computer Network and Information Security Xidian Univ. Ministry of Education Xi'an 710071 Shaanxi China Dept. of Computer Science and Technology Xidian Univ. Xi'an 710071 Shaanxi China National Information Security Engineering and Technology Research Center Beijing 100093 China
We present a robust disaster recovery system model according to the requests of disaster recovery talent of a key e-government project of China. The model strengthens the safe communication ability and guarantees the ... 详细信息
来源: 评论
A Systematic Literature Review of Robust Federated Learning: Issues, Solutions, and Future Research Directions
收藏 引用
ACM computing Surveys 1000年
作者: Md Palash Uddin Yong Xiang Mahmudul Hasan Jun Bai Yao Zhao Longxiang Gao School of Information Technology Deakin University Burwood Australia Deakin University Burwood Australia Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Shandong Academy of Sciences Qilu University of Technology Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China
Federated Learning (FL) has emerged as a promising paradigm for training machine learning models across distributed devices while preserving their data privacy. However, the robustness of FL models against adversarial... 详细信息
来源: 评论
IBAQ: Frequency-Domain Backdoor Attack Threatening Autonomous Driving via Quadratic Phase
收藏 引用
ACM Transactions on Autonomous and Adaptive Systems 1000年
作者: Jinghan Qiu Honglong Chen Junjian Li Yudong Gao Junwei Li Xingang Wang College of Control Science and Engineering China University of Petroleum China the Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology China
The rapid evolution of backdoor attacks has emerged as a significant threat to the security of autonomous driving models. An attacker injects a backdoor into the model by adding triggers to the samples, which can be a... 详细信息
来源: 评论
S3 Agent: Unlocking the Power of VLLM for Zero-Shot Multi-modal Sarcasm Detection
收藏 引用
ACM Transactions on Multimedia computing, Communications, and Applications 1000年
作者: Peng Wang Yongheng Zhang Hao Fei Qiguang Chen Yukai Wang Jiasheng Si Wenpeng Lu Min Li Libo Qin School of Computer Science and Engineering Central South University China National University of Singapore Singapore Harbin Institute of Technology China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology (Shandong Academy of Sciences) China
Multi-modal sarcasm detection involves determining whether a given multi-modal input conveys sarcastic intent by analyzing the underlying sentiment. Recently, vision large language models have shown remarkable success... 详细信息
来源: 评论
Federated Semantic Learning for Privacy-preserving Cross-domain Recommendation
收藏 引用
ACM Transactions on Information Systems 1000年
作者: Ziang Lu Lei Guo Xu Yu Zhiyong Cheng Xiaohui Han Lei Zhu Shandong Normal University China China University of Petroleum (East China) China Hefei University of Technology China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology (Shandong Academy of Sciences) China Tongji University China
In the evolving landscape of recommender systems, the challenge of effectively conducting privacy-preserving Cross-Domain Recommendation (CDR), especially under strict non-overlapping constraints, has emerged as a key... 详细信息
来源: 评论
Semantic-enhanced Co-attention Prompt Learning for Non-overlapping Cross-Domain Recommendation
收藏 引用
ACM Transactions on Information Systems 1000年
作者: Lei Guo Chenlong Song Feng Guo Xiaohui Han Xiaojun Chang Lei Zhu Shandong Normal University China Liaocheng University China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology Shandong Academy of Sciences) China and Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science China Tongji University China
Non-overlapping Cross-domain Sequential Recommendation (NCSR) is the task that focuses on domain knowledge transfer without overlapping entities. Compared with traditional Cross-domain Sequential Recommendation (CSR),... 详细信息
来源: 评论