咨询与建议

限定检索结果

文献类型

  • 561 篇 会议
  • 181 篇 期刊文献

馆藏范围

  • 742 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 347 篇 工学
    • 272 篇 计算机科学与技术...
    • 233 篇 软件工程
    • 83 篇 信息与通信工程
    • 75 篇 电气工程
    • 41 篇 控制科学与工程
    • 30 篇 电子科学与技术(可...
    • 26 篇 生物工程
    • 26 篇 网络空间安全
    • 24 篇 机械工程
    • 21 篇 光学工程
    • 20 篇 交通运输工程
    • 20 篇 安全科学与工程
    • 16 篇 生物医学工程(可授...
    • 11 篇 仪器科学与技术
    • 11 篇 化学工程与技术
    • 9 篇 土木工程
    • 8 篇 建筑学
  • 154 篇 理学
    • 96 篇 数学
    • 36 篇 物理学
    • 27 篇 统计学(可授理学、...
    • 25 篇 生物学
    • 10 篇 系统科学
    • 9 篇 化学
  • 81 篇 管理学
    • 50 篇 管理科学与工程(可...
    • 46 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 25 篇 法学
    • 14 篇 社会学
    • 13 篇 法学
  • 13 篇 医学
    • 12 篇 临床医学
    • 9 篇 基础医学(可授医学...
  • 5 篇 教育学
  • 4 篇 经济学
  • 3 篇 军事学
  • 2 篇 农学
  • 1 篇 文学

主题

  • 88 篇 feature extracti...
  • 69 篇 accuracy
  • 54 篇 semantics
  • 47 篇 computational mo...
  • 44 篇 data models
  • 38 篇 federated learni...
  • 37 篇 training
  • 31 篇 neural networks
  • 28 篇 deep learning
  • 26 篇 transformers
  • 22 篇 predictive model...
  • 22 篇 adaptation model...
  • 19 篇 data mining
  • 19 篇 benchmark testin...
  • 19 篇 privacy
  • 18 篇 noise
  • 18 篇 visualization
  • 18 篇 attention mechan...
  • 17 篇 object detection
  • 17 篇 speech processin...

机构

  • 228 篇 key laboratory o...
  • 199 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 43 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 38 篇 shandong fundame...
  • 37 篇 school of comput...
  • 32 篇 shaanxi key labo...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 24 篇 shandong provinc...
  • 16 篇 qilu university ...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 tianjin key labo...
  • 13 篇 key laboratory o...
  • 13 篇 key laboratory o...
  • 11 篇 xi'an university...
  • 11 篇 faculty of data ...

作者

  • 29 篇 yichuan wang
  • 24 篇 xinhong hei
  • 24 篇 wang yichuan
  • 20 篇 xiaoming wu
  • 19 篇 hei xinhong
  • 15 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 14 篇 li wei
  • 13 篇 guohua lv
  • 13 篇 mingle zhou
  • 13 篇 jin haiyan
  • 13 篇 aimin li
  • 12 篇 lu wenpeng
  • 12 篇 xiaohui han
  • 12 篇 delong han
  • 12 篇 lei zhu
  • 12 篇 wenpeng lu
  • 11 篇 jing zhao
  • 11 篇 fu chong
  • 11 篇 wei zhang

语言

  • 677 篇 英文
  • 64 篇 其他
  • 4 篇 中文
检索条件"机构=Shannxi Key Laboratory for Network Computing and Security Technology"
742 条 记 录,以下是731-740 订阅
排序:
Enhancing fairness: A novel C2C e-commerce community member reputation algorithm based on transaction social networks
Enhancing fairness: A novel C2C e-commerce community member ...
收藏 引用
IADIS International Conference WWW/Internet 2010
作者: Feng, Wangsen Zhang, Bei Xia, Yunni Li, Jiajing Meng, Tao Key Laboratory of Network and Software Security Assurance of Ministry of Education Computing Center Peking University Beijing 100871 China College of Computer Science Chongqing University Chongqing 400044 China School of Mechanical Electronic and Information Engineering China University of Mining and Technology Beijing 100083 China Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China
Today, almost all the C2C e-commerce community member reputation evaluating algorithms are time sensitive. The reputation of a community member is accumulated after transactions and the increment of reputation after a... 详细信息
来源: 评论
Threshold Signature Scheme Based on Non-internative Diffie-Hellman Signature
Threshold Signature Scheme Based on Non-internative Diffie-H...
收藏 引用
International Conference on networking and Distributed computing (ICNDC)
作者: Xiuqun Wang Lican Huang Key Laboratory of Information System Security Ministry of Education Tsinghua University Beijing China Institute of Network and Distributed Computing Zhejiang Science and Technology University Hangzhou China
We present a threshold signature based on non-internative Diffie-Hellman signature. It works in asynchronous communication system and can tolerate Byzantine faults with optimal resilience n ≥ = 3t + 1, where n is the... 详细信息
来源: 评论
A collaborative framework for privacy protection in online social networks
A collaborative framework for privacy protection in online s...
收藏 引用
International Conference on Collaborative computing: networking, Applications and Worksharing (CollaborateCom)
作者: Yan Zhu Zexing Hu Huaixi Wang Hongxin Hu Gail-Joon Ahn Key Laboratory of Network and Software Security Assurance Ministry of Education Peking University China Institute of Computer Science and Technology Peking University Beijing China School of Mathematical Sciences Peking University Beijing China Laboratory of Security Engineering for Future Computing (SEFCOM) Arizona State University Tempe AZ USA
With the wide use of online social networks (OSNs), the problem of data privacy has attracted much attention. Several approaches have been proposed to address this issue. One of privacy management approaches for OSN l... 详细信息
来源: 评论
Analysis and computing of Association Degree of SMS Feature Words
Analysis and Computing of Association Degree of SMS Feature ...
收藏 引用
International Conference on networking and Services (ICNS)
作者: Qindong Sun Hongli Qiao Nan Wang Network Computing and Security Key Laboratory of Shaanxi Xi''an University of Technology Xi'an China MOE Key Laboratory of Intelligent and Network Security Xi''an Jiaotong University Xi'an China
How to judge the relationship between mobile short messages is the key technology of mobile short message topic detection. The characteristics of the mobile SMS text are discussed in this paper, and the association of... 详细信息
来源: 评论
SkyF2F: Censorship Resistant via Skype Overlay network
SkyF2F: Censorship Resistant via Skype Overlay Network
收藏 引用
WASE International Conference on Information Engineering, ICIE
作者: Shoufeng Cao Longtao He Zhongxian Li Yixian Yang Information Security Center State Key Laboratory of Networking and Switching Technology Key Laboratory of network and information attack & defence technology of MOE Beijing University of Posts and Telecommunications China Research Center of Information Security Institute of Computing Technology Chinese Academy and Sciences Beijing China
Internet censorship is on the rise as an increasing number of countries and companies block or monitor access to parts of the Internet. Many censorship resistant systems have been proposed, which rely on deploying man... 详细信息
来源: 评论
security and trust in digital rights management: A survey
收藏 引用
International Journal of network security 2009年 第3期9卷 247-263页
作者: Zhang, Zhiyong Pei, Qingqi Ma, Jianfeng Yang, Lin Ministry Of Education Key Laboratory of Computer Network and Information Security Xidian University Taibai South Road No.2 Xi'an Shannxi 710071 China Electronic Information Engineering College Henan University of Science and Technology Xiyuan Road No.48 Luoyang Henan 471003 China The Research Institute China Electronic Equipment and Systems Engineering Corporation Dacheng Road 13 Beijing 100141 China
A successful transaction of digital contents is primarily dependent on security policies, trust relationships and benefit equilibriums among various participants in a DRM (Digital Rights Management)-enabling contents ... 详细信息
来源: 评论
Quick Finding of network Video Stream
Quick Finding of Network Video Stream
收藏 引用
International Conference on Computer Science and Information technology (CSIT)
作者: Qindong Sun Shengli Li Xiaojun Guo Network Computing and Security Key Laboratory of Shaanxi Xi'an University of Technology Xi'an China School of Electronics and Information Engineering Xi'an Jiaotong University Xi'an China Department of Research and Development Xi'an Anzhi Science and Technology Corporation Xi'an China
network video technology develops quickly in recent years and the applications of network video are various. The effectively managing of the application based on network video is necessary for network flow management,... 详细信息
来源: 评论
A Systematic Literature Review of Robust Federated Learning: Issues, Solutions, and Future Research Directions
收藏 引用
ACM computing Surveys 1000年
作者: Md Palash Uddin Yong Xiang Mahmudul Hasan Jun Bai Yao Zhao Longxiang Gao School of Information Technology Deakin University Burwood Australia Deakin University Burwood Australia Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Shandong Academy of Sciences Qilu University of Technology Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China
Federated Learning (FL) has emerged as a promising paradigm for training machine learning models across distributed devices while preserving their data privacy. However, the robustness of FL models against adversarial... 详细信息
来源: 评论
IBAQ: Frequency-Domain Backdoor Attack Threatening Autonomous Driving via Quadratic Phase
收藏 引用
ACM Transactions on Autonomous and Adaptive Systems 1000年
作者: Jinghan Qiu Honglong Chen Junjian Li Yudong Gao Junwei Li Xingang Wang College of Control Science and Engineering China University of Petroleum China the Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology China
The rapid evolution of backdoor attacks has emerged as a significant threat to the security of autonomous driving models. An attacker injects a backdoor into the model by adding triggers to the samples, which can be a... 详细信息
来源: 评论
S3 Agent: Unlocking the Power of VLLM for Zero-Shot Multi-modal Sarcasm Detection
收藏 引用
ACM Transactions on Multimedia computing, Communications, and Applications 1000年
作者: Peng Wang Yongheng Zhang Hao Fei Qiguang Chen Yukai Wang Jiasheng Si Wenpeng Lu Min Li Libo Qin School of Computer Science and Engineering Central South University China National University of Singapore Singapore Harbin Institute of Technology China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology (Shandong Academy of Sciences) China
Multi-modal sarcasm detection involves determining whether a given multi-modal input conveys sarcastic intent by analyzing the underlying sentiment. Recently, vision large language models have shown remarkable success... 详细信息
来源: 评论