咨询与建议

限定检索结果

文献类型

  • 293 篇 会议
  • 245 篇 期刊文献

馆藏范围

  • 538 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 330 篇 工学
    • 259 篇 计算机科学与技术...
    • 214 篇 软件工程
    • 79 篇 信息与通信工程
    • 67 篇 电气工程
    • 32 篇 生物工程
    • 30 篇 网络空间安全
    • 25 篇 控制科学与工程
    • 21 篇 电子科学与技术(可...
    • 20 篇 机械工程
    • 18 篇 光学工程
    • 18 篇 生物医学工程(可授...
    • 16 篇 安全科学与工程
    • 13 篇 交通运输工程
    • 12 篇 仪器科学与技术
    • 11 篇 建筑学
    • 9 篇 化学工程与技术
  • 141 篇 理学
    • 78 篇 数学
    • 37 篇 生物学
    • 32 篇 物理学
    • 28 篇 统计学(可授理学、...
    • 11 篇 化学
  • 71 篇 管理学
    • 46 篇 管理科学与工程(可...
    • 32 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 23 篇 法学
    • 15 篇 社会学
    • 9 篇 法学
  • 18 篇 医学
    • 16 篇 临床医学
    • 14 篇 基础医学(可授医学...
    • 14 篇 公共卫生与预防医...
  • 13 篇 经济学
    • 13 篇 应用经济学
  • 7 篇 农学
  • 7 篇 军事学
  • 3 篇 教育学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 30 篇 semantics
  • 29 篇 feature extracti...
  • 23 篇 accuracy
  • 22 篇 federated learni...
  • 21 篇 training
  • 20 篇 privacy
  • 19 篇 computational mo...
  • 18 篇 deep learning
  • 12 篇 data privacy
  • 12 篇 image segmentati...
  • 12 篇 neural networks
  • 11 篇 data models
  • 10 篇 internet of thin...
  • 10 篇 anomaly detectio...
  • 10 篇 speech processin...
  • 10 篇 contrastive lear...
  • 10 篇 visualization
  • 10 篇 network security
  • 10 篇 cloud computing
  • 9 篇 optimization

机构

  • 69 篇 shandong provinc...
  • 67 篇 key laboratory o...
  • 52 篇 tianjin key labo...
  • 49 篇 network and data...
  • 45 篇 shandong enginee...
  • 43 篇 college of compu...
  • 35 篇 college of cyber...
  • 18 篇 state key labora...
  • 17 篇 shandong fundame...
  • 16 篇 tianjin key labo...
  • 14 篇 tianjin key labo...
  • 13 篇 fujian provincia...
  • 12 篇 faculty of data ...
  • 11 篇 shandong enginee...
  • 10 篇 key laboratory o...
  • 10 篇 school of inform...
  • 9 篇 school of comput...
  • 9 篇 network and data...
  • 9 篇 haihe lab of ita...
  • 9 篇 qilu university ...

作者

  • 17 篇 qin zhen
  • 15 篇 qin zhiguang
  • 13 篇 li tao
  • 12 篇 zhen qin
  • 12 篇 fu fang-wei
  • 12 篇 jia chunfu
  • 11 篇 ding yi
  • 11 篇 jing zhao
  • 11 篇 xiong jinbo
  • 10 篇 tian youliang
  • 10 篇 youliang tian
  • 10 篇 liu bin
  • 9 篇 liu jun
  • 9 篇 yi ding
  • 9 篇 jinbo xiong
  • 9 篇 zhenyu yang
  • 9 篇 zhang hongbin
  • 8 篇 qing yu
  • 8 篇 zhao dongmei
  • 7 篇 cao mingsheng

语言

  • 500 篇 英文
  • 33 篇 其他
  • 6 篇 中文
检索条件"机构=Tianjin Key Laboratory of Network and Data Security Technology"
538 条 记 录,以下是181-190 订阅
排序:
Improved Canopy-FCM algorithm based on MapReduce
Improved Canopy-FCM algorithm based on MapReduce
收藏 引用
International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI)
作者: Qing Yu Zhimin Ding Tianjin Key Laboratory of Intelligence Computing and Network Security Tianjin University of Technology Tianjin China
In order to solve the problem that FCM algorithm is sensitive to initial clustering center, we use Canopy algorithm to conduct the quick rough clustering. In the meantime, to avoid the blindness of Canopy algorithm, w... 详细信息
来源: 评论
Sentiment Analysis of Web Text Based on Deep Learning with a Attention Mechanism
Sentiment Analysis of Web Text Based on Deep Learning with a...
收藏 引用
International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI)
作者: Qing Yu Hui Zhao Kaiwen Jiang Tianjin Key Laboratory of Intelligence Computing and Network Security Tianjin University of Technology Tianjin China
The sentiment analysis of online commentary is a hot research topic in the field of network information mining. Traditional text sentiment analysis methods are mainly based on emotional dictionaries or machine learnin...
来源: 评论
A Lightweight Anonymous key Agreement Scheme in V2G networks  2
A Lightweight Anonymous Key Agreement Scheme in V2G Networks
收藏 引用
2nd International Conference on Frontiers of Electronics, Information and Computation Technologies, ICFEICT 2022
作者: Chendong, Huang Feng, Wang Zhongming, Huang Fujian University of Technology School of Computer Science and Mathematics Fujian Provincial Key Laboratory of Big Data Mining and Applications Fuzhou China Fujian Normal University Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou China
Electric vehicle access to the grid (V2G) technology enables bidirectional interaction of energy and information between electric vehicles and the grid. The energy transactions between electric vehicles and the power ... 详细信息
来源: 评论
Interesting Near-boundary data: Inferring Model Ownership for DNNs
Interesting Near-boundary Data: Inferring Model Ownership fo...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Zhe Sun Zongwen Yang Zhongyu Huang Yu Zhang Jianzhong Zhang Tianjin Key Laboratory of Network and Data Security Technology College of Cyber Science College of Computer Science Nankai University Tianjin China
Deep neural networks (DNNs) require expensive training, which is why the protection of model intellectual property (IP) is becoming more critical. Recently, model stealing has emerged frequently, and many researchers ...
来源: 评论
Least squares twin SVM decision tree for multi-class classification
Least squares twin SVM decision tree for multi-class classif...
收藏 引用
International Congress on Image and Signal Processing, BioMedical Engineering and Informatics
作者: Qing Yu Lihui Wang Tianjin Key Laboratory of Intelligence Computing and Network Security Tianjin University of Technology China
In order to solve multi-class classification problem in real world, we improved TSVM in this paper. We combined LSTSVM with partial binary tree to improve classification efficiency. Binary tree hierarchy can solved th... 详细信息
来源: 评论
Deep Learning Algorithms Design and Implementation Based on Differential Privacy  3rd
Deep Learning Algorithms Design and Implementation Based on ...
收藏 引用
3rd International Conference on Machine Learning for Cyber security, ML4CS 2020
作者: Xu, Xuefeng Yao, Yanqing Cheng, Lei Key Laboratory of Aerospace Network Security Ministry of industry and information technology School of Cyberspace Science and Technology Beihang University Beijing100191 China State Key Laboratory of Software Development Environment Beihang University Beijing100191 China Beijing Key Laboratory of Network Technology Beihang University Beijing China Shenzhen Research Institute of Big Data Shenzhen518000 China
Deep learning models bear the risks of privacy leakage. Attackers can obtain sensitive information contained in training data with some techniques. However, existing differentially private methods such as Differential... 详细信息
来源: 评论
TMOVF: A Task-Agnostic Model Ownership Verification Framework
TMOVF: A Task-Agnostic Model Ownership Verification Framewor...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Zhe Sun Zhongyu Huang Wangqi Zhao Yu Zhang Jianzhong Zhang College of Cyber Science College of Computer Science Nankai University Tianjin China Tianjin Key Laboratory of Network and Data Security Technology Tianjin China
The protection of model intellectual property is becoming an increasingly important issue. However, the existing methods for protecting model ownership, although effective, have limitations. Firstly, they primarily fo...
来源: 评论
FLAP: Federated Learning Aggregation Scheme Based on Privileged Secret Sharing
FLAP: Federated Learning Aggregation Scheme Based on Privile...
收藏 引用
2023 International Conference on networking and network Applications, NaNA 2023
作者: Mu, Xianyu Tian, Youliang Xiong, Jinbo Wang, Shuai Gong, Boxiang College of Computer Science and Technology Guizhou University State Key Laboratory of Public Big Data Guiyang550025 China College of Computer and Cyber Security Fujian Normal University Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou350117 China Guizhou Xishan Technology Co. Ltd China
Federated Learning (FL) is a privacy-preserving machine learning technique that trains models on client devices and only uploads new model gradients to servers for aggregation. However, transmitting the true gradients... 详细信息
来源: 评论
DEAR: Dual-Level Self-attention GRU for Online Early Prediction of Sepsis  19th
DEAR: Dual-Level Self-attention GRU for Online Early Predic...
收藏 引用
19th International Conference on Web Information Systems and Applications, WISA 2022
作者: Zhao, Yu Wu, Yike Liu, Mo Cai, Xiangrui Zhang, Ying Yuan, Xiaojie College of Cyber Science Nankai University Tianjin300350 China College of Computer Science Nankai University Tianjin300350 China Tianjin Key Laboratory of Network and Data Security Technology Tianjin300350 China College of Journalism and Communication Nankai University Tianjin300350 China Centre for Computational Biology Duke-NUS Medical School 8 College Road Singapore169857 Singapore
Sepsis is one of the leading causes of death in intensive care units (ICUs). Online early prediction of sepsis has the potential for application to support clinicians. Despite the great success of deep neural networks... 详细信息
来源: 评论
security on a knapsack-type encryption scheme based upon hybrid-model assumption
收藏 引用
International Journal of network security 2017年 第4期19卷 644-647页
作者: Jin, Zhengping Zhang, Hong Li, Zhongxian State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing100876 China National Computer Network Emergency Response Technical Team Coordination Center of China Beijing100029 China National Cybernet Security Limited Tianjin300384 China
Provable security is a reduction that breaking the scheme is usually reduced to solving some basic hard problems, thus the foundation of the scheme's security is the assumption that it is hard to solve the based p... 详细信息
来源: 评论