咨询与建议

限定检索结果

文献类型

  • 293 篇 会议
  • 242 篇 期刊文献

馆藏范围

  • 535 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 328 篇 工学
    • 258 篇 计算机科学与技术...
    • 214 篇 软件工程
    • 80 篇 信息与通信工程
    • 67 篇 电气工程
    • 32 篇 生物工程
    • 30 篇 网络空间安全
    • 26 篇 控制科学与工程
    • 22 篇 电子科学与技术(可...
    • 20 篇 机械工程
    • 18 篇 生物医学工程(可授...
    • 17 篇 光学工程
    • 16 篇 安全科学与工程
    • 13 篇 仪器科学与技术
    • 13 篇 交通运输工程
    • 10 篇 建筑学
    • 9 篇 化学工程与技术
  • 141 篇 理学
    • 78 篇 数学
    • 37 篇 生物学
    • 32 篇 物理学
    • 28 篇 统计学(可授理学、...
    • 12 篇 化学
  • 71 篇 管理学
    • 45 篇 管理科学与工程(可...
    • 33 篇 图书情报与档案管...
    • 15 篇 工商管理
  • 23 篇 法学
    • 15 篇 社会学
    • 9 篇 法学
  • 18 篇 医学
    • 16 篇 临床医学
    • 14 篇 基础医学(可授医学...
    • 14 篇 公共卫生与预防医...
  • 13 篇 经济学
    • 13 篇 应用经济学
  • 7 篇 农学
  • 7 篇 军事学
  • 3 篇 教育学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 30 篇 semantics
  • 30 篇 feature extracti...
  • 24 篇 accuracy
  • 22 篇 federated learni...
  • 21 篇 training
  • 20 篇 computational mo...
  • 20 篇 privacy
  • 18 篇 deep learning
  • 12 篇 data privacy
  • 12 篇 image segmentati...
  • 12 篇 neural networks
  • 11 篇 data models
  • 10 篇 internet of thin...
  • 10 篇 anomaly detectio...
  • 10 篇 speech processin...
  • 10 篇 contrastive lear...
  • 10 篇 visualization
  • 10 篇 network security
  • 10 篇 cloud computing
  • 9 篇 optimization

机构

  • 69 篇 shandong provinc...
  • 67 篇 key laboratory o...
  • 52 篇 tianjin key labo...
  • 49 篇 network and data...
  • 45 篇 shandong enginee...
  • 43 篇 college of compu...
  • 35 篇 college of cyber...
  • 18 篇 state key labora...
  • 17 篇 shandong fundame...
  • 16 篇 tianjin key labo...
  • 14 篇 tianjin key labo...
  • 13 篇 fujian provincia...
  • 12 篇 faculty of data ...
  • 11 篇 shandong enginee...
  • 10 篇 school of inform...
  • 9 篇 school of comput...
  • 9 篇 key laboratory o...
  • 9 篇 network and data...
  • 9 篇 haihe lab of ita...
  • 9 篇 qilu university ...

作者

  • 17 篇 qin zhen
  • 14 篇 qin zhiguang
  • 13 篇 li tao
  • 12 篇 zhen qin
  • 12 篇 jia chunfu
  • 11 篇 jing zhao
  • 11 篇 fu fang-wei
  • 11 篇 xiong jinbo
  • 10 篇 yi ding
  • 10 篇 ding yi
  • 10 篇 tian youliang
  • 10 篇 youliang tian
  • 10 篇 liu bin
  • 9 篇 liu jun
  • 9 篇 jinbo xiong
  • 9 篇 zhenyu yang
  • 9 篇 zhang hongbin
  • 8 篇 qing yu
  • 8 篇 zhao dongmei
  • 7 篇 jiguo yu

语言

  • 499 篇 英文
  • 31 篇 其他
  • 6 篇 中文
检索条件"机构=Tianjin Key Laboratory of Network and Data Security Technology"
535 条 记 录,以下是21-30 订阅
排序:
Disentangled Noisy Correspondence Learning
收藏 引用
IEEE Transactions on Image Processing 2025年 34卷 2602-2615页
作者: Dang, Zhuohang Luo, Minnan Wang, Jihong Jia, Chengyou Han, Haochen Wan, Herun Dai, Guang Chang, Xiaojun Wang, Jingdong Xi’an Jiaotong University School of Computer Science and Technology Ministry of Education Key Laboratory of Intelligent Networks and Network Security Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Shaanxi Xi’an710049 China SGIT AI Laboratory Xi’an710048 China State Grid Corporation of China State Grid Shaanxi Electric Power Company Ltd. Xi’an710048 China University of Science and Technology of China School of Information Science and Technology Hefei230026 China Abu Dhabi United Arab Emirates Baidu Inc. Beijing100085 China
Cross-modal retrieval is crucial in understanding latent correspondences across modalities. However, existing methods implicitly assume well-matched training data, which is impractical as real-world data inevitably in... 详细信息
来源: 评论
Multi-scale Graph Convolution with Corrective Contrastive Learning for Skeleton-based Action Recognition
Multi-scale Graph Convolution with Corrective Contrastive Le...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Tianming Zhuang Erqiang Zhou Hanwen Zhang Yi Ding Ji Geng Zhen Qin Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Chengdu China
For pursuing accurate skeleton-based action recognition, many existing graph-based approaches deploy the higher-order polynomials of the skeletal adjacency matrix to model the node correlations of distant neighbours. ... 详细信息
来源: 评论
EVPIR: Efficient and Verifiable Privacy-Preserving Image Retrieval in Cloud-assisted Internet of Things
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Li, Mingyue Li, Yuntao Du, Ruizhong Jia, Chunfu Shao, Wei Hebei University School of Cyber Security and Computer Baoding071000 China Key Lab on High Trusted Information Sys tem in Hebei Province Hebei China College of Cyber Sciences Nankai university Tianjin300350 China Tianjin Key Laboratory of Network and Data Security Technology Tianjin300350 China Jinan250014 China
With the proliferation of mobile devices and the advancement of cloud computing capabilities, cloud-assisted Internet of Things (IoT) attracts increased attention based on its computational and storage advantages. Upo... 详细信息
来源: 评论
Secure Similar Adjacent Vertex Query on Sparse Graph data in Cloud Environment  8th
Secure Similar Adjacent Vertex Query on Sparse Graph Data i...
收藏 引用
8th International Congress on Edge Computing, EDGE 2024, Held as Part of the Services Conference Federation, SCF 2024
作者: Tian, Yun Wu, Bin Shi, Jiaoli Zhang, Caicai Xu, Du School of Computer and Big Data Science Jiujiang University Jiujiang332005 China Jiujiang Key Laboratory of Network and Information Security Jiujiang332005 China School of Modern Information Technology Zhejiang Polytechnic University of Mechanical and Electrical Engineering Hangzhou310053 China
The development of cloud computing and the widespread application of cloud services have made outsourcing services more convenient. The need for individuals and businesses to store and manipulate the graph data they g... 详细信息
来源: 评论
WiViPose: A Video-aided Wi-Fi Framework for Environment-Independent 3D Human Pose Estimation
收藏 引用
IEEE Transactions on Multimedia 2025年
作者: Zhang, Lei Ning, Haoran Tang, Jiaxin Chen, Zhenxiang Zhong, Yaping Han, Yahong Tianjin University College of Intelligence and Computing the Tianjin Key Laboratory of Advanced Network Technology and Application Tianjin300050 China Key Laboratory of Computing Power Network and Information Security Ministry of Education China University of Jinan Shandong Provincial Key Laboratory of Ubiquitous Intelligent Computing the School of Information Science and Engineering Jinan250022 China Wuhan Sports University Sports Big-data Research Center Wuhan430079 China Tianjin University College of Intelligence and Computing the Tianjin Key Laboratory of Machine Learning Tianjin300350 China
The inherent complexity of Wi-Fi signals makes video-aided Wi-Fi 3D pose estimation difficult. The challenges include the limited generalizability of the task across diverse environments, its significant signal hetero... 详细信息
来源: 评论
CPSNet: Comprehensive Enhancement Representation for Polyp Segmentation Task
CPSNet: Comprehensive Enhancement Representation for Polyp S...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Cai, Jiati Liu, Xiaogang Yang, Hongjie Ding, Yi Zhong, Ting Qin, Zhen Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Chengdu China Department of Gastroenterology and Hepatology University of Electronic Science and Technology of China Chengdu China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China
Accurately segmenting polyp regions in colonoscopy images is crucial for the diagnosis and intervention of colorectal cancer. However, the task of polyp segmentation remains challenging due to the diverse size and sha... 详细信息
来源: 评论
Spatial-Temporal Reconstruction Error for AIGC-based Forgery Image Detection
Spatial-Temporal Reconstruction Error for AIGC-based Forgery...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Chengji Shen Zhenjiang Liu Kaixuan Chen Jie Lei Mingli Song Zunlei Feng State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security Idlefish Network Technology Alibaba Group College of Computer Science and Technology Zhejiang University of Technology
The remarkable success of AI-Generated Content (AIGC), especially diffusion image generation models, brings about unprecedented creative applications, but also creates fertile ground for malicious counterfeiting and c... 详细信息
来源: 评论
TransMatch: Employing Bridging Strategy to Overcome Large Deformation for Feature Matching in Gastroscopy Scenario
收藏 引用
IEEE Transactions on Medical Imaging 2025年 PP卷 PP页
作者: Zhu, Guosong Qin, Zhen Yu, Linfang Ding, Yi Qin, Zhiguang University of Electronic Science and Technology of China Network and Data Security Key Laboratory of Sichuan Province Chengdu611731 China Industrial Research Institute Chengdu610000 China
Feature matching is widely applied in the image processing field. However, both traditional feature matching methods and previous deep learning-based methods struggle to accurately match the features with severe defor... 详细信息
来源: 评论
VFLMonitor: Defending One-Party Hijacking Attacks in Vertical Federated Learning
收藏 引用
IEEE Transactions on Information Forensics and security 2025年 20卷 4828-4843页
作者: Xiangrui Xu Yiwen Zhao Yufei Han Yongsheng Zhu Zhen Han Guangquan Xu Bin Wang Shouling Ji Wei Wang School of Information Science and Technology Qingdao University of Science and Technology Qingdao China Thomas Lord Department of Computer Science University of Southern California Los Angeles CA USA INRIA Rennes Brittany France Institute of Computing Technologies China Academy of Railway Sciences Corporation Ltd. Beijing China Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing Jiaotong University Beijing China Tianjin Key Laboratory of Advanced Networking (TANK) College of Intelligence and Computing Tianjin University Tianjin China Zhejiang Key Laboratory of Artificial Intelligence of Things (AIoT) Network and Data Security Hangzhou China College of Computer Science and Technology Zhejiang University Zhejiang China Ministry of Education Key Laboratory for Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an China
Vertical Federated Learning (VFL) is susceptible to various one-party hijacking attacks, such as Replay and Generation attacks, where a single malicious client can manipulate the model to produce attacker-specified re... 详细信息
来源: 评论
CroPrompt: Cross-task Interactive Prompting for Zero-shot Spoken Language Understanding
CroPrompt: Cross-task Interactive Prompting for Zero-shot Sp...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Qin, Libo Wei, Fuxuan Chen, Qiguang Zhou, Jingxuan Huang, Shijue Si, Jiasheng Lu, Wenpeng Che, Wanxiang School of Computer Science and Engineering Central South University China Key Laboratory of Data Intelligence and Advanced Computing in Provincial Universities Soochow University China Research Center for Social Computing and Information Retrieval Harbin Institute of Technology China Harbin Institute of Technology Shenzhen China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology Shandong Academy of Sciences China
Slot filling and intent detection are two highly correlated tasks in spoken language understanding (SLU). Recent SLU research attempts to explore zero-shot prompting techniques in large language models to alleviate th...
来源: 评论