咨询与建议

限定检索结果

文献类型

  • 294 篇 会议
  • 246 篇 期刊文献

馆藏范围

  • 540 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 343 篇 工学
    • 271 篇 计算机科学与技术...
    • 222 篇 软件工程
    • 91 篇 信息与通信工程
    • 76 篇 电气工程
    • 34 篇 控制科学与工程
    • 33 篇 网络空间安全
    • 32 篇 生物工程
    • 29 篇 电子科学与技术(可...
    • 20 篇 光学工程
    • 18 篇 机械工程
    • 18 篇 安全科学与工程
    • 17 篇 生物医学工程(可授...
    • 14 篇 交通运输工程
    • 12 篇 仪器科学与技术
    • 11 篇 建筑学
    • 9 篇 化学工程与技术
  • 144 篇 理学
    • 82 篇 数学
    • 37 篇 生物学
    • 32 篇 物理学
    • 31 篇 统计学(可授理学、...
    • 11 篇 化学
  • 73 篇 管理学
    • 48 篇 管理科学与工程(可...
    • 33 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 24 篇 法学
    • 15 篇 社会学
    • 10 篇 法学
  • 17 篇 医学
    • 14 篇 临床医学
    • 12 篇 基础医学(可授医学...
    • 12 篇 公共卫生与预防医...
  • 13 篇 经济学
    • 13 篇 应用经济学
  • 7 篇 农学
  • 7 篇 军事学
  • 2 篇 教育学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 30 篇 semantics
  • 29 篇 feature extracti...
  • 25 篇 federated learni...
  • 23 篇 accuracy
  • 21 篇 training
  • 20 篇 privacy
  • 19 篇 computational mo...
  • 18 篇 deep learning
  • 14 篇 data privacy
  • 12 篇 neural networks
  • 11 篇 image segmentati...
  • 11 篇 data models
  • 10 篇 internet of thin...
  • 10 篇 anomaly detectio...
  • 10 篇 speech processin...
  • 10 篇 contrastive lear...
  • 10 篇 visualization
  • 10 篇 network security
  • 10 篇 cloud computing
  • 10 篇 cryptography

机构

  • 69 篇 shandong provinc...
  • 67 篇 key laboratory o...
  • 52 篇 tianjin key labo...
  • 49 篇 network and data...
  • 45 篇 college of compu...
  • 45 篇 shandong enginee...
  • 35 篇 college of cyber...
  • 17 篇 tianjin key labo...
  • 17 篇 state key labora...
  • 16 篇 shandong fundame...
  • 14 篇 tianjin key labo...
  • 12 篇 faculty of data ...
  • 12 篇 fujian provincia...
  • 11 篇 shandong enginee...
  • 10 篇 key laboratory o...
  • 10 篇 school of inform...
  • 10 篇 haihe lab of ita...
  • 9 篇 school of comput...
  • 9 篇 network and data...
  • 9 篇 key laboratory o...

作者

  • 16 篇 qin zhen
  • 15 篇 li tao
  • 15 篇 qin zhiguang
  • 12 篇 jia chunfu
  • 11 篇 ding yi
  • 11 篇 jing zhao
  • 11 篇 zhen qin
  • 11 篇 fu fang-wei
  • 10 篇 youliang tian
  • 10 篇 liu bin
  • 10 篇 xiong jinbo
  • 9 篇 liu jun
  • 9 篇 yi ding
  • 9 篇 jinbo xiong
  • 9 篇 tian youliang
  • 9 篇 zhenyu yang
  • 9 篇 zhang hongbin
  • 8 篇 qing yu
  • 8 篇 huang shenwei
  • 8 篇 chunfu jia

语言

  • 500 篇 英文
  • 35 篇 其他
  • 6 篇 中文
检索条件"机构=Tianjin Key Laboratory of Network and Data Security Technology"
540 条 记 录,以下是441-450 订阅
排序:
A Cross-Modal Interactive Memory network Based on Fine-Grained Medical Feature Extraction for Radiology Report Generation
A Cross-Modal Interactive Memory Network Based on Fine-Grain...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Xitong Ma Yuansen Kuang Lin Yuan Cheng Tian Yijie Zeng Song Liu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Radiology report generation is an essential task in the medical field, which aims to automate the generation of medical terminology descriptions of radiology images. However, this task currently suffers from several p... 详细信息
来源: 评论
ERC DMSP: Emotion Recognition in Conversation Based on Dynamic Modeling of Speaker Personalities
ERC DMSP: Emotion Recognition in Conversation Based on Dynam...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Xiaoyang Li Zhenyu Yang Zhijun Li Yiwen Li Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Emotion Recognition in Conversations (ERC) is a widely applicable task, whether in emotional chatbots or recommender systems for dialog scenarios. The ability of systems to accurately identify human emotions is a cruc... 详细信息
来源: 评论
MemADet: A Representative Memory Bank Approach for Industrial Image Anomaly Detection
MemADet: A Representative Memory Bank Approach for Industria...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Min Li Jinghui He Zuobin Ying Gang Li Mingle Zhou Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Faculty of Data Science City University of Macau Macau China
In the field of industrial production, anomaly detection is crucial for ensuring product quality and maintaining production efficiency. With the continuous advancement of computer vision technology, it has shown treme... 详细信息
来源: 评论
Anomaly-Free Prior Guided Knowledge Distillation for Industrial Anomaly Detection
Anomaly-Free Prior Guided Knowledge Distillation for Industr...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Gang Li Tianjiao Chen Min Li Delong Han MingLe Zhou Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Faculty of Data Science City University of Macau Macau China
In industrial manufacturing, visual anomaly detection is critical for maintaining product quality by detecting and preventing production anomalies. Anomaly detection methods based on knowledge distillation demonstrate... 详细信息
来源: 评论
NQNR: News Recommendation Method Based on News Quality-Aware Modeling
NQNR: News Recommendation Method Based on News Quality-Aware...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Baojie Xu Zhenyu Yang Yan Huang Wenyue Hu Zhibo Zhang The Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Personalized News Recommendation (PNR) can enhance user experience by alleviating information overload. Traditional news recommendation methods consider all clicking behaviors as user interests, resulting in biased us... 详细信息
来源: 评论
FGSNet: A Finer-Grained Siamese network for Industrial Few-Shot Anomaly Detection
FGSNet: A Finer-Grained Siamese Network for Industrial Few-S...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: DeLong Han Luo Xu MingLe Zhou Gang Li Min Li Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Faculty of Data Science City University of Macau Macau China
Image anomaly detection usually relies on a large set of training samples and abnormal samples are relatively rare and challenging to obtain in daily industrial scenarios. In the scenario of Few-Shot Anomaly Detection... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
arXiv
收藏 引用
arXiv 2024年
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado SpringsCO United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab China JinYinHu Laboratory Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
Enhancing Small Object Detection in Aerial Imagery Based on Strong Feature Extraction and Batch Dimension
Enhancing Small Object Detection in Aerial Imagery Based on ...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Bingnan Cao Di Wang Ying Guo Hu Zhang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China The Institute of Data Science City University of Macau Macau China
Object detection is a fundamental component of computer vision, playing a pivotal role in various applications. However, the accurate detection of small and densely distributed objects remains a challenging problem in... 详细信息
来源: 评论
Contrastive Learning for Chest X-ray Classification: A Fusion of Topological data Analysis and ResNet
Contrastive Learning for Chest X-ray Classification: A Fusio...
收藏 引用
IEEE International Conference on data Science in Cyberspace (DSC)
作者: Hao Ren Zeyu Luo Fengshi Jing Xinyue Zhang Han He Yonghao Yu Dawei Zhao Faculty of Data Science City University of Macau China Minzu University of China Beijing China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Lung diseases such as pneumonia and tuberculosis present significant global health challenges, leading to millions of deaths annually. Chest X-ray imaging is crucial for diagnosing these conditions, but interpretation... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Zhen Li Ning Wang Deqing Zou Yating Li Ruqian Zhang Shouhuai Xu Chao Zhang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jin YinHu Laboratory Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado Springs Colorado USA Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论