咨询与建议

限定检索结果

文献类型

  • 293 篇 会议
  • 242 篇 期刊文献

馆藏范围

  • 535 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 328 篇 工学
    • 258 篇 计算机科学与技术...
    • 214 篇 软件工程
    • 80 篇 信息与通信工程
    • 67 篇 电气工程
    • 32 篇 生物工程
    • 30 篇 网络空间安全
    • 26 篇 控制科学与工程
    • 22 篇 电子科学与技术(可...
    • 20 篇 机械工程
    • 18 篇 生物医学工程(可授...
    • 17 篇 光学工程
    • 16 篇 安全科学与工程
    • 13 篇 仪器科学与技术
    • 13 篇 交通运输工程
    • 10 篇 建筑学
    • 9 篇 化学工程与技术
  • 141 篇 理学
    • 78 篇 数学
    • 37 篇 生物学
    • 32 篇 物理学
    • 28 篇 统计学(可授理学、...
    • 12 篇 化学
  • 71 篇 管理学
    • 45 篇 管理科学与工程(可...
    • 33 篇 图书情报与档案管...
    • 15 篇 工商管理
  • 23 篇 法学
    • 15 篇 社会学
    • 9 篇 法学
  • 18 篇 医学
    • 16 篇 临床医学
    • 14 篇 基础医学(可授医学...
    • 14 篇 公共卫生与预防医...
  • 13 篇 经济学
    • 13 篇 应用经济学
  • 7 篇 农学
  • 7 篇 军事学
  • 3 篇 教育学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 30 篇 semantics
  • 30 篇 feature extracti...
  • 24 篇 accuracy
  • 22 篇 federated learni...
  • 21 篇 training
  • 20 篇 computational mo...
  • 20 篇 privacy
  • 18 篇 deep learning
  • 12 篇 data privacy
  • 12 篇 image segmentati...
  • 12 篇 neural networks
  • 11 篇 data models
  • 10 篇 internet of thin...
  • 10 篇 anomaly detectio...
  • 10 篇 speech processin...
  • 10 篇 contrastive lear...
  • 10 篇 visualization
  • 10 篇 network security
  • 10 篇 cloud computing
  • 9 篇 optimization

机构

  • 69 篇 shandong provinc...
  • 67 篇 key laboratory o...
  • 52 篇 tianjin key labo...
  • 49 篇 network and data...
  • 45 篇 shandong enginee...
  • 43 篇 college of compu...
  • 35 篇 college of cyber...
  • 18 篇 state key labora...
  • 17 篇 shandong fundame...
  • 16 篇 tianjin key labo...
  • 14 篇 tianjin key labo...
  • 13 篇 fujian provincia...
  • 12 篇 faculty of data ...
  • 11 篇 shandong enginee...
  • 10 篇 school of inform...
  • 9 篇 school of comput...
  • 9 篇 key laboratory o...
  • 9 篇 network and data...
  • 9 篇 haihe lab of ita...
  • 9 篇 qilu university ...

作者

  • 17 篇 qin zhen
  • 14 篇 qin zhiguang
  • 13 篇 li tao
  • 12 篇 zhen qin
  • 12 篇 jia chunfu
  • 11 篇 jing zhao
  • 11 篇 fu fang-wei
  • 11 篇 xiong jinbo
  • 10 篇 yi ding
  • 10 篇 ding yi
  • 10 篇 tian youliang
  • 10 篇 youliang tian
  • 10 篇 liu bin
  • 9 篇 liu jun
  • 9 篇 jinbo xiong
  • 9 篇 zhenyu yang
  • 9 篇 zhang hongbin
  • 8 篇 qing yu
  • 8 篇 zhao dongmei
  • 7 篇 jiguo yu

语言

  • 499 篇 英文
  • 31 篇 其他
  • 6 篇 中文
检索条件"机构=Tianjin Key Laboratory of Network and Data Security Technology"
535 条 记 录,以下是441-450 订阅
排序:
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
arXiv
收藏 引用
arXiv 2024年
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado SpringsCO United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab China JinYinHu Laboratory Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
Enhancing Small Object Detection in Aerial Imagery Based on Strong Feature Extraction and Batch Dimension
Enhancing Small Object Detection in Aerial Imagery Based on ...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Bingnan Cao Di Wang Ying Guo Hu Zhang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China The Institute of Data Science City University of Macau Macau China
Object detection is a fundamental component of computer vision, playing a pivotal role in various applications. However, the accurate detection of small and densely distributed objects remains a challenging problem in... 详细信息
来源: 评论
Contrastive Learning for Chest X-ray Classification: A Fusion of Topological data Analysis and ResNet
Contrastive Learning for Chest X-ray Classification: A Fusio...
收藏 引用
IEEE International Conference on data Science in Cyberspace (DSC)
作者: Hao Ren Zeyu Luo Fengshi Jing Xinyue Zhang Han He Yonghao Yu Dawei Zhao Faculty of Data Science City University of Macau China Minzu University of China Beijing China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Lung diseases such as pneumonia and tuberculosis present significant global health challenges, leading to millions of deaths annually. Chest X-ray imaging is crucial for diagnosing these conditions, but interpretation... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Zhen Li Ning Wang Deqing Zou Yating Li Ruqian Zhang Shouhuai Xu Chao Zhang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jin YinHu Laboratory Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado Springs Colorado USA Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
EnGAN: Enhancement Generative Adversarial network in Medical Image Segmentation
Research Square
收藏 引用
Research Square 2022年
作者: Deng, ErQiang Qin, ZhiGuang Chen, DaJiang Qin, Zhen Ding, Yi Geng, Ji Zhang, Ning Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Jianshe Road SiChuan Chengdu610054 China Department of Electrical and Computer Engineering University of Windsor 401 Sunset Avenue WindsorONN9B 3P4 Canada
Deep learning has been widely used in medical image segmentation, although the accuracy is affected by the problems of small sample space, data imbalance, and cross-device differences. Aiming at such issues, a enhance... 详细信息
来源: 评论
Cross Modal Sentiment Classification of Social Media Based on Meta Heuristic Algorithm
Cross Modal Sentiment Classification of Social Media Based o...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Wantong Du Wanli Min Yushui Geng Hu Liang Hehu Zhou Ministry of Education Shandong Computer Science Center Key Laboratory of Computing Power Network and Information Security Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Synthesis Electronic Technology Co. Ltd
The evolution of online social media has reshaped public behaviors, and social data infused with emotions provides crucial decision support for sentiment analysis tasks. Conventional multimodal approaches, influenced ... 详细信息
来源: 评论
Insulating materials for realising carbon neutrality:Opportunities,remaining issues and challenges
收藏 引用
High Voltage 2022年 第4期7卷 610-632页
作者: Chuanyang Li Yang Yang Guoqiang Xu Yao Zhou Mengshuo Jia Shaolong Zhong Yu Gao Chanyeop Park Qiang Liu Yalin Wang Shakeel Akram Xiaoliang Zeng Yi Li Fangwei Liang Bin Cui Junpeng Fang Lingling Tang Yulin Zeng Xingtao Hu Jiachen Gao Giovanni Mazzanti Jinliang He Jianxiao Wang Davide Fabiani Gilbert Teyssedre Yang Cao Feipeng Wang Yunlong Zi The State Key Laboratory of Power System Department of Electrical EngineeringTsinghua UniversityBeijingChina Department of Mechanical and Automation Engineering The Chinese University of Hong KongHong KongChina Simpson Querrey Institute Northwestern UniversityEvanstonIllinoisUSA Department of Materials Science and Engineering The Pennsylvania State UniversityUniversity ParkPennsylvaniaUSA Department of Information Technology and Electrical Engineering ETH ZürichZürichSwitzerland School of Electrical and Information Engineering Tianjin UniversityTianjinChina Department of Electrical and Computer Engineering Mississippi State UniversityMississippi StateMississippiUSA Electrical and Electronic Engineering The University of ManchesterManchesterUK Department of Electrical Engineering School of Electronic Information and Electrical EngineeringShanghai Jiao Tong UniversityShanghaiChina Key Laboratory of Control of Power Transmission and Conversion(SJTU) Ministry of EducationShanghaiChina College of Electrical Engineering Sichuan UniversityChengduChina Shenzhen Institute of Advanced Technology Chinese Academy of Sciences ShenzhenShenzhenChina School of Electrical Engineering Wuhan UniversityWuhanChina School of Integrated Circuits Tsinghua UniversityBeijingChina Jiangsu Jinxin Electric Appliance Co.Ltd. YangzhouChina Tai'an Tiancheng Safety Evaluation Co. Ltd.Tai'anChina Department Electrical Electronic and Information EngineeringUniversity of BolognaBolognaItaly National Engineering Laboratory for Big Data Analysis and Applications Peking UniversityBeijingChina Laplace Paul Sabatier Universityand CNRSToulouseFrance Electrical and Computer Engineering University of ConnecticutStorrsConnecticutUSA State Key Laboratory of Power Transmission Equipment&System Security and New Technology School of Electrical EngineeringChongqing UniversityChongqingChina Thrust of Sustainable Energy and Environment The Hong Kong University of Science and Technology(Guangzhou)GuangzhouChina De
The 2050 carbon-neutral vision spawns a novel energy structure revolution,and the construction of the future energy structure is based on equipment *** material,as the core of electrical power equipment and electrifie... 详细信息
来源: 评论
PRAD: Unsupervised KPI Anomaly Detection by Joint Prediction and Reconstruction of Multivariate Time Series
PRAD: Unsupervised KPI Anomaly Detection by Joint Prediction...
收藏 引用
Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, UIC-ATC
作者: Zhiying Xiong Qilin Fan Kai Wang Xiuhua Li Xu Zhang Qingyu Xiong School of Big Data and Software Engineering Chongqing University Chongqing China Chongqing Key Laboratory of Digital Cinema Art Theory and Technology Chongqing University Chongqing China School of Computer Science and Technology Harbin Institute of Technology Weihai China Research Institute of Cyberspace Security Harbin Institute of Technology Weihai China Haihe Laboratory of Information Technology Application Innovation Tianjin China Department of Computer Science University of Exeter Exeter UK
Detecting anomalies for key performance indicator (KPI) data is of paramount importance to ensure the quality and reliability of network services. However, building the anomaly detection system for KPI is challenging ...
来源: 评论
Improved Upper Bound on the network Function Computing Capacity
Improved Upper Bound on the Network Function Computing Capac...
收藏 引用
作者: Guang, Xuan Yeung, Raymond W. Yang, Shenghao Li, Congduan School of Mathematical Sciences and LPMC Nankai University Tianjin300071 China Institute of Network Coding Chinese University of Hong Kong Hong Kong Hong Kong Department of Information Engineering Chinese University of Hong Kong Hong Kong Hong Kong School of Science and Engineering Chinese University of Hong Kong Shenzhen518172 China Shenzhen Key Laboratory of IoT Intelligent Systems and Wireless Network Technology Chinese University of Hong Kong Shenzhen518172 China Shenzhen Research Institute of Big Data Shenzhen518172 China School of Electronics and Communication Engineering Sun Yat-sen University Guangzhou510006 China
The problem of network function computation over a directed acyclic network is investigated in this paper. In such a network, a sink node desires to compute with zero error a target function, of which the inputs are g... 详细信息
来源: 评论
CarfRCNN: A Two-stage Effective Model For Instance Segmentation
收藏 引用
Journal of Physics: Conference Series 2021年 第1期1884卷
作者: Yujie Chen Pengbiao Zhao Julin Chen Network and Data Security Key Laboratory of Sichuan Province University of Electr onic Science and Technology of China
With the rapid development of deep learning, many instance segmentation models have achieved good results in accuracy and time. But here are still many problems. In this paper, we proposed a two-stage model CarfRCNN. ...
来源: 评论