咨询与建议

限定检索结果

文献类型

  • 293 篇 会议
  • 245 篇 期刊文献

馆藏范围

  • 538 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 330 篇 工学
    • 259 篇 计算机科学与技术...
    • 214 篇 软件工程
    • 79 篇 信息与通信工程
    • 67 篇 电气工程
    • 32 篇 生物工程
    • 30 篇 网络空间安全
    • 25 篇 控制科学与工程
    • 21 篇 电子科学与技术(可...
    • 20 篇 机械工程
    • 18 篇 光学工程
    • 18 篇 生物医学工程(可授...
    • 16 篇 安全科学与工程
    • 13 篇 交通运输工程
    • 12 篇 仪器科学与技术
    • 11 篇 建筑学
    • 9 篇 化学工程与技术
  • 141 篇 理学
    • 78 篇 数学
    • 37 篇 生物学
    • 32 篇 物理学
    • 28 篇 统计学(可授理学、...
    • 11 篇 化学
  • 71 篇 管理学
    • 46 篇 管理科学与工程(可...
    • 32 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 23 篇 法学
    • 15 篇 社会学
    • 9 篇 法学
  • 18 篇 医学
    • 16 篇 临床医学
    • 14 篇 基础医学(可授医学...
    • 14 篇 公共卫生与预防医...
  • 13 篇 经济学
    • 13 篇 应用经济学
  • 7 篇 农学
  • 7 篇 军事学
  • 3 篇 教育学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 30 篇 semantics
  • 29 篇 feature extracti...
  • 23 篇 accuracy
  • 22 篇 federated learni...
  • 21 篇 training
  • 20 篇 privacy
  • 19 篇 computational mo...
  • 18 篇 deep learning
  • 12 篇 data privacy
  • 12 篇 image segmentati...
  • 12 篇 neural networks
  • 11 篇 data models
  • 10 篇 internet of thin...
  • 10 篇 anomaly detectio...
  • 10 篇 speech processin...
  • 10 篇 contrastive lear...
  • 10 篇 visualization
  • 10 篇 network security
  • 10 篇 cloud computing
  • 9 篇 optimization

机构

  • 69 篇 shandong provinc...
  • 67 篇 key laboratory o...
  • 52 篇 tianjin key labo...
  • 49 篇 network and data...
  • 45 篇 shandong enginee...
  • 43 篇 college of compu...
  • 35 篇 college of cyber...
  • 18 篇 state key labora...
  • 17 篇 shandong fundame...
  • 16 篇 tianjin key labo...
  • 14 篇 tianjin key labo...
  • 13 篇 fujian provincia...
  • 12 篇 faculty of data ...
  • 11 篇 shandong enginee...
  • 10 篇 key laboratory o...
  • 10 篇 school of inform...
  • 9 篇 school of comput...
  • 9 篇 network and data...
  • 9 篇 haihe lab of ita...
  • 9 篇 qilu university ...

作者

  • 17 篇 qin zhen
  • 15 篇 qin zhiguang
  • 13 篇 li tao
  • 12 篇 zhen qin
  • 12 篇 fu fang-wei
  • 12 篇 jia chunfu
  • 11 篇 ding yi
  • 11 篇 jing zhao
  • 11 篇 xiong jinbo
  • 10 篇 tian youliang
  • 10 篇 youliang tian
  • 10 篇 liu bin
  • 9 篇 liu jun
  • 9 篇 yi ding
  • 9 篇 jinbo xiong
  • 9 篇 zhenyu yang
  • 9 篇 zhang hongbin
  • 8 篇 qing yu
  • 8 篇 zhao dongmei
  • 7 篇 cao mingsheng

语言

  • 500 篇 英文
  • 33 篇 其他
  • 6 篇 中文
检索条件"机构=Tianjin Key Laboratory of Network and Data Security Technology"
538 条 记 录,以下是471-480 订阅
排序:
Improvement of Low-Contrast Objective Detecting Capability for YOLOv5 Based on Receptive Field Enhancement and Redundant Feature Reuse
Improvement of Low-Contrast Objective Detecting Capability f...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Qingyu Xu Jiguo Yu Anming Dong Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China School of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Big Data Institute Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
YOLOv5s is a classic deep learning target detection framework with balanced speed and performance in recognition, which is widely used in industrial defect inspections. YOLOv5s relies on the residual structure in the ... 详细信息
来源: 评论
EMO: An Ontology for Supporting the Management of Epidemic
EMO: An Ontology for Supporting the Management of Epidemic
收藏 引用
Applied Physics and Computing (ICAPC), International Conference on
作者: Yongchao Gao Qiuyue Wang Mark S. Fox Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Qilu University of Technology (Shandong Academy of Sciences) Jinan China Standard Institute of Emerging Technologies and Innovations Jinan China Urban Data Centre University of Toronto Toronto Canada
In order to improve the coverage of concepts in epidemic management, this paper constructs an epidemic management ontology EMO to help manage and analyse epidemic data. First, based on the ISO/lEC 5087 city data model...
来源: 评论
Semantic Information Reasoning and Multi-Step Cross-Modal Interaction network for Image-Text Retrieval
Semantic Information Reasoning and Multi-Step Cross-Modal In...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Xishan Ma Yushui Geng Jing Zhao Huanxiao Zhou Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Graduate School Qilu University of Technology (Shandong Academy of Sciences) Jinan China
Image-text retrieval is a basic cross-modal task, and the basic idea is to learn image-text matching. The key to this task is to accurately measure the similarity between these two modalities. However, most existing m... 详细信息
来源: 评论
Accuracy Indoor Localization Based on Fuzzy Transfer Learning Model
Accuracy Indoor Localization Based on Fuzzy Transfer Learnin...
收藏 引用
Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, UIC-ATC
作者: Sheng Wu Yanhui Ji Licai Zhu Liang Zhao Hao Yang Nanjing Tech University Yancheng Teachers University Nanjing China Yancheng Teachers University Nanjing Tech University Yancheng China Shenyang Aerospace University Shenyang China Yancheng Teachers University Yancheng China Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Chengdu China
Location-based services greatly facilitate people’s daily life, which puts forward higher requirements for the location calculation of target objects in different environments. Since the fingerprint positioning metho...
来源: 评论
LampMark: Proactive Deepfake Detection via Training-Free Landmark Perceptual Watermarks
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Tianyi Huang, Mengxiao Cheng, Harry Zhang, Xiao Shen, Zhiqi Nanyang Technological University Singapore Singapore Qilu University of Technology Jinan China Shandong University Qingdao China Joint NTU-WeBank Research Centre on Fintech Nanyang Technological University Singapore Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology China College of Computing and Data Science Nanyang Technological University Singapore
Deepfake facial manipulation has garnered significant public attention due to its impacts on enhancing human experiences and posing privacy threats. Despite numerous passive algorithms that have been attempted to thwa... 详细信息
来源: 评论
Semantic Relation-Based Cross Attention network for Image-Text Retrieval
Semantic Relation-Based Cross Attention Network for Image-Te...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Huanxiao Zhou Yushui Geng Jing Zhao Xishan Ma Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Graduate School Qilu University of Technology (Shandong Academy of Sciences) Jinan China
Image-text retrieval refers to querying the text or image of another modality given an image or text, and its key lies in the ability to accurately measure the similarity between text and image. Most of the existing r... 详细信息
来源: 评论
Constructing Efficient Set of APs Via Spatial Discrimination and Localization Difference
Constructing Efficient Set of APs Via Spatial Discrimination...
收藏 引用
Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, UIC-ATC
作者: Yanhui Ji Sheng Wu Licai Zhu Liang Zhao Hao Yang Nanjing Tech University Yancheng Teachers University Nanjing China Yancheng Teachers University Nanjing Tech University Yancheng China Shenyang Aerospace University Shenyang China Yancheng Teachers University Yancheng China Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Chengdu China
RSSI fingerprint-based localization has been one of the most attractive solutions, since it is free of extra infrastructure and specialized hardware. As wireless networks become more widely used, however, the number o...
来源: 评论
Cross-modal retrieval based on Attention Embedded Variational Auto-Encoder
Cross-modal retrieval based on Attention Embedded Variationa...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Kaili Zhou Yiyun Xing Yushui Geng Jing Zhao Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Graduate School Qilu University of Technology (Shandong Academy of Sciences) Jinan China
This study proposes a cross-modal retrieval technique, which employs an Attention Embedded Variational AutoEncoder (AE-VAE) to tackle the problem of reduced retrieval accuracy resulting from data noise and data absenc... 详细信息
来源: 评论
PrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Man Su, Shuao Wang, Qian Li, Qi Zhou, Yuting Ma, Xiaojing Li, Zhengxiong School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Cyber Science and Engineering Wuhan University China Institute for Network Sciences and Cyberspace Tsinghua University China Department of Computer Science and Engineering University of Colorado Denver United States Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology China
Fingerprint authentication has been extensively employed in contemporary identity verification systems owing to its rapidity and cost-effectiveness. Due to its widespread use, fingerprint leakage may cause sensitive i... 详细信息
来源: 评论
Semantic-Enhanced Attention network for Image-Text Matching
Semantic-Enhanced Attention Network for Image-Text Matching
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Huanxiao Zhou Yushui Geng Jing Zhao Xishan Ma Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Graduate School Qilu University of Technology (Shandong Academy of Sciences) Jinan China
Image-text matching is an important task in cross-modal information processing, which consists of evaluating the similarity between images and text. However, the data of the two modalities have different distributions... 详细信息
来源: 评论