咨询与建议

限定检索结果

文献类型

  • 293 篇 会议
  • 236 篇 期刊文献

馆藏范围

  • 529 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 323 篇 工学
    • 256 篇 计算机科学与技术...
    • 213 篇 软件工程
    • 78 篇 信息与通信工程
    • 62 篇 电气工程
    • 32 篇 生物工程
    • 29 篇 网络空间安全
    • 26 篇 控制科学与工程
    • 21 篇 电子科学与技术(可...
    • 20 篇 机械工程
    • 17 篇 生物医学工程(可授...
    • 16 篇 光学工程
    • 16 篇 安全科学与工程
    • 13 篇 交通运输工程
    • 12 篇 仪器科学与技术
    • 10 篇 建筑学
    • 9 篇 化学工程与技术
  • 141 篇 理学
    • 79 篇 数学
    • 37 篇 生物学
    • 32 篇 物理学
    • 28 篇 统计学(可授理学、...
    • 11 篇 化学
  • 70 篇 管理学
    • 45 篇 管理科学与工程(可...
    • 32 篇 图书情报与档案管...
    • 15 篇 工商管理
  • 23 篇 法学
    • 15 篇 社会学
    • 9 篇 法学
  • 16 篇 医学
    • 14 篇 临床医学
    • 13 篇 基础医学(可授医学...
    • 13 篇 公共卫生与预防医...
  • 13 篇 经济学
    • 13 篇 应用经济学
  • 7 篇 农学
  • 7 篇 军事学
  • 3 篇 教育学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 30 篇 semantics
  • 30 篇 feature extracti...
  • 24 篇 accuracy
  • 21 篇 federated learni...
  • 20 篇 privacy
  • 20 篇 training
  • 19 篇 computational mo...
  • 18 篇 deep learning
  • 12 篇 data privacy
  • 12 篇 image segmentati...
  • 12 篇 neural networks
  • 10 篇 internet of thin...
  • 10 篇 anomaly detectio...
  • 10 篇 speech processin...
  • 10 篇 contrastive lear...
  • 10 篇 visualization
  • 10 篇 network security
  • 10 篇 cloud computing
  • 10 篇 data models
  • 9 篇 optimization

机构

  • 69 篇 shandong provinc...
  • 67 篇 key laboratory o...
  • 52 篇 tianjin key labo...
  • 49 篇 network and data...
  • 45 篇 shandong enginee...
  • 43 篇 college of compu...
  • 35 篇 college of cyber...
  • 18 篇 state key labora...
  • 16 篇 tianjin key labo...
  • 16 篇 shandong fundame...
  • 14 篇 tianjin key labo...
  • 13 篇 fujian provincia...
  • 12 篇 faculty of data ...
  • 11 篇 shandong enginee...
  • 10 篇 school of inform...
  • 9 篇 school of comput...
  • 9 篇 key laboratory o...
  • 9 篇 network and data...
  • 9 篇 qilu university ...
  • 8 篇 network and data...

作者

  • 17 篇 qin zhen
  • 14 篇 qin zhiguang
  • 13 篇 li tao
  • 12 篇 zhen qin
  • 12 篇 jia chunfu
  • 11 篇 jing zhao
  • 11 篇 fu fang-wei
  • 11 篇 xiong jinbo
  • 10 篇 yi ding
  • 10 篇 ding yi
  • 10 篇 tian youliang
  • 10 篇 youliang tian
  • 10 篇 liu bin
  • 9 篇 jinbo xiong
  • 9 篇 zhenyu yang
  • 9 篇 zhang hongbin
  • 8 篇 qing yu
  • 8 篇 liu jun
  • 8 篇 zhao dongmei
  • 7 篇 jiguo yu

语言

  • 495 篇 英文
  • 29 篇 其他
  • 6 篇 中文
检索条件"机构=Tianjin Key Laboratory of Network and Data Security Technology"
529 条 记 录,以下是61-70 订阅
排序:
Ultrasound-Guided Registration Pseudo-Labels for Semi-Supervised Brachial Plexus Segmentation
Ultrasound-Guided Registration Pseudo-Labels for Semi-Superv...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Luo, Jia Zhang, Ze Ding, Yi Wang, Yiqian Zhang, Jian Network and Data Security Key Laboratory of Sichuan Province School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China Yibin GREAT Technology Co. Ltd. Yibin644000 China Sichuan Provincial Hospital for Women and Children/Affilated Women and Children's Hospital of Chengdu Medical College Chengdu610054 China
In semi-supervised medical image segmentation, two main challenges arise. First, the quality of pseudo-labels generated by segmentation networks in data-limited scenarios is often poor, reducing segmentation accuracy.... 详细信息
来源: 评论
Ponzi Scheme Detection in Smart Contracts Using Heterogeneous Semantic Graph  6th
Ponzi Scheme Detection in Smart Contracts Using Heterogeneo...
收藏 引用
6th International Conference on Blockchain and Trustworthy Systems, BlockSys 2024
作者: Chen, Wei Jiang, Xinjun Lan, Tian Liu, Leyuan Li, Chengyu Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Chengdu610000 China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu610000 China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu610000 China Shenzhen Institute for Advanced Study University of Electronic Science and Technology of China Shenzhen518000 China
Behind the booming decentralized finance (DeFi) ecosystem driven by blockchain technology, various financial risks lurking, including money laundering, gambling, Ponzi schemes, and phishing. Due to the decentralizatio... 详细信息
来源: 评论
Semantic and Emotional Dual Channel for Emotion Recognition in Conversation
收藏 引用
IEEE Transactions on Affective Computing 2025年
作者: Yang, Zhenyu Zhang, Zhibo Cheng, Yuhu Zhang, Tong Wang, Xuesong Jinan250353 China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250353 China China University of Mining and Technology Engineering Research Center of Intelligent Control for Underground Space Ministry of Education Xuzhou Key Laboratory of Artificial Intelligence and Big Data School of Information and Control Engineering Xuzhou221116 China South China University of Technology Guangdong Provincial Key Laboratory of Computational Intelligence and Cyberspace Information School of Computer Science and Engineering Guangzhou510006 China Pazhou Lab Guangzhou510335 China Engineering Research Center Ministry of Education on Health Intelligent Perception and Paralleled Digital-Human Guangzhou China
Emotion recognition in conversation (ERC) aims at accurately identifying emotional states expressed in conversational content. Existing ERC methods, although relying on semantic understanding, often encounter challeng... 详细信息
来源: 评论
Advancing cancer diagnosis and prognostication through deep learning mastery in breast, colon, and lung histopathology with ResoMergeNet
收藏 引用
Computers in Biology and Medicine 2025年 185卷 109494-109494页
作者: Ejiyi, Chukwuebuka Joseph Qin, Zhen Agbesi, Victor K. Yi, Ding Atwereboannah, Abena A. Chikwendu, Ijeoma A. Bamisile, Oluwatoyosi F. Bakanina Kissanga, Grace-Mercure Bamisile, Olusola O. College of Nuclear Technology and Automation Engineering & Sichuan Industrial Internet Intelligent Monitoring and Application Engineering Research Center Chengdu University of Technology Sichuan Chengdu China Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Sichuan Chengdu China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu China School of Life Science University of Electronic Science and Technology of China Chengdu China
Cancer, a global health threat, demands effective diagnostic solutions to combat its impact on public health, particularly for breast, colon, and lung cancers. Early and accurate diagnosis is essential for successful ... 详细信息
来源: 评论
Provably Secure Authenticated key-Management Mechanism for e-Healthcare Environment
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Saleem, Muhammad Asad Li, Xiong Mahmood, Khalid Ghaffar, Zahid Xie, Yong Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu611731 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan National Yunlin University of Science and Technology Graduate School of Engineering Science and Technology Douliu64002 Taiwan Qinghai Institute of Technology School of Computer and Information Science China Qinghai Provincial Laboratory for Intelligent Computing and Application China Key Laboratory of Computing Power Network and Information Security Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security China Shandong Fundamental Research Center for Computer Science Jinan250353 China
The Internet of Things (IoT) is rapidly permeating all aspects of human life, involving a network of devices that share sensitive data. A notable application is the e-healthcare systems, which employ connected sensors... 详细信息
来源: 评论
Research Review on Vulnerability Detection of Smart Contract in data Transaction
收藏 引用
Computer Engineering and Applications 2025年 第9期61卷 1-24页
作者: Li, Wenjie Li, Leixiao Liu, Dongjiang Du, Jinze Lin, Hao College of Data Science and Application Inner Mongolia University of Technology Hohhot010080 China Key Laboratory of Cyberspace Security in Northern Xinjiang Inner Mongolia Autonomous Region Hohhot010080 China Inner Mongolia Autonomous Region Software Service Engineering Technology Research Center Based on Big Data Hohhot010080 China College of Computer Science and Engineering Tianjin University of Technology Tianjin300384 China
data transactions based on smart contracts effectively overcome the problems of centralization, single point of failure and transaction opacity in traditional transactions, and significantly improve transaction effici... 详细信息
来源: 评论
A Novel Identification Method for Frequently Switched Encrypted Video Streaming in Complex network Environment  22
A Novel Identification Method for Frequently Switched Encryp...
收藏 引用
2022 Asia Conference on Electrical, Power and Computer Engineering, EPCE 2022
作者: Zhang, Y.U. Ma, Xiaowei Leng, Dongpeng Yu, Peiran College of Cyber Science Nankai University Tianjin Key Laboratory of Network and Data Security Technology Tianjin China College of Computer Science Nankai University Tianjin Key Laboratory of Network and Data Security Technology Tianjin China
Nowadays, to provide stable video streaming and smooth user experience among different scenarios, more and more online video sharing and social media platforms adopt the Dynamic Adaptive Streaming over HTTP (DASH), wh... 详细信息
来源: 评论
MIA-UNet:Multi-Scale Iterative Aggregation U-network for Retinal Vessel Segmentation
收藏 引用
Computer Modeling in Engineering & Sciences 2021年 第11期129卷 805-828页
作者: Linfang Yu Zhen Qin Yi Ding Zhiguang Qin Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of ChinaChengdu610054China
As an important part of the new generation of information technology,the Internet of Things(IoT)has been widely concerned and regarded as an enabling technology of the next generation of health care *** fundus photogr... 详细信息
来源: 评论
A novel network intrusion detection model based on two-phase detection and manually labeling
A novel network intrusion detection model based on two-phase...
收藏 引用
2021 International Conference on Internet of Things and Machine Learning, IoTML 2021
作者: Zhang, Yu Zhou, Yangbo Ma, Xiaowei Tianjin Key Laboratory of Network and Data Security Technology College of Cyber Science Nankai University Tianjin China
network intrusion detection system (NIDS) is a tool that can detect various network attacks by analyzing network traffic. In recent years, traditional machine learning and deep learning methods have been widely used i... 详细信息
来源: 评论
Fuzzing Drone Control System Configurations Based on Quality-Diversity Enhanced Genetic Algorithm  1st
Fuzzing Drone Control System Configurations Based on Qualit...
收藏 引用
1st International Conference on Artificial Intelligence security and Privacy, AIS and P 2023
作者: Chang, Zhiwei Zhang, Hanfeng Yang, Yue Jia, Yan Xu, Sihan Li, Tong Liu, Zheli College of Cyber Science Tianjin Key Laboratory of Network and Data Security Technology Nankai University Tianjin China
As drones are becoming widely used in various fields, drone security is a growing challenge nowadays. Drone control systems use various configuration parameters to control their positions and attitudes. If these param... 详细信息
来源: 评论