咨询与建议

限定检索结果

文献类型

  • 637 篇 会议
  • 197 篇 期刊文献

馆藏范围

  • 834 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 440 篇 工学
    • 335 篇 计算机科学与技术...
    • 272 篇 软件工程
    • 148 篇 电气工程
    • 99 篇 信息与通信工程
    • 78 篇 控制科学与工程
    • 39 篇 电子科学与技术(可...
    • 34 篇 安全科学与工程
    • 30 篇 网络空间安全
    • 24 篇 生物工程
    • 23 篇 机械工程
    • 18 篇 交通运输工程
    • 17 篇 光学工程
    • 12 篇 仪器科学与技术
    • 12 篇 化学工程与技术
    • 12 篇 生物医学工程(可授...
    • 10 篇 材料科学与工程(可...
    • 10 篇 动力工程及工程热...
  • 162 篇 理学
    • 104 篇 数学
    • 39 篇 统计学(可授理学、...
    • 31 篇 物理学
    • 22 篇 生物学
    • 13 篇 化学
    • 11 篇 系统科学
  • 116 篇 管理学
    • 78 篇 管理科学与工程(可...
    • 53 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 29 篇 法学
    • 21 篇 社会学
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 14 篇 医学
    • 13 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 3 篇 教育学
  • 2 篇 农学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 75 篇 feature extracti...
  • 68 篇 accuracy
  • 45 篇 computational mo...
  • 43 篇 semantics
  • 41 篇 federated learni...
  • 39 篇 data models
  • 39 篇 training
  • 26 篇 neural networks
  • 24 篇 deep learning
  • 23 篇 transformers
  • 21 篇 adaptation model...
  • 20 篇 visualization
  • 20 篇 privacy
  • 19 篇 network security
  • 18 篇 predictive model...
  • 18 篇 attention mechan...
  • 17 篇 object detection
  • 17 篇 data mining
  • 17 篇 benchmark testin...
  • 17 篇 measurement

机构

  • 231 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 52 篇 shandong fundame...
  • 46 篇 shandong enginee...
  • 39 篇 state grid key l...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 28 篇 state grid key l...
  • 27 篇 shandong provinc...
  • 20 篇 key laboratory o...
  • 19 篇 global energy in...
  • 16 篇 key laboratory o...
  • 16 篇 qilu university ...
  • 15 篇 global energy in...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 shandong fundame...
  • 14 篇 key laboratory o...
  • 13 篇 global energy in...

作者

  • 20 篇 xiaoming wu
  • 15 篇 lin peng
  • 15 篇 xiangzhi liu
  • 14 篇 lu wenpeng
  • 13 篇 guohua lv
  • 13 篇 mingle zhou
  • 12 篇 xiaohui han
  • 12 篇 delong han
  • 12 篇 wang changwei
  • 12 篇 peng lin
  • 12 篇 wenpeng lu
  • 12 篇 wang gang
  • 11 篇 jing zhao
  • 11 篇 wei zhang
  • 11 篇 aimin li
  • 11 篇 zhao dongmei
  • 10 篇 xu rongtao
  • 9 篇 wu xiaoming
  • 9 篇 guixin zhao
  • 9 篇 gang wang

语言

  • 760 篇 英文
  • 69 篇 其他
  • 6 篇 中文
  • 2 篇 斯洛文尼亚文
检索条件"机构=the Key Laboratory of Computing Power Network and Information Security"
834 条 记 录,以下是281-290 订阅
排序:
A Multi-Scale Infrared and Visible Image Fusion network Based on Context Perception
A Multi-Scale Infrared and Visible Image Fusion Network Base...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Huixuan Zhao Jinyong Cheng Rundong Du Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Existing image fusion methods often fail to fully utilize the contextual information of the images, resulting in blurry and distorted fusion results. In addition, although the existing multi-scale feature extraction m... 详细信息
来源: 评论
Android Malware Detection Method Based on Graph Convolutional networks
Android Malware Detection Method Based on Graph Convolutiona...
收藏 引用
Artificial Intelligence and power Systems (AIPS), International Conference on
作者: Qingling Xu Shumian Yang Lijuan Xu Dawei Zhao Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) (Shandong Academy of Sciences) Qilu University of Technology Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Facing the serious security threats posed by Android malware amidst the rapid development of mobile internet, there is an urgent need to develop more accurate and efficient detection technologies. This paper introduce... 详细信息
来源: 评论
BTP-CAResNet: An Encrypted Traffic Classification Method Based on Byte Transfer Probability and Coordinate Attention Mechanism
BTP-CAResNet: An Encrypted Traffic Classification Method Bas...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Junhao Li Huiling Shi Wei Zhang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
With the extensive application of network traffic encryption technology, the accurate and efficient classification of encrypted traffic has become a critical need for network management. Deep learning has become the p... 详细信息
来源: 评论
Lightweight Fusion Model with Time-Frequency Features for Speech Emotion Recognition
Lightweight Fusion Model with Time-Frequency Features for Sp...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Peng Zhang Meijuan Li Hui Zhao Yida Chen Fuqiang Wang Ye Li Wei Zhao Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Automatic speech emotion recognition (SER) is the task to predict the emotional state from speech, and has become a vital part of human-machine interaction. Recent studies focus on learning from multiple features via ... 详细信息
来源: 评论
Context-Guided and Syntactic Augmented Dual Graph Convolutional network for Aspect-Based Sentiment Analysis
Context-Guided and Syntactic Augmented Dual Graph Convolutio...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Jia Yi Xiaoming Wu Xiangzhi Liu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Predicting the sentiment polarity of aspect terms in sentences is the goal of Aspect-Based Sentiment Analysis(ABSA) task. Graph Convolutional network(GCN) is used in majority of the ABSA task due to its ability to eff...
来源: 评论
An Adaptive Residual Coordinate Attention-Based network for Hat and Mask Wearing Detection in Kitchen Environments
An Adaptive Residual Coordinate Attention-Based Network for ...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Ying Zhao Xiaoming Wu Xiangzhi Liu Hao Chen Bei Qi Huomin Dong Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
In order to ensure food safety, it is required for personnel to wear hats and masks during food handling processes. To accurately detect the wearing status of kitchen staff, the ARP-YOLO model is proposed. Firstly, im... 详细信息
来源: 评论
Lightweight Malicious Encrypted Traffic Detection Method Based on KL Image Compression
Lightweight Malicious Encrypted Traffic Detection Method Bas...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Yuecheng Wen Xiaotong Li Haiqing Lv Menglu Wang Wenbo Zuo Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Timely and accurate detection of and response to potentially malicious encrypted traffic is crucial in cybersecurity strategies. Convolutional neural network-based approaches that convert traffic loads into images for... 详细信息
来源: 评论
MMSFD: Multi-grained and Multi-modal Fusion for Short Video Fake News Detection
MMSFD: Multi-grained and Multi-modal Fusion for Short Video ...
收藏 引用
Data Science and information Technology (DSIT), International Conference on
作者: Shuai Ren Yahui Liu Yaping Zhu Wanlong Bing Hongliang Ma Wei Wang School of Information Science and Technology Shihezi University Shihezi China Key Laboratory of Computing Intelligence and Network Information Security Xinjiang Production and Construction Corps Shihezi China School of Computer Science and Information Technology Beijing Jiaotong University Beijing China
Short video platforms have become an essential part of people’s daily lives, while also facing the challenge of the rapid spread of fake news. Therefore, the detection of fake news in short videos has attracted incre... 详细信息
来源: 评论
Semantic Reconstruction Guided Missing Cross-modal Hashing
Semantic Reconstruction Guided Missing Cross-modal Hashing
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Yafang Li Chaoqun Zheng Ruifan Zuo Wenpeng Lu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Cross-modal hashing is favored in the field of large-scale cross-modal retrieval for its fast query and low storage cost. Existing cross-modal hashing methods are typically based on an idealized assumption that data f... 详细信息
来源: 评论
DTBNet: medical image segmentation model based on dual transformer bridge
DTBNet: medical image segmentation model based on dual trans...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Kequan Chen Yuli Wang Jinyong Cheng Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center(National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Accurate medical image segmentation [1] techniques help doctors make better diagnoses. The traditional U-Net [2] model usually uses skip connections to directly connect the corresponding layers of the encoder and deco... 详细信息
来源: 评论