咨询与建议

限定检索结果

文献类型

  • 959 篇 会议
  • 941 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 1,905 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,281 篇 工学
    • 858 篇 计算机科学与技术...
    • 671 篇 软件工程
    • 368 篇 信息与通信工程
    • 174 篇 电气工程
    • 150 篇 电子科学与技术(可...
    • 143 篇 控制科学与工程
    • 115 篇 生物工程
    • 102 篇 光学工程
    • 89 篇 机械工程
    • 69 篇 生物医学工程(可授...
    • 66 篇 网络空间安全
    • 64 篇 仪器科学与技术
    • 55 篇 动力工程及工程热...
    • 52 篇 化学工程与技术
    • 52 篇 交通运输工程
    • 37 篇 安全科学与工程
    • 33 篇 建筑学
    • 32 篇 土木工程
  • 617 篇 理学
    • 291 篇 数学
    • 213 篇 物理学
    • 129 篇 生物学
    • 93 篇 统计学(可授理学、...
    • 54 篇 化学
    • 45 篇 系统科学
  • 337 篇 管理学
    • 199 篇 管理科学与工程(可...
    • 151 篇 图书情报与档案管...
    • 84 篇 工商管理
  • 70 篇 医学
    • 54 篇 临床医学
    • 36 篇 基础医学(可授医学...
  • 42 篇 法学
  • 29 篇 经济学
    • 29 篇 应用经济学
  • 16 篇 教育学
  • 14 篇 军事学
  • 12 篇 农学
  • 4 篇 艺术学
  • 3 篇 文学
  • 1 篇 哲学

主题

  • 56 篇 computer network...
  • 54 篇 feature extracti...
  • 46 篇 semantics
  • 37 篇 training
  • 35 篇 accuracy
  • 34 篇 robustness
  • 31 篇 deep learning
  • 30 篇 computational mo...
  • 26 篇 bandwidth
  • 25 篇 federated learni...
  • 24 篇 protocols
  • 24 篇 delay
  • 23 篇 throughput
  • 23 篇 computer vision
  • 22 篇 wireless communi...
  • 21 篇 blockchain
  • 19 篇 machine learning
  • 19 篇 security
  • 19 篇 telecommunicatio...
  • 18 篇 data mining

机构

  • 66 篇 school of comput...
  • 63 篇 jiangsu engineer...
  • 51 篇 hubei key labora...
  • 49 篇 computer network...
  • 48 篇 national enginee...
  • 47 篇 national enginee...
  • 47 篇 center for multi...
  • 41 篇 national key lab...
  • 41 篇 national compute...
  • 33 篇 centre for multi...
  • 31 篇 university of ch...
  • 29 篇 university of sc...
  • 29 篇 national enginee...
  • 29 篇 collaborative in...
  • 25 篇 centro brasileir...
  • 25 篇 istanbul technic...
  • 25 篇 institute of inf...
  • 25 篇 national compute...
  • 24 篇 national and kap...
  • 24 篇 yerevan physics ...

作者

  • 70 篇 du bo
  • 40 篇 tao dacheng
  • 33 篇 wang jin
  • 31 篇 hu ruimin
  • 29 篇 chia liang-tien
  • 27 篇 boxin shi
  • 27 篇 chai kiat yeo
  • 25 篇 shi boxin
  • 25 篇 wang zheng
  • 24 篇 liu juhua
  • 23 篇 sun xingming
  • 23 篇 ruimin hu
  • 23 篇 bu sung lee
  • 21 篇 konstantinou s.
  • 20 篇 lethuillier m.
  • 20 篇 pauls a.
  • 20 篇 lehti s.
  • 20 篇 waltenberger w.
  • 20 篇 lowette s.
  • 19 篇 ding liang

语言

  • 1,566 篇 英文
  • 310 篇 其他
  • 29 篇 中文
  • 1 篇 日文
检索条件"机构=Center of Multimedia and Network Technology School of Computer Engineering"
1905 条 记 录,以下是101-110 订阅
排序:
Error analysis of spherically constrained least squares reformulation in solving the stackelberg prediction game  24
Error analysis of spherically constrained least squares refo...
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing Systems
作者: Xiyuan Li Weiwei Liu School of Computer Science and National Engineering Research Center for Multimedia Software and Institute of Artificial Intelligence and Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University
The Stackelberg prediction game (SPG) is a popular model for characterizing strategic interactions between a learner and an adversarial data provider. Although optimization problems in SPGs are often NP-hard, a notabl...
来源: 评论
The reliability of OKRidge method in solving sparse ridge regression problems  24
The reliability of OKRidge method in solving sparse ridge re...
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing Systems
作者: Xiyuan Li Youjun Wang Weiwei Liu School of Computer Science and National Engineering Research Center for Multimedia Software and Institute of Artificial Intelligence and Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University
Sparse ridge regression problems play a significant role across various domains. To solve sparse ridge regression, [1] recently proposes an advanced algorithm, Scalable Optimal K-Sparse Ridge Regression (OKRidge), whi...
来源: 评论
SenseFuzz: Black-box Fuzzing of ICS Protocols via Runtime Statistics Sensing  9
SenseFuzz: Black-box Fuzzing of ICS Protocols via Runtime St...
收藏 引用
9th IEEE Smart World Congress, SWC 2023
作者: Li, Yin Fu, Anmin Zhang, Yuqing University of Chinese Academy of Sciences National Computer Network Intrusion Protection Center Beijing China Nanjing University of Science and Technology School of Computer Science and Engineering Nanjing China
The ICS protocols undertake critical functions in industrial control systems, by enabling real-time data exchange, data acquisition, parameter configuration, status monitoring, fault diagnosis, command issuance and ex... 详细信息
来源: 评论
Perception-Enhanced Generative Transformer for Key Information Extraction from Documents  27th
Perception-Enhanced Generative Transformer for Key Informat...
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Zhao, Runbo Ou Yang, Jun Jie Gao, Chen Qin, Xugong Zeng, Gangyan Hu, Xiaoxu Zhang, Peng School of Cyber Science and Engineering Nanjing University of Science and Technology Nanjing China Viterbi School of Engineering University of Southern California Los Angeles United States National Computer Network Response Technical Team/Coordination Center Technology Beijing China Laboratory for Advanced Computing and Intelligence Engineering Wuxi China
Key information extraction (KIE) from scanned documents has attracted significant attention due to practical real-world applications. Despite impressive results achieved by incorporating multimodal information within ... 详细信息
来源: 评论
Research on Lightweight Sensing technology Based on Single-Antenna Multicarrier
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 20678-20694页
作者: Jiang, Yu Zhu, Di Wang, Jiadong Hu, Aiqun Southeast University School of Cyber Science and Engineering Nanjing210096 China Purple Mountain Laboratories Nanjing210096 China Key Laboratory of Computer Network Technology of Jiangsu Province Nanjing210096 China Southeast University Frontiers Science Center for Mobile Information Communication and Security Nanjing210096 China Southeast University School of Cyber Science and Engineering School of Information Science and Engineering State Key Laboratory of Mobile Communication Frontiers Science Center for Mobile Information Communication and Security Nanjing210096 China
Channel state information (CSI) serves as a critical indicator of wireless signal conditions and is widely regarded by researchers for its sensitivity in detecting changes within the channel. However, traditional sens... 详细信息
来源: 评论
Task Offloading Strategy with Emergency Handling and Blockchain Security in SDN-Empowered and Fog-Assisted Healthcare IoT
收藏 引用
Tsinghua Science and technology 2022年 第4期27卷 760-776页
作者: Junyu Ren Jinze Li Huaxing Liu Tuanfa Qin School of Electronic and Information Engineering South China University of TechnologyGuangzhou 510640China Guangxi University Xingjian College of Science and Liberal Arts Nanning 530004China Guangxi Key Laboratory of Multimedia Communications and Network Technology Guangxi UniversityNanning 530004China Guangxi Key Laboratory of Multimedia Communications and Network Technology School of ComputerElectronics and InformationGuangxi UniversityNanning 530004China Faculty of Earth Sciences&Geography Trinity CollegeUniversity of CambridgeCambridgeCB21TNUK
With the rapid advancement of the Internet of Things(IoT),the typical application of wireless body area networks(WBANs)based smart healthcare has drawn wide attention from all sectors of *** alleviate the pressing cha... 详细信息
来源: 评论
VIPNet: Combining Viewpoint Information and Shape Priors for Instant Multi-view 3D Reconstruction  17th
VIPNet: Combining Viewpoint Information and Shape Priors fo...
收藏 引用
17th Asian Conference on computer Vision, ACCV 2024
作者: Ye, Weining Li, Zhixuan Jiang, Tingting School of Computer Science Peking University Beijing100871 China College of Computing and Data Science Nanyang Technological University Singapore Singapore National Engineering Research Center of Visual Technology National Key Laboratory for Multimedia Information Processing School of Computer Science National Biomedical Imaging Center Peking University Beijing100871 China
While the multi-view 3D reconstruction task has made significant progress, existing methods simply fuse multi-view image features without effectively leveraging available auxiliary information, especially the viewpoin... 详细信息
来源: 评论
Research on active defense decision-making method for cloud boundary networks based on reinforcement learning of intelligent agent
收藏 引用
High-Confidence Computing 2024年 第2期4卷 50-61页
作者: Huan Wang Yunlong Tang Yan Wang Ning Wei Junyi Deng Zhiyan Bin Weilong Li School of Computer Science and Technology Guangxi University of Science and TechnologyLiuzhou 545000China Liuzhou Key Laboratory of Big Data Intelligent Processing and Security Liuzhou 545000China Guangxi Education System Network Security Monitoring Center Liuzhou 545000China Center of Graphics and Information Guangxi ECO-Engineering Vocational&Technical CollegeLiuzhou 545004China
The cloud boundary network environment is characterized by a passive defense strategy,discrete defense actions,and delayed defense feedback in the face of network attacks,ignoring the influence of the external environ... 详细信息
来源: 评论
Aggregation-based dual heterogeneous task allocation in spatial crowdsourcing
收藏 引用
Frontiers of computer Science 2024年 第6期18卷 215-227页
作者: Xiaochuan LIN Kaimin WEI Zhetao LI Jinpeng CHEN Tingrui PEI College of Information Science and Technology&Cyberspace Security Jinan UniversityGuangzhou 510632China National&Local Joint Engineering Research Center of Network Security Detection and Protection Technology Guangzhou 510632China Guangdong Provincial Key Laboratory of Data Security and Privacy Protection Guangzhou 510632China School of Computer Science Beijing University of Posts and TelecommunicationsBeijing 100876China
Spatial crowdsourcing(SC)is a popular data collection paradigm for numerous *** the increment of tasks and workers in SC,heterogeneity becomes an unavoidable difficulty in task *** researches only focus on the single-... 详细信息
来源: 评论
Dual-focus: person search from Coarse-Grained Focus to Fine-Grained Focus
Dual-focus: person search from Coarse-Grained Focus to Fine-...
收藏 引用
作者: Hu, Wenyi Wang, Xiao Wang, Zheng Xu, Xin Hu, Ruimin National Engineering Research Center for Multimedia Software Wuhan University Hubei Wuhan430079 China School of Computer Science and Technology Wuhan University of Science and Technology Hubei Wuhan430065 China
Person search, which aims to find the target person in the whole scene images, has become a crucial application in security surveillance with various types of noise. Existing methods solve this problem by addressing t... 详细信息
来源: 评论