咨询与建议

限定检索结果

文献类型

  • 959 篇 会议
  • 941 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 1,905 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,281 篇 工学
    • 858 篇 计算机科学与技术...
    • 671 篇 软件工程
    • 368 篇 信息与通信工程
    • 174 篇 电气工程
    • 150 篇 电子科学与技术(可...
    • 143 篇 控制科学与工程
    • 115 篇 生物工程
    • 102 篇 光学工程
    • 89 篇 机械工程
    • 69 篇 生物医学工程(可授...
    • 66 篇 网络空间安全
    • 64 篇 仪器科学与技术
    • 55 篇 动力工程及工程热...
    • 52 篇 化学工程与技术
    • 52 篇 交通运输工程
    • 37 篇 安全科学与工程
    • 33 篇 建筑学
    • 32 篇 土木工程
  • 617 篇 理学
    • 291 篇 数学
    • 213 篇 物理学
    • 129 篇 生物学
    • 93 篇 统计学(可授理学、...
    • 54 篇 化学
    • 45 篇 系统科学
  • 337 篇 管理学
    • 199 篇 管理科学与工程(可...
    • 151 篇 图书情报与档案管...
    • 84 篇 工商管理
  • 70 篇 医学
    • 54 篇 临床医学
    • 36 篇 基础医学(可授医学...
  • 42 篇 法学
  • 29 篇 经济学
    • 29 篇 应用经济学
  • 16 篇 教育学
  • 14 篇 军事学
  • 12 篇 农学
  • 4 篇 艺术学
  • 3 篇 文学
  • 1 篇 哲学

主题

  • 56 篇 computer network...
  • 54 篇 feature extracti...
  • 46 篇 semantics
  • 37 篇 training
  • 35 篇 accuracy
  • 34 篇 robustness
  • 31 篇 deep learning
  • 30 篇 computational mo...
  • 26 篇 bandwidth
  • 25 篇 federated learni...
  • 24 篇 protocols
  • 24 篇 delay
  • 23 篇 throughput
  • 23 篇 computer vision
  • 22 篇 wireless communi...
  • 21 篇 blockchain
  • 19 篇 machine learning
  • 19 篇 security
  • 19 篇 telecommunicatio...
  • 18 篇 data mining

机构

  • 66 篇 school of comput...
  • 63 篇 jiangsu engineer...
  • 51 篇 hubei key labora...
  • 49 篇 computer network...
  • 48 篇 national enginee...
  • 47 篇 national enginee...
  • 47 篇 center for multi...
  • 41 篇 national key lab...
  • 41 篇 national compute...
  • 33 篇 centre for multi...
  • 31 篇 university of ch...
  • 29 篇 university of sc...
  • 29 篇 national enginee...
  • 29 篇 collaborative in...
  • 25 篇 centro brasileir...
  • 25 篇 istanbul technic...
  • 25 篇 institute of inf...
  • 25 篇 national compute...
  • 24 篇 national and kap...
  • 24 篇 yerevan physics ...

作者

  • 70 篇 du bo
  • 40 篇 tao dacheng
  • 33 篇 wang jin
  • 31 篇 hu ruimin
  • 29 篇 chia liang-tien
  • 27 篇 boxin shi
  • 27 篇 chai kiat yeo
  • 25 篇 shi boxin
  • 25 篇 wang zheng
  • 24 篇 liu juhua
  • 23 篇 sun xingming
  • 23 篇 ruimin hu
  • 23 篇 bu sung lee
  • 21 篇 konstantinou s.
  • 20 篇 lethuillier m.
  • 20 篇 pauls a.
  • 20 篇 lehti s.
  • 20 篇 waltenberger w.
  • 20 篇 lowette s.
  • 19 篇 ding liang

语言

  • 1,566 篇 英文
  • 310 篇 其他
  • 29 篇 中文
  • 1 篇 日文
检索条件"机构=Center of Multimedia and Network Technology School of Computer Engineering"
1905 条 记 录,以下是111-120 订阅
排序:
Dual-Domain Multi-Model GAN Fingerprint Restoration for Compressed Fake Face Attribution
Dual-Domain Multi-Model GAN Fingerprint Restoration for Comp...
收藏 引用
IEEE International Conference on multimedia and Expo (ICME)
作者: Chengxiang Fan Aohong Shen Zhen Han Cai Tong Zhongyuan Wang Dekang Yi National Engineering Research Center for Multimedia Software and Hubei Key Laboratory of Multimedia and Network Communication Engineering School of Computer Science Wuhan University Wuhan China
Recent advances in GAN fingerprint have shown increasing success in fake face attribution. However, the fake faces are usually compressed during network transmission, which causes the degradation of GAN fingerprint an... 详细信息
来源: 评论
Model-driven Time-varying Channel Estimation Method for OFDM System Based on Neural network  24
Model-driven Time-varying Channel Estimation Method for OFDM...
收藏 引用
24th IEEE International Conference on Communication technology, ICCT 2024
作者: Zhu, Yue Fan, Dian Mu, Yunping Wang, Gongpu China Academy of Information and Communications Technology Beijing100191 China Beijing Jiaotong University Engineering Research Center of Network Management Technology for High Speed Railway Ministry of Education School of Computer and Information Technology Beijing100044 China
Channel estimation plays an important role in orthogonal frequency division multiplexing (OFDM) systems, which directly affects the performance of wireless communication systems in high-speed mobile scenarios. In this... 详细信息
来源: 评论
AWeb Application Fingerprint Recognition Method Based on Machine Learning
收藏 引用
computer Modeling in engineering & Sciences 2024年 第7期140卷 887-906页
作者: Yanmei Shi Wei Yu Yanxia Zhao Yungang Jia School of Integrated Circuit Science and Engineering Tianjin University of TechnologyTianjin300382China College of International Business Zhejiang Yuexiu UniversityShaoxing312030China School of Public Administration Zhejiang Gongshang UniversityHangzhou310018China Tianjin Branch of National Computer Network Emergency Response Technical Team/Coordination Center of China Tianjin300100China
Web application fingerprint recognition is an effective security technology designed to identify and classify web applications,thereby enhancing the detection of potential threats and *** fingerprint recognition metho... 详细信息
来源: 评论
Decrease the Prompt Uncertainty: Adversarial Prompt Learning for Few-shot Text Classification
Decrease the Prompt Uncertainty: Adversarial Prompt Learning...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Weng, Jinta Zhang, Zhaoguang Yaqi, Jing Niu, Chenxu Huang, Heyan Hu, Yue School of Cyber Security University of Chinese Academy of Sciences Beijing China Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Computer Science and Cyber Engineering Guangzhou University China National Computer Network Emergency Response Technical Team Coordination Center of China China Beijing Institute of Technology School of Computer Science and Technology Beijing China Southeast Academy of Information Technology Putian China
With few-shot learning abilities, pre-trained language models (PLMs) have achieved remarkable success in classification tasks. However, recent studies have shown that the performance of PLM is vulnerable due to differ... 详细信息
来源: 评论
A Continuous Authentication Protocol Without Trust Authority for Zero Trust Architecture
收藏 引用
China Communications 2022年 第8期19卷 198-213页
作者: Lei Meng Daochao Huang Jiahang An Xianwei Zhou Fuhong Lin School of Computer and Communication Engineering University of Science and Technology BeijingBeijing 100083China National Computer Network Emergency Response Technical Team/Coordination Center of China(CNCERT/CC) Beijing 100029China Shunde Graduate School of University of Science and Technology Beijing Guangdong528399China
Zero-trust security is a novel concept to cope with intricate access,which can not be handled by the conventional perimeter-based architecture *** device-to-device continuous authentication protocol is one of the most... 详细信息
来源: 评论
FedIERF: Federated Incremental Extremely Random Forest for Wearable Health Monitoring
收藏 引用
Journal of computer Science & technology 2023年 第5期38卷 970-984页
作者: 胡春雨 忽丽莎 袁林 陆佃杰 吕蕾 陈益强 Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science Center(National Supercomputer Center in Jinan)Qilu University of Technology(Shandong Academy of Sciences)Jinan 250353China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer ScienceJinan 250000China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan 25000China Institute of Information Technology Hebei University of Economics and BusinessShijiazhuang 050061China School of Information Science and Engineering Shandong Normal UniversityJinan 250358China Institute of Computing Technology Chinese Academy of SciencesBeijing 100190China
Wearable health monitoring is a crucial technical tool that offers early warning for chronic diseases due to its superior portability and low power ***,most wearable health data is distributed across dfferent organiza... 详细信息
来源: 评论
Color Correction Meets Cross-Spectral Refinement: A Distribution-Aware Diffusion for Underwater Image Restoration
arXiv
收藏 引用
arXiv 2025年
作者: Chang, Laibin Wang, Yunke Du, Bo Xu, Chang The School of Computer Science Institute of Artificial Intelligence National Engineering Research Center for Multimedia Software Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University China The School of Computer Science The University of Sydney Australia
Underwater imaging often suffers from significant visual degradation, which limits its suitability for subsequent applications. While recent underwater image enhancement (UIE) methods rely on the current advances in d... 详细信息
来源: 评论
Automatic skin lesion classification using a novel densely connected convolutional network integrated with an attention module
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第7期14卷 8943-8956页
作者: Shan, Pufang Chen, Jialei Fu, Chong Cao, Lin Tie, Ming Sham, Chiu-Wing School of Computer Science and Engineering Northeastern University Shenyang110819 China Engineering Research Center of Security Technology of Complex Network System Ministry of Education Shenyang China Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Northeastern University Shenyang110819 China School of Information and Communication Engineering Beijing Information Science and Technology University Beijing100101 China Science and Technology on Space Physics Laboratory Beijing100076 China School of Computer Science The University of Auckland Auckland New Zealand
Automated skin lesion classification in dermoscopy images remains challenging due to the existence of artefacts and intrinsic cutaneous features, diversity of lesion morphology, insufficiency of training data, and cla... 详细信息
来源: 评论
DPText-DETR: Towards Better Scene Text Detection with Dynamic Points in Transformer  37
DPText-DETR: Towards Better Scene Text Detection with Dynami...
收藏 引用
37th AAAI Conference on Artificial Intelligence, AAAI 2023
作者: Ye, Maoyuan Zhang, Jing Zhao, Shanshan Liu, Juhua Bo, Du Tao, Dacheng Research Center for Graphic Communication Printing and Packaging Institute of Artificial Intelligence Wuhan University China The University of Sydney Australia JD Explore Academy National Engineering Research Center for Multimedia Software Institute of Artificial Intelligence School of Computer Science Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University China
Recently, Transformer-based methods, which predict polygon points or Bezier curve control points for localizing texts, are popular in scene text detection. However, these methods built upon detection transformer frame... 详细信息
来源: 评论
Classification of Zhuang Dialect combined with Bert and SimAM
Classification of Zhuang Dialect combined with Bert and SimA...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Min Huang Xuejun Zhang Wenkang Chen School of Computer Electronics and Information Guangxi Key Laboratory of Multimedia Communications and Network Technology Guangxi University Nanning China School of Electrical Engineering Guangxi Key Laboratory of Multimedia Communications and Network Technology Guangxi University Nanning China
Language recognition refers to the automatic recognition of the language type of the given speech segments. Zhuang is an important language in Southeast Asia, with more than 16 million native speakers. Due to the scar... 详细信息
来源: 评论