咨询与建议

限定检索结果

文献类型

  • 2,263 篇 会议
  • 1,855 篇 期刊文献
  • 10 册 图书

馆藏范围

  • 4,128 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,667 篇 工学
    • 1,802 篇 计算机科学与技术...
    • 1,426 篇 软件工程
    • 760 篇 信息与通信工程
    • 380 篇 电气工程
    • 322 篇 电子科学与技术(可...
    • 273 篇 控制科学与工程
    • 243 篇 生物工程
    • 162 篇 机械工程
    • 160 篇 光学工程
    • 146 篇 仪器科学与技术
    • 134 篇 生物医学工程(可授...
    • 118 篇 网络空间安全
    • 94 篇 动力工程及工程热...
    • 89 篇 化学工程与技术
    • 78 篇 核科学与技术
    • 73 篇 交通运输工程
    • 64 篇 安全科学与工程
  • 1,316 篇 理学
    • 633 篇 数学
    • 425 篇 物理学
    • 266 篇 生物学
    • 194 篇 统计学(可授理学、...
    • 120 篇 系统科学
    • 98 篇 化学
  • 670 篇 管理学
    • 399 篇 管理科学与工程(可...
    • 284 篇 图书情报与档案管...
    • 155 篇 工商管理
  • 110 篇 医学
    • 87 篇 临床医学
    • 73 篇 基础医学(可授医学...
  • 107 篇 法学
    • 69 篇 社会学
  • 64 篇 经济学
    • 63 篇 应用经济学
  • 31 篇 农学
  • 21 篇 军事学
  • 15 篇 文学
  • 11 篇 教育学
  • 9 篇 艺术学

主题

  • 106 篇 hadron colliders
  • 105 篇 computer network...
  • 100 篇 semantics
  • 96 篇 feature extracti...
  • 82 篇 laboratories
  • 82 篇 protocols
  • 73 篇 computational mo...
  • 71 篇 bandwidth
  • 66 篇 deep learning
  • 65 篇 accuracy
  • 63 篇 computer science
  • 60 篇 quality of servi...
  • 60 篇 training
  • 57 篇 wireless sensor ...
  • 55 篇 security
  • 49 篇 routing
  • 48 篇 cryptography
  • 47 篇 computer archite...
  • 47 篇 network topology
  • 45 篇 authentication

机构

  • 162 篇 school of comput...
  • 150 篇 centro brasileir...
  • 149 篇 national and kap...
  • 149 篇 istanbul technic...
  • 148 篇 university of sp...
  • 148 篇 yerevan physics ...
  • 147 篇 universidad iber...
  • 146 篇 academy of scien...
  • 145 篇 brunel universit...
  • 145 篇 indian institute...
  • 145 篇 charles universi...
  • 141 篇 university of de...
  • 140 篇 department of ph...
  • 139 篇 rwth aachen univ...
  • 138 篇 università di to...
  • 137 篇 imperial college...
  • 135 篇 infn sezione di ...
  • 133 篇 zhejiang univers...
  • 130 篇 department of ph...
  • 130 篇 indian institute...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 112 篇 e. migliore
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 111 篇 p. avery
  • 111 篇 l. silvestris

语言

  • 3,749 篇 英文
  • 263 篇 其他
  • 127 篇 中文
检索条件"机构=Computer Engineering and Network Laboratory"
4128 条 记 录,以下是311-320 订阅
排序:
DDoS Detection and Defense Based on FLAD and SDN  20
DDoS Detection and Defense Based on FLAD and SDN
收藏 引用
20th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery, ICNC-FSKD 2024
作者: Dong, Jie Fang, Wenyu Zheng, Wanling Liu, Jinkun Liu, Yanhua College of Computer and Data Science Fuzhou University Fuzhou350108 China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou350108 China Engineering Research Center of Big Data Intelligence Ministry of Education Fuzhou350108 China
In order to achieve more efficient and accurate DDoS detection while ensuring data privacy, this paper proposes a DDoS detection method based on FLAD. Firstly, this paper uses the FLAD algorithm to train a global DDoS... 详细信息
来源: 评论
Deep Iterative Reconstruction network Based on Residual Constraint for Low-Dose CT Imaging  8
Deep Iterative Reconstruction Network Based on Residual Cons...
收藏 引用
8th International Conference on Systems and Informatics, ICSAI 2022
作者: Liu, Jin Kang, Yanqin Liu, Tao Zhang, TingYu Zhang, Yikun Anhui Polytechnic University School of Computer and Information Wuhu China Southeast University Ministry of Education Key Laboratory of Computer Network and Information Integration Nanjing China Southeast University School of Computer Science and Engineering Nanjing China
clinical low X-ray dose computed tomography (LDCT) scanner often induce high intensity strip artifact and spot nosie, compromising diagnoses and intervention plans. Recently, sparsely constrained and network learning-... 详细信息
来源: 评论
T³Planner: Multi-Phase Planning Across Structure-Constrained Optical, IP, and Routing Topologies
收藏 引用
IEEE Journal on Selected Areas in Communications 2025年 第5期43卷 1823-1839页
作者: Yijun Hao Shusen Yang Fang Li Yifan Zhang Cong Zhao Xuebin Ren Peng Zhao Chenren Xu Shibo Wang National Engineering Laboratory for Big Data Analytics Xi’an Jiaotong University Xi’an China National Engineering Laboratory for Big Data Analytics and the Ministry of Education Key Laboratory for Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an China School of Computer Science Peking University Beijing China Department of Computer Science and Engineering The Chinese University of Hong Kong Hong Kong China National Engineering Laboratory for Big Data Analytics XiÃan Jiaotong University XiÃan China
network topology planning is an essential multi-phase process to build and jointly optimize the multi-layer network topologies in wide-area networks (WANs). Most existing practices target single-phase/layer planning, ... 详细信息
来源: 评论
Timo: In-memory temporal query processing for big temporal data
Timo: In-memory temporal query processing for big temporal d...
收藏 引用
作者: Zheng, Xiao Liu, Houkai Wang, Xiujun Wu, Xuangou Yu, Feng School of Computer Science and Technology Anhui University of Technology Maanshan China Institute for Artificial Intelligence Hefei Comprehensive National Science Center Hefei China Anhui Engineering Laboratory for Intelligent Applications and Security of Industrial Internet Anhui University of Technology Anhui Maanshan China School of Computer Science and Engineering & School of Software Guangxi Normal University Guilin China Key Laboratory of Computer Network and Information Integration Southeast University Nanjing China
Today's internet applications generate massive temporal data anywhere and anytime. Although some disk-based temporal systems are currently available, they suffer from poor I/O performance, especially when applied ... 详细信息
来源: 评论
AdvTG: An Adversarial Traffic Generation Framework to Deceive DL-Based Malicious Traffic Detection Models  25
AdvTG: An Adversarial Traffic Generation Framework to Deceiv...
收藏 引用
34th ACM Web Conference, WWW 2025
作者: Sun, Peishuai Yun, Xiaochun Li, Shuhao Yin, Tao Si, Chengxiang Xie, Jiang Institute of Information Engineering Chinese Academy of Sciences School of Cyber Security University of Chinese Academy of Sciences Beijing China Zhongguancun Laboratory Beijing China National Computer Network Emergency Response Technical Team Coordination Center of China Beijing China
Deep learning-based (DL-based) malicious traffic detection models are effective but vulnerable to adversarial attacks. Existing adversarial attacks have shown promising results when targeting traffic detection models ... 详细信息
来源: 评论
Crucial Interaction Elements Detection for 5G Core network based on the Complex network Model
Crucial Interaction Elements Detection for 5G Core Network b...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Ruinan Peng Xinhong Hei Yichuan Wang Xiaoxue Liu Yeqiu Xiao School of Computer Science and Engineering Xi’an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China
This paper focuses on the issue of crucial interaction elements detection in the 5G core network. Given the current absence of an effective method for quantification evaluating the importance of interaction elements, ... 详细信息
来源: 评论
Compiler Differentiation Detection Method for Binary Similarity
Compiler Differentiation Detection Method for Binary Similar...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Xiaoxue Liu Xinwei Duan Xinhong Hei Yichuan Wang Xin Song School of computer science and engineering Xi’an University of technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology
Compiler differential detection can be performed by detecting the similarity between the binary compiled by the compiler and the ideal compiled file. This article proposes a javac compiler differentiation detection sy... 详细信息
来源: 评论
A Gradient-Guided Method for Hyperspectral Band Selection Based on Spatial-Spectral Weighting
A Gradient-Guided Method for Hyperspectral Band Selection Ba...
收藏 引用
IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems (MASS)
作者: Jing Hu Ke Lit Yunfei Ju Minghua Zhao Shaanxi Key Laboratory for Network Computing and Security Technology School of Computer Science and Engineering Xi'an University of Technology Xi'an China
Hyperspectral image(HSI) band selection is a crucial task in image processing. It is necessary to screen out bands with rich information and low correlation, to achieve data dimensionality reduction and retain key inf... 详细信息
来源: 评论
Robust restoration of low-dose cerebral perfusion CT images using NCS-Unet
收藏 引用
Nuclear Science and Techniques 2022年 第3期33卷 62-76页
作者: Kai Chen Li-Bo Zhang Jia-Shun Liu Yuan Gao Zhan Wu Hai-Chen Zhu Chang-Ping Du Xiao-Li Mai Chun-Feng Yang Yang Chen Southeast University Nanjing 210096China School of Cyber Science and Engineering Southeast UniversityNanjing 210096China Key Laboratory of Computer Network and Information Integration(Southeast University) Ministry of EducationNanjing 210096China Department of Radiology General Hospital of the Northern Theater of the Chinese People’s Liberation ArmyShenyang 110016China Laboratory of Image Science and Technology The School of Computer Science and EngineeringSoutheast UniversityNanjing 210096China Department of Radiology Nanjing Drum Tower HospitalThe Affiliated Hospital of Nanjing University Medical SchoolNanjing 210008China Jiangsu Key Laboratory of Molecular and Functional Imaging Department of RadiologyZhongda HospitalSoutheast UniversityNanjing 210009China Jiangsu Provincial Joint International Research Laboratory of Medical Information Processing School of Computer Science and EngineeringSoutheast UniversityNanjing 210096China
Cerebral perfusion computed tomography(PCT)is an important imaging modality for evaluating cerebrovascular diseases and stroke *** widespread public concern about the potential cancer risks and health hazards associat... 详细信息
来源: 评论
Activity Recognition Method Based on Kernel Supervised Laplacian Eigenmaps
Activity Recognition Method Based on Kernel Supervised Lapla...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Pengjia Tu Cheng Tian Dandan Du Junhuai Li Huaijun Wang School of Computer Science and Engineering Xi’an University of Technology China Shaanxi Key Laboratory for Network Computing and Security Technology China
Laplacian dimensionality reduction can effectively achieve feature transformation and preserve the important structure of high-dimensional features. However, the trained model with this method usually require better g...
来源: 评论