咨询与建议

限定检索结果

文献类型

  • 2,260 篇 会议
  • 1,842 篇 期刊文献
  • 10 册 图书

馆藏范围

  • 4,112 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,652 篇 工学
    • 1,787 篇 计算机科学与技术...
    • 1,427 篇 软件工程
    • 755 篇 信息与通信工程
    • 378 篇 电气工程
    • 320 篇 电子科学与技术(可...
    • 261 篇 控制科学与工程
    • 243 篇 生物工程
    • 166 篇 光学工程
    • 162 篇 机械工程
    • 146 篇 仪器科学与技术
    • 136 篇 生物医学工程(可授...
    • 115 篇 网络空间安全
    • 93 篇 动力工程及工程热...
    • 89 篇 化学工程与技术
    • 78 篇 核科学与技术
    • 73 篇 交通运输工程
    • 64 篇 安全科学与工程
  • 1,316 篇 理学
    • 632 篇 数学
    • 425 篇 物理学
    • 267 篇 生物学
    • 193 篇 统计学(可授理学、...
    • 119 篇 系统科学
    • 95 篇 化学
  • 669 篇 管理学
    • 398 篇 管理科学与工程(可...
    • 284 篇 图书情报与档案管...
    • 155 篇 工商管理
  • 109 篇 医学
    • 86 篇 临床医学
    • 73 篇 基础医学(可授医学...
  • 108 篇 法学
    • 70 篇 社会学
  • 64 篇 经济学
    • 63 篇 应用经济学
  • 31 篇 农学
  • 21 篇 军事学
  • 15 篇 文学
  • 12 篇 教育学
  • 8 篇 艺术学

主题

  • 106 篇 hadron colliders
  • 105 篇 computer network...
  • 99 篇 semantics
  • 96 篇 feature extracti...
  • 82 篇 laboratories
  • 82 篇 protocols
  • 73 篇 computational mo...
  • 70 篇 bandwidth
  • 65 篇 accuracy
  • 63 篇 computer science
  • 63 篇 deep learning
  • 60 篇 quality of servi...
  • 59 篇 training
  • 57 篇 wireless sensor ...
  • 53 篇 security
  • 49 篇 routing
  • 48 篇 cryptography
  • 47 篇 network topology
  • 46 篇 computer archite...
  • 45 篇 authentication

机构

  • 159 篇 school of comput...
  • 150 篇 centro brasileir...
  • 149 篇 national and kap...
  • 149 篇 istanbul technic...
  • 148 篇 university of sp...
  • 148 篇 yerevan physics ...
  • 147 篇 universidad iber...
  • 146 篇 academy of scien...
  • 145 篇 brunel universit...
  • 145 篇 indian institute...
  • 145 篇 charles universi...
  • 141 篇 university of de...
  • 140 篇 department of ph...
  • 139 篇 rwth aachen univ...
  • 138 篇 università di to...
  • 137 篇 imperial college...
  • 135 篇 infn sezione di ...
  • 133 篇 zhejiang univers...
  • 130 篇 department of ph...
  • 130 篇 indian institute...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 112 篇 e. migliore
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 111 篇 p. avery
  • 111 篇 l. silvestris

语言

  • 3,751 篇 英文
  • 247 篇 其他
  • 125 篇 中文
检索条件"机构=Computer Engineering and Network Laboratory"
4112 条 记 录,以下是361-370 订阅
排序:
MDFG: Multi-Dimensional Fine-Grained Modeling for Fatigue Detection  39
MDFG: Multi-Dimensional Fine-Grained Modeling for Fatigue De...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Wang, Mei Zhu, Xiaojie Hu, Ruimin Zhu, Dongliang Liao, Liang Ye, Mang National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University China Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University China School of Cyber Science and Engineering Wuhan University Whuhan China Cyberspace Security Laboratory School of Network and Information Security Xidian University Xi'an China The School of Computer Science and Engineering Nanyang Technological University Singapore
Fatigue is a critical factor contributing to accidents in industries such as safety monitoring and engineering construction. Fatigue exhibits dynamic complexity and non-stationary characteristics, so there are many in... 详细信息
来源: 评论
Breaking Speaker Recognition with Paddingback
Breaking Speaker Recognition with Paddingback
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Zhe Ye Diqun Yan Li Dong Kailai Shen Faculty of Electrical Engineering and Computer Science Ningbo University Ningbo China Zhejiang Key Laboratory of Mobile Network Application Technology China
Machine Learning as a Service (MLaaS) has gained popularity due to advancements in Deep Neural networks (DNNs). However, untrusted third-party platforms have raised concerns about AI security, particularly in backdoor...
来源: 评论
Attribute-Based Data Sharing Scheme with Flexible Search Functionality for Cloud-Assisted Autonomous Transportation System
收藏 引用
IEEE Transactions on Industrial Informatics 2023年 第11期19卷 10977-10986页
作者: Xiong, Hu Wang, Hanxiao Meng, Weizhi Yeh, Kuo-Hui University of Electronic Science and Technology of China School of Information and Software Engineering Network and Data Security Key Laboratory of Sichuan Province Chengdu610054 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610025 China Technical University of Denmark Department of Applied Mathematics and Computer Science Kongens Lyngby2800 Denmark National Dong Hwa University Department of Information Management Hualien97401 Taiwan National Sun Yat-sen University Department of Computer Science and Engineering Kaohsiung804201 Taiwan
The existing group public key encryption with equality test schemes could only support one-to-one data sharing and are not suitable for cloud-assisted autonomous transportation systems, which demand one-to-many data s... 详细信息
来源: 评论
THC-DL: Three-Party Homomorphic Computing Delegation Learning for Secure Optimization
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Yang, Ze Tian, Youliang Xiong, Jinbo Niu, Kun Li, Mengqian Zhang, Xinyu Ma, Jianfeng Guizhou University Guizhou Provincial Key Laboratory of Cryptography and Blockchain Technology College of Computer Science and Technology Guiyang550025 China Guizhou University College of Big Data and Information Engineering Guiyang550025 China Fujian Normal University Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fuzhou350117 China Xidian University State Key Laboratory of Integrated Services Network Xi’an710071 China Xidian University State Key Laboratory of Integrated Services Network School of Cyber Engineering Xi’an710071 China
Delegation Learning(DL) flourishes data sharing, enabling agents to delegate data to the cloud for model training. To preserve privacy, homomorphic encryption (HE) offers an effective solution for privacy-preserving m... 详细信息
来源: 评论
A Web Attack Detection Method Based on DistilBERT and Feature Fusion for Power Micro-Application Server  2
A Web Attack Detection Method Based on DistilBERT and Featur...
收藏 引用
2nd International Conference on Advanced Electronics, Electrical and Green Energy, AEEGE 2023
作者: Nige, Li Lu, Chen Lei, Zhao Zhenning, Teng Zhiqiang, Wang Yiyang, Shao Xiaolin, Gui State Grid Laboratory of Power Cyber-Security Protection and Monitoring Technology State Grid Smart Grid Research Institute Co.Ltd. Nanjing China Xi'an Jiaotong University Faculty of Electronic and Information Engineering Shaanxi Province Key Laboratory of Computer Network Xi'an China
The widespread use of power micro-applications has significantly expanded the attack surface of their server side, thus increasing the risk of vulnerability attacks such as SQL injection, XSS, and CRLF injection. To e... 详细信息
来源: 评论
Vision-language models are strong noisy label detectors  24
Vision-language models are strong noisy label detectors
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing Systems
作者: Tong Wei Hao-Tian Li Chun-Shu Li Jiang-Xin Shi Yu-Feng Li Min-Ling Zhang School of Computer Science and Engineering Southeast University Nanjing China and Key Laboratory of Computer Network and Information Integration (Southeast University) Ministry of Education China and National Key Laboratory for Novel Software Technology Nanjing University China School of Computer Science and Engineering Southeast University Nanjing China and Key Laboratory of Computer Network and Information Integration (Southeast University) Ministry of Education China National Key Laboratory for Novel Software Technology Nanjing University China and School of Artificial Intelligence Nanjing University China
Recent research on fine-tuning vision-language models has demonstrated impressive performance in various downstream tasks. However, the challenge of obtaining accurately labeled data in real-world applications poses a...
来源: 评论
An Efficient and Interpre Table Speech Enhancement network Via Deep Dictionary Learning
An Efficient and Interpre Table Speech Enhancement Network V...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Xinmeng Xu Yiqun Zhang Weiping Tu Yuhong Yang NERCMS School of Computer Science Wuhan University China Hubei Luojia Laboratory China Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University China
Speech enhancement is a vital and highly ill-posed problem for many speech downstream tasks. While currently existing deep learning based speech enhancement methods have held state-of-the-art results, they still posse...
来源: 评论
A Parallelizable Counterfactual Generation Method Based on Gradient Optimization  29
A Parallelizable Counterfactual Generation Method Based on G...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Ding, Haorun Jiang, Xuesong Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Quan Cheng Laboratory Jinan China State Key Laboratory of High-end Server and Storage Technology Jinan China
Post-hoc explanations are important for people to understand the predictions of explanation models. One class of methods in post-hoc explanation is the generation of counterfactuals, where a hypothetical example is ob... 详细信息
来源: 评论
Curricular Contrastive Regularization for Speech Enhancement with Self-Supervised Representations
Curricular Contrastive Regularization for Speech Enhancement...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Xinmeng Xu Chang Han Yiqun Zhang Weiping Tu Yuhong Yang NERCMS School of Computer Science Wuhan University China Hubei Luojia Laboratory China Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University China
Existing deep learning-based speech enhancement methods only adopt clean speech as positive samples to guide the training of speech enhancement networks while negative samples, i.e., noisy speech, are unexploited. In ...
来源: 评论
Responding to News Sensitively in Stock Attention networks via Prompt-Adaptive Trimodal Model
收藏 引用
IEEE Transactions on Neural networks and Learning Systems 2025年 第6期36卷 10099-10113页
作者: Haotian Liu Bowen Hu Yadong Zhou Yuxun Zhou Ministry of Education Key Laboratory for Intelligent Networks and Network Security Faculty of Electronic and Information Engineering Xi’an Jiaotong University Xi’an Shaanxi China Department of Electrical Engineering and Computer Sciences University of California at Berkeley Berkeley CA USA
Modern quantitative finance and portfolio-based investment hinge on multimedia news and historical price trends for stock movement prediction. However, prior studies overlook the long tail effect in the feature distri... 详细信息
来源: 评论