咨询与建议

限定检索结果

文献类型

  • 2,291 篇 会议
  • 1,869 篇 期刊文献
  • 10 册 图书

馆藏范围

  • 4,170 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,688 篇 工学
    • 1,812 篇 计算机科学与技术...
    • 1,442 篇 软件工程
    • 769 篇 信息与通信工程
    • 408 篇 电气工程
    • 330 篇 电子科学与技术(可...
    • 278 篇 控制科学与工程
    • 241 篇 生物工程
    • 169 篇 光学工程
    • 167 篇 机械工程
    • 149 篇 仪器科学与技术
    • 133 篇 生物医学工程(可授...
    • 131 篇 网络空间安全
    • 93 篇 动力工程及工程热...
    • 92 篇 化学工程与技术
    • 82 篇 交通运输工程
    • 78 篇 核科学与技术
    • 74 篇 安全科学与工程
  • 1,314 篇 理学
    • 630 篇 数学
    • 428 篇 物理学
    • 266 篇 生物学
    • 192 篇 统计学(可授理学、...
    • 117 篇 系统科学
    • 99 篇 化学
  • 676 篇 管理学
    • 403 篇 管理科学与工程(可...
    • 285 篇 图书情报与档案管...
    • 155 篇 工商管理
  • 111 篇 医学
    • 88 篇 临床医学
    • 73 篇 基础医学(可授医学...
  • 106 篇 法学
    • 70 篇 社会学
  • 64 篇 经济学
    • 63 篇 应用经济学
  • 31 篇 农学
  • 21 篇 军事学
  • 15 篇 文学
  • 13 篇 教育学
  • 8 篇 艺术学

主题

  • 106 篇 hadron colliders
  • 104 篇 feature extracti...
  • 104 篇 computer network...
  • 103 篇 semantics
  • 83 篇 protocols
  • 82 篇 laboratories
  • 78 篇 computational mo...
  • 76 篇 accuracy
  • 70 篇 bandwidth
  • 66 篇 training
  • 62 篇 computer science
  • 62 篇 deep learning
  • 60 篇 quality of servi...
  • 56 篇 wireless sensor ...
  • 56 篇 security
  • 50 篇 cryptography
  • 48 篇 routing
  • 47 篇 computer archite...
  • 46 篇 authentication
  • 46 篇 telecommunicatio...

机构

  • 155 篇 school of comput...
  • 149 篇 centro brasileir...
  • 148 篇 national and kap...
  • 148 篇 istanbul technic...
  • 147 篇 university of sp...
  • 147 篇 yerevan physics ...
  • 146 篇 universidad iber...
  • 145 篇 academy of scien...
  • 144 篇 brunel universit...
  • 144 篇 indian institute...
  • 144 篇 charles universi...
  • 140 篇 university of de...
  • 139 篇 department of ph...
  • 138 篇 rwth aachen univ...
  • 137 篇 università di to...
  • 137 篇 imperial college...
  • 134 篇 infn sezione di ...
  • 132 篇 zhejiang univers...
  • 129 篇 department of ph...
  • 129 篇 indian institute...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 112 篇 e. migliore
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 111 篇 p. avery
  • 111 篇 l. silvestris

语言

  • 3,484 篇 英文
  • 578 篇 其他
  • 126 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 俄文
检索条件"机构=Computer Engineering and Network Laboratory"
4170 条 记 录,以下是531-540 订阅
排序:
DDoS Attack Detection Based on Information Entropy Feature Extraction in Software Defined networks
DDoS Attack Detection Based on Information Entropy Feature E...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Wenjiang Ji Yixin Yang Yaling Zhang Yichuan Wang Mengjie Tian Yuan Qiu School of computer science and engineering Xi'an University of technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology
Distributed Denial of Service(DDoS) attacks target the forwarding-control separation feature of Software-Defined networking(SDN) to launch attacks, causing network disruptions. Therefore security against DDoS attack d...
来源: 评论
PFV2: Packet fragmentation with variable size and vigorous mapping in time-sensitive networking
收藏 引用
Journal of Systems Architecture 2025年 166卷
作者: Yan, Wenyan Fu, Bin Wei, Dongsheng Li, Renfa Lei, Yixue Jia, Yuhang Xie, Guoqi Key Laboratory for Embedded and Network Computing of Hunan Province College of Computer Science and Electronic Engineering Hunan University Hunan Changsha410082 China Center for Convergence of Automobile and Cyberspace Research Institute of Hunan University in Chongqing Chongqing401120 China Future Network Laboratory Tencent Beijing100080 China Hunan Engineering Research Center of Advanced Embedded Computing and Intelligent Medical Systems School of Computer and Artificial Intelligence Xiangnan University Hunan Chenzhou423000 China
With the rapid advancement of intelligent automobiles, the ever-growing communication data put forward high bandwidth and low latency requirements. To meet these requirements, automotive Original Equipment Manufacture... 详细信息
来源: 评论
EAT: Towards Long-Tailed Out-of-Distribution Detection
arXiv
收藏 引用
arXiv 2023年
作者: Wei, Tong Wang, Bo-Lin Zhang, Min-Ling School of Computer Science and Engineering Southeast University Nanjing210096 China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education China
Despite recent advancements in out-of-distribution (OOD) detection, most current studies assume a class-balanced in-distribution training dataset, which is rarely the case in real-world scenarios. This paper addresses... 详细信息
来源: 评论
Enhanced Encrypted Traffic Classification Through Packet-Flow Dual Views
Enhanced Encrypted Traffic Classification Through Packet-Flo...
收藏 引用
2025 IEEE Wireless Communications and networking Conference, WCNC 2025
作者: Feng, Beibei Wang, Qi Yijing, Wang Li, Feifan Xu, Xiaolin Zang, Tianning Ma, Jingrun Coordination Center of China National Computer Network Emergency Response Technical Team Beijing China Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China China Assets Cybersecurity Technology Co. Ltd. Beijing China Zhongguancun Laboratory Beijing China
In the field of cybersecurity, encrypted traffic classification is of paramount importance, serving as a crucial technology for ensuring data privacy and defending against cyber attacks. Existing ETC (Encrypted Traffi... 详细信息
来源: 评论
An Experimental Study of Unsupervised Rank Aggregation Methods in World University Rankings
An Experimental Study of Unsupervised Rank Aggregation Metho...
收藏 引用
Intelligent Education and Intelligent Research (IEIR), International Conference on
作者: Shiwei Feng Qi Deng Siyi Wang Lin Song Chao Liang Hubei Key Laboratory of Multimedia and Network Communication Engineering National Engineering Research Center for Multimedia Software (NERCMS) School of Computer Science Wuhan University
Recently, more and more college ranking systems are receiving attention due to the demand and necessity of higher education and college ranking system is a key topic in the field of social choice. However, these ranki...
来源: 评论
NNVISR: Bring Neural network Video Interpolation and Super Resolution into Video Processing Framework
arXiv
收藏 引用
arXiv 2023年
作者: Tong, Yuan Hu, Mengshun Wang, Zheng National Engineering Research Center for Multimedia Software Hubei Key Laboratory of Multimedia and Network Communication Engineering School of Computer Science Wuhan University China
We present NNVISR - an open-source filter plugin for the VapourSynth1 video processing framework, which facilitates the application of neural networks for various kinds of video enhancing tasks, including denoising, s... 详细信息
来源: 评论
A dual-archive niche with two-stage directed differential evolution for multimodal multi-objective optimization
收藏 引用
The Journal of Supercomputing 2025年 第8期81卷 1-34页
作者: Chen, Yilin Gao, Bo Lu, Tao Wu, Yiqi Liao, Xiangyun Wang, Qiong School of Computer Science and Engineering Wuhan Institute of Technology Wuhan China Hubei Key Laboratory of Intelligent Robot Wuhan Institute of Technology Wuhan China Hubei Provincial Key Laboratory of Multimedia and Network Communication Engineering Wuhan University Wuhan China School of Computer Science China University of Geosciences Wuhan China Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Shenzhen China
Multimodal Multi-Objective Optimization Problems (MMOPs) refer to situations where there are multiple equivalent Pareto sets corresponding to the same Pareto front. The complexity of solving MMOPs lies in locating mul... 详细信息
来源: 评论
Who, What and Where: Composite-semantic Instance Search for Story Videos
Who, What and Where: Composite-semantic Instance Search for ...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Jiahao Guo Chao Liang Zhongyuan Wang National Engineering Research Center for Multimedia Software (NERCMS) Hubei Key Laboratory of Multimedia and Network Communication Engineering School of Computer Science Wuhan University
This paper studies Who-What-Where (3W) composite-semantic video instance search (INS) problem, which aims to find a specific person doing a queried action in a particular place. Mainstream approaches adopt a complete ...
来源: 评论
Revocable Registered Attribute-Based Encryption With User Deregistration
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Li, Jiguo Chen, Shaobo Lu, Yang Ning, Jianting Shen, Jian Zhang, Yichen Fujian Normal University College of Computer and Cyber Security Fuzhou350117 China Fuzhou350117 China Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou350117 China Nanjing Normal University School of Computer and Electronic Information Nanjing210023 China Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fuzhou350117 China Zhejiang Sci-Tech University School of Information Science and Engineering Hangzhou310018 China
Many businesses are putting their sensitive data in the cloud with the fast growth of cloud computing and storage. To ensure user privacy, it is necessary to keep encrypted data only in the cloud. Attribute-based encr... 详细信息
来源: 评论
Adapting Knowledge for Few-Shot Table-to-Text Generation
IEEE Transactions on Audio, Speech and Language Processing
收藏 引用
IEEE Transactions on Audio, Speech and Language Processing 2024年 33卷 359-371页
作者: Zhixin Guo Mingxuan Yan Jiexing Qi Jianping Zhou Ziwei He Guanjie Zheng Xinbing Wang Chenghu Zhou School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University Shanghai China Shanghai Satellite Network Research Institute Company Ltd. Shanghai Key Laboratory of Satellite Network and State Key Laboratory of Satellite Network Shanghai China John Hopcroft Center for Computer Science Shanghai Jiao Tong University Shanghai China Institute of Geographic Sciences and Natural Resources Research Beijing China
Pretrained language models (PLMs) have made remarkable progress in table-to-text generation tasks. However, the lack of domain-specific knowledge makes it challenging to bridge the topological gap between tabular data... 详细信息
来源: 评论