咨询与建议

限定检索结果

文献类型

  • 2,260 篇 会议
  • 1,842 篇 期刊文献
  • 10 册 图书

馆藏范围

  • 4,112 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,652 篇 工学
    • 1,787 篇 计算机科学与技术...
    • 1,427 篇 软件工程
    • 755 篇 信息与通信工程
    • 378 篇 电气工程
    • 320 篇 电子科学与技术(可...
    • 261 篇 控制科学与工程
    • 243 篇 生物工程
    • 166 篇 光学工程
    • 162 篇 机械工程
    • 146 篇 仪器科学与技术
    • 136 篇 生物医学工程(可授...
    • 115 篇 网络空间安全
    • 93 篇 动力工程及工程热...
    • 89 篇 化学工程与技术
    • 78 篇 核科学与技术
    • 73 篇 交通运输工程
    • 64 篇 安全科学与工程
  • 1,316 篇 理学
    • 632 篇 数学
    • 425 篇 物理学
    • 267 篇 生物学
    • 193 篇 统计学(可授理学、...
    • 119 篇 系统科学
    • 95 篇 化学
  • 669 篇 管理学
    • 398 篇 管理科学与工程(可...
    • 284 篇 图书情报与档案管...
    • 155 篇 工商管理
  • 109 篇 医学
    • 86 篇 临床医学
    • 73 篇 基础医学(可授医学...
  • 108 篇 法学
    • 70 篇 社会学
  • 64 篇 经济学
    • 63 篇 应用经济学
  • 31 篇 农学
  • 21 篇 军事学
  • 15 篇 文学
  • 12 篇 教育学
  • 8 篇 艺术学

主题

  • 106 篇 hadron colliders
  • 105 篇 computer network...
  • 99 篇 semantics
  • 96 篇 feature extracti...
  • 82 篇 laboratories
  • 82 篇 protocols
  • 73 篇 computational mo...
  • 70 篇 bandwidth
  • 65 篇 accuracy
  • 63 篇 computer science
  • 63 篇 deep learning
  • 60 篇 quality of servi...
  • 59 篇 training
  • 57 篇 wireless sensor ...
  • 53 篇 security
  • 49 篇 routing
  • 48 篇 cryptography
  • 47 篇 network topology
  • 46 篇 computer archite...
  • 45 篇 authentication

机构

  • 159 篇 school of comput...
  • 150 篇 centro brasileir...
  • 149 篇 national and kap...
  • 149 篇 istanbul technic...
  • 148 篇 university of sp...
  • 148 篇 yerevan physics ...
  • 147 篇 universidad iber...
  • 146 篇 academy of scien...
  • 145 篇 brunel universit...
  • 145 篇 indian institute...
  • 145 篇 charles universi...
  • 141 篇 university of de...
  • 140 篇 department of ph...
  • 139 篇 rwth aachen univ...
  • 138 篇 università di to...
  • 137 篇 imperial college...
  • 135 篇 infn sezione di ...
  • 133 篇 zhejiang univers...
  • 130 篇 department of ph...
  • 130 篇 indian institute...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 112 篇 e. migliore
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 111 篇 p. avery
  • 111 篇 l. silvestris

语言

  • 3,751 篇 英文
  • 247 篇 其他
  • 125 篇 中文
检索条件"机构=Computer Engineering and Network Laboratory"
4112 条 记 录,以下是541-550 订阅
排序:
Toward to Autonomous Broker for Virtual network Provisioning and Monitoring  1st
Toward to Autonomous Broker for Virtual Network Provisioning...
收藏 引用
1st International Conference of Advanced Computing and Informatics, ICACIN 2020
作者: Errais, Mohammed Bellafkih, Mostafa Al Sarem, Mohammed Research and Computer Innovation Laboratory Hassan II University of Casablanca Casablanca Morocco Network Laboratory INPT Rabat Morocco College of Computer Science and Engineering Taibah University Medina Saudi Arabia
network virtualization is an emerging concept that aims to facilitate the integration of new technologies regardless physical layer. To do this, the new concept proposes to evolve the current Internet business model. ... 详细信息
来源: 评论
Privacy-Preserving Interactive Semantic Codec Training for IoT-Based Holographic Counterparts
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Xu, Jinpeng Chen, Liang Lin, Limei Wang, Xiaoding Huang, Yanze Xu, Li Piran, Md. Jalil Fujian Normal University College of Computer and Cyber Security Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Fuzhou350117 China Fujian University of Technology School of Computer Science and Mathematics Fujian Fuzhou350118 China Sejong University Department of Computer Science and Engineering Seoul05006 Korea Republic of
The use of IoT-based semantic codecs to process complex contextual semantic information in holographic counterparts introduces significant privacy risks, as it may expose sensitive data, thereby increasing the likelih... 详细信息
来源: 评论
An improved Schnorr-based multi-signature scheme with application to blockchain  3
An improved Schnorr-based multi-signature scheme with applic...
收藏 引用
3rd IEEE International Conference on Civil Aviation Safety and Information Technology, ICCASIT 2021
作者: Li, Chunlan Wu, Yulong Yu, Feng Computer Science and Engineering School of Software Guangxi Normal University Guilin China Key Laboratory of Computer Network and Information Integration Southeast University Nanjing China
A multi-signature scheme allows a group of signers to jointly generate a signature on a common message, which can be verified by anyone, making the signature more compact. Multi-signature has the advantage of fast ver... 详细信息
来源: 评论
MEAT: Median-Ensemble Adversarial Training for Improving Robustness and Generalization
MEAT: Median-Ensemble Adversarial Training for Improving Rob...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Zhaozhe Hu Jia-Li Yin Bin Chen Luojun Lin Bo-Hao Chen Ximeng Liu Fujian Province Key Laboratory of Information Security and Network Systems Fuzhou China College of Computer Science and Big Data Fuzhou University Fuzhou China Department of Computer Science and Engineering Yuan Ze University Taiwan
Self-ensemble adversarial training methods improve model robustness by ensembling models at different training epochs, such as model weight averaging (WA). However, previous research has shown that self-ensemble defen...
来源: 评论
Enhancing Unknown Encrypted Traffic Clustering with Self-Supervised Learning
Enhancing Unknown Encrypted Traffic Clustering with Self-Sup...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Ke Ding Xia Zhou Xiaoyan Hu Guang Cheng Ruidong Li Hua Wu School of Cyber Science & Engineering Southeast University Nanjing China Purple Mountain Laboratories for Network and Communication Security Nanjing China Jiangsu Province Engineering Research Center of Security for Ubiquitous Network Nanjing China Ministry of Education Key Laboratory of Computer Network and Information Integration (Southeast University) China Institute of Science and Engineering Kanazawa University Kanazawa Japan
Many malicious attacks are launched through encrypted traffic from unknown proprietary network protocols. Timely identification of such malicious unknown encrypted traffic is essential for the defense. However, it is ... 详细信息
来源: 评论
Proposal Feature Learning Using Proposal Relations for Weakly Supervised Object Detection
Proposal Feature Learning Using Proposal Relations for Weakl...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Zhaofei Wang Weijia Zhang Min-Ling Zhang School of Computer Science and Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education China School of Information and Physical Sciences The University of Newcastle NSW Australia
Weakly Supervised Object Detection (WSOD) trains detectors using only image-level annotations. Most existing WSOD models are based on pre-computed proposals and do not fully explore the relations of proposals. In this... 详细信息
来源: 评论
Multi-instance partial-label learning with margin adjustment  24
Multi-instance partial-label learning with margin adjustment
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing Systems
作者: Wei Tang Yin-Fang Yang Zhaofei Wang Weijia Zhang Min-Ling Zhang School of Computer Science and Engineering Southeast University Nanjing China and Key Laboratory of Computer Network and Information Integration (Southeast University) Ministry of Education China School of Information and Physical Sciences The University of Newcastle Callaghan NSW 2308 Australia
Multi-instance partial-label learning (MIPL) is an emerging learning framework where each training sample is represented as a multi-instance bag associated with a candidate label set. Existing MIPL algorithms often ov...
来源: 评论
Beyond 5G network Failure Classification for network Digital Twin Using Graph Neural network
arXiv
收藏 引用
arXiv 2024年
作者: Isah, Abubakar Aliyu, Ibrahim Shim, Jaechan Ryu, Hoyong Kim, Jinsul HyperIntelligence Media Network Platform Laboratory Department of Intelligent Electronics and Computer Engineering Chonnam National University Gwangju61186 Korea Republic of Department of Computer Science Ahmadu Bello University Zaria Nigeria Korea Republic of
Fifth-generation (5G) core networks in network digital twins (NDTs) are complex systems with numerous components, generating considerable data. Analyzing these data can be challenging due to rare failure types, leadin... 详细信息
来源: 评论
A Fault Diagnostic Method for Rolling Bearings Based on CAR-SNN Model
A Fault Diagnostic Method for Rolling Bearings Based on CAR-...
收藏 引用
2023 CAA Symposium on Fault Detection, Supervision and Safety for Technical Processes, SAFEPROCESS 2023
作者: Li, Qiuting Wang, Xiuqing Du, Wenxia Hebei Normal University College of Computer and Cyber Security Shijiazhuang050024 China Hebei Provincial Key Laboratory of Network & Information Security Shijiazhuang China Hebei Provincial Engineering Research Center for Supply Chain Big Data Analytics & Data Security Shijiazhuang China Hebei Normal University College of China Combustion Engineering Shijiazhuang050024 China
In the era of big data, high-performance rolling bearing fault diagnostic methods are of great significance to ensure manufacturing smoothly and avoid mass economic losses. A rolling bearing fault diagnostic CAR-SNN m... 详细信息
来源: 评论
Fast Collection of Target Tags Information for Large-Scale RFID Systems  20
Fast Collection of Target Tags Information for Large-Scale R...
收藏 引用
20th International computer Conference on Wavelet Active Media Technology and Information Processing, ICCWAMTIP 2023
作者: Chu, Chu Fu, Ning Xu, Rui College of Computer Science Sichuan Normal University Chengdu610101 China The Visual Computing and Virtual Reality Key Laboratory of Sichuan Province Chengdu610101 China School of Network and Communication Engineering Chengdu Technological University Chengdu611730 China School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu611731 China
Radio Frequency Identification (RFID) technology is greatly supporting a variety of life and industry. Enhanced by sensors, RFID tags can monitor real-time information about attached objects and the environment, makin... 详细信息
来源: 评论