咨询与建议

限定检索结果

文献类型

  • 2,291 篇 会议
  • 1,869 篇 期刊文献
  • 10 册 图书

馆藏范围

  • 4,170 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,688 篇 工学
    • 1,812 篇 计算机科学与技术...
    • 1,442 篇 软件工程
    • 769 篇 信息与通信工程
    • 408 篇 电气工程
    • 330 篇 电子科学与技术(可...
    • 278 篇 控制科学与工程
    • 241 篇 生物工程
    • 169 篇 光学工程
    • 167 篇 机械工程
    • 149 篇 仪器科学与技术
    • 133 篇 生物医学工程(可授...
    • 131 篇 网络空间安全
    • 93 篇 动力工程及工程热...
    • 92 篇 化学工程与技术
    • 82 篇 交通运输工程
    • 78 篇 核科学与技术
    • 74 篇 安全科学与工程
  • 1,314 篇 理学
    • 630 篇 数学
    • 428 篇 物理学
    • 266 篇 生物学
    • 192 篇 统计学(可授理学、...
    • 117 篇 系统科学
    • 99 篇 化学
  • 676 篇 管理学
    • 403 篇 管理科学与工程(可...
    • 285 篇 图书情报与档案管...
    • 155 篇 工商管理
  • 111 篇 医学
    • 88 篇 临床医学
    • 73 篇 基础医学(可授医学...
  • 106 篇 法学
    • 70 篇 社会学
  • 64 篇 经济学
    • 63 篇 应用经济学
  • 31 篇 农学
  • 21 篇 军事学
  • 15 篇 文学
  • 13 篇 教育学
  • 8 篇 艺术学

主题

  • 106 篇 hadron colliders
  • 104 篇 feature extracti...
  • 104 篇 computer network...
  • 103 篇 semantics
  • 83 篇 protocols
  • 82 篇 laboratories
  • 78 篇 computational mo...
  • 76 篇 accuracy
  • 70 篇 bandwidth
  • 66 篇 training
  • 62 篇 computer science
  • 62 篇 deep learning
  • 60 篇 quality of servi...
  • 56 篇 wireless sensor ...
  • 56 篇 security
  • 50 篇 cryptography
  • 48 篇 routing
  • 47 篇 computer archite...
  • 46 篇 authentication
  • 46 篇 telecommunicatio...

机构

  • 155 篇 school of comput...
  • 149 篇 centro brasileir...
  • 148 篇 national and kap...
  • 148 篇 istanbul technic...
  • 147 篇 university of sp...
  • 147 篇 yerevan physics ...
  • 146 篇 universidad iber...
  • 145 篇 academy of scien...
  • 144 篇 brunel universit...
  • 144 篇 indian institute...
  • 144 篇 charles universi...
  • 140 篇 university of de...
  • 139 篇 department of ph...
  • 138 篇 rwth aachen univ...
  • 137 篇 università di to...
  • 137 篇 imperial college...
  • 134 篇 infn sezione di ...
  • 132 篇 zhejiang univers...
  • 129 篇 department of ph...
  • 129 篇 indian institute...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 112 篇 e. migliore
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 111 篇 p. avery
  • 111 篇 l. silvestris

语言

  • 3,484 篇 英文
  • 578 篇 其他
  • 126 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 俄文
检索条件"机构=Computer Engineering and Network Laboratory"
4170 条 记 录,以下是681-690 订阅
排序:
Outsourced Secure Cross-Modal Retrieval based on Secret Sharing for Lightweight Clients
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Niu, Ziyu Wang, Hao Li, Zhi Su, Ye Xu, Lijuan Zhang, Yudi Susilo, Willy Shandong Normal University School of Information Science and Engineering Jinan China University of Wollongong School of Computing and Information Technology Australia Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education National Supercomputer Center in Jinan Shandong Computer Science Center Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
Cross-modal retrieval is a technique that uses one modality to query another modality in multimedia data (e.g., retrieving images based on text, or retrieving text based on images). It can break down the barriers betw... 详细信息
来源: 评论
A trajectory association strategy for multi-object tracking  6
A trajectory association strategy for multi-object tracking
收藏 引用
6th International Conference on Artificial Intelligence and Pattern Recognition, AIPR 2023
作者: Ma, Sugang Duan, Shuaipeng Pu, Lei Hou, Zhiqiang School of Computer Science and Technology Xi'an University of Posts and Telecommunications Shaanxi Xi'an710121 China Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi'an University of Posts and Telecommunications Shaanxi Xi'an China School of Operational Support Rocket Force Engineering University Shaanxi Xi'an710025 China
When the multi-object tracking (MOT) algorithm confronts complex scenarios such as target occlusion and blurring, the trajectory missing and identity switching problems frequently occur. To address this issue, a traje... 详细信息
来源: 评论
Coronavirus Pandemic Analysis Through Tripartite Graph Clustering in Online Social networks
收藏 引用
Big Data Mining and Analytics 2021年 第4期4卷 242-251页
作者: Xueting Liao Danyang Zheng Xiaojun Cao Department of Computer Science Georgia State UniversityAtlantaGA 30302USA Suzhou Key Laboratory of Advanced Optical Communication Network Technology School of Electronic and Information EngineeringSoochow UniversitySuzhou 215006China
The COVID-19 pandemic has hit the world *** reaction to the pandemic related issues has been pouring into social platforms,such as *** public officials and governments use Twitter to make policy *** keep close track o... 详细信息
来源: 评论
A Multi-Channel Composite Recommendation Method in Federated Learning
A Multi-Channel Composite Recommendation Method in Federated...
收藏 引用
2023 IEEE International Conference on Dependable, Autonomic and Secure Computing, 2023 International Conference on Pervasive Intelligence and Computing, 2023 International Conference on Cloud and Big Data Computing, 2023 International Conference on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2023
作者: Chen, Shi Li, Qianmu Wang, Qi Zhao, Xinjian Ge, Hao Li, Nianzhe State Grid Jiangsu Information & Telecommunication Company Nanjing China School of Computer Science Ana Engineering Nanjing University of Science and Technology Nanjing China State Grid Smart Grid Research Institute Co. Ltd. State Grid Key Laboratory of Information & Network Security Nanjing China
There are various data security risks in power grid systems, and recommendation systems are a good solution to the selection of security strategies. Federated learning is a machine learning framework that can protect ... 详细信息
来源: 评论
Local Fault Diagnosis Analysis Based on Block Pattern of Regular Diagnosable networks
收藏 引用
IEEE/ACM Transactions on networking 2024年
作者: Lin, Limei Guan, Kaineng Huang, Yanze Hsieh, Sun-Yuan Chen, Gaolin Fujian Normal University College of Computer and Cyber Security Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Fuzhou350117 China Fujian University of Technology School of Computer Science and Mathematics Fujian Fuzhou350118 China National Cheng Kung University Department of Computer Science and Information Engineering Tainan701 Taiwan
Fault diagnosability can reflect the actual self diagnosing capability of a multiprocessor system better. However, people usually focus on the overall information and neglect the important local information. In order ... 详细信息
来源: 评论
An Efficient Multiband Infrared Small Objects Detection Approach for Low-Altitude Artificial Intelligence of Things
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 20757-20772页
作者: Peng, Yuhuai Wang, Jing Wang, Wenqian Liu, Lei Atiquzzaman, Mohammed Guizani, Mohsen Dustdar, Schahram Northeastern University School of Computer Science and Engineering Shenyang110819 China Zhiyuan Research Institute Strategic Research Department Hangzhou310024 China Xidian University Guangzhou Institute of Technology Guangzhou510555 China Xi’an University of Posts and Telecommunications Shanxi Key Laboratory of Information Communication Network and Security Shanxi Xi’an710121 China University of Oklahoma School of Computer Science NormanOK73019 United States Mohamed bin Zayed University of Artificial Intelligence Department of Machine Learning Abu Dhabi United Arab Emirates Technische Universität Wien Distributed Systems Group Vienna1040 Austria Universitat Pompeu Fabra Barcelona ICREA Barcelona08002 Spain
As a cutting-edge technology of low-altitude Artificial Intelligence of Things (AIoT), autonomous aerial vehicle object detection significantly enhances the surveillance services capabilities of low-altitude AIoT. How... 详细信息
来源: 评论
Task Offloading and Resource Allocation with Privacy Constraints in End-Edge-Cloud Environment  17th
Task Offloading and Resource Allocation with Privacy Constra...
收藏 引用
17th CCF Conference on computer Supported Cooperative Work and Social Computing, ChineseCSCW 2022
作者: Zhu, Xia Sun, Wei Li, Xiaoping School of Computer Science and Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University Nanjing China School of Cyber Science and Engineering Southeast University Nanjing China
The end-edge-cloud architecture brings an efficient solution to the big data processing problem caused by massive IoT devices. The characteristics of this architecture, such as massive devices, heterogeneous resources... 详细信息
来源: 评论
On the Impact of Spatial Mode Dispersion for Strongly-Coupled Multicore Fiber Submarine Transmission
On the Impact of Spatial Mode Dispersion for Strongly-Couple...
收藏 引用
2023 Optical Fiber Communications Conference and Exhibition, OFC 2023
作者: Sun, Lin Chen, Bin Liu, Gordon Ning Cai, Yi Li, Zhaohui Lu, Chao Shen, Gangxiang Soochow University Suzhou Key Laboratory of Advanced Optical Communication Network Technology School of Electronic and Information Engineering Suzhou215006 China Hefei University of Technology School of Computer Science and Information Engineering Hefei China Sun Yat-Sen University Guangdong Provincial Key Laboratory of Optoelectronic Information Processing Chips School of Electronics and Information Technology Guangzhou511400 China The Hong Kong Polytechnic University Photonics Research Center Department of Electrical and Information Engineering Kowloon Hung Hom Hong Kong
Strongly-coupled multicore fibers exhibit the improved tolerance to fiber non-linearity. Their potentials in optical submarine communications are investigated with considering the coupling length and spatial mode disp... 详细信息
来源: 评论
Incentive Sharing: A Consumer-Data Privacy Trusted Sharing Paradigm Via Proximal Policy Optimization in Industry 5.0
收藏 引用
IEEE Transactions on Consumer Electronics 2024年
作者: Cai, Ting Hu, Ying Li, Xiang Chen, Wuhui Wu, Yuxin Ye, Zhiwei Zheng, Zibin Hubei University of Technology China China Hubei University of Technology School of Computer Science The Provincial Key Laboratory of Green Intelligent Computing Network Wuhan430068 China Sun Yat-sen University China Pengcheng Laboratory China Hubei University of Arts and Science School of Computer Engineering Xiangyang441053 China Sun Yat-sen University School of Software Engineering Zhuhai519000 China
Industry 5.0 emphasizes consumer data sharing to drive data-driven innovation and enhance user experiences in consumer electronics. Blockchain-integrated federated learning (blockchained FL) has recently emerged as a ... 详细信息
来源: 评论
SyntaxBridge: Protocol Description Transformer for Enhanced Formal Analysis of Security Protocols
SyntaxBridge: Protocol Description Transformer for Enhanced ...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Liujia Cai Tong Yu Yumeng Li Siqi Lu Hanjie Dong Guangying Cai Guangong Li Yongjuan Wang Henan Key Laboratory of Network Cryptography Technology Information Engineering University Zhengzhou China School of Information and Communication Engineering Hainan University Haikou China School of Computer Science and Artificial Intelligence Zhengzhou University Zhengzhou China
Currently, formal analysis of security protocols under the symbolic model has become a crucial approach in the field of protocol analysis, owing to its intuitiveness and universality. However, researchers using variou... 详细信息
来源: 评论