咨询与建议

限定检索结果

文献类型

  • 2,263 篇 会议
  • 1,855 篇 期刊文献
  • 10 册 图书

馆藏范围

  • 4,128 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,667 篇 工学
    • 1,802 篇 计算机科学与技术...
    • 1,426 篇 软件工程
    • 760 篇 信息与通信工程
    • 380 篇 电气工程
    • 322 篇 电子科学与技术(可...
    • 273 篇 控制科学与工程
    • 243 篇 生物工程
    • 162 篇 机械工程
    • 160 篇 光学工程
    • 146 篇 仪器科学与技术
    • 134 篇 生物医学工程(可授...
    • 118 篇 网络空间安全
    • 94 篇 动力工程及工程热...
    • 89 篇 化学工程与技术
    • 78 篇 核科学与技术
    • 73 篇 交通运输工程
    • 64 篇 安全科学与工程
  • 1,316 篇 理学
    • 633 篇 数学
    • 425 篇 物理学
    • 266 篇 生物学
    • 194 篇 统计学(可授理学、...
    • 120 篇 系统科学
    • 98 篇 化学
  • 670 篇 管理学
    • 399 篇 管理科学与工程(可...
    • 284 篇 图书情报与档案管...
    • 155 篇 工商管理
  • 110 篇 医学
    • 87 篇 临床医学
    • 73 篇 基础医学(可授医学...
  • 107 篇 法学
    • 69 篇 社会学
  • 64 篇 经济学
    • 63 篇 应用经济学
  • 31 篇 农学
  • 21 篇 军事学
  • 15 篇 文学
  • 11 篇 教育学
  • 9 篇 艺术学

主题

  • 106 篇 hadron colliders
  • 105 篇 computer network...
  • 100 篇 semantics
  • 96 篇 feature extracti...
  • 82 篇 laboratories
  • 82 篇 protocols
  • 73 篇 computational mo...
  • 71 篇 bandwidth
  • 66 篇 deep learning
  • 65 篇 accuracy
  • 63 篇 computer science
  • 60 篇 quality of servi...
  • 60 篇 training
  • 57 篇 wireless sensor ...
  • 55 篇 security
  • 49 篇 routing
  • 48 篇 cryptography
  • 47 篇 computer archite...
  • 47 篇 network topology
  • 45 篇 authentication

机构

  • 162 篇 school of comput...
  • 150 篇 centro brasileir...
  • 149 篇 national and kap...
  • 149 篇 istanbul technic...
  • 148 篇 university of sp...
  • 148 篇 yerevan physics ...
  • 147 篇 universidad iber...
  • 146 篇 academy of scien...
  • 145 篇 brunel universit...
  • 145 篇 indian institute...
  • 145 篇 charles universi...
  • 141 篇 university of de...
  • 140 篇 department of ph...
  • 139 篇 rwth aachen univ...
  • 138 篇 università di to...
  • 137 篇 imperial college...
  • 135 篇 infn sezione di ...
  • 133 篇 zhejiang univers...
  • 130 篇 department of ph...
  • 130 篇 indian institute...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 112 篇 e. migliore
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 111 篇 p. avery
  • 111 篇 l. silvestris

语言

  • 3,749 篇 英文
  • 263 篇 其他
  • 127 篇 中文
检索条件"机构=Computer Engineering and Network Laboratory"
4128 条 记 录,以下是71-80 订阅
排序:
Devil is in Details: Locality-Aware 3D Abdominal CT Volume Generation for Self-Supervised Organ Segmentation  24
Devil is in Details: Locality-Aware 3D Abdominal CT Volume G...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Wang, Yuran Wan, Zhijing Qiu, Yansheng Wang, Zheng National Engineering Research Center for Multimedia Software Hubei Key Laboratory of Multimedia and Network Communication Engineering Institute of Artificial Intelligence School of Computer Science Wuhan University Wuhan China
In the realm of medical image analysis, self-supervised learning (SSL) techniques have emerged to alleviate labeling demands, while still facing the challenge of training data scarcity owing to escalating resource req... 详细信息
来源: 评论
A Theoretical Analysis of Backdoor Poisoning Attacks in Convolutional Neural networks  41
A Theoretical Analysis of Backdoor Poisoning Attacks in Conv...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Li, Boqi Liu, Weiwei School of Computer Science National Engineering Research Center for Multimedia Software Institute of Artificial Intelligence Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University Wuhan China
The rising threat of backdoor poisoning attacks (BPAs) on Deep Neural networks (DNNs) has become a significant concern in recent years. In such attacks, the adversaries strategically target a specific class and genera... 详细信息
来源: 评论
Never Lost Keys:A Novel Key Generation Scheme Based on Motor Imagery EEG in End-Edge-Cloud System
收藏 引用
China Communications 2022年 第7期19卷 172-184页
作者: Yichuan Wang Dan Wu Xiaoxue Liu Xinhong Hei School of computer science and Engineering Xi’an University of TechnologyXi’an 710048China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an 710048China
Biometric key is generated from the user’s unique biometric features,and can effectively solve the security problems in ***,the current prevailing biometric key generation techniques such as fingerprint recognition a... 详细信息
来源: 评论
Generalization Analysis for Label-Specific Representation Learning  38
Generalization Analysis for Label-Specific Representation Le...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Zhang, Yi-Fan Zhang, Min-Ling School of Cyber Science and Engineering Southeast University Nanjing210096 China School of Computer Science and Engineering Southeast University Nanjing210096 China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education China
Label-specific representation learning (LSRL), i.e., constructing the representation with specific discriminative properties for each class label, is an effective strategy to improve the performance of multi-label lea...
来源: 评论
Exploring MEC Server Strategy in Blockchain networks: Mining for Mobile Users or for Self
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第7期24卷 6030-6044页
作者: Ling, Xintong Jiang, Rui Cao, Weihang Chen, Mingkai Wang, Jiaheng Ding, Zhi Gao, Xiqi Southeast University National Mobile Communications Research Laboratory Nanjing210096 China Purple Mountain Laboratories Nanjing210023 China Nanjing University of Posts and Telecommunications Key Laboratory of Broadband Wireless Communication and Sensor Network Technology Nanjing210003 China University of Maryland Department of Electrical and Computer Engineering College ParkMD20742 United States Southeast University School of Cyber Science and Engineering Nanjing210096 China University of California Department of Electrical and Computer Engineering DavisCA95616 United States
Blockchain-based decentralized applications (DApps) offer enhanced security and decentralization features;nevertheless, their maintenance demands substantial computational resources and poses challenges for deployment... 详细信息
来源: 评论
SQAT-LD: SPeech Quality Assessment Transformer Utilizing Listener Dependent Modeling for Zero-Shot Out-of-Domain MOS Prediction
SQAT-LD: SPeech Quality Assessment Transformer Utilizing Lis...
收藏 引用
2023 IEEE Automatic Speech Recognition and Understanding Workshop, ASRU 2023
作者: Shen, Kailai Yan, Diqun Dong, Li Ren, Ying Wu, Xiaoxun Hu, Jing Ningbo University Faculty of Electrical Engineering and Computer Science China Zhejiang Key Laboratory of Mobile Network Application Technology China
In this paper, we propose the speech quality assessment transformer utilizing listener dependent modeling (SQAT-LD) mean opinion score (MOS) prediction system, which was submitted to the 2023 VoiceMOS Challenge. The s... 详细信息
来源: 评论
IGED:Towards Intelligent DDoS Detection Model Using Improved Generalized Entropy and DNN
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 1851-1866页
作者: Yanhua Liu Yuting Han HuiChen Baokang Zhao XiaofengWang Ximeng Liu College of Computer and Data Science Fuzhou UniversityFuzhou350108China Engineering Research Center of Big Data Intelligence Ministry of EducationFuzhou350108China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou UniversityFuzhou350108China College of Computer National University of Defense TechnologyChangsha410073China
As the scale of the networks continually expands,the detection of distributed denial of service(DDoS)attacks has become increasingly *** propose an intelligent detection model named IGED by using improved generalized ... 详细信息
来源: 评论
Bit level image encryption algorithm based on hyperchaotic system
收藏 引用
Optoelectronics Letters 2023年 第3期19卷 186-192页
作者: MAN Zhenlong ZHANG Yue ZHOU Ying LU Xiaoli WANG Zhaoquan School of Electronic and Information Engineering Liaoning Technical UniversityHuludao 125100China Advanced Interactive Technology and Application Laboratory Computer Network Information CenterChinese Academy of SciencesBeijing 100190China
Because chaotic systems are unpredictable,ergodic and sensitive to initial values and parameters,they are often used in the field of *** avoid the bad randomness of the random key generated by the low dimensional chao... 详细信息
来源: 评论
A Linked List Encryption Scheme for Image Steganography without Embedding
收藏 引用
computer Modeling in engineering & Sciences 2024年 第10期141卷 331-352页
作者: Pengbiao Zhao Qi Zhong Jingxue Chen Xiaopei Wang Zhen Qin Erqiang Zhou Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of ChinaChengdu610054China Faculty of Data Science City University of MacaoMacao999078China Department of Computer Science and Engineering University of CaliforniaRiversideCA 92521USA
Information steganography has received more and more attention from scholars nowadays,especially in the area of image steganography,which uses image content to transmit information and makes the existence of secret in... 详细信息
来源: 评论
A Deep Understanding Video Q&A System for Film Education in Acting Department
A Deep Understanding Video Q&A System for Film Education in ...
收藏 引用
2023 International Conference on Intelligent Education and Intelligent Research, IEIR 2023
作者: Wu, Zhengqian Li, Ruizhe Guo, Jiahao Wang, Zhongyuan Liang, Chao Hubei Key Laboratory of Multimedia and Network Communication Engineering School of Computer Science China National Engineering Research Center for Multimedia Software School of Computer Science China Wuhan University School of Computer Science China
Recently, advancements in artificial intelligence technology have greatly influenced the field of education, particularly in the area of intelligent homework assistance. However, current approaches are primarily desig... 详细信息
来源: 评论