咨询与建议

限定检索结果

文献类型

  • 1,011 篇 会议
  • 994 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 2,012 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,291 篇 工学
    • 843 篇 计算机科学与技术...
    • 653 篇 软件工程
    • 332 篇 信息与通信工程
    • 156 篇 电气工程
    • 135 篇 电子科学与技术(可...
    • 128 篇 控制科学与工程
    • 95 篇 生物工程
    • 81 篇 机械工程
    • 75 篇 核科学与技术
    • 73 篇 光学工程
    • 63 篇 生物医学工程(可授...
    • 61 篇 网络空间安全
    • 57 篇 动力工程及工程热...
    • 55 篇 仪器科学与技术
    • 50 篇 化学工程与技术
    • 46 篇 交通运输工程
    • 40 篇 安全科学与工程
  • 706 篇 理学
    • 302 篇 物理学
    • 289 篇 数学
    • 115 篇 生物学
    • 87 篇 统计学(可授理学、...
    • 50 篇 化学
    • 44 篇 系统科学
  • 340 篇 管理学
    • 209 篇 管理科学与工程(可...
    • 142 篇 图书情报与档案管...
    • 74 篇 工商管理
  • 78 篇 医学
    • 59 篇 临床医学
    • 44 篇 基础医学(可授医学...
  • 52 篇 法学
    • 29 篇 社会学
  • 27 篇 经济学
    • 27 篇 应用经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 12 篇 教育学
  • 4 篇 文学
  • 3 篇 艺术学

主题

  • 106 篇 hadron colliders
  • 69 篇 computer network...
  • 53 篇 semantics
  • 46 篇 feature extracti...
  • 35 篇 accuracy
  • 34 篇 computational mo...
  • 32 篇 protocols
  • 32 篇 robustness
  • 30 篇 training
  • 28 篇 computer science
  • 28 篇 w & z bosons
  • 28 篇 deep learning
  • 27 篇 bandwidth
  • 27 篇 security
  • 26 篇 federated learni...
  • 24 篇 wireless communi...
  • 24 篇 higgs bosons
  • 24 篇 wireless sensor ...
  • 23 篇 internet
  • 22 篇 data mining

机构

  • 149 篇 centro brasileir...
  • 149 篇 istanbul technic...
  • 148 篇 national and kap...
  • 148 篇 yerevan physics ...
  • 147 篇 university of sp...
  • 146 篇 universidad iber...
  • 145 篇 brunel universit...
  • 145 篇 academy of scien...
  • 144 篇 indian institute...
  • 144 篇 charles universi...
  • 142 篇 department of ph...
  • 141 篇 university of de...
  • 139 篇 imperial college...
  • 139 篇 rwth aachen univ...
  • 138 篇 università di to...
  • 138 篇 indian institute...
  • 135 篇 infn sezione di ...
  • 133 篇 institute for nu...
  • 131 篇 zhejiang univers...
  • 131 篇 centro de invest...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 112 篇 e. migliore
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 111 篇 p. avery
  • 111 篇 l. silvestris

语言

  • 1,894 篇 英文
  • 76 篇 其他
  • 44 篇 中文
检索条件"机构=Computer Network Engineering Technology Center"
2012 条 记 录,以下是291-300 订阅
排序:
Analysis of Anomaly Detection Techniques Applied to Web API network Scenario  11
Analysis of Anomaly Detection Techniques Applied to Web API ...
收藏 引用
11th Joint International Information technology and Artificial Intelligence Conference, ITAIC 2023
作者: Huang, Zhendong Fan, Xuyan Li, Zhiqi Zhao, Changzhi Chen, Guangxuan Liu, Yuling People's Public Security University of China Department of Information and Network Security Beijing China Ruian Public Security Bureau Wenzhou China Zhejiang Police College Department of Computer and Information Security Hangzhou China The National Information Center of China Customs Beijing China Beijing State Grid Siji Network Security Technology Limited Company Beijing China Institute of Information Engineering Chinese Academy of Sciences Beijing China
Web API networks comprise a multitude of API services, and compared to traditional network environments, they possess unique security requirements and face distinct threats. This article delves into the security chara... 详细信息
来源: 评论
Quantum Privacy-Preserving Price E-Negotiation
arXiv
收藏 引用
arXiv 2023年
作者: Liu, Wen-Jie Li, Chun-Tang Zheng, Yu Xu, Yong Xu, Yin-Song Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science & Technology Nanjing210044 China School of Computer and Software Nanjing University of Information Science & Technology Nanjing210044 China
Privacy-preserving price e-negotiation (3PEN) is an important topic of secure multi-party computation (SMC) in the electronic commerce field, and the key point of its security is to guarantee the privacy of seller’s ... 详细信息
来源: 评论
Small Target Detection from DIKW Model Perspective
Small Target Detection from DIKW Model Perspective
收藏 引用
2024 International Conference on Remote Sensing, Mapping, and Image Processing, RSMIP 2024
作者: Wang, Yujuan Peng, Ling Yu, Riji Juan, Hu Yan, Shankai Zhang, Bin Guangzhou Xinhua University Machong Town Guangdong Province Dongguan City China Huanggang Real Estate Registration Center Huanggang Land and Resources Bureau Huanggang City China School of Art Hubei University Wuhan China School of Computer Science and Information Engineering Hubei University Wuhan China The Discipline Inspection and Supervision College of Huanggang Normal University Huanggang City China School of Computer Science Technology Hainan University Haikou China Network Information Center Xinjiang University of Political Science and Law Tumushuke China Department of Computer Science City University of Hong Kong Hong Kong School of Remote Sensing and Information Engineering Wuhan University Hong Kong Hong Kong
Through the revelation and internal logic relationship of the DIKW model, the logic of data, information, knowledge, and wisdom in small target detection research initially built a new point of view, and did some basi... 详细信息
来源: 评论
Multi-party privacy-preserving decision tree training with a privileged party
收藏 引用
Science China(Information Sciences) 2024年 第8期67卷 253-268页
作者: Yiwen TONG Qi FENG Min LUO Debiao HE Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Shanghai Technology Innovation Centre of Distributed Privacy-Preserving Artificial Intelligence Matrix Elements Technologies Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science Center Qilu University of Technology(Shandong Academy of Sciences)
Currently, a decision tree is the most commonly used data mining algorithm for classification tasks. While a significant number of studies have investigated privacy-preserving decision trees, the methods proposed in t... 详细信息
来源: 评论
DQ-WiAPDoM: A DQN-based AP Deployment Optimization Method for Wi-Fi FTM Positioning
DQ-WiAPDoM: A DQN-based AP Deployment Optimization Method fo...
收藏 引用
Smart Technologies and Systems for Next Generation Computing (ICSTSN), International Conference on
作者: Zihao Liu Han Li Bo Gao Ke Xiong Pingyi Fan School of Computer and Information Technology Beijing Jiaotong University Beijing China Engineering Research Center of Network Management Technology for High Speed Railway of Ministry of Education School of Computer and Information Technology Beijing Jiaotong University Beijing China Department of Electronic Engineering Tsinghua University Beijing China
This paper focuses on how to optimize the deployment location of the anchor Wi-Fi access points (APs) in order to enhance the indoor positioning performance of the finetime measurement (FTM) protocol. Compared to conv...
来源: 评论
Good is Bad: Causality Inspired Cloth-debiasing for Cloth-changing Person Re-identification
Good is Bad: Causality Inspired Cloth-debiasing for Cloth-ch...
收藏 引用
Conference on computer Vision and Pattern Recognition (CVPR)
作者: Zhengwei Yang Meng Lin Xian Zhong Yu Wu Zheng Wang National Engineering Research Center for Multimedia Software Institute of Artificial Intelligence School of Computer Science Wuhan University Hubei Key Laboratory of Multimedia and Network Communication Engineering School of Computer Science and Artificial Intelligence Wuhan University of Technology
Entangled representation of clothing and identity (ID)-intrinsic clues are potentially concomitant in conventional person Re- IDentification (ReID). Nevertheless, eliminating the negative impact of clothing on ID rema...
来源: 评论
Navigating the Risks: A Review of Safety Issues in Large Language Models
Navigating the Risks: A Review of Safety Issues in Large Lan...
收藏 引用
IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C)
作者: Haiyang Wang Yihao Li Yue Wang Pan Liu Pengxiao Li Institute of Network Technology (Yantai) Yantai China School of Information and Electrical Engineering Ludong University Yantai China Faculty of Business Information Shanghai Business School Shanghai China National Computer Network Emergency Response Technical Team/Coordination Center Beijing China
Since the advent of Large Language Models (LLMs) such as ChatGPT, natural language processing has seen significant progress, providing timely, context-aware, and intelligent solutions across various domains. While use... 详细信息
来源: 评论
Multi-Objective Discrete Extremal Optimization of Variable-Length Blocks-Based CNN by Joint NAS and HPO for Intrusion Detection in IIoT
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Lu, Kang-Di Huang, Jia-Cheng Zeng, Guo-Qiang Chen, Min-Rong Geng, Guang-Gang Weng, Jian Donghua University College of Information Science and Technology Shanghai201620 China Jinan University College of Cyber Security The National Joint Engineering Research Center of Network Security Detection and Protection Technology Guangzhou510632 China South China Normal University School of Computer Science Guangzhou510631 China
Industrial Internet of Things (IIoT) is an important part of industrial infrastructure but facing serious and evolving security threats in recent years. Deep learning has been widely considered as a promising solution... 详细信息
来源: 评论
Joint User Cooperation and Scheduling for Federated Learning in CFmMIMO networks
Joint User Cooperation and Scheduling for Federated Learning...
收藏 引用
Smart Technologies and Systems for Next Generation Computing (ICSTSN), International Conference on
作者: Han Bao Bo Gao Ke Xiong Pingyi Fan School of Computer and Information Technology Beijing Jiaotong University Beijing China Engineering Research Center of Network Management Technology for High Speed Railway of Ministry of Education School of Computer and Information Technology Beijing Jiaotong University Beijing China Department of Electronic Engineering Tsinghua University Beijing China
This paper proposes a joint user cooperation and scheduling (JUCS) method to minimize the maximum transmission time among users in the synchronous federated learning (FL) architecture, since the user with the worst qu...
来源: 评论
Advancing cancer diagnosis and prognostication through deep learning mastery in breast, colon, and lung histopathology with ResoMergeNet
收藏 引用
computers in Biology and Medicine 2025年 185卷 109494-109494页
作者: Ejiyi, Chukwuebuka Joseph Qin, Zhen Agbesi, Victor K. Yi, Ding Atwereboannah, Abena A. Chikwendu, Ijeoma A. Bamisile, Oluwatoyosi F. Bakanina Kissanga, Grace-Mercure Bamisile, Olusola O. College of Nuclear Technology and Automation Engineering & Sichuan Industrial Internet Intelligent Monitoring and Application Engineering Research Center Chengdu University of Technology Sichuan Chengdu China Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Sichuan Chengdu China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu China School of Life Science University of Electronic Science and Technology of China Chengdu China
Cancer, a global health threat, demands effective diagnostic solutions to combat its impact on public health, particularly for breast, colon, and lung cancers. Early and accurate diagnosis is essential for successful ... 详细信息
来源: 评论