咨询与建议

限定检索结果

文献类型

  • 1,026 篇 会议
  • 987 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 2,020 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,302 篇 工学
    • 836 篇 计算机科学与技术...
    • 646 篇 软件工程
    • 330 篇 信息与通信工程
    • 157 篇 电气工程
    • 137 篇 电子科学与技术(可...
    • 127 篇 控制科学与工程
    • 95 篇 生物工程
    • 88 篇 核科学与技术
    • 82 篇 机械工程
    • 72 篇 光学工程
    • 63 篇 生物医学工程(可授...
    • 61 篇 网络空间安全
    • 57 篇 动力工程及工程热...
    • 56 篇 仪器科学与技术
    • 51 篇 化学工程与技术
    • 46 篇 交通运输工程
    • 40 篇 安全科学与工程
  • 704 篇 理学
    • 301 篇 物理学
    • 288 篇 数学
    • 114 篇 生物学
    • 87 篇 统计学(可授理学、...
    • 51 篇 化学
    • 44 篇 系统科学
  • 338 篇 管理学
    • 207 篇 管理科学与工程(可...
    • 142 篇 图书情报与档案管...
    • 74 篇 工商管理
  • 75 篇 医学
    • 57 篇 临床医学
    • 44 篇 基础医学(可授医学...
  • 52 篇 法学
    • 29 篇 社会学
  • 28 篇 经济学
    • 28 篇 应用经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 12 篇 教育学
  • 4 篇 文学
  • 3 篇 艺术学

主题

  • 106 篇 hadron colliders
  • 69 篇 computer network...
  • 56 篇 semantics
  • 48 篇 feature extracti...
  • 43 篇 accuracy
  • 38 篇 computational mo...
  • 35 篇 federated learni...
  • 34 篇 robustness
  • 32 篇 protocols
  • 32 篇 training
  • 28 篇 computer science
  • 28 篇 w & z bosons
  • 27 篇 deep learning
  • 27 篇 bandwidth
  • 27 篇 security
  • 25 篇 internet
  • 24 篇 wireless communi...
  • 24 篇 wireless sensor ...
  • 23 篇 higgs bosons
  • 22 篇 data mining

机构

  • 148 篇 centro brasileir...
  • 148 篇 istanbul technic...
  • 147 篇 national and kap...
  • 147 篇 yerevan physics ...
  • 146 篇 university of sp...
  • 145 篇 universidad iber...
  • 144 篇 brunel universit...
  • 144 篇 academy of scien...
  • 143 篇 indian institute...
  • 143 篇 charles universi...
  • 140 篇 university of de...
  • 140 篇 department of ph...
  • 138 篇 imperial college...
  • 138 篇 rwth aachen univ...
  • 137 篇 università di to...
  • 136 篇 indian institute...
  • 134 篇 infn sezione di ...
  • 131 篇 institute for nu...
  • 130 篇 zhejiang univers...
  • 129 篇 department of ph...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 112 篇 e. migliore
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 111 篇 p. avery
  • 111 篇 l. silvestris

语言

  • 1,818 篇 英文
  • 164 篇 其他
  • 40 篇 中文
检索条件"机构=Computer Network Engineering Technology Center"
2020 条 记 录,以下是321-330 订阅
排序:
Design and Implementation of Vulnerability Platform Based on Knowledge Graph
Design and Implementation of Vulnerability Platform Based on...
收藏 引用
Artificial Intelligence of Things (AIoT), IEEE Annual Congress on
作者: Yujie Chen Zaiqi Huang Xudong Cao Xuejun Li Yuqing Zhang HangZhou Institute of Technology Xidian University Xi’an China National Computer Network Intrusion Protection Center University of Chinese Academy of Sciences Beijing China School of Cyber Engineering Xidian University Xi’an China
Security vulnerabilities are an important part of the cybersecurity field. These vulnerabilities are dispersed across numerous websites and forums, exhibiting multi-source heterogeneity and data redundancy, and showin... 详细信息
来源: 评论
Control of Magnetization Precession Frequency Using Current Density of Spin-Orbit Torque Applied to Local Area
Control of Magnetization Precession Frequency Using Current ...
收藏 引用
2023 IEEE International Magnetic Conference - Short Papers, INTERMAG Short Papers 2023
作者: Koda, Tetsunori Nakagawa, Ao Muroga, Sho Endo, Yasushi Oshima College National Institute of Technology Department of Electronic Mechanical Engineering Suo-Oshima742-2193 Japan Akita University Graduate School of Engineering Science Department of Mathematical Science and Electrical-Electronic-Computer Engineering Akita010-8502 Japan Department of Electrical Engineering Graduate School of Engineering Tohoku University Sendai980-8579 Japan Center for Spintronics Research Network Tohoku University Sendai980-8577 Japan Organization for Advanced Studies Tohoku University Sendai980-8577 Japan
We numerically study current density dependence of magnetization dynamics in a local area induced by the spin-orbit torque as a source of spin waves. The precession frequency of magnetization dynamics shows large chan... 详细信息
来源: 评论
IQ-VFI: Implicit Quadratic Motion Estimation for Video Frame Interpolation
IQ-VFI: Implicit Quadratic Motion Estimation for Video Frame...
收藏 引用
Conference on computer Vision and Pattern Recognition (CVPR)
作者: Mengshun Hu Kui Jiang Zhihang Zhong Zheng Wang Yinqiang Zheng National Engineering Research Center for Multimedia Software Institute of Artificial Intelligence School of Computer Science Wuhan University Hubei Key Laboratory of Multimedia and Network Communication Engineering Harbin Institute of Technology Shanghai Artificial Intelligence Laboratory The University of Tokyo
Advanced video frame interpolation (VFI) algorithms approximate intermediate motions between two input frames to synthesize intermediate frame. However, they struggle to handle complex scenarios with curvilinear motio... 详细信息
来源: 评论
A Website Fingerprinting Attack Based on Parameter Prediction Model for Conceptual Drift
A Website Fingerprinting Attack Based on Parameter Predictio...
收藏 引用
Software System and Information Processing (ICSSIP), IEEE International Conference on
作者: Jian Cui Taizhong Xu Li Zhao Shuai Han College of Computer Science and Technology Harbin Engineering University Harbin China National Computer Network Emergency Response Technical Team Coordination Center of China Beijing China School of Electrical and Information Engineering Yunnan Minzu University Yunnan Key Laboratory of Unmanned Autonomous System Kunming China
Website content updates and changes in the network environment can lead to concept drift, significantly impacting the performance of existing website fingerprinting methods. Recent research has focused on transfer lea... 详细信息
来源: 评论
Cerebrovascular segmentation from mesoscopic optical images using Swin Transformer
收藏 引用
Journal of Innovative Optical Health Sciences 2023年 第4期16卷 120-133页
作者: Yuxin Li Qianlong Zhang Hang Zhou Junhuai Li Xiangning Li Anan Li Shaanxi Key Laboratory for Network Computing and Security Technology School of Computer Science and Engineering Xi'an University of Technology Xi'an 710048P.R.China School of Computer Science Chengdu University of Information Technology Chengdu 610225P.R.China Britton Chance Center for Biomedical Photonics Wuhan National Laboratory for Optoelectronics MoE Key Laboratory for Biomedical Photonics Huazhong University of Science and Technology Wuhan 430074 P.R.China HUST-Suzhou Institute for Brainsmatics Suzhou 215123 P.R.China
Vascular segmentation is a crucial task in biomedical image processing,which is significant for analyzing and modeling vascular networks under physiological and pathological *** advances in fluorescent labeling and me... 详细信息
来源: 评论
6G-Enabled Edge AI for Metaverse:Challenges, Methods,and Future Research Directions
收藏 引用
Journal of Communications and Information networks 2022年 第2期7卷 107-121页
作者: Luyi Chang Zhe Zhang Pei Li Shan Xi Wei Guo Yukang Shen Zehui Xiong Jiawen Kang Dusit Niyato Xiuquan Qiao Yi Wu School of Data Science and Technology Heilongjiang UniversityHarbin 150080China Institute for Cryptology and Network Security Heilongjiang UniversityHarbin 150080China SenseTime Group Limited Shenzhen 518000China Pillar of Information Systems Technology and Design Singapore University of Technology and Design.Singapore 487372Singapore School of Automation.Guangdong University of Technology and Center for Intelligenl Batch Manufacturing based on IoT TechnologyGuangzhou 510006China School of Computer Science and Engineering Nanyang Technological UniversitySingapore 639798.Singapore State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications.Beijing 100876China
Sixth generation(6G)enabled edge intelligence opens up a new era of Internet of everything and makes it possible to interconnect people-devices-cloud anytime,*** and more next-generation wireless network smart service... 详细信息
来源: 评论
BLDTS: Blockchain-based Lightweight Data Trusted Sharing Scheme for Internet of Vehicles
BLDTS: Blockchain-based Lightweight Data Trusted Sharing Sch...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Haoran Lin Zhongyuan Yu Guijuan Wang Anming Dong Xiang Tian School of Computer Science Qufu Normal University Rizhao China School of Information Science and Engineering Lanzhou University Lanzhou China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
Ensuring safe and reliable data sharing is crucial for the development of Internet of Vehicles (IoV) technology. To provide a trusted data environment for IoV and enable traditional consensus algorithms to meet the hi... 详细信息
来源: 评论
Decrease the Prompt Uncertainty: Adversarial Prompt Learning for Few-shot Text Classification
Decrease the Prompt Uncertainty: Adversarial Prompt Learning...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Jinta Weng Zhaoguang Zhang Jing Yaqi Chenxu Niu Heyan Huang Yue Hu School of Cyber Security University of Chinese Academy of Sciences Beijing China Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Computer Science and Cyber Engineering Guangzhou University China National Computer Network Emergency Response Technical Team/Coordination Center of China Beijing Institute of Technology School of Computer Science and Technology Beijing China Southeast Academy of Information Technology Putian China
With few-shot learning abilities, pre-trained language models (PLMs) have achieved remarkable success in classification tasks. However, recent studies have shown that the performance of PLM is vulnerable due to differ... 详细信息
来源: 评论
Provably Secure Authenticated Key-Management Mechanism for e-Healthcare Environment
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Saleem, Muhammad Asad Li, Xiong Mahmood, Khalid Ghaffar, Zahid Xie, Yong Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu611731 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan National Yunlin University of Science and Technology Graduate School of Engineering Science and Technology Douliu64002 Taiwan Qinghai Institute of Technology School of Computer and Information Science China Qinghai Provincial Laboratory for Intelligent Computing and Application China Key Laboratory of Computing Power Network and Information Security Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security China Shandong Fundamental Research Center for Computer Science Jinan250353 China
The Internet of Things (IoT) is rapidly permeating all aspects of human life, involving a network of devices that share sensitive data. A notable application is the e-healthcare systems, which employ connected sensors... 详细信息
来源: 评论
Data-consistent Unsupervised Diffusion Model for Metal Artifact Reduction
Data-consistent Unsupervised Diffusion Model for Metal Artif...
收藏 引用
2023 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2023
作者: Tong, Zhan Wu, Zhan Yang, Yang Mao, Weilong Wang, Shijie Li, Yinsheng Chen, Yang Southeast University Laboratory of Image Science and Technology Nanjing210096 China Southeast University Ministry of Education Key Laboratory of Computer Network and Information Integration Nanjing210096 China Chinese Academy of Sciences Research Center for Medical Artificial Intelligence Shenzhen Institutes of Advanced Technology Shenzhen518055 China School of Computer Science and Engineering Key Lab. of New Generation Artificial Intelligence Technology and Its Interdisciplinary Applications Jiangsu Provincial Joint International Research Laboratory of Medical Information Processing The Laboratory of Image Science and Technology Nanjing210096 China
Computed Tomography (CT) is an imaging technique widely used in clinical diagnosis. However, high-attenuation metallic implants result in the obstruction of low-energy Xrays and further lead to metal artifacts in the ... 详细信息
来源: 评论