咨询与建议

限定检索结果

文献类型

  • 1,033 篇 会议
  • 1,002 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 2,042 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,309 篇 工学
    • 854 篇 计算机科学与技术...
    • 658 篇 软件工程
    • 343 篇 信息与通信工程
    • 171 篇 电气工程
    • 138 篇 电子科学与技术(可...
    • 137 篇 控制科学与工程
    • 95 篇 生物工程
    • 84 篇 机械工程
    • 74 篇 核科学与技术
    • 73 篇 光学工程
    • 71 篇 网络空间安全
    • 63 篇 生物医学工程(可授...
    • 59 篇 动力工程及工程热...
    • 58 篇 仪器科学与技术
    • 53 篇 化学工程与技术
    • 51 篇 交通运输工程
    • 45 篇 安全科学与工程
  • 711 篇 理学
    • 303 篇 物理学
    • 293 篇 数学
    • 116 篇 生物学
    • 89 篇 统计学(可授理学、...
    • 54 篇 化学
    • 44 篇 系统科学
  • 346 篇 管理学
    • 213 篇 管理科学与工程(可...
    • 143 篇 图书情报与档案管...
    • 76 篇 工商管理
  • 80 篇 医学
    • 61 篇 临床医学
    • 45 篇 基础医学(可授医学...
  • 52 篇 法学
    • 29 篇 社会学
  • 28 篇 经济学
    • 28 篇 应用经济学
  • 17 篇 军事学
  • 13 篇 教育学
  • 13 篇 农学
  • 4 篇 文学
  • 3 篇 艺术学

主题

  • 106 篇 hadron colliders
  • 69 篇 computer network...
  • 56 篇 semantics
  • 48 篇 feature extracti...
  • 44 篇 accuracy
  • 38 篇 computational mo...
  • 35 篇 federated learni...
  • 34 篇 robustness
  • 33 篇 protocols
  • 32 篇 training
  • 28 篇 computer science
  • 28 篇 w & z bosons
  • 28 篇 deep learning
  • 27 篇 bandwidth
  • 27 篇 security
  • 25 篇 internet
  • 24 篇 wireless communi...
  • 24 篇 higgs bosons
  • 24 篇 wireless sensor ...
  • 23 篇 predictive model...

机构

  • 148 篇 centro brasileir...
  • 148 篇 istanbul technic...
  • 147 篇 national and kap...
  • 147 篇 yerevan physics ...
  • 146 篇 university of sp...
  • 145 篇 universidad iber...
  • 144 篇 brunel universit...
  • 144 篇 academy of scien...
  • 143 篇 indian institute...
  • 143 篇 charles universi...
  • 141 篇 department of ph...
  • 140 篇 university of de...
  • 138 篇 imperial college...
  • 138 篇 rwth aachen univ...
  • 137 篇 università di to...
  • 137 篇 indian institute...
  • 134 篇 infn sezione di ...
  • 132 篇 institute for nu...
  • 130 篇 zhejiang univers...
  • 130 篇 centro de invest...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 112 篇 e. migliore
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 111 篇 p. avery
  • 111 篇 l. silvestris

语言

  • 1,778 篇 英文
  • 226 篇 其他
  • 40 篇 中文
检索条件"机构=Computer Network Engineering Technology Center"
2042 条 记 录,以下是481-490 订阅
排序:
Research on Efficient Image Inpainting Algorithm Based on Deep Learning  7th
Research on Efficient Image Inpainting Algorithm Based on De...
收藏 引用
7th International Conference on Artificial Intelligence and Security, ICAIS 2021
作者: Qin, Tao Liu, Juanjuan Xue, Wenchao National Computer Network Emergency Response Technical Team/Coordination Center of China Beijing100020 China School of Computer and Communication Engineering University of Science and Technology Beijing Beijing100083 China Engineering Agent Construction Management Office of Navy Logistics Department Beijing100036 China
The rapid development of deep learning has brought a new development direction for image inpainting, changing the traditional image inpaiting algorithm, which can only repair the problem of small area damage based on ... 详细信息
来源: 评论
A unitary weights based one-iteration quantum perceptron algorithm for non-ideal training sets
arXiv
收藏 引用
arXiv 2023年
作者: Liu, Wenjie Gao, PeiPei Wang, Yuxiang Yu, Wenbin Zhang, Maojun Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing210044 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing210044 China School of Mathematics and Computing Science Guilin University of Electronic Technology Guilin China College of Computer Science and Information Technology Guangxi Normal University Guilin China
In order to solve the problem of non-ideal training sets (i.e., the less-complete or over-complete sets) and implement one-iteration learning, a novel efficient quantum perceptron algorithm based on unitary weights is... 详细信息
来源: 评论
An Application Review of Artificial Intelligence in Prevention and Cure of COVID-19 Pandemic
收藏 引用
computers, Materials & Continua 2020年 第10期65卷 743-760页
作者: Peipeng Yu Zhihua Xia Jianwei Fei Sunil Kumar Jha Engineering Research Center of Digital Forensics Ministry of EducationSchool of Computer and SoftwareJiangsu Engineering Center of Network MonitoringJiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment TechnologyNanjing University of Information Science&TechnologyNanjing210044China IT Fundamentals and Education Technologies Applications University of Information Technology and Management in RzeszowRzeszow Voivodeship100031Poland
Coronaviruses are a well-known family of viruses that can infect humans or ***,the new coronavirus(COVID-19)has spread *** countries in the world are working hard to control the coronavirus ***,many countries are face... 详细信息
来源: 评论
MateGraph: Toward Mobile Malware Detection Through Traffic Behavior Graph  24
MateGraph: Toward Mobile Malware Detection Through Traffic B...
收藏 引用
24th IEEE International Conference on High Performance Computing and Communications, 8th IEEE International Conference on Data Science and Systems, 20th IEEE International Conference on Smart City and 8th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Application, HPCC/DSS/SmartCity/DependSys 2022
作者: Ge, Ruihai Zhang, Yongzheng Si, Chengxiang Zhou, Guoqiao Zhou, Wenchang Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China China Assets Cybersecurity Technology CO. Ltd. Beijing China National Computer Network Emergency Response Technical Team/Coordination Center of China Beijing China
As the number of interconnected mobile devices increases exponentially, mobile malware poses a severe threat to cyberspace security. Existing techniques utilize network traffic analysis effectively to identify and det... 详细信息
来源: 评论
PrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Man Su, Shuao Wang, Qian Li, Qi Zhou, Yuting Ma, Xiaojing Li, Zhengxiong School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Cyber Science and Engineering Wuhan University China Institute for Network Sciences and Cyberspace Tsinghua University China Department of Computer Science and Engineering University of Colorado Denver United States Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology China
Fingerprint authentication has been extensively employed in contemporary identity verification systems owing to its rapidity and cost-effectiveness. Due to its widespread use, fingerprint leakage may cause sensitive i... 详细信息
来源: 评论
Quantum Algorithms and Experiment Implementations Based on IBM Q
收藏 引用
computers, Materials & Continua 2020年 第11期65卷 1671-1689页
作者: Wenjie Liu Junxiu Chen Yinsong Xu Jiahao Tang Lian Tong Xiaoyu Song Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and TechnologyNanjing210044China School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China School of Information Engineering Jiangsu Maritime InstituteNanjing211100China Department of Electrical and Computer Engineering Portland State UniversityOregon97207USA
With the rapid development of quantum theory and technology in recent years,especially the emergence of some quantum cloud computing platforms,more and more researchers are not satisfied with the theoretical derivatio... 详细信息
来源: 评论
Energy Consumption Minimization in Secure Multi-antenna UAV-assisted MEC networks with Channel Uncertainty
arXiv
收藏 引用
arXiv 2023年
作者: Mao, Weihao Xiong, Ke Lu, Yang Fan, Pingyi Ding, Zhiguo The Engineering Research Center of Network Management Technology for High Speed Railway Ministry of Education School of Computer and Information Technology Beijing Jiaotong University Beijing100044 China The Beijing National Research Center for Information Science and Technology The Department of Electronic Engineering Tsinghua University Beijing100084 China The School of Electrical and Electronic Engineering The University of Manchester ManchesterM13 9PL United Kingdom
This paper investigates the robust and secure task transmission and computation scheme in multi-antenna unmanned aerial vehicle (UAV)-assisted mobile edge computing (MEC) networks, where the UAV is dual-function, i.e.... 详细信息
来源: 评论
Robust and Secure Federated Learning with Verifiable Differential Privacy
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Zhang, Chushan Weng, Jian Weng, Jiasi Zhong, Yijian Liu, Jia-Nan Deng, Cunle College of Cyber Security of Jinan University Guangzhou510632 China College of Cyber Security of Jinan University National Joint Engineering Research Center of Network Security Detection and Protection Technology Guangdong Key Laboratory of Data Security and Privacy Preserving Guangdong-Hong Kong-Macao Joint Laboratory of Data Security and Privacy Preserving Guangzhou510632 China Dongguan University of Technology School of Computer Science and Technology Dongguan523808 China
Federated Learning (FL) has emerged as a popular paradigm for training machine learning models on data from multiple sources without the need for data to leave their respective locations. Although FL is widely used, r... 详细信息
来源: 评论
Transformer-Based Multi-Scale Fusion for Robust Predicting Microsatellite Instability from Pathological Images
Transformer-Based Multi-Scale Fusion for Robust Predicting M...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Taiyuan Hu Haijing Luan Rui Yan Jifang Hu Kaixing Yang Xinyin Han Weier Liu Jiayin He Xiaohong Duan Ruilin Li Fa Zhang Beifang Niu Computer Network Information Center Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China School of Biomedical Engineering University of Science and Technology of China Hefei China Beijing Institute of Genomics Chinese Academy of Sciences Beijing China Scientific Research Center ChosenMed Technology (Zhejiang) Co. Ltd. Hangzhou China School of Medical Technology Beijing Institute of Technology Beijing China
Microsatellite instability (MSI) is a crucial biomarker for guiding the efficacy of immunotherapy and adjuvant chemotherapy, making its detection essential for effective cancer treatment and prognosis. Traditional MSI... 详细信息
来源: 评论
Self-feedback LSTM regression model for real-time particle source apportionment
收藏 引用
Journal of Environmental Sciences 2022年 第4期34卷 10-20页
作者: Wei Wang Weiman Xu Shuai Deng Yimeng Chai Ruoyu Ma Guoliang Shi Bo Xu Mei Li Yue Li Trusted AI System Laboratory College of Computer ScienceNankai UniversityTianjin 300350China KLMDASR Tianjin Key Laboratory of Network and Data Security TechnologyTianjin 300350China State Environmental Protection Key Laboratory of Urban Ambient Air Particulate Matter Pollution Prevention and Control College of Environmental Science and EngineeringNankai UniversityTianjin 300071China Institute of Mass Spectrometry and Atmospheric Environment Guangdong Provincial Engineering Research Center for on-line source apportionment system of air pollution Jinan UniversityGuangzhou 510632China Guangdong-Hongkong-Macao Joint Laboratory of Collaborative Innovation for Environmental Quality Guangzhou 510632China
Atmospheric particulate matter pollution has attracted much wider attention *** recent years,the development of atmospheric particle collection techniques has put forwards new demands on the real-time source apportion... 详细信息
来源: 评论