咨询与建议

限定检索结果

文献类型

  • 6,261 篇 会议
  • 3,443 篇 期刊文献
  • 35 册 图书

馆藏范围

  • 9,739 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6,013 篇 工学
    • 4,281 篇 计算机科学与技术...
    • 3,318 篇 软件工程
    • 1,619 篇 信息与通信工程
    • 662 篇 控制科学与工程
    • 630 篇 电子科学与技术(可...
    • 624 篇 电气工程
    • 494 篇 生物工程
    • 401 篇 机械工程
    • 304 篇 仪器科学与技术
    • 274 篇 网络空间安全
    • 273 篇 生物医学工程(可授...
    • 264 篇 光学工程
    • 212 篇 动力工程及工程热...
    • 210 篇 化学工程与技术
    • 172 篇 交通运输工程
    • 171 篇 安全科学与工程
    • 151 篇 材料科学与工程(可...
  • 2,791 篇 理学
    • 1,454 篇 数学
    • 817 篇 物理学
    • 560 篇 生物学
    • 434 篇 统计学(可授理学、...
    • 262 篇 系统科学
    • 218 篇 化学
  • 1,649 篇 管理学
    • 1,058 篇 管理科学与工程(可...
    • 643 篇 图书情报与档案管...
    • 385 篇 工商管理
  • 263 篇 法学
    • 171 篇 社会学
  • 253 篇 医学
    • 199 篇 临床医学
    • 167 篇 基础医学(可授医学...
  • 146 篇 经济学
    • 146 篇 应用经济学
  • 131 篇 教育学
  • 70 篇 农学
  • 53 篇 军事学
  • 43 篇 文学
  • 20 篇 艺术学

主题

  • 241 篇 feature extracti...
  • 221 篇 computational mo...
  • 210 篇 computer network...
  • 205 篇 computer science
  • 192 篇 semantics
  • 172 篇 internet
  • 162 篇 protocols
  • 152 篇 deep learning
  • 150 篇 accuracy
  • 146 篇 bandwidth
  • 138 篇 wireless sensor ...
  • 134 篇 routing
  • 127 篇 data mining
  • 121 篇 servers
  • 118 篇 quality of servi...
  • 116 篇 security
  • 111 篇 educational inst...
  • 111 篇 optimization
  • 108 篇 throughput
  • 107 篇 predictive model...

机构

  • 204 篇 computer network...
  • 197 篇 shandong provinc...
  • 149 篇 national and kap...
  • 149 篇 centro brasileir...
  • 148 篇 istanbul technic...
  • 146 篇 universidad iber...
  • 146 篇 university of sp...
  • 146 篇 yerevan physics ...
  • 144 篇 brunel universit...
  • 144 篇 indian institute...
  • 144 篇 key laboratory o...
  • 143 篇 academy of scien...
  • 141 篇 charles universi...
  • 137 篇 università di to...
  • 137 篇 rwth aachen univ...
  • 136 篇 imperial college...
  • 136 篇 university of de...
  • 134 篇 infn sezione di ...
  • 132 篇 zhejiang univers...
  • 128 篇 department of ph...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 111 篇 e. migliore
  • 111 篇 p. avery
  • 111 篇 l. silvestris

语言

  • 8,681 篇 英文
  • 793 篇 其他
  • 280 篇 中文
  • 3 篇 日文
  • 1 篇 德文
检索条件"机构=Computer Network Technology"
9739 条 记 录,以下是11-20 订阅
排序:
DMF: A Deep Multimodal Fusion-Based network Traffic Classification Model
收藏 引用
computers, Materials & Continua 2025年 第5期83卷 2267-2285页
作者: Xiangbin Wang Qingjun Yuan Weina Niu Qianwei Meng Yongjuan Wang Chunxiang Gu Henan Key Laboratory of Network Cryptography Technology Information Engineering UniversityZhengzhou450001China School of Computer Science and Engineering University of Electronic Science and Technology of ChinaChengdu611731China
With the rise of encrypted traffic,traditional network analysis methods have become less effective,leading to a shift towards deep learning-based *** these,multimodal learning-based classification methods have gained ... 详细信息
来源: 评论
Block-gram:Mining knowledgeable features for efficiently smart contract vulnerability detection
收藏 引用
Digital Communications and networks 2025年 第1期11卷 1-12页
作者: Xueshuo Xie Haolong Wang Zhaolong Jian Yaozheng Fang Zichun Wang Tao Li Tianjin Key Laboratory of Network and Data Security Technology TianjinChina College of Computer Science Nankai UniversityTianjinChina Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province China State Key Laboratory of Computer Architecture Institute of Computing TechnologyChinese Academy of SciencesChina
Smart contracts are widely used on the blockchain to implement complex transactions,such as decentralized applications on *** vulnerability detection of large-scale smart contracts is critical,as attacks on smart cont... 详细信息
来源: 评论
TGAIN:Geospatial Data Recovery Algorithm Based on GAIN-LSTM
收藏 引用
computers, Materials & Continua 2024年 第10期81卷 1471-1489页
作者: Lechan Yang Li Li Shouming Ma School of Soft Engineering Jinling Institute of TechnologyNanjing211169China School of Computer Jinling Institute of TechnologyNanjing211169China School of Network Security Jinling Institute of TechnologyNanjing211169China
Accurate geospatial data are essential for geographic information systems(GIS),environmental monitoring,and urban *** deep integration of the open Internet and geographic information technology has led to increasing c... 详细信息
来源: 评论
A Random Fusion of Mix 3D and Polar Mix to Improve Semantic Segmentation Performance in 3D Lidar Point Cloud
收藏 引用
computer Modeling in Engineering & Sciences 2024年 第7期140卷 845-862页
作者: Bo Liu Li Feng Yufeng Chen School of Computer Science and Engineering Macao University of Science and TechnologyMacao999078China School of Computer Science and Artificial Intelligence Chaohu UniversityChaohu238000China Institute of Vehicle Information Control and Network Technology Hubei University of Automotive TechnologyShiyan442002China
This paper focuses on the effective utilization of data augmentation techniques for 3Dlidar point clouds to enhance the performance of neural network *** point clouds,which represent spatial information through a coll... 详细信息
来源: 评论
Counterfactual Reasoning over Community Detection:A Case Study of the Public Science Day Community
收藏 引用
Journal of Social Computing 2023年 第2期4卷 125-138页
作者: Wenkang Jiang Hongbo He Lei Lin Qirui Tang Runqiang Wang the Computer Network Information Center Chinese Academy of Sciences the School of Computer Science and Technology University of Chinese Academy of SciencesBeijing 100083China the Computer Network Information Center Chinese Academy of SciencesBeijing 100083China
With the rapid rise of new media platforms such as Weibo and Tiktok,communities with science communication characteristics have progressively grown on social *** communities pursue essential objectives such as increas... 详细信息
来源: 评论
Deep Learning Based Signal Detection for Quadrature Spatial Modulation System
收藏 引用
China Communications 2024年 第10期21卷 78-85页
作者: Shu Dingyun Peng Yuyang Yue Ming Fawaz AL-Hazemi Mohammad Meraj Mirza School of Computer Science and Engineering Macao University of Science and TechnologyMacaoChina Department of Computer and Network Engineering University of JeddahSaudi Arabia Department of Computer Science College of Computers and Information TechnologyTaif UniversityP.O.Box 11099Taif 21944Saudi Arabia
With the development of communication systems, modulation methods are becoming more and more diverse. Among them, quadrature spatial modulation(QSM) is considered as one method with less capacity and high efficiency. ... 详细信息
来源: 评论
A Holistic Approach for Cyber Security Vulnerability Assessment Based on Open Source Tools: Nikto, Acunitx, ZAP, Nessus and Enhanced with AI-Powered Tool ImmuniWeb  4
A Holistic Approach for Cyber Security Vulnerability Assessm...
收藏 引用
4th IEEE International Maghreb Meeting of the Conference on Sciences and Techniques of Automatic Control and computer Engineering, MI-STA 2024
作者: Sllame, Azeddien M. Tomia, Tayma Esam Rahuma, Ruqia Mohammed University of Tripoli Faculty of Information Technology Computer Network Department Libya
This paper describes a cyber security vulnerability assessment methodology powered by AI tactics. The AI-powered tool 'ImmuniWeb AI' effectively supported the tools of the suggested approach by automating a nu... 详细信息
来源: 评论
THL: Fast Targeted High Utility Itemset Mining within Length Consideration
Journal of Network Intelligence
收藏 引用
Journal of network Intelligence 2025年 第1期10卷 541-558页
作者: Xu, Peiming Jiang, Yixin Kuang, Xiaoyun Luo, Yu Chen, Jiahui Guangdong Provincial Key Laboratory of Power System Network Security CSG Guangzhou510000 China School of Computer Science and Technology Guangdong University of Technology Guangzhou510006 China
High utility itemset mining is a research topic of the pattern mining domain, which has been widely applied in reality during the past decade. Although most high utility itemset mining algorithms show significant exec... 详细信息
来源: 评论
Deep Reinforcement Learning for Optimizing Multi-hop Distributed Collaborative Task Offloading in R2X
收藏 引用
IEEE Transactions on Vehicular technology 2025年 第6期74卷 9533-9548页
作者: Zhao, Wei Weng, Tangjie Cheng, Yu Liu, Zhi Kato, Nei Anhui University of Technology School of Computer Science and Technology Anhui Ma'anshan243032 China University of Electro-Communications Department of Computer and Network Engineering Tokyo Japan Tohoku University Graduate School of Information Sciences Sendai Japan
Roadside units (RSUs) with strong sensing abilities enhance the viability of the RSU-to-Everything (R2X) paradigm, offering crucial infrastructure support for Mobile Edge Computing (MEC) that enables real-time data pr... 详细信息
来源: 评论
Residual diverse ensemble for long-tailed multi-label text classification
收藏 引用
Science China(Information Sciences) 2024年 第11期67卷 92-105页
作者: Jiangxin SHI Tong WEI Yufeng LI National Key Laboratory for Novel Software Technology Nanjing University School of Artificial Intelligence Nanjing University School of Computer Science and Engineering Southeast University Key Laboratory of Computer Network and Information Integration Southeast UniversityMinistry of Education
Long-tailed multi-label text classification aims to identify a subset of relevant labels from a large candidate label set, where the training datasets usually follow long-tailed label distributions. Many of the previo... 详细信息
来源: 评论