咨询与建议

限定检索结果

文献类型

  • 2,806 篇 会议
  • 2,734 篇 期刊文献

馆藏范围

  • 5,540 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,634 篇 工学
    • 2,413 篇 计算机科学与技术...
    • 1,916 篇 软件工程
    • 904 篇 信息与通信工程
    • 490 篇 电气工程
    • 451 篇 电子科学与技术(可...
    • 434 篇 控制科学与工程
    • 304 篇 生物工程
    • 267 篇 机械工程
    • 220 篇 仪器科学与技术
    • 217 篇 光学工程
    • 177 篇 网络空间安全
    • 160 篇 生物医学工程(可授...
    • 148 篇 化学工程与技术
    • 140 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 98 篇 材料科学与工程(可...
    • 95 篇 交通运输工程
    • 93 篇 核科学与技术
    • 79 篇 建筑学
  • 1,961 篇 理学
    • 918 篇 数学
    • 734 篇 物理学
    • 341 篇 生物学
    • 284 篇 统计学(可授理学、...
    • 170 篇 化学
    • 170 篇 系统科学
  • 916 篇 管理学
    • 569 篇 管理科学与工程(可...
    • 392 篇 图书情报与档案管...
    • 176 篇 工商管理
  • 138 篇 医学
    • 113 篇 临床医学
    • 84 篇 基础医学(可授医学...
  • 131 篇 法学
  • 70 篇 经济学
  • 59 篇 农学
  • 42 篇 军事学
  • 29 篇 教育学
  • 23 篇 文学
  • 18 篇 艺术学
  • 2 篇 哲学

主题

  • 184 篇 feature extracti...
  • 164 篇 semantics
  • 128 篇 deep learning
  • 124 篇 hadron colliders
  • 121 篇 accuracy
  • 120 篇 computational mo...
  • 117 篇 training
  • 89 篇 wireless sensor ...
  • 82 篇 data models
  • 73 篇 federated learni...
  • 71 篇 optimization
  • 67 篇 neural networks
  • 64 篇 security
  • 61 篇 computer science
  • 61 篇 privacy
  • 58 篇 predictive model...
  • 56 篇 machine learning
  • 53 篇 protocols
  • 52 篇 wireless communi...
  • 52 篇 adaptation model...

机构

  • 231 篇 yerevan physics ...
  • 190 篇 shandong provinc...
  • 149 篇 department for p...
  • 148 篇 departamento de ...
  • 146 篇 centro brasileir...
  • 145 篇 department of ph...
  • 145 篇 national and kap...
  • 144 篇 universidad iber...
  • 144 篇 dipartimento di ...
  • 142 篇 istanbul technic...
  • 142 篇 key laboratory o...
  • 141 篇 university of sp...
  • 141 篇 academy of scien...
  • 140 篇 indian institute...
  • 139 篇 brunel universit...
  • 137 篇 institute of phy...
  • 132 篇 infn sezione di ...
  • 132 篇 università di to...
  • 130 篇 infn sezione di ...
  • 128 篇 charles universi...

作者

  • 112 篇 c. hensel
  • 110 篇 g. tonelli
  • 110 篇 d. barney
  • 110 篇 l. valencia palo...
  • 110 篇 t. liu
  • 100 篇 a. garcia-bellid...
  • 99 篇 w. busza
  • 99 篇 a. babaev
  • 97 篇 a. steen
  • 96 篇 n. cartiglia
  • 92 篇 v. karjavine
  • 90 篇 n. colino
  • 89 篇 f. moortgat
  • 88 篇 b. clerbaux
  • 88 篇 g. sultanov
  • 88 篇 m. a. ciocci
  • 88 篇 k. lamichhane
  • 88 篇 s. maselli
  • 87 篇 e. migliore
  • 87 篇 p. avery

语言

  • 5,074 篇 英文
  • 311 篇 其他
  • 166 篇 中文
  • 2 篇 德文
检索条件"机构=Computer Network Technology Key Laboratory of Jiangsu"
5540 条 记 录,以下是31-40 订阅
排序:
Underwater target recognition based on adaptive multi-feature fusion network
收藏 引用
Multimedia Tools and Applications 2025年 第10期84卷 7297-7317页
作者: Pan, Xiaoying Sun, Jia Feng, TianHao Lei, MingZhu Wang, Hao Zhang, WuXia Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi’an710121 China Xi’an Key Laboratory of Big Data and Intelligent Computing Xi’an710121 China School of Computer Science and Technology Xi’an University of Post & Telecommunications Xi’an710121 China
Due to the complexity of the underwater environment, underwater acoustic target recognition is more challenging than ordinary target recognition, and has become a hot topic in the field of underwater acoustics researc... 详细信息
来源: 评论
Construction and application of a novel WGAN-CNN-based predicting approach for dust concentration at underground coal mine working faces
收藏 引用
Environmental Science and Pollution Research 2024年 第27期31卷 39271-39284页
作者: Zhou, Banghao Qin, Botao Zhou, Qun Sun, Daowei Chen, Pengpeng Yang, Kai Pan, Qingyan Li, Huizhen Key Laboratory of Gas and Fire Control for Coal Mines China University of Mining and Technology Ministry of Education Jiangsu Xuzhou221116 China School of Safety Engineering China University of Mining and Technology Jiangsu Xuzhou221116 China School of Computer Science & amp Technology China University of Mining and Technology Jiangsu Xuzhou221116 China
To enhance the real-time monitoring and early-warning capabilities for dust disasters in underground coal mine, this paper presents a novel WGAN-CNN-based prediction approach to predict the dust concentration at under... 详细信息
来源: 评论
MMH-FE:AMulti-Precision and Multi-Sourced Heterogeneous Privacy-Preserving Neural network Training Based on Functional Encryption
收藏 引用
computers, Materials & Continua 2025年 第3期82卷 5387-5405页
作者: Hao Li Kuan Shao Xin Wang Mufeng Wang Zhenyong Zhang The State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang550025China Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science CenterQilu University of Technology(Shandong Academy of Sciences)Jinan250014China China Industrial Control Systems Cyber Emergency Response Team Beijing100040China
Due to the development of cloud computing and machine learning,users can upload their data to the cloud for machine learning model ***,dishonest clouds may infer user data,resulting in user data *** schemes have achie... 详细信息
来源: 评论
SmartZone: Runtime Support for Secure and Efficient On-Device Inference on ARM TrustZone
收藏 引用
IEEE Transactions on computers 2025年 第6期74卷 2144-2158页
作者: Jian, Zhaolong Liu, Xu Dong, Qiankun Cheng, Longkai Xie, Xueshuo Li, Tao Nankai University College of Computer Science Tianjin300350 China Tianjin Key Laboratory of Network and Data Science Technology Tianjin300350 China Haihe Lab of ITAI Tianjin300450 China
On-device inference is a burgeoning paradigm that performs model inference locally on end devices, allowing private data to remain local. ARM TrustZone as a widely supported trusted execution environment has been appl... 详细信息
来源: 评论
Target extraction through strong scattering disturbance using characteristic-enhanced pseudo-thermal ghost imaging
收藏 引用
Chinese Optics Letters 2024年 第12期22卷 38-44页
作者: Xuanpengfan Zou Xianwei Huang Wei Tan Liyu Zhou Xiaohui Zhu Qin Fu Xiaoqian Liang Suqin Nan Yanfeng Bai Xiquan Fu College of Computer Science and Electronic Engineering Hunan UniversityChangsha 410082China Hunan Police Academy Changsha 410138China Hunan Provincial Key Laboratory of Network Investigational Technology Hunan Police AcademyChangsha 410138China School of Computer Science Hunan University of Technology and BusinessChangsha 410205China
It is difficult to extract targets under strong environmental disturbance in *** imaging(GI)is an innovative antiinterference imaging *** this paper,we propose a scheme for target extraction based on characteristicenh... 详细信息
来源: 评论
Improved sparrow search algorithm for RFID network planning
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2023年 第1期30卷 93-102页
作者: Zhang Jiangbo Zheng Jiali Quan Yixuan Lin Zihan Xie Xiaode School of Computer Electrics and InformationGuangxi UniversityNanning 530004China Guangxi Key Laboratory of Multimedia Communications and Network Technology Guangxi UniversityNanning 530004China
To solve the problem that the performance of the coverage,interference rate,load balance andweak power in the radio frequency identification(RFID)network *** paper proposes an elite opposition-based learning and L... 详细信息
来源: 评论
E2E-MFERC:AMulti-Face Expression Recognition Model for Group Emotion Assessment
收藏 引用
computers, Materials & Continua 2024年 第4期79卷 1105-1135页
作者: Lin Wang Juan Zhao Hu Song Xiaolong Xu Jiangsu Key Laboratory of Big Data Security&Intelligent Processing Nanjing University of Posts and TelecommunicationsNanjing210042China School of Network Security Jinling Institute of TechnologyNanjing211169China State Grid Jiangsu Electric Power Company Limited Nanjing210000China School of Computer Science Nanjing University of Posts and TelecommunicationsNanjing210042China
In smart classrooms, conducting multi-face expression recognition based on existing hardware devices to assessstudents’ group emotions can provide educators with more comprehensive and intuitive classroom effect anal... 详细信息
来源: 评论
A Sharding Scheme Based on Graph Partitioning Algorithm for Public Blockchain
收藏 引用
computer Modeling in Engineering & Sciences 2024年 第6期139卷 3311-3327页
作者: Shujiang Xu Ziye Wang Lianhai Wang Miodrag J.Mihaljevi′c Shuhui Zhang Wei Shao Qizheng Wang Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science CenterQilu University of Technology(Shandong Academy of Sciences)Jinan250014China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer ScienceJinan250014China Mathematical Institute The Serbian Academy of Sciences and ArtsBelgrade11000Serbia
Blockchain technology,with its attributes of decentralization,immutability,and traceability,has emerged as a powerful catalyst for enhancing traditional industries in terms of optimizing business ***,transaction perfo... 详细信息
来源: 评论
Research on Improved MobileViT Image Tamper Localization Model
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 3173-3192页
作者: Jingtao Sun Fengling Zhang Huanqi Liu Wenyan Hou School of Computer Science and Technology Xi’an University of Posts and TelecommunicationsXi’an710121China Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi’an University of Posts and TelecommunicationsXi’an710121China
As image manipulation technology advances rapidly,the malicious use of image tampering has alarmingly escalated,posing a significant threat to social *** the realm of image tampering localization,accurately localizing... 详细信息
来源: 评论
Textual Data De-Privatization Scheme Based on Generative Adversarial networks  24th
Textual Data De-Privatization Scheme Based on Generative Adv...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Du, Yanning Xu, Jinnan Zhang, Yaling Wang, Yichuan Wang, Zhoukai School of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China
In many fields, such as healthcare, finance, and scientific research, data sharing and collaboration are critical to achieving better outcomes. However, the sharing of personal data often involves privacy risks, so pr... 详细信息
来源: 评论