咨询与建议

限定检索结果

文献类型

  • 2,806 篇 会议
  • 2,734 篇 期刊文献

馆藏范围

  • 5,540 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,634 篇 工学
    • 2,413 篇 计算机科学与技术...
    • 1,916 篇 软件工程
    • 904 篇 信息与通信工程
    • 490 篇 电气工程
    • 451 篇 电子科学与技术(可...
    • 434 篇 控制科学与工程
    • 304 篇 生物工程
    • 267 篇 机械工程
    • 220 篇 仪器科学与技术
    • 217 篇 光学工程
    • 177 篇 网络空间安全
    • 160 篇 生物医学工程(可授...
    • 148 篇 化学工程与技术
    • 140 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 98 篇 材料科学与工程(可...
    • 95 篇 交通运输工程
    • 93 篇 核科学与技术
    • 79 篇 建筑学
  • 1,961 篇 理学
    • 918 篇 数学
    • 734 篇 物理学
    • 341 篇 生物学
    • 284 篇 统计学(可授理学、...
    • 170 篇 化学
    • 170 篇 系统科学
  • 916 篇 管理学
    • 569 篇 管理科学与工程(可...
    • 392 篇 图书情报与档案管...
    • 176 篇 工商管理
  • 138 篇 医学
    • 113 篇 临床医学
    • 84 篇 基础医学(可授医学...
  • 131 篇 法学
  • 70 篇 经济学
  • 59 篇 农学
  • 42 篇 军事学
  • 29 篇 教育学
  • 23 篇 文学
  • 18 篇 艺术学
  • 2 篇 哲学

主题

  • 184 篇 feature extracti...
  • 164 篇 semantics
  • 128 篇 deep learning
  • 124 篇 hadron colliders
  • 121 篇 accuracy
  • 120 篇 computational mo...
  • 117 篇 training
  • 89 篇 wireless sensor ...
  • 82 篇 data models
  • 73 篇 federated learni...
  • 71 篇 optimization
  • 67 篇 neural networks
  • 64 篇 security
  • 61 篇 computer science
  • 61 篇 privacy
  • 58 篇 predictive model...
  • 56 篇 machine learning
  • 53 篇 protocols
  • 52 篇 wireless communi...
  • 52 篇 adaptation model...

机构

  • 231 篇 yerevan physics ...
  • 190 篇 shandong provinc...
  • 149 篇 department for p...
  • 148 篇 departamento de ...
  • 146 篇 centro brasileir...
  • 145 篇 department of ph...
  • 145 篇 national and kap...
  • 144 篇 universidad iber...
  • 144 篇 dipartimento di ...
  • 142 篇 istanbul technic...
  • 142 篇 key laboratory o...
  • 141 篇 university of sp...
  • 141 篇 academy of scien...
  • 140 篇 indian institute...
  • 139 篇 brunel universit...
  • 137 篇 institute of phy...
  • 132 篇 infn sezione di ...
  • 132 篇 università di to...
  • 130 篇 infn sezione di ...
  • 128 篇 charles universi...

作者

  • 112 篇 c. hensel
  • 110 篇 g. tonelli
  • 110 篇 d. barney
  • 110 篇 l. valencia palo...
  • 110 篇 t. liu
  • 100 篇 a. garcia-bellid...
  • 99 篇 w. busza
  • 99 篇 a. babaev
  • 97 篇 a. steen
  • 96 篇 n. cartiglia
  • 92 篇 v. karjavine
  • 90 篇 n. colino
  • 89 篇 f. moortgat
  • 88 篇 b. clerbaux
  • 88 篇 g. sultanov
  • 88 篇 m. a. ciocci
  • 88 篇 k. lamichhane
  • 88 篇 s. maselli
  • 87 篇 e. migliore
  • 87 篇 p. avery

语言

  • 5,074 篇 英文
  • 311 篇 其他
  • 166 篇 中文
  • 2 篇 德文
检索条件"机构=Computer Network Technology Key Laboratory of Jiangsu"
5540 条 记 录,以下是41-50 订阅
排序:
Neural network-Based State Estimation for Nonlinear Systems With Denial-of-Service Attack Under Try-Once-Discard Protocol
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第10期11卷 2182-2184页
作者: Xueli Wang Shangwei Zhao Ming Yang Xin Wang Xiaoming Wu the Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science CenterQilu University of Technology(Shandong Academy of Sciences)Jinan 250014 Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer ScienceJinan 250014China Department of Automation Shanghai Jiao Tong UniversityShanghai 200240China
Dear Editor,This letter deals with state estimation issues of discrete-time nonlinear systems subject to denial-of-service(DoS)attacks under the try-once-discard(TOD)*** specifically,to reduce the communication burden... 详细信息
来源: 评论
JFuzzer: Detecting Optimization Errors in JavaScript Just-In-Time Compilers  24
JFuzzer: Detecting Optimization Errors in JavaScript Just-In...
收藏 引用
24th IEEE International Conference on Software Quality, Reliability and Security Companion, QRS-C 2024
作者: Zhang, Chi Chen, Jinfu Cai, Saihua Chen, Jingyi Huang, Chunlei School of Computer Science and Communication Engineering Jiangsu University Zhenjiang China Jiangsu Key Laboratory of Security Technology for Industrial Cyberspace Jiangsu University Zhenjiang China
As a crucial component of the internet, JavaScript plays an essential role in various web applications. However, to meet the demands of high-speed user experiences and an increasing array of functionalities, computati... 详细信息
来源: 评论
Efficient and fine-grained access control with fully-hidden policies for cloud-enabled IoT
收藏 引用
Digital Communications and networks 2025年 第2期11卷 473-481页
作者: Qi Li Gaozhan Liu Qianqian Zhang Lidong Han Wei Chen Rui Li Jinbo Xiong School of Computer Science Nanjing University of Posts and TelecommunicationsNanjing 210023China Key Laboratory of Cryptography of Zhejiang Province Hangzhou Normal UniversityHangzhou 311121China Tongda College of Nanjing University of Posts and Telecommunications Yangzhou 225127China Henan Key Laboratory of Network Cryptography Technology Zhengzhou 450001China School of Computer Science and Technology Xidian UniversityXi'an 710071China State Key Laboratory of Tibetan Intelligent Information Processing and Application Qinghai Normal UniversityXining 810008China Faculty of Software Fujian Normal UniversityFuzhou 350108China
Ciphertext-Policy Attribute-Based Encryption(CP-ABE)enables fine-grained access control on ciphertexts,making it a promising approach for managing data stored in the cloud-enabled Internet of *** existing schemes ofte... 详细信息
来源: 评论
A bitcoin service community classification method based on Random Forest and improved KNN algorithm
IET Blockchain
收藏 引用
IET Blockchain 2024年 第3期4卷 276-286页
作者: Gao, Muyun Lin, Shenwen Tian, Xin He, Xi He, Ketai Chen, Shifeng School of Mechanical Engineering University of Science and Technology Beijing Beijing China Internet Financial Security Technology Key Laboratory National Computer Network Emergency Response Technical Team/Coordination Center of China Beijing China
There are service communities with different functions in the Bitcoin transactions system. Identifying community categories helps to further understand the Bitcoin transactions system and facilitates targeted regulati... 详细信息
来源: 评论
Specification and counterexample generation for cyber-physical systems
收藏 引用
Soft Computing 2024年 第17-18期28卷 9137-9155页
作者: Li, Zhen Cao, Zining Wang, Fujun Xing, Chao College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Jiangsu Nanjing211106 China Science and Technology on Electro-optic Control Laboratory Henan Luoyang471000 China Collaborative Innovation Center of Novel Software Technology and Industrializaton Nanjing University of Aeronautics and Astronautics Jiangsu Nanjing210023 China Key Laboratory of Safety-Critical Software Ministry of Industry and Information Technology Jiangsu Nanjing211106 China
Cyber-Physical Systems (CPS) are complex systems that integrate information control devices with physical resources, which can be automatically and formalized verified by model checking according to the expected requi... 详细信息
来源: 评论
DBT-PDP:Provable data possession with outsourced data batch transfer based on blockchain
收藏 引用
High-Confidence Computing 2024年 第2期4卷 62-72页
作者: Chengming Yi Hua Zhang Weiming Sun Jun Ding State key Laboratory of Networking and Switching Technology Beijing University of Posts and TelecommunicationsBeijing 100876China Zhe Jiang Computer Network Emergency Response Technical Team Hangzhou 310052China
In the scenario of large-scale data ownership transactions,existing data integrity auditing schemes are faced with security risks from malicious third-party auditors and are inefficient in both calculation and communi... 详细信息
来源: 评论
FRACTAL: Data-aware Clustering and Communication Optimization for Decentralized Federated Learning
收藏 引用
IEEE Transactions on Big Data 2024年 1-16页
作者: Ma, Qianpiao Liu, Jianchun Xu, Hongli Jia, Qingmin Xie, Renchao Purple Mountain Laboratories Nanjing Jiangsu China School of Computer Science and Technology University of Science and Technology of China Hefei Anhui China State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China
Decentralized federated learning (DFL) is a promising technique to enable distributed machine learning over edge nodes without relying on a centralized parameter server. However, existing DFL network topologies, such ... 详细信息
来源: 评论
The Demonstration of Traffic Prediction based on SDN Controller for High-quality Private Line in OTN
The Demonstration of Traffic Prediction based on SDN Control...
收藏 引用
2024 Asia Communications and Photonics Conference, ACP 2024 and International Conference on Information Photonics and Optical Communications, IPOC 2024
作者: Qin, Xin Su, Guangnan Gao, Xia Liu, Jie Hu, Qian Lv, Hongwei Xie, Jiuyu Li, Junjie State Key Laboratory of Optical Fiber and Cable Manufacture Technology China Telecom Research Institute Beijing China Network Operations Center China Telecom Jiangsu Branch Jiangsu China Network Operations Department China Telecom Jiangsu Branch Jiangsu China
We propose a customized traffic prediction method based on software defined network controller. The field trial in optical transport network demonstrates that our proposed method can realize the intelligent and dynami... 详细信息
来源: 评论
SoK: Post-Quantum key Encapsulation Mechanisms—Security Definitions, Constructions, and Applications  9th
SoK: Post-Quantum Key Encapsulation Mechanisms—Security Def...
收藏 引用
9th International Conference on Security Standardisation Research, SSR 2024
作者: Zhou, Biming Liu, Yiting Jiang, Haodong Zhao, Yunlei College of Computer Science and Technology Fudan University Shanghai200433 China Henan Key Laboratory of Network Cryptography Technology Henan Zhengzhou450001 China
The key Encapsulation Mechanism (KEM) is one of the most important foundational cryptographic primitives. It can be used to construct Public key Encryption (PKE), key Exchange, and Authenticated key Exchange. With the... 详细信息
来源: 评论
Inductive Link Prediction in N-ary Knowledge Graphs  31
Inductive Link Prediction in N-ary Knowledge Graphs
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Wei, Jiyao Guan, Saiping Jin, Xiaolong Guo, Jiafeng Cheng, Xueqi School of Computer Science and Technology University of Chinese Academy of Sciences Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China
N-ary Knowledge Graphs (NKGs), where a fact can involve more than two entities, have gained increasing attention. Link Prediction in NKGs (LPN) aims to predict missing elements in facts to facilitate the completion of... 详细信息
来源: 评论