咨询与建议

限定检索结果

文献类型

  • 317 篇 期刊文献
  • 264 篇 会议

馆藏范围

  • 581 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 395 篇 工学
    • 269 篇 计算机科学与技术...
    • 225 篇 软件工程
    • 117 篇 信息与通信工程
    • 88 篇 电气工程
    • 47 篇 电子科学与技术(可...
    • 43 篇 生物工程
    • 39 篇 控制科学与工程
    • 25 篇 仪器科学与技术
    • 22 篇 生物医学工程(可授...
    • 21 篇 机械工程
    • 20 篇 网络空间安全
    • 18 篇 光学工程
    • 17 篇 动力工程及工程热...
    • 13 篇 安全科学与工程
    • 12 篇 交通运输工程
    • 12 篇 航空宇航科学与技...
  • 184 篇 理学
    • 97 篇 数学
    • 52 篇 生物学
    • 34 篇 物理学
    • 34 篇 统计学(可授理学、...
    • 15 篇 系统科学
    • 11 篇 化学
  • 99 篇 管理学
    • 54 篇 管理科学与工程(可...
    • 46 篇 图书情报与档案管...
    • 25 篇 工商管理
  • 29 篇 医学
    • 23 篇 临床医学
    • 18 篇 基础医学(可授医学...
    • 14 篇 公共卫生与预防医...
  • 17 篇 法学
    • 13 篇 社会学
  • 12 篇 经济学
    • 12 篇 应用经济学
  • 9 篇 农学
  • 4 篇 军事学
  • 2 篇 教育学
  • 1 篇 艺术学

主题

  • 31 篇 semantics
  • 20 篇 feature extracti...
  • 18 篇 accuracy
  • 17 篇 federated learni...
  • 16 篇 deep learning
  • 15 篇 image segmentati...
  • 15 篇 training
  • 11 篇 internet of thin...
  • 11 篇 neural networks
  • 11 篇 computational mo...
  • 10 篇 data mining
  • 10 篇 network security
  • 10 篇 data models
  • 9 篇 visualization
  • 9 篇 correlation
  • 8 篇 optimization
  • 8 篇 noise
  • 8 篇 predictive model...
  • 7 篇 data privacy
  • 7 篇 simulation

机构

  • 54 篇 shandong provinc...
  • 46 篇 shandong enginee...
  • 46 篇 key laboratory o...
  • 23 篇 network and data...
  • 12 篇 shandong enginee...
  • 12 篇 shandong fundame...
  • 12 篇 shenzhen researc...
  • 11 篇 school of comput...
  • 10 篇 school of comput...
  • 10 篇 school of comput...
  • 10 篇 key laboratory o...
  • 10 篇 school of inform...
  • 10 篇 shaanxi key labo...
  • 9 篇 cas key laborato...
  • 8 篇 computer network...
  • 8 篇 network and data...
  • 7 篇 network and data...
  • 7 篇 beijing key labo...
  • 7 篇 school of comput...
  • 7 篇 school of comput...

作者

  • 15 篇 qin zhen
  • 14 篇 liu jun
  • 11 篇 jing zhao
  • 11 篇 qin zhiguang
  • 10 篇 liu bin
  • 9 篇 niyato dusit
  • 9 篇 ding yi
  • 9 篇 zhenyu yang
  • 8 篇 yang yang
  • 8 篇 chen yanping
  • 8 篇 yang shenghao
  • 8 篇 wang zhongmin
  • 8 篇 zhang hongbin
  • 7 篇 yi ding
  • 7 篇 zhen qin
  • 7 篇 cao mingsheng
  • 7 篇 zhao dongmei
  • 6 篇 hu liang
  • 6 篇 luo minnan
  • 6 篇 qin lu

语言

  • 535 篇 英文
  • 39 篇 其他
  • 8 篇 中文
检索条件"机构=Data Engineering and Network Technology Laboratory"
581 条 记 录,以下是121-130 订阅
排序:
Differentially Private and Heterogeneity-Robust Federated Learning With Theoretical Guarantee
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第12期5卷 6369-6384页
作者: Wang, Xiuhua Wang, Shuai Li, Yiwei Fan, Fengrui Li, Shikang Lin, Xiaodong Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China University of Electronic Science and Technology of China National Key Laboratory of Wireless Communications Chengdu611731 China Xiamen University of Technology Fujian Key Laboratory of Communication Network and Information Processing Xiamen361024 China University of Guelph School of Computer Science GuelphONN1G 2W1 Canada
Federated learning (FL) is a popular distributed paradigm where enormous clients collaboratively train a machine learning (ML) model under the orchestration of a central server without knowing the clients' private... 详细信息
来源: 评论
Unveiling the corrosion evolution and pitting mechanism of X70 pipeline steel in typical near-neutral/bentonite soil environment
收藏 引用
Journal of Materials Science & technology 2025年
作者: Guangming Yang Lulu Zeng Hua Shen Huaiyun Cui Tianqi Chen Zengyao Chen Chengwei Xu Chao Liu Feng Huang Zhiyong Liu Zhichao Che Cuiwei Du Xiaogang Li Key Laboratory for Corrosion and Protection (MOE) Institute of Advanced Materials and Technology University of Science and Technology Beijing Beijing 100083 China National Materials Corrosion and Protection Scientific Data Center University of Science and Technology Beijing Beijing 100083 China Jilin Oilfield Company China National Petroleum Corporation Songyuan 138000 China Corrosion and control Research Center Branch of Science and Technology Research Institute of National Oil and Gas Pipeline Network Group Co Tianjin 300457 China The State Key Laboratory of Refractories and Metallurgy Wuhan University of Science and Technology Wuhan 430081 China School of Metallurgical and Ecological Engineering University of Science and Technology Beijing Beijing 100083 China
This work investigated the effect of dissolved oxygen (DO) on the corrosion behavior and pitting mechanism of X70 pipeline steel in near-neutral soil-bentonite simulated environment. The localized corrosion evolution ...
来源: 评论
Microbiologically Influenced Corrosion Behavior of Fe_(40)(CoCrMnNi)_(60) and Fe_(60)(CoCrMnNi)_(40) Medium Entropy Alloys in the Presence of Pseudomonas Aeruginosa
收藏 引用
Acta Metallurgica Sinica(English Letters) 2023年 第3期36卷 379-390页
作者: Weiwei Chang Yangyang Li Huaibei Zheng Hongchang Qian Dawei Guo Shuyuan Zhang Yuntian Lou Chi Tat Kwok Lap Mou Tam Dawei Zhang National Materials Corrosion and Protection Data Center Institute for Advanced Materials and TechnologyUniversity of Science and Technology BeijingBeijing 100083China BRI Southeast Asia Network for Corrosion and Protection(MOE) Shunde Graduate School of University of Science and Technology BeijingFoshan 528399China State Key Laboratory of Metal Material for Marine Equipment and Application Anshan 114002China Department of Electromechanical Engineering University of MacaoMacao 999078China Institute for the Development and Quality Macao 999078China
In this work,the microbiologically influenced corrosion(MIC)of Fe_(40)(CoCrMnNi)_(60) and Fe_(60)(CoCrMnNi)_(40) medium entropy alloys(MEAs)induced by Pseudomonas aeruginosa(***)was *** behaviors during 14 days of imm... 详细信息
来源: 评论
Efficient and random oracle-free conditionally anonymous ring signature
Efficient and random oracle-free conditionally anonymous rin...
收藏 引用
6th International Conference on Provable Security, ProvSec 2012
作者: Zeng, Shengke Qin, Zhiguang Lu, Qing Li, Qinyi School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 611731 China Network and Data Security Key Laboratory of Sichuan Province China Shanghai Key Laboratory of Integrate Administration Technologies for Information Security China
Compared to conventional ring signature schemes, conditionally anonymous ring signatures allow to revoke the anonymity of actual signer without the group manager's help if necessary. When the actual signer intends... 详细信息
来源: 评论
A feature extraction with pose-auxiliary method for Person Reidentification  2
A feature extraction with pose-auxiliary method for Person R...
收藏 引用
2nd International Conference on Advanced Algorithms and Signal Image Processing, AASIP 2022
作者: Ma, ZePing Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Sichuan Chengdu610054 China School of Information and Software Engineering University of Electronic Science and Technology of China Sichuan Chengdu610054 China
Person re-identification is widely considered as a sub problem of image retrieval. It is a technology that uses computer vision technology to determine whether there is a specific pedestrian in an image or video, give... 详细信息
来源: 评论
Recent advances in ethanol gas sensors based on metal oxide semiconductor heterojunctions
收藏 引用
Rare Metals 2022年 第6期41卷 1818-1842页
作者: Ling-Yun Gai Run-Ping Lai Xian-Hui Dong Xing Wu Qiao-Tong Luan Jue Wang Hao-Feng Lin Wen-Hao Ding Guang-Lei Wu Wan-Feng Xie Big Data and Network Management Center Qingdao Agricultural UniversityQingdao 266109China School of Mechanical Electronic and Information Engineering China University of Mining and Technology-BeijingBeijing 10083China School of Material Science and Engineering State Key Laboratory of Bio-Fibers and Eco-TextilesQingdao UniversityQingdao 266071China School of Electronics and Information State Key Laboratory of Bio-Fibers and Eco-TextilesQingdao UniversityQingdao 266071China Shanghai Key Laboratory of Multidimensional Information Processing School of Communication and Electronic EngineeringEast China Normal UniversityShanghai 200241China
Metal oxide semiconductor heterojunctions(MOSHs)can enhance the performance of ethanol gas sen-sors *** gas sensors based on MOSHs are cost-effective and have excellent sensing response,good selectivity,fast response ... 详细信息
来源: 评论
Recent advances on environmental corrosion behavior and mechanism of high-entropy alloys
收藏 引用
Journal of Materials Science & technology 2021年 第21期80卷 217-233页
作者: Yu Fu Jun Li Hong Luo Cuiwei Du Xiaogang Li Institute for Advanced Materials and Technology University of Science and Technology BeijingBeijingJ 00083China Key Laboratory for Corrosion and Protection of The Ministry of Education(MOE) Beijing100083China Beijing Advanced Innovation Center for Materials Genome Engineering University of Science and Technology BeijingBeijing100083China National Materials Corrosion and Protection Scientific Data Center Institute for Advanced Materials and TechnologyUniversity of Science and Technology BeijingBeijing100083China BRI Southeast Asia Network for Corrosion and Protection(MOE) Shunde Graduate School of University of Science and Technology BeijingFoshan528000China
In the past decade, the sudden rise of high-entropy alloys(HEAs) has become a research hotspot in the domain of metal materials. HEAs break through the design concept of traditional single-principal element alloys, an... 详细信息
来源: 评论
Secure real-time image protection scheme with near-duplicate detection in cloud computing
Secure real-time image protection scheme with near-duplicate...
收藏 引用
作者: Liu, Dengzhi Shen, Jian Wang, Anxi Wang, Chen Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing210044 China State Key Laboratory of Cryptology Beijing100878 China Guizhou Provincial Key Laboratory of Public Big Data Guiyang550025 China
With advancements in technologies of the Internet and multi-media, various images need to be generated and transmitted anytime. Restricted by local constrained storage space, users can store their images with the assi... 详细信息
来源: 评论
Memory-efficient GPU-based exact and parallel triangle counting in large graphs  21
Memory-efficient GPU-based exact and parallel triangle count...
收藏 引用
21st IEEE International Conference on High Performance Computing and Communications, 17th IEEE International Conference on Smart City and 5th IEEE International Conference on data Science and Systems, HPCC/SmartCity/DSS 2019
作者: Ouyang, Zhiyou Wu, Shanni Zhao, Tongtong Yue, Dong Zhang, Tengfei Institute of Advanced Technology School of Automation Nanjing University of Posts and Telecommunications Nanjing210003 China School of Computer Nanjing University of Posts and Telecommunications Nanjing China Institute of Advanced Technology School of Automation Jiangsu Engineering Laboratory of Big Data Analysis and Control for Active Distribution Network Nanjing University of Posts and Telecommunications Nanjing China School of Automation Jiangsu Engineering Laboratory of Big Data Analysis and Control for Active Distribution Network Nanjing University of Posts and Telecommunications Nanjing China
Triangle counting is one of the basic research topics in many practical problems, such as clustering coefficients, transitivity ratio and traffic network complexity, etc., all of which can be converted into triangle c... 详细信息
来源: 评论
Probabilistic Reliability via Subsystem Structures of Arrangement Graph networks
收藏 引用
IEEE Transactions on Reliability 2024年 第1期73卷 279-289页
作者: Huang, Yanze Lin, Limei Xu, Li Hsieh, Sun-Yuan Fujian University of Technology Fujian Provincial Key Laboratory of Big Data Mining and Applications School of Computer Science and Mathematics Fuzhou350118 China Fujian Normal University College of Computer and Cyber Security Key Laboratory of Network Security and Cryptology Fuzhou350117 China National Cheng Kung University Department of Computer Science and Information Engineering Tainan701 Taiwan
With the rapid growth of the number of processors in a multiprocessor system, faulty processors occur in it with a probability that rises quickly. The probability of a subsystem with an appropriate size being fault-fr... 详细信息
来源: 评论