咨询与建议

限定检索结果

文献类型

  • 317 篇 期刊文献
  • 264 篇 会议

馆藏范围

  • 581 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 395 篇 工学
    • 269 篇 计算机科学与技术...
    • 225 篇 软件工程
    • 117 篇 信息与通信工程
    • 88 篇 电气工程
    • 47 篇 电子科学与技术(可...
    • 43 篇 生物工程
    • 39 篇 控制科学与工程
    • 25 篇 仪器科学与技术
    • 22 篇 生物医学工程(可授...
    • 21 篇 机械工程
    • 20 篇 网络空间安全
    • 18 篇 光学工程
    • 17 篇 动力工程及工程热...
    • 13 篇 安全科学与工程
    • 12 篇 交通运输工程
    • 12 篇 航空宇航科学与技...
  • 184 篇 理学
    • 97 篇 数学
    • 52 篇 生物学
    • 34 篇 物理学
    • 34 篇 统计学(可授理学、...
    • 15 篇 系统科学
    • 11 篇 化学
  • 99 篇 管理学
    • 54 篇 管理科学与工程(可...
    • 46 篇 图书情报与档案管...
    • 25 篇 工商管理
  • 29 篇 医学
    • 23 篇 临床医学
    • 18 篇 基础医学(可授医学...
    • 14 篇 公共卫生与预防医...
  • 17 篇 法学
    • 13 篇 社会学
  • 12 篇 经济学
    • 12 篇 应用经济学
  • 9 篇 农学
  • 4 篇 军事学
  • 2 篇 教育学
  • 1 篇 艺术学

主题

  • 31 篇 semantics
  • 20 篇 feature extracti...
  • 18 篇 accuracy
  • 17 篇 federated learni...
  • 16 篇 deep learning
  • 15 篇 image segmentati...
  • 15 篇 training
  • 11 篇 internet of thin...
  • 11 篇 neural networks
  • 11 篇 computational mo...
  • 10 篇 data mining
  • 10 篇 network security
  • 10 篇 data models
  • 9 篇 visualization
  • 9 篇 correlation
  • 8 篇 optimization
  • 8 篇 noise
  • 8 篇 predictive model...
  • 7 篇 data privacy
  • 7 篇 simulation

机构

  • 54 篇 shandong provinc...
  • 46 篇 shandong enginee...
  • 46 篇 key laboratory o...
  • 23 篇 network and data...
  • 12 篇 shandong enginee...
  • 12 篇 shandong fundame...
  • 12 篇 shenzhen researc...
  • 11 篇 school of comput...
  • 10 篇 school of comput...
  • 10 篇 school of comput...
  • 10 篇 key laboratory o...
  • 10 篇 school of inform...
  • 10 篇 shaanxi key labo...
  • 9 篇 cas key laborato...
  • 8 篇 computer network...
  • 8 篇 network and data...
  • 7 篇 network and data...
  • 7 篇 beijing key labo...
  • 7 篇 school of comput...
  • 7 篇 school of comput...

作者

  • 15 篇 qin zhen
  • 14 篇 liu jun
  • 11 篇 jing zhao
  • 11 篇 qin zhiguang
  • 10 篇 liu bin
  • 9 篇 niyato dusit
  • 9 篇 ding yi
  • 9 篇 zhenyu yang
  • 8 篇 yang yang
  • 8 篇 chen yanping
  • 8 篇 yang shenghao
  • 8 篇 wang zhongmin
  • 8 篇 zhang hongbin
  • 7 篇 yi ding
  • 7 篇 zhen qin
  • 7 篇 cao mingsheng
  • 7 篇 zhao dongmei
  • 6 篇 hu liang
  • 6 篇 luo minnan
  • 6 篇 qin lu

语言

  • 535 篇 英文
  • 39 篇 其他
  • 8 篇 中文
检索条件"机构=Data Engineering and Network Technology Laboratory"
581 条 记 录,以下是131-140 订阅
排序:
Research on active defense decision-making method for cloud boundary networks based on reinforcement learning of intelligent agent
收藏 引用
High-Confidence Computing 2024年 第2期4卷 50-61页
作者: Huan Wang Yunlong Tang Yan Wang Ning Wei Junyi Deng Zhiyan Bin Weilong Li School of Computer Science and Technology Guangxi University of Science and TechnologyLiuzhou 545000China Liuzhou Key Laboratory of Big Data Intelligent Processing and Security Liuzhou 545000China Guangxi Education System Network Security Monitoring Center Liuzhou 545000China Center of Graphics and Information Guangxi ECO-Engineering Vocational&Technical CollegeLiuzhou 545004China
The cloud boundary network environment is characterized by a passive defense strategy,discrete defense actions,and delayed defense feedback in the face of network attacks,ignoring the influence of the external environ... 详细信息
来源: 评论
network Security Situation Assessment Method Based on Absorbing Markov Chain
Network Security Situation Assessment Method Based on Absorb...
收藏 引用
2022 International Conference on networking and network Applications, NaNA 2022
作者: Gao, Hongbin Wang, Shangxing Zhang, Hongbin Liu, Bin Zhao, Dongmei Liu, Zhen Hebei University of Science and Technology School of Information Science and Engineering Shijiazhuang China Hebei University of Science and Technology School of Information Science and Engineering Hebei Key Laboratory of Network and Information Security Shijiazhuang China Hebei University of Science and Technology School of Economics and Management Research Center of Big Data and Social Computing Shijiazhuang China Hebei Normal University Hebei Key Laboratory of Network and Information Security Shijiazhuang China
This paper has a new network security evaluation method as an absorbing Markov chain-based assessment method. This method is different from other network security situation assessment methods based on graph theory. It... 详细信息
来源: 评论
Underwater Information Sensing Method Based on Improved Dual-Coupled Duffing Oscillator Under Lévy Noise Description  17th
Underwater Information Sensing Method Based on Improved Dual...
收藏 引用
17th EAI International Conference on Collaborative Computing: networking, Applications, and Worksharing, CollaborateCom 2021
作者: Zhang, Hanwen Qin, Zhen Chen, Dajiang School of Automation Engineering University of Electronic Science and Technology of China Sichuan Chengdu China Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Sichuan Chengdu China School of Information and Software Engineering University of Electronic Science and Technology of China Sichuan Chengdu China
Sensing underwater information has become particularly important to obtain information about the marine environment and target characteristics. At present, most interference models for underwater information sensing t... 详细信息
来源: 评论
Information and Sensing Beamforming Optimization for Multi-User Multi-Target MIMO ISAC Systems  48
Information and Sensing Beamforming Optimization for Multi-U...
收藏 引用
48th IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2023
作者: Zhu, Minghe Li, Lei Xia, Shuqiang Chang, Tsung-Hui The Chinese University of Hong Kong School of Science & Engineering Shenzhen China Shenzhen Research Institute of Big Data China ZTE Corporation China State Key Laboratory of Mobile Network and Mobile Multimedia Technology China
In this paper, we consider the joint beamforming design for simultaneous sensing and communication in a wireless multi-user system. Different from the existing works that mostly are for single target, we consider sens... 详细信息
来源: 评论
Gray-scale transformation for traffic classification: leveraging local and global features in flow data  3
Gray-scale transformation for traffic classification: levera...
收藏 引用
3rd International Conference on Electronic Information engineering, Big data, and Computer technology, EIBDCT 2024
作者: Xia, Yuchao Xue, Mutian Li, Wei Network and Data Security Key Laboratory of Sichuan Province School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China University of Electronic Science and Technology of China Chengdu China Sichuan University of Media and Communications Chengdu China
The rapid expansion and diversification of internet traffic pose a pressing demand for accurate classification of diverse application streams in network management and security monitoring. This paper introduces a deep... 详细信息
来源: 评论
An efficient and provably-secure coercion-resistant e-voting protocol
An efficient and provably-secure coercion-resistant e-voting...
收藏 引用
Annual Conference on Privacy, Security and Trust, PST
作者: Alireza Toroghi Haghighat Mohammad Sadeq Dousti Rasool Jalili Data and Network Security Laboratory Department of Computer Engineering Sharif University of Technology Tehran Iran
We present an efficient and provably-secure e-voting protocol, which is a variant of the JCJ e-voting protocol (Juels et al., 2010). It decreases the total number of JCJ's operations from O(n 2 ) to O(n), where n ... 详细信息
来源: 评论
Self-feedback LSTM regression model for real-time particle source apportionment
收藏 引用
Journal of Environmental Sciences 2022年 第4期34卷 10-20页
作者: Wei Wang Weiman Xu Shuai Deng Yimeng Chai Ruoyu Ma Guoliang Shi Bo Xu Mei Li Yue Li Trusted AI System Laboratory College of Computer ScienceNankai UniversityTianjin 300350China KLMDASR Tianjin Key Laboratory of Network and Data Security TechnologyTianjin 300350China State Environmental Protection Key Laboratory of Urban Ambient Air Particulate Matter Pollution Prevention and Control College of Environmental Science and EngineeringNankai UniversityTianjin 300071China Institute of Mass Spectrometry and Atmospheric Environment Guangdong Provincial Engineering Research Center for on-line source apportionment system of air pollution Jinan UniversityGuangzhou 510632China Guangdong-Hongkong-Macao Joint Laboratory of Collaborative Innovation for Environmental Quality Guangzhou 510632China
Atmospheric particulate matter pollution has attracted much wider attention *** recent years,the development of atmospheric particle collection techniques has put forwards new demands on the real-time source apportion... 详细信息
来源: 评论
Research on Zenith Tropospheric Delay Model Based on TCN Improving HGPT2 Model  14th
Research on Zenith Tropospheric Delay Model Based on TCN Imp...
收藏 引用
14th China Satellite Navigation Conference, CSNC 2024
作者: Li, Dengao Shi, Danyang Zhao, Jumin Wu, Fanming Yan, Liangquan Feng, Ran Zhang, Xinfang Zhao, Jinhua College of Data Science Taiyuan University of Technology Taiyuan030024 China College of Information and Computer Taiyuan University of Technology Taiyuan030024 China Key Laboratory of Big Data Fusion Analysis and Application of Shanxi Province Taiyuan030024 China Intelligent Perception Engineering Technology Center of Shanxi Taiyuan030024 China Shanxi Province Engineering Technology Research Center of Spatial Information Network Taiyuan030024 China
The zenith tropospheric delay (ZTD) obtained by global navigation satellite system (GNSS) atmospheric sounding is a pivotal data source for water vapor monitoring. Meteorological changes in Antarctica play an importan... 详细信息
来源: 评论
Prediction of Ionospheric TEC Based on BLS-LSTM-GRU Hybrid Model  14th
Prediction of Ionospheric TEC Based on BLS-LSTM-GRU Hybrid M...
收藏 引用
14th China Satellite Navigation Conference, CSNC 2024
作者: Li, Dengao Zhang, Xinfang Zhao, Jumin Wu, Fanming Feng, Ran Zhao, Jinhua Shi, Danyang College of Data Science Taiyuan University of Technology Taiyuan030024 China College of Information and Computer Taiyuan University of Technology Taiyuan030024 China Key Laboratory of Big Data Fusion Analysis and Application of Shanxi Province Taiyuan030024 China Intelligent Perception Engineering Technology Center of Shanxi Taiyuan030024 China Shanxi Province Engineering Technology Research Center of Spatial Information Network Taiyuan030024 China
In satellite communications, global navigation satellite systems(GNSS) and other important space activities, the value of total electron content (TEC) in the ionosphere directly affects the size of ionospheric delay. ... 详细信息
来源: 评论
Multi-View Graph Embedding Learning for Image Co-Segmentation and Co-Localization
收藏 引用
IEEE Transactions on Circuits and Systems for Video technology 2024年 第6期34卷 4942-4956页
作者: Huang, Aiping Li, Lijian Zhang, Le Niu, Yuzhen Zhao, Tiesong Lin, Chia-Wen Fuzhou University Fujian Key Laboratory for Intelligent Processing and Wireless Transmission of Media Information College of Physics and Information Engineering Fuzhou350108 China Fuzhou University Fujian Key Laboratory of Network Computing and Intelligent Information Processing College of Computer and Data Science Fuzhou350108 China University of Electronic Science and Technology of China School of Information and Communication Engineering Chengdu611731 China Fuzhou University Fujian Key Laboratory for Intelligent Processing and Wireless Transmission of Media Information College of Physics and Information Engineering The Fujian Science and Technology Innovation Laboratory for Optoelectronic Information Fuzhou350108 China Institute of Communications Engineering National Tsing Hua University Department of Electrical Engineering Hsinchu30013 Taiwan
Image co-segmentation and co-localization exploit inter-image information to identify and extract foreground objects with a batch mode. However, they remain challenging when confronted with large object variations or ... 详细信息
来源: 评论