咨询与建议

限定检索结果

文献类型

  • 312 篇 期刊文献
  • 265 篇 会议

馆藏范围

  • 577 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 384 篇 工学
    • 261 篇 计算机科学与技术...
    • 222 篇 软件工程
    • 112 篇 信息与通信工程
    • 81 篇 电气工程
    • 47 篇 电子科学与技术(可...
    • 43 篇 生物工程
    • 38 篇 控制科学与工程
    • 25 篇 仪器科学与技术
    • 22 篇 生物医学工程(可授...
    • 21 篇 机械工程
    • 18 篇 光学工程
    • 18 篇 网络空间安全
    • 17 篇 动力工程及工程热...
    • 12 篇 航空宇航科学与技...
    • 11 篇 化学工程与技术
    • 11 篇 安全科学与工程
  • 179 篇 理学
    • 92 篇 数学
    • 52 篇 生物学
    • 34 篇 物理学
    • 31 篇 统计学(可授理学、...
    • 15 篇 系统科学
    • 11 篇 化学
  • 97 篇 管理学
    • 52 篇 管理科学与工程(可...
    • 45 篇 图书情报与档案管...
    • 24 篇 工商管理
  • 27 篇 医学
    • 21 篇 临床医学
    • 17 篇 基础医学(可授医学...
    • 13 篇 公共卫生与预防医...
  • 17 篇 法学
    • 13 篇 社会学
  • 12 篇 经济学
    • 12 篇 应用经济学
  • 9 篇 农学
  • 4 篇 军事学
  • 2 篇 教育学
  • 1 篇 艺术学

主题

  • 31 篇 semantics
  • 20 篇 feature extracti...
  • 18 篇 federated learni...
  • 18 篇 accuracy
  • 16 篇 deep learning
  • 15 篇 image segmentati...
  • 15 篇 training
  • 11 篇 internet of thin...
  • 11 篇 neural networks
  • 11 篇 computational mo...
  • 10 篇 data mining
  • 10 篇 network security
  • 10 篇 data models
  • 9 篇 visualization
  • 9 篇 correlation
  • 8 篇 optimization
  • 8 篇 noise
  • 8 篇 predictive model...
  • 7 篇 simulation
  • 7 篇 vectors

机构

  • 54 篇 shandong provinc...
  • 46 篇 shandong enginee...
  • 46 篇 key laboratory o...
  • 22 篇 network and data...
  • 13 篇 school of comput...
  • 12 篇 shandong enginee...
  • 12 篇 shaanxi key labo...
  • 12 篇 shandong fundame...
  • 12 篇 shenzhen researc...
  • 10 篇 school of comput...
  • 10 篇 key laboratory o...
  • 9 篇 school of inform...
  • 9 篇 cas key laborato...
  • 8 篇 computer network...
  • 8 篇 network and data...
  • 8 篇 school of comput...
  • 8 篇 school of comput...
  • 7 篇 network and data...
  • 7 篇 school of comput...
  • 6 篇 intelligent perc...

作者

  • 15 篇 qin zhen
  • 14 篇 liu jun
  • 11 篇 jing zhao
  • 11 篇 qin zhiguang
  • 10 篇 liu bin
  • 9 篇 zhenyu yang
  • 8 篇 yang yang
  • 8 篇 ding yi
  • 8 篇 chen yanping
  • 8 篇 yang shenghao
  • 8 篇 wang zhongmin
  • 8 篇 zhang hongbin
  • 7 篇 niyato dusit
  • 7 篇 yi ding
  • 7 篇 zhen qin
  • 7 篇 zhao dongmei
  • 6 篇 hu liang
  • 6 篇 cao mingsheng
  • 6 篇 qin lu
  • 6 篇 ding ming

语言

  • 531 篇 英文
  • 39 篇 其他
  • 8 篇 中文
检索条件"机构=Data Engineering and Network Technology Laboratory"
577 条 记 录,以下是161-170 订阅
排序:
Bidirectionally Guided Large Language Models for Consumer-Centric Personalized Recommendation
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Yu, Linfang Xiao, Peng Xu, Liqun Kumari, Saru Alenazi, Mohammed J.F. Industrial Research Institute Chengdu610213 China University of Electronic Science and Technology of China Network and Data Security Key Laboratory of Sichuan Province Chengdu610054 China Chengdu University of Technology School of Computer and Network Security Chengdu China Industrial Research Institute Chengdu610213 China Chaudhary Charan Singh University Department of Mathematics Uttar Pradesh Meerut250004 India Department of Computer Engineering Riyadh11451 Saudi Arabia
With the increasing abundance of consumer electronics, consumers are facing the challenge of information overload, making personalized recommendation systems (RSs) crucial for enhancing consumer experience and promoti... 详细信息
来源: 评论
Out-of-Distribution Detection by Principal Component Correspondence
Out-of-Distribution Detection by Principal Component Corresp...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Xiaoyuan Guan Zhiyong Gan Ling Deng Wei Shi Jiankang Chen Shenshen Bu Chunliang Zhao Jianfang Hu Yuren Zhou Wei-Shi Zheng Ruixuan Wang School of Computer Science and Engineering Sun Yat-Sen University Guangzhou China Key Laboratory of Machine Intelligence and Advanced Computing MOE Guangzhou China Network Business Group China Unicom Guangzhou China Department of Network Intelligence Pengcheng Laboratory Shenzhen China School of Data and Science Qingdao University of Science and Technology Qingdao China School of Software Engineering Sun Yat-Sen University Zhuhai China
Out-of-distribution (OOD) detection is vital for the safe application of intelligent systems in real-world scenarios. This paper proposes an enhancement to OOD detection by leveraging the consistency in cognition betw... 详细信息
来源: 评论
Effects of Optimized Operating Parameters on Combustion Characteristics and NO_(x)Emissions of a Burner based on Orthogonal Analysis
收藏 引用
Journal of Thermal Science 2021年 第4期30卷 1212-1223页
作者: XU Qian AKKURT Nevzat YANG Gang ZHU Lidong SHI Kejian WANG Kang ZOU Zhenwei LIU Zhihui WANG Jiulong DU Zhiwei School of Energy and Environmental Engineering University of Science and Technology BeijingBeijing 100083China Beijing Key Laboratory for Energy Conservation and Emission Reduction for Metallurgical Industry Beijing 100083China Department of Mechanical Engineering Munzur UniversityTunceli 62000Turkey Department of Big Data Technology and Application Development Computer Network Information CenterChinese Academy of SciencesBeijing 100190China AVIC Xinxiang Aviation Industry(group)CO. LTDHenan 453002China
To optimize the structure of the burner,improve the combustion performance,and reduce the emission of NO_(x),a self-circulating low NO_(x)combustion technology was used to design a new type of flue gas self-circulatin... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
arXiv
收藏 引用
arXiv 2024年
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado SpringsCO United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab China JinYinHu Laboratory Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
International Conference on Software engineering (ICSE)
作者: Zhen Li Ning Wang Deqing Zou Yating Li Ruqian Zhang Shouhuai Xu Chao Zhang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jin YinHu Laboratory Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado Springs Colorado USA Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
Efficient survivable mapping algorithm for logical topology in IP-over-WDM optical networks against node failure
收藏 引用
Journal of Supercomputing 2023年 第5期79卷 5037-5063页
作者: Cheng, Dun-Wei Chang, Jo-Yi Lin, Chen-Yen Lin, Limei Huang, Yanze Thulasiraman, Krishnaiyan Hsieh, Sun-Yuan Department of Computer Science and Information Engineering National Yunlin University of Science and Technology 123 University Road Yunlin64002 Taiwan Department of Computer Science and Information Engineering National Cheng Kung University No. 1 University Road Tainan701 Taiwan College of Mathematics and Informatics and the Key Laboratory of Network Security and Cryptology Fujian Normal University Fujian Fuzhou350117 China Fujian Provincial Key Laboratory of Big Data Mining and Applications School of Mathematics and Physics Fujian University of Technology Fujian Fuzhou350118 China Department of Computer Science University of Oklahoma 660 Parrington Oval NormanOK73019 United States Department of Computer Science and Information Engineering National Chi Nan University No. 1 Daxue Rd Nantou County Puli Township54561 Taiwan
The survivable mapping problem in an IP-over-WDM network with a logical graph and physical graph is the problem of finding a mapping of a logical network in a physical layer so that any failure in physical topology do... 详细信息
来源: 评论
Using Depth-Enhanced Spatial Transformation for Student Gaze Target Estimation in Dual-View Classroom Images
Using Depth-Enhanced Spatial Transformation for Student Gaze...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Haonan Miao Peizheng Zhao Yuqi Sun Fang Nan Xiaolong Zhang Yaqiang Wu Feng Tian School of Computer Science and Technology Xi’an Jiaotong University Xi’an China Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an China School of Advanced Technology Xi’an Jiaotong-Liverpool University Suzhou China Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Xi’an Jiaotong University Xi’an China
Dual-view gaze target estimation in classroom environments has not been thoroughly explored. Existing methods lack consideration of depth information, primarily focusing on 2D image information and neglecting the late... 详细信息
来源: 评论
Ponzi Scheme Detection in Smart Contracts Using Heterogeneous Semantic Graph  6th
Ponzi Scheme Detection in Smart Contracts Using Heterogeneo...
收藏 引用
6th International Conference on Blockchain and Trustworthy Systems, BlockSys 2024
作者: Chen, Wei Jiang, Xinjun Lan, Tian Liu, Leyuan Li, Chengyu Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Chengdu610000 China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu610000 China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu610000 China Shenzhen Institute for Advanced Study University of Electronic Science and Technology of China Shenzhen518000 China
Behind the booming decentralized finance (DeFi) ecosystem driven by blockchain technology, various financial risks lurking, including money laundering, gambling, Ponzi schemes, and phishing. Due to the decentralizatio... 详细信息
来源: 评论
CroPrompt: Cross-task Interactive Prompting for Zero-shot Spoken Language Understanding
CroPrompt: Cross-task Interactive Prompting for Zero-shot Sp...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Libo Qin Fuxuan Wei Qiguang Chen Jingxuan Zhou Shijue Huang Jiasheng Si Wenpeng Lu Wanxiang Che School of Computer Science and Engineering Central South University China Key Laboratory of Data Intelligence and Advanced Computing in Provincial Universities Soochow University China Research Center for Social Computing and Information Retrieval Harbin Institute of Technology China Harbin Institute of Technology Shenzhen China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology (Shandong Academy of Sciences)
Slot filling and intent detection are two highly correlated tasks in spoken language understanding (SLU). Recent SLU research attempts to explore zero-shot prompting techniques in large language models to alleviate th... 详细信息
来源: 评论
Signal Subspace Tracking for AoA Estimation in ISAC Systems
Signal Subspace Tracking for AoA Estimation in ISAC Systems
收藏 引用
IEEE Conference on Wireless Communications and networking
作者: Shixu Dong Jingbo Zhao Zhaoming Lu J. Andrew Zhang Tianpu Yang Jiayin Deng Beijing Key Laboratory of Network System Architecture and Convergence Beijing Laboratory of Advanced Information Networks Beijing University of Posts and Telecommunications Beijing China School of Electrical and Data Engineering University of Technology Sydney Sydney Australia China Mobile Group Design Institute CO. Ltd Beijing China
In indoor integrated sensing and communication (ISAC) systems, angle of arrival (AoA) estimation for moving targets via reflected signals plays an important role in passive sensing. It is a challenging task in the pre... 详细信息
来源: 评论