咨询与建议

限定检索结果

文献类型

  • 312 篇 期刊文献
  • 265 篇 会议

馆藏范围

  • 577 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 384 篇 工学
    • 261 篇 计算机科学与技术...
    • 222 篇 软件工程
    • 112 篇 信息与通信工程
    • 81 篇 电气工程
    • 47 篇 电子科学与技术(可...
    • 43 篇 生物工程
    • 38 篇 控制科学与工程
    • 25 篇 仪器科学与技术
    • 22 篇 生物医学工程(可授...
    • 21 篇 机械工程
    • 18 篇 光学工程
    • 18 篇 网络空间安全
    • 17 篇 动力工程及工程热...
    • 12 篇 航空宇航科学与技...
    • 11 篇 化学工程与技术
    • 11 篇 安全科学与工程
  • 179 篇 理学
    • 92 篇 数学
    • 52 篇 生物学
    • 34 篇 物理学
    • 31 篇 统计学(可授理学、...
    • 15 篇 系统科学
    • 11 篇 化学
  • 97 篇 管理学
    • 52 篇 管理科学与工程(可...
    • 45 篇 图书情报与档案管...
    • 24 篇 工商管理
  • 27 篇 医学
    • 21 篇 临床医学
    • 17 篇 基础医学(可授医学...
    • 13 篇 公共卫生与预防医...
  • 17 篇 法学
    • 13 篇 社会学
  • 12 篇 经济学
    • 12 篇 应用经济学
  • 9 篇 农学
  • 4 篇 军事学
  • 2 篇 教育学
  • 1 篇 艺术学

主题

  • 31 篇 semantics
  • 20 篇 feature extracti...
  • 18 篇 federated learni...
  • 18 篇 accuracy
  • 16 篇 deep learning
  • 15 篇 image segmentati...
  • 15 篇 training
  • 11 篇 internet of thin...
  • 11 篇 neural networks
  • 11 篇 computational mo...
  • 10 篇 data mining
  • 10 篇 network security
  • 10 篇 data models
  • 9 篇 visualization
  • 9 篇 correlation
  • 8 篇 optimization
  • 8 篇 noise
  • 8 篇 predictive model...
  • 7 篇 simulation
  • 7 篇 vectors

机构

  • 54 篇 shandong provinc...
  • 46 篇 shandong enginee...
  • 46 篇 key laboratory o...
  • 22 篇 network and data...
  • 13 篇 school of comput...
  • 12 篇 shandong enginee...
  • 12 篇 shaanxi key labo...
  • 12 篇 shandong fundame...
  • 12 篇 shenzhen researc...
  • 10 篇 school of comput...
  • 10 篇 key laboratory o...
  • 9 篇 school of inform...
  • 9 篇 cas key laborato...
  • 8 篇 computer network...
  • 8 篇 network and data...
  • 8 篇 school of comput...
  • 8 篇 school of comput...
  • 7 篇 network and data...
  • 7 篇 school of comput...
  • 6 篇 intelligent perc...

作者

  • 15 篇 qin zhen
  • 14 篇 liu jun
  • 11 篇 jing zhao
  • 11 篇 qin zhiguang
  • 10 篇 liu bin
  • 9 篇 zhenyu yang
  • 8 篇 yang yang
  • 8 篇 ding yi
  • 8 篇 chen yanping
  • 8 篇 yang shenghao
  • 8 篇 wang zhongmin
  • 8 篇 zhang hongbin
  • 7 篇 niyato dusit
  • 7 篇 yi ding
  • 7 篇 zhen qin
  • 7 篇 zhao dongmei
  • 6 篇 hu liang
  • 6 篇 cao mingsheng
  • 6 篇 qin lu
  • 6 篇 ding ming

语言

  • 531 篇 英文
  • 39 篇 其他
  • 8 篇 中文
检索条件"机构=Data Engineering and Network Technology Laboratory"
577 条 记 录,以下是181-190 订阅
排序:
Gradient Saliency-aware CutMix for Semi-Supervised Medical Image Segmentation
Gradient Saliency-aware CutMix for Semi-Supervised Medical I...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Yuxuan Jiang Guobin Zhu Yi Ding Zhen Qin Minghui Pang Network and Data Security Key Laboratory of Sichuan Province School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China Yibin GREAT Technology Co. Ltd. Yibin China Department of Geriatric General Surgery Sichuan Provincial People’s Hospital Chengdu China
In semi-supervised medical image segmentation, the use of CutMix in the Mean Teacher architecture is considered an effective strong data augmentation strategy. However, we believe that randomly selecting patches from ... 详细信息
来源: 评论
ProtoEM: A Prototype-Enhanced Matching Framework for Event Relation Extraction
arXiv
收藏 引用
arXiv 2023年
作者: Hu, Zhilei Li, Zixuan Xu, Daozhu Bai, Long Jin, Cheng Jin, Xiaolong Guo, Jiafeng Cheng, Xueqi CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China School of Computer Science and Technology University of Chinese Academy of Sciences China State Key Laboratory of Geo-Information Engineering Xi’an710054 China Xi’an Research Institute of Surveying and Mapping Xi’an710054 China
Event Relation Extraction (ERE) aims to extract multiple kinds of relations among events in texts. However, existing methods singly categorize event relations as different classes, which are inadequately capturing the... 详细信息
来源: 评论
Few-shot Open Relation Extraction with Gaussian Prototype and Adaptive Margin
arXiv
收藏 引用
arXiv 2024年
作者: Guo, Tianlin Zhang, Lingling Wang, Jiaxin Lei, Yunkuo Li, Yifei Wang, Haofen Liu, Jun School of Computer Science and Technology Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi'an Jiaotong University Xi’an710049 China School of Computer Science and Technology Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Xi'an Jiaotong University Xi’an710049 China College of Design and Innovation Tongji University Shanghai200092 China
Few-shot relation extraction with none-of-the-above (FsRE with NOTA) aims at predicting labels in few-shot scenarios with unknown classes. FsRE with NOTA is more challenging than the conventional few-shot relation ext... 详细信息
来源: 评论
Fil-Cad: A Fault Detection Method for Iiot Based on Federated Incremental Learning with Class Accuracy Distillation
SSRN
收藏 引用
SSRN 2024年
作者: Liu, Yanhua Fang, Wenyu Huang, Wei Wang, Xiaofeng Zhao, Baokang Liu, Ximeng College of Computer and Data Science Fuzhou University Fuzhou350108 China Engineering Research Center of Big Data Intelligence Ministry of Education Fuzhou350108 China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou350108 China College of Computer National University of Defense Technology Changsha410073 China
Fault detection is a research topic attracting much attention in IIoT. However, the continuous accumulation and growth of IIoT data leads to the catastrophic forgetting problem in the fault detection model and data he... 详细信息
来源: 评论
An Auto-Parallel Method for Deep Learning Models Based on Genetic Algorithm  29
An Auto-Parallel Method for Deep Learning Models Based on Ge...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Zeng, Yan Huang, Chengchuang Ni, Yijie Zhou, Chunbao Zhang, Jilin Wang, Jue Zhou, Mingyao Xue, Meiting Zhang, Yunquan Hangzhou Dianzi University School of Computer Science and Technology Hangzhou310018 China Ministry of Education Key Laboratory for Modeling and Simulation of Complex Systems Hangzhou310018 China Data Security Governance Zhejiang Engineering Research Center Hangzhou310018 China Hangzhou Dianzi University School of ITMO Joint Institute Hangzhou310018 China Institute of Computer Network Information Center of the Chinese Academy of Sciences Beijing100086 China HuaWei China Institute of Computing Technology of the Chinese Academy of Sciences State Key Laboratory of Computer Architecture Beijing100086 China
As the size of datasets and neural network models increases, automatic parallelization methods for models have become a research hotspot in recent years. The existing auto-parallel methods based on machine learning or... 详细信息
来源: 评论
2D-DOA Estimation for Polarized Massive Antenna Array: Geometric and Algorithmic Guidelines
收藏 引用
IEEE Transactions on Vehicular technology 2025年
作者: Wen, Fangqing Wang, Han Gui, Guan Yuen, Chau Sari, Hikmet Adachi, Fumiyuki China Three Gorges University Hubei Key Laboratory of Intelligent Vision Based Monitoring for Hydroelectric Engineering Yichang443002 China Hubei University of Automotive Technology Institute of Vehicle Information Control and Network Technology Shiyan442002 China Yichun University College of Physical Sciences and Engineering Technology Yichun336000 China City University of Macau Faculty of Data Science China Nanjing University of Posts and Telecommunications College of Telecommunications and Information Engineering Nanjing210003 China Nanyang Technological University School of Electrical and Electronics Engineering 639798 Singapore Sendai980-8572 Japan
The utilization of an Electromagnetic Vector Sensor (EMVS) array presents valuable insights in wireless communications and radars by incorporating the advantages of spatial, temporal, and polarization diversities. Thi... 详细信息
来源: 评论
KA$^{2}$2SE: Key-Aggregation Authorized Searchable Encryption Scheme for data Sharing in Wireless Sensor networks
收藏 引用
IEEE Transactions on Services Computing 2024年 第1期18卷 226-238页
作者: Haijiang Wang Jianting Ning Wei Wu Chao Lin Kai Zhang School of Information and Electronic Engineering Zhejiang University of Science and Technology Zhejiang China School of Cyber Science and Engineering Wuhan University Wuhan China Faculty of Data Science City University of Macau Macau China College of Education Sciences Hong Kong University of Science and Technology Guangzhou China Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fujian Normal University Fuzhou China Guangdong Key Laboratory of Blockchain Security Guangzhou University Guangzhou China College of Computer Science and Technology Shanghai University of Electric Power Shanghai China
As a promising technology, key-aggregation searchable encryption with constant computation overhead is especially suitable for sensor nodes with limited computation resources in wireless sensor networks. However, in m... 详细信息
来源: 评论
Multi-Strategy Bus Deviation-Driven Layer Assignment Algorithm
Multi-Strategy Bus Deviation-Driven Layer Assignment Algorit...
收藏 引用
Electronics Design Automation (ISEDA), International Symposium of
作者: Yantao Yu Zepeng Li Jiarui Chen Xing Huang Genggeng Liu Ning Xu College of Computer and Data Science Fuzhou University Fuzhou China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou China School of Computer Science Northwestern Polytechnical University Xian China School of Information Engineering Wuhan University of Technology Wuhan China
In modern very large-scale integration (VLSI) design, the solution quality of the bus routing is a crucial factor that determines the timing and power of circuit, and finally affects the performance and yield of chips... 详细信息
来源: 评论
The Security and Privacy of Mobile Edge Computing: An Artificial Intelligence Perspective
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Cheng Yuan, Zenghui Zhou, Pan Xu, Zichuan Li, Ruixuan Wu, Dapeng Oliver Hubei Engineering Research Center on Big Data Security Key Laboratory of Distributed System Security of Hubei Province School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China School of Software The Key Laboratory for Ubiquitous Network Service Software of Liaoning Province Dalian University of Technology Dalian116024 China Intelligent and Distributed Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Department of Computer Science City University of Hong Kong Kowloon999077 Hong Kong
Mobile Edge Computing (MEC) is a new computing paradigm that enables cloud computing and information technology (IT) services to be delivered at the network’s edge. By shifting the load of cloud computing to individu... 详细信息
来源: 评论
PrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Man Su, Shuao Wang, Qian Li, Qi Zhou, Yuting Ma, Xiaojing Li, Zhengxiong School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Cyber Science and Engineering Wuhan University China Institute for Network Sciences and Cyberspace Tsinghua University China Department of Computer Science and Engineering University of Colorado Denver United States Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology China
Fingerprint authentication has been extensively employed in contemporary identity verification systems owing to its rapidity and cost-effectiveness. Due to its widespread use, fingerprint leakage may cause sensitive i... 详细信息
来源: 评论