咨询与建议

限定检索结果

文献类型

  • 317 篇 期刊文献
  • 264 篇 会议

馆藏范围

  • 581 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 395 篇 工学
    • 269 篇 计算机科学与技术...
    • 225 篇 软件工程
    • 117 篇 信息与通信工程
    • 88 篇 电气工程
    • 47 篇 电子科学与技术(可...
    • 43 篇 生物工程
    • 39 篇 控制科学与工程
    • 25 篇 仪器科学与技术
    • 22 篇 生物医学工程(可授...
    • 21 篇 机械工程
    • 20 篇 网络空间安全
    • 18 篇 光学工程
    • 17 篇 动力工程及工程热...
    • 13 篇 安全科学与工程
    • 12 篇 交通运输工程
    • 12 篇 航空宇航科学与技...
  • 184 篇 理学
    • 97 篇 数学
    • 52 篇 生物学
    • 34 篇 物理学
    • 34 篇 统计学(可授理学、...
    • 15 篇 系统科学
    • 11 篇 化学
  • 99 篇 管理学
    • 54 篇 管理科学与工程(可...
    • 46 篇 图书情报与档案管...
    • 25 篇 工商管理
  • 29 篇 医学
    • 23 篇 临床医学
    • 18 篇 基础医学(可授医学...
    • 14 篇 公共卫生与预防医...
  • 17 篇 法学
    • 13 篇 社会学
  • 12 篇 经济学
    • 12 篇 应用经济学
  • 9 篇 农学
  • 4 篇 军事学
  • 2 篇 教育学
  • 1 篇 艺术学

主题

  • 31 篇 semantics
  • 20 篇 feature extracti...
  • 18 篇 accuracy
  • 17 篇 federated learni...
  • 16 篇 deep learning
  • 15 篇 image segmentati...
  • 15 篇 training
  • 11 篇 internet of thin...
  • 11 篇 neural networks
  • 11 篇 computational mo...
  • 10 篇 data mining
  • 10 篇 network security
  • 10 篇 data models
  • 9 篇 visualization
  • 9 篇 correlation
  • 8 篇 optimization
  • 8 篇 noise
  • 8 篇 predictive model...
  • 7 篇 data privacy
  • 7 篇 simulation

机构

  • 54 篇 shandong provinc...
  • 46 篇 shandong enginee...
  • 46 篇 key laboratory o...
  • 23 篇 network and data...
  • 12 篇 shandong enginee...
  • 12 篇 shandong fundame...
  • 12 篇 shenzhen researc...
  • 11 篇 school of comput...
  • 10 篇 school of comput...
  • 10 篇 school of comput...
  • 10 篇 key laboratory o...
  • 10 篇 school of inform...
  • 10 篇 shaanxi key labo...
  • 9 篇 cas key laborato...
  • 8 篇 computer network...
  • 8 篇 network and data...
  • 7 篇 network and data...
  • 7 篇 beijing key labo...
  • 7 篇 school of comput...
  • 7 篇 school of comput...

作者

  • 15 篇 qin zhen
  • 14 篇 liu jun
  • 11 篇 jing zhao
  • 11 篇 qin zhiguang
  • 10 篇 liu bin
  • 9 篇 niyato dusit
  • 9 篇 ding yi
  • 9 篇 zhenyu yang
  • 8 篇 yang yang
  • 8 篇 chen yanping
  • 8 篇 yang shenghao
  • 8 篇 wang zhongmin
  • 8 篇 zhang hongbin
  • 7 篇 yi ding
  • 7 篇 zhen qin
  • 7 篇 cao mingsheng
  • 7 篇 zhao dongmei
  • 6 篇 hu liang
  • 6 篇 luo minnan
  • 6 篇 qin lu

语言

  • 535 篇 英文
  • 39 篇 其他
  • 8 篇 中文
检索条件"机构=Data Engineering and Network Technology Laboratory"
581 条 记 录,以下是191-200 订阅
排序:
Cryptanalysis of 2-layer nonlinear piece in hand method
Cryptanalysis of 2-layer nonlinear piece in hand method
收藏 引用
CD-ARES 2013 Workshops: 2nd International Workshop on Modern Cryptography and Security engineering, MoCrySEn 2013 and 3rd International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2013
作者: Nie, Xuyun Petzoldt, Albrecht Buchmann, Johannes School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 611731 China Technische Universität Darmstadt Department of Computer Science Hochschulstraße 10 64289 Darmstadt Germany State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China Network and Data Security Key Laboratory of Sichuan Province China
Piece in Hand method is a security enhancement method for Multivariate Public Key Cryptosystems (MPKCs). Since 2004, many types of this method have been proposed. In this paper, we consider the 2-layer nonlinear Piece... 详细信息
来源: 评论
Research on long and short-term social recommendation based on convolutional and gated recurrent units  29
Research on long and short-term social recommendation based ...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Jia, Zihe Xue, Peng Dai, Zhiqiang Gao, Qian Zhang, Xiaomeng Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250014 China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan250014 China
The development of the Internet has made people more closely related and has put forward higher requirements for recommendation models. Most recommendation models are studied only for the long-term interests of users.... 详细信息
来源: 评论
An obstacle avoidance design of UAV based on genetic algorithm  3
An obstacle avoidance design of UAV based on genetic algorit...
收藏 引用
3rd International Conference on Mechanical, Electric and Industrial engineering, MEIE 2020
作者: Hu, Xusheng Liu, Juan Key Laboratory of Unmanned Aerial Vehicle Development Data Application of Anhui Higher Education Institutes Wanjiang University of Technology Ma'anshan243031 China Ma'anshan Engineering Technology Research Center for Wireless Sensor Network and IntelliSense Ma'anshan243031 China Ma'anshan Technical College Ma'anshan243030 China
In order to improve the effect of obstacle avoidance, a PID control algorithm combined with genetic algorithm is proposed. By establishing the mathematical model of UAV, the auxiliary control system of UAV is analyzed... 详细信息
来源: 评论
Diff-SFCT: A Diffusion Model with Spatial-Frequency Cross Transformer for Medical Image Segmentation
Diff-SFCT: A Diffusion Model with Spatial-Frequency Cross Tr...
收藏 引用
2023 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2023
作者: Jiang, Yuxuan Ding, Yi Zhu, Guobin Qin, Zhen Pang, Minghui Cao, Mingsheng University of Electronic Science and Technology of China Network and Data Security Key Laboratory of Sichuan Province School of Information and Software Engineering Chengdu China Yibin Great Technology Co. Ltd. Yibin644000 China Sichuan Provincial People's Hospital Department of Geriatric General Surgery Chengdu610054 China
Most existing semantic segmentation methods primarily employ supervised learning with discriminative models. Although these methods are straightforward, they overlook the modeling of underlying data distributions. In ... 详细信息
来源: 评论
A Secure Device Management Scheme with Audio-Based Location Distinction in IoT
收藏 引用
Computer Modeling in engineering & Sciences 2024年 第1期138卷 939-956页
作者: Haifeng Lin Xiangfeng Liu Chen Chen Zhibo Liu Dexin Zhao Yiwen Zhang Weizhuang Li Mingsheng Cao College of Economics and Management Nanjing University of Aeronautics and AstronauticsNanjing211106China Chengdu Aircraft Industrial(Group)Co. Ltd.Chengdu610073China Academy of Military Sciences of PLA Beijing100091China School of Information and Software Engineering University of Electronic Science and Technology of ChinaChengdu610054China Ningbo Web King Technology Joint Stock Co. Ltd.Ningbo315000China The Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of ChinaChengdu610054China
Identifying a device and detecting a change in its position is critical for secure devices management in the Internet of Things(IoT).In this paper,a device management system is proposed to track the devices by using a... 详细信息
来源: 评论
Semi-Supervised Federated Learning with non-IID data: Algorithm and System Design  23
Semi-Supervised Federated Learning with non-IID Data: Algori...
收藏 引用
23rd IEEE International Conference on High Performance Computing and Communications, 7th IEEE International Conference on data Science and Systems, 19th IEEE International Conference on Smart City and 7th IEEE International Conference on Dependability in Sensor, Cloud and Big data Systems and Applications, HPCC-DSS-SmartCity-DependSys 2021
作者: Zhang, Zhe Ma, Shiyao Nie, Jiangtian Wu, Yi Yan, Qiang Xu, Xiaoke Niyato, Dusit School of Data Science and Technology Heilongjiang University Harbin150080 China Cryptology and Network Security Laboratory of Heilongjiang University Harbin150080 China College of Information and Communication Engineering Dalian Minzu University China School of Computer Science and Engineering Nanyang Technological University Singapore WeBank Co. Ltd. China
Federated Learning (FL) allows edge devices (or clients) to keep data locally while simultaneously training a shared high-quality global model. However, current research is generally based on an assumption that the tr... 详细信息
来源: 评论
LDVNet: Lightweight and Detail-Aware Vision network for Image Recognition Tasks in Resource-Constrained Environments  29
LDVNet: Lightweight and Detail-Aware Vision Network for Imag...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Liu, Yuchen Liang, Hu Qiu, Ran Zhao, Shengrong Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Qilu University of Technology Shandong Academy of Sciences Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
In many underwater application scenarios, recognition tasks need to be executed promptly on computationally limited platforms. However, models designed for this field often exhibit spatial locality, and existing works... 详细信息
来源: 评论
PNRITR:Research on Positive and Negative Entity Region Perception Methods for Image-Text Retrieval  36
PNRITR:Research on Positive and Negative Entity Region Perce...
收藏 引用
36th International Conference on Software engineering and Knowledge engineering, SEKE 2024
作者: Zhang, Zhiping Sun, Tao Zheng, Hongyan Liu, Hao Liu, Gengchen Yang, Zhi Wang, Xiaoyu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
The aim of cross-modal image-text retrieval is to heighten comprehension and to create robust associations between visual and textual content. This process entails a mutual querying and synchronization across various ... 详细信息
来源: 评论
GAF-GAN: Gated Attention Feature Fusion Image Inpainting network Based on Generative Adversarial network  29
GAF-GAN: Gated Attention Feature Fusion Image Inpainting Net...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Qiu, Ran Liang, Hu Liu, Yuchen Zhao, Shengrong Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Qilu University of Technology Shandong Academy of Sciences Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
Image inpainting, which aims to reconstruct reasonably clear and realistic images from known pixel information, is one of the core problems in computer vision. However, due to the complexity and variability of the und... 详细信息
来源: 评论
A Parallelizable Counterfactual Generation Method Based on Gradient Optimization  29
A Parallelizable Counterfactual Generation Method Based on G...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Ding, Haorun Jiang, Xuesong Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Quan Cheng Laboratory Jinan China State Key Laboratory of High-end Server and Storage Technology Jinan China
Post-hoc explanations are important for people to understand the predictions of explanation models. One class of methods in post-hoc explanation is the generation of counterfactuals, where a hypothetical example is ob... 详细信息
来源: 评论