咨询与建议

限定检索结果

文献类型

  • 308 篇 期刊文献
  • 265 篇 会议

馆藏范围

  • 573 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 379 篇 工学
    • 256 篇 计算机科学与技术...
    • 217 篇 软件工程
    • 112 篇 信息与通信工程
    • 77 篇 电气工程
    • 47 篇 电子科学与技术(可...
    • 43 篇 生物工程
    • 38 篇 控制科学与工程
    • 25 篇 仪器科学与技术
    • 22 篇 生物医学工程(可授...
    • 20 篇 机械工程
    • 18 篇 光学工程
    • 18 篇 网络空间安全
    • 17 篇 动力工程及工程热...
    • 12 篇 航空宇航科学与技...
    • 11 篇 化学工程与技术
    • 11 篇 安全科学与工程
  • 179 篇 理学
    • 91 篇 数学
    • 52 篇 生物学
    • 34 篇 物理学
    • 30 篇 统计学(可授理学、...
    • 15 篇 系统科学
    • 11 篇 化学
  • 96 篇 管理学
    • 51 篇 管理科学与工程(可...
    • 45 篇 图书情报与档案管...
    • 24 篇 工商管理
  • 27 篇 医学
    • 21 篇 临床医学
    • 17 篇 基础医学(可授医学...
    • 13 篇 公共卫生与预防医...
  • 16 篇 法学
    • 13 篇 社会学
  • 12 篇 经济学
    • 12 篇 应用经济学
  • 9 篇 农学
  • 4 篇 军事学
  • 2 篇 教育学
  • 1 篇 艺术学

主题

  • 31 篇 semantics
  • 20 篇 feature extracti...
  • 18 篇 accuracy
  • 17 篇 federated learni...
  • 16 篇 deep learning
  • 15 篇 image segmentati...
  • 15 篇 training
  • 11 篇 internet of thin...
  • 11 篇 neural networks
  • 11 篇 computational mo...
  • 10 篇 data mining
  • 10 篇 network security
  • 10 篇 data models
  • 9 篇 visualization
  • 9 篇 correlation
  • 8 篇 optimization
  • 8 篇 noise
  • 8 篇 predictive model...
  • 7 篇 simulation
  • 7 篇 vectors

机构

  • 54 篇 shandong provinc...
  • 46 篇 shandong enginee...
  • 46 篇 key laboratory o...
  • 22 篇 network and data...
  • 12 篇 shandong enginee...
  • 12 篇 school of comput...
  • 12 篇 shandong fundame...
  • 12 篇 shenzhen researc...
  • 11 篇 shaanxi key labo...
  • 10 篇 school of comput...
  • 10 篇 key laboratory o...
  • 9 篇 computer network...
  • 9 篇 school of inform...
  • 9 篇 cas key laborato...
  • 8 篇 network and data...
  • 8 篇 school of comput...
  • 8 篇 school of comput...
  • 7 篇 network and data...
  • 7 篇 school of comput...
  • 6 篇 intelligent perc...

作者

  • 15 篇 qin zhen
  • 14 篇 liu jun
  • 11 篇 jing zhao
  • 10 篇 liu bin
  • 10 篇 qin zhiguang
  • 9 篇 zhenyu yang
  • 8 篇 yang yang
  • 8 篇 ding yi
  • 8 篇 yang shenghao
  • 8 篇 wang zhongmin
  • 8 篇 zhang hongbin
  • 7 篇 niyato dusit
  • 7 篇 yi ding
  • 7 篇 chen yanping
  • 7 篇 zhen qin
  • 7 篇 zhao dongmei
  • 6 篇 hu liang
  • 6 篇 cao mingsheng
  • 6 篇 qin lu
  • 6 篇 ding ming

语言

  • 529 篇 英文
  • 37 篇 其他
  • 8 篇 中文
检索条件"机构=Data Engineering and Network Technology Laboratory"
573 条 记 录,以下是311-320 订阅
排序:
Vulnerability Detection With Graph Attention network And Metric Learning
TechRxiv
收藏 引用
TechRxiv 2022年
作者: Zhang, Chunyong Liu, Bin Fan, Qi Xin, Yang Zhu, Hongliang School of Cyberspace Security Beijing University of Posts and Telecommunications Beijing100876 China College of Information and Network Engineering Anhui Science and Technology University Bengbu233030 China State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang550025 China
Static code vulnerability detection is a critical topic in software security. Existing software analysis methods have a high rate of false positives and false negatives. Researchers are interested in employing deep le... 详细信息
来源: 评论
Gaf-Net: Graph Attention Fusion network for Multi-View Semi-Supervised Classification
SSRN
收藏 引用
SSRN 2023年
作者: Song, Na Du, Shide Wu, Zhihao Zhong, Luying Wang, Shiping School of Computer Science and Technology Hainan University Hainan570228 China School of Mechanical Electrical and Information Engineering Putian University Putian351100 China College of Computer and Data Science Fuzhou University Fuzhou350116 China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou350116 China
Multi-view semi-supervised classification is a typical task to classify data using a small amount of supervised information, which has attracted a lot of attention from researchers in past years. In practice, existing... 详细信息
来源: 评论
Heterogeneous and plaintext checkable signcryption for integrating IoT in healthcare system
收藏 引用
Journal of Systems Architecture 2024年 154卷
作者: Hadabi, Abdalla Qu, Zheng Yeh, Kuo-Hui Chen, Chien-Ming Kumari, Saru Xiong, Hu Network and Data Security Key Laboratory of Sichuan Province School of Information and Software Engineering University of Electronic Science and Technology of China Sichuan Chengdu610054 China Institute of Artificial Intelligence Innovation National Yang Ming Chiao Tung University Hsinchu300 Taiwan Department of Information Management National Dong Hwa University Hualien974 Taiwan School of Artificial Intelligence Nanjing University of Information Science and Technology Nanjing China Department of Mathematics Chaudhary Charan Singh University Uttar Pradesh Meerut250004 India
Preserving the confidentiality and integrity of data transmission is paramount in the Internet of Things (IoT)-based healthcare systems. Current encryption techniques that allow plaintext checks primarily serve a spec... 详细信息
来源: 评论
A Survey on Service Route and Time Prediction in Instant Delivery: Taxonomy, Progress, and Prospects
arXiv
收藏 引用
arXiv 2023年
作者: Wen, Haomin Lin, Youfang Wu, Lixia Mao, Xiaowei Cai, Tianyue Hou, Yunfeng Guo, Shengnan Liang, Yuxuan Jin, Guangyin Zhao, Yiji Zimmermann, Roger Ye, Jieping Wan, Huaiyu The Beijing Key Laboratory of Traffic Data Analysis and Mining School of Computer and Information Technology Beijing Jiaotong University Beijing100044 China The Key Laboratory of Intelligent Passenger Service of Civil Aviation CAAC Beijing101318 China The School of Computing National University of Singapore Singapore College of Systems Engineering National University of Defense Technology Changsha China The School of Information Science and Engineering Yunnan University Kunming650091 China The Cainiao Network Hangzhou China The Alibaba Group Hangzhou China INTR Thrust and DSA Thrust The Hong Kong University of Science and Technology Guangzhou China
Instant delivery services, such as food delivery and package delivery, have achieved explosive growth in recent years by providing customers with daily-life convenience. An emerging research area within these services... 详细信息
来源: 评论
Beyond 10logm Array Gain: A Beamforming Method Under Non-Gaussian Noise and Multi-Sources
SSRN
收藏 引用
SSRN 2023年
作者: Su, Xiruo Tao, Liurong Ren, Haoran Wu, Bin Ye, Lingyun College of Biomedical Engineering & Instrument Science Zhejiang University Hangzhou310027 China Key Laboratory of Geoscience Big Data and Deep Resource of Zhejiang Province School of Earth Sciences Zhejiang University Hangzhou310058 China Zhejiang Provincial Key Laboratory for Network Multimedia Technology Hangzhou310027 China Hainan Institute Zhejiang University Sanya572025 China Explosion and Seismic Sensing Research Center Advanced Technology Institute Zhejiang University Hangzhou310027 China
Researchers have applied deep learning techniques in the direction of arrival domain in various real-world applications, such as traffic positioning and hydro-acoustic detection. However, the effectiveness of these al... 详细信息
来源: 评论
An Efficient Image Captioning Method Based on Generative Adversarial networks  4
An Efficient Image Captioning Method Based on Generative Adv...
收藏 引用
4th International Conference on Artificial Intelligence and Pattern Recognition, AIPR 2021
作者: Lin, Zhenxian Feng, Feirong Yang, Xiaobao Ding, Chen School of Science Xi'an University of Posts and Telecommunications China School of Telecommunication and Information Engineering Xi'an University of Posts and Telecommunications China School of Computer Science and Technology Northwestern Polytechnical University China School of Computer Science and Technology Xi'an University of Posts and Telecommunications China Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi'an University of Posts and Telecommunications China
Image captioning is usually based on the mainstream encoder-decoder framework, the accuracy of the encoders and the generation capability of the decoders directly affect the quality of image captions. But no matter ho... 详细信息
来源: 评论
network Security Situational Awareness Model Based on Threat Intelligence  14th
Network Security Situational Awareness Model Based on Threat...
收藏 引用
14th EAI International Conference on Mobile Multimedia Communications, Mobimedia 2021
作者: Zhang, Hongbin Yin, Yan Zhao, Dongmei Liu, Bin Gao, Hongbin School of Information Science and Engineering Hebei University of Science and Technology Shijiazhuang050018 China Hebei Key Laboratory of Network and Information Security Hebei Normal University Hebei Shijiazhuang050024 China School of Economics and Management Hebei University of Science and Technology Shijiazhuang050000 China Research Center of Big Data and Social Computing Hebei University of Science Shijiazhuang05000 China
In order to deal with the problems that the increasing scale of the network in the real environment leads to the continuous high incidence of network attacks, the threat intelligence was applied to situational awarene... 详细信息
来源: 评论
Deep Learning Strategies for Addressing Anomalous Exposure in Image Processing: The FARDBUNet Approach  5
Deep Learning Strategies for Addressing Anomalous Exposure i...
收藏 引用
5th International Conference on High Performance Big data and Intelligent Systems, HDIS 2023
作者: Zhou, Qi Yang, Kai Ke, Zunwang Wang, Gang Zhang, Yugui Jia, Yizhen Cao, Fengcai Ma, Junxiao Liu, Changlin Zhang, Kaijie Wu, Min School of Semiconductor Science and Technology South China Normal University GuangZhou510631 China CGNPC Uranium Industry Development Co. Ltd. Beijing100020 China School of Software Xinjiang University Urumqi830046 China School of Computing and Data Engineering NingboTech University Ningbo315100 China AnnLab Institute of Semiconductors Chinese Academy of Sciences Beijing100083 China Beijing Key Laboratory of Semiconductor Neural Network Intelligent Sensing and Computing Technology Beijing100083 China School of Integrated Circuits University of Chinese Academy of Sciences Beijing100049 China Co. Ltd Beijing100176 China School of Information Beijing Forestry University Beijing100083 China
In real-world scenarios, capturing scenes with excessive dynamic range often leads to the partial loss of highlight or dark area information due to irradiance variations and limitations in the capture capabilities of ... 详细信息
来源: 评论
Focus on the Stability of Large Systems: Toward Automatic Prediction and Analysis of Vulnerability Threat Intelligence
Focus on the Stability of Large Systems: Toward Automatic Pr...
收藏 引用
IEEE International Conference on data Science in Cyberspace (DSC)
作者: Shiwen Song Qiong Wu Xin Zheng Peng Wang Yuchen Dou Zhongwen Li Lidong Zhai Institute of Information Engineering Chinese Academy of Sciences BeiJing China Bag Data Academy Zhongke Beijing China CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing China
With the increase in the number of users and business volume, the business systems of Internet companies are becoming more and more complex, resulting in a surge in the number of alarms. A large number of dirty alarms... 详细信息
来源: 评论
Larger receptive Field and Context Information for Pose estimation:Larger Gaussian kernel  5
Larger receptive Field and Context Information for Pose esti...
收藏 引用
5th International Conference on High Performance Big data and Intelligent Systems, HDIS 2023
作者: Ma, Junxiao Yang, Kai Ke, Zunwang Wang, Gang Zhang, Yugui Cao, Fengcai Zhou, Qi Fei, Yang School of Information Beijing Forestry University Beijing100083 China CGNPC Uranium Industry Development Co. Ltd. Beijing100020 China School of Software Xinjiang University Urumqi830046 China School of Computing and Data Engineering NingboTech University Ningbo315100 China AnnLab Institute of Semiconductors Chinese Academy of Sciences Beijing100083 China Beijing Key Laboratory of Semiconductor Neural Network Intelligent Sensing and Computing Technology Beijing100083 China School of Integrated Circuits University of Chinese Academy of Sciences Beijing100049 China Co. Ltd Beijing100176 China School of Semiconductor Science and Technology South China Normal University GuangZhou510631 China
The field of pose estimation has a wide range of application prospects in various industries in the current era. With the continuous development of deep learning techniques, the effects in the field of human pose esti... 详细信息
来源: 评论