咨询与建议

限定检索结果

文献类型

  • 306 篇 期刊文献
  • 264 篇 会议

馆藏范围

  • 570 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 383 篇 工学
    • 260 篇 计算机科学与技术...
    • 222 篇 软件工程
    • 112 篇 信息与通信工程
    • 81 篇 电气工程
    • 47 篇 电子科学与技术(可...
    • 43 篇 生物工程
    • 38 篇 控制科学与工程
    • 25 篇 仪器科学与技术
    • 22 篇 生物医学工程(可授...
    • 21 篇 机械工程
    • 18 篇 光学工程
    • 18 篇 网络空间安全
    • 17 篇 动力工程及工程热...
    • 12 篇 航空宇航科学与技...
    • 11 篇 化学工程与技术
    • 11 篇 安全科学与工程
  • 179 篇 理学
    • 92 篇 数学
    • 52 篇 生物学
    • 34 篇 物理学
    • 31 篇 统计学(可授理学、...
    • 15 篇 系统科学
    • 11 篇 化学
  • 97 篇 管理学
    • 52 篇 管理科学与工程(可...
    • 45 篇 图书情报与档案管...
    • 24 篇 工商管理
  • 27 篇 医学
    • 21 篇 临床医学
    • 17 篇 基础医学(可授医学...
    • 13 篇 公共卫生与预防医...
  • 17 篇 法学
    • 13 篇 社会学
  • 12 篇 经济学
    • 12 篇 应用经济学
  • 9 篇 农学
  • 4 篇 军事学
  • 2 篇 教育学
  • 1 篇 艺术学

主题

  • 31 篇 semantics
  • 20 篇 feature extracti...
  • 18 篇 federated learni...
  • 18 篇 accuracy
  • 15 篇 deep learning
  • 15 篇 image segmentati...
  • 15 篇 training
  • 11 篇 neural networks
  • 11 篇 computational mo...
  • 10 篇 internet of thin...
  • 10 篇 data mining
  • 10 篇 network security
  • 10 篇 data models
  • 9 篇 visualization
  • 9 篇 correlation
  • 8 篇 optimization
  • 8 篇 noise
  • 8 篇 predictive model...
  • 7 篇 simulation
  • 7 篇 vectors

机构

  • 54 篇 shandong provinc...
  • 46 篇 shandong enginee...
  • 46 篇 key laboratory o...
  • 21 篇 network and data...
  • 12 篇 shandong enginee...
  • 12 篇 school of comput...
  • 12 篇 shandong fundame...
  • 12 篇 shenzhen researc...
  • 11 篇 shaanxi key labo...
  • 10 篇 school of comput...
  • 10 篇 key laboratory o...
  • 9 篇 school of inform...
  • 9 篇 cas key laborato...
  • 8 篇 computer network...
  • 8 篇 network and data...
  • 8 篇 school of comput...
  • 7 篇 network and data...
  • 7 篇 beijing key labo...
  • 7 篇 school of comput...
  • 7 篇 school of comput...

作者

  • 15 篇 qin zhen
  • 14 篇 liu jun
  • 11 篇 jing zhao
  • 11 篇 qin zhiguang
  • 10 篇 liu bin
  • 9 篇 zhenyu yang
  • 8 篇 yang yang
  • 8 篇 ding yi
  • 8 篇 chen yanping
  • 8 篇 yang shenghao
  • 8 篇 wang zhongmin
  • 8 篇 zhang hongbin
  • 7 篇 niyato dusit
  • 7 篇 yi ding
  • 7 篇 zhao dongmei
  • 6 篇 hu liang
  • 6 篇 zhen qin
  • 6 篇 cao mingsheng
  • 6 篇 qin lu
  • 6 篇 ding ming

语言

  • 524 篇 英文
  • 39 篇 其他
  • 8 篇 中文
检索条件"机构=Data Engineering and Network Technology Laboratory"
570 条 记 录,以下是471-480 订阅
排序:
Privacy preservation for recommendation databases
Privacy preservation for recommendation databases
收藏 引用
作者: Riyana, Surapon Natwichai, Juggapong Data Engineering and Network Technology Laboratory Faculty of Engineering Chiang Mai University Chiang Mai Thailand Center of Data Analytics and Knowledge Synthesis for Healthcare Chiang Mai University Chiang Mai Thailand
Since recommendation systems play an important role in the current situations where such digital transformation is highly demanded, the privacy of the individuals’ collected data in the systems must be secured effect... 详细信息
来源: 评论
Team: An taylor expansion-based method for generating adversarial examples
arXiv
收藏 引用
arXiv 2020年
作者: Qian, Ya-guan Zhang, Xi-Ming Swaileh, Wassim Wei, Li Wang, Bin Chen, Jian-Hai Zhou, Wu-Jie Lei, Jing-Sheng School of Big-Data Science Zhejiang University of Science and Technology Hangzhou310023 China Network and Information Security Laboratory of Hangzhou Hikvision Digital Technology Co. Ltd. Hang Zhou310052 China College of Computer Science and Technology Zhejiang University Hangzhou310058 China School of Information and Electronic Engineering Zhejiang University of Science and Technology Hangzhou310023 China Laboratoire ETIS UMR-CNRS 8051 CY Cergy Paris Université France
Although Deep Neural networks(DNNs) have achieved successful applications in many fields, they are vulnerable to adversarial *** training is one of the most effective methods to improve the robustness of DNNs, and it ... 详细信息
来源: 评论
A network security entity recognition method based on feature template and CNN-BiLSTM-CRF
收藏 引用
Frontiers of Information technology & Electronic engineering 2019年 第6期20卷 872-884页
作者: Ya QIN Guo-wei SHEN Wen-bo ZHAO Yan-ping CHEN Miao YU Xin JIN College of Computer Science and Technology Guizhou University Guiyang 550025 China Guizhou Provincial Key Laboratory of Public Big Data Guiyang 550025 China Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China National Computer Network Emergency Response Technical Team/Coordination Center of China Beijing 100029 China
By network security threat intelligence analysis based on a security knowledge graph(SKG), multi-source threat intelligence data can be analyzed in a fine-grained manner. This has received extensive attention. It is d... 详细信息
来源: 评论
A new runoff calculation model based on multi-source radar remote sensing technology  6
A new runoff calculation model based on multi-source radar r...
收藏 引用
6th Asia-Pacific Conference on Synthetic Aperture Radar, APSAR 2019
作者: Zhao, Jianhui Wang, Ning Wu, Lin Min, Lin College of Computer and Information Engineering Henan University Kaifeng475004 China College of Environment and Planning Henan University Kaifeng475004 China Network Information Center Office Henan University Kaifeng475004 China Henan Key Laboratory of Big Data Analysis and Processing Henan University Kaifeng475004 China Henan Engineering Research Center of Intelligent Technology and Application Kaifeng475004 China
River runoff changing will directly affect the safety of the surrounding areas. In theory, river runoff can be calculated from water depth, river width and flow velocity. But in the actual monitoring, the observation ... 详细信息
来源: 评论
Golden grain: Building a secure and decentralized model marketplace for MLaaS
arXiv
收藏 引用
arXiv 2020年
作者: Weng, Jiasi Weng, Jian Cai, Chengjun Huang, Hongwei Wang, Cong The College of Information Science and Technology College of Cyber security National Joint Engineering Research Center of Network Security Detection and Protection Technology Guangdong Key Laboratory of Data Security and Privacy Preserving Jinan University Guangzhou510632 China The Department of Computer Science City University of Hong Kong Hong Kong Hong Kong The City University of Hong Kong Shenzhen Research Institute Shenzhen518057 China
ML-as-a-service (MLaaS) becomes increasingly popular and revolutionizes the lives of people. A natural requirement for MLaaS is, however, to provide highly accurate prediction services. To achieve this, current MLaaS ... 详细信息
来源: 评论
COSINE:a software development model integrating collective intelligence, service and ecosystem
COSINE:a software development model integrating collective i...
收藏 引用
IEEE World Congress on Services (SERVICES)
作者: Hongbing Wang Tianjing Hong Jian Cao Haijun Zhang Changhai Nie Bo Cheng Yangfan He Li Kuang Dunwei Gong Wuhui Chen Yuliang Shi Deyi Huang School of Computer Science and Engineering and Key Laboratory of Computer Network and Information Integration Southeast University Nanjing China Shanghai Jiaotong University Shanghai China College of Computer Science and Technology Harbin Institute of Technology Shenzhen China Nanjing University Nanjing China Wuhan University Wuhan China Research Institute of Network Technology Beijing University of Posts and Telecommunications Beijing China Software College Central South University Changsha China College of information and control engineering China University of mining and technology Xuzhou China College of data science and computer science Zhongshan University Guangzhou China Shandong University Jinan China Landry Company Shenzhen China
With the development of the internet technology, a large amount of softwares have emerged to meet users' increasing needs. At the mean time, software systems have been faced with a problem that they must adapt to ... 详细信息
来源: 评论
Finding shortest and nearly shortest path nodes in large substantially incomplete networks
arXiv
收藏 引用
arXiv 2022年
作者: Kitsak, Maksim Ganin, Alexander Elmokashfi, Ahmed Cui, Hongzhu Eisenberg, Daniel A. Alderson, David L. Korkin, Dmitry Linkov, Igor Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft Netherlands Network Science Institute Northeastern University BostonMA02115 United States Department of Systems and Information Engineering University of Virginia CharlottesvilleVA22904 United States U.S. Army Engineer Research and Development Center Contractor Concord MA01742 United States Simula Metropolitan Center for Digital Engineering Oslo Norway Bioinformatics and Computational Biology Program Worcester Polytechnic Institute WorcesterMA01609 United States Institute for Genomic Medicine Columbia University Medical Center New YorkNY United States Operations Research Department Naval Postgraduate School MontereyCA93943 United States Data Science Program Worcester Polytechnic Institute WorcesterMA01609 United States Computer Science Department Worcester Polytechnic Institute WorcesterMA01609 United States U.S. Army Engineer Research and Development Center Environmental Laboratory Concord MA01742 United States
Dynamic processes on networks, be it information transfer in the Internet, contagious spreading in a social network, or neural signaling, take place along shortest or nearly shortest paths. Unfortunately, our maps of ... 详细信息
来源: 评论
The Multi-modality Cell Segmentation Challenge: Towards Universal Solutions
arXiv
收藏 引用
arXiv 2023年
作者: Ma, Jun Xie, Ronald Ayyadhury, Shamini Ge, Cheng Gupta, Anubha Gupta, Ritu Gu, Song Zhang, Yao Lee, Gihun Kim, Joonkee Lou, Wei Li, Haofeng Upschulte, Eric Dickscheid, Timo de Almeida, José Guilherme Wang, Yixin Han, Lin Yang, Xin Labagnara, Marco Gligorovski, Vojislav Scheder, Maxime Rahi, Sahand Jamal Kempster, Carly Pollitt, Alice Espinosa, Leon Mignot, Tâm Middeke, Jan Moritz Eckardt, Jan-Niklas Li, Wangkai Li, Zhaoyang Cai, Xiaochen Bai, Bizhe Greenwald, Noah F. Van Valen, David Weisbart, Erin Cimini, Beth A. Cheung, Trevor Brück, Oscar Bader, Gary D. Wang, Bo Peter Munk Cardiac Centre University Health Network TorontoON Canada Department of Laboratory Medicine and Pathobiology University of Toronto TorontoON Canada Vector Institute TorontoON Canada Department of Molecular Genetics University of Toronto TorontoON Canada Donnelly Centre University of Toronto TorontoON Canada Princess Margaret Cancer Centre University Health Network TorontoON Canada School of Medicine and Pharmacy Ocean University of China Qingdao China New Delhi India Laboratory Oncology Dr. BRA-IRCH All India Institute of Medical Sciences New Delhi India Department of Image Reconstruction Nanjing Anke Medical Technology Co. Ltd. Nanjing China Shanghai Artificial Intelligence Laboratory Shanghai China Graduate School of AI KAIST Seoul Korea Republic of Shenzhen Research Institute of Big Data Shenzhen China Shenzhen China Helmholtz AI Research Center Jülich Jülich Germany Faculty of Mathematics and Natural Sciences Institute of Computer Science Heinrich Heine University Düsseldorf Düsseldorf Germany Hinxton United Kingdom Champalimaud Foundation - Centre for the Unknown Lisbon Portugal Department of Bioengineering Stanford University Palo AltoCA United States Tandon School of Engineering New York University New YorkNY United States School of Biomedical Engineering Health Science Center Shenzhen University Shenzhen China Lausanne Switzerland School of Biological Sciences University of Reading Reading United Kingdom Laboratoire de Chimie Bactérienne CNRS Université Aix Marseille UMR Institut de Microbiologie de la Méditerranée Marseille France Department of Internal Medicine I University Hospital Dresden Technical University Dresden Dresden Germany Else Kroener Fresenius Center for Digital Health Technical University Dresden Dresden Germany Department of Automation University of Science and Technology of China Hefei China Institute of Advanced Technology University of Science and Technology of China Hefei Chi
Cell segmentation is a critical step for quantitative single-cell analysis in microscopy images. Existing cell segmentation methods are often tailored to specific modalities or require manual interventions to specify ... 详细信息
来源: 评论
Artificial unintelligence: Anti-intelligence of intelligent algorithms  3rd
Artificial unintelligence: Anti-intelligence of intelligent ...
收藏 引用
3rd International Conference on Intelligence Science, ICIS 2018
作者: Zhang, Yuhong Nauman, Umer Information Science and Engineering College Henan University of Technology Zhengzhou450001 China Network and Data Security Key Laboratory of Sichuan University of Electronic Science and Technology Chengdu610054 China
In the age of big data, artificial intelligence (AI) algorithms play an important role in demonstrating the value of data, but its negative effects are increasingly prominent. Researchers focus more on the obvious iss... 详细信息
来源: 评论
Priority-Based Optimization of I/O Isolation for Hybrid Deployed Services  15th
Priority-Based Optimization of I/O Isolation for Hybrid Depl...
收藏 引用
15th EAI International Conference on Collaborative Computing: networking, Applications and Worksharing, CollaborateCom 2019
作者: Zhang, Jiancheng Li, Youhuizi Zhou, Li Ren, Zujie Wan, Jian Wang, Yuan Key Laboratory of Complex Systems Modeling and Simulation Ministry of Education Hangzhou Dianzi University Hangzhou China School of Computer Science and Technology Hangzhou Dianzi University Hangzhou China Zhejiang Lab Hangzhou China School of Information and Electronic Engineering Zhejiang University of Science and Technology Hangzhou China Key Enterprise Research Institute of NetEase Big Data of Zhejiang Province Netease Hangzhou Network Co.Ltd Hangzhou China
With the increasing of software complexity and user demands, collaborative service is becoming more and more popular. Each service focuses on its own specialty, their cooperation can support complicated task with high... 详细信息
来源: 评论