咨询与建议

限定检索结果

文献类型

  • 306 篇 期刊文献
  • 264 篇 会议

馆藏范围

  • 570 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 383 篇 工学
    • 260 篇 计算机科学与技术...
    • 222 篇 软件工程
    • 112 篇 信息与通信工程
    • 81 篇 电气工程
    • 47 篇 电子科学与技术(可...
    • 43 篇 生物工程
    • 38 篇 控制科学与工程
    • 25 篇 仪器科学与技术
    • 22 篇 生物医学工程(可授...
    • 21 篇 机械工程
    • 18 篇 光学工程
    • 18 篇 网络空间安全
    • 17 篇 动力工程及工程热...
    • 12 篇 航空宇航科学与技...
    • 11 篇 化学工程与技术
    • 11 篇 安全科学与工程
  • 179 篇 理学
    • 92 篇 数学
    • 52 篇 生物学
    • 34 篇 物理学
    • 31 篇 统计学(可授理学、...
    • 15 篇 系统科学
    • 11 篇 化学
  • 97 篇 管理学
    • 52 篇 管理科学与工程(可...
    • 45 篇 图书情报与档案管...
    • 24 篇 工商管理
  • 27 篇 医学
    • 21 篇 临床医学
    • 17 篇 基础医学(可授医学...
    • 13 篇 公共卫生与预防医...
  • 17 篇 法学
    • 13 篇 社会学
  • 12 篇 经济学
    • 12 篇 应用经济学
  • 9 篇 农学
  • 4 篇 军事学
  • 2 篇 教育学
  • 1 篇 艺术学

主题

  • 31 篇 semantics
  • 20 篇 feature extracti...
  • 18 篇 federated learni...
  • 18 篇 accuracy
  • 15 篇 deep learning
  • 15 篇 image segmentati...
  • 15 篇 training
  • 11 篇 neural networks
  • 11 篇 computational mo...
  • 10 篇 internet of thin...
  • 10 篇 data mining
  • 10 篇 network security
  • 10 篇 data models
  • 9 篇 visualization
  • 9 篇 correlation
  • 8 篇 optimization
  • 8 篇 noise
  • 8 篇 predictive model...
  • 7 篇 simulation
  • 7 篇 vectors

机构

  • 54 篇 shandong provinc...
  • 46 篇 shandong enginee...
  • 46 篇 key laboratory o...
  • 21 篇 network and data...
  • 12 篇 shandong enginee...
  • 12 篇 school of comput...
  • 12 篇 shandong fundame...
  • 12 篇 shenzhen researc...
  • 11 篇 shaanxi key labo...
  • 10 篇 school of comput...
  • 10 篇 key laboratory o...
  • 9 篇 school of inform...
  • 9 篇 cas key laborato...
  • 8 篇 computer network...
  • 8 篇 network and data...
  • 8 篇 school of comput...
  • 7 篇 network and data...
  • 7 篇 beijing key labo...
  • 7 篇 school of comput...
  • 7 篇 school of comput...

作者

  • 15 篇 qin zhen
  • 14 篇 liu jun
  • 11 篇 jing zhao
  • 11 篇 qin zhiguang
  • 10 篇 liu bin
  • 9 篇 zhenyu yang
  • 8 篇 yang yang
  • 8 篇 ding yi
  • 8 篇 chen yanping
  • 8 篇 yang shenghao
  • 8 篇 wang zhongmin
  • 8 篇 zhang hongbin
  • 7 篇 niyato dusit
  • 7 篇 yi ding
  • 7 篇 zhao dongmei
  • 6 篇 hu liang
  • 6 篇 zhen qin
  • 6 篇 cao mingsheng
  • 6 篇 qin lu
  • 6 篇 ding ming

语言

  • 524 篇 英文
  • 39 篇 其他
  • 8 篇 中文
检索条件"机构=Data Engineering and Network Technology Laboratory"
570 条 记 录,以下是41-50 订阅
排序:
Service Decision Mechanism Based On Traffic Flow Prediction in the Internet of Vehicles  23
Service Decision Mechanism Based On Traffic Flow Prediction ...
收藏 引用
23rd IEEE International Conference on Communication technology, ICCT 2023
作者: Hu, Yanzhe Feng, Chenyuan Jiang, Wei Shi, Wenzhe Feng, Daquan Shenzhen University Shenzhen Key Laboratory of Digital Creative Technology Guangdong-Hong Kong Joint Laboratory for Big Data Imaging and Communication Shenzhen China College of Information Engineering Zhejiang University of Technology Zhejiang Hangzhou China Zte Corporation State Key Laboratory of Mobile Network and Mobile Multimedia Technology China
The service time of Road-Side Units (RSUs) for vehicle users will directly affect the Quality of Service (QoS) in the Internet of Vehicles (IoV), and it is related to the traffic flow and service decisions. Consequent... 详细信息
来源: 评论
Secure Similar Adjacent Vertex Query on Sparse Graph data in Cloud Environment  8th
Secure Similar Adjacent Vertex Query on Sparse Graph Data i...
收藏 引用
8th International Congress on Edge Computing, EDGE 2024, Held as Part of the Services Conference Federation, SCF 2024
作者: Tian, Yun Wu, Bin Shi, Jiaoli Zhang, Caicai Xu, Du School of Computer and Big Data Science Jiujiang University Jiujiang332005 China Jiujiang Key Laboratory of Network and Information Security Jiujiang332005 China School of Modern Information Technology Zhejiang Polytechnic University of Mechanical and Electrical Engineering Hangzhou310053 China
The development of cloud computing and the widespread application of cloud services have made outsourcing services more convenient. The need for individuals and businesses to store and manipulate the graph data they g... 详细信息
来源: 评论
Microbiologically Influenced Corrosion Behavior of Fe_(40)(CoCrMnNi)_(60) and Fe_(60)(CoCrMnNi)_(40) Medium Entropy Alloys in the Presence of Pseudomonas Aeruginosa
收藏 引用
Acta Metallurgica Sinica(English Letters) 2023年 第3期36卷 379-390页
作者: Weiwei Chang Yangyang Li Huaibei Zheng Hongchang Qian Dawei Guo Shuyuan Zhang Yuntian Lou Chi Tat Kwok Lap Mou Tam Dawei Zhang National Materials Corrosion and Protection Data Center Institute for Advanced Materials and TechnologyUniversity of Science and Technology BeijingBeijing 100083China BRI Southeast Asia Network for Corrosion and Protection(MOE) Shunde Graduate School of University of Science and Technology BeijingFoshan 528399China State Key Laboratory of Metal Material for Marine Equipment and Application Anshan 114002China Department of Electromechanical Engineering University of MacaoMacao 999078China Institute for the Development and Quality Macao 999078China
In this work,the microbiologically influenced corrosion(MIC)of Fe_(40)(CoCrMnNi)_(60) and Fe_(60)(CoCrMnNi)_(40) medium entropy alloys(MEAs)induced by Pseudomonas aeruginosa(***)was *** behaviors during 14 days of imm... 详细信息
来源: 评论
An Efficient Direct Downlink Sensing Method Using 5G NR SSB Signals in Perceptive Mobile networks
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 15360-15369页
作者: Li, Hang Xiang, Yang Guo, Qinghua Liu, Lizhe Huang, Xiaojing Cheng, Zhiqun Pang, Yashan Hangzhou Dianzi University School of Electronics and Information Hangzhou310018 China Academy of Network and Communications of CETC National Key Laboratory of Advanced Communication Networks Hebei Shijiazhuang050081 China University of Wollongong School of Electrical Computer and Telecommunications Engineering WollongongNSW2522 Australia University of Technology Sydney Global Big Data Technologies Centre UltimoNSW2007 Australia
In perceptive mobile networks (PMNs), using 5G New Radio (NR) signals for direct sensing poses a significant challenge to practical implementation due to the high computational complexity involved in estimating sensin... 详细信息
来源: 评论
LESaET: Low-Dimensional Embedding Method for Link Prediction Combining Self-Attention and Enhanced-TuckER
LESaET: Low-Dimensional Embedding Method for Link Prediction...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Ding, Lichao Zhao, Jing Lu, Kai Hao, Zenghao Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Knowledge graphs (KGs) provide a structured representation of the real world through entity-relation triples. However, current KGs are often incomplete, typically containing only a small fraction of all possible facts... 详细信息
来源: 评论
An Alternative Algorithm for the Symmetry Classification of Ordinary Differential Equations
收藏 引用
Sound & Vibration 2022年 第1期56卷 65-76页
作者: Yi Tian Jing Pang College of Data Science and Application Inner Mongolia University of TechnologyHohhot010080China Inner Mongolia Autonomous Region Engineering and Technology Research Center of Big Data Based Software Service Hohhot010080China College of Science Inner Mongolia University of TechnologyHohhot010051China Inner Mongolia Key Laboratory of Statistical Analysis Theory for Life Data and Neural Network Modeling Inner Mongolia University of TechnologyHohhot010051China
This is the first paper on symmetry classification for ordinary differential equations(ODEs)based on Wu’s *** carry out symmetry classification of two ODEs,named the generalizations of the Kummer-Schwarz equations wh... 详细信息
来源: 评论
Information and Sensing Beamforming Optimization for Multi-User Multi-Target MIMO ISAC Systems  48
Information and Sensing Beamforming Optimization for Multi-U...
收藏 引用
48th IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2023
作者: Zhu, Minghe Li, Lei Xia, Shuqiang Chang, Tsung-Hui The Chinese University of Hong Kong School of Science & Engineering Shenzhen China Shenzhen Research Institute of Big Data China ZTE Corporation China State Key Laboratory of Mobile Network and Mobile Multimedia Technology China
In this paper, we consider the joint beamforming design for simultaneous sensing and communication in a wireless multi-user system. Different from the existing works that mostly are for single target, we consider sens... 详细信息
来源: 评论
CroPrompt: Cross-task Interactive Prompting for Zero-shot Spoken Language Understanding
CroPrompt: Cross-task Interactive Prompting for Zero-shot Sp...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Qin, Libo Wei, Fuxuan Chen, Qiguang Zhou, Jingxuan Huang, Shijue Si, Jiasheng Lu, Wenpeng Che, Wanxiang School of Computer Science and Engineering Central South University China Key Laboratory of Data Intelligence and Advanced Computing in Provincial Universities Soochow University China Research Center for Social Computing and Information Retrieval Harbin Institute of Technology China Harbin Institute of Technology Shenzhen China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology Shandong Academy of Sciences China
Slot filling and intent detection are two highly correlated tasks in spoken language understanding (SLU). Recent SLU research attempts to explore zero-shot prompting techniques in large language models to alleviate th...
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities  24
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
44th ACM/IEEE International Conference on Software engineering, ICSE 2024
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hong Kong Jin YinHu Laboratory Wuhan China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China University of Colorado Colorado Springs Department of Computer Science Colorado Springs Colorado United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
Maximizing Area Coverage in Privacy-Preserving Worker Recruitment: A Prior Knowledge-Enhanced Geo-indistinguishable Approach
收藏 引用
IEEE Transactions on Information Forensics and Security 2025年 20卷 5138-5151页
作者: Zhang, Pengfei Cheng, Xiang Zhang, Zhikun Zhu, Youwen Zhang, Ji Anhui University of Science and Technology State Key Laboratory of Digital Intelligent Technology for Unmanned Coal Mining the School of Computer Science and Engineering Anhui University of Science and Technology Huainan232001 China Yunnan University of Finance and Economics Yunnan Key Laboratory of Service Computing Yunnan 650221 China Key Laboratory of Equipment Data Security and Guarantee Technology Ministry of Education Key Laboratory of Computing Power Network and Information Security Ministry of Education China Beijing University of Posts and Telecommunications China Zhejiang University China Nanjing University of Aeronautics and Astronautics China University of Southern Queensland China
Worker recruitment for area coverage maximization, typically requires participants to upload location information, which can deter potential participation without proper protection. While existing studies resort to ge... 详细信息
来源: 评论