咨询与建议

限定检索结果

文献类型

  • 317 篇 期刊文献
  • 264 篇 会议

馆藏范围

  • 581 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 395 篇 工学
    • 269 篇 计算机科学与技术...
    • 225 篇 软件工程
    • 117 篇 信息与通信工程
    • 88 篇 电气工程
    • 47 篇 电子科学与技术(可...
    • 43 篇 生物工程
    • 39 篇 控制科学与工程
    • 25 篇 仪器科学与技术
    • 22 篇 生物医学工程(可授...
    • 21 篇 机械工程
    • 20 篇 网络空间安全
    • 18 篇 光学工程
    • 17 篇 动力工程及工程热...
    • 13 篇 安全科学与工程
    • 12 篇 交通运输工程
    • 12 篇 航空宇航科学与技...
  • 184 篇 理学
    • 97 篇 数学
    • 52 篇 生物学
    • 34 篇 物理学
    • 34 篇 统计学(可授理学、...
    • 15 篇 系统科学
    • 11 篇 化学
  • 99 篇 管理学
    • 54 篇 管理科学与工程(可...
    • 46 篇 图书情报与档案管...
    • 25 篇 工商管理
  • 29 篇 医学
    • 23 篇 临床医学
    • 18 篇 基础医学(可授医学...
    • 14 篇 公共卫生与预防医...
  • 17 篇 法学
    • 13 篇 社会学
  • 12 篇 经济学
    • 12 篇 应用经济学
  • 9 篇 农学
  • 4 篇 军事学
  • 2 篇 教育学
  • 1 篇 艺术学

主题

  • 31 篇 semantics
  • 20 篇 feature extracti...
  • 18 篇 accuracy
  • 17 篇 federated learni...
  • 16 篇 deep learning
  • 15 篇 image segmentati...
  • 15 篇 training
  • 11 篇 internet of thin...
  • 11 篇 neural networks
  • 11 篇 computational mo...
  • 10 篇 data mining
  • 10 篇 network security
  • 10 篇 data models
  • 9 篇 visualization
  • 9 篇 correlation
  • 8 篇 optimization
  • 8 篇 noise
  • 8 篇 predictive model...
  • 7 篇 data privacy
  • 7 篇 simulation

机构

  • 54 篇 shandong provinc...
  • 46 篇 shandong enginee...
  • 46 篇 key laboratory o...
  • 23 篇 network and data...
  • 12 篇 shandong enginee...
  • 12 篇 shandong fundame...
  • 12 篇 shenzhen researc...
  • 11 篇 school of comput...
  • 10 篇 school of comput...
  • 10 篇 school of comput...
  • 10 篇 key laboratory o...
  • 10 篇 school of inform...
  • 10 篇 shaanxi key labo...
  • 9 篇 cas key laborato...
  • 8 篇 computer network...
  • 8 篇 network and data...
  • 7 篇 network and data...
  • 7 篇 beijing key labo...
  • 7 篇 school of comput...
  • 7 篇 school of comput...

作者

  • 15 篇 qin zhen
  • 14 篇 liu jun
  • 11 篇 jing zhao
  • 11 篇 qin zhiguang
  • 10 篇 liu bin
  • 9 篇 niyato dusit
  • 9 篇 ding yi
  • 9 篇 zhenyu yang
  • 8 篇 yang yang
  • 8 篇 chen yanping
  • 8 篇 yang shenghao
  • 8 篇 wang zhongmin
  • 8 篇 zhang hongbin
  • 7 篇 yi ding
  • 7 篇 zhen qin
  • 7 篇 cao mingsheng
  • 7 篇 zhao dongmei
  • 6 篇 hu liang
  • 6 篇 luo minnan
  • 6 篇 qin lu

语言

  • 535 篇 英文
  • 39 篇 其他
  • 8 篇 中文
检索条件"机构=Data Engineering and Network Technology Laboratory"
581 条 记 录,以下是71-80 订阅
排序:
LMP-GAN: Out-Of-Distribution Detection For Non-Control data Malware Attacks
收藏 引用
IEEE Transactions on Pattern Analysis and Machine Intelligence 2025年 PP卷 PP页
作者: Wood, David Kapp, David Kebede, Temesgen Hirakawa, Keigo Wuhan University School of Computer Science China Wuhan University National Engineering Research Center for Multimedia Software Hubei Key Laboratory of Multimedia and Network Communication Engineering China Zhongguancun Academy China Wuhan University State Key Laboratory of Information Engineering in Surveying Mapping and Remote Sensing China Sun Yat-sen University School of Geography and Planning China Mohamed bin Zayed University of Artificial Intelligence United Arab Emirates Chongqing University College of Computer Science China The University of Tokyo Japan RIKEN Center for Advanced Intelligence Project Japan Intelligent Science & Technology Academy Limited CASIC China iFlytek Company Ltd. National Engineering Research Center of Speech and Language Information Processing China Nanyang Technological University College of Computing & Data Science Singapore Henan Academy of Sciences Aerospace Information Research Institute China
Anomaly detection is a common application of machine learning. Out-of-distribution (OOD) detection in particular is a semi-supervised anomaly detection technique where the detection method is trained only on the inlie... 详细信息
来源: 评论
Efficient quantum state transmission via perfect quantum network coding
收藏 引用
Science China(Information Sciences) 2019年 第1期62卷 191-204页
作者: Zhen-Zhen LI Gang XU Xiu-Bo CHEN Zhiguo QU Xin-Xin NIU Yi-Xian YANG Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and Telecommunications Guizhou Provincial Key Laboratory of Public Big Data Guizhou University Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology
Quantum network coding with the assistance of auxiliary resources can achieve perfect transmission of the quantum state. This paper suggests a novel perfect network coding scheme to efficiently solve the quantum k-pai... 详细信息
来源: 评论
Influence of Key Ecological Function Area Policy on the Components of Water Balance-A Case Study in Yangtze River Basin
SSRN
收藏 引用
SSRN 2025年
作者: You, Guangyong Xu, Yan Zhang, Minxia Gao, Yuanyun He, Honglin Zhang, Mengyu Liu, Bo Zhu, Minxin You, Juan Nanjing Institute of Environmental Sciences Ministry of Ecology and Environment Jiangsu Nanjing210042 China Jiangsu Frontier Electric Power Technology Company Limited Jiangsu Nanjing211102 China Key Laboratory of Ecosystem Network Observation and Modeling Institute of Geographic Sciences and Natural Resources Research Chinese Academy of Sciences Beijing100101 China National Ecosystem Science Data Center Beijing100101 China College of Resources and Environment University of Chinese Academy of Sciences Beijing100190 China School of Remote Sensing and Geomatics Engineering Nanjing University of Information Science and Technology Jiangsu Nanjing210044 China Hebei Engineering Consulting Institute Hebei Shijiazhuang050057 China
The National Key Ecological Function Area (KEFA) policy of China, the world's largest ecological compensation program, played an important role in improving the ecological functions. To reveal the effects of KEFA ...
来源: 评论
A UC-secure authenticated contributory group key exchange protocol based on discrete logarithm
A UC-secure authenticated contributory group key exchange pr...
收藏 引用
9th International Conference on Information Systems Security, ICISS 2013
作者: Sobhdel, Yasser Jalili, Rasool Data and Network Security Laboratory Department of Computer Engineering Sharif University of Technology Tehran Iran
Authenticated key exchange protocols allow parties to establish a common session key which in turn is fundamental to building secure channels. Authenticated group key exchange protocols allow parties to interact with ... 详细信息
来源: 评论
Privacy preservation based on full-domain generalization for incremental data publishing
收藏 引用
International Conference on Information Science and Applications, ICISA 2016
作者: Soontornphand, Torsak Harnsamut, Nattapon Natwichai, Juggapong Data Engineering and Network Technology Laboratory Department of Computer Engineering Chiang Mai University Chiang Mai Thailand
As data can be continuously collected and grow all the time with the enabling of advancement in IT infrastructure, the privacy protection mechanism which is designed for static data might not be able to cope with this... 详细信息
来源: 评论
Prescribed Performance Control of One-DOF Link Manipulator With Uncertainties and Input Saturation Constraint
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2019年 第1期6卷 148-157页
作者: Yang Yang Jie Tan Dong Yue IEEE the College of Automation and the College of Artificial Intelligence Nanjing University of Posts and Telecommunications the Institute of Advanced Technology and Jiangsu Engineering Laboratory of Big Data Analysis and Control for Active Distribution Network Nanjing University of Posts and Telecommunications
In this paper, we mainly address the position control problem for one-degree of freedom(DOF) link manipulator despite uncertainties and the input saturation via the backstepping technique, active disturbance rejection... 详细信息
来源: 评论
An Overview of General Theory of Security
收藏 引用
China Communications 2017年 第7期14卷 1-10页
作者: Min Lei Yixian Yang Xinxin Niu Yu Yang Jie Hao Information Security Center Beijing University of Posts and Telecommunications Guizhou University Guizhou Provincial Key Laboratory of Public Big Data Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science & Technology
Cyber security lacks comprehensive theoretical guidance. General security theory, as a set of basic security theory concepts, is intended to guide cyber security and all the other security work. The general theory of ... 详细信息
来源: 评论
Distributed Tracking Control of a Class of Multi-agent Systems in Non-affine Pure-feedback Form Under a Directed Topology
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2018年 第1期5卷 169-180页
作者: Yang Yang Dong Yue College of Automation Nanjing University of Posts and Telecommunications Nanjing 210023 China Institute of Advanced Technology and Jiangsu Engineering Laboratory of Big Data Analysis and Control for Active Distribution Network Nanjing University of Posts and Telecommunications Nanjing 210023 China IEEE
In this paper, we consider a consensus tracking problem of a class of networked multi-agent systems(MASs)in non-affine pure-feedback form under a directed topology. A distributed adaptive tracking consensus control sc... 详细信息
来源: 评论
Event-trigger-based consensus secure control of linear multi-agent systems under DoS attacks over multiple transmission channels
收藏 引用
Science China(Information Sciences) 2020年 第5期63卷 105-118页
作者: Yang YANG Yanfei LI Dong YUE College of Automation & College of Artificial Intelligence Nanjing University of Posts and Telecommunications Jiangsu Engineering Laboratory of Big Data Analysis and Control for Active Distribution Network Nanjing University of Posts and Telecommunications Institute of Advanced Technology Nanjing University of Posts and Telecommunications
This paper proposes a consensus secure control scheme in the presence of denial-of-service(DoS)attacks based on an event-trigger mechanism. In contrast to a scenario in which attacks are the same and simultaneously pa... 详细信息
来源: 评论
An aggregate flow based scheduler in multi-task cooperated UAVs network
收藏 引用
Chinese Journal of Aeronautics 2020年 第11期33卷 2989-2998页
作者: Xiaohuan LI Ziqi XIE Jin YE Xin TANG Chunhai LI Fengzhu TANG Rong YU School of Information and Communication Guilin University of Electronic TechnologyGuilin 541004China Guangxi Key Laboratory of Multimedia Communications and Network Technology School of ComputerElectronics and InformationGuangxi UniversityNanning 530004China National Engineering Laboratory for Comprehensive Transportation Big Data Application Technology(Guangxi) Nanning 530001China School of Automation Guangdong University of TechnologyGuangzhou 510006China
Unmanned Aerial Vehicles(UAVs)cooperative multi-task system has become the research focus in recent ***,the existing network frameworks of UAVs are not flexible and efficient enough to deal with the complex multi-task... 详细信息
来源: 评论