咨询与建议

限定检索结果

文献类型

  • 298 篇 期刊文献
  • 254 篇 会议

馆藏范围

  • 552 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 412 篇 工学
    • 314 篇 计算机科学与技术...
    • 261 篇 软件工程
    • 91 篇 信息与通信工程
    • 62 篇 生物工程
    • 57 篇 电气工程
    • 44 篇 光学工程
    • 34 篇 生物医学工程(可授...
    • 31 篇 电子科学与技术(可...
    • 27 篇 控制科学与工程
    • 23 篇 机械工程
    • 18 篇 化学工程与技术
    • 12 篇 仪器科学与技术
    • 12 篇 动力工程及工程热...
    • 11 篇 安全科学与工程
    • 10 篇 网络空间安全
    • 9 篇 材料科学与工程(可...
  • 192 篇 理学
    • 103 篇 数学
    • 64 篇 生物学
    • 58 篇 物理学
    • 35 篇 统计学(可授理学、...
    • 16 篇 系统科学
    • 13 篇 化学
    • 9 篇 大气科学
  • 95 篇 管理学
    • 50 篇 管理科学与工程(可...
    • 47 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 27 篇 医学
    • 24 篇 临床医学
    • 23 篇 基础医学(可授医学...
    • 16 篇 药学(可授医学、理...
  • 16 篇 法学
    • 10 篇 社会学
  • 4 篇 经济学
  • 4 篇 农学
  • 3 篇 军事学
  • 2 篇 教育学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 16 篇 training
  • 13 篇 semantics
  • 11 篇 image enhancemen...
  • 11 篇 optimization
  • 11 篇 estimation
  • 10 篇 convolution
  • 10 篇 feature extracti...
  • 8 篇 conferences
  • 8 篇 deep learning
  • 8 篇 wireless sensor ...
  • 8 篇 robustness
  • 7 篇 internet of thin...
  • 7 篇 machine learning
  • 7 篇 correlation
  • 7 篇 accuracy
  • 7 篇 computer vision
  • 7 篇 cryptography
  • 6 篇 image segmentati...
  • 6 篇 authentication
  • 6 篇 cloud computing

机构

  • 63 篇 key laboratory f...
  • 34 篇 school of softwa...
  • 22 篇 school of softwa...
  • 20 篇 key laboratory f...
  • 20 篇 state key labora...
  • 20 篇 dut-ru internati...
  • 19 篇 key laboratory f...
  • 17 篇 school of comput...
  • 15 篇 hubei key labora...
  • 15 篇 collaborative in...
  • 13 篇 dut-ru internati...
  • 13 篇 school of softwa...
  • 12 篇 international sc...
  • 12 篇 jiangsu engineer...
  • 11 篇 school of comput...
  • 11 篇 school of softwa...
  • 10 篇 school of inform...
  • 10 篇 state key labora...
  • 9 篇 school of comput...
  • 9 篇 national enginee...

作者

  • 48 篇 liu risheng
  • 36 篇 fan xin
  • 29 篇 luo zhongxuan
  • 18 篇 du bo
  • 13 篇 xin fan
  • 13 篇 ma long
  • 13 篇 wan liangtian
  • 12 篇 ruimin hu
  • 12 篇 yuehui jin
  • 11 篇 zhongxuan luo
  • 11 篇 li haojie
  • 11 篇 sun lu
  • 10 篇 tao dacheng
  • 10 篇 wang jin
  • 9 篇 tan yang
  • 9 篇 risheng liu
  • 8 篇 wang lei
  • 8 篇 wang xianpeng
  • 8 篇 zhang jin
  • 7 篇 zeng shangzhi

语言

  • 505 篇 英文
  • 40 篇 其他
  • 8 篇 中文
检索条件"机构=Innovative Network and Software Engineering Technology Laboratory"
552 条 记 录,以下是31-40 订阅
排序:
Unidirectional Identity-Based Proxy Re-Signature with Key Insulation in EHR Sharing System
收藏 引用
Computer Modeling in engineering & Sciences 2022年 第6期131卷 1497-1513页
作者: Yanan Chen Ting Yao Haiping Ren Zehao Gan School of Information and Software Engineering University of Electronic Science and Technology of ChinaChengdu610054China Basic Course Teaching Department Jiangxi University of Science and TechnologyNanchang330013China Institute of Electronic and Information Engineering University of Electronic Science and Technology of ChinaDongguan523808China Network and Data Security Key Laboratory of Sichuan Province Unversity of Electronic Science and Technology of ChinaChengdu610054China
The introduction of the electronic medical record(EHR)sharing system has made a great contribution to the management and sharing of healthcare *** referral treatment for patients,the original signature needs to be con... 详细信息
来源: 评论
Distributed Feature Reduction Signal Sorting Algorithm
Distributed Feature Reduction Signal Sorting Algorithm
收藏 引用
International Conference on Guidance, Navigation and Control, ICGNC 2022
作者: Wan, Liangtian Wang, Jinjing Sun, Lu Wang, Xianpeng Lu, Cunbo Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province School of Software Dalian University of Technology Dalian116620 China Department of Communication Engineering Institute of Information Science Technology Dalian Maritime University Dalian116026 China School of Information and Communication Engineering Hainan University Haikou570228 China Information Science Academy China Electronics Technology Group Corporation Beijing100098 China
With the development of science and technology, modern war has changed from traditional mechanized war to electronic war. Electronic warfare has become the mainstream combat mode in modern war. At present, the electro... 详细信息
来源: 评论
An optimal container update method for edge-cloud collaboration
An optimal container update method for edge-cloud collaborat...
收藏 引用
作者: Zhang, Haotong Lin, Weiwei Xie, Rong Li, Shenghai Dai, Zhiyan Wang, James Z. School of Software Engineering South China University of Technology Guangzhou China School of Computer Science & Engineering South China University of Technology Guangzhou China Department of New Network Technologies Peng Cheng Laboratory Shenzhen China School of Information Guangdong University of Finance & Economics Guangzhou China School of Computing Clemson University ClemsonSC United States
Emerging computing paradigms provide field-level service responses for users, for example, edge computing, fog computing, and MEC. Edge virtualization technologies represented by Docker can provide a platform-independ... 详细信息
来源: 评论
A Secure Device Management Scheme with Audio-Based Location Distinction in IoT
收藏 引用
Computer Modeling in engineering & Sciences 2024年 第1期138卷 939-956页
作者: Haifeng Lin Xiangfeng Liu Chen Chen Zhibo Liu Dexin Zhao Yiwen Zhang Weizhuang Li Mingsheng Cao College of Economics and Management Nanjing University of Aeronautics and AstronauticsNanjing211106China Chengdu Aircraft Industrial(Group)Co. Ltd.Chengdu610073China Academy of Military Sciences of PLA Beijing100091China School of Information and Software Engineering University of Electronic Science and Technology of ChinaChengdu610054China Ningbo Web King Technology Joint Stock Co. Ltd.Ningbo315000China The Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of ChinaChengdu610054China
Identifying a device and detecting a change in its position is critical for secure devices management in the Internet of Things(IoT).In this paper,a device management system is proposed to track the devices by using a... 详细信息
来源: 评论
UW-Adapter: Adapting Monocular Depth Estimation Model in Underwater Scenes
收藏 引用
IEEE Transactions on Multimedia 2025年
作者: Ye, Xinchen Chang, Yue Xu, Rui Li, Haojie DUT-RU International School of Information Science & Engineering Dalian University of Technology Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province Liaoning China Shandong University of Science and Technology College of Computer Science and Engineering China
Estimating depth maps from monocular underwater images poses one of the most challenging problems in underwater applications. Due to the lack of large-scale paired underwater color-depth datasets for effective trainin... 详细信息
来源: 评论
Impossible Trinity in Underwater Optical Wireless Communication
Impossible Trinity in Underwater Optical Wireless Communicat...
收藏 引用
International Conference on network Protocols
作者: Qiwei Wang Chi Lin Yi Wang Yu Sun Lei Wang Xin Fan Guowei Wu School of Software Technology & DUT-RU International School of Information Science and Engineering Dalian University of Technology Dalian China Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province Dalian China
Underwater Optical Wireless Communication (UOWC) is considered a promising approach, offering the potential for flexible and high-speed communication under the surface of the water. However, the interdependent relatio... 详细信息
来源: 评论
Exploration and Practice of Postgraduate Training Mode Based on Medical Imaging Information Security
收藏 引用
计算机教育 2023年 第12期 71-77页
作者: Yi Ding Jiaqi Zhang Zhen Qin Yang Zhao Mingsheng Cao Network and Data Security Key Laboratory of Sichuan Province School of Information and Software EngineeringUniversity of Electronic Science and Technology of ChinaChengdu610051China
In the process of continuous maturity and development of medical imaging diagnosis,it is common to transmit images through public *** to ensure the security of transmission,cultivate talents who combine medical imagin... 详细信息
来源: 评论
Privacy-Preserving Multi-Keyword Fuzzy Adjacency Search Strategy for Encrypted Graph in Cloud Environment
收藏 引用
Computers, Materials & Continua 2024年 第3期78卷 3177-3194页
作者: Bin Wu Xianyi Chen Jinzhou Huang Caicai Zhang Jing Wang Jing Yu Zhiqiang Zhao Zhuolin Mei School of Computer and Big Data Science Jiujiang UniversityJiujiang332005China Jiujiang Key Laboratory of Network and Information Security Jiujiang332005China School of Computer and Software Nanjing University of Information Science&TechnologyNanjing210044China School of Computer Engineering Hubei University of Arts and ScienceXiangyang441053China School of Modern Information Technology Zhejiang Institute of Mechanical and Electrical EngineeringHangzhou310053China Information Center Jiangxi Changjiang Chemical Co.Ltd.Jiujiang332005China School of Mathematics and Computer Science Ningxia Normal UniversityGuyuan756099China
In a cloud environment,outsourced graph data is widely used in companies,enterprises,medical institutions,and so *** owners and users can save costs and improve efficiency by storing large amounts of graph data on clo... 详细信息
来源: 评论
An Iterative Deep Neural network Pruning Method Based on Filter Redundancy Assessment
An Iterative Deep Neural Network Pruning Method Based on Fil...
收藏 引用
Artificial Intelligence, networking and Information technology (AINIT), International Seminar on
作者: Xiaochen Lai Lukang Wang Liyong Zhang School of Software Dalian University of Technology Dalian China Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province Dalian China School of Control Science and Engineering Dalian University of Technology Dalian China
Storage and inference of deep neural network models are resource-intensive, limiting their deployment on edge devices. Structured pruning methods can reduce the resource requirements for model storage and inference by... 详细信息
来源: 评论
Diverse Co-saliency Feature Learning for Text-Based Person Retrieval
收藏 引用
IEEE Transactions on Information Forensics and Security 2025年 20卷 5465-5477页
作者: You, Shuai Chen, Cuiqun Feng, Yujian Liu, Hai Ji, Yimu Ye, Mang School of Internet of Things Nanjing China Anhui University School of Computer Science and Technology Hefei China South China Normal University school of computer Guangdong China NJUPT School of Computer Science Nanjing China Wuhan University National Engineering Research Center for Multimedia Software Hubei Key Laboratory of Multimedia and Network Communication Engineering Institute of Artificial Intelligence School of Computer Science Wuhan430072 China
Text-based Person Retrieval (TPR) plays a pivotal role in video surveillance systems for safeguarding public safety. As a fine-grained retrieval task, TPR faces the significant challenge of precisely capturing highly ... 详细信息
来源: 评论