咨询与建议

限定检索结果

文献类型

  • 2,399 篇 会议
  • 1,621 篇 期刊文献
  • 23 册 图书

馆藏范围

  • 4,043 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,401 篇 工学
    • 1,553 篇 计算机科学与技术...
    • 1,213 篇 软件工程
    • 610 篇 信息与通信工程
    • 311 篇 电子科学与技术(可...
    • 277 篇 控制科学与工程
    • 275 篇 电气工程
    • 228 篇 生物工程
    • 166 篇 光学工程
    • 153 篇 生物医学工程(可授...
    • 151 篇 机械工程
    • 112 篇 仪器科学与技术
    • 107 篇 化学工程与技术
    • 94 篇 网络空间安全
    • 84 篇 安全科学与工程
    • 81 篇 材料科学与工程(可...
    • 81 篇 动力工程及工程热...
    • 81 篇 核科学与技术
  • 1,286 篇 理学
    • 554 篇 数学
    • 463 篇 物理学
    • 260 篇 生物学
    • 187 篇 统计学(可授理学、...
    • 129 篇 系统科学
    • 118 篇 化学
  • 594 篇 管理学
    • 372 篇 管理科学与工程(可...
    • 236 篇 图书情报与档案管...
    • 154 篇 工商管理
  • 156 篇 医学
    • 131 篇 临床医学
    • 109 篇 基础医学(可授医学...
  • 88 篇 法学
    • 62 篇 社会学
  • 71 篇 教育学
    • 69 篇 教育学
  • 60 篇 经济学
  • 34 篇 农学
  • 15 篇 文学
  • 15 篇 军事学
  • 4 篇 艺术学

主题

  • 106 篇 hadron colliders
  • 86 篇 computer network...
  • 77 篇 computational mo...
  • 73 篇 computer science
  • 73 篇 protocols
  • 72 篇 feature extracti...
  • 67 篇 semantics
  • 67 篇 training
  • 64 篇 bandwidth
  • 57 篇 computer archite...
  • 56 篇 throughput
  • 56 篇 machine learning
  • 56 篇 accuracy
  • 53 篇 deep learning
  • 53 篇 security
  • 52 篇 optimization
  • 51 篇 routing
  • 51 篇 wireless communi...
  • 49 篇 quality of servi...
  • 47 篇 internet

机构

  • 150 篇 centro brasileir...
  • 149 篇 national and kap...
  • 149 篇 istanbul technic...
  • 148 篇 university of sp...
  • 148 篇 yerevan physics ...
  • 147 篇 universidad iber...
  • 146 篇 academy of scien...
  • 145 篇 brunel universit...
  • 145 篇 indian institute...
  • 145 篇 charles universi...
  • 145 篇 institute of inf...
  • 141 篇 university of de...
  • 139 篇 rwth aachen univ...
  • 139 篇 department of ph...
  • 138 篇 università di to...
  • 138 篇 imperial college...
  • 135 篇 infn sezione di ...
  • 133 篇 zhejiang univers...
  • 131 篇 department of ph...
  • 130 篇 indian institute...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 111 篇 e. migliore
  • 111 篇 p. avery
  • 111 篇 l. silvestris

语言

  • 3,794 篇 英文
  • 180 篇 其他
  • 69 篇 中文
  • 2 篇 日文
  • 1 篇 德文
检索条件"机构=Institute of Computer Network and Engineering"
4043 条 记 录,以下是121-130 订阅
排序:
Quickest Detection of Adversarial Attacks Against Correlated Equilibria  39
Quickest Detection of Adversarial Attacks Against Correlated...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Kazari, Kiarash Kanellopoulos, Aris Dán, György Division of Network and Systems Engineering School of Electrical Engineering and Computer Science KTH Royal Institute of Technology Stockholm Sweden
We consider correlated equilibria in strategic games in an adversarial environment, where an adversary can compromise the public signal used by the players for choosing their strategies, while players aim at detecting...
来源: 评论
IoT Authentication Protocols: Classification, Trend and Opportunities
IEEE Transactions on Sustainable Computing
收藏 引用
IEEE Transactions on Sustainable Computing 2024年 第3期10卷 515-533页
作者: N.alsheavi, Amar Hawbani, Ammar Wang, Xingfu Othman, Wajdy Zhao, Liang Liu, Zhi Alsamhi, Saeed Hamood Al-Qaness, Mohammed A. A. University of Science and Technology of China School of Computer Science and Technology Anhui Hefei230027 China Shenyang Aerospace University School of Computer Science Shenyang110136 China Nankai University Haihe Laboratory of ITAI School of Cyber Science Tianjin300459 China The University of Electro-Communications Department of Computer and Network Engineering Tokyo Japan University of Galway Insight Centre for Data Analytics Galway Ireland IBB University Faculty of Engineering Ibb Yemen Zhejiang Normal University College of Physics and Electronic Information Engineering Jinhua321004 China Zhejiang Institute of Optoelectronics Jinhua321004 China
This paper reviews three main aspects of authentication protocols of Internet of Things (IoT): classifications and limitations, current trends, and opportunities. First, we explore the significance of IoT authenticati... 详细信息
来源: 评论
The Proof is in the Pudding: Decision-Oriented Machine-Type Wireless Video Transmission
The Proof is in the Pudding: Decision-Oriented Machine-Type ...
收藏 引用
2024 IEEE Global Communications Conference, GLOBECOM 2024
作者: Song, Jie Gao, Yun Wu, Dan Zhou, Liang Qian, Yi Nanjing University of Posts and Telecommunications Ministry of Education Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing China Army Engineering University of Pla Institute of Communications Engineering Nanjing China University of Nebraska-Lincoln Department of Electrical and Computer Engineering Lincoln United States
With the rise of the Internet of Everything, machine-type wireless video applications like intelligent surveillance are increasingly becoming mainstream network services. However, the massive transmission of video str... 详细信息
来源: 评论
Enhancing Non-Destructive Examining of Composite Materials Using Lightweight Structures And Machine Learning
Enhancing Non-Destructive Examining of Composite Materials U...
收藏 引用
2023 International Conference on Advances in Computation, Communication and Information Technology, ICAICCIT 2023
作者: Gangwar, Prashant Kumar Pattanaik, Balachandra Madiajagan, M. Sohail, Mohammed Ali Babu, M. Dinesh Sarala, B. Woldia University Department of Construction Technology & Management Amhara Region Ethiopia Wollega University College of Engineering and Technology Department of Electrical and Computer Engineering Nekemte Ethiopia Vellore Institute of Technology School of Computer Science and Engineering Tamil Nadu Vellore India Jazan University College of Computer Science & Information Technology Department of Computer & Network Engineering Jazan Saudi Arabia Rajalakshmi Institute of Technology Department of Mechanical Engineering Chembarabakkam Chennai India R.M.K Engineering College Department of Electronics and Communication Engineering Chennai India
Composite materials and structures are becoming more efficient and cost-effective, and new special features are being developed to improve their specific properties. Their use in a variety of applications such as wind... 详细信息
来源: 评论
Evaluation Model of Learner's Cognitive Level Based on RoBERTa Fused with CNN  3
Evaluation Model of Learner's Cognitive Level Based on RoBER...
收藏 引用
3rd International Conference on Neural networks, Information and Communication engineering, NNICE 2023
作者: Cai, Yingying Zhao, Yuancheng Luo, Haibo Huang, Zhongyou Huang, Zhongying Zhang, Feng Neusoft Institute Guangdong Department of Computer Network Engineering Foshan China Gd Midea Heating & Ventilating Equipment Co. Ltd Advanced Research Center Foshan China
The cognitive level is an essential indicator of the learning process evaluation. However, most of the existing cognitive level evaluation methods use manual coding or traditional machine learning methods, which canno... 详细信息
来源: 评论
Study on Effect of Aerodynamic Configuration on Aerodynamic Performance of Mars Ascent Vehicles
收藏 引用
Space(Science & Technology) 2022年 第1期2022卷 120-130页
作者: Qi Li Wu Yuan Rui Zhao Haogong Wei Beijing Institute of Spacecraft System Engineering CASTBeijingChina 100094 Computer Network Information Center Chinese Academy of SciencesBeijingChina 100190 School of Aeronautics and Astronautics Beijing Institute of TechnologyBeijingChina 100081
The Mars surface take-off and ascent technology is one of the key technologies for realizing the Mars sample return *** from that on the moon,the gravity acceleration on the surface of Mars is 3.71 m/s^(2),so that the... 详细信息
来源: 评论
Parameter Disparities Dissection for Backdoor Defense in Heterogeneous Federated Learning  38
Parameter Disparities Dissection for Backdoor Defense in Het...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Huang, Wenke Ye, Mang Shi, Zekun Wan, Guancheng Li, He Du, Bo National Engineering Research Center for Multimedia Software Institute of Artificial Intelligence Hubei Key Laboratory of Multimedia and Network Communication Engineering School of Computer Science Wuhan University Wuhan China Taikang Center for Life and Medical Sciences Wuhan University Wuhan China
Backdoor attacks pose a serious threat to federated systems, where malicious clients optimize on the triggered distribution to mislead the global model towards a predefined target. Existing backdoor defense methods ty...
来源: 评论
Zenith: Real-time Identification of DASH Encrypted Video Traffic with Distortion  24
Zenith: Real-time Identification of DASH Encrypted Video Tra...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Tang, Weitao Li, Jianqiang Du, Meijie Hu, Die Liu, Qingyun Institute of Information Engineering Chinese Academy of Sciences School of Cyber Security University of Chinese Academy of Sciences Beijing China National Computer Network Emergency Response Technical Team/Coordination Center of China Beijing China
Some video traffic carries harmful content, such as hate speech and child abuse, primarily encrypted and transmitted through Dynamic Adaptive Streaming over HTTP (DASH). Promptly identifying and intercepting traffic o... 详细信息
来源: 评论
FedSSP: Federated Graph Learning with Spectral Knowledge and Personalized Preference  38
FedSSP: Federated Graph Learning with Spectral Knowledge and...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Tan, Zihan Wan, Guancheng Huang, Wenke Ye, Mang National Engineering Research Center for Multimedia Software Institute of Artificial Intelligence Hubei Key Laboratory of Multimedia and Network Communication Engineering School of Computer Science Wuhan University Wuhan China Taikang Center for Life and Medical Sciences Wuhan University Wuhan China
Personalized Federated Graph Learning (pFGL) facilitates the decentralized training of Graph Neural networks (GNNs) without compromising privacy while accommodating personalized requirements for non-IID participants. ...
来源: 评论
Brain Tumor Detection Using Image Processing  5
Brain Tumor Detection Using Image Processing
收藏 引用
5th International Conference on Advancements in Computing, ICAC 2023
作者: Wijerathna, Udari Dissanayake, Nimavi Nimasha, Dinithi Senarathne, Udara Weerasinghe, Lokeesha Kahandawaarachchi, Chathurangika Sri Lanka Institute of Information Technology Faculty of Computing Dept of Computer System Engineering Malabe Sri Lanka Sri Lanka Institute of Information Technology Faculty of Computing Dept of Information Technology Malabe Sri Lanka Sri Lanka Institute of Information Technology Faculty of Computing Dept of Computer System Network Engineering Malabe Sri Lanka
Abnormal formation of cells in a layer. The brain is known as the brain cancer complex, and a brain cancer detection system is needed to detect cancer in its early stages Phase. As a result, the primary goal of this i... 详细信息
来源: 评论