咨询与建议

限定检索结果

文献类型

  • 2,397 篇 会议
  • 1,617 篇 期刊文献
  • 23 册 图书

馆藏范围

  • 4,037 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,396 篇 工学
    • 1,547 篇 计算机科学与技术...
    • 1,215 篇 软件工程
    • 606 篇 信息与通信工程
    • 310 篇 电子科学与技术(可...
    • 276 篇 电气工程
    • 270 篇 控制科学与工程
    • 229 篇 生物工程
    • 169 篇 光学工程
    • 154 篇 生物医学工程(可授...
    • 151 篇 机械工程
    • 111 篇 仪器科学与技术
    • 107 篇 化学工程与技术
    • 93 篇 网络空间安全
    • 83 篇 安全科学与工程
    • 81 篇 动力工程及工程热...
    • 81 篇 核科学与技术
    • 80 篇 材料科学与工程(可...
  • 1,286 篇 理学
    • 554 篇 数学
    • 461 篇 物理学
    • 262 篇 生物学
    • 187 篇 统计学(可授理学、...
    • 129 篇 系统科学
    • 116 篇 化学
  • 595 篇 管理学
    • 372 篇 管理科学与工程(可...
    • 237 篇 图书情报与档案管...
    • 154 篇 工商管理
  • 154 篇 医学
    • 129 篇 临床医学
    • 108 篇 基础医学(可授医学...
  • 88 篇 法学
    • 62 篇 社会学
  • 72 篇 教育学
    • 70 篇 教育学
  • 60 篇 经济学
  • 34 篇 农学
  • 15 篇 文学
  • 15 篇 军事学
  • 4 篇 艺术学

主题

  • 106 篇 hadron colliders
  • 86 篇 computer network...
  • 77 篇 computational mo...
  • 73 篇 computer science
  • 72 篇 feature extracti...
  • 72 篇 protocols
  • 66 篇 semantics
  • 65 篇 training
  • 64 篇 bandwidth
  • 57 篇 computer archite...
  • 56 篇 throughput
  • 56 篇 machine learning
  • 56 篇 accuracy
  • 53 篇 deep learning
  • 53 篇 security
  • 52 篇 optimization
  • 51 篇 routing
  • 51 篇 wireless communi...
  • 49 篇 quality of servi...
  • 47 篇 internet

机构

  • 150 篇 centro brasileir...
  • 149 篇 national and kap...
  • 149 篇 istanbul technic...
  • 148 篇 university of sp...
  • 148 篇 yerevan physics ...
  • 147 篇 universidad iber...
  • 146 篇 academy of scien...
  • 145 篇 brunel universit...
  • 145 篇 indian institute...
  • 145 篇 charles universi...
  • 145 篇 institute of inf...
  • 140 篇 university of de...
  • 139 篇 rwth aachen univ...
  • 139 篇 department of ph...
  • 138 篇 università di to...
  • 138 篇 imperial college...
  • 135 篇 infn sezione di ...
  • 133 篇 zhejiang univers...
  • 131 篇 department of ph...
  • 130 篇 indian institute...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 111 篇 e. migliore
  • 111 篇 p. avery
  • 111 篇 l. silvestris

语言

  • 3,797 篇 英文
  • 171 篇 其他
  • 69 篇 中文
  • 2 篇 日文
  • 1 篇 德文
检索条件"机构=Institute of Computer Network and Engineering"
4037 条 记 录,以下是221-230 订阅
排序:
FERI: Feature Enhancement and Relational Interaction for Image-text Matching  30
FERI: Feature Enhancement and Relational Interaction for Ima...
收藏 引用
30th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2024
作者: Zhang, Yu Zhang, Jianqiang Song, Gongpeng Lu, Qin Zhao, Shuo Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China Shandong Branch of China Mobile Communication Group Design Institute Co. Jinan China
Image-text matching is an important problem at the intersection of computer vision and natural language processing. It aims to establish the semantic link between image and text to achieve high-quality semantic alignm... 详细信息
来源: 评论
SMGC-SBERT: A Multi-Feature Fusion Chinese Short Text Similarity Computation Model Based on Optimised SBERT
SMGC-SBERT: A Multi-Feature Fusion Chinese Short Text Simila...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Zhao, Shuo Gu, Qiliang Zhang, Jianqiang Song, Gongpeng Lu, Qin Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Shandong Branch of China Mobile Communication Group Design Institute Co. Jinan China
Chinese short text similarity computation stands as a pivotal task within natural language processing, garnering significant attention. However, existing models grapple with limitations in handling intricate semantic ... 详细信息
来源: 评论
AdvTG: An Adversarial Traffic Generation Framework to Deceive DL-Based Malicious Traffic Detection Models  25
AdvTG: An Adversarial Traffic Generation Framework to Deceiv...
收藏 引用
34th ACM Web Conference, WWW 2025
作者: Sun, Peishuai Yun, Xiaochun Li, Shuhao Yin, Tao Si, Chengxiang Xie, Jiang Institute of Information Engineering Chinese Academy of Sciences School of Cyber Security University of Chinese Academy of Sciences Beijing China Zhongguancun Laboratory Beijing China National Computer Network Emergency Response Technical Team Coordination Center of China Beijing China
Deep learning-based (DL-based) malicious traffic detection models are effective but vulnerable to adversarial attacks. Existing adversarial attacks have shown promising results when targeting traffic detection models ... 详细信息
来源: 评论
Before Toasters Rise Up: A View into the Emerging DoH Resolver's Deployment Risk  28
Before Toasters Rise Up: A View into the Emerging DoH Resolv...
收藏 引用
28th IEEE Symposium on computers and Communications, ISCC 2023
作者: Qiu, Yuqi Li, Baiyang Li, Zhiqian Jiao, Liang Zhu, Yujia Liu, Qingyun Institute of Information Engineering Chinese Academy of Sciences China School of Cyber Security University of Chinese Academy of Sciences China Shandong Branch of National Computer Network Emergency Response Technical Team Coordination Center of China China
As an encryption protocol for DNS queries, DNS-over-HTTPS (DoH) is becoming increasingly popular, and it mainly addresses the last-mile privacy protection problem. However, the security of DoH is in urgent need of mea... 详细信息
来源: 评论
Clone-Resistant Secured Booting Based on Unknown Hashing Created in Self-Reconfigurable Platform  17th
Clone-Resistant Secured Booting Based on Unknown Hashing Cre...
收藏 引用
17th International Symposium on Applied Reconfigurable Computing, ARC 2021
作者: Zarrouk, Randa Mulhem, Saleh Adi, Weal Berekovic, Mladen Institute of Computer and Network Engineering Technical University of Braunschweig Braunschweig38106 Germany Institute of Computer Engineering University of Lübeck Lübeck23562 Germany
Deploying a physically unclonable trusted anchor is required for securing software running on embedded systems. Common mechanisms combine secure boot with either stored secret keys or keys extracted from a Physical Un... 详细信息
来源: 评论
Federated Learning for 6G:Applications,Challenges,and Opportunities
收藏 引用
engineering 2022年 第1期8卷 33-41页
作者: Zhaohui Yang Mingzhe Chen Kai-Kit Wong H.Vincent Poor Shuguang Cui Department of Electronic and Electrical Engineering University College LondonLondon WC1E 6BTUK Department of Electrical and Computer Engineering Princeton UniversityPrincetonNJ 08544USA Shenzhen Research Institute of Big Data The Chinese University of Hong KongShenzhen 518172China School of Science and Engineering and Future Network of Intelligence Institute The Chinese University of Hong KongShenzhen 518172China
Standard machine-learning approaches involve the centralization of training data in a data center,where centralized machine-learning algorithms can be applied for data analysis and ***,due to privacy restrictions and ... 详细信息
来源: 评论
Learning Rich Information for Quad Bayer Remosaicing and Denoising  17th
Learning Rich Information for Quad Bayer Remosaicing and D...
收藏 引用
17th European Conference on computer Vision, ECCV 2022
作者: Jia, Jun Sun, Hanchi Liu, Xiaohong Xiao, Longan Xu, Qihang Zhai, Guangtao Institute of Image Communication and Network Engineering Shanghai Jiao Tong University Shanghai China John Hopcroft Center for Computer Science Shanghai Jiao Tong University Shanghai China Shanghai Transsion Information Technology Shanghai China
In this paper, we propose a DNNs-based solution to jointly remosaic and denoise the camera raw data in Quad Bayer pattern. The traditional remosaic problem can be viewed as an interpolation process that converts the Q... 详细信息
来源: 评论
BECIA: a behaviour engineering-based approach for change impact analysis
收藏 引用
International Journal of Information Technology (Singapore) 2024年 第1期16卷 159-168页
作者: Anwer, Sajid Wen, Lian Zhang, Shaoyang Wang, Zhe Sun, Yong School of Information and Communication Technology Griffith University Brisbane Australia Institute for Integrated and Intelligent Systems (IIIS) Griffith University Brisbane Australia National University of Computer and Emerging Sciences Islamabad Pakistan School of Information Engineering Chang’an University Xi’an China Information and Network Management Chang’an University Xi’an China
This paper introduces Behaviour engineering-based Change Impact Analysis (BECIA), a novel approach to Change Impact Analysis (CIA). BECIA enables visualization of change impacts from modified requirements on architect... 详细信息
来源: 评论
A Rolling Bearing Fault Diagnosis Method Using Multi-Sensor Data and Periodic Sampling
A Rolling Bearing Fault Diagnosis Method Using Multi-Sensor ...
收藏 引用
2022 IEEE International Conference on Multimedia and Expo, ICME 2022
作者: Zheng, Jianbo Yang, Chao Zheng, Fangrong Jiang, Bin College of Computer Science and Electronic Engineering Hunan University China Key Laboratory for Embedded and Network Computing of Hunan Province China School of Computational Science and Electronics Hunan Institute of Engineering China
In recent years, bearing fault diagnosis based on deep learning has gradually become the mainstream. However, the existing studies still have some defects, such as unreasonable sampling and incomplete utilization of b... 详细信息
来源: 评论
Efficient Data Completion and Augmentation
Efficient Data Completion and Augmentation
收藏 引用
International Conference on Data Science and Advanced Analytics (DSAA)
作者: Antonina Krajewska Ewa Niewiadomska-Szynkiewicz Research and Academic Computer Network (NASK) Warsaw Poland Institute of Control and Computation Engineering Warsaw University of Technology Warsaw Poland
Fast data completion and augmentation methods with provable theoretical guarantees enable efficient and reliable data analysis. Many datasets can be represented as real-valued matrices and filled using matrix completi... 详细信息
来源: 评论