咨询与建议

限定检索结果

文献类型

  • 416 篇 会议
  • 287 篇 期刊文献

馆藏范围

  • 703 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 425 篇 工学
    • 279 篇 计算机科学与技术...
    • 213 篇 软件工程
    • 135 篇 信息与通信工程
    • 79 篇 电子科学与技术(可...
    • 55 篇 控制科学与工程
    • 54 篇 光学工程
    • 51 篇 电气工程
    • 39 篇 生物工程
    • 32 篇 仪器科学与技术
    • 31 篇 机械工程
    • 26 篇 网络空间安全
    • 19 篇 安全科学与工程
    • 17 篇 生物医学工程(可授...
    • 14 篇 动力工程及工程热...
    • 14 篇 化学工程与技术
    • 13 篇 材料科学与工程(可...
    • 13 篇 交通运输工程
    • 9 篇 航空宇航科学与技...
  • 202 篇 理学
    • 95 篇 数学
    • 63 篇 物理学
    • 42 篇 生物学
    • 30 篇 系统科学
    • 29 篇 统计学(可授理学、...
    • 24 篇 化学
  • 118 篇 管理学
    • 76 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 28 篇 工商管理
  • 19 篇 医学
    • 15 篇 临床医学
    • 13 篇 基础医学(可授医学...
  • 9 篇 经济学
    • 9 篇 应用经济学
  • 8 篇 法学
  • 3 篇 教育学
  • 2 篇 军事学

主题

  • 26 篇 semantics
  • 24 篇 computer network...
  • 21 篇 timing
  • 21 篇 real time system...
  • 20 篇 delay
  • 18 篇 computational mo...
  • 18 篇 feature extracti...
  • 16 篇 throughput
  • 16 篇 bandwidth
  • 16 篇 performance anal...
  • 15 篇 quality of servi...
  • 15 篇 processor schedu...
  • 14 篇 robustness
  • 12 篇 wireless sensor ...
  • 12 篇 algorithm design...
  • 12 篇 protocols
  • 11 篇 optimization
  • 11 篇 predictive model...
  • 11 篇 embedded system
  • 11 篇 hardware

机构

  • 35 篇 institute of ima...
  • 25 篇 hubei key labora...
  • 24 篇 school of comput...
  • 24 篇 jd explore acade...
  • 20 篇 institute of com...
  • 19 篇 national enginee...
  • 18 篇 school of comput...
  • 17 篇 school of comput...
  • 17 篇 institute of com...
  • 16 篇 the university o...
  • 15 篇 hubei luojia lab...
  • 12 篇 national enginee...
  • 12 篇 institute of art...
  • 12 篇 national enginee...
  • 11 篇 hubei key labora...
  • 10 篇 school of comput...
  • 9 篇 key laboratory o...
  • 9 篇 school of comput...
  • 9 篇 national enginee...
  • 8 篇 department of co...

作者

  • 72 篇 du bo
  • 36 篇 tao dacheng
  • 26 篇 liu juhua
  • 21 篇 zhai guangtao
  • 20 篇 ernst rolf
  • 18 篇 rolf ernst
  • 17 篇 bo du
  • 17 篇 ding liang
  • 17 篇 r. ernst
  • 16 篇 zhong qihuang
  • 14 篇 陈景标
  • 12 篇 luo yong
  • 12 篇 min xiongkuo
  • 11 篇 yang yang
  • 11 篇 liu weiwei
  • 11 篇 weiwei liu
  • 10 篇 shen li
  • 10 篇 zhang liangpei
  • 9 篇 hu ruimin
  • 9 篇 mang ye

语言

  • 657 篇 英文
  • 37 篇 其他
  • 7 篇 中文
  • 1 篇 德文
  • 1 篇 日文
检索条件"机构=Institute of Computer and communication Network Engineering"
703 条 记 录,以下是31-40 订阅
排序:
Parameter Disparities Dissection for Backdoor Defense in Heterogeneous Federated Learning  38
Parameter Disparities Dissection for Backdoor Defense in Het...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Huang, Wenke Ye, Mang Shi, Zekun Wan, Guancheng Li, He Du, Bo National Engineering Research Center for Multimedia Software Institute of Artificial Intelligence Hubei Key Laboratory of Multimedia and Network Communication Engineering School of Computer Science Wuhan University Wuhan China Taikang Center for Life and Medical Sciences Wuhan University Wuhan China
Backdoor attacks pose a serious threat to federated systems, where malicious clients optimize on the triggered distribution to mislead the global model towards a predefined target. Existing backdoor defense methods ty...
来源: 评论
Double-Blockchain Assisted Secure and Anonymous Data Aggregation for Fog-Enabled Smart Grid
收藏 引用
engineering 2022年 第1期8卷 159-169页
作者: Siguang Chen Li Yang Chuanxin Zhao Vijayakumar Varadarajan Kun Wang Jiangsu Key Lab of Broadband Wireless Communication and Internet of Things Nanjing University of Posts and TelecommunicationsNanjing 210003China Jiangsu Engineering Research Center of Communication and Network Technology Nanjing University of Posts and TelecommunicationsNanjing 210003China Anhui Provincial Key Laboratory of Network and Information Security Anhui Normal UniversityWuhu 241000China School of Computer Science and Engineering Vellore Institute of TechnologyChennai 600127India Department of Electrical and Computer Engineering University of CaliforniaLos AngelesCA 90095USA
As a future energy system,the smart grid is designed to improve the efficiency of traditional power systems while providing more stable and reliable ***,this efficient and reliable service relies on collecting and ana... 详细信息
来源: 评论
FedSSP: Federated Graph Learning with Spectral Knowledge and Personalized Preference  38
FedSSP: Federated Graph Learning with Spectral Knowledge and...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Tan, Zihan Wan, Guancheng Huang, Wenke Ye, Mang National Engineering Research Center for Multimedia Software Institute of Artificial Intelligence Hubei Key Laboratory of Multimedia and Network Communication Engineering School of Computer Science Wuhan University Wuhan China Taikang Center for Life and Medical Sciences Wuhan University Wuhan China
Personalized Federated Graph Learning (pFGL) facilitates the decentralized training of Graph Neural networks (GNNs) without compromising privacy while accommodating personalized requirements for non-IID participants. ...
来源: 评论
Knowledge Graph Augmented network Towards Multiview Representation Learning for Aspect-Based Sentiment Analysis
收藏 引用
IEEE Transactions on Knowledge and Data engineering 2023年 第10期35卷 10098-10111页
作者: Zhong, Qihuang Ding, Liang Liu, Juhua Du, Bo Jin, Hua Tao, Dacheng Wuhan University National Engineering Research Center for Multimedia Software Institute of Artificial Intelligence School of Computer Science Hubei Key Laboratory of Multimedia and Network Communication Engineering Hubei Wuhan430072 China Jd Explore Academy at *** Beijing100101 China Wuhan University Research Center for Graphic Communication Printing and Packaging Institute of Artificial Intelligence Hubei Wuhan430072 China Hospital of Kunming University of Science and Technology Kunming650032 China
Aspect-based sentiment analysis (ABSA) is a fine-grained task of sentiment analysis. To better comprehend long complicated sentences and obtain accurate aspect-specific information, linguistic and commonsense knowledg... 详细信息
来源: 评论
The Proof is in the Pudding: Decision-Oriented Machine-Type Wireless Video Transmission
The Proof is in the Pudding: Decision-Oriented Machine-Type ...
收藏 引用
2024 IEEE Global communications Conference, GLOBECOM 2024
作者: Song, Jie Gao, Yun Wu, Dan Zhou, Liang Qian, Yi Nanjing University of Posts and Telecommunications Ministry of Education Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing China Army Engineering University of Pla Institute of Communications Engineering Nanjing China University of Nebraska-Lincoln Department of Electrical and Computer Engineering Lincoln United States
With the rise of the Internet of Everything, machine-type wireless video applications like intelligent surveillance are increasingly becoming mainstream network services. However, the massive transmission of video str... 详细信息
来源: 评论
A Theory of Transfer-Based Black-Box Attacks: Explanation and Implications  37
A Theory of Transfer-Based Black-Box Attacks: Explanation an...
收藏 引用
37th Conference on Neural Information Processing Systems, NeurIPS 2023
作者: Chen, Yanbo Liu, Weiwei School of Computer Science Wuhan University National Engineering Research Center for Multimedia Software Wuhan University Institute of Artificial Intelligence Wuhan University Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University
Transfer-based attacks [1] are a practical method of black-box adversarial attacks in which the attacker aims to craft adversarial examples from a source model that is transferable to the target model. Many empirical ...
来源: 评论
Diverse Co-saliency Feature Learning for Text-Based Person Retrieval
收藏 引用
IEEE Transactions on Information Forensics and Security 2025年 20卷 5465-5477页
作者: You, Shuai Chen, Cuiqun Feng, Yujian Liu, Hai Ji, Yimu Ye, Mang Nanjing University of Posts and Telecommunications (NJUPT) School of Internet of Things Nanjing China Anhui University School of Computer Science and Technology Hefei China South China Normal University school of computer Guangdong China NJUPT School of Computer Science Nanjing China Wuhan University National Engineering Research Center for Multimedia Software Hubei Key Laboratory of Multimedia and Network Communication Engineering Institute of Artificial Intelligence School of Computer Science Wuhan 430072 China
Text-based Person Retrieval (TPR) plays a pivotal role in video surveillance systems for safeguarding public safety. As a fine-grained retrieval task, TPR faces the significant challenge of precisely capturing highly ... 详细信息
来源: 评论
Adversarial Self-Training Improves Robustness and Generalization for Gradual Domain Adaptation  37
Adversarial Self-Training Improves Robustness and Generaliza...
收藏 引用
37th Conference on Neural Information Processing Systems, NeurIPS 2023
作者: Shi, Lianghe Liu, Weiwei School of Computer Science Wuhan University National Engineering Research Center for Multimedia Software Wuhan University Institute of Artificial Intelligence Wuhan University Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University
Gradual Domain Adaptation (GDA), in which the learner is provided with additional intermediate domains, has been theoretically and empirically studied in many contexts. Despite its vital role in security-critical scen...
来源: 评论
Cycle Self-Refinement for Multi-Source Domain Adaptation  38
Cycle Self-Refinement for Multi-Source Domain Adaptation
收藏 引用
38th AAAI Conference on Artificial Intelligence, AAAI 2024
作者: Zhou, Chaoyang Wang, Zengmao Du, Bo Luo, Yong School of Computer Science Wuhan University China National Engineering Research Center for Multimedia Software Wuhan University China Institute of Artificial Intelligence Wuhan University China Key Laboratory of Multimedia and Network Communication Engineering Wuhan University China Hubei Luojia Laboratory China
Multi-source domain adaptation (MSDA) aims to transfer knowledge from multiple source domains to the unlabeled target domain. In this paper, we propose a cycle self-refinement domain adaptation method, which progressi... 详细信息
来源: 评论
Lattice-Based Cryptography and NTRU: Quantum-Resistant Encryption Algorithms  4
Lattice-Based Cryptography and NTRU: Quantum-Resistant Encry...
收藏 引用
4th International Conference on Emerging Systems and Intelligent Computing, ESIC 2024
作者: Nisha, F. Lenin, J. Saravanan, S.K. Rohit, V. Robin Selvam, P.D. Rajmohan, M. Cmr University School of Engineering and Technology Computer Science & Engineering Karnataka Bengaluru India Alliance University Alliance College of Engineering and Design Department of Computer Science & Engineering Karnataka Bengaluru India Simats Saveetha School of Engineering Department of BigData and Network Security Tamil Nadu Chennai India Presidency University Computer Science & Engineering School of Computer Science & Engineering and Information Science Karnataka Bengaluru India Vel Tech High Tech Dr.Rangarajan Dr.Sakunthala Engineering College Department of Electronics and Communication Engineering Tamil Nadu Chennai India Hindustan Institute of Technology and Science Department of Electronics and Communication Engineering Tamil Nadu Chennai India
The quantum-resistant qualities of various encryption methods, such as N-th degree Truncated polynomial Ring Units (NTRU) Encrypt, NTRU Sign, Ring-Lizard, and Kyber protocols are becoming more important in light of th... 详细信息
来源: 评论