咨询与建议

限定检索结果

文献类型

  • 635 篇 期刊文献
  • 451 篇 会议

馆藏范围

  • 1,086 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 725 篇 工学
    • 454 篇 计算机科学与技术...
    • 359 篇 软件工程
    • 160 篇 信息与通信工程
    • 113 篇 电气工程
    • 97 篇 电子科学与技术(可...
    • 96 篇 控制科学与工程
    • 58 篇 生物工程
    • 57 篇 机械工程
    • 47 篇 光学工程
    • 42 篇 动力工程及工程热...
    • 37 篇 仪器科学与技术
    • 33 篇 生物医学工程(可授...
    • 32 篇 化学工程与技术
    • 28 篇 材料科学与工程(可...
    • 20 篇 建筑学
    • 20 篇 交通运输工程
    • 19 篇 土木工程
  • 458 篇 理学
    • 203 篇 数学
    • 188 篇 物理学
    • 65 篇 生物学
    • 54 篇 统计学(可授理学、...
    • 48 篇 系统科学
    • 42 篇 化学
    • 21 篇 大气科学
  • 216 篇 管理学
    • 132 篇 管理科学与工程(可...
    • 94 篇 图书情报与档案管...
    • 48 篇 工商管理
  • 37 篇 医学
    • 34 篇 临床医学
    • 25 篇 基础医学(可授医学...
  • 24 篇 法学
    • 20 篇 社会学
  • 18 篇 农学
  • 14 篇 经济学
  • 10 篇 文学
  • 9 篇 教育学
  • 3 篇 艺术学
  • 2 篇 哲学
  • 2 篇 军事学

主题

  • 28 篇 feature extracti...
  • 24 篇 deep learning
  • 22 篇 semantics
  • 19 篇 higgs bosons
  • 18 篇 hadron colliders
  • 17 篇 training
  • 14 篇 computer science
  • 14 篇 laboratories
  • 14 篇 wireless sensor ...
  • 14 篇 clustering algor...
  • 13 篇 convolution
  • 13 篇 optimization
  • 13 篇 data mining
  • 13 篇 computational mo...
  • 13 篇 accuracy
  • 12 篇 algorithm design...
  • 12 篇 top quark
  • 12 篇 information proc...
  • 11 篇 internet of thin...
  • 11 篇 image segmentati...

机构

  • 91 篇 faculty of scien...
  • 91 篇 departamento de ...
  • 91 篇 department for p...
  • 91 篇 institute of phy...
  • 90 篇 department of ph...
  • 90 篇 department of ph...
  • 90 篇 dipartimento di ...
  • 90 篇 yerevan physics ...
  • 90 篇 kirchhoff-instit...
  • 90 篇 institute of phy...
  • 89 篇 graduate school ...
  • 89 篇 physikalisches i...
  • 88 篇 department of ph...
  • 88 篇 physics departme...
  • 87 篇 institut für ast...
  • 87 篇 instituto de fís...
  • 87 篇 national researc...
  • 86 篇 fakultät für phy...
  • 86 篇 department of ph...
  • 85 篇 dipartimento di ...

作者

  • 82 篇 f. buehrer
  • 82 篇 a. t. law
  • 82 篇 c. alexa
  • 82 篇 j. m. izen
  • 82 篇 s. veneziano
  • 82 篇 d. di valentino
  • 82 篇 g. bella
  • 82 篇 j. strandberg
  • 82 篇 d. calvet
  • 82 篇 c. amelung
  • 82 篇 n. orlando
  • 82 篇 c. gumpert
  • 82 篇 h. a. gordon
  • 82 篇 y. tayalati
  • 82 篇 g. spigo
  • 82 篇 v. chiarella
  • 82 篇 f. siegert
  • 82 篇 a. c. könig
  • 82 篇 a. dimitrievska
  • 82 篇 f. deliot

语言

  • 957 篇 英文
  • 98 篇 其他
  • 37 篇 中文
检索条件"机构=Jiangsu Key Laboratory of Computer Information Process Technology"
1086 条 记 录,以下是481-490 订阅
排序:
Detecting and mitigating a sophisticated interest flooding attack in NDN from the network-wide view  1
Detecting and mitigating a sophisticated interest flooding a...
收藏 引用
1st International Workshop on Network Meets Intelligent Computations, NMIC 2019
作者: Cheng, Guang Zhao, Lixia Hu, Xiaoyan Zheng, Shaoqi Wu, Hua Li, Ruidong Fan, Chengyu School of Cyber Science and Engineering Southeast University Nanjing211189 China Key Laboratory of Computer Network and Information Integration Ministry of Education of China Southeast University China Key Laboratory of Computer Network Technology of Jiangsu Province China National Institute of Information and Communications Technology Tokyo184-8795 Japan Computer Science Department Colorado State University Fort Collins United States
Interest Flooding Attack (IFA) is one of the main security threats for the Named Data Networking (NDN). Most of its existing countermeasures enable intermediate routers near the attackers to independently detect the a... 详细信息
来源: 评论
Multipath based privacy protection method for data transmission in SDN  1st
Multipath based privacy protection method for data transmiss...
收藏 引用
1st EAI International Conference on Artificial Intelligence for Communications and Networks, AICON 2019
作者: Dong, Na Han, Zhigeng Wang, Liangmin School of Computer Science and Communication Engineering Jiangsu University Zhenjiang212013 China Jiangsu Key Laboratory of Security Technology for Industrial Cyberspace Zhenjiang China School of Information Engineering Nanjing Audit University Nanjing211815 China
With the development of Software-Defined Networking (SDN), privacy and security issues have become an urgent problem to be solved. Although there are many ways to solve these problems, the existing technology represen... 详细信息
来源: 评论
A Lexicographic Bi-objective Scheduling Problem From Steel Production Systems
收藏 引用
IFAC-PapersOnLine 2020年 第5期53卷 158-163页
作者: Ziyan Zhao MengChu Zhou Shixin Liu Xiwang Guo Haoyue Liu State Key Laboratory of Synthetical Automation for Process Industries College of Information Science and Engineering Northeastern University Shenyang 110819 China Department of Electrical and Computer Engineering New Jersey Institute of Technology Newark NJ 07102 USA College of Computer and Communication Engineering Liaoning Shihua University Fushun 113001 China
Wire rod and bar rolling is an essential process in a steel production system (SPS). This work considers a lexicographic bi-objective scheduling problem originated from it. As a medium process in SPS, both the impacts... 详细信息
来源: 评论
Self-Supervised Speech Denoising Using Only Noisy Audio Signals
arXiv
收藏 引用
arXiv 2021年
作者: Wu, Jiasong Li, Qingchun Yang, Guanyu Li, Lei Senhadji, Lotfi Shu, Huazhong LIST Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Nanjing210096 China Jiangsu Provincial Joint International Research Laboratory of Medical Information Processing Southeast University Nanjing210096 China RennesF-35042 France The 28th Research Institute of China Electronics Technology Group Corporation Nanjing210007 China Univ Rennes INSERM LTSI UMR 1099 RennesF-35042 France
In traditional speech denoising tasks, clean audio signals are often used as the training target, but absolutely clean signals are collected from expensive recording equipment or in studios with the strict environment... 详细信息
来源: 评论
Cryptanalysis of key Exchange Protocol Based on Tensor Ergodic Problem
收藏 引用
China Communications 2018年 第10期15卷 172-181页
作者: Chunsheng Gu Youyu Gu Peizhong Shi Chunpeng Ge Zhenjun Jing School of Computer Engineering Jiangsu University of Technology State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences School of Mathematics Hefei University of Technology
Recently, Mao, Zhang, Wu et al. constructed two key exchange(KE) protocols based on tensor ergodic problem(TEP). Although they conjectured that these constructions can potentially resist quantum computing attack, they... 详细信息
来源: 评论
Distributed Global Leader-Following Coordination of MASs with Heterogeneous Input Saturation: Scheduling Low-Gain Revisited
收藏 引用
Journal of the Franklin Institute 2025年 第11期362卷
作者: Xiaoling Wang Shengnan Zhu Juan Qian Housheng Su College of Automation & AI Nanjing University of Posts and Telecommunications and Jiangsu Engineering Lab for IOT Intelligent Robots (IOTRobot) Nanjing 210023 China Key Laboratory of Smart Manufacturing in Energy Chemical Process Ministry of Education East China University of Science and Technology Shanghai 200237 China Université Claude Bernard Lyon 1 CNRS LAGEPP UMR 5007 43 boulevard du 11 novembre 1918 F-69100 Villeurbanne France National Key Laboratory of Multispectral Information Intelligent Processing Technology School of Artificial Intelligence and Automation Huazhong University of Science and Technology Wuhan 430074 China
In this paper, we revisit the global coordinated tracking problem of the leader-following multi-agent systems with input saturation via the scheduling low-gain feedback technique, aiming to make breakthroughs from asp... 详细信息
来源: 评论
Novel implementation of defence strategy of relay attack based on cloud in RFID systems
收藏 引用
International Journal of information and computer Security 2019年 第2期11卷 120-144页
作者: Xu, He Shen, Weiwei Li, Peng Mayes, Keith Wang, Ruchuan Li, Dashen Yang, Shengxiang School of Computer Science and Technology School of Software Nanjing University of Posts and Telecommunications Nanjing210003 China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing210003 China Information Security Group School of Mathematics and Information Security Royal Holloway University of London Egham SurreyTW20 0EX United Kingdom
Radio frequency identification technology (RFID) is widely used in identity authentication and payment, and it also becomes an indispensable part of daily life. Cloud-based RFID systems have broad application prospect... 详细信息
来源: 评论
Topological refraction in dual-band valley sonic crystals
收藏 引用
Physical Review B 2021年 第14期103卷 144309-144309页
作者: Ding Jia Yong Ge Haoran Xue Shou-qi Yuan Hong-xiang Sun Yihao Yang Xiao-jun Liu Baile Zhang Research Center of Fluid Machinery Engineering and Technology School of Physics and Electronic Engineering School of Computer Science and Communication Engineering Jiangsu University Zhenjiang 212013 China Key Laboratory of Modern Acoustics National Laboratory of Solid State Microstructures Department of Physics and Collaborative Innovation Center of Advanced Microstructures Nanjing University Nanjing 210093 China Division of Physics and Applied Physics School of Physical and Mathematical Sciences Nanyang Technological University 21 Nanyang Link Singapore 637371 Singapore Interdisciplinary Center for Quantum Information State Key Laboratory of Modern Optical Instrumentation College of Information Science and Electronic Engineering Zhejiang University Hangzhou 310027 China Centre for Disruptive Photonic Technologies The Photonics Institute Nanyang Technological University 50 Nanyang Avenue Singapore 639798 Singapore
Valley pseudospins, as quantum states of energy extrema in momentum space, have been introduced from condensed-matter systems into classical sound systems, and several valley sonic crystals (VSCs) have been realized e... 详细信息
来源: 评论
Stability analysis for Takagi-Sugeno fuzzy systems with a periodically varying delay via a generalized allowable delay set partitioning approach
收藏 引用
Fuzzy Sets and Systems 2025年 518卷
作者: Yun Chen Xin Wang Yaqi Li Yunfei Qiu Shuangcheng Sun School of Transportation and Electrical Engineering Hunan University of Technology Zhuzhou 412007 China State Key Laboratory of Synthetical Automation for Process Industries Northeastern University Shenyang 110819 China School of Artificial Intelligence and State Key Laboratory of Disaster Prevention & Reduction for Power Grid Changsha University of Science and Technology Changsha 410114 China Department of Electrical Engineering Hunan Aviation Technical College Zhuzhou 412006 China National Innovation Center of Advanced Rail Transit Equipment Zhuzhou 412001 China School of Electrical and Information Engineering Jiangsu University Zhenjiang 212013 China
Recently, researchers have employed a monotone-delay-interval-based Lyapunov-Krasovskii functional (LKF) to investigate the delay-dependent stability of Takagi-Sugeno (T-S) fuzzy systems with a periodically varying de... 详细信息
来源: 评论
Identifying Alzheimer's disease-associated genes related to N6-methyladenosine modification as potential biomarkers through correlation analysis: A retrospective observational study
NeuroMarkers
收藏 引用
NeuroMarkers 2025年 第1期2卷
作者: Lin Yang Pengtao Zheng Cong Huang Chonghao Gao Xinping Pang Hui Liu Yanyu Wei Chaoyang Pang College of Computer Science Sichuan Normal University Chengdu Sichuan Province China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu Sichuan Province China School of Science Xi’an Jiaotong-Liverpool University Suzhou Jiangsu Province China National Key Laboratory of Science and Technology on Vacuum Electronics School of Electronic Science and Engineering University of Electronic Science and Technology of China Chengdu Sichuan Province China
Alzheimer's disease is a prevalent neurodegenerative disorder characterized by cognitive deficits and abnormal neurological activity. Recent evidence suggests that the pathogenesis of Alzheimer's disease may i... 详细信息
来源: 评论