咨询与建议

限定检索结果

文献类型

  • 700 篇 会议
  • 452 篇 期刊文献

馆藏范围

  • 1,152 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 704 篇 工学
    • 492 篇 计算机科学与技术...
    • 373 篇 软件工程
    • 202 篇 信息与通信工程
    • 120 篇 电气工程
    • 106 篇 电子科学与技术(可...
    • 89 篇 控制科学与工程
    • 65 篇 机械工程
    • 46 篇 仪器科学与技术
    • 42 篇 生物工程
    • 37 篇 网络空间安全
    • 28 篇 光学工程
    • 25 篇 动力工程及工程热...
    • 22 篇 生物医学工程(可授...
    • 21 篇 安全科学与工程
    • 19 篇 化学工程与技术
    • 19 篇 交通运输工程
  • 279 篇 理学
    • 158 篇 数学
    • 62 篇 物理学
    • 48 篇 生物学
    • 48 篇 统计学(可授理学、...
    • 26 篇 系统科学
    • 24 篇 化学
  • 186 篇 管理学
    • 127 篇 管理科学与工程(可...
    • 76 篇 图书情报与档案管...
    • 39 篇 工商管理
  • 39 篇 法学
    • 20 篇 法学
    • 19 篇 社会学
  • 34 篇 医学
    • 29 篇 临床医学
    • 22 篇 基础医学(可授医学...
    • 18 篇 公共卫生与预防医...
  • 16 篇 经济学
  • 13 篇 农学
  • 7 篇 军事学
  • 4 篇 教育学
  • 3 篇 艺术学
  • 2 篇 文学

主题

  • 80 篇 feature extracti...
  • 58 篇 accuracy
  • 51 篇 semantics
  • 45 篇 computational mo...
  • 41 篇 training
  • 39 篇 data models
  • 37 篇 wireless sensor ...
  • 33 篇 federated learni...
  • 29 篇 deep learning
  • 27 篇 data mining
  • 26 篇 transformers
  • 26 篇 neural networks
  • 25 篇 robustness
  • 22 篇 image segmentati...
  • 21 篇 predictive model...
  • 19 篇 visualization
  • 19 篇 privacy
  • 18 篇 convolution
  • 17 篇 object detection
  • 17 篇 measurement

机构

  • 204 篇 shandong provinc...
  • 198 篇 key laboratory o...
  • 59 篇 college of compu...
  • 58 篇 jiangsu high tec...
  • 45 篇 shandong enginee...
  • 38 篇 shandong fundame...
  • 32 篇 shandong provinc...
  • 22 篇 qilu university ...
  • 21 篇 school of comput...
  • 21 篇 provincial key l...
  • 21 篇 shandong provinc...
  • 20 篇 shandong provinc...
  • 19 篇 jiangsu provinci...
  • 18 篇 school of comput...
  • 18 篇 state key labora...
  • 17 篇 college of infor...
  • 17 篇 jiangsu provinci...
  • 17 篇 jiangsu engineer...
  • 16 篇 shandong fundame...
  • 15 篇 shandong provinc...

作者

  • 33 篇 wang ruchuan
  • 19 篇 xiaoming wu
  • 17 篇 yu fei
  • 13 篇 xiangzhi liu
  • 13 篇 guohua lv
  • 13 篇 xiao fu
  • 13 篇 chen yang
  • 12 篇 wang jin
  • 11 篇 sun lijuan
  • 11 篇 jing zhao
  • 11 篇 ruchuan wang
  • 11 篇 mingle zhou
  • 11 篇 wenpeng lu
  • 10 篇 huang haiping
  • 10 篇 xin wang
  • 10 篇 wei zhang
  • 10 篇 wang ru-chuan
  • 9 篇 yue guangxue
  • 9 篇 guixin zhao
  • 9 篇 li zhiqun

语言

  • 1,061 篇 英文
  • 49 篇 其他
  • 47 篇 中文
检索条件"机构=Jiangsu Provincial Key Laboratory of Computer Network Technology"
1152 条 记 录,以下是1-10 订阅
排序:
Blockchain and signcryption enabled asynchronous federated learning framework in fog computing
收藏 引用
Digital Communications and networks 2025年 第2期11卷 442-454页
作者: Zhou Zhou Youliang Tian Jinbo Xiong Changgen Peng Jing Li Nan Yang State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fujian Normal University Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology
Federated learning combines with fog computing to transform data sharing into model sharing, which solves the issues of data isolation and privacy disclosure in fog computing. However, existing studies focus on centra... 详细信息
来源: 评论
GSA-DT: A Malicious Traffic Detection Model Based on Graph Self-Attention network and Decision Tree
收藏 引用
IEEE Transactions on network and Service Management 2025年 第2期22卷 2059-2073页
作者: Cai, Saihua Tang, Han Chen, Jinfu Lv, Tianxiang Zhao, Wenjun Huang, Chunlei Jiangsu University School of Computer Science and Communication Engineering Zhenjiang212013 China Jiangsu Provincial Key Laboratory of Industrial Cyberspace Security Technology Zhenjiang212013 China
Malicious attack has shown a rapid growth in recent years, it is very important to accurately detect malicious traffic to defend against malicious attacks. Compared with machine learning and deep learning technologies... 详细信息
来源: 评论
THL: Fast Targeted High Utility Itemset Mining within Length Consideration
Journal of Network Intelligence
收藏 引用
Journal of network Intelligence 2025年 第1期10卷 541-558页
作者: Xu, Peiming Jiang, Yixin Kuang, Xiaoyun Luo, Yu Chen, Jiahui Guangdong Provincial Key Laboratory of Power System Network Security CSG Guangzhou510000 China School of Computer Science and Technology Guangdong University of Technology Guangzhou510006 China
High utility itemset mining is a research topic of the pattern mining domain, which has been widely applied in reality during the past decade. Although most high utility itemset mining algorithms show significant exec... 详细信息
来源: 评论
Fusion of Time-Frequency Features in Contrastive Learning for Shipboard Wind Speed Correction
收藏 引用
Journal of Ocean University of China 2025年 第2期24卷 377-386页
作者: SONG Jian HUANG Meng LI Xiang ZHANG Zhenqiang WANG Chunxiao ZHAO Zhigang Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science Center(National Supercomputer Center in Jinan)Qilu University of Technology(Shandong Academy of Sciences)Jinan 250000China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer ScienceJinan 250000China
Accurate wind speed measurements on maritime vessels are crucial for weather forecasting,sea state prediction,and safe ***,vessel motion and challenging environmental conditions often affect measurement *** address th... 详细信息
来源: 评论
Multiple Edge Data Integrity Verification With Multi-Vendors and Multi-Servers in Mobile Edge Computing
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第6期24卷 4668-4683页
作者: Islam, Md Rashedul Xiang, Yong Uddin, Md Palash Zhao, Yao Kua, Jonathan Gao, Longxiang Deakin University School of Information Technology GeelongVIC3220 Australia Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250316 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan250014 China
Ensuring Edge Data Integrity (EDI) is imperative in providing reliable and low-latency services in mobile edge computing. Existing EDI schemes typically address single-vendor (App Vendor, AV) single-server (Edge Serve... 详细信息
来源: 评论
Edge-Cloud Cooperation-Driven Intelligent Sustainability Evaluation Strategy Based on IoT and CPS for Energy-Intensive Manufacturing Industries
收藏 引用
IEEE Internet of Things Journal 2025年 第9期12卷 12287-12297页
作者: Ma, Shuaiyin Huang, Yuming Chen, Yanping Xiao, Qinge Xu, Jun Leng, Jiewu Xi’an University of Posts and Telecommunications Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi’an Key Laboratory of Big Data and Intelligent Computing School of Computer Science and Technology Xi’an710121 China Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Shenzhen518055 China Xidian University Advanced Manufacturing Technology Innovation Center Guangzhou Institute of Technology Guangzhou510555 China Guangdong University of Technology Guangdong Provincial Key Laboratory of Computer Integrated Manufacturing System State Key Laboratory of Precision Electronic Manufacturing Technology and Equipment Guangzhou510006 China
The advancement of the Industry 5.0 in information technology has led to increased interest in integrating edge-cloud cooperation with Internet of Things (IoT) and cyber-physical system (CPS) designs. This integration... 详细信息
来源: 评论
MDGCN-Lt:Fair Web API Classification with Sparse and Heterogeneous Data Based on Deep GCN
收藏 引用
清华大学学报自然科学版(英文版) 2025年 第3期30卷 1294-1314页
作者: Boyuan Yan Yankun Zhang Wenwen Gong Haoyang Wan Wenwei Wang Weiyi Zhong Caixia Bu Department of School of Computer Science Qufu Normal UniversityRizhao 276500China Shandong Provincial University Laboratory for Protected Horticulture Weifang University of Science and TechnologyWeifang 261000China Department of Computer Science and Technology Tsinghua UniversityBeijing 100084China Shandong Provincial Key Laboratory of Network Based Intelligent Computing University of JinanJinan 250022China Department of Univalsoft Joint Stock Co. Ltd.Weifang 261000China
Developers integrate web Application Programming Interfaces(APIs)into edge applications,enabling data expansion to the edge computing area for comprehensive coverage of devices in that *** develop edge applications,de... 详细信息
来源: 评论
A hybrid blockchain and machine learning approach for intrusion detection system in Industrial Internet of Things
收藏 引用
Alexandria Engineering Journal 2025年 127卷 619-627页
作者: Song, Wu Zhu, Xiangyuan Ren, Sheng Tan, Wenxue Peng, Yibo School of Computer and Electrical Engineering Hunan University of Arts and Science Hunan Changde 415000 China Hunan Provincial Key Laboratory of Network Investigational Technology Hunan Police Academy Hunan Changsha 410138 China
The Industrial Internet of Things (IIoT) is a key component of Industry 4.0, which enables manufacturing to be automated and data collected in real-time. Edge IoT devices are subject to cybersecurity threats and unaut... 详细信息
来源: 评论
k-TEVS: A k-Times E-Voting Scheme on Blockchain With Supervision
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年 第3期22卷 2326-2337页
作者: Liu, Yang He, Debiao Luo, Min Wang, Lianhai Peng, Cong Wuhan University School of Cyber Science and Engineering Wuhan430072 China Shenzhen Institute of Information Technology Institute of Information Technology Shenzhen518172 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250014 China Matrix Elements Technologies Shanghai Technology Innovation Centre of Distributed Privacy-Preserving Artificial Intelligence Shanghai200232 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250014 China
Thee-vote is regarded as a waytoexpress the opinion that the voters ask for. Actually, the e-vote could be applied wildly likequestionnaire,***,thecoexistences of efficiency and security as well as transparency and pr... 详细信息
来源: 评论
Source-free Domain Adaptation with Multiple Alignment for Efficient Image Retrieval
Source-free Domain Adaptation with Multiple Alignment for Ef...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Ni, Jinghui Cui, Hui Zhao, Lihai Li, Fengling Han, Xiaohui Xu, Lijuan Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science China Quan Cheng Laboratory China Shandong Open University China University of Technology Sydney Australia
Domain adaptation techniques help models generalize to target domains by addressing domain discrepancies between the source and target domain data distributions. These techniques are particularly valuable for cross-do... 详细信息
来源: 评论