咨询与建议

限定检索结果

文献类型

  • 701 篇 会议
  • 444 篇 期刊文献

馆藏范围

  • 1,145 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 695 篇 工学
    • 483 篇 计算机科学与技术...
    • 368 篇 软件工程
    • 198 篇 信息与通信工程
    • 116 篇 电气工程
    • 105 篇 电子科学与技术(可...
    • 83 篇 控制科学与工程
    • 62 篇 机械工程
    • 46 篇 仪器科学与技术
    • 42 篇 生物工程
    • 35 篇 网络空间安全
    • 28 篇 光学工程
    • 25 篇 动力工程及工程热...
    • 22 篇 生物医学工程(可授...
    • 19 篇 化学工程与技术
    • 19 篇 安全科学与工程
    • 17 篇 交通运输工程
  • 275 篇 理学
    • 156 篇 数学
    • 62 篇 物理学
    • 48 篇 生物学
    • 46 篇 统计学(可授理学、...
    • 25 篇 系统科学
    • 23 篇 化学
  • 177 篇 管理学
    • 121 篇 管理科学与工程(可...
    • 72 篇 图书情报与档案管...
    • 37 篇 工商管理
  • 38 篇 法学
    • 19 篇 法学
    • 19 篇 社会学
  • 30 篇 医学
    • 27 篇 临床医学
    • 20 篇 基础医学(可授医学...
    • 15 篇 公共卫生与预防医...
  • 14 篇 经济学
  • 13 篇 农学
  • 7 篇 军事学
  • 3 篇 教育学
  • 3 篇 艺术学
  • 2 篇 文学

主题

  • 80 篇 feature extracti...
  • 58 篇 accuracy
  • 52 篇 semantics
  • 46 篇 computational mo...
  • 42 篇 training
  • 39 篇 data models
  • 37 篇 wireless sensor ...
  • 33 篇 federated learni...
  • 28 篇 deep learning
  • 27 篇 data mining
  • 26 篇 transformers
  • 26 篇 neural networks
  • 25 篇 robustness
  • 21 篇 image segmentati...
  • 21 篇 predictive model...
  • 20 篇 visualization
  • 19 篇 privacy
  • 18 篇 convolution
  • 17 篇 object detection
  • 17 篇 measurement

机构

  • 204 篇 shandong provinc...
  • 198 篇 key laboratory o...
  • 59 篇 college of compu...
  • 58 篇 jiangsu high tec...
  • 45 篇 shandong enginee...
  • 37 篇 shandong fundame...
  • 32 篇 shandong provinc...
  • 22 篇 qilu university ...
  • 21 篇 school of comput...
  • 21 篇 provincial key l...
  • 21 篇 shandong provinc...
  • 20 篇 shandong provinc...
  • 19 篇 jiangsu provinci...
  • 18 篇 school of comput...
  • 18 篇 state key labora...
  • 17 篇 college of infor...
  • 17 篇 jiangsu provinci...
  • 17 篇 jiangsu engineer...
  • 15 篇 shandong provinc...
  • 15 篇 state key labora...

作者

  • 33 篇 wang ruchuan
  • 19 篇 xiaoming wu
  • 17 篇 yu fei
  • 13 篇 xiangzhi liu
  • 13 篇 guohua lv
  • 13 篇 xiao fu
  • 13 篇 chen yang
  • 12 篇 wang jin
  • 11 篇 sun lijuan
  • 11 篇 jing zhao
  • 11 篇 ruchuan wang
  • 11 篇 mingle zhou
  • 11 篇 wenpeng lu
  • 10 篇 xiaohui han
  • 10 篇 huang haiping
  • 10 篇 xin wang
  • 10 篇 wei zhang
  • 10 篇 wang ru-chuan
  • 9 篇 yue guangxue
  • 9 篇 guixin zhao

语言

  • 1,059 篇 英文
  • 47 篇 中文
  • 44 篇 其他
检索条件"机构=Jiangsu Provincial Key Laboratory of Computer Network Technology"
1145 条 记 录,以下是111-120 订阅
排序:
A Parallelizable Counterfactual Generation Method Based on Gradient Optimization  29
A Parallelizable Counterfactual Generation Method Based on G...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Ding, Haorun Jiang, Xuesong Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Quan Cheng Laboratory Jinan China State Key Laboratory of High-end Server and Storage Technology Jinan China
Post-hoc explanations are important for people to understand the predictions of explanation models. One class of methods in post-hoc explanation is the generation of counterfactuals, where a hypothetical example is ob... 详细信息
来源: 评论
GAF-GAN: Gated Attention Feature Fusion Image Inpainting network Based on Generative Adversarial network  29
GAF-GAN: Gated Attention Feature Fusion Image Inpainting Net...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Qiu, Ran Liang, Hu Liu, Yuchen Zhao, Shengrong Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Qilu University of Technology Shandong Academy of Sciences Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
Image inpainting, which aims to reconstruct reasonably clear and realistic images from known pixel information, is one of the core problems in computer vision. However, due to the complexity and variability of the und... 详细信息
来源: 评论
Trusted Auditing of Data Operation Behaviors in Cloud based on Blockchain and TEE  21
Trusted Auditing of Data Operation Behaviors in Cloud based ...
收藏 引用
21st IEEE International Symposium on Parallel and Distributed Processing with Applications, 13th IEEE International Conference on Big Data and Cloud Computing, 16th IEEE International Conference on Social Computing and networking and 13th International Conference on Sustainable Computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Xu, Shujiang Wang, Fansheng Wang, Lianhai Mihaljevic, Miodrag J. Zhang, Shuhui Shao, Wei Huang, Qihao Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Mathematical Institute The Serbian Academy of Sciences and Arts Belgrade Serbia Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
With the rapid development of the new generation of information technologies, including cloud computing, 5G, and the Internet of Things, data outsourcing storage in the cloud has brought great convenience to data stor... 详细信息
来源: 评论
A Data Security Protection Method for Deep Neural network Model Based on Mobility and Sharing  18th
A Data Security Protection Method for Deep Neural Network Mo...
收藏 引用
18th International Conference on Green, Pervasive, and Cloud Computing, GPC 2023
作者: Zhao, Xinjian Li, Qianmu Wang, Qi Chen, Shi Li, Tengfei Li, Nianzhe State Grid Jiangsu Information and Telecommunication Company Jiangsu Nanjing210024 China School of Computer Science and Engineering Nanjing University of Science and Technology Jiangsu Nanjing210094 China State Grid Smart Grid Research Institute Co. Ltd. Jiangsu Nanjing210003 China State Grid Key Laboratory of Information and Network Security Jiangsu Nanjing210003 China
With the rapid development of digital economy, numerous business scenarios, such as smart grid, energy network, intelligent transportation, etc., require the design and distribution of deep neural network (DNN) models... 详细信息
来源: 评论
BAV-DSS: Blockchain Assisted Verifiable Data Sharing Scheme with Fast Encryption and Outsourced Decryption for IoT  24th
BAV-DSS: Blockchain Assisted Verifiable Data Sharing Scheme ...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Huang, Yao Yu, Zhongyuan Wang, Guijuan Chai, Baobao Zhang, Hongliang Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan250353 China School of Information Science and Engineering Lanzhou University Lanzhou730000 China School of Computer Science and Engineering Shandong University of Science and Technology Qingdao266590 China
Many sophisticated cloud platforms are available to provide services such as storage and computation for Internet of Things (IoT) applications. However, with the concerns about the semi-trusted nature of cloud platfor... 详细信息
来源: 评论
Visible Light Positioning Method for Indoor Line-of-Sight Scene Based on Time Series Coding  9
Visible Light Positioning Method for Indoor Line-of-Sight Sc...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Yu, Yonghao Guo, Yongde Zhao, Dawei Fu, Kexue Tang, Yongwei Wang, Qinyuan City University of Macau Faculty of Data Science China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Shandong University School of Mechanical Engineering Key Laboratory of High Efficiency and Clean Mechanical Manufacture Ministry of Education Jinan China
Existing indoor visible light positioning methods, such as those based on fingerprint database algorithms, are complex to construct and consume significant resources. In response to this issue, the text proposes an en... 详细信息
来源: 评论
Coverage Enhancement Strategy Based on Novel Perception and Co-Evolution for Multimedia Sensor networks
收藏 引用
Chinese Journal of Electronics 2023年 第1期22卷 135-140页
作者: Fu Xiao Jing Wang Lijuan Sun Ruchuan Wang Jian Guo College of Computer Nanjing University of Posts and Telecommunications Nanjing China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou China Key Laboratory of Broadband Wireless Communication and Sensor Network Technology Ministry of Education Nanjing China
Coverage enhancement is one of the hot research topics in wireless multimedia sensor networks. A novel Coverage-enhancing algorithm based on three-dimensional Directional perception and co-evolution (DPCCA) is propose... 详细信息
来源: 评论
A Verifiable Privacy-Preserving Outsourced Prediction Scheme Based on Blockchain in Smart Healthcare
A Verifiable Privacy-Preserving Outsourced Prediction Scheme...
收藏 引用
2023 IEEE International Conference on E-Health networking, Application and Services, Healthcom 2023
作者: Li, Ta Tian, Youliang Xiong, Jinbo Wang, Linjie College of Computer Science and Technology Guizhou University State Key Laboratory of Public Big Data Guiyang550025 China College of Computer and Cyber Security Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Normal University Fuzhou350117 China School of Data Science Tongren University Tongren554300 China
The swift progression of the Internet of Things and the extensive integration of machine learning have spurred the growth of intelligent healthcare. Many intelligent healthcare devices, limited by their own computing ... 详细信息
来源: 评论
An improved Criminisi method for image inpainting  2
An improved Criminisi method for image inpainting
收藏 引用
2022 2nd International Conference on Electrical, Electronics and Computing technology, EECT 2022
作者: Li, C. Chen, H. Han, X. Pan, X. Niu, D. Shandong Provincial Key Laboratory Of Network Based Intelligent Computing University Of Jinan China School Of Computer Science And Technology Shandong University Of Finance And Economics China
The Criminisi method is a classical image inpainting method, which has flaw of unreasonable priority calculation. To overcome this flaw, we propose an improved Criminisi method. To improve the accuracy of a repaired b... 详细信息
来源: 评论
PSRAKA: Physically Secure and Robust Authenticated key Agreement for VANETs
收藏 引用
IEEE Transactions on Vehicular technology 2024年 第5期74卷 7953-7968页
作者: Liu, Gao Li, Hao Liang, Yangfan Le, Junqing Wang, Ning Mu, Nankun Liu, Zhiquan Liu, Yining Xiang, Tao Chongqing University College of Computer Science Chongqing400044 China Jiaxing University Provincial Key Laboratory of Multimodal Perceiving and Intelligent Systems The Institute of Information Network and Artificial Intelligence The Key Laboratory of Medical Electronics and Digital Health of Zhejiang Province The Engineering Research Center of Intelligent Human Health Situation Awareness of Zhejiang Province Jiaxing314001 China Jinan University College of Cyber Security Guangzhou510632 China Wenzhou University of Technology School of Data Science and Artificial Intelligence Wenzhou325000 China
Authenticated key agreement (AKA) allows vehicles and road side units (RSUs) to mutually authenticate and establish shared session keys, which can be implemented to secure vehicular ad-hoc networks (VANETs). However, ... 详细信息
来源: 评论