咨询与建议

限定检索结果

文献类型

  • 709 篇 会议
  • 457 篇 期刊文献

馆藏范围

  • 1,166 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 711 篇 工学
    • 499 篇 计算机科学与技术...
    • 376 篇 软件工程
    • 202 篇 信息与通信工程
    • 118 篇 电气工程
    • 108 篇 电子科学与技术(可...
    • 91 篇 控制科学与工程
    • 62 篇 机械工程
    • 46 篇 仪器科学与技术
    • 42 篇 生物工程
    • 35 篇 网络空间安全
    • 28 篇 光学工程
    • 25 篇 动力工程及工程热...
    • 22 篇 生物医学工程(可授...
    • 20 篇 化学工程与技术
    • 19 篇 安全科学与工程
    • 17 篇 交通运输工程
  • 278 篇 理学
    • 159 篇 数学
    • 61 篇 物理学
    • 48 篇 生物学
    • 46 篇 统计学(可授理学、...
    • 25 篇 系统科学
    • 24 篇 化学
  • 180 篇 管理学
    • 122 篇 管理科学与工程(可...
    • 73 篇 图书情报与档案管...
    • 37 篇 工商管理
  • 37 篇 法学
    • 19 篇 社会学
    • 18 篇 法学
  • 31 篇 医学
    • 27 篇 临床医学
    • 21 篇 基础医学(可授医学...
    • 16 篇 公共卫生与预防医...
  • 14 篇 经济学
  • 13 篇 农学
  • 7 篇 军事学
  • 3 篇 教育学
  • 3 篇 艺术学
  • 2 篇 文学

主题

  • 80 篇 feature extracti...
  • 58 篇 accuracy
  • 52 篇 semantics
  • 46 篇 computational mo...
  • 41 篇 training
  • 39 篇 data models
  • 37 篇 wireless sensor ...
  • 34 篇 federated learni...
  • 28 篇 deep learning
  • 27 篇 data mining
  • 26 篇 transformers
  • 26 篇 neural networks
  • 25 篇 robustness
  • 21 篇 image segmentati...
  • 21 篇 predictive model...
  • 19 篇 visualization
  • 19 篇 privacy
  • 18 篇 convolution
  • 17 篇 object detection
  • 17 篇 measurement

机构

  • 205 篇 shandong provinc...
  • 204 篇 key laboratory o...
  • 59 篇 college of compu...
  • 58 篇 jiangsu high tec...
  • 45 篇 shandong enginee...
  • 39 篇 shandong fundame...
  • 32 篇 shandong provinc...
  • 26 篇 shandong provinc...
  • 22 篇 qilu university ...
  • 21 篇 school of comput...
  • 21 篇 provincial key l...
  • 20 篇 shandong provinc...
  • 19 篇 jiangsu provinci...
  • 18 篇 school of comput...
  • 18 篇 state key labora...
  • 17 篇 college of infor...
  • 17 篇 jiangsu provinci...
  • 17 篇 jiangsu engineer...
  • 16 篇 shandong provinc...
  • 16 篇 qilu university ...

作者

  • 33 篇 wang ruchuan
  • 19 篇 xiaoming wu
  • 17 篇 yu fei
  • 14 篇 chen yang
  • 13 篇 xiangzhi liu
  • 13 篇 guohua lv
  • 13 篇 xiao fu
  • 13 篇 mingle zhou
  • 12 篇 wang jin
  • 11 篇 sun lijuan
  • 11 篇 jing zhao
  • 11 篇 ruchuan wang
  • 11 篇 delong han
  • 11 篇 wang changwei
  • 11 篇 wenpeng lu
  • 10 篇 xiaohui han
  • 10 篇 gang li
  • 10 篇 huang haiping
  • 10 篇 min li
  • 10 篇 xin wang

语言

  • 1,052 篇 英文
  • 72 篇 其他
  • 47 篇 中文
检索条件"机构=Jiangsu Provincial Key Laboratory of Computer Network Technology"
1166 条 记 录,以下是161-170 订阅
排序:
Source-free Domain Adaptation with Multiple Alignment for Efficient Image Retrieval
Source-free Domain Adaptation with Multiple Alignment for Ef...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Jinghui Ni Hui Cui Lihai Zhao Fengling Li Xiaohui Han Lijuan Xu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Quan Cheng Laboratory Shandong Open University University of Technology Sydney
Domain adaptation techniques help models generalize to target domains by addressing domain discrepancies between the source and target domain data distributions. These techniques are particularly valuable for cross-do... 详细信息
来源: 评论
Research on Wireless Channel Modeling for Complex Water Surface Environments
Research on Wireless Channel Modeling for Complex Water Surf...
收藏 引用
2023 International Conference on Intelligent Communication and networking, ICN 2023
作者: Li, Xujie Ge, Tianzhang Wei, Baochao Li, Haotian Xu, Ning Jiangsu Health Development Research Center Nanjing210036 China Nhc Contraceptives Adverse Reaction Surveillance Center Nanjing210036 China Jiangsu Provincial Medical Key Laboratory of Fertility Protection and Health Technology Assessment Nanjing210036 China Hohai University College of Computer and Information Nanjing210098 China
Accurate and efficient channel modeling has always been a critical foundation for the deployment and application of 5G communication technology. To meet the requirements of continuous and extensive coverage in 5G, hig... 详细信息
来源: 评论
UAV Swarm Path Planning for Sensor Data Collection via Double Pre-Partitioned Deep Q-network
收藏 引用
IEEE Sensors Journal 2025年
作者: Zhang, Heng Gao, Yuan Wang, Xin He, Yunpeng Yang, Ming Wu, Xiaoming Yang, Chaoqun Cao, Xianghui Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250014 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250014 China Jiangsu Ocean University School of Computer Engineering Lianyungang222000 China Southeast University School of Automation Nanjing210096 China
Collision-free path planning is a significant challenge in deploying unmanned aerial vehicle (UAV) swarms for sensor data collection tasks, particularly in uncertain environments. This paper addresses the problem of d... 详细信息
来源: 评论
Investigation of Solar Noise in Underwater Wireless Optical Communication Systems
Investigation of Solar Noise in Underwater Wireless Optical ...
收藏 引用
2023 International Conference on Intelligent Communication and networking, ICN 2023
作者: Li, Xujie Wei, Baochao Ge, Tianzhang Li, Haotian Xu, Ning Jiangsu Health Development Research Center Nanjing210036 China Nhc Contraceptives Adverse Reaction Surveillance Center Nanjing210036 China Jiangsu Provincial Medical Key Laboratory of Fertility Protection and Health Technology Assessment Nanjing210036 China Hohai University College of Computer and Information Nanjing210098 China
Solar noise as an innegligible interference in underwater wireless optical communication (UWOC) systems is a significant concern. But there are no studies on the Channel Impulse Response (CIR) in the presence of solar... 详细信息
来源: 评论
Lightweight Federated Learning Secure Aggregation Protocols
Lightweight Federated Learning Secure Aggregation Protocols
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Xianyu Mu Youliang Tian Zhou Zhou Jinbo Xiong State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang China Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fujian Normal University Fuzhou China Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies Shenzhen China
With the increasing awareness of user privacy protection and the improvement of domestic and international privacy protection laws, coalitional learning has become the current machine learning framework to protect use... 详细信息
来源: 评论
A Triangular Stable Node network based on Self-supervised Learning for personalized prediction
A Triangular Stable Node Network based on Self-supervised Le...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Liu, Qing Gao, Qian Fan, Jun Zhang, Zhiqiang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan250014 China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology Shandong Academy of Sciences Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan250014 China China Telecom Digital Intelligence Techonology Co Ltd. No.1999 Shunhua road Shandong Jinan250101 China
In recent years, research has illuminated the potency of implicit data processing in enhancing user preferences. Nevertheless, barriers remain in breaking through the constraints of implicit information. This study ai... 详细信息
来源: 评论
Parallel Pattern Matching over Brotli Compressed network Traffic
Parallel Pattern Matching over Brotli Compressed Network Tra...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Xiuwen Sun Guangzheng Zhang Di Wu Qingying Yu Jie Cui Hong Zhong School of Computer Science and Technology Anhui University Anhui Provincial Key Laboratory of Network and Information Security Anhui Normal Unviersity
Pattern matching is a crucial technique for network traffic detection applications. As a fundamental computation model used by pattern matching, the finite state automata execute sequential matching due to the state d... 详细信息
来源: 评论
A DoS-attack Resilient Control Approach for AIOT-enabled Systems
A DoS-attack Resilient Control Approach for AIOT-enabled Sys...
收藏 引用
2023 International Conference on Artificial Intelligence of Things and Systems, AIoTSys 2023
作者: Cao, Xiaoya Chen, Zhenya Liu, Weisheng Liu, Yuanlong Wang, Wenting Wang, Xin Yang, Ming Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China State Grid Shandong Electric Power Company Jinan China State Grid Shandong Electric Power Research Institute Jinan China
This paper presents a novel controller design for dealing with the challenges posed by Denial-of-Service (DoS) attacks in the context of Artificial Intelligence of Things (AIOT). The proposed design employs a predicti... 详细信息
来源: 评论
FM-FCN:A Neural network with Filtering Modules for Accurate Vital Signs Extraction
收藏 引用
Research 2025年 第1期2024卷 92-106页
作者: Fangfang Zhu Qichao Niu Xiang Li Qi Zhao Honghong Su Jianwei Shuai Department of Physics and Fujian Provincial Key Laboratory for Soft Functional Materials ResearchXiamen UniversityXiamen 361005China National Institute for Data Science in Health and Medicine and State Key Laboratory of Cellular Stress BiologyInnovation Center for Cell Signaling NetworkXiamen UniversityXiamen 361005China Vitalsilicon Technology Co.Ltd. JiaxingZhejiang 314006China School of Computer Science and Software Engineering University of Science and Technology LiaoningAnshan 114051China Yangtze Delta Region Institute of Tsinghua University ZhejiangJiaxing 314006China Wenzhou Institute University of Chinese Academy of SciencesWenzhou 325001China Oujiang Laboratory (Zhejiang Lab for Regenerative Medicine Vision and Brain Health)Wenzhou 325001China
Neural networks excel at capturing local spatial patterns through convolutional modules,but they may struggle to identify and effectively utilize the morphological and amplitude periodic nature of physiological *** th... 详细信息
来源: 评论
Regularization Mixup Adversarial Training: A Defense Strategy for Membership Privacy with Model Availability Assurance
Regularization Mixup Adversarial Training: A Defense Strateg...
收藏 引用
Big Data and Privacy Computing (BDPC), International Conference on
作者: Zehua Ding Youliang Tian Guorong Wang Jinbo Xiong State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang China Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fujian Normal University Fuzhou China
Neural network models face two highly destructive threats in real-world applications: membership inference attacks (MIAs) and adversarial attacks (AAs). One compromises the model's confidentiality, leading to memb... 详细信息
来源: 评论