咨询与建议

限定检索结果

文献类型

  • 701 篇 会议
  • 441 篇 期刊文献

馆藏范围

  • 1,142 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 692 篇 工学
    • 481 篇 计算机科学与技术...
    • 367 篇 软件工程
    • 198 篇 信息与通信工程
    • 114 篇 电气工程
    • 105 篇 电子科学与技术(可...
    • 83 篇 控制科学与工程
    • 62 篇 机械工程
    • 46 篇 仪器科学与技术
    • 42 篇 生物工程
    • 35 篇 网络空间安全
    • 28 篇 光学工程
    • 25 篇 动力工程及工程热...
    • 22 篇 生物医学工程(可授...
    • 19 篇 化学工程与技术
    • 19 篇 安全科学与工程
    • 17 篇 交通运输工程
  • 274 篇 理学
    • 156 篇 数学
    • 61 篇 物理学
    • 48 篇 生物学
    • 46 篇 统计学(可授理学、...
    • 25 篇 系统科学
    • 23 篇 化学
  • 177 篇 管理学
    • 121 篇 管理科学与工程(可...
    • 72 篇 图书情报与档案管...
    • 37 篇 工商管理
  • 37 篇 法学
    • 19 篇 社会学
    • 18 篇 法学
  • 30 篇 医学
    • 27 篇 临床医学
    • 20 篇 基础医学(可授医学...
    • 15 篇 公共卫生与预防医...
  • 14 篇 经济学
  • 13 篇 农学
  • 7 篇 军事学
  • 3 篇 教育学
  • 3 篇 艺术学
  • 2 篇 文学

主题

  • 80 篇 feature extracti...
  • 58 篇 accuracy
  • 52 篇 semantics
  • 46 篇 computational mo...
  • 41 篇 training
  • 39 篇 data models
  • 37 篇 wireless sensor ...
  • 33 篇 federated learni...
  • 28 篇 deep learning
  • 27 篇 data mining
  • 26 篇 transformers
  • 26 篇 neural networks
  • 25 篇 robustness
  • 21 篇 image segmentati...
  • 21 篇 predictive model...
  • 19 篇 visualization
  • 19 篇 privacy
  • 18 篇 convolution
  • 17 篇 object detection
  • 17 篇 measurement

机构

  • 204 篇 shandong provinc...
  • 198 篇 key laboratory o...
  • 59 篇 college of compu...
  • 58 篇 jiangsu high tec...
  • 45 篇 shandong enginee...
  • 37 篇 shandong fundame...
  • 32 篇 shandong provinc...
  • 22 篇 qilu university ...
  • 21 篇 school of comput...
  • 21 篇 provincial key l...
  • 21 篇 shandong provinc...
  • 20 篇 shandong provinc...
  • 19 篇 jiangsu provinci...
  • 18 篇 school of comput...
  • 18 篇 state key labora...
  • 17 篇 college of infor...
  • 17 篇 jiangsu provinci...
  • 17 篇 jiangsu engineer...
  • 15 篇 shandong provinc...
  • 15 篇 state key labora...

作者

  • 33 篇 wang ruchuan
  • 19 篇 xiaoming wu
  • 17 篇 yu fei
  • 13 篇 xiangzhi liu
  • 13 篇 guohua lv
  • 13 篇 xiao fu
  • 13 篇 chen yang
  • 12 篇 wang jin
  • 11 篇 sun lijuan
  • 11 篇 jing zhao
  • 11 篇 ruchuan wang
  • 11 篇 mingle zhou
  • 11 篇 wenpeng lu
  • 10 篇 xiaohui han
  • 10 篇 huang haiping
  • 10 篇 xin wang
  • 10 篇 wei zhang
  • 10 篇 wang ru-chuan
  • 9 篇 yue guangxue
  • 9 篇 guixin zhao

语言

  • 1,056 篇 英文
  • 47 篇 中文
  • 44 篇 其他
检索条件"机构=Jiangsu Provincial Key Laboratory of Computer Network Technology"
1142 条 记 录,以下是181-190 订阅
排序:
One-Hot Coding Similarity of Vehicle Routing Particle Swarm Optimizer  8th
One-Hot Coding Similarity of Vehicle Routing Particle Swarm ...
收藏 引用
8th International Conference on Artificial Intelligence and Security , ICAIS 2022
作者: He, CHao Li, Zhi Su, Shoubao Xu, Liukai Wang, Chishe School of Computer Jiangsu University of Science and Technology Zhenjiang212003 China Jiangsu Key Laboratory of Data Science and Smart Software Jinling Institute of Technology Nanjing211169 China Provincial Engineering Research Center of Digital Technology for Industrial Economic Jinling Institute of Technology Nanjing211169 China School of Computer Nanjing University of Posts and Telecommunications Nanjing210003 China
Aiming at the real-time problem of vehicle routing planning, an improved particle swarm optimization method, called AVSPSO, is proposed in this paper. In the method, the path similarity of vehicle routing is calculate... 详细信息
来源: 评论
An Early Detection Model of Prostate Cancer Based on MRI  9
An Early Detection Model of Prostate Cancer Based on MRI
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Liu, Yuankun Xing, Lumin Wang, Di Nie, Xin Zhang, Xueyan Wu, Di Liu, Wenjian The First Affiliated Hospital of Shandong First Medical University Shandong Provincial Qianfoshan Hospital Jinan China City University of Macau Faculty of Data Science China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China Chongqing Jianzhu College Chongqing China Shandong Youth University of Political Science School of Information Work Office Jinan China University of Southern Queensland School of Mathematics Physics and Computing QLD Australia
Prostate cancer is a prevalent form of cancer among men, with a high rate of occurrence but relatively lower mortality compared to other types of cancer. Early detection is crucial because it allows for earlier interv... 详细信息
来源: 评论
LDD-YOLO: An Improved Lightweight Detection Method for Steel Surface Defects Based on YOLOv8
LDD-YOLO: An Improved Lightweight Detection Method for Steel...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Yuechen Zhang Aimin Li Zhiyao Li Xiaotong Kong Wenqiang Li Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Steel is an indispensable raw material in the industrial field, steel surface defects seriously affect the quality of steel, in recent years a lot of research has been carried out on the detection of steel surface def... 详细信息
来源: 评论
Coherence entropy during propagation through complex media
收藏 引用
Advanced Photonics 2024年 第4期6卷 25-35页
作者: Xingyuan Lu Zhuoyi Wang Qiwen Zhan Yangjian Cai Chengliang Zhao Soochow University School of Physical Science and TechnologyJiangsu Key Laboratory of Frontier Material Physics and DevicesSuzhouChina University of Shanghai for Science and Technology School of Optical-Electrical and Computer EngineeringShanghaiChina Shandong Normal University School of Physics and ElectronicsShandong Provincial Engineering and Technical Center of Light ManipulationsShandong Provincial Key Laboratory of Optics and Photonic DeviceJinanChina East China Normal University Joint Research Center of Light Manipulation Science and Photonic Integrated Chip of East China Normal University and Shandong Normal UniversityShanghaiChina
The deformation,flicker,and drift of a light field owing to complex media such as a turbulent atmosphere have limited its practical ***,research on invariants in randomly fluctuated light fields has garnered considera... 详细信息
来源: 评论
A Privacy-Preserving Logistics Information System with Traceability  1
收藏 引用
13th International Symposium on Cyberspace Safety and Security, CSS 2021
作者: Chen, Quanru Han, Jinguang Li, Jiguo Chen, Liquan Li, Song College of Information Engineering Nanjing University of Finance and Economics Nanjing China Jiangsu Provincial Key Laboratory of E-Business Nanjing University of Finance and Economics Nanjing China College of Computer and Cyber Security Fujian Normal University Fuzhou China Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou China School of Cyber Science and Engineering Southeast University Nanjing China
Logistics Information System (LIS) is an interactive system that provides information for logistics managers to monitor and track logistics business. In recent years, with the rise of online shopping, LIS is becoming ... 详细信息
来源: 评论
FPPNet: Fast Privacy-Preserving Neural network via Three-Party Arithmetic Secret Sharing  15th
FPPNet: Fast Privacy-Preserving Neural Network via Three-Pa...
收藏 引用
15th EAI International Conference on Mobile Multimedia Communications, MobiMedia 2022
作者: Bi, Renwan Xiong, Jinbo Li, Qi Liu, Ximeng Tian, Youliang Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fujian Normal University Fuzhou350117 China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210023 China Key Laboratory of Cryptography of Zhejiang Province Hangzhou Normal University Hangzhou311121 China Key Laboratory of Information Security of Network Systems College of Mathematics and Computer Science Fuzhou University Fuzhou350108 China State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang550025 China
Jointing multi-source data for model training can improve the accuracy of neural network. To solve the raising privacy concerns caused by data sharing, data are generally encrypted and outsourced to a group of cloud s... 详细信息
来源: 评论
Enhancing Privacy-Preserving Federated Learning: A Robust and Resilient Approach
Enhancing Privacy-Preserving Federated Learning: A Robust an...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Zheng Yuan Youliang Tian Jinbo Xiong Linjie Wang State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang China Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fujian Normal University Fuzhou China Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies Shenzhen China School of Data Science Tongren University Tongren China
Federated learning has garnered considerable attention for its capacity to aggregate efficient and accurate models while preserving user’s data privacy. Nonetheless, conventional federated learning frameworks remain ... 详细信息
来源: 评论
OpenViewer: Openness-Aware Multi-View Learning
arXiv
收藏 引用
arXiv 2024年
作者: Du, Shide Fang, Zihan Tan, Yanchao Wang, Changwei Wang, Shiping Guo, Wenzhong College of Computer and Data Science Fuzhou University Fuzhou China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Jinan China
Multi-view learning methods leverage multiple data sources to enhance perception by mining correlations across views, typically relying on predefined categories. However, deploying these models in real-world scenarios... 详细信息
来源: 评论
Invulnerability Optimization of Communication network Based on Analog Attack Strategy  11th
Invulnerability Optimization of Communication Network Based ...
收藏 引用
11th International Conference on computer Engineering and networks, CENet2021
作者: Xia, Lingling Ni, Xueli Jing, Zhengjun Liu, Jiayin Zhang, Yan Department of Computer Information and Cyber Security Jiangsu Police Institute Nanjing210031 China College of Computer Engineering Jiangsu University of Technology Changzhou213001 China Jiangsu Province Electronic Data Forensics and Analysis Engineering Research Center Nanjing210031 China Key Laboratory of Digital Forensics of Jiangsu Provincial Public Security Department Nanjing210031 China
Invulnerability of communication networks directly related to security and reliability of networks has received increasing attention in recent years. In order to enhance the destruction resisting capacity of communica... 详细信息
来源: 评论
DCCT-Net: A network Combined Dynamic CNN and Transformer for Image Compressive Sensing
DCCT-Net: A Network Combined Dynamic CNN and Transformer for...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Lijuan Xu Haixiao Mei Fenghua Tong Dawei Zhao Fuqiang Yu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
Recent end-to-end image compressive sensing networks primarily use Convolutional Neural networks (CNNs) and Transformers, each with distinct limitations: CNNs struggle with global feature capture, while Transformers l... 详细信息
来源: 评论