咨询与建议

限定检索结果

文献类型

  • 706 篇 会议
  • 453 篇 期刊文献

馆藏范围

  • 1,159 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 704 篇 工学
    • 492 篇 计算机科学与技术...
    • 379 篇 软件工程
    • 198 篇 信息与通信工程
    • 117 篇 电气工程
    • 105 篇 电子科学与技术(可...
    • 84 篇 控制科学与工程
    • 62 篇 机械工程
    • 48 篇 仪器科学与技术
    • 42 篇 生物工程
    • 35 篇 网络空间安全
    • 30 篇 光学工程
    • 25 篇 动力工程及工程热...
    • 22 篇 生物医学工程(可授...
    • 20 篇 化学工程与技术
    • 19 篇 安全科学与工程
    • 18 篇 交通运输工程
  • 280 篇 理学
    • 157 篇 数学
    • 64 篇 物理学
    • 48 篇 生物学
    • 46 篇 统计学(可授理学、...
    • 25 篇 系统科学
    • 24 篇 化学
  • 181 篇 管理学
    • 124 篇 管理科学与工程(可...
    • 73 篇 图书情报与档案管...
    • 38 篇 工商管理
  • 37 篇 法学
    • 19 篇 社会学
    • 18 篇 法学
  • 29 篇 医学
    • 26 篇 临床医学
    • 19 篇 基础医学(可授医学...
  • 14 篇 经济学
    • 14 篇 应用经济学
  • 13 篇 农学
  • 7 篇 军事学
  • 4 篇 教育学
  • 3 篇 艺术学
  • 2 篇 文学

主题

  • 80 篇 feature extracti...
  • 58 篇 accuracy
  • 52 篇 semantics
  • 46 篇 computational mo...
  • 42 篇 training
  • 39 篇 data models
  • 37 篇 wireless sensor ...
  • 33 篇 federated learni...
  • 27 篇 deep learning
  • 27 篇 data mining
  • 26 篇 transformers
  • 26 篇 neural networks
  • 25 篇 robustness
  • 21 篇 image segmentati...
  • 21 篇 predictive model...
  • 19 篇 visualization
  • 19 篇 privacy
  • 18 篇 convolution
  • 17 篇 object detection
  • 17 篇 measurement

机构

  • 205 篇 shandong provinc...
  • 202 篇 key laboratory o...
  • 59 篇 college of compu...
  • 58 篇 jiangsu high tec...
  • 45 篇 shandong enginee...
  • 39 篇 shandong fundame...
  • 32 篇 shandong provinc...
  • 23 篇 shandong provinc...
  • 22 篇 qilu university ...
  • 21 篇 school of comput...
  • 21 篇 provincial key l...
  • 20 篇 shandong provinc...
  • 19 篇 jiangsu provinci...
  • 18 篇 school of comput...
  • 18 篇 state key labora...
  • 17 篇 college of infor...
  • 17 篇 jiangsu provinci...
  • 17 篇 jiangsu engineer...
  • 16 篇 shandong provinc...
  • 16 篇 qilu university ...

作者

  • 33 篇 wang ruchuan
  • 19 篇 xiaoming wu
  • 17 篇 yu fei
  • 13 篇 xiangzhi liu
  • 13 篇 guohua lv
  • 13 篇 xiao fu
  • 13 篇 chen yang
  • 13 篇 mingle zhou
  • 13 篇 wang jin
  • 11 篇 sun lijuan
  • 11 篇 jing zhao
  • 11 篇 ruchuan wang
  • 11 篇 delong han
  • 11 篇 wenpeng lu
  • 10 篇 xiaohui han
  • 10 篇 gang li
  • 10 篇 huang haiping
  • 10 篇 min li
  • 10 篇 xin wang
  • 10 篇 wang changwei

语言

  • 1,051 篇 英文
  • 66 篇 其他
  • 47 篇 中文
检索条件"机构=Jiangsu Provincial Key Laboratory of Computer Network Technology"
1159 条 记 录,以下是211-220 订阅
排序:
Rotational Doppler effect using ultra-dense vector perfect vortex beams
收藏 引用
Photonics Research 2025年 第2期13卷 468-476页
作者: JIANBO GAO XINGYUAN LU XUECHUN ZHAO ZHUOYI WANG JUNAN ZHU ZHIQUAN HU JINGJING HE QIWEN ZHAN YANGJIAN CAI CHENGLIANG ZHAO School of Physical Science and Technology Jiangsu Key Laboratory of Frontier Material Physics and DevicesSoochow UniversitySuzhou 215006China School of Optical-Electrical and Computer Engineering University of Shanghai for Science and TechnologyShanghai 200093China Shandong Provincial Engineering and Technical Center of Light Manipulations&Shandong Provincial Key Laboratory of Optics and Photonic Device School of Physics and ElectronicsShandong Normal UniversityJinan 250358China Shandong Joint Research Center of Light Manipulation Science and Photonics Integrated Chip of East China Normal University and Shandong Normal University East China Normal UniversityShanghai 200241China
The rotational Doppler effect holds significant potential for remote sensing of rotating objects due to its real-time performance and non-contact advantages.A single-ring beam is used to measure rotation *** enhance t... 详细信息
来源: 评论
Tourist Attraction Recommendation System Based on Django and Collaborative Filtering  1st
Tourist Attraction Recommendation System Based on Django and...
收藏 引用
1st International Conference on Applied Intelligence, ICAI 2023
作者: Jiang, Yufeng Zhang, Yushu Li, Zhujun Yu, Wendong Wei, Hongwei Yuan, Lin Shandong Jinan250353 China Shandong Jinan250353 China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Shandong Jinan250353 China School of Art Nantong University Jiangsu Nantong226019 China Jinan Springs Patent and Trademark Office Shandong Jinan250014 China Shandong Tianyi Information Technology Co. Ltd. Jinan Shandong250101 China
Recently, with the development of social and economic levels and people's pursuit of quality of life, tourism has become the first choice for more and more people. However, the traditional travel agency-based tour... 详细信息
来源: 评论
Topology Uncertainty Modeling For Imbalanced Node Classification on Graphs
Topology Uncertainty Modeling For Imbalanced Node Classifica...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Jiayi Gao Jiaxing Li Ke Zhang Youyong Kong Jiangsu Provincial Joint International Research Laboratory of Medical Information Processing School of Computer Science and Engineering Southeast University Nanjing China Ministry of Education Key Laboratory of Computer Network and Information Integration Southeast University Nanjing China
Most existing graph neural networks work under a class-balanced assumption, while ignoring class-imbalanced scenarios that widely exist in real-world graphs. Although there are many methods in other fields that can al... 详细信息
来源: 评论
Reputation based Adaptive Federated Learning in Medical Scenarios
Reputation based Adaptive Federated Learning in Medical Scen...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Lianhai Wang Tianrui Liu Yingxiaochun Wang Xinlei Wang Qi Li Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
Federated Learning (FL) is a distributed machine learning paradigm designed to address data silos and protect data privacy. However, in medical scenarios, the heterogeneity in data quality and the non-independent and ... 详细信息
来源: 评论
ID-YOLOv7: A Method for Steel Surface Defect Detection Combining Residual Attention and Dynamic Upsampling
ID-YOLOv7: A Method for Steel Surface Defect Detection Combi...
收藏 引用
Smart World Congress (SWC), IEEE
作者: Shanshan Liu Xiangzhi Liu Jiazheng Man Bingyang Cao Yunfeng Dong Xiaoming Wu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
Industrial defect detection is a crucial challenge in computer vision. The accuracy of detecting defects on steel surfaces is hindered by spatially varying noise. To address this challenge, we propose an efficient met... 详细信息
来源: 评论
Topgformer: Topological-Based Graph Transformer for Mapping Brain Structural Connectivity to Functional Connectivity
Topgformer: Topological-Based Graph Transformer for Mapping ...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Dalu Guo Ke Zhang Jiaxing Li Youyong Kong Jiangsu Provincial Joint International Research Laboratory of Medical Information Processing School of Computer Science and Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Nanjing China
Exploring the mapping between structural connectivity (SC) and functional connectivity (FC) is of essential importance to understanding the working mechanism of the human brain. Traditional methods are difficult to re... 详细信息
来源: 评论
LCLB: Low Cross-Chain Transaction Ratio and Load Balancing for Blockchain Sharding
LCLB: Low Cross-Chain Transaction Ratio and Load Balancing f...
收藏 引用
Robotics, Intelligent Control and Artificial Intelligence (RICAI), International Conference on
作者: Yu Wang Xiaoming Wu Qile Yuan Yunfeng Dong Xiangzhi Liu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
As blockchain technology becomes widely applied, handling high volumes of transactions has become a critical challenge. Sharding has emerged as an effective solution to enhance the throughput of blockchain systems. Ye... 详细信息
来源: 评论
A Blockchain-Based Hierarchical Dynamic Collaborative Storage Model
A Blockchain-Based Hierarchical Dynamic Collaborative Storag...
收藏 引用
Smart World Congress (SWC), IEEE
作者: Qile Yuan Xiangzhi Liu Yu Wang Yunfeng Dong Haoyu Jia Xiaoming Wu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
The pervasive application of blockchain technology has led to a significant increase in data volume, presenting significant challenges to existing storage architectures in environments characterized by large volumes o... 详细信息
来源: 评论
Lightweight Malicious Encrypted Traffic Detection Method Based on KL Image Compression
Lightweight Malicious Encrypted Traffic Detection Method Bas...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Yuecheng Wen Xiaotong Li Haiqing Lv Menglu Wang Wenbo Zuo Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Timely and accurate detection of and response to potentially malicious encrypted traffic is crucial in cybersecurity strategies. Convolutional neural network-based approaches that convert traffic loads into images for... 详细信息
来源: 评论
Improvement in the Transferability of Target Adversarial Examples Based on Data Augmentation
Improvement in the Transferability of Target Adversarial Exa...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Kun Wang Xing Jin Fuqiang Wang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Despite the high performance of deep neural networks in image classification, they are very sensitive to those adversarial examples with small perturbations, which is likely to cause classification errors. Currently, ... 详细信息
来源: 评论