咨询与建议

限定检索结果

文献类型

  • 709 篇 会议
  • 457 篇 期刊文献

馆藏范围

  • 1,166 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 711 篇 工学
    • 499 篇 计算机科学与技术...
    • 376 篇 软件工程
    • 202 篇 信息与通信工程
    • 118 篇 电气工程
    • 108 篇 电子科学与技术(可...
    • 91 篇 控制科学与工程
    • 62 篇 机械工程
    • 46 篇 仪器科学与技术
    • 42 篇 生物工程
    • 35 篇 网络空间安全
    • 28 篇 光学工程
    • 25 篇 动力工程及工程热...
    • 22 篇 生物医学工程(可授...
    • 20 篇 化学工程与技术
    • 19 篇 安全科学与工程
    • 17 篇 交通运输工程
  • 278 篇 理学
    • 159 篇 数学
    • 61 篇 物理学
    • 48 篇 生物学
    • 46 篇 统计学(可授理学、...
    • 25 篇 系统科学
    • 24 篇 化学
  • 180 篇 管理学
    • 122 篇 管理科学与工程(可...
    • 73 篇 图书情报与档案管...
    • 37 篇 工商管理
  • 37 篇 法学
    • 19 篇 社会学
    • 18 篇 法学
  • 31 篇 医学
    • 27 篇 临床医学
    • 21 篇 基础医学(可授医学...
    • 16 篇 公共卫生与预防医...
  • 14 篇 经济学
  • 13 篇 农学
  • 7 篇 军事学
  • 3 篇 教育学
  • 3 篇 艺术学
  • 2 篇 文学

主题

  • 80 篇 feature extracti...
  • 58 篇 accuracy
  • 52 篇 semantics
  • 46 篇 computational mo...
  • 41 篇 training
  • 39 篇 data models
  • 37 篇 wireless sensor ...
  • 34 篇 federated learni...
  • 28 篇 deep learning
  • 27 篇 data mining
  • 26 篇 transformers
  • 26 篇 neural networks
  • 25 篇 robustness
  • 21 篇 image segmentati...
  • 21 篇 predictive model...
  • 19 篇 visualization
  • 19 篇 privacy
  • 18 篇 convolution
  • 17 篇 object detection
  • 17 篇 measurement

机构

  • 205 篇 shandong provinc...
  • 204 篇 key laboratory o...
  • 59 篇 college of compu...
  • 58 篇 jiangsu high tec...
  • 45 篇 shandong enginee...
  • 39 篇 shandong fundame...
  • 32 篇 shandong provinc...
  • 26 篇 shandong provinc...
  • 22 篇 qilu university ...
  • 21 篇 school of comput...
  • 21 篇 provincial key l...
  • 20 篇 shandong provinc...
  • 19 篇 jiangsu provinci...
  • 18 篇 school of comput...
  • 18 篇 state key labora...
  • 17 篇 college of infor...
  • 17 篇 jiangsu provinci...
  • 17 篇 jiangsu engineer...
  • 16 篇 shandong provinc...
  • 16 篇 qilu university ...

作者

  • 33 篇 wang ruchuan
  • 19 篇 xiaoming wu
  • 17 篇 yu fei
  • 14 篇 chen yang
  • 13 篇 xiangzhi liu
  • 13 篇 guohua lv
  • 13 篇 xiao fu
  • 13 篇 mingle zhou
  • 12 篇 wang jin
  • 11 篇 sun lijuan
  • 11 篇 jing zhao
  • 11 篇 ruchuan wang
  • 11 篇 delong han
  • 11 篇 wang changwei
  • 11 篇 wenpeng lu
  • 10 篇 xiaohui han
  • 10 篇 gang li
  • 10 篇 huang haiping
  • 10 篇 min li
  • 10 篇 xin wang

语言

  • 1,052 篇 英文
  • 72 篇 其他
  • 47 篇 中文
检索条件"机构=Jiangsu Provincial Key Laboratory of Computer Network Technology"
1166 条 记 录,以下是271-280 订阅
排序:
A generalized reliability analysis of 3-ary n-cubes
A generalized reliability analysis of 3-ary n-cubes
收藏 引用
International Conference on Communication Software and networks, ICCSN
作者: Zefang Bai Guijuan Wang Meijie Ma School of Mathematics and Statistics Qilu University of Technology (Shandong Academy of Sciences) Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
Evaluating the reliability of interconnection networks is crucial. The edge-connectivity is a parameter used to assess reliability. In this paper, we discuss a conditional edge-connectivity called the h-extra g-compon... 详细信息
来源: 评论
Few-Shot Hyperspectral Image Classification with Spectral-Spatial Feature Fusion Based on Fuzzy Broad Learning System
Few-Shot Hyperspectral Image Classification with Spectral-Sp...
收藏 引用
IEEE International Conference on Image Processing
作者: Xiaopei Hu Guixin Zhao Aimei Dong Guohua Lv Yi Zhai Ying Guo Xiangjun Dong Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
In the few-shot hyperspectral image (HSI) classification, most current models don't fully utilize the advantage of spectral-spatial feature fusion, resulting in low classification accuracy. Therefore, we propose a...
来源: 评论
A Real-time Cutting Model Based on Finite Element and Order Reduction
收藏 引用
computer Systems Science & Engineering 2022年 第10期43卷 1-15页
作者: Xiaorui Zhang Wenzheng Zhang Wei Sun Hailun Wu Aiguo Song Sunil Kumar Jha Wuxi Research Institute Nanjing University of Information Science&TechnologyWuxi214100China Engineering Research Center of Digital Forensics Ministry of EducationJiangsu Engineering Center of Network MonitoringSchool of Computer and SoftwareNanjing University of Information Science&TechnologyNanjing210044China School of Automation Nanjing University of Information Science&TechnologyNanjing210044China State Key Laboratory of Bioelectronics Jiangsu Key Lab of Remote Measurement and ControlSchool of Instrument Science and EngineeringSoutheast UniversityNanjing210096China IT Fundamentals and Education Technologies Applications University of Information Technology and Management in RzeszowRzeszow Voivodeship100031Poland
Telemedicine plays an important role in Corona Virus Disease 2019(COVID-19).The virtual surgery simulation system,as a key component in telemedicine,requires to compute in ***,this paper proposes a realtime cutting mo... 详细信息
来源: 评论
Joint Extraction of Entities and Relationships from Cyber Threat Intelligence based on Task-specific Fourier network
Joint Extraction of Entities and Relationships from Cyber Th...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Haiqing Lv Xiaohui Han Hui Cui Peipei Wang Wenbo Zuo Yang Zhou Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Quan Cheng Laboratory Jinan China
The increasing complexity of cyber threats and the emergence of new attack technologies have brought huge challenges to attack incident analysis and source tracing. Using cyber threat intelligence to build a Cyber sec... 详细信息
来源: 评论
Ajsage: A Intrusion Detection Scheme Based on Jump-Knowledge Connection to Graphsage
SSRN
收藏 引用
SSRN 2024年
作者: Xu, Lijuan Zhao, ZiCheng Zhao, Dawei Li, Xin Lu, XiYu Yan, DingYu Qilu University of Technology Shandong Academy of Sciences Jinan250014 China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan250014 China National Computer Network Emergency Response Technology Processing Coordination Center Jinan250014 China
In the field of network security, attackers often utilize Advanced Persistent Threats (APT) to conduct host-based intrusions for prolonged information gathering, penetration and to cause serious damages. Recent studie... 详细信息
来源: 评论
Large Model-Based Data Augmentation for Imbalanced Text Classification
Large Model-Based Data Augmentation for Imbalanced Text Clas...
收藏 引用
Artificial Intelligence, networking and Information technology (AINIT), International Seminar on
作者: Dawei Zhang Rongxin Mi Peiyao Zhou Dawei Jin Manman Zhang Tianhang Song School of Computer Science Jiangsu University of Science and Technology Zhenjiang Jiangsu China National Computer Network Emergency Response Technical Team/Coordination Center of China Beijing China Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences (CAS) Beijing China
This study focuses on the application of large models to deal with imbalanced data problems in text classification. In view of the central position of text in web data and the negative impact of class imbalance on cla... 详细信息
来源: 评论
Natural Human Skin‑Inspired Wearable and Breathable Nanofiber‑based Sensors with Excellent Thermal Management Functionality
收藏 引用
Advanced Fiber Materials 2024年 第6期6卷 1955-1968页
作者: Peng Wang Xiaodan Li Guifen Sun Guoqing Wang Qing Han Chuizhou Meng Zhonghe Wei Yang Li School of Mechanical Engineering University of JinanJinan 250022China School of Information and Control Engineering China University of Mining and TechnologyXuzhou 221116China State Key Laboratory for Reliability and Intelligence of Electrical Equipment Engineering Research Center of Ministry of Education for Intelligent Rehabilitation Device and Detection TechnologyHebei Key Laboratory of Smart Sensing and Human‑Robot InteractionSchool of Mechanical EngineeringHebei University of TechnologyTianjin 300401China Shandong Provincial Key Laboratory of Network‑Based Intelligent Computing School of Information Science and EngineeringUniversity of JinanJinan 250022China Network Information Center Department of Computer ScienceQilu University of Technology(Shandong Academy of Sciences)Jinan 250353China School of Integrated Circuits Shandong UniversityJinan 250101China
Wearable sensors have been rapidly developed for application in various human monitoring ***,the wearing comfort and thermal properties of these devices have been largely ignored,and these characteristics urgently nee... 详细信息
来源: 评论
PTGFI: A Prompt-Based Two-Stage Generative Framework for Function Name Inference
PTGFI: A Prompt-Based Two-Stage Generative Framework for Fun...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Menglu Wang Xiaohui Han Peipei Wang Wenbo Zuo Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Quan Cheng Laboratory Jinan China
In the field of cybersecurity, analyzing malicious software or programs is crucial for preventing network attacks. Malicious code often exists in a stripped binary form to thwart analysis, presenting challenges for an... 详细信息
来源: 评论
Performance Analysis for Intrusion Target Detection in Wireless Sensor networks
收藏 引用
Chinese Journal of Electronics 2023年 第4期20卷 725-729页
作者: FAN Gaojuan WANG Ruchuan HUANG Haiping SUN Lijuan XIAO Fu College of Computer Nanjing University of Posts and Telecommunications Nanjing China School of Computer and Information Engineering Henan University Kaifeng China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing China Key Laboratory of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education of Jiangsu Province Nanjing China
Target detection and field surveillance are among the most prominent applications of wireless sensor networks. The quality of detection achieved by a sensor network can be quantified by evaluating the probability of d... 详细信息
来源: 评论
A Multiple-Image Authentication Method Based on Phase-Only Hologram and Logistic Map
SSRN
收藏 引用
SSRN 2024年
作者: Liansheng, Sui Zishan, Jiang Haiwei, Lu Zhaolin, Xiao Tianyu, Zeng School of Computer Science and Engineering Xi’an University of Technology Xi’an710048 China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an710048 China Hebei Normal University Shijiazhuang050024 China Hebei Provincial Key Laboratory of Information Fusion and Intelligent Control Shijiazhuang050024 China
An interesting security method for multiple-image authentication scheme is proposed based on computer-generated holograms and logistic map. First, each original image is encoded as the complex-valued hologram under th... 详细信息
来源: 评论