咨询与建议

限定检索结果

文献类型

  • 706 篇 会议
  • 453 篇 期刊文献

馆藏范围

  • 1,159 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 704 篇 工学
    • 492 篇 计算机科学与技术...
    • 379 篇 软件工程
    • 198 篇 信息与通信工程
    • 117 篇 电气工程
    • 105 篇 电子科学与技术(可...
    • 84 篇 控制科学与工程
    • 62 篇 机械工程
    • 48 篇 仪器科学与技术
    • 42 篇 生物工程
    • 35 篇 网络空间安全
    • 30 篇 光学工程
    • 25 篇 动力工程及工程热...
    • 22 篇 生物医学工程(可授...
    • 20 篇 化学工程与技术
    • 19 篇 安全科学与工程
    • 18 篇 交通运输工程
  • 280 篇 理学
    • 157 篇 数学
    • 64 篇 物理学
    • 48 篇 生物学
    • 46 篇 统计学(可授理学、...
    • 25 篇 系统科学
    • 24 篇 化学
  • 181 篇 管理学
    • 124 篇 管理科学与工程(可...
    • 73 篇 图书情报与档案管...
    • 38 篇 工商管理
  • 37 篇 法学
    • 19 篇 社会学
    • 18 篇 法学
  • 29 篇 医学
    • 26 篇 临床医学
    • 19 篇 基础医学(可授医学...
  • 14 篇 经济学
    • 14 篇 应用经济学
  • 13 篇 农学
  • 7 篇 军事学
  • 4 篇 教育学
  • 3 篇 艺术学
  • 2 篇 文学

主题

  • 80 篇 feature extracti...
  • 58 篇 accuracy
  • 52 篇 semantics
  • 46 篇 computational mo...
  • 42 篇 training
  • 39 篇 data models
  • 37 篇 wireless sensor ...
  • 33 篇 federated learni...
  • 27 篇 deep learning
  • 27 篇 data mining
  • 26 篇 transformers
  • 26 篇 neural networks
  • 25 篇 robustness
  • 21 篇 image segmentati...
  • 21 篇 predictive model...
  • 19 篇 visualization
  • 19 篇 privacy
  • 18 篇 convolution
  • 17 篇 object detection
  • 17 篇 measurement

机构

  • 205 篇 shandong provinc...
  • 202 篇 key laboratory o...
  • 59 篇 college of compu...
  • 58 篇 jiangsu high tec...
  • 45 篇 shandong enginee...
  • 39 篇 shandong fundame...
  • 32 篇 shandong provinc...
  • 23 篇 shandong provinc...
  • 22 篇 qilu university ...
  • 21 篇 school of comput...
  • 21 篇 provincial key l...
  • 20 篇 shandong provinc...
  • 19 篇 jiangsu provinci...
  • 18 篇 school of comput...
  • 18 篇 state key labora...
  • 17 篇 college of infor...
  • 17 篇 jiangsu provinci...
  • 17 篇 jiangsu engineer...
  • 16 篇 shandong provinc...
  • 16 篇 qilu university ...

作者

  • 33 篇 wang ruchuan
  • 19 篇 xiaoming wu
  • 17 篇 yu fei
  • 13 篇 xiangzhi liu
  • 13 篇 guohua lv
  • 13 篇 xiao fu
  • 13 篇 chen yang
  • 13 篇 mingle zhou
  • 13 篇 wang jin
  • 11 篇 sun lijuan
  • 11 篇 jing zhao
  • 11 篇 ruchuan wang
  • 11 篇 delong han
  • 11 篇 wenpeng lu
  • 10 篇 xiaohui han
  • 10 篇 gang li
  • 10 篇 huang haiping
  • 10 篇 min li
  • 10 篇 xin wang
  • 10 篇 wang changwei

语言

  • 1,051 篇 英文
  • 66 篇 其他
  • 47 篇 中文
检索条件"机构=Jiangsu Provincial Key Laboratory of Computer Network Technology"
1159 条 记 录,以下是281-290 订阅
排序:
Performance Analysis for Intrusion Target Detection in Wireless Sensor networks
收藏 引用
Chinese Journal of Electronics 2023年 第4期20卷 725-729页
作者: FAN Gaojuan WANG Ruchuan HUANG Haiping SUN Lijuan XIAO Fu College of Computer Nanjing University of Posts and Telecommunications Nanjing China School of Computer and Information Engineering Henan University Kaifeng China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing China Key Laboratory of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education of Jiangsu Province Nanjing China
Target detection and field surveillance are among the most prominent applications of wireless sensor networks. The quality of detection achieved by a sensor network can be quantified by evaluating the probability of d... 详细信息
来源: 评论
A Multiple-Image Authentication Method Based on Phase-Only Hologram and Logistic Map
SSRN
收藏 引用
SSRN 2024年
作者: Liansheng, Sui Zishan, Jiang Haiwei, Lu Zhaolin, Xiao Tianyu, Zeng School of Computer Science and Engineering Xi’an University of Technology Xi’an710048 China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an710048 China Hebei Normal University Shijiazhuang050024 China Hebei Provincial Key Laboratory of Information Fusion and Intelligent Control Shijiazhuang050024 China
An interesting security method for multiple-image authentication scheme is proposed based on computer-generated holograms and logistic map. First, each original image is encoded as the complex-valued hologram under th... 详细信息
来源: 评论
MBC-DTA: A Multi-Scale Bilinear Attention with Contrastive Learning Framework for Drug-Target Binding Affinity Prediction
MBC-DTA: A Multi-Scale Bilinear Attention with Contrastive L...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Huiting Li Weiyu Zhang Yong Shang Wenpeng Lu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China
Drug-target binding affinity prediction is critical to drug design. Some existing computational methods rely on single-scale data and cannot fully integrate the rich information of multi-scale data, such as molecular ... 详细信息
来源: 评论
Exploring Rationale Learning for Continual Graph Learning  39
Exploring Rationale Learning for Continual Graph Learning
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Song, Lei Li, Jiaxing Si, Qinghua Guan, Shihan Kong, Youyong Jiangsu Provincial Joint International Research Laboratory of Medical Information Processing School of Computer Science and Engineering Southeast University China Key Laboratory of New Generation Artificial Intelligence Technology and Its Interdisciplinary Applications [Southeast University Ministry of Education China
Catastrophic forgetting poses a significant challenge for graph neural networks in continuously updating their knowledge base with data streams. To address this issue, much of the research has focused on node-level co... 详细信息
来源: 评论
Dear-DIA^(XMBD): Deep Autoencoder Enables Deconvolution of Data-Independent Acquisition Proteomics
收藏 引用
Research 2024年 第1期6卷 707-720页
作者: Qingzu He Chuan-Qi Zhong Xiang Li Huan Guo Yiming Li Mingxuan Gao Rongshan Yu Xianming Liu Fangfei Zhang Donghui Guo Fangfu Ye Tiannan Guo Jianwei Shuai Jiahuai Han Department of Physics and Fujian Provincial Key Laboratory for Soft Functional Materials ResearchXiamen UniversityXiamen 361005China Oujiang Laboratory(Zhejiang Lab for Regenerative Medicine Vision and Brain Health)and Wenzhou InstituteUniversity of Chinese Academy of SciencesWenzhouZhejiang 325001China School of Life Sciences Xiamen UniversityXiamen 361102China State Key Laboratory of Cellular Stress Biology Innovation Center for Cell Signaling NetworkXiamen 361102China Department of Computer Science Xiamen UniversityXiamen 361005China National Institute for Data Science in Health and Medicine School of MedicineXiamen UniversityXiamen 361102China Bruker(Beijing)Scientific Technology Co.Ltd. BeijingChina Westlake Laboratory of Life Sciences and Biomedicine Key Laboratory of Structural Biology of Zhejiang ProvinceSchool of Life SciencesWestlake University18 Shilongshan RoadHangzhou 310024China Institute of Basic Medical Sciences Westlake Institute for Advanced Study18 Shilongshan RoadHangzhou 310024China Westlake Omics Ltd. Yunmeng Road 1HangzhouChina Department of Electronic Engineering Xiamen UniversityXiamen 361005China
Data-independent acquisition(DIA)technology for protein identification from mass spectrometry and related algorithms is developing *** spectrum-centric analysis of DIA data without the use of spectra library from data... 详细信息
来源: 评论
Communication-Efficient Federated Learning for network Traffic Anomaly Detection
Communication-Efficient Federated Learning for Network Traff...
收藏 引用
International Conference on Mobile Ad-hoc and Sensor networks, MSN
作者: Xiao Cui Xiaohui Han Guangqi Liu Wenbo Zuo Zhiwen Wang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China Quancheng Provincial Laboratory Jinan China
As an emerging machine learning method, Federated Learning is widely used in network anomaly detection scenarios. However, many current federated learning-based network anomaly detection works ignore the communication... 详细信息
来源: 评论
$k$k-TEVS: A $ k$k-Times E-Voting Scheme on Blockchain With Supervision
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2024年 第3期22卷 2326-2337页
作者: Yang Liu Debiao He Min Luo Lianhai Wang Cong Peng School of Cyber Science and Engineering Wuhan University Wuhan China Institute of Information Technology Shenzhen Institute of Information Technology Shenzhen China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shanghai Technology Innovation Centre of Distributed Privacy-Preserving Artificial Intelligence Matrix Elements Technologies Shanghai China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
The e-vote is regarded as a way to express the opinion that the voters ask for. Actually, the e-vote could be applied wildly like questionnaire, survey and feedback. Moreover, the coexistences of efficiency and securi... 详细信息
来源: 评论
FusionNet: An Effective network Phishing Website Detection Framework Based on Multi-Modal Fusion
FusionNet: An Effective Network Phishing Website Detection F...
收藏 引用
IEEE International Conference on High Performance Computing and Communications (HPCC)
作者: Yu Sun Guangqi Liu Xiaohui Han Wenbo Zuo Weihua Liu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) (Shandong Academy of Sciences) Qilu University of Technology Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Quancheng Provincial Laboratory Jinan China
Recently, the rapid advancement of communication technology has undoubtedly improved people's lives. Unfortunately, this progress has also given rise to a significant issue: the proliferation of phishing websites....
来源: 评论
Topic-based Multi-layer Knowledge Filtering for Emotion Recognition in Conversation
Topic-based Multi-layer Knowledge Filtering for Emotion Reco...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Xiaoyang Li Zhenyu Yang Yiwen Li Zhijun Li Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Emotion recognition in conversation (ERC) is a prominent research topic in natural language processing, widely applicable in various scenarios. However, accessing external commonsense knowledge and related dialogue to... 详细信息
来源: 评论
MCAF: Multi-Headed Causal Attention Fusion Approach for Multimodal Sentiment Analysis
MCAF: Multi-Headed Causal Attention Fusion Approach for Mult...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Qingao Wang Xingang Wang Jinxiao Yang Yurun Bi Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Multimodal sentiment analysis(MSA) aims to synthesize multiple pieces of information, including textual, visual, and auditory information, to more accurately infer sentiment polarity. Due to the existence of complex a... 详细信息
来源: 评论