咨询与建议

限定检索结果

文献类型

  • 1,567 篇 期刊文献
  • 1,330 篇 会议
  • 1 册 图书

馆藏范围

  • 2,898 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,967 篇 工学
    • 1,371 篇 计算机科学与技术...
    • 1,144 篇 软件工程
    • 454 篇 信息与通信工程
    • 220 篇 生物工程
    • 206 篇 电气工程
    • 206 篇 控制科学与工程
    • 174 篇 电子科学与技术(可...
    • 145 篇 光学工程
    • 111 篇 机械工程
    • 104 篇 生物医学工程(可授...
    • 103 篇 化学工程与技术
    • 77 篇 网络空间安全
    • 76 篇 仪器科学与技术
    • 54 篇 动力工程及工程热...
    • 54 篇 交通运输工程
    • 54 篇 安全科学与工程
    • 47 篇 土木工程
    • 46 篇 材料科学与工程(可...
  • 1,029 篇 理学
    • 495 篇 数学
    • 281 篇 物理学
    • 260 篇 生物学
    • 171 篇 统计学(可授理学、...
    • 94 篇 化学
    • 73 篇 系统科学
  • 523 篇 管理学
    • 278 篇 图书情报与档案管...
    • 254 篇 管理科学与工程(可...
    • 98 篇 工商管理
  • 106 篇 医学
    • 86 篇 临床医学
    • 64 篇 基础医学(可授医学...
  • 91 篇 法学
    • 65 篇 社会学
  • 45 篇 经济学
  • 34 篇 农学
  • 20 篇 教育学
  • 15 篇 军事学
  • 10 篇 文学
  • 3 篇 艺术学

主题

  • 112 篇 semantics
  • 81 篇 feature extracti...
  • 70 篇 training
  • 69 篇 deep learning
  • 65 篇 accuracy
  • 49 篇 computational mo...
  • 49 篇 federated learni...
  • 40 篇 machine learning
  • 36 篇 image segmentati...
  • 36 篇 graph neural net...
  • 35 篇 data mining
  • 34 篇 privacy
  • 32 篇 object detection
  • 32 篇 optimization
  • 32 篇 data models
  • 30 篇 reinforcement le...
  • 30 篇 adaptation model...
  • 27 篇 neural networks
  • 27 篇 visualization
  • 27 篇 forecasting

机构

  • 170 篇 university of ch...
  • 81 篇 cas key lab of n...
  • 74 篇 key laboratory o...
  • 71 篇 shandong provinc...
  • 63 篇 cas key laborato...
  • 53 篇 shandong enginee...
  • 49 篇 network and data...
  • 48 篇 college of compu...
  • 45 篇 school of comput...
  • 45 篇 tianjin key labo...
  • 37 篇 zhejiang lab
  • 35 篇 college of cyber...
  • 34 篇 school of comput...
  • 32 篇 school of cyber ...
  • 31 篇 school of comput...
  • 28 篇 hubei key labora...
  • 28 篇 key lab of infor...
  • 28 篇 national enginee...
  • 27 篇 peng cheng labor...
  • 25 篇 shaanxi key labo...

作者

  • 191 篇 cheng xueqi
  • 148 篇 guo jiafeng
  • 48 篇 zhang ruqing
  • 45 篇 lan yanyan
  • 45 篇 fan yixing
  • 43 篇 shen huawei
  • 35 篇 jin xiaolong
  • 32 篇 liu jun
  • 29 篇 pang liang
  • 25 篇 jin hai
  • 25 篇 bi keping
  • 24 篇 meng deyu
  • 22 篇 chen enhong
  • 21 篇 de rijke maarten
  • 21 篇 liu qi
  • 20 篇 xueqi cheng
  • 20 篇 xu jun
  • 19 篇 hu shengshan
  • 19 篇 chen yanping
  • 19 篇 li zixuan

语言

  • 2,507 篇 英文
  • 351 篇 其他
  • 41 篇 中文
检索条件"机构=Key Lab of Network Data Science and Technology"
2898 条 记 录,以下是2541-2550 订阅
排序:
A Survey on the Privacy-Preserving data Aggregation in Wireless Sensor networks
收藏 引用
China Communications 2015年 第5期12卷 162-180页
作者: XU Jian YANG Geng CHEN Zhengyu WANG Qianqian Jiangsu High Technology Research Key Lab for WSNs College of Computer Science & TechnologyNanjing University of Posts & Telecommunications Communication and Sensor Network Technology of Ministry of Education Nanjing University of Posts & Telecommunications School of Electrical & Information Engineering Jinling Institute of Technology School of Software Engineering Jinling Institute of Technology
Wireless sensor networks(WSNs)consist of a great deal of sensor nodes with limited power,computation,storage,sensing and communication *** aggregation is a very important technique,which is designed to substantially r... 详细信息
来源: 评论
Security risk assessment based on bayesian multi-step attack graphs
收藏 引用
Journal of Computational Information Systems 2015年 第11期11卷 3911-3918页
作者: Yang, Yunxue Jin, Shuyuan Fang, Binxing CAS Key Lab of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing China
Security risk assessment is fundamental to the security of network systems. Attack graphs have been widely used to evaluate the likelihood of possible multi-step attacks that exploit multiple vulnerabilities in this f... 详细信息
来源: 评论
BLIND CFO ESTIMATION FOR MULTIUSER OFDM UPLINK WITH LARGE NUMBER OF RECEIVE ANTENNAS
BLIND CFO ESTIMATION FOR MULTIUSER OFDM UPLINK WITH LARGE NU...
收藏 引用
IEEE International Conference on Acoustics, Speech and Signal Processing
作者: Weile Zhang Feifei Gao Bobin Yao MOE Key Lab for Intelligent Networks and Network Security Xi'an Jiaotong University China Tsinghua National Laboratory for Information Science and Technology Tsinghua University China School of Electronic and Control Engineering Chang'an University China
In this paper, we propose a new blind carrier frequency offset (CFO) estimation method for multiuser orthogonal frequency division multiplexing (OFDM) uplink transmissions. The spatial multiplexing is supported in the... 详细信息
来源: 评论
Notice of Removal: A secure watermarking technique without loss of robustness
Notice of Removal: A secure watermarking technique without l...
收藏 引用
IEEE International Conference on Image Processing
作者: Jian Cao Haodong Li Weiqi Luo Jiwu Huang Shenzhen Graduate School Harbin Institute of Technology Shenzhen China School of Data and Computer Science and Guangdong Key Lab. of Information Security and Technology Sun Yat-Sen University Guangzhou China College of Information Engineering and Shenzhen Key Laboratory of Media Security Shenzhen University Shenzhen China
Removed.
来源: 评论
Notice of Removal: An improved spread transform dither modulation for robust and secure watermarking
Notice of Removal: An improved spread transform dither modul...
收藏 引用
IEEE International Conference on Image Processing
作者: Jian Cao Haodong Li Weiqi Luo Jiwu Huang Shenzhen Graduate School Harbin Institute of Technology Shenzhen China School of Data and Computer Science and Guangdong Key Lab. of Information Security and Technology Sun Yat-Sen University Guangzhou China College of Information Engineering and Shenzhen Key Laboratory of Media Security Shenzhen University Shenzhen China
Removed.
来源: 评论
Development of A Biofeedback Enhanced Multimedia Game
Development of A Biofeedback Enhanced Multimedia Game
收藏 引用
第28届中国控制与决策会议
作者: Huaiwei Wu Chenguang Yang Ruowei Wang Chun-Yi Su MOE Key Lab of Autonomous System and Network Control School of Automation Science and EngineeringSouth China University of Technology Zienkiewicz Centre for Computational Engineering Swansea University Department of Mechanical and Industrial Engineering Concordia University
As a frontier technology,biofeedback has been widely used for psychological treatment,control and many other human-computer interaction *** this paper,a multimedia game based on biofeedback technology is developed,inc... 详细信息
来源: 评论
An allocation scheme between random access and DAMA channels for satellite networks
An allocation scheme between random access and DAMA channels...
收藏 引用
International Conference on Communication Systems
作者: Ruijun Chang Yizhou He Gaofeng Cui Weidong Wang Information & Electronics Technology Lab School of Electronic Engineering Beijing University of Posts and Telecommunications Beijing Science and Technology on Information Transmission and Dissemination in Communication Network Laboratory Shijiazhuang Ministry of Education Key Laboratory of Universal Wireless Communications Beijing China Academy of Information and Communications Technology Beijing
Although great progress on satellite multiple access has been made both in Random Access (RA) algorithms and Demand Assigned Multiple Access (DAMA), packets collision in RA strategy and large latency in DAMA still pre... 详细信息
来源: 评论
Pathological Brain Detection Based on Online Sequential Extreme Learning Machine
Pathological Brain Detection Based on Online Sequential Extr...
收藏 引用
2016 IEEE International Conference on Progress in Informatics and Computing
作者: Siyuan Lu Hainan Wang Xueyan Wu Shuihua Wang School of Computer Science and Technology Nanjing Normal University State Key Lab of CAD & CG Zhejiang University Key laboratory of symbolic computation and knowledge engineering of ministry of education Jilin University Key Laboratory of Statistical information technology and data mining State Statistics Bureau Department of Electrical Engineering The City College of New YorkCUNY
Magnetic resonance imaging(MRI) is a kind of imaging modality, which offers clearer images of soft tissues than computed tomography(CT). It is especially suitable for brain disease detection. It is beneficial to detec... 详细信息
来源: 评论
A simulator for swarm AUVs acoustic communication networking  11
A simulator for swarm AUVs acoustic communication networking
收藏 引用
11th ACM International Conference on Underwater networks and Systems, WUWNet 2016
作者: Li, Guannan Liu, Jun Wang, Xue Xu, Hongli Cui, Jun-Hong Shenyang Institute of Automation CAS University of Chinese Academy of Sciences No. 114 Nanta Street Shenhe District Shenyang China College of Computer Science and Technology Jilin University State Key Laboratory of Robotics Key Laboratory of System Control and Information Processing Ministry of Education of China Changchun China Shenyang Institute of Automation CAS Northeast University No. 114 Nanta Street Shenhe District Shenyang China Shenyang Institute of Automation CAS No. 114 Nanta Street Shenhe District Shenyang China College of Computer Science and Technology Jilin University Changchun China Underwater Sensor Network Lab. University of Connecticut StorrsCT06269 United States
This paper presents a simulator for swarm operations designed to verify algorithms for a swarm of autonomous underwater robots (AUVs), specifically for constructing an underwater communication network with AUVs carryi... 详细信息
来源: 评论
Robust background exclusion for salient object detection
Robust background exclusion for salient object detection
收藏 引用
International Conference on Wireless Communications and Signal Processing (WCSP)
作者: Yuming Hu Quan Zhou Guangwei Gao Zhijun Yao Weihua Ou Longin Jan Latecki Key Lab of Ministry of Education for Broad Band Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Nanjing China Nanjing University of Posts and Telecommunications Nanjing CN The 723 Institute of China Shipbuilding Industry Corporation Yangzhou China School of Big Data and Computer Science Guizhou Normal University Guiyang China Department of Computer and Information Science Temple University Philadelphia USA
Recently, investigating boundary prior to aid other low-level image cues, have gained great attention in salient object detection. Although the salient regions are mostly located in the image center, the inverse might... 详细信息
来源: 评论