咨询与建议

限定检索结果

文献类型

  • 1,827 篇 会议
  • 1,582 篇 期刊文献

馆藏范围

  • 3,409 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,289 篇 工学
    • 1,672 篇 计算机科学与技术...
    • 1,310 篇 软件工程
    • 613 篇 信息与通信工程
    • 306 篇 电气工程
    • 244 篇 电子科学与技术(可...
    • 229 篇 控制科学与工程
    • 224 篇 生物工程
    • 156 篇 机械工程
    • 127 篇 网络空间安全
    • 111 篇 光学工程
    • 111 篇 仪器科学与技术
    • 107 篇 生物医学工程(可授...
    • 83 篇 化学工程与技术
    • 76 篇 动力工程及工程热...
    • 76 篇 交通运输工程
    • 58 篇 安全科学与工程
    • 55 篇 建筑学
  • 1,080 篇 理学
    • 638 篇 数学
    • 247 篇 生物学
    • 229 篇 物理学
    • 198 篇 统计学(可授理学、...
    • 93 篇 系统科学
    • 89 篇 化学
  • 670 篇 管理学
    • 387 篇 管理科学与工程(可...
    • 308 篇 图书情报与档案管...
    • 141 篇 工商管理
  • 106 篇 法学
    • 71 篇 社会学
  • 87 篇 医学
    • 72 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 60 篇 经济学
    • 60 篇 应用经济学
  • 39 篇 农学
  • 23 篇 军事学
  • 12 篇 教育学
  • 11 篇 文学
  • 9 篇 艺术学

主题

  • 135 篇 feature extracti...
  • 123 篇 semantics
  • 94 篇 accuracy
  • 79 篇 computational mo...
  • 78 篇 training
  • 65 篇 data models
  • 61 篇 deep learning
  • 59 篇 federated learni...
  • 49 篇 protocols
  • 49 篇 clustering algor...
  • 47 篇 data mining
  • 45 篇 cryptography
  • 44 篇 neural networks
  • 44 篇 visualization
  • 43 篇 privacy
  • 42 篇 predictive model...
  • 42 篇 robustness
  • 41 篇 optimization
  • 41 篇 security
  • 40 篇 wireless sensor ...

机构

  • 216 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 165 篇 school of comput...
  • 80 篇 key laboratory o...
  • 64 篇 college of compu...
  • 63 篇 computer network...
  • 59 篇 college of infor...
  • 57 篇 key laboratory o...
  • 56 篇 college of mathe...
  • 50 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 44 篇 key laboratory o...
  • 44 篇 institute of inf...
  • 43 篇 school of cyber ...
  • 42 篇 the key laborato...
  • 40 篇 school of comput...
  • 37 篇 university of ch...
  • 36 篇 shandong provinc...
  • 35 篇 key laboratory o...

作者

  • 49 篇 zhao yao
  • 42 篇 ren jiadong
  • 36 篇 zhou deyu
  • 29 篇 zhang min-ling
  • 26 篇 cong runmin
  • 24 篇 guo wenzhong
  • 23 篇 yang yang
  • 22 篇 min-ling zhang
  • 21 篇 xiaoming wu
  • 21 篇 guang cheng
  • 20 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 du bo
  • 19 篇 geng xin
  • 19 篇 wang yun
  • 18 篇 liu ximeng
  • 17 篇 xiaoping li
  • 16 篇 niyato dusit
  • 16 篇 di xiaoqiang
  • 16 篇 he yulan

语言

  • 3,096 篇 英文
  • 180 篇 其他
  • 148 篇 中文
检索条件"机构=Key Laboratory for Computer Network and Information Integration"
3409 条 记 录,以下是51-60 订阅
排序:
Density Peak Clustering Algorithm Based on Data Field Theory and Grid Similarity
收藏 引用
Journal of computer Science and Technology 2025年 第2期40卷 301-321页
作者: Yu, Qing-Ying Shi, Ge-Ge Xu, Dong-Sheng Wang, Wen-Kai Chen, Chuan-Ming Luo, Yong-Long School of Computer and Information Anhui Normal University Wuhu241002 China Anhui Provincial Key Laboratory of Network and Information Security Wuhu241002 China
The density peak clustering algorithm can rapidly identify cluster centers by drawing decision graphs without any prior knowledge;however, when multiple density peaks are present in one cluster of the dataset, the clu... 详细信息
来源: 评论
Non-Line-of-Sight Multipath Classification Method for BDS Using Convolutional Sparse Autoencoder with LSTM
收藏 引用
Tsinghua Science and Technology 2025年 第1期30卷 68-86页
作者: Yahang Qin Zhenni Li Shengli Xie Bo Li Ming Liu Victor Kuzin School of Automation Guangdong University of Technologyand also with Guangdong-Hong Kong-Macao Joint Laboratory for Smart Discrete ManufacturingGuangzhou 510006China School of Automation Guangdong University of TechnologyGuangdong Key Laboratory of IoT Information TechnologyGuangzhou 510006China 111 Center for Intelligent Batch Manufacturing Based on IoT Technology Key Laboratory of Intelligent Information Processing and System Integration of IoTMinistry of EducationGuangzhou 510006China Department of Electronic and Computer Engineering Hong Kong University of Science and TechnologHong Kong 999077China Academician of Russian Engineering Academy Moscow Moscow 125009Russia
Multipath signal recognition is crucial to the ability to provide high-precision absolute-position services by the BeiDou Navigation Satellite System(BDS).However,most existing approaches to this issue involve supervi... 详细信息
来源: 评论
C-privacy: A social relationship-driven image customization sharing method in cyber-physical networks
收藏 引用
Digital Communications and networks 2025年 第2期11卷 563-573页
作者: Wu, Dapeng Liu, Jian Wan, Yangliang Yang, Zhigang Wang, Ruyan Lin, Xinqi School of Communications and Information Engineering Chongqing University of Posts and Telecommunications Chongqing400065 China Aerospace Tianmu Satellite Technology Company Limited Chongqing401332 China School of Cyber Security and Information Law Chongqing University of Posts and Telecommunications Chongqing400065 China College of Computer and Cyber Security Fujian Normal University Fujian 350117 China The Advanced Network and Intelligent Connection Technology Key Laboratory Chongqing400065 China Key Laboratory of Ubiquitous Sensing and Networking Chongqing400065 China
Cyber-Physical networks (CPN) are comprehensive systems that integrate information and physical domains, and are widely used in various fields such as online social networking, smart grids, and the Internet of Vehicle... 详细信息
来源: 评论
C-privacy: A social relationship-driven image customization sharing method in cyber-physical networks
收藏 引用
Digital Communications and networks 2025年 第02期 563-573页
作者: Dapeng Wu Jian Liu Yangliang Wan Zhigang Yang Ruyan Wang Xinqi Lin School of Communications and Information Engineering Chongqing University of Posts and Telecommunications The Advanced Network and Intelligent Connection Technology Key Laboratory Key Laboratory of Ubiquitous Sensing and Networking Aerospace Tianmu Satellite Technology Company Limited School of Cyber Security and Information Law Chongqing University of Posts and Telecommunications College of Computer and Cyber Security Fujian Normal University
Cyber-Physical networks(CPN) are comprehensive systems that integrate information and physical domains, and are widely used in various fields such as online social networking, smart grids, and the Internet of Vehicles...
来源: 评论
Secure Similar Adjacent Vertex Query on Sparse Graph Data in Cloud Environment  8th
Secure Similar Adjacent Vertex Query on Sparse Graph Data i...
收藏 引用
8th International Congress on Edge Computing, EDGE 2024, Held as Part of the Services Conference Federation, SCF 2024
作者: Tian, Yun Wu, Bin Shi, Jiaoli Zhang, Caicai Xu, Du School of Computer and Big Data Science Jiujiang University Jiujiang332005 China Jiujiang Key Laboratory of Network and Information Security Jiujiang332005 China School of Modern Information Technology Zhejiang Polytechnic University of Mechanical and Electrical Engineering Hangzhou310053 China
The development of cloud computing and the widespread application of cloud services have made outsourcing services more convenient. The need for individuals and businesses to store and manipulate the graph data they g... 详细信息
来源: 评论
Rehearse With User: Personalized Opinion Summarization via Role-Playing based on Large Language Models
arXiv
收藏 引用
arXiv 2025年
作者: Zhang, Yanyue He, Yulan Zhou, Deyu School of Computer Science and Engineering Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University China Department of Informatics King’s College London United Kingdom The Alan Turing Institute
Personalized opinion summarization is crucial as it considers individual user interests while generating product summaries. Recent studies show that although large language models demonstrate powerful text summarizati... 详细信息
来源: 评论
Multi-Instance Partial-Label Learning with Margin Adjustment
arXiv
收藏 引用
arXiv 2025年
作者: Tang, Wei Yang, Yin-Fang Wang, Zhaofei Zhang, Weijia Zhang, Min-Ling School of Computer Science and Engineering Southeast University Nanjing210096 China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education China School of Information and Physical Sciences The University of Newcastle CallaghanNSW2308 Australia
Multi-instance partial-label learning (MIPL) is an emerging learning framework where each training sample is represented as a multi-instance bag associated with a candidate label set. Existing MIPL algorithms often ov... 详细信息
来源: 评论
BAV-DSS: Blockchain Assisted Verifiable Data Sharing Scheme with Fast Encryption and Outsourced Decryption for IoT  24th
BAV-DSS: Blockchain Assisted Verifiable Data Sharing Scheme ...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Huang, Yao Yu, Zhongyuan Wang, Guijuan Chai, Baobao Zhang, Hongliang Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan250353 China School of Information Science and Engineering Lanzhou University Lanzhou730000 China School of Computer Science and Engineering Shandong University of Science and Technology Qingdao266590 China
Many sophisticated cloud platforms are available to provide services such as storage and computation for Internet of Things (IoT) applications. However, with the concerns about the semi-trusted nature of cloud platfor... 详细信息
来源: 评论
Do Not Trust What They Tell: Exposing Malicious Accomplices in Tor via Anomalous Circuit Detection  25
Do Not Trust What They Tell: Exposing Malicious Accomplices ...
收藏 引用
Proceedings of the ACM on Web Conference 2025
作者: Yixuan Yao Ming Yang Zixia Liu Kai Dong Xiaodan Gu Chunmian Wang Southeast University Nanjing Jiangsu China Anhui University of Technology Maanshan Anhui China and Key Laboratory of Computer Network and Information Integration (Southeast University) Ministry of Education Nanjing Jiangsu China
The Tor network, while offering anonymity through traffic routing across volunteer-operated nodes, remains vulnerable to attacks that aim to deanonymize users by correlating traffic patterns between colluded entry and... 详细信息
来源: 评论
ALFC-Point: Adaptive Laplacian Feature Convolution network for 3D Point Cloud Understanding  41st
ALFC-Point: Adaptive Laplacian Feature Convolution Network f...
收藏 引用
41st computer Graphics International Conference, CGI 2024
作者: Liao, Junjie Yin, Mengxiao Li, Ming Zhu, Congyang Yang, Zhiqiang Zhan, Feng School of Computer and Electronics Information Guangxi University Guangxi Nanning530004 China Guangxi Key Laboratory of Multimedia Communications and Network Technology Guangxi Nanning530004 China Education Department of Guangxi Zhuang Autonomous Region Nanning China
To capture 3D geometric details, point cloud understanding primarily employs convolution, dynamic map, or transformer methods to build complex local geometry extractors. When dealing with sparse and noisy point clouds... 详细信息
来源: 评论