咨询与建议

限定检索结果

文献类型

  • 1,837 篇 会议
  • 1,582 篇 期刊文献

馆藏范围

  • 3,419 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,295 篇 工学
    • 1,682 篇 计算机科学与技术...
    • 1,313 篇 软件工程
    • 613 篇 信息与通信工程
    • 305 篇 电气工程
    • 249 篇 电子科学与技术(可...
    • 230 篇 控制科学与工程
    • 222 篇 生物工程
    • 155 篇 机械工程
    • 129 篇 网络空间安全
    • 110 篇 仪器科学与技术
    • 109 篇 光学工程
    • 105 篇 生物医学工程(可授...
    • 83 篇 化学工程与技术
    • 77 篇 动力工程及工程热...
    • 75 篇 交通运输工程
    • 59 篇 安全科学与工程
    • 55 篇 建筑学
  • 1,073 篇 理学
    • 635 篇 数学
    • 244 篇 生物学
    • 228 篇 物理学
    • 197 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 91 篇 化学
  • 673 篇 管理学
    • 389 篇 管理科学与工程(可...
    • 311 篇 图书情报与档案管...
    • 142 篇 工商管理
  • 107 篇 法学
    • 71 篇 社会学
  • 83 篇 医学
    • 68 篇 临床医学
    • 59 篇 基础医学(可授医学...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 38 篇 农学
  • 23 篇 军事学
  • 11 篇 文学
  • 10 篇 教育学
  • 9 篇 艺术学

主题

  • 140 篇 feature extracti...
  • 123 篇 semantics
  • 95 篇 accuracy
  • 79 篇 computational mo...
  • 78 篇 training
  • 65 篇 data models
  • 64 篇 deep learning
  • 62 篇 federated learni...
  • 49 篇 protocols
  • 48 篇 clustering algor...
  • 47 篇 data mining
  • 45 篇 visualization
  • 45 篇 cryptography
  • 44 篇 neural networks
  • 44 篇 privacy
  • 43 篇 security
  • 43 篇 robustness
  • 42 篇 adaptation model...
  • 41 篇 optimization
  • 41 篇 predictive model...

机构

  • 221 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 166 篇 school of comput...
  • 80 篇 key laboratory o...
  • 65 篇 college of compu...
  • 63 篇 computer network...
  • 59 篇 college of infor...
  • 57 篇 key laboratory o...
  • 56 篇 college of mathe...
  • 50 篇 shandong fundame...
  • 47 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 43 篇 institute of inf...
  • 42 篇 school of cyber ...
  • 41 篇 the key laborato...
  • 40 篇 school of comput...
  • 37 篇 university of ch...
  • 37 篇 shandong provinc...
  • 36 篇 key laboratory o...

作者

  • 46 篇 zhao yao
  • 41 篇 ren jiadong
  • 36 篇 zhou deyu
  • 29 篇 zhang min-ling
  • 27 篇 yang yang
  • 27 篇 min-ling zhang
  • 26 篇 cong runmin
  • 24 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 21 篇 guang cheng
  • 20 篇 zhang zhenrong
  • 20 篇 guo kun
  • 19 篇 geng xin
  • 19 篇 wang yun
  • 19 篇 du bo
  • 18 篇 liu ximeng
  • 18 篇 xia chunhe
  • 17 篇 xiaoping li
  • 16 篇 di xiaoqiang
  • 16 篇 he yulan

语言

  • 3,097 篇 英文
  • 190 篇 其他
  • 147 篇 中文
检索条件"机构=Key Laboratory for Computer Network and Information Integration"
3419 条 记 录,以下是81-90 订阅
排序:
Received value flipping based sphere decoding algorithm for polar codes
收藏 引用
Intelligent and Converged networks 2024年 第4期5卷 370-379页
作者: Rui Wang Haiqiang Chen Yan Chen Yuanbo Liu Xiangcheng Li Youming Sun Qingnian Li School of Computer and Electronic Information Guangxi UniversityNanning 530004China Guangxi Key Laboratory of Multimedia Communications and Network Technology Guangxi UniversityNanning 530004China College of Information Engineering Nanning UniversityNanning 530004China
Polar codes are considered as one of the most competitive channel coding schemes for the future wireless communication *** improve the performance of polar codes with short code-length for control channels,a sphere de... 详细信息
来源: 评论
Decomposition-Based Classifier Chains for Multi-Dimensional Classification
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2022年 第2期3卷 176-191页
作者: Jia, Bin-Bin Zhang, Min-Ling School of Computer Science and Engineering Southeast University Nanjing210096 China College of Electrical and Information Engineering Lanzhou University of Technology Lanzhou730050 China Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University Nanjing210096 China
In multi-dimensional classification, the semantics of objects are characterized by multiple class variables from different dimensions. To model the dependencies among class variables, one natural strategy is to build ... 详细信息
来源: 评论
The Study of Multi-type Computing Power Trading Mechanism in Computing Power network Based on Blockchain and Combinatorial Double Auction  24
The Study of Multi-type Computing Power Trading Mechanism in...
收藏 引用
4th International Conference on Artificial Intelligence, Big Data and Algorithms, CAIBDA 2024
作者: Zhao, Yue Wang, Jizhi Kong, Lingrui Sui, Tongtong Shandong Computer Science Center National Supercomputer Center in Jinan Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Provincial Key Laboratory of Industrial Network and Information System Security Qilu University of Technology Shandong Academy of Sciences Jinan Shandong China Quancheng Laboratory Jinan Key Laboratory of Digital Security Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan Shandong China
The advancement of 5G and mobile internet technologies has propelled the development of emerging businesses and applications, demanding higher requirements for network bandwidth and computational resources. To address... 详细信息
来源: 评论
Attack based on data: a novel perspective to attack sensitive points directly
收藏 引用
Cybersecurity 2024年 第3期7卷 111-123页
作者: Yuyao Ge Zhongguo Yang Lizhe Chen Yiming Wang Chengyang Li School of Information Science and Technology North China University of TechnologyBeijingChina Bejing Key Laboratory on Integration and Analysis of Large-Scale Stream Data North China University of TechnologyBeijingChina School of Computer Science Peking UniversityBeijingChina
Adversarial attack for time-series classification model is widely explored and many attack methods are *** there is not a method of attack based on the data *** this paper,we innovatively proposed a black-box sparse a... 详细信息
来源: 评论
BTP-CAResNet: An Encrypted Traffic Classification Method Based on Byte Transfer Probability and Coordinate Attention Mechanism
BTP-CAResNet: An Encrypted Traffic Classification Method Bas...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Li, Junhao Shi, Huiling Zhang, Wei Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
With the extensive application of network traffic encryption technology, the accurate and efficient classification of encrypted traffic has become a critical need for network management. Deep learning has become the p... 详细信息
来源: 评论
RFSD-YOLO: An Enhanced X-Ray Object Detection Model for Prohibited Items
RFSD-YOLO: An Enhanced X-Ray Object Detection Model for Proh...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Kong, Xiaotong Li, Aimin Li, Wenqiang Li, Zhiyao Zhang, Yuechen Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
X-ray image detection is essential for ensuring public safety, but traditional methods rely heavily on human analysis and are relatively inefficient. To address this issue, this paper proposes a new object detection m... 详细信息
来源: 评论
CB-YOLO: A Small Object Detection Algorithm for Industrial Scenarios
CB-YOLO: A Small Object Detection Algorithm for Industrial S...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Chen, Hao Wu, Xiaoming Su, Zhanzhi Zhao, Ying Dong, Yunfeng Liu, Xiangzhi Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
In certain specific industrial scenarios, smoking and cellphone usage are strictly prohibited behaviors. In these scenarios, it is crucial to rapidly and accurately detect smoking and cell phone usage, and promptly is... 详细信息
来源: 评论
A knowledge-enhanced interest segment division attention network for click-through rate prediction
收藏 引用
Neural Computing and Applications 2024年 第34期36卷 21817-21837页
作者: Liu, Zhanghui Chen, Shijie Chen, Yuzhong Su, Jieyang Zhong, Jiayuan Dong, Chen College of Computer and Data Science Fuzhou University Fujian Province Fuzhou350108 China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fujian Province Fuzhou350108 China
Click-through rate (CTR) prediction aims to estimate the probability of a user clicking on a particular item, making it one of the core tasks in various recommendation platforms. In such systems, user behavior data ar... 详细信息
来源: 评论
Fingerprint Revocable Template Protection of Variable Window-Based Random Permutation && Check Code  18th
Fingerprint Revocable Template Protection of Variable Windo...
收藏 引用
18th Chinese Conference on Biometric Recognition, CCBR 2024
作者: Xu, Zilong Bian, Weixin Hu, Yao Luo, Feng School of Computer and Information Anhui Normal University Anhui Wuhu241002 China Anhui Provincial Key Laboratory of Network and Information Security Anhui Wuhu241002 China
The Uniformly Random Permutation Hashing (URP-IoM) algorithm demonstrates reliable performance and irreversibility in biometric template protection. However, URP-IoM, through random permutation and Hadamard product co... 详细信息
来源: 评论
AQROM:A quality of service aware routing optimization mechanism based on asynchronous advantage actor-critic in software-defined networks
收藏 引用
Digital Communications and networks 2024年 第5期10卷 1405-1414页
作者: Wei Zhou Xing Jiang Qingsong Luo Bingli Guo Xiang Sun Fengyuan Sun Lingyu Meng School of Information and Communication Guilin University of Electronic TechnologyGuilin541004China The 34th Research Institute of China Electronics Technology Group Corporation Guilin541004China Guangxi Key Laboratory of Optical Network and Optical Information Security Guilin541004China State Key Laboratory of Information Photonics and Optical Communications BeijingUniversity of Posts and TelecommunicationsBeijing100876China Department of Electrical and Computer Engineering University of New MexicoAlbuquerqueNM87131USA
In Software-Defined networks(SDNs),determining how to efficiently achieve Quality of Service(QoS)-aware routing is challenging but critical for significantly improving the performance of a network,where the metrics of... 详细信息
来源: 评论