咨询与建议

限定检索结果

文献类型

  • 110 篇 会议
  • 83 篇 期刊文献

馆藏范围

  • 193 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 138 篇 工学
    • 96 篇 计算机科学与技术...
    • 69 篇 软件工程
    • 32 篇 信息与通信工程
    • 21 篇 电子科学与技术(可...
    • 18 篇 电气工程
    • 17 篇 生物工程
    • 12 篇 动力工程及工程热...
    • 10 篇 机械工程
    • 10 篇 光学工程
    • 10 篇 控制科学与工程
    • 9 篇 网络空间安全
    • 8 篇 仪器科学与技术
    • 8 篇 化学工程与技术
    • 7 篇 交通运输工程
    • 5 篇 安全科学与工程
    • 4 篇 建筑学
    • 4 篇 生物医学工程(可授...
    • 3 篇 力学(可授工学、理...
    • 3 篇 土木工程
  • 63 篇 理学
    • 27 篇 数学
    • 19 篇 生物学
    • 17 篇 物理学
    • 9 篇 统计学(可授理学、...
    • 7 篇 化学
    • 6 篇 系统科学
  • 26 篇 管理学
    • 21 篇 管理科学与工程(可...
    • 12 篇 工商管理
    • 6 篇 图书情报与档案管...
  • 5 篇 法学
    • 4 篇 社会学
  • 4 篇 医学
    • 3 篇 临床医学
  • 2 篇 文学
  • 2 篇 军事学
  • 2 篇 艺术学

主题

  • 6 篇 deep learning
  • 6 篇 energy consumpti...
  • 6 篇 hardware
  • 5 篇 semantics
  • 5 篇 algorithm design...
  • 4 篇 deep neural netw...
  • 4 篇 computer archite...
  • 4 篇 logic gates
  • 4 篇 convolution
  • 4 篇 quality of servi...
  • 4 篇 schedules
  • 4 篇 real-time system...
  • 4 篇 feature extracti...
  • 4 篇 field programmab...
  • 4 篇 encryption
  • 4 篇 cloud computing
  • 4 篇 scheduling
  • 4 篇 training
  • 3 篇 object detection
  • 3 篇 fault tolerance

机构

  • 21 篇 key laboratory f...
  • 20 篇 key laboratory f...
  • 14 篇 college of compu...
  • 10 篇 key laboratory f...
  • 7 篇 network resource...
  • 6 篇 school of inform...
  • 5 篇 hunan provincial...
  • 5 篇 college of infor...
  • 5 篇 college of compu...
  • 4 篇 dalian maritime ...
  • 4 篇 northeastern uni...
  • 4 篇 national collabo...
  • 4 篇 school of electr...
  • 4 篇 school of comput...
  • 4 篇 key laboratory o...
  • 4 篇 baidu inc.
  • 4 篇 department of co...
  • 4 篇 hunan university...
  • 4 篇 hunan province h...
  • 4 篇 college of compu...

作者

  • 20 篇 renfa li
  • 18 篇 li renfa
  • 15 篇 xie guoqi
  • 11 篇 guoqi xie
  • 7 篇 wu di
  • 6 篇 yi wang
  • 6 篇 liu yan
  • 6 篇 long jun
  • 6 篇 wanli chang
  • 6 篇 wang yi
  • 5 篇 li zhetao
  • 5 篇 yang zhan
  • 5 篇 tian shujuan
  • 5 篇 junli wang
  • 5 篇 shujuan tian
  • 5 篇 li keqin
  • 5 篇 chungang yan
  • 4 篇 xie xin
  • 4 篇 raymond osolo ia...
  • 4 篇 wang kezhi

语言

  • 189 篇 英文
  • 3 篇 其他
  • 1 篇 中文
检索条件"机构=Key Laboratory for Embedded and Network Computing of Hunan Province Hunan University"
193 条 记 录,以下是61-70 订阅
排序:
PFV2: Packet fragmentation with variable size and vigorous mapping in time-sensitive networking
收藏 引用
Journal of Systems Architecture 2025年 166卷
作者: Wenyan Yan Bin Fu Dongsheng Wei Renfa Li Yixue Lei Yuhang Jia Guoqi Xie Key Laboratory for Embedded and Network Computing of Hunan Province College of Computer Science and Electronic Engineering Hunan University Changsha 410082 Hunan China Center for Convergence of Automobile and Cyberspace Research Institute of Hunan University in Chongqing Chongqing 401120 China Hunan Engineering Research Center of Advanced Embedded Computing and Intelligent Medical Systems School of Computer and Artificial Intelligence Xiangnan University Chenzhou 423000 Hunan China Future Network Laboratory Tencent Beijing 100080 China
With the rapid advancement of intelligent automobiles, the ever-growing communication data put forward high bandwidth and low latency requirements. To meet these requirements, automotive Original Equipment Manufacture...
来源: 评论
Partial Offloading Strategy Based on Deep Reinforcement Learning in the Internet of Vehicles
收藏 引用
IEEE Transactions on Mobile computing 2025年
作者: Tian, Shujuan Zhu, Xinjie Feng, Bochao Zheng, Zhirun Liu, Haolin Li, Zhetao Xiangtan University School of Computer Science School of Cyberspace Security Xiangtan411105 China Xiangtan University Hunan International Scientific and Technological Cooperation Base of Intelligent network Xiangtan411105 China Xiangtan University Key Laboratory of Hunan Province for Internet of Things and Information Security Xiangtan411105 China Xiangtan University School of Mathematics and Compulational Science Xiangtan China Jinan University College of Information Science and Technology Guangzhou510632 China
Driven by the increasing demands of vehicular tasks, edge offloading has emerged as a promising paradigm to enhance quality of experience (QoE) in Internet of Vehicles (IoV) networks. This approach enables vehicles to... 详细信息
来源: 评论
AR-CNN: an attention ranking network for learning urban perception
收藏 引用
Science China(Information Sciences) 2022年 第1期65卷 164-174页
作者: Zhetao LI Ziwen CHEN Wei-Shi ZHENG Sangyoon OH Kien NGUYEN Key Laboratory of Hunan Province for Internet of Things and Information Security Xiangtan University Key Laboratory of Intelligent Computing & Information Processing of Ministry of Education Xiangtan University School of Data and Computer Science Sun Yat-sen University Department of Computer and Information Engineering Ajou University Graduate School of Engineering Chiba University
An increasing number of deep learning methods is being applied to quantify the perception of urban environments, study the relationship between urban appearance and resident safety, and improve urban appearance. Most ... 详细信息
来源: 评论
Task Offloading and Resource Allocation Based on Reinforcement Learning and Load Balancing in Vehicular networking
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Tian, Shujuan Xiang, Shuhuan Zhou, Ziqi Dai, Haipeng Yu, Enze Deng, Qingyong Xiangtan University Key Laboratory of Hunan Province for Internet of Things and Information Security Hunan International Scientific and Technological Cooperation Base of Intelligent network School of Computer Science and School of Cyberspace Security Xiangtan411105 China Nanjing University School of Computer Science and Technology Nanjing211189 China Guangxi Normal University Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guilin541004 China Guangxi Normal University Guangxi Key Lab of Multi-source Information Mining and Security Guilin541004 China
Due to limited on-board resources and the mobility characteristics of vehicles in a multi-access edge computing (MEC)-based vehicular network, efficient task offloading and resource allocation schemes are essential fo... 详细信息
来源: 评论
Multi-Label Learning Based on Transfer Learning and Label Correlation
收藏 引用
Computers, Materials & Continua 2019年 第7期61卷 155-169页
作者: Kehua Yang Chaowei She Wei Zhang Jiqing Yao Shaosong Long College of Computer Science and Electronic Engineering and Key Laboratory for Embedded and Network Computing of Hunan Province Hunan UniversityChangsha410082China Oath Verizon Company ManhattanNew York10007USA
In recent years,multi-label learning has received a lot of ***,most of the existing methods only consider global label correlation or local label *** fact,on the one hand,both global and local label correlations can a... 详细信息
来源: 评论
keyphrase Generation Based on Self-Attention Mechanism
收藏 引用
Computers, Materials & Continua 2019年 第8期61卷 569-581页
作者: Kehua Yang Yaodong Wang Wei Zhang Jiqing Yao Yuquan Le College of Computer Science and Electronic Engineering and Key Laboratory for Embedded and Network Computing of Hunan Province Hunan UniversityChangsha410082China Oath Verizon Company ManhattanNew York10007USA
keyphrase greatly provides summarized and valuable *** information can help us not only understand text semantics,but also organize and retrieve text content *** task of automatically generating it has received consid... 详细信息
来源: 评论
A Money Laundering Structure Detection Method Based on Incremental Transaction Analysis
A Money Laundering Structure Detection Method Based on Incre...
收藏 引用
Data Science and Information Technology (DSIT), International Conference on
作者: Yifei Meng Zhong Li Key Laboratory of Embedded System and Service Computing Ministry of Education National (Province-Ministry Joint) Collaborative Innovation Center for Financial Network Security Tongji University Shanghai China College of Information Science and Technology Donghua University Shanghai China
Money laundering is the process of legitimizing dirty money through complex transactions, posing a serious threat to a country’s financial stability and national security. Nowadays, with the prevalence of organized m...
来源: 评论
Implicit privacy preservation:a framework based on data generation
收藏 引用
Security and Safety 2022年 第1期1卷 166-183页
作者: Qing Yang Cheng Wang Teng Hu Xue Chen Changjun Jiang Key Laboratory of Embedded System and Service Computing(Tongji University) Ministry of EducationShanghai 201804China National(Province-Ministry Joint)Collaborative Innovation Center for Financial Network Security Tongji UniversityShanghai 201804China
This paper addresses a special and imperceptible class of privacy,called implicit *** contrast to traditional(explicit)privacy,implicit privacy has two essential properties:(1)It is not initially de ned as a privacy a... 详细信息
来源: 评论
CenterPicker:An Automated Cryo-EM Single-Particle Picking Method Based on Center Point Detection
收藏 引用
Journal of Cyber Security 2022年 第2期4卷 65-77页
作者: Jianquan Ouyang Jinling Wang Yaowu Wang Tianming Liu Key Laboratory of Intelligent Computing Information Processing Ministry of EducationComputer Science College of Xiangtan UniversityXiangtanHunan Province411100China Department of Computer Science the University of GeorgiaAthensGeorgiaUSA
Cryo-electron microscopy(cryo-EM)has become one of the mainstream techniques for determining the structures of proteins andmacromolecular complexes,with prospects for development and *** must select hundreds of thousa... 详细信息
来源: 评论
ASDIA: An Adversarial Sample to Preserve Privacy Program in Federated Learning
收藏 引用
IEEE Transactions on Dependable and Secure computing 2025年
作者: Tian, Shujuan Tan, Yi Wang, Han Liu, Haolin Li, Zhetao Xiangtan University School of Computer Science School of Cyberspace Security Xiangtan China Xiangtan University Hunan International Scientific and Technological Cooperation Base of Intelligent network Xiangtan411105 China Xiangtan University Key Laboratory of Hunan Province for Internet of Things and Information Security Xiangtan411105 China Department of Electrical Engineering and Computer Science University of Kansas 1520 W 15th St LawrenceKS United States Jinan University College of Information Science and Technology Guangzhou510632 China
Federated learning enables training across multiple entities while ensuring data security and the effectiveness of knowledge dissemination. Despite its benefits, it remains susceptible to privacy breaches by both exte... 详细信息
来源: 评论