咨询与建议

限定检索结果

文献类型

  • 720 篇 会议
  • 481 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,202 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 713 篇 工学
    • 462 篇 计算机科学与技术...
    • 391 篇 软件工程
    • 231 篇 信息与通信工程
    • 120 篇 电气工程
    • 111 篇 控制科学与工程
    • 88 篇 电子科学与技术(可...
    • 64 篇 生物工程
    • 41 篇 仪器科学与技术
    • 40 篇 机械工程
    • 34 篇 光学工程
    • 32 篇 生物医学工程(可授...
    • 31 篇 动力工程及工程热...
    • 31 篇 建筑学
    • 27 篇 网络空间安全
    • 24 篇 土木工程
    • 21 篇 交通运输工程
    • 18 篇 安全科学与工程
    • 17 篇 化学工程与技术
  • 320 篇 理学
    • 195 篇 数学
    • 71 篇 生物学
    • 67 篇 统计学(可授理学、...
    • 56 篇 系统科学
    • 49 篇 物理学
    • 20 篇 化学
  • 155 篇 管理学
    • 105 篇 管理科学与工程(可...
    • 57 篇 图书情报与档案管...
    • 27 篇 工商管理
  • 24 篇 法学
    • 17 篇 社会学
  • 23 篇 医学
    • 21 篇 临床医学
    • 15 篇 基础医学(可授医学...
  • 11 篇 经济学
  • 5 篇 教育学
  • 5 篇 农学
  • 2 篇 军事学
  • 2 篇 艺术学

主题

  • 88 篇 feature extracti...
  • 58 篇 accuracy
  • 53 篇 semantics
  • 41 篇 computational mo...
  • 39 篇 security
  • 37 篇 deep learning
  • 34 篇 training
  • 29 篇 data models
  • 27 篇 federated learni...
  • 27 篇 robustness
  • 25 篇 neural networks
  • 21 篇 data mining
  • 20 篇 wireless communi...
  • 20 篇 interference
  • 20 篇 privacy
  • 19 篇 noise
  • 19 篇 visualization
  • 19 篇 protocols
  • 18 篇 object detection
  • 18 篇 signal to noise ...

机构

  • 202 篇 shandong provinc...
  • 166 篇 key laboratory o...
  • 54 篇 ministry of educ...
  • 52 篇 shandong fundame...
  • 41 篇 shandong enginee...
  • 33 篇 moe key lab for ...
  • 18 篇 moe key laborato...
  • 17 篇 qilu university ...
  • 17 篇 ministry of educ...
  • 16 篇 state key labora...
  • 14 篇 qilu university ...
  • 12 篇 key laboratory o...
  • 12 篇 key laboratory o...
  • 11 篇 ministry of educ...
  • 11 篇 ministry of educ...
  • 11 篇 moe key lab for ...
  • 11 篇 state key labora...
  • 11 篇 school of electr...
  • 11 篇 tianjin key labo...
  • 10 篇 shandong enginee...

作者

  • 58 篇 meng deyu
  • 47 篇 wang hui-ming
  • 46 篇 xiaohong guan
  • 46 篇 guan xiaohong
  • 40 篇 qinye yin
  • 30 篇 wenjie wang
  • 30 篇 hui-ming wang
  • 24 篇 cao xiangyong
  • 22 篇 pengcheng mu
  • 18 篇 shen chao
  • 17 篇 qian xueming
  • 17 篇 jiang wu
  • 16 篇 yin qinye
  • 16 篇 tao qin
  • 16 篇 zheng qinghua
  • 16 篇 feng gao
  • 15 篇 xu zongben
  • 15 篇 wang pinghui
  • 15 篇 weile zhang
  • 14 篇 xinman zhang

语言

  • 1,095 篇 英文
  • 82 篇 其他
  • 26 篇 中文
检索条件"机构=Key Laboratory for Intelligent Networks and Network Security"
1202 条 记 录,以下是11-20 订阅
排序:
Lip-Audio Modality Fusion for Deep Forgery Video Detection
收藏 引用
Computers, Materials & Continua 2025年 第2期82卷 3499-3515页
作者: Yong Liu Zhiyu Wang Shouling Ji Daofu Gong Lanxin Cheng Ruosi Cheng College of Cyberspace Security Information Engineering UniversityZhengzhou450001China Research Institute of Intelligent Networks Zhejiang LabHangzhou311121China College of Computer Science and Technology Zhejiang UniversityHangzhou310027China Henan Key Laboratory of Cyberspace Situation Awareness Zhengzhou450001China Key Laboratory of Cyberspace Security Ministry of EducationZhengzhou450001China
In response to the problem of traditional methods ignoring audio modality tampering, this study aims to explore an effective deep forgery video detection technique that improves detection precision and reliability by ... 详细信息
来源: 评论
Design and Implementation of Routing Algorithms for Mobile Ad Hoc network Applying TDMA Strategy Based on Smart Antenna
Design and Implementation of Routing Algorithms for Mobile A...
收藏 引用
2023 International Conference on Sensing, Measurement and Data Analytics in the Era of Artificial Intelligence, ICSMD 2023
作者: Li, Fuqiang Yan, Zeyu Xiao, Haitao Mu, Pengcheng Yuan, Yongqiong Zhang, Weile 20th Institute Key Laboratory of Technology on Datalink Xi'an China Xi'an Jiaotong University Moe Key Lab for Intelligent Networks and Network Security Xi'an China
This paper presents a routing algorithm for TDMA mobile ad hoc networks based on smart antennas. In this algorithm, a new proactive link state routing algorithm with QOS guarantee is proposed. The algorithm uses a new... 详细信息
来源: 评论
High-precision end-to-end adaptive optics aided orbital angular momentum wireless communication with XFTC-Net
收藏 引用
Optics Letters 2025年 第10期50卷 3265-3268页
作者: Xu, Panpan Chang, Huan Wang, Fei Gao, Ran Guo, Dong Zhu, Lei Li, Zhipei Zhou, Sitong Xu, Qi Chen, Jing Xin, Xiangjun Beijing100081 China National Key Laboratory of Science and Technology on Space-Born Intelligent Information Processing Beijing China Beijing100876 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology 250353 China
In this Letter, we demonstrate high-precision end-to-end adaptive optics (AO) technique based on the X-Shape Fusion Transformer-convolutional neural network (XFTC-Net) without an additional probe path to compensate fo... 详细信息
来源: 评论
Fusion of Time-Frequency Features in Contrastive Learning for Shipboard Wind Speed Correction
收藏 引用
Journal of Ocean University of China 2025年 第2期24卷 377-386页
作者: SONG Jian HUANG Meng LI Xiang ZHANG Zhenqiang WANG Chunxiao ZHAO Zhigang Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science Center(National Supercomputer Center in Jinan)Qilu University of Technology(Shandong Academy of Sciences)Jinan 250000China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer ScienceJinan 250000China
Accurate wind speed measurements on maritime vessels are crucial for weather forecasting,sea state prediction,and safe ***,vessel motion and challenging environmental conditions often affect measurement *** address th... 详细信息
来源: 评论
Artificial Immune Detection for network Intrusion Data Based on Quantitative Matching Method
收藏 引用
Computers, Materials & Continua 2024年 第2期78卷 2361-2389页
作者: CaiMing Liu Yan Zhang Zhihui Hu Chunming Xie School of Electronic Information and Artificial Intelligence Leshan Normal UniversityLeshan614000China Intelligent Network Security Detection and Evaluation Laboratory Leshan Normal UniversityLeshan614000China Internet Natural Language Intelligent Processing Key Laboratory of Education Department of Sichuan Province Leshan Normal UniversityLeshan614000China
Artificial immune detection can be used to detect network intrusions in an adaptive approach and proper matching methods can improve the accuracy of immune detection *** paper proposes an artificial immune detection m... 详细信息
来源: 评论
An Adaptive Residual Coordinate Attention-Based network for Hat and Mask Wearing Detection in Kitchen Environments
An Adaptive Residual Coordinate Attention-Based Network for ...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Zhao, Ying Wu, Xiaoming Liu, Xiangzhi Chen, Hao Qi, Bei Dong, Huomin Key Laboratory of Computing Power Network and Information Security Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
In order to ensure food safety, it is required for personnel to wear hats and masks during food handling processes. To accurately detect the wearing status of kitchen staff, the ARP-YOLO model is proposed. Firstly, im... 详细信息
来源: 评论
Integrating Structural Semantic Knowledge for Enhanced Information Extraction Pre-training
Integrating Structural Semantic Knowledge for Enhanced Infor...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Yi, Xiaoyang Bao, Yuru Zhang, Jian Qin, Yifang Lin, Faxin College of Cyber Science Nankai University China College of Computer Science Nankai University China Tianjin Key Laboratory of Network and Data Security Technology China Key Laboratory of Data and Intelligent System Security Ministry of Education China
Information Extraction (IE), aiming to extract structured information from unstructured natural language texts, can significantly benefit from pre-trained language models. However, existing pre-training methods solely... 详细信息
来源: 评论
A Revisit to Graph Neighborhood Cardinality Estimation
A Revisit to Graph Neighborhood Cardinality Estimation
收藏 引用
International Conference on Data Engineering
作者: Pinghui Wang Yuanming Zhang Kuankuan Cheng Junzhou Zhao MOE Key Laboratory for Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an China
Graph data are ubiquitous in real-world systems such as social networks and protein-protein interaction networks. In many applications, nodes usually are associated with real-value attributes, e.g., age, income, and w... 详细信息
来源: 评论
BTP-CAResNet: An Encrypted Traffic Classification Method Based on Byte Transfer Probability and Coordinate Attention Mechanism
BTP-CAResNet: An Encrypted Traffic Classification Method Bas...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Li, Junhao Shi, Huiling Zhang, Wei Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
With the extensive application of network traffic encryption technology, the accurate and efficient classification of encrypted traffic has become a critical need for network management. Deep learning has become the p... 详细信息
来源: 评论
CB-YOLO: A Small Object Detection Algorithm for Industrial Scenarios
CB-YOLO: A Small Object Detection Algorithm for Industrial S...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Chen, Hao Wu, Xiaoming Su, Zhanzhi Zhao, Ying Dong, Yunfeng Liu, Xiangzhi Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
In certain specific industrial scenarios, smoking and cellphone usage are strictly prohibited behaviors. In these scenarios, it is crucial to rapidly and accurately detect smoking and cell phone usage, and promptly is... 详细信息
来源: 评论