咨询与建议

限定检索结果

文献类型

  • 720 篇 会议
  • 478 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,199 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 710 篇 工学
    • 461 篇 计算机科学与技术...
    • 392 篇 软件工程
    • 230 篇 信息与通信工程
    • 119 篇 电气工程
    • 109 篇 控制科学与工程
    • 88 篇 电子科学与技术(可...
    • 64 篇 生物工程
    • 41 篇 机械工程
    • 41 篇 仪器科学与技术
    • 34 篇 光学工程
    • 32 篇 生物医学工程(可授...
    • 31 篇 动力工程及工程热...
    • 30 篇 建筑学
    • 27 篇 网络空间安全
    • 23 篇 土木工程
    • 21 篇 交通运输工程
    • 17 篇 化学工程与技术
    • 17 篇 安全科学与工程
  • 320 篇 理学
    • 194 篇 数学
    • 71 篇 生物学
    • 67 篇 统计学(可授理学、...
    • 56 篇 系统科学
    • 49 篇 物理学
    • 20 篇 化学
  • 153 篇 管理学
    • 104 篇 管理科学与工程(可...
    • 56 篇 图书情报与档案管...
    • 27 篇 工商管理
  • 24 篇 法学
    • 17 篇 社会学
  • 23 篇 医学
    • 21 篇 临床医学
    • 15 篇 基础医学(可授医学...
  • 11 篇 经济学
  • 5 篇 教育学
  • 5 篇 农学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 88 篇 feature extracti...
  • 58 篇 accuracy
  • 53 篇 semantics
  • 41 篇 computational mo...
  • 39 篇 security
  • 37 篇 deep learning
  • 34 篇 training
  • 29 篇 data models
  • 27 篇 federated learni...
  • 27 篇 robustness
  • 25 篇 neural networks
  • 21 篇 data mining
  • 20 篇 wireless communi...
  • 20 篇 interference
  • 20 篇 privacy
  • 19 篇 noise
  • 19 篇 visualization
  • 19 篇 protocols
  • 18 篇 object detection
  • 18 篇 signal to noise ...

机构

  • 202 篇 shandong provinc...
  • 166 篇 key laboratory o...
  • 54 篇 ministry of educ...
  • 52 篇 shandong fundame...
  • 41 篇 shandong enginee...
  • 33 篇 moe key lab for ...
  • 18 篇 moe key laborato...
  • 17 篇 qilu university ...
  • 17 篇 ministry of educ...
  • 16 篇 state key labora...
  • 14 篇 qilu university ...
  • 12 篇 key laboratory o...
  • 12 篇 key laboratory o...
  • 11 篇 ministry of educ...
  • 11 篇 ministry of educ...
  • 11 篇 moe key lab for ...
  • 11 篇 state key labora...
  • 11 篇 school of electr...
  • 11 篇 tianjin key labo...
  • 10 篇 shandong enginee...

作者

  • 58 篇 meng deyu
  • 47 篇 wang hui-ming
  • 46 篇 xiaohong guan
  • 46 篇 guan xiaohong
  • 40 篇 qinye yin
  • 30 篇 wenjie wang
  • 30 篇 hui-ming wang
  • 24 篇 cao xiangyong
  • 22 篇 pengcheng mu
  • 18 篇 shen chao
  • 17 篇 qian xueming
  • 17 篇 jiang wu
  • 16 篇 yin qinye
  • 16 篇 tao qin
  • 16 篇 zheng qinghua
  • 16 篇 feng gao
  • 15 篇 xu zongben
  • 15 篇 wang pinghui
  • 15 篇 weile zhang
  • 14 篇 xinman zhang

语言

  • 1,095 篇 英文
  • 79 篇 其他
  • 26 篇 中文
检索条件"机构=Key Laboratory for Intelligent Networks and Network Security"
1199 条 记 录,以下是41-50 订阅
排序:
Policy network-Based Dual-Agent Deep Reinforcement Learning for Multi-Resource Task Offloading in Multi-Access Edge Cloud networks
收藏 引用
China Communications 2024年 第4期21卷 53-73页
作者: Feng Chuan Zhang Xu Han Pengchao Ma Tianchun Gong Xiaoxue School of Communications and Information Engineering Chongqing University of Posts and TelecommunicationsChongqing 400065China Institute of Intelligent Communication and Network Security Chongqing University of Posts and TelecommunicationsChongqing 400065China Key Laboratory of Big Data Intelligent Computing Chongqing University of Posts and TelecommunicationsChongqing 400065China School of Information Engineering Guangdong University of TechnologyGuangzhou 510006China
The Multi-access Edge Cloud(MEC) networks extend cloud computing services and capabilities to the edge of the networks. By bringing computation and storage capabilities closer to end-users and connected devices, MEC n... 详细信息
来源: 评论
T³Planner: Multi-Phase Planning Across Structure-Constrained Optical, IP, and Routing Topologies
收藏 引用
IEEE Journal on Selected Areas in Communications 2025年 第5期43卷 1823-1839页
作者: Hao, Yijun Yang, Shusen Li, Fang Zhang, Yifan Zhao, Cong Ren, Xuebin Zhao, Peng Xu, Chenren Wang, Shibo Xi’an Jiaotong University National Engineering Laboratory for Big Data Analytics Xi’an710049 China Xi’an Jiaotong University National Engineering Laboratory for Big Data Analytics Ministry of Education Key Laboratory for Intelligent Networks and Network Security Xi’an710049 China Peking University School of Computer Science Beijing100871 China The Chinese University of Hong Kong Department of Computer Science and Engineering Hong Kong National Engineering Laboratory for Big Data Analytics Xi'an Jiaotong University Xi'an710049 China
network topology planning is an essential multi-phase process to build and jointly optimize the multi-layer network topologies in wide-area networks (WANs). Most existing practices target single-phase/layer planning, ... 详细信息
来源: 评论
Application Methods and Practices of Deep Learning in network Intrusion Detection
Application Methods and Practices of Deep Learning in Networ...
收藏 引用
2023 International Conference on Artificial Intelligence, Systems and network security, AISNS 2023
作者: Wei, Shouan Zhang, Zhiheng Guangxi Key Laboratory of Machine Vision and Intelligent Control Wuzhou University Wuzhou Guangxi543002 China Network Security Laboratory Public Security Bureau of Lianyungang City Lianyungang Jiangsu222000 China
In the realm of cybersecurity, this study presents a novel approach to intrusion detection by harnessing the power of artificial intelligence (AI) and machine learning (ML). We delve into the critical domain of networ... 详细信息
来源: 评论
Quantum-inspired analysis of neural network vulnerabilities: the role of conjugate variables in system attacks
收藏 引用
National Science Review 2024年 第9期11卷 302-309页
作者: Jun-Jie Zhang Deyu Meng Division of Computational physics and Intelligent modeling Northwest Institute of Nuclear Technology School of Mathematics and Statistics and Ministry of Education Key Lab of Intelligent Networks and Network Security Xi'an Jiaotong University Pazhou Lab
Neural networks demonstrate vulnerability to small, non-random perturbations, emerging as adversarial attacks. Such attacks, born from the gradient of the loss function relative to the input, are discerned as input co... 详细信息
来源: 评论
DSDIR: A Two-Stage Method for Addressing Noisy Long-Tailed Problems in Malicious Traffic Detection
DSDIR: A Two-Stage Method for Addressing Noisy Long-Tailed P...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Li, Guoliang Zhang, Ruiqi Sun, Zhe Xing, Lingkai Zhang, Yu College of Cyber Science Nankai University Tianjin China College of Computer Science Nankai University Tianjin China Tianjin Key Laboratory of Network and Data Security Technology Tianjin China Key Laboratory of Data and Intelligent System Security Ministry of Education Tianjin China
In recent years, deep learning based malicious traffic detection (MTD) systems have demonstrated remarkable success. However, their effectiveness tend to decrease because most malicious traffic datasets are suffered f... 详细信息
来源: 评论
Online Queue-Aware Service Migration and Resource Allocation in Mobile Edge Computing
收藏 引用
IEEE Transactions on Vehicular Technology 2025年 第5期74卷 8063-8078页
作者: Du, An Jia, Jie Chen, Jian Wang, Xingwei Huang, Min Northeastern University School of Computer Science and Engineering The Engineering Research Center of Security Technology of Complex Network System Shenyang110819 China Northeastern University Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Shenyang110819 China Northeastern University College of Information Science and Engineering State Key Laboratory of Synthetical Automation for Process Industries Shenyang110819 China
Mobile edge computing (MEC) integrated with network Functions Virtualization (NFV) helps run a wide range of services implemented by Virtual network Functions (VNFs) deployed at MEC networks. This emerging paradigm of... 详细信息
来源: 评论
High Contrast Ratio 4-to-2 Plasmonic Encoder Utilizing Cascaded Ring Resonators  6
High Contrast Ratio 4-to-2 Plasmonic Encoder Utilizing Casca...
收藏 引用
6th International Conference on Electronic Engineering and Informatics, EEI 2024
作者: Chen, Yan Xie, Yiyuan Chai, Junxiong Ye, Yichen College of Electronic and Information Engineering Southwest University Chongqing400715 China Chongqing Key Laboratory of Nonlinear Circuits and Intelligent Information Processing Chongqing400715 China Key Laboratory of Networks and Cloud Computing Security of Universities in Chongqing Chongqing400715 China
In this paper, a novel plasmonic 4-to-2 encoder comprising cascaded ring resonators coated with graphene layers and two metal-insulator-metal (MIM) waveguides. The encoding function operates at 850 nm by modulating th... 详细信息
来源: 评论
Impact of Crosstalk and Loss on the Training Process of Integrated Photonic Neural networks  6
Impact of Crosstalk and Loss on the Training Process of Inte...
收藏 引用
6th International Conference on Electronic Engineering and Informatics, EEI 2024
作者: Pang, Jing Su, Ye Xie, Yiyuan College of Electronic and Information Engineering Southwest University Chongqing400715 China Chongqing Key Laboratory of Nonlinear Circuits and Intelligent Information Processing Chongqing400715 China Key Laboratory of Networks and Cloud Computing Security of Universities in Chongqing Chongqing400715 China
Integrated photonic neural networks (IPNNs), with their ability to process large-scale data and parallelize multiple computational tasks, have shown impressive promise for applications in the field of artificial intel... 详细信息
来源: 评论
A New CP-Based Non-Overlapping FBMC-QAM System for Future Wireless Communications
收藏 引用
China Communications 2025年 第5期22卷 108-127页
作者: Ren Defeng Li Jing Sun Chuiqiang Zhang Guohua Shaanxi Key Laboratory of Information Communication Network and Security Xi’an University of Posts and TelecommunicationsXi’an 710121China State Key Laboratory of Integrated Services Networks Xidian UniversityXi’an 710071China China Academy of Space Technology(Xi’an) Xi’an 710000China
A new cyclic prefix(CP)-based nonoverlapping FBMC-QAM(CP-NO-FBMC-QAM)system with two prototype filters is proposed in this paper,which satisfies complex orthogonality conditions and good frequency energy confinement a... 详细信息
来源: 评论
JTEA: Implementing Semi-Supervised Entity Alignment Using Joint Teaching Strategies
JTEA: Implementing Semi-Supervised Entity Alignment Using Jo...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Lu, Kai Zhao, Jing Ding, Lichao Hao, Zenghao Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan China Faculty of Computer Science and Technology Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
Entity alignment(EA) aims to identify equivalent entities in different knowledge graphs or data sources and establish correspondences between them. In recent years, embedding-based methods have made significant progre... 详细信息
来源: 评论