咨询与建议

限定检索结果

文献类型

  • 1,856 篇 会议
  • 1,616 篇 期刊文献

馆藏范围

  • 3,472 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,334 篇 工学
    • 1,713 篇 计算机科学与技术...
    • 1,326 篇 软件工程
    • 623 篇 信息与通信工程
    • 305 篇 电气工程
    • 254 篇 电子科学与技术(可...
    • 249 篇 控制科学与工程
    • 222 篇 生物工程
    • 155 篇 机械工程
    • 133 篇 网络空间安全
    • 110 篇 光学工程
    • 110 篇 仪器科学与技术
    • 105 篇 生物医学工程(可授...
    • 84 篇 化学工程与技术
    • 78 篇 动力工程及工程热...
    • 75 篇 交通运输工程
    • 60 篇 安全科学与工程
    • 56 篇 建筑学
  • 1,085 篇 理学
    • 641 篇 数学
    • 245 篇 生物学
    • 230 篇 物理学
    • 198 篇 统计学(可授理学、...
    • 92 篇 化学
    • 92 篇 系统科学
  • 679 篇 管理学
    • 392 篇 管理科学与工程(可...
    • 314 篇 图书情报与档案管...
    • 144 篇 工商管理
  • 106 篇 法学
    • 71 篇 社会学
  • 85 篇 医学
    • 69 篇 临床医学
    • 59 篇 基础医学(可授医学...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 38 篇 农学
  • 24 篇 军事学
  • 11 篇 教育学
  • 11 篇 文学
  • 10 篇 艺术学

主题

  • 138 篇 feature extracti...
  • 123 篇 semantics
  • 96 篇 accuracy
  • 79 篇 computational mo...
  • 77 篇 training
  • 65 篇 deep learning
  • 65 篇 data models
  • 64 篇 federated learni...
  • 49 篇 protocols
  • 48 篇 clustering algor...
  • 47 篇 data mining
  • 45 篇 neural networks
  • 45 篇 privacy
  • 45 篇 cryptography
  • 44 篇 visualization
  • 44 篇 security
  • 43 篇 robustness
  • 42 篇 predictive model...
  • 42 篇 adaptation model...
  • 41 篇 optimization

机构

  • 228 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 174 篇 school of comput...
  • 84 篇 key laboratory o...
  • 69 篇 college of compu...
  • 66 篇 computer network...
  • 60 篇 key laboratory o...
  • 59 篇 college of infor...
  • 55 篇 college of mathe...
  • 52 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 44 篇 institute of inf...
  • 43 篇 school of cyber ...
  • 41 篇 the key laborato...
  • 41 篇 school of comput...
  • 38 篇 university of ch...
  • 37 篇 fujian provincia...
  • 37 篇 shandong provinc...

作者

  • 48 篇 zhao yao
  • 41 篇 ren jiadong
  • 37 篇 zhou deyu
  • 33 篇 zhang min-ling
  • 28 篇 min-ling zhang
  • 27 篇 yang yang
  • 26 篇 cong runmin
  • 25 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 20 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 geng xin
  • 19 篇 wang yun
  • 19 篇 du bo
  • 18 篇 xia chunhe
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 16 篇 zhenrong zhang
  • 16 篇 di xiaoqiang

语言

  • 3,074 篇 英文
  • 266 篇 其他
  • 149 篇 中文
检索条件"机构=Key Laboratory of Computer Network Information Integration"
3472 条 记 录,以下是111-120 订阅
排序:
Knowledge Distillation Using Global Fusion and Feature Restoration for Industrial Defect Detectors
Knowledge Distillation Using Global Fusion and Feature Resto...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Feng, Zhengqian Yue, Xiyao Li, Wang Zhou, Mingle Han, Delong Li, Gang Shandong Scicom Information and Economy Research Institute CO.. Ltd China Key Laboratory of Computing Power Network and Information Security Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
Deep learning technology has been widely applied in industrial quality inspection tasks to improve the accuracy of defect detection, object recognition, and classification. However, in the task of object detection, bo... 详细信息
来源: 评论
A Constructive Method Based on Dynamic Solution Space for Travelling Salesman Problem  11
A Constructive Method Based on Dynamic Solution Space for Tr...
收藏 引用
11th International Conference on Advanced Cloud and Big Data, CBD 2023
作者: Bai, Xiaoxin Luli, Luli Wu, Hanqian Southeast University School of Computer Science and Engineering China Southeast University School of Cyber Science and Engineering China Suzhou Centennail College China Southeast University Key Laboratory of Computer Network and Information Integration of Ministry of Education China
Neural combinatorial optimization (NCO) has emerged as a promising field to solve the combinatorial optimization problem (COP) as automatically learning the solvers less relying on domain-specific expert knowledge. Co... 详细信息
来源: 评论
JTEA: Implementing Semi-Supervised Entity Alignment Using Joint Teaching Strategies
JTEA: Implementing Semi-Supervised Entity Alignment Using Jo...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Lu, Kai Zhao, Jing Ding, Lichao Hao, Zenghao Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan China Faculty of Computer Science and Technology Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
Entity alignment(EA) aims to identify equivalent entities in different knowledge graphs or data sources and establish correspondences between them. In recent years, embedding-based methods have made significant progre... 详细信息
来源: 评论
A generalized reliability analysis of 3-ary n-cubes  16
A generalized reliability analysis of 3-ary n-cubes
收藏 引用
16th International Conference on Communication Software and networks, ICCSN 2024
作者: Bai, Zefang Wang, Guijuan Ma, Meijie School of Mathematics and Statistics Jinan250353 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250353 China
Evaluating the reliability of interconnection networks is crucial. The edge-connectivity is a parameter used to assess reliability. In this paper, we discuss a conditional edge-connectivity called the h-extra g-compon... 详细信息
来源: 评论
Generalization analysis for label-specific representation learning  24
Generalization analysis for label-specific representation le...
收藏 引用
Proceedings of the 38th International Conference on Neural information Processing Systems
作者: Yi-Fan Zhang Min-Ling Zhang School of Cyber Science and Engineering Southeast University Nanjing China and Key Laboratory of Computer Network and Information Integration (Southeast University) Ministry of Education China School of Computer Science and Engineering Southeast University Nanjing China and Key Laboratory of Computer Network and Information Integration (Southeast University) Ministry of Education China
Label-specific representation learning (LSRL), i.e., constructing the representation with specific discriminative properties for each class label, is an effective strategy to improve the performance of multi-label lea...
来源: 评论
Efficient and fine-grained access control with fully-hidden policies for cloud-enabled IoT
收藏 引用
Digital Communications and networks 2025年 第2期11卷 473-481页
作者: Qi Li Gaozhan Liu Qianqian Zhang Lidong Han Wei Chen Rui Li Jinbo Xiong School of Computer Science Nanjing University of Posts and TelecommunicationsNanjing 210023China Key Laboratory of Cryptography of Zhejiang Province Hangzhou Normal UniversityHangzhou 311121China Tongda College of Nanjing University of Posts and Telecommunications Yangzhou 225127China Henan Key Laboratory of Network Cryptography Technology Zhengzhou 450001China School of Computer Science and Technology Xidian UniversityXi'an 710071China State Key Laboratory of Tibetan Intelligent Information Processing and Application Qinghai Normal UniversityXining 810008China Faculty of Software Fujian Normal UniversityFuzhou 350108China
Ciphertext-Policy Attribute-Based Encryption(CP-ABE)enables fine-grained access control on ciphertexts,making it a promising approach for managing data stored in the cloud-enabled Internet of *** existing schemes ofte... 详细信息
来源: 评论
FedIERF: Federated Incremental Extremely Random Forest for Wearable Health Monitoring
收藏 引用
Journal of computer Science & Technology 2023年 第5期38卷 970-984页
作者: 胡春雨 忽丽莎 袁林 陆佃杰 吕蕾 陈益强 Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science Center(National Supercomputer Center in Jinan)Qilu University of Technology(Shandong Academy of Sciences)Jinan 250353China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer ScienceJinan 250000China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan 25000China Institute of Information Technology Hebei University of Economics and BusinessShijiazhuang 050061China School of Information Science and Engineering Shandong Normal UniversityJinan 250358China Institute of Computing Technology Chinese Academy of SciencesBeijing 100190China
Wearable health monitoring is a crucial technical tool that offers early warning for chronic diseases due to its superior portability and low power ***,most wearable health data is distributed across dfferent organiza... 详细信息
来源: 评论
Malware Detection Method Based on TPE Optimized Stacking  3
Malware Detection Method Based on TPE Optimized Stacking
收藏 引用
3rd International Conference on High Performance Computing and Communication Engineering, HPCCE 2023
作者: Zhao, Dongbo Yuan, Zesong Xie, Nannan Jilin Province Key Laboratory of Network and Information Security School of Computer Science and Technology Changchun University of Science and Technology Changchun130022 China
Fast detection and categorization of malware are increasingly important for securing hosts and networks. Although many Machine Learning models have been utilized to detect malware, single-model detection may not remai... 详细信息
来源: 评论
Weakly supervised temporal action localization with proxy metric modeling
收藏 引用
Frontiers of computer Science 2023年 第2期17卷 63-72页
作者: Hongsheng XU Zihan CHEN Yu ZHANG Xin GENG Siya MI Zhihong YANG NARI Group Corporation(State Grid Electric Power Research Institute) Nanjing 211106China School of Computer Science and Engineering and the Key Lab of Computer Network and Information Integration(Ministry of Education)Southeast UniversityNanjing 211189China School of Cyber Science and Engineering Southeast UniversityNanjing 211189China Purple Mountain Laboratories Nanjing 211111China
Temporal localization is crucial for action video *** the manual annotations are expensive and time-consuming in videos,temporal localization with weak video-level labels is challenging but *** this paper,we propose a... 详细信息
来源: 评论
Semantic Relation-Based Cross Attention network for Image-Text Retrieval
Semantic Relation-Based Cross Attention Network for Image-Te...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Zhou, Huanxiao Geng, Yushui Zhao, Jing Ma, Xishan Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan China Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China Jinan China
Image-text retrieval refers to querying the text or image of another modality given an image or text, and its key lies in the ability to accurately measure the similarity between text and image. Most of the existing r...
来源: 评论