咨询与建议

限定检索结果

文献类型

  • 1,856 篇 会议
  • 1,616 篇 期刊文献

馆藏范围

  • 3,472 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,334 篇 工学
    • 1,713 篇 计算机科学与技术...
    • 1,326 篇 软件工程
    • 623 篇 信息与通信工程
    • 305 篇 电气工程
    • 254 篇 电子科学与技术(可...
    • 249 篇 控制科学与工程
    • 222 篇 生物工程
    • 155 篇 机械工程
    • 133 篇 网络空间安全
    • 110 篇 光学工程
    • 110 篇 仪器科学与技术
    • 105 篇 生物医学工程(可授...
    • 84 篇 化学工程与技术
    • 78 篇 动力工程及工程热...
    • 75 篇 交通运输工程
    • 60 篇 安全科学与工程
    • 56 篇 建筑学
  • 1,085 篇 理学
    • 641 篇 数学
    • 245 篇 生物学
    • 230 篇 物理学
    • 198 篇 统计学(可授理学、...
    • 92 篇 化学
    • 92 篇 系统科学
  • 679 篇 管理学
    • 392 篇 管理科学与工程(可...
    • 314 篇 图书情报与档案管...
    • 144 篇 工商管理
  • 106 篇 法学
    • 71 篇 社会学
  • 85 篇 医学
    • 69 篇 临床医学
    • 59 篇 基础医学(可授医学...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 38 篇 农学
  • 24 篇 军事学
  • 11 篇 教育学
  • 11 篇 文学
  • 10 篇 艺术学

主题

  • 138 篇 feature extracti...
  • 123 篇 semantics
  • 96 篇 accuracy
  • 79 篇 computational mo...
  • 77 篇 training
  • 65 篇 deep learning
  • 65 篇 data models
  • 64 篇 federated learni...
  • 49 篇 protocols
  • 48 篇 clustering algor...
  • 47 篇 data mining
  • 45 篇 neural networks
  • 45 篇 privacy
  • 45 篇 cryptography
  • 44 篇 visualization
  • 44 篇 security
  • 43 篇 robustness
  • 42 篇 predictive model...
  • 42 篇 adaptation model...
  • 41 篇 optimization

机构

  • 228 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 174 篇 school of comput...
  • 84 篇 key laboratory o...
  • 69 篇 college of compu...
  • 66 篇 computer network...
  • 60 篇 key laboratory o...
  • 59 篇 college of infor...
  • 55 篇 college of mathe...
  • 52 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 44 篇 institute of inf...
  • 43 篇 school of cyber ...
  • 41 篇 the key laborato...
  • 41 篇 school of comput...
  • 38 篇 university of ch...
  • 37 篇 fujian provincia...
  • 37 篇 shandong provinc...

作者

  • 48 篇 zhao yao
  • 41 篇 ren jiadong
  • 37 篇 zhou deyu
  • 33 篇 zhang min-ling
  • 28 篇 min-ling zhang
  • 27 篇 yang yang
  • 26 篇 cong runmin
  • 25 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 20 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 geng xin
  • 19 篇 wang yun
  • 19 篇 du bo
  • 18 篇 xia chunhe
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 16 篇 zhenrong zhang
  • 16 篇 di xiaoqiang

语言

  • 3,074 篇 英文
  • 266 篇 其他
  • 149 篇 中文
检索条件"机构=Key Laboratory of Computer Network Information Integration"
3472 条 记 录,以下是241-250 订阅
排序:
Entity Disambiguation Based on UCL Knowledge Space
Entity Disambiguation Based on UCL Knowledge Space
收藏 引用
2021 IEEE International Conference on Artificial Intelligence and Industrial Design, AIID 2021
作者: Xinchen, Chang Peng, Yang School of Computer Science and Engineering Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University Nanjing China
Named entity disambiguation is an important task in the process of knowledge space construction and improvement, which builds a bridge between entities in text and entities in knowledge space. However, the existing en... 详细信息
来源: 评论
Brillouin Frequency Shift Extraction for BOTDA Based on Gramian Angular Fields  4
Brillouin Frequency Shift Extraction for BOTDA Based on Gram...
收藏 引用
4th International Computational Imaging Conference, CITA 2024
作者: Zhu, Borong Zhang, Zhihao Qian, Yuhao Ma, Xiaole Wang, Liang Yu, Kuanglu Beijing Key Laboratory of Advanced Information Science and Network Technology Beijing100044 China Institute of Information Science School of Computer and Information Technology Beijing Jiaotong University Beijing100044 China National Engineering Laboratory for Next Generation Internet Access System School of Optics and Electronic Information Huazhong University of Science and Technology Wuhan430074 China
To accurately extract Brillouin frequency shift of BOTDA with large sweeping step sizes, a novel structure of GAFCNN is proposed, combining time series coding with convolutional neural networks. The experimental data ... 详细信息
来源: 评论
MedX-Net: Hierarchical Transformer with Large Kernel Convolutions for 3D Medical Image Segmentation
MedX-Net: Hierarchical Transformer with Large Kernel Convolu...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Lu, Lin Zou, Qingzhi Key Laboratory of Computing Power Network and Information Se-curity Ministry of Education Shandong Computer Science Center Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Due to the exceptional performance of Transform-ers in 2D medical image segmentation, recent work has also introduced them into 3D medical segmentation tasks. For instance, Swin UNETR and other hierarchical Transforme... 详细信息
来源: 评论
MFFLEN: Multi-Label Text Classification Based on Multi-Feature Fusion and Label Embedding
MFFLEN: Multi-Label Text Classification Based on Multi-Featu...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Gu, Qiliang Zhao, Shuo Zhang, Jianqiang Song, Gongpeng Lu, Qin Key Laboratory of Computing Power Network and Information Security Jinan China Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China Shandong Branch of China Mobile Communication Group Design Institute Co. Jinan China
To address the challenges associated with insufficiently extracting and utilizing features at different levels, overlooking the connection between label meanings and text, and facing problems of over-compression or in... 详细信息
来源: 评论
Attention-Based Graph Clustering with Enhanced Delivery Operator
Attention-Based Graph Clustering with Enhanced Delivery Oper...
收藏 引用
International Conference on Advanced Cloud and Big Data (CBD)
作者: Xuanqi Liu Sen Xu Xiufang Xu Naixuan Guo Xuesheng Bian Chaofeng Chen Yancheng Institute of Technology (School of Information Engineering) Yancheng China Yancheng Institute of Technology (School of Information Engineering) Key Laboratory of Computer Network and Information Integration (Southeast University) Yancheng China
Recently, graph clustering methods that integrate structured information into deep clustering have become one of the important research directions. However, current methods still lack an efficient and flexible fusion ... 详细信息
来源: 评论
Pricing Policy for a Dynamic Spectrum Allocation Scheme with Batch Requests and Impatient Packets in Cognitive Radio networks
收藏 引用
Journal of Systems Science and Systems Engineering 2022年 第2期31卷 133-149页
作者: Haixing Wu Shunfu Jin Wuyi Yue School of Information Science and Engineering Yanshan UniversityQinhuangdao 066004China Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Yanshan UniversityQinhuangdao 066004China Department of Intelligence and Informatics Konan UniversityKobe 658-8501Japan
In cognitive radio networks(CRNs),multiple secondary users may send out requests simultaneously and one secondary user may send out multiple requests at one time,i.e.,request arrivals usually show an aggregate ***,a s... 详细信息
来源: 评论
BWG: An IOC Identification Method for Imbalanced Threat Intelligence Datasets
BWG: An IOC Identification Method for Imbalanced Threat Inte...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Juncheng Lu Yiyang Zhao Yan Wang Jiyuan Cui Sanfeng Zhang School of Cyber Science and Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Nanjing China
APT attacks are becoming increasingly complex and stealthy. To effectively counter APT attacks, modelling threat intelligence data based on graphs, identifying Indicators of Compromise (IOC) nodes, and providing early... 详细信息
来源: 评论
A Survey on Task Scheduling of CPU-GPU Heterogeneous Cluster
收藏 引用
ZTE Communications 2024年 第3期22卷 83-90页
作者: ZHOU Yiheng ZENG Wei ZHENG Qingfang LIU Zhilong CHEN Jianping University of Shanghai for Science and Technology Shanghai 200093China National Key Laboratory for Multimedia Information Processing School of Computer SciencePeking UniversityBeijing 100871China State Key Laboratory of Mobile Network and Mobile Multimedia Technology Shenzhen 518055China ZTE Corporation Shenzhen 518057China
This paper reviews task scheduling frameworks,methods,and evaluation metrics of central processing unit-graphics processing unit(CPU-GPU)heterogeneous *** scheduling of CPU-GPU heterogeneous clusters can be carried ou... 详细信息
来源: 评论
BWG: An IOC Identification Method for Imbalanced Threat Intelligence Datasets  23
BWG: An IOC Identification Method for Imbalanced Threat Inte...
收藏 引用
23rd IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024
作者: Lu, Juncheng Zhao, Yiyang Wang, Yan Cui, Jiyuan Zhang, Sanfeng Southeast University School of Cyber Science and Engineering Nanjing China Southeast University Ministry of Education Key Laboratory of Computer Network and Information Integration Nanjing China
APT attacks are becoming increasingly complex and stealthy. To effectively counter APT attacks, modelling threat intelligence data based on graphs, identifying Indicators of Compromise (IOC) nodes, and providing early... 详细信息
来源: 评论
Improved NL2SQL based on Multi-layer Expert network
arXiv
收藏 引用
arXiv 2023年
作者: Hao, Chenduo Zhang, Xu School of Computer Science and Engineering Southeast University China Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University China
The Natural Language to SQL (NL2SQL) technique is used to convert natural language queries into executable SQL statements. Typically, slot-filling is employed as a classification method for multi-task cases to achieve... 详细信息
来源: 评论