咨询与建议

限定检索结果

文献类型

  • 1,837 篇 会议
  • 1,582 篇 期刊文献

馆藏范围

  • 3,419 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,295 篇 工学
    • 1,682 篇 计算机科学与技术...
    • 1,313 篇 软件工程
    • 613 篇 信息与通信工程
    • 305 篇 电气工程
    • 249 篇 电子科学与技术(可...
    • 230 篇 控制科学与工程
    • 222 篇 生物工程
    • 155 篇 机械工程
    • 129 篇 网络空间安全
    • 110 篇 仪器科学与技术
    • 109 篇 光学工程
    • 105 篇 生物医学工程(可授...
    • 83 篇 化学工程与技术
    • 77 篇 动力工程及工程热...
    • 75 篇 交通运输工程
    • 59 篇 安全科学与工程
    • 55 篇 建筑学
  • 1,073 篇 理学
    • 635 篇 数学
    • 244 篇 生物学
    • 228 篇 物理学
    • 197 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 91 篇 化学
  • 673 篇 管理学
    • 389 篇 管理科学与工程(可...
    • 311 篇 图书情报与档案管...
    • 142 篇 工商管理
  • 107 篇 法学
    • 71 篇 社会学
  • 83 篇 医学
    • 68 篇 临床医学
    • 59 篇 基础医学(可授医学...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 38 篇 农学
  • 23 篇 军事学
  • 11 篇 文学
  • 10 篇 教育学
  • 9 篇 艺术学

主题

  • 140 篇 feature extracti...
  • 123 篇 semantics
  • 95 篇 accuracy
  • 79 篇 computational mo...
  • 78 篇 training
  • 65 篇 data models
  • 64 篇 deep learning
  • 62 篇 federated learni...
  • 49 篇 protocols
  • 48 篇 clustering algor...
  • 47 篇 data mining
  • 45 篇 visualization
  • 45 篇 cryptography
  • 44 篇 neural networks
  • 44 篇 privacy
  • 43 篇 security
  • 43 篇 robustness
  • 42 篇 adaptation model...
  • 41 篇 optimization
  • 41 篇 predictive model...

机构

  • 221 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 166 篇 school of comput...
  • 80 篇 key laboratory o...
  • 65 篇 college of compu...
  • 63 篇 computer network...
  • 59 篇 college of infor...
  • 57 篇 key laboratory o...
  • 56 篇 college of mathe...
  • 50 篇 shandong fundame...
  • 47 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 43 篇 institute of inf...
  • 42 篇 school of cyber ...
  • 41 篇 the key laborato...
  • 40 篇 school of comput...
  • 37 篇 university of ch...
  • 37 篇 shandong provinc...
  • 36 篇 key laboratory o...

作者

  • 46 篇 zhao yao
  • 41 篇 ren jiadong
  • 36 篇 zhou deyu
  • 29 篇 zhang min-ling
  • 27 篇 yang yang
  • 27 篇 min-ling zhang
  • 26 篇 cong runmin
  • 24 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 21 篇 guang cheng
  • 20 篇 zhang zhenrong
  • 20 篇 guo kun
  • 19 篇 geng xin
  • 19 篇 wang yun
  • 19 篇 du bo
  • 18 篇 liu ximeng
  • 18 篇 xia chunhe
  • 17 篇 xiaoping li
  • 16 篇 di xiaoqiang
  • 16 篇 he yulan

语言

  • 3,097 篇 英文
  • 190 篇 其他
  • 147 篇 中文
检索条件"机构=Key Laboratory of Computer Network Information Integration"
3419 条 记 录,以下是21-30 订阅
排序:
SEAVER: Attention Reallocation for Mitigating Distractions in Language Models for Conditional Semantic Textual Similarity Measurement
SEAVER: Attention Reallocation for Mitigating Distractions i...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Li, Baixuan Fan, Yunlong Gao, Zhiqiang School of Computer Science and Engineering Southeast University Nanjing211189 China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education China
Conditional Semantic Textual Similarity (C-STS) introduces specific limiting conditions to the traditional Semantic Textual Similarity (STS) task, posing challenges for STS models. Language models employing cross-enco... 详细信息
来源: 评论
Multi-Label Open Set Recognition  38
Multi-Label Open Set Recognition
收藏 引用
38th Conference on Neural information Processing Systems, NeurIPS 2024
作者: Wang, Yi-Bo Hang, Jun-Yi Zhang, Min-Ling School of Computer Science and Engineering Southeast University Nanjing210096 China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education China
In multi-label learning, each training instance is associated with multiple labels simultaneously. Traditional multi-label learning studies primarily focus on closed set scenario, i.e. the class label set of test data...
来源: 评论
Binary Decomposition: A Problem Transformation Perspective for Open-Set Semi-Supervised Learning  41
Binary Decomposition: A Problem Transformation Perspective f...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Hang, Jun-Yi Zhang, Min-Ling School of Computer Science and Engineering Southeast University Nanjing210096 China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education China
Semi-supervised learning (SSL) is a classical machine learning paradigm dealing with labeled and unlabeled data. However, it often suffers performance degradation in real-world open-set scenarios, where unlabeled data... 详细信息
来源: 评论
A new quantum key distribution resource allocation and routing optimization scheme
收藏 引用
Chinese Physics B 2024年 第3期33卷 244-259页
作者: 毕琳 袁晓同 吴炜杰 林升熙 School of Computer Science and Technology Changchun University of Science and TechnologyChangchun 130012China Key Laboratory of Network and Information Security in Jilin Province Changchun 130012China
Quantum key distribution(QKD)is a technology that can resist the threat of quantum computers to existing conventional cryptographic ***,due to the stringent requirements of the quantum key generation environment,the g... 详细信息
来源: 评论
Prompting Large Language Models with Knowledge-Injection for Knowledge-Based Visual Question Answering
收藏 引用
Big Data Mining and Analytics 2024年 第3期7卷 843-857页
作者: Zhongjian Hu Peng Yang Fengyuan Liu Yuan Meng Xingyu Liu School of Computer Science and Engineering Southeast University the Key Laboratory of Computer Network and Information Integration(Southeast University) Ministry of Education of the People’s Republic of ChinaNanjing 211189China Southeast University-Monash University Joint Graduate School(Suzhou) Southeast UniversitySuzhou 215125China
Previous works employ the Large Language Model(LLM)like GPT-3 for knowledge-based Visual Question Answering(VQA).We argue that the inferential capacity of LLM can be enhanced through knowledge *** methods that utilize... 详细信息
来源: 评论
TRBFT: An Efficient Blockchain Consensus for Edge Computing-Enabled IoT Systems
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 15853-15868页
作者: Zheng, Jiali Zhang, Yuxi Guangxi University Guangxi Key Laboratory of Multimedia Communications and Network Technology School of Computer Electronics and Information Guangxi Nanning530004 China
With the continuous expansion of the Internet of Things (IoT), and despite reductions in communication latency enabled by edge computing, the decentralized nature of node structures poses significant security challeng... 详细信息
来源: 评论
Weighted Attribute Based Conditional Proxy Re-Encryption in the Cloud
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 1399-1414页
作者: Xixi Yan Jing Zhang Pengyu Cheng Henan Key Laboratory of Network Cryptography Technology Network Information Security and Cryptography LaboratorySchool of SoftwareHenan Polytechnic UniversityJiaozuo454003China School of Computer Science and Technology Henan Polytechnic UniversityJiaozuo454000China
Conditional proxy re-encryption(CPRE)is an effective cryptographic primitive language that enhances the access control mechanism and makes the delegation of decryption permissions more granular,but most of the attribu... 详细信息
来源: 评论
Blockchain and signcryption enabled asynchronous federated learning framework in fog computing
收藏 引用
Digital Communications and networks 2025年 第2期11卷 442-454页
作者: Zhou Zhou Youliang Tian Jinbo Xiong Changgen Peng Jing Li Nan Yang State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang 550025China Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber SecurityFujian Normal UniversityFuzhou 350117China Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic TechnologyGuilin 541004China
Federated learning combines with fog computing to transform data sharing into model sharing,which solves the issues of data isolation and privacy disclosure in fog ***,existing studies focus on centralized single-laye... 详细信息
来源: 评论
A Meta Meeting Mountain based opportunistic message forwarding strategy
A Meta Meeting Mountain based opportunistic message forwardi...
收藏 引用
作者: Tu, Jinbin Wang, Yun Liu, Yichuan Li, Qing School of Computer Science and Engineering Southeast University Nanjing China Key Lab of Computer Network and Information Integration MOE Nanjing China
The opportunistic network is a type of ad hoc network that relies on the chance encounters between nodes to transmit messages. It also uses store-and-carry-forward techniques for data transfer between nodes. Developin... 详细信息
来源: 评论
A cost-efficient quantum access network with qubit-based synchronization
收藏 引用
Science China(Physics,Mechanics & Astronomy) 2024年 第4期67卷 12-22页
作者: Chunfeng Huang Ye Chen Tingting Luo Wenjie He Xin Liu Zhenrong Zhang Kejin Wei Guangxi Key Laboratory for Relativistic Astrophysics School of Physical Science and TechnologyGuangxi UniversityNanning 530004China Guangxi Key Laboratory of Multimedia Communications and Network Technology School of Computer Electronics and InformationGuangxi UniversityNanning 530004China
Quantum key distribution(QKD)is a physical layer encryption technique that enables two distant parties to exchange secure keys with information-theoretic *** the last two decades,QKD has transitioned from laboratory r... 详细信息
来源: 评论