咨询与建议

限定检索结果

文献类型

  • 1,837 篇 会议
  • 1,571 篇 期刊文献

馆藏范围

  • 3,408 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,283 篇 工学
    • 1,671 篇 计算机科学与技术...
    • 1,305 篇 软件工程
    • 612 篇 信息与通信工程
    • 297 篇 电气工程
    • 249 篇 电子科学与技术(可...
    • 230 篇 控制科学与工程
    • 222 篇 生物工程
    • 154 篇 机械工程
    • 129 篇 网络空间安全
    • 110 篇 仪器科学与技术
    • 109 篇 光学工程
    • 105 篇 生物医学工程(可授...
    • 83 篇 化学工程与技术
    • 77 篇 动力工程及工程热...
    • 75 篇 交通运输工程
    • 59 篇 安全科学与工程
    • 54 篇 建筑学
  • 1,073 篇 理学
    • 634 篇 数学
    • 244 篇 生物学
    • 228 篇 物理学
    • 196 篇 统计学(可授理学、...
    • 91 篇 化学
    • 91 篇 系统科学
  • 672 篇 管理学
    • 389 篇 管理科学与工程(可...
    • 310 篇 图书情报与档案管...
    • 142 篇 工商管理
  • 106 篇 法学
    • 71 篇 社会学
  • 83 篇 医学
    • 68 篇 临床医学
    • 59 篇 基础医学(可授医学...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 38 篇 农学
  • 23 篇 军事学
  • 11 篇 文学
  • 10 篇 教育学
  • 9 篇 艺术学

主题

  • 138 篇 feature extracti...
  • 123 篇 semantics
  • 95 篇 accuracy
  • 79 篇 computational mo...
  • 77 篇 training
  • 65 篇 data models
  • 64 篇 deep learning
  • 62 篇 federated learni...
  • 49 篇 protocols
  • 48 篇 clustering algor...
  • 47 篇 data mining
  • 45 篇 cryptography
  • 44 篇 neural networks
  • 44 篇 visualization
  • 44 篇 privacy
  • 43 篇 security
  • 43 篇 robustness
  • 42 篇 adaptation model...
  • 41 篇 optimization
  • 41 篇 predictive model...

机构

  • 221 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 166 篇 school of comput...
  • 80 篇 key laboratory o...
  • 65 篇 college of compu...
  • 64 篇 computer network...
  • 59 篇 college of infor...
  • 57 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 50 篇 shandong fundame...
  • 47 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 43 篇 institute of inf...
  • 42 篇 school of cyber ...
  • 41 篇 the key laborato...
  • 40 篇 school of comput...
  • 37 篇 university of ch...
  • 37 篇 shandong provinc...
  • 36 篇 key laboratory o...

作者

  • 46 篇 zhao yao
  • 41 篇 ren jiadong
  • 36 篇 zhou deyu
  • 29 篇 zhang min-ling
  • 27 篇 yang yang
  • 27 篇 min-ling zhang
  • 26 篇 cong runmin
  • 24 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 20 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 geng xin
  • 19 篇 wang yun
  • 19 篇 du bo
  • 18 篇 xia chunhe
  • 17 篇 xiaoping li
  • 17 篇 liu ximeng
  • 16 篇 di xiaoqiang
  • 16 篇 he yulan

语言

  • 3,089 篇 英文
  • 187 篇 其他
  • 147 篇 中文
检索条件"机构=Key Laboratory of Computer Network Information Integration"
3408 条 记 录,以下是81-90 订阅
排序:
The Study of Multi-type Computing Power Trading Mechanism in Computing Power network Based on Blockchain and Combinatorial Double Auction  24
The Study of Multi-type Computing Power Trading Mechanism in...
收藏 引用
4th International Conference on Artificial Intelligence, Big Data and Algorithms, CAIBDA 2024
作者: Zhao, Yue Wang, Jizhi Kong, Lingrui Sui, Tongtong Shandong Computer Science Center National Supercomputer Center in Jinan Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Provincial Key Laboratory of Industrial Network and Information System Security Qilu University of Technology Shandong Academy of Sciences Jinan Shandong China Quancheng Laboratory Jinan Key Laboratory of Digital Security Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan Shandong China
The advancement of 5G and mobile internet technologies has propelled the development of emerging businesses and applications, demanding higher requirements for network bandwidth and computational resources. To address... 详细信息
来源: 评论
Attack based on data: a novel perspective to attack sensitive points directly
收藏 引用
Cybersecurity 2024年 第3期7卷 111-123页
作者: Yuyao Ge Zhongguo Yang Lizhe Chen Yiming Wang Chengyang Li School of Information Science and Technology North China University of TechnologyBeijingChina Bejing Key Laboratory on Integration and Analysis of Large-Scale Stream Data North China University of TechnologyBeijingChina School of Computer Science Peking UniversityBeijingChina
Adversarial attack for time-series classification model is widely explored and many attack methods are *** there is not a method of attack based on the data *** this paper,we innovatively proposed a black-box sparse a... 详细信息
来源: 评论
BTP-CAResNet: An Encrypted Traffic Classification Method Based on Byte Transfer Probability and Coordinate Attention Mechanism
BTP-CAResNet: An Encrypted Traffic Classification Method Bas...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Li, Junhao Shi, Huiling Zhang, Wei Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
With the extensive application of network traffic encryption technology, the accurate and efficient classification of encrypted traffic has become a critical need for network management. Deep learning has become the p... 详细信息
来源: 评论
RFSD-YOLO: An Enhanced X-Ray Object Detection Model for Prohibited Items
RFSD-YOLO: An Enhanced X-Ray Object Detection Model for Proh...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Kong, Xiaotong Li, Aimin Li, Wenqiang Li, Zhiyao Zhang, Yuechen Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
X-ray image detection is essential for ensuring public safety, but traditional methods rely heavily on human analysis and are relatively inefficient. To address this issue, this paper proposes a new object detection m... 详细信息
来源: 评论
CB-YOLO: A Small Object Detection Algorithm for Industrial Scenarios
CB-YOLO: A Small Object Detection Algorithm for Industrial S...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Chen, Hao Wu, Xiaoming Su, Zhanzhi Zhao, Ying Dong, Yunfeng Liu, Xiangzhi Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
In certain specific industrial scenarios, smoking and cellphone usage are strictly prohibited behaviors. In these scenarios, it is crucial to rapidly and accurately detect smoking and cell phone usage, and promptly is... 详细信息
来源: 评论
A knowledge-enhanced interest segment division attention network for click-through rate prediction
收藏 引用
Neural Computing and Applications 2024年 第34期36卷 21817-21837页
作者: Liu, Zhanghui Chen, Shijie Chen, Yuzhong Su, Jieyang Zhong, Jiayuan Dong, Chen College of Computer and Data Science Fuzhou University Fujian Province Fuzhou350108 China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fujian Province Fuzhou350108 China
Click-through rate (CTR) prediction aims to estimate the probability of a user clicking on a particular item, making it one of the core tasks in various recommendation platforms. In such systems, user behavior data ar... 详细信息
来源: 评论
Fingerprint Revocable Template Protection of Variable Window-Based Random Permutation && Check Code  18th
Fingerprint Revocable Template Protection of Variable Windo...
收藏 引用
18th Chinese Conference on Biometric Recognition, CCBR 2024
作者: Xu, Zilong Bian, Weixin Hu, Yao Luo, Feng School of Computer and Information Anhui Normal University Anhui Wuhu241002 China Anhui Provincial Key Laboratory of Network and Information Security Anhui Wuhu241002 China
The Uniformly Random Permutation Hashing (URP-IoM) algorithm demonstrates reliable performance and irreversibility in biometric template protection. However, URP-IoM, through random permutation and Hadamard product co... 详细信息
来源: 评论
AQROM:A quality of service aware routing optimization mechanism based on asynchronous advantage actor-critic in software-defined networks
收藏 引用
Digital Communications and networks 2024年 第5期10卷 1405-1414页
作者: Wei Zhou Xing Jiang Qingsong Luo Bingli Guo Xiang Sun Fengyuan Sun Lingyu Meng School of Information and Communication Guilin University of Electronic TechnologyGuilin541004China The 34th Research Institute of China Electronics Technology Group Corporation Guilin541004China Guangxi Key Laboratory of Optical Network and Optical Information Security Guilin541004China State Key Laboratory of Information Photonics and Optical Communications BeijingUniversity of Posts and TelecommunicationsBeijing100876China Department of Electrical and Computer Engineering University of New MexicoAlbuquerqueNM87131USA
In Software-Defined networks(SDNs),determining how to efficiently achieve Quality of Service(QoS)-aware routing is challenging but critical for significantly improving the performance of a network,where the metrics of... 详细信息
来源: 评论
Probabilistic Reliability via Subsystem Structures of Arrangement Graph networks
收藏 引用
IEEE Transactions on Reliability 2024年 第1期73卷 279-289页
作者: Huang, Yanze Lin, Limei Xu, Li Hsieh, Sun-Yuan Fujian University of Technology Fujian Provincial Key Laboratory of Big Data Mining and Applications School of Computer Science and Mathematics Fuzhou350118 China Fujian Normal University College of Computer and Cyber Security Key Laboratory of Network Security and Cryptology Fuzhou350117 China National Cheng Kung University Department of Computer Science and Information Engineering Tainan701 Taiwan
With the rapid growth of the number of processors in a multiprocessor system, faulty processors occur in it with a probability that rises quickly. The probability of a subsystem with an appropriate size being fault-fr... 详细信息
来源: 评论
PE: A Poincare Explanation Method for Fast Text Hierarchy Generation
PE: A Poincare Explanation Method for Fast Text Hierarchy Ge...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Chen, Qian Li, Dongyang He, Xiaofeng Li, Hongzhao Yi, Hongyu School of Computer Science and Technology East China Normal University Shanghai China NPPA Key Laboratory of Publishing Integration Development ECNUP Shanghai China Sichuan Caizi Software Information Network Co. Ltd. China
The black-box nature of deep learning models in NLP hinders their widespread *** research focus has shifted to Hierarchical Attribution (HA) for its ability to model feature *** works model non-contiguous combinations... 详细信息
来源: 评论