咨询与建议

限定检索结果

文献类型

  • 1,812 篇 会议
  • 1,579 篇 期刊文献

馆藏范围

  • 3,391 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,202 篇 工学
    • 1,555 篇 计算机科学与技术...
    • 1,247 篇 软件工程
    • 573 篇 信息与通信工程
    • 294 篇 电气工程
    • 234 篇 电子科学与技术(可...
    • 230 篇 控制科学与工程
    • 193 篇 生物工程
    • 159 篇 机械工程
    • 133 篇 网络空间安全
    • 111 篇 仪器科学与技术
    • 105 篇 光学工程
    • 98 篇 生物医学工程(可授...
    • 76 篇 化学工程与技术
    • 76 篇 核科学与技术
    • 70 篇 动力工程及工程热...
    • 67 篇 交通运输工程
    • 65 篇 安全科学与工程
  • 1,108 篇 理学
    • 532 篇 数学
    • 377 篇 物理学
    • 212 篇 生物学
    • 165 篇 统计学(可授理学、...
    • 106 篇 系统科学
    • 81 篇 化学
  • 580 篇 管理学
    • 359 篇 管理科学与工程(可...
    • 252 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 91 篇 法学
    • 48 篇 法学
  • 76 篇 医学
    • 61 篇 临床医学
    • 49 篇 基础医学(可授医学...
  • 50 篇 经济学
    • 50 篇 应用经济学
  • 27 篇 军事学
  • 25 篇 农学
  • 15 篇 教育学
  • 13 篇 文学
  • 9 篇 艺术学

主题

  • 141 篇 feature extracti...
  • 123 篇 semantics
  • 106 篇 hadron colliders
  • 103 篇 accuracy
  • 97 篇 computational mo...
  • 90 篇 training
  • 83 篇 deep learning
  • 70 篇 data models
  • 63 篇 federated learni...
  • 52 篇 neural networks
  • 51 篇 security
  • 49 篇 privacy
  • 45 篇 adaptation model...
  • 44 篇 optimization
  • 43 篇 predictive model...
  • 42 篇 protocols
  • 42 篇 robustness
  • 41 篇 cloud computing
  • 40 篇 blockchain
  • 40 篇 cryptography

机构

  • 193 篇 shandong provinc...
  • 176 篇 key laboratory o...
  • 151 篇 centro brasileir...
  • 151 篇 yerevan physics ...
  • 150 篇 national and kap...
  • 150 篇 istanbul technic...
  • 149 篇 university of sp...
  • 149 篇 academy of scien...
  • 148 篇 universidad iber...
  • 148 篇 indian institute...
  • 147 篇 charles universi...
  • 147 篇 department of ph...
  • 146 篇 brunel universit...
  • 146 篇 university of de...
  • 144 篇 rwth aachen univ...
  • 142 篇 imperial college...
  • 139 篇 università di to...
  • 139 篇 zhejiang univers...
  • 139 篇 indian institute...
  • 136 篇 infn sezione di ...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 111 篇 e. migliore
  • 111 篇 p. avery
  • 111 篇 l. silvestris

语言

  • 3,139 篇 英文
  • 157 篇 其他
  • 103 篇 中文
检索条件"机构=Key Laboratory of Computer Network Technology"
3391 条 记 录,以下是101-110 订阅
排序:
A Linked List Encryption Scheme for Image Steganography without Embedding
收藏 引用
computer Modeling in Engineering & Sciences 2024年 第10期141卷 331-352页
作者: Pengbiao Zhao Qi Zhong Jingxue Chen Xiaopei Wang Zhen Qin Erqiang Zhou Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of ChinaChengdu610054China Faculty of Data Science City University of MacaoMacao999078China Department of Computer Science and Engineering University of CaliforniaRiversideCA 92521USA
Information steganography has received more and more attention from scholars nowadays,especially in the area of image steganography,which uses image content to transmit information and makes the existence of secret in... 详细信息
来源: 评论
DBKEM-AACS: a distributed key escrow model in blockchain with anonymous authentication and committee selection
收藏 引用
Science China(Information Sciences) 2023年 第3期66卷 289-290页
作者: Axin XIANG Hongfeng GAO Youliang TIAN Liang WAN College of Computer Science and Technology Guizhou University Institute of Cryptography and Data Security Guizhou University Network and Information Management Center Guizhou University State Key Laboratory of Public Big Data Guizhou University Institute of Computer Software and Theory Guizhou University
Dear editor, key security is of great practical significance and demand to guarantee the security of digital assets in the blockchain system. At present, users prefer to escrow their assets on centralized institutions...
来源: 评论
Long-Tail Learning with Foundation Model: Heavy Fine-Tuning Hurts  41
Long-Tail Learning with Foundation Model: Heavy Fine-Tuning ...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Shi, Jiang-Xin Wei, Tong Zhou, Zhi Shao, Jie-Jing Han, Xin-Yan Li, Yu-Feng National Key Laboratory for Novel Software Technology Nanjing University China School of Artificial Intelligence Nanjing University China School of Computer Science and Engineering Southeast University China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education China
The fine-tuning paradigm in addressing long-tail learning tasks has sparked significant interest since the emergence of foundation models. Nonetheless, how fine-tuning impacts performance in long-tail learning was not... 详细信息
来源: 评论
Structure-based Street Tree Extraction from Mobile Laser Scanning Point Clouds  2022
Structure-based Street Tree Extraction from Mobile Laser Sca...
收藏 引用
5th International Conference on Image and Graphics Processing, ICIGP 2022
作者: Hao, Wen Zuo, Zhanbin Liang, Wei School of Computer Science and Engineering Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an University of Technology China Shaanxi Key Laboratory for Network Computing and Security Technology China
We present an automatic method based on structure analysis for extracting street trees from mobile laser scanning (MLS) data. Tree trunk and canopy can be characterized by the shape information and height above the gr... 详细信息
来源: 评论
A Survey on Task Scheduling of CPU-GPU Heterogeneous Cluster
收藏 引用
ZTE Communications 2024年 第3期22卷 83-90页
作者: ZHOU Yiheng ZENG Wei ZHENG Qingfang LIU Zhilong CHEN Jianping University of Shanghai for Science and Technology Shanghai 200093China National Key Laboratory for Multimedia Information Processing School of Computer SciencePeking UniversityBeijing 100871China State Key Laboratory of Mobile Network and Mobile Multimedia Technology Shenzhen 518055China ZTE Corporation Shenzhen 518057China
This paper reviews task scheduling frameworks,methods,and evaluation metrics of central processing unit-graphics processing unit(CPU-GPU)heterogeneous *** scheduling of CPU-GPU heterogeneous clusters can be carried ou... 详细信息
来源: 评论
TAKAP: A Lightweight Three-Party Authenticated key Agreement Protocol with User Anonymity
收藏 引用
Chinese Journal of Electronics 2021年 第4期30卷 686-696页
作者: QIAO Hui DONG Xuewen SHEN Yulong LIU Haozhe YANG Lingxiao School of Computer Science and Technology Xidian University Shaanxi Key Laboratory of Network and System Security Xidian University
The three-party authenticated key agreement protocol is a significant cryptographic mechanism for secure communication, which encourages two entities to authenticate each other and generate a shared session key with t... 详细信息
来源: 评论
Robust Voice Activity Detection using Locality-Sensitive Hashing and Residual Frequency-Temporal Attention  25
Robust Voice Activity Detection using Locality-Sensitive Has...
收藏 引用
25th Interspeech Conferece 2024
作者: Li, Shu Zhang, Peng Li, Ye Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science China
For voice activity detection (VAD), recent works focus on learning the attention distribution on contextual information of speech to reduce the impact of irrelevant noise. However, contextual frames selected with spec... 详细信息
来源: 评论
Mobility-Aware Multi-Task Migration and Offloading Scheme for Internet of Vehicles
收藏 引用
Chinese Journal of Electronics 2023年 第6期32卷 1192-1202页
作者: LI Xujie TANG Jing XU Yuan SUN Ying College of Computer and Information Hohai University State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Key Lab for Wireless Sensor Network and Communication Shanghai Institute of Microsystem School of Information Engineering Jiangsu Open University
In Internet of vehicles, vehicular edge computing(VEC) as a new paradigm can effectively accomplish various tasks. Due to limited computing resources of the roadside units(RSUs), computing ability of vehicles can be a... 详细信息
来源: 评论
RFID network planning based on improved brain storm optimization algorithm
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2022年 第5期29卷 30-39页
作者: Lin Zihan Zheng Jiali Xie Xiaode Feng Minyu He Siyi School of Computer Electrics and InformationGuangxi UniversityNanning 530004China Guangxi Key Laboratory of Multimedia Communications and Network Technology Guangxi UniversityNanning 530004China
In order to improve the service quality of radio frequency identification(RFID) systems, multiple objectives should be comprehensively considered. An improved brain storm optimization algorithm GABSO, which incorporat... 详细信息
来源: 评论
Random mating mayfly algorithm for RFID network planning
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2022年 第5期29卷 40-50页
作者: Xie Xiaode Zheng Jiali Lin Zihan He Siyi Feng Minyu School of Computer Electrics and InformationGuangxi UniversityNanning 530004China Guangxi Key Laboratory of Multimedia Communications and Network Technology Guangxi UniversityNanning 530004China
In order to improve robustness and efficiency of the radio frequency identification(RFID)network,a random mating mayfly algorithm(RMMA)was ***,RMMA introduced the mechanism of random mating into the mayfly algorithm(M... 详细信息
来源: 评论