咨询与建议

限定检索结果

文献类型

  • 1,808 篇 会议
  • 1,605 篇 期刊文献

馆藏范围

  • 3,413 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,235 篇 工学
    • 1,581 篇 计算机科学与技术...
    • 1,259 篇 软件工程
    • 589 篇 信息与通信工程
    • 315 篇 电气工程
    • 242 篇 电子科学与技术(可...
    • 239 篇 控制科学与工程
    • 194 篇 生物工程
    • 161 篇 机械工程
    • 139 篇 网络空间安全
    • 111 篇 仪器科学与技术
    • 107 篇 光学工程
    • 98 篇 生物医学工程(可授...
    • 77 篇 化学工程与技术
    • 76 篇 核科学与技术
    • 71 篇 交通运输工程
    • 70 篇 动力工程及工程热...
    • 69 篇 安全科学与工程
    • 48 篇 材料科学与工程(可...
  • 1,125 篇 理学
    • 546 篇 数学
    • 381 篇 物理学
    • 214 篇 生物学
    • 171 篇 统计学(可授理学、...
    • 106 篇 系统科学
    • 82 篇 化学
  • 590 篇 管理学
    • 366 篇 管理科学与工程(可...
    • 258 篇 图书情报与档案管...
    • 114 篇 工商管理
  • 90 篇 法学
  • 81 篇 医学
    • 64 篇 临床医学
    • 53 篇 基础医学(可授医学...
  • 52 篇 经济学
    • 52 篇 应用经济学
  • 27 篇 军事学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 文学
  • 9 篇 艺术学

主题

  • 142 篇 feature extracti...
  • 123 篇 semantics
  • 106 篇 hadron colliders
  • 103 篇 accuracy
  • 96 篇 computational mo...
  • 91 篇 training
  • 84 篇 deep learning
  • 71 篇 data models
  • 63 篇 federated learni...
  • 52 篇 neural networks
  • 51 篇 security
  • 49 篇 privacy
  • 45 篇 predictive model...
  • 45 篇 adaptation model...
  • 43 篇 optimization
  • 42 篇 blockchain
  • 42 篇 robustness
  • 41 篇 protocols
  • 41 篇 cloud computing
  • 40 篇 cryptography

机构

  • 192 篇 shandong provinc...
  • 176 篇 key laboratory o...
  • 153 篇 centro brasileir...
  • 153 篇 yerevan physics ...
  • 152 篇 national and kap...
  • 152 篇 istanbul technic...
  • 151 篇 university of sp...
  • 151 篇 academy of scien...
  • 150 篇 universidad iber...
  • 150 篇 indian institute...
  • 149 篇 charles universi...
  • 149 篇 department of ph...
  • 148 篇 brunel universit...
  • 148 篇 university of de...
  • 146 篇 rwth aachen univ...
  • 144 篇 imperial college...
  • 141 篇 università di to...
  • 141 篇 zhejiang univers...
  • 141 篇 indian institute...
  • 138 篇 infn sezione di ...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 110 篇 e. migliore
  • 110 篇 p. avery
  • 110 篇 l. silvestris

语言

  • 3,151 篇 英文
  • 167 篇 其他
  • 102 篇 中文
检索条件"机构=Key Laboratory of Computer Network Technology"
3413 条 记 录,以下是41-50 订阅
排序:
Chain-of-Specificity: Enhancing Task-Specific Constraint Adherence in Large Language Models  31
Chain-of-Specificity: Enhancing Task-Specific Constraint Adh...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Wei, Kaiwen Zhong, Jiang Zhang, Hongzhi Zhang, Di Jin, Li Yu, Yue Zhang, Jingyuan College of Computer Science Chongqing University China Kuaishou Inc. China Key Laboratory of Network Information System Technology Aerospace Information Research Institute Chinese Academy of Sciences China
Large Language Models (LLMs) exhibit remarkable generative capabilities, enabling the generation of valuable information. Despite these advancements, previous research found that LLMs sometimes struggle with adhering ... 详细信息
来源: 评论
DSDIR: A Two-Stage Method for Addressing Noisy Long-Tailed Problems in Malicious Traffic Detection
DSDIR: A Two-Stage Method for Addressing Noisy Long-Tailed P...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Li, Guoliang Zhang, Ruiqi Sun, Zhe Xing, Lingkai Zhang, Yu College of Cyber Science Nankai University Tianjin China College of Computer Science Nankai University Tianjin China Tianjin Key Laboratory of Network and Data Security Technology Tianjin China Key Laboratory of Data and Intelligent System Security Ministry of Education Tianjin China
In recent years, deep learning based malicious traffic detection (MTD) systems have demonstrated remarkable success. However, their effectiveness tend to decrease because most malicious traffic datasets are suffered f... 详细信息
来源: 评论
MCFTNet: Multimodal Cross-layer Fusion Transformer network for Hyperspectral and LiDAR Data Classification
收藏 引用
IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing 2025年 18卷 12803-12818页
作者: Huang, Wei Wu, Tianren Zhang, Xueyu Li, Liangliang Lv, Ming Jia, Zhenhong Zhao, Xiaobin Ma, Hongbing Vivone, Gemine Xinjiang University School of Computer Science and Technology Urumqi830017 China Xinjiang University Key Laboratory of Signal Detection and Processing Urumqi830017 China Guangxi University School of Computer and Electronic Information Nanning530004 China Guangxi University Guangxi Key Laboratory of Multimedia Communications and Network Technology Nanning530004 China Beijing Institute of Technology School of Information and Electronics Beijing100081 China University of Science and Technology Beijing School of Computer and Communication Engineering Beijing100083 China Tsinghua University Department of Electronic Engineering Beijing100084 China National Research Council Tito85050 Italy NBFC National Biodiversity Future Center Palermo90133 Italy
Remote sensing image classification is a popular yet challenging field. Many researchers have combined convolutional neural networks (CNNs) and Transformers for hyperspectral image (HSI) classification tasks. However,... 详细信息
来源: 评论
A circuit area optimization of MK-3 S-box
收藏 引用
Cybersecurity 2025年 第1期8卷 61-71页
作者: Yanjun Li Weiguo Zhang Yiping Lin Jian Zou Jian Liu Information Industry Information Security Evaluation Center The 15th Research Institute of China Electronic Technology Group CorporationBeijing 100083China Henan Key Laboratory of Network Cryptography Technology Zhengzhou 450001China Beijing Electronic Science and Technology Institute No.7 Fufeng RoadFengtai DistricBeijing 100083China College of Computer and Data Science Fuzhou UniversityFuzhou 350108China
In MILCOM 2015,Kelly et *** the authentication encryption algorithm MK-3,which applied the 16-bit *** paper aims to implement the 16-bit S-box with less circuit ***,we classifed the irreducible polynomials over F_(2n)... 详细信息
来源: 评论
APRIL: Towards Scalable and Transferable Autonomous Penetration Testing in Large Action Space via Action Embedding
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年 第3期22卷 2443-2459页
作者: Zhou, Shicheng Liu, Jingju Lu, Yuliang Yang, Jiahai Hou, Dongdong Zhang, Yue Hu, Shulong National University of Defense Technology College of Electronic Engineering Hefei230037 China Anhui Province Key Laboratory of Cyberspace Security Situation Awareness and Evaluation Hefei230037 China Tsinghua University Institute for Network Sciences and Cyberspace Beijing National Research Center for Information Science and Technology Beijing100084 China National University of Defense Technology College of Computer Science and Technology Changsha410073 China
Penetration testing (pentesting) assesses cybersecurity through simulated attacks, while the conventional manual-based method is costly, time-consuming, and personnel-constrained. Reinforcement learning (RL) provides ... 详细信息
来源: 评论
MDGCN-Lt:Fair Web API Classification with Sparse and Heterogeneous Data Based on Deep GCN
收藏 引用
清华大学学报自然科学版(英文版) 2025年 第3期30卷 1294-1314页
作者: Boyuan Yan Yankun Zhang Wenwen Gong Haoyang Wan Wenwei Wang Weiyi Zhong Caixia Bu Department of School of Computer Science Qufu Normal UniversityRizhao 276500China Shandong Provincial University Laboratory for Protected Horticulture Weifang University of Science and TechnologyWeifang 261000China Department of Computer Science and Technology Tsinghua UniversityBeijing 100084China Shandong Provincial Key Laboratory of Network Based Intelligent Computing University of JinanJinan 250022China Department of Univalsoft Joint Stock Co. Ltd.Weifang 261000China
Developers integrate web Application Programming Interfaces(APIs)into edge applications,enabling data expansion to the edge computing area for comprehensive coverage of devices in that *** develop edge applications,de... 详细信息
来源: 评论
Spatial-Temporal Semantic Feature Interaction network for Semantic Change Detection in Remote Sensing Images
收藏 引用
IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing 2025年 18卷 12090-12102页
作者: Zhang, Yuhang Zhang, Wuxia Ding, Songtao Wu, Siyuan Lu, Xiaoqiang Xi'an University of Posts and Telecommunications Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing School of Computer Science and Technology Xi'an710121 China Xi'an University of Technology College of Computer Science and Engineering Shaanxi Xi'an710048 China Fuzhou University College of Physics and Information Engineering Fuzhou350002 China
Semantic Change Detection (SCD) in Remote Sensing Images (RSI) aims to identify changes in the type of Land Cover/Land Use (LCLU) corresponding to changed areas in RSI. The "from-to" information of the acqui... 详细信息
来源: 评论
Complex networks with External Degree
收藏 引用
Chinese Journal of Electronics 2025年 第3期23卷 442-447页
作者: Chunfang Li Lianzhong Liu Key Laboratory of Beijing Network Technology School of Computer Science and Engineering Beijing University of Aeronautics and Astronautics Beijing China
The evolvement of complex networks is based on self-contained ultra-large system, but in fact all possible described networks are almost not completeness sub-networks. We study the more complete information descriptio... 详细信息
来源: 评论
Disentangled Noisy Correspondence Learning
收藏 引用
IEEE Transactions on Image Processing 2025年 34卷 2602-2615页
作者: Dang, Zhuohang Luo, Minnan Wang, Jihong Jia, Chengyou Han, Haochen Wan, Herun Dai, Guang Chang, Xiaojun Wang, Jingdong Xi’an Jiaotong University School of Computer Science and Technology Ministry of Education Key Laboratory of Intelligent Networks and Network Security Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Shaanxi Xi’an710049 China SGIT AI Laboratory Xi’an710048 China State Grid Corporation of China State Grid Shaanxi Electric Power Company Ltd. Xi’an710048 China University of Science and Technology of China School of Information Science and Technology Hefei230026 China Abu Dhabi United Arab Emirates Baidu Inc. Beijing100085 China
Cross-modal retrieval is crucial in understanding latent correspondences across modalities. However, existing methods implicitly assume well-matched training data, which is impractical as real-world data inevitably in... 详细信息
来源: 评论
CurMIM: Curriculum Masked Image Modeling
CurMIM: Curriculum Masked Image Modeling
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Liu, Hao Wang, Kun Han, Yudong Wang, Haocong Hu, Yupeng Wang, Chunxiao Nie, Liqiang School of Software Shandong University Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology Shandong Academy of Sciences Jinan China School of Computer Science and Technology Harbin Institute of Technology Shenzhen China
Masked Image Modeling (MIM), following "mask-and-reconstruct" scheme, is a promising self-supervised method to learn scalable visual representation. Studies indicate that selecting an effective mask strategy... 详细信息
来源: 评论