咨询与建议

限定检索结果

文献类型

  • 1,808 篇 会议
  • 1,605 篇 期刊文献

馆藏范围

  • 3,413 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,235 篇 工学
    • 1,581 篇 计算机科学与技术...
    • 1,259 篇 软件工程
    • 589 篇 信息与通信工程
    • 315 篇 电气工程
    • 242 篇 电子科学与技术(可...
    • 239 篇 控制科学与工程
    • 194 篇 生物工程
    • 161 篇 机械工程
    • 139 篇 网络空间安全
    • 111 篇 仪器科学与技术
    • 107 篇 光学工程
    • 98 篇 生物医学工程(可授...
    • 77 篇 化学工程与技术
    • 76 篇 核科学与技术
    • 71 篇 交通运输工程
    • 70 篇 动力工程及工程热...
    • 69 篇 安全科学与工程
    • 48 篇 材料科学与工程(可...
  • 1,125 篇 理学
    • 546 篇 数学
    • 381 篇 物理学
    • 214 篇 生物学
    • 171 篇 统计学(可授理学、...
    • 106 篇 系统科学
    • 82 篇 化学
  • 590 篇 管理学
    • 366 篇 管理科学与工程(可...
    • 258 篇 图书情报与档案管...
    • 114 篇 工商管理
  • 90 篇 法学
  • 81 篇 医学
    • 64 篇 临床医学
    • 53 篇 基础医学(可授医学...
  • 52 篇 经济学
    • 52 篇 应用经济学
  • 27 篇 军事学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 文学
  • 9 篇 艺术学

主题

  • 142 篇 feature extracti...
  • 123 篇 semantics
  • 106 篇 hadron colliders
  • 103 篇 accuracy
  • 96 篇 computational mo...
  • 91 篇 training
  • 84 篇 deep learning
  • 71 篇 data models
  • 63 篇 federated learni...
  • 52 篇 neural networks
  • 51 篇 security
  • 49 篇 privacy
  • 45 篇 predictive model...
  • 45 篇 adaptation model...
  • 43 篇 optimization
  • 42 篇 blockchain
  • 42 篇 robustness
  • 41 篇 protocols
  • 41 篇 cloud computing
  • 40 篇 cryptography

机构

  • 192 篇 shandong provinc...
  • 176 篇 key laboratory o...
  • 153 篇 centro brasileir...
  • 153 篇 yerevan physics ...
  • 152 篇 national and kap...
  • 152 篇 istanbul technic...
  • 151 篇 university of sp...
  • 151 篇 academy of scien...
  • 150 篇 universidad iber...
  • 150 篇 indian institute...
  • 149 篇 charles universi...
  • 149 篇 department of ph...
  • 148 篇 brunel universit...
  • 148 篇 university of de...
  • 146 篇 rwth aachen univ...
  • 144 篇 imperial college...
  • 141 篇 università di to...
  • 141 篇 zhejiang univers...
  • 141 篇 indian institute...
  • 138 篇 infn sezione di ...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 110 篇 e. migliore
  • 110 篇 p. avery
  • 110 篇 l. silvestris

语言

  • 3,151 篇 英文
  • 167 篇 其他
  • 102 篇 中文
检索条件"机构=Key Laboratory of Computer Network Technology"
3413 条 记 录,以下是71-80 订阅
排序:
BAV-DSS: Blockchain Assisted Verifiable Data Sharing Scheme with Fast Encryption and Outsourced Decryption for IoT  24th
BAV-DSS: Blockchain Assisted Verifiable Data Sharing Scheme ...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Huang, Yao Yu, Zhongyuan Wang, Guijuan Chai, Baobao Zhang, Hongliang Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan250353 China School of Information Science and Engineering Lanzhou University Lanzhou730000 China School of Computer Science and Engineering Shandong University of Science and Technology Qingdao266590 China
Many sophisticated cloud platforms are available to provide services such as storage and computation for Internet of Things (IoT) applications. However, with the concerns about the semi-trusted nature of cloud platfor... 详细信息
来源: 评论
AoI-Delay Tradeoff in Mobile Edge Caching: A Lyapunov Optimization-Based Method
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 16266-16281页
作者: Li, Ran Huang, Chuan Qin, Xiaoqi Fu, Zhanhong Yang, Lei Yang, Dong The Future Network of Intelligence Institute The Chinese University of HongKong Shenzhen518172 China The Department of Information Engineering The Chinese University of Hong Kong Hong Kong The School of Science and Engineering The Future Network of Intelligence Institute The Chinese University of HongKong Shenzhen518172 China The State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing100876 China SF Technology Shenzhen518052 China The Department of Computer Science and Engineering University of Nevada RenoNV89557 United States The School of Electronic and Information Engineering Beijing Jiaotong University Beijing100044 China
Mobile edge caching (MEC) is a promising technique to improve the quality of service (QoS) for mobile users (MU) by bringing data to the network edge. However, optimizing the crucial QoS aspects of message freshness a... 详细信息
来源: 评论
Resource Allocation for MEC in Ultra-dense networks
收藏 引用
Journal of computers (Taiwan) 2025年 第1期36卷 143-162页
作者: Ma, Huan Li, Shuyun Wang, Zhihui Dou, Xubing Zhang, Xinchang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China Shandong Normal University Jinan China
In the complex context of 5G ultra-dense networks, the unprecedented growth in traffic and computing demand has made the interaction between edge devices and edge servers extremely intricate due to the time-varying na... 详细信息
来源: 评论
DCGSD: Low-Light Image Enhancement with Dual-Conditional Guidance Sparse Diffusion Model
收藏 引用
IEEE Transactions on Circuits and Systems for Video technology 2025年
作者: Jin, Haiyan Wang, Jing Zuo, Fengyuan Su, Haonan Xiao, Zhaolin Wang, Bin Zhang, Yuanlin Xi'an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology Department of Computer Science and Engineering NO. 5 South Jinhua Road Shaanxi Xi'an710048 China
When restoring low-light images, most methods largely overlook the ambiguity due to dark noise and lack discrimination for region and shape representations, resulting in invalid feature enhancement. In this work, we p... 详细信息
来源: 评论
THC-DL: Three-Party Homomorphic Computing Delegation Learning for Secure Optimization
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Yang, Ze Tian, Youliang Xiong, Jinbo Niu, Kun Li, Mengqian Zhang, Xinyu Ma, Jianfeng Guizhou University Guizhou Provincial Key Laboratory of Cryptography and Blockchain Technology College of Computer Science and Technology Guiyang550025 China Guizhou University College of Big Data and Information Engineering Guiyang550025 China Fujian Normal University Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fuzhou350117 China Xidian University State Key Laboratory of Integrated Services Network Xi’an710071 China Xidian University State Key Laboratory of Integrated Services Network School of Cyber Engineering Xi’an710071 China
Delegation Learning(DL) flourishes data sharing, enabling agents to delegate data to the cloud for model training. To preserve privacy, homomorphic encryption (HE) offers an effective solution for privacy-preserving m... 详细信息
来源: 评论
Design and implementation of cooperative multi-agent based on MAPPO  5
Design and implementation of cooperative multi-agent based o...
收藏 引用
5th International Conference on Telecommunications, Optics, and computer Science, TOCS 2024
作者: Wang, Haolong Fei, Rong Chen, Ruizhu School of Computer Science and Engineering Xi'an University of Technology Xi'an China Shannxi Key Laboratory for Network Computing and Security Technology Xi'an University of Technology Xi'an China
In the past few years, with the continuous development of deep reinforcement learning, the application of deep reinforcement has been set off within the realms of self-driving vehicle technology, game games, and natur... 详细信息
来源: 评论
On the -differential spectra of two classes of power functions over finite fields
收藏 引用
Applicable Algebra in Engineering, Communication and Computing 2025年 1-30页
作者: Liu, Qian Huang, Zhiwei Chen, Zhixiong Jiang, Rong Zhang, Liupiao Key Laboratory of Information Security of Network Systems College of Computer and Data Science Fuzhou University Fuzhou China Hubei Key Laboratory of Applied Mathematics Faculty of Mathematics and Statistics Hubei University Wuhan China Yunnan Key Laboratory of Service Computing Yunnan University of Finance and Economics Kunming China Fujian Key Laboratory of Financial Information Processing Putian University Putian China School of Computer Science and Technology Dongguan University of Technology Dongguan China
Recently, a new concept called multiplicative differential was introduced by Ellingsen et al. [7]. As an extension of the differential uniformity, it is theoretically appealing to determine the properties of c-differe...
来源: 评论
HIAWSC: An Immune Algorithm Based Heuristic Web Service Composition Framework
收藏 引用
Chinese Journal of Electronics 2025年 第3期23卷 579-585页
作者: Jiuyun Xu Reiff-Marganiec Stephan School of Computer and Communication Engineering China University of Petroleum Qingdao China Network and Switch Technology Key Laboratory Beijing University of Posts and Telecommunication Beijing China Department of Computer Science University of Leicester Leicester UK
The introduction of of web services has led to web service composition being a focus of many researchers. Composing web services using workflows is seen as the most realistic method from an industrial view-point. Amon... 详细信息
来源: 评论
Source-free Domain Adaptation with Multiple Alignment for Efficient Image Retrieval
Source-free Domain Adaptation with Multiple Alignment for Ef...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Jinghui Ni Hui Cui Lihai Zhao Fengling Li Xiaohui Han Lijuan Xu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Quan Cheng Laboratory Shandong Open University University of Technology Sydney
Domain adaptation techniques help models generalize to target domains by addressing domain discrepancies between the source and target domain data distributions. These techniques are particularly valuable for cross-do... 详细信息
来源: 评论
A two Stage Mixed Integer Programming Model for Distributionally Robust State Based Non-Intrusive Load Monitoring
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Zhang, Chen Chai, Zimo Yang, Linfeng University of Shanghai for Science and Technology School of Mechanical Engineering Shanghai China Guangxi University School of Computer Electronics and Information the Guangxi Key Laboratory of Multimedia Communication and Network Technology Nanning China
This paper presents a non-intrusive load monitoring (NILM) model based on two-stage mixed-integer linear programming theory. Compared with other mixed integer optimization-based models, this paper model introduces few... 详细信息
来源: 评论