咨询与建议

限定检索结果

文献类型

  • 410 篇 期刊文献
  • 322 篇 会议

馆藏范围

  • 732 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 545 篇 工学
    • 386 篇 计算机科学与技术...
    • 296 篇 软件工程
    • 156 篇 信息与通信工程
    • 78 篇 电子科学与技术(可...
    • 67 篇 电气工程
    • 54 篇 控制科学与工程
    • 46 篇 生物工程
    • 39 篇 机械工程
    • 39 篇 仪器科学与技术
    • 33 篇 光学工程
    • 26 篇 动力工程及工程热...
    • 26 篇 化学工程与技术
    • 25 篇 生物医学工程(可授...
    • 24 篇 网络空间安全
    • 19 篇 材料科学与工程(可...
    • 15 篇 交通运输工程
    • 15 篇 航空宇航科学与技...
  • 250 篇 理学
    • 116 篇 数学
    • 62 篇 物理学
    • 60 篇 生物学
    • 36 篇 统计学(可授理学、...
    • 29 篇 化学
    • 28 篇 系统科学
  • 139 篇 管理学
    • 95 篇 管理科学与工程(可...
    • 54 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 31 篇 医学
    • 24 篇 临床医学
    • 18 篇 基础医学(可授医学...
  • 22 篇 法学
    • 14 篇 社会学
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 16 篇 农学
  • 7 篇 教育学
  • 3 篇 军事学
  • 1 篇 文学

主题

  • 22 篇 wireless sensor ...
  • 18 篇 feature extracti...
  • 17 篇 semantics
  • 16 篇 deep learning
  • 15 篇 cloud computing
  • 11 篇 quality of servi...
  • 11 篇 training
  • 10 篇 blockchain
  • 9 篇 computational mo...
  • 9 篇 security
  • 9 篇 clustering algor...
  • 9 篇 privacy
  • 8 篇 reinforcement le...
  • 8 篇 sensors
  • 8 篇 heuristic algori...
  • 7 篇 image segmentati...
  • 7 篇 convolution
  • 7 篇 internet
  • 7 篇 algorithm design...
  • 7 篇 protocols

机构

  • 66 篇 college of compu...
  • 59 篇 jiangsu high tec...
  • 25 篇 key laboratory f...
  • 21 篇 state key labora...
  • 18 篇 school of comput...
  • 18 篇 school of comput...
  • 14 篇 school of softwa...
  • 13 篇 key laboratory f...
  • 13 篇 jiangsu high tec...
  • 13 篇 school of comput...
  • 12 篇 school of comput...
  • 12 篇 school of comput...
  • 12 篇 jiangsu engineer...
  • 12 篇 jilin province k...
  • 11 篇 school of cyber ...
  • 11 篇 network and data...
  • 9 篇 jiangsu high tec...
  • 9 篇 school of comput...
  • 9 篇 key lab of broad...
  • 8 篇 key lab. of broa...

作者

  • 35 篇 wang ruchuan
  • 14 篇 ruchuan wang
  • 13 篇 xiao fu
  • 13 篇 wang jin
  • 12 篇 gong jian
  • 11 篇 sun lijuan
  • 10 篇 liu jun
  • 10 篇 xu xiaolong
  • 10 篇 di xiaoqiang
  • 10 篇 huang haiping
  • 10 篇 chen wei
  • 10 篇 wang ru-chuan
  • 9 篇 ma li
  • 8 篇 guang cheng
  • 7 篇 lei wang
  • 7 篇 li peng
  • 7 篇 xiaolin gui
  • 7 篇 jian gong
  • 7 篇 xia feng
  • 6 篇 qin zhen

语言

  • 675 篇 英文
  • 37 篇 中文
  • 23 篇 其他
检索条件"机构=Key Laboratory of Computer Network Technology of Jiangsu Province"
732 条 记 录,以下是1-10 订阅
排序:
Block-gram:Mining knowledgeable features for efficiently smart contract vulnerability detection
收藏 引用
Digital Communications and networks 2025年 第1期11卷 1-12页
作者: Xueshuo Xie Haolong Wang Zhaolong Jian Yaozheng Fang Zichun Wang Tao Li Tianjin Key Laboratory of Network and Data Security Technology TianjinChina College of Computer Science Nankai UniversityTianjinChina Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province China State Key Laboratory of Computer Architecture Institute of Computing TechnologyChinese Academy of SciencesChina
Smart contracts are widely used on the blockchain to implement complex transactions,such as decentralized applications on *** vulnerability detection of large-scale smart contracts is critical,as attacks on smart cont... 详细信息
来源: 评论
Through-Wall Mobile Charging: Theory, Methodology, and Implementation
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第6期24卷 4971-4986页
作者: Sun, Yu Lin, Chi Yang, Wei Dai, Haipeng Ren, Jiankang Wang, Lei Wu, Guowei Dalian University of Technology School of Software Technology Dalian116024 China Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province Dalian116621 China Nanjing University State Key Laboratory for Novel Software Technology Jiangsu Nanjing210023 China Dalian University of Technology School of Computer Science and Technology Dalian116024 China
Wireless Power Transfer (WPT) has revolutionized the field of Wireless Rechargeable Sensor networks (WRSNs), enabling sustainable operation of sensor nodes. Traditional mobile charging methods often require sensors to... 详细信息
来源: 评论
Accurate 3D Wireless Charging
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第6期24卷 4733-4746页
作者: Yang, Wei Lin, Chi Sun, Yu Dai, Haipeng Ren, Jiankang Wang, Lei Wu, Guowei Dalian University of Technology Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province DUT School of Software Technology DUT-RU International School of Information Science and Engineering Dalian China Nanjing University State Key Laboratory for Novel Software Technology Jiangsu Nanjing210023 China Dalian University of Technology School of Computer Science and Technology Dalian116024 China
Wireless Rechargeable Sensor networks (WRSNs) have become an important research issue as they can overcome the energy bottleneck problem of wireless sensor networks. However, existing 2D charging methods suffer from s... 详细信息
来源: 评论
Fairness-Aware Budgeted Edge Server Placement for Connected Autonomous Vehicles
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第6期24卷 4762-4776页
作者: Wu, Jintao Xu, Xiaolong Cui, Guangming Zhang, Yiwen Qi, Lianyong Dou, Wanchun Cai, Zhipeng Nanjing University of Information Science & Technology Jiangsu Province Engineering Research Center of Advanced Computing and Intelligent Services School of Software Nanjing210044 China Jilin University Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Changchun130012 China Nanjing University of Information Science & Technology Jiangsu Province Engineering Research Center of Advanced Computing and Intelligent Services School of Software China Nanjing University State Key Laboratory for Novel Software Technology China Anhui University School of Computer Science and Technology Anhui230031 China College of Computer Science and Technology Qingdao266580 China Nanjing University State Key Laboratory for Novel Software Technology Nanjing210023 China Georgia State University Department of Computer Science United States
Mobile edge computing (MEC) considerably enhances the capabilities and performance of connected autonomous vehicles (CAVs) by deploying edge servers (ESs) on roadside units (RSUs) near CAVs, thereby ensuring low-laten... 详细信息
来源: 评论
VmPTP: Precise Time Protocol for Inter-VM Communication in Embedded Virtualized Systems
收藏 引用
IEEE Transactions on computer-Aided Design of Integrated Circuits and Systems 2025年 第3期44卷 897-910页
作者: Zhao, Sirong Xie, Guoqi Ma, Wenhong Ren, Wei Li, Kenli Hunan University Key Laboratory for Embedded and Network Computing of Hunan Province College of Computer Science and Electronic Engineering Hunan Changsha410082 China Huawei Technology Co. Ltd. Central Software Institute Guangdong Shenzhen518129 China
System virtualization techniques are gradually applied to embedded systems with the performance improvement of embedded devices;however, there is a large time offset (i.e., deviation) of hundreds of ms between virtual... 详细信息
来源: 评论
Feature Augmented Meta-Learning on Domain Generalization for Evolving Malware Classification  24th
Feature Augmented Meta-Learning on Domain Generalization fo...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Wang, Fangwei Chen, Yinhe Song, Ruixin Li, Qingru Wang, Changguang Key Laboratory of Network and Information Security of Hebei Province College of Computer and Cyber Security Hebei Normal University Shijiazhuang050024 China College of Computer Science and Technology Guizhou University Guiyang550025 China
The proliferation of malware has resulted in substantial harm to various sectors and economies. Various deep learning-based malware classification methods have been suggested as a means of mitigating malware threats. ... 详细信息
来源: 评论
Potential mechanisms of non-coding RNA regulation in Alzheimer's disease
收藏 引用
Neural Regeneration Research 2026年 第1期21卷 265-280页
作者: Yue Sun Xinping Pang Xudong Huang Dinglu Liu Jingyue Huang Pengtao Zheng Yanyu Wei Chaoyang Pang College of Computer Science Sichuan Normal UniversityChengduSichuan ProvinceChina School of Science Xi’an Jiaotong-Liverpool UniversitySuzhouJiangsu ProvinceChina Neurochemistry Laboratory Department of PsychiatryMassachusetts General Hospital and Harvard Medical SchoolCharlestownMAUSA National Key Laboratory of Science and Technology on Vacuum Electronics School of Electronic Science and EngineeringUniversity of Electronic Science and Technology of ChinaChengduSichuan ProvinceChina
Alzheimer's disease,a progressively degenerative neurological disorder,is the most common cause of dementia in the *** its precise etiology remains unclear,researchers have identified diverse pathological characte... 详细信息
来源: 评论
TEF: Causality-Aware Taxonomy Expansion via Front-Door Criterion  31
TEF: Causality-Aware Taxonomy Expansion via Front-Door Crite...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Meng, Yuan Zhai, Songlin Zhang, Yuxin Hu, Zhongjian Qi, Guilin School of Computer Science and Engineering Southeast University Jiangsu Province China Key Laboratory of New Generation Artificial Intelligence Technology and Its Interdisciplinary Applications Southeast University Ministry of Education China
Taxonomy expansion is a primary method for enriching taxonomies, involves appending a large number of additional nodes (i.e., queries) to an existing taxonomy (i.e., seed), with the crucial step being the identificati... 详细信息
来源: 评论
Efficient and fine-grained access control with fully-hidden policies for cloud-enabled IoT
收藏 引用
Digital Communications and networks 2025年 第2期11卷 473-481页
作者: Li, Qi Liu, Gaozhan Zhang, Qianqian Han, Lidong Chen, Wei Li, Rui Xiong, Jinbo School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210023 China Key Laboratory of Cryptography of Zhejiang Province Hangzhou Normal University Hangzhou311121 China Tongda College of Nanjing University of Posts and Telecommunications Yangzhou225127 China Henan Key Laboratory of Network Cryptography Technology Zhengzhou450001 China School of Computer Science and Technology Xidian University Xi'an710071 China State Key Laboratory of Tibetan Intelligent Information Processing and Application Qinghai Normal University Xining810008 China Faculty of Software Fujian Normal University Fuzhou350108 China
Ciphertext-Policy Attribute-Based Encryption (CP-ABE) enables fine-grained access control on ciphertexts, making it a promising approach for managing data stored in the cloud-enabled Internet of Things. But existing s... 详细信息
来源: 评论
Disentangled Noisy Correspondence Learning
收藏 引用
IEEE Transactions on Image Processing 2025年 34卷 2602-2615页
作者: Dang, Zhuohang Luo, Minnan Wang, Jihong Jia, Chengyou Han, Haochen Wan, Herun Dai, Guang Chang, Xiaojun Wang, Jingdong Xi’an Jiaotong University School of Computer Science and Technology Ministry of Education Key Laboratory of Intelligent Networks and Network Security Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Shaanxi Xi’an710049 China SGIT AI Laboratory Xi’an710048 China State Grid Corporation of China State Grid Shaanxi Electric Power Company Ltd. Xi’an710048 China University of Science and Technology of China School of Information Science and Technology Hefei230026 China Abu Dhabi United Arab Emirates Baidu Inc. Beijing100085 China
Cross-modal retrieval is crucial in understanding latent correspondences across modalities. However, existing methods implicitly assume well-matched training data, which is impractical as real-world data inevitably in... 详细信息
来源: 评论