咨询与建议

限定检索结果

文献类型

  • 1,826 篇 会议
  • 1,549 篇 期刊文献

馆藏范围

  • 3,375 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,263 篇 工学
    • 1,657 篇 计算机科学与技术...
    • 1,300 篇 软件工程
    • 606 篇 信息与通信工程
    • 290 篇 电气工程
    • 240 篇 电子科学与技术(可...
    • 227 篇 控制科学与工程
    • 223 篇 生物工程
    • 156 篇 机械工程
    • 127 篇 网络空间安全
    • 109 篇 仪器科学与技术
    • 107 篇 光学工程
    • 106 篇 生物医学工程(可授...
    • 83 篇 化学工程与技术
    • 75 篇 动力工程及工程热...
    • 75 篇 交通运输工程
    • 58 篇 安全科学与工程
    • 53 篇 建筑学
  • 1,076 篇 理学
    • 635 篇 数学
    • 246 篇 生物学
    • 228 篇 物理学
    • 198 篇 统计学(可授理学、...
    • 93 篇 系统科学
    • 89 篇 化学
  • 665 篇 管理学
    • 387 篇 管理科学与工程(可...
    • 303 篇 图书情报与档案管...
    • 141 篇 工商管理
  • 106 篇 法学
    • 71 篇 社会学
  • 87 篇 医学
    • 72 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 60 篇 经济学
    • 60 篇 应用经济学
  • 38 篇 农学
  • 23 篇 军事学
  • 11 篇 教育学
  • 11 篇 文学
  • 9 篇 艺术学

主题

  • 135 篇 feature extracti...
  • 123 篇 semantics
  • 94 篇 accuracy
  • 78 篇 computational mo...
  • 77 篇 training
  • 64 篇 data models
  • 61 篇 deep learning
  • 58 篇 federated learni...
  • 48 篇 protocols
  • 48 篇 clustering algor...
  • 47 篇 data mining
  • 45 篇 cryptography
  • 44 篇 neural networks
  • 44 篇 visualization
  • 42 篇 privacy
  • 42 篇 robustness
  • 41 篇 optimization
  • 41 篇 predictive model...
  • 40 篇 wireless sensor ...
  • 40 篇 security

机构

  • 215 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 165 篇 school of comput...
  • 80 篇 key laboratory o...
  • 64 篇 college of compu...
  • 62 篇 computer network...
  • 59 篇 college of infor...
  • 57 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 49 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 44 篇 key laboratory o...
  • 44 篇 institute of inf...
  • 43 篇 school of cyber ...
  • 42 篇 the key laborato...
  • 40 篇 school of comput...
  • 36 篇 university of ch...
  • 36 篇 shandong provinc...
  • 35 篇 key laboratory o...

作者

  • 49 篇 zhao yao
  • 42 篇 ren jiadong
  • 36 篇 zhou deyu
  • 29 篇 zhang min-ling
  • 26 篇 cong runmin
  • 24 篇 guo wenzhong
  • 23 篇 yang yang
  • 22 篇 min-ling zhang
  • 21 篇 xiaoming wu
  • 21 篇 guang cheng
  • 20 篇 guo kun
  • 20 篇 du bo
  • 19 篇 geng xin
  • 19 篇 wang yun
  • 19 篇 zhang zhenrong
  • 18 篇 liu ximeng
  • 17 篇 xiaoping li
  • 16 篇 niyato dusit
  • 16 篇 di xiaoqiang
  • 16 篇 he yulan

语言

  • 3,076 篇 英文
  • 169 篇 其他
  • 145 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Integration"
3375 条 记 录,以下是121-130 订阅
排序:
MEDIAN: Adaptive Intermediate-grained Aggregation network for Composed Image Retrieval
MEDIAN: Adaptive Intermediate-grained Aggregation Network fo...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Qinlei Huang Zhiwei Chen Zixu Li Chunxiao Wang Xuemeng Song Yupeng Hu Liqiang Nie School of Software Shandong University Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology (Shandong Academy of Sciences) School of Computer Science and Technology Shandong University School of Computer Science and Technology Harbin Institute of Technology (Shenzhen)
The Composed Image Retrieval (CIR) task aims to retrieve a target image that meets the requirements based on a given multimodal query (includes a reference image and modification text). Most existing works align multi... 详细信息
来源: 评论
The Distributed Intelligent Collaboration to UAV-Assisted VEC: Joint Position Optimization and Task Scheduling
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Yi, Meng Lee, Vincent C.S. Yang, Peng Li, Peisong Zhang, Yifan Wei, Wei Gao, Honghao Southeast University School of Computer Science and Engineering Nanjing211189 China Monash University Faculty of IT Department of DS and AI ClaytonVIC3800 Australia Southeast University School of Computer Science and Engineering the Key Laboratory of Computer Network and Information Integration Ministry of Education Nanjing211189 China Xidian University Hangzhou Institute of Technology Hangzhou311200 China Southeast University-Monash University Joint Graduate School Suzhou215123 China Xi'an University of Technology School of Computer Science and Engineering Xi'an710048 China Shanghai University School of Computer Engineering and Science Shanghai200444 China
Deploying Unmanned Aerial Vehicles (UAVs) as aerial base stations enhances the coverage and performance of communication networks in Vehicular Edge Computing (VEC) scenarios. However, due to the limited communication ... 详细信息
来源: 评论
Blockchain and signcryption enabled asynchronous federated learning framework in fog computing
收藏 引用
Digital Communications and networks 2025年 第02期 442-454页
作者: Zhou Zhou Youliang Tian Jinbo Xiong Changgen Peng Jing Li Nan Yang State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fujian Normal University Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology
Federated learning combines with fog computing to transform data sharing into model sharing, which solves the issues of data isolation and privacy disclosure in fog computing. However, existing studies focus on centra...
来源: 评论
A Federated Learning network Intrusion Detection System for Multiple Imbalances
A Federated Learning Network Intrusion Detection System for ...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Yifan Zeng Peijia Zheng Jian Li School of Computer Science and Engineering Sun Yat-sen University Guangzhou China Yunnan Key Laboratory of Service Computing Yunnan University of Finance and Economics Kunming China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology (Shandong Academy of Sciences) Jinan China
Centralized training of deep learning-based network intrusion detection systems (DLNIDS) raises privacy concerns and incurs huge overhead. Federated learning (FL), while preserving privacy, confronts challenges includ... 详细信息
来源: 评论
Research and Implementation of Trusted Blockchain Core Technology Based on State Secret Algorithm
收藏 引用
China Communications 2025年 第4期22卷 143-160页
作者: Zheng Qingan Meng Jialin Wu Junjie Li Jingtao Lin Haonan Computer Science and Information Security Management Department Fujian Police CollegeFuzhou 350007China Fujian Province Key Laboratory for Digital Network Crime Supervision and Prevention Fuzhou 350007China ByteDance Technology(Beijing)Co. Ltd.Haidian DistrictBeijing 100080China Dongguan Water Group Co. LtdDongguan 523000China Fuqing Municipal Public Security Bureau Fuzhou 350301China
With the rapid development of blockchain technology,the Chinese government has proposed that the commercial use of blockchain services in China should support the national encryption standard,also known as the state s... 详细信息
来源: 评论
Provably Secure Efficient key-Exchange Protocol for Intelligent Supply Line Surveillance in Smart Grids
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Ayub, Muhammad Faizan Li, Xiong Mahmood, Khalid Alenazi, Mohammed J.F. Das, Ashok Kumar Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu12599 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan Department of Computer Engineering Riyadh11451 Saudi Arabia International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500 032 India Korea University College of Informatics Department of Computer Science and Engineering Anam-ro Seoul145 Korea Republic of Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security China Shandong Fundamental Research Center for Computer Science Jinan 250353 China
Intelligent supply line surveillance is critical for modern smart grids. Smart sensors and gateway nodes are strategically deployed along supply lines to achieve intelligent surveillance. They collect data continuousl... 详细信息
来源: 评论
THC-DL: Three-Party Homomorphic Computing Delegation Learning for Secure Optimization
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Yang, Ze Tian, Youliang Xiong, Jinbo Niu, Kun Li, Mengqian Zhang, Xinyu Ma, Jianfeng Guizhou University Guizhou Provincial Key Laboratory of Cryptography and Blockchain Technology College of Computer Science and Technology Guiyang550025 China Guizhou University College of Big Data and Information Engineering Guiyang550025 China Fujian Normal University Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fuzhou350117 China Xidian University State Key Laboratory of Integrated Services Network Xi’an710071 China Xidian University State Key Laboratory of Integrated Services Network School of Cyber Engineering Xi’an710071 China
Delegation Learning(DL) flourishes data sharing, enabling agents to delegate data to the cloud for model training. To preserve privacy, homomorphic encryption (HE) offers an effective solution for privacy-preserving m... 详细信息
来源: 评论
Forward Legal Anonymous Group Pairing-Onion Routing for Mobile Opportunistic networks
收藏 引用
IEEE Transactions on Mobile Computing 2025年
作者: Zhu, Xiuzhen Lin, Limei Huang, Yanze Wang, Xiaoding Hsieh, Sun-Yuan Wu, Jie Fujian Normal University College of Computer and Cyber Security Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Fuzhou350117 China Fujian University of Technology School of Computer Science and Mathematics Fujian Fuzhou350118 China National Cheng Kung University Department of Computer Science and Information Engineering Tainan701 Taiwan Temple University Department of Computer and Information Science 1925 N. 12th St PhiladelphiaPA19122 United States
Mobile Opportunistic networks (MONs) often experience frequent interruptions in end-to-end connections, which increases the likelihood of message loss during delivery and makes users more susceptible to various cyber ... 详细信息
来源: 评论
Environment-Tolerant Trust Opportunity Routing based on Reinforcement Learning for Internet of Underwater Things
收藏 引用
IEEE Transactions on Mobile Computing 2025年
作者: He, Yu Han, Guangjie Hou, Yun Lin, Chuan Hohai University College of Information Science and Engineering Changzhou213200 China Hohai University Key Laboratory of Maritime Intelligent Network Information Technology Ministry of Education Changzhou213200 China Hohai University College of Computer Science and Software Engineering Nanjing211100 China Northeastern University Software College Shenyang110819 China
The Internet of Underwater Things (IoUT) has garnered significant interest due to its potential applications in monitoring underwater environments. However, the unique characteristics of acoustic communication, such a... 详细信息
来源: 评论
Deep Cut-informed Graph Embedding and Clustering
arXiv
收藏 引用
arXiv 2025年
作者: Ning, Zhiyuan Wang, Zaitian Zhang, Ran Xu, Ping Liu, Kunpeng Wang, Pengyang Chen, Chong Wang, Pengfei Zhou, Yuanchun Cambria, Erik The Computer Network Information Center Chinese Academy of Sciences University of Chinese Academy of Sciences China The Department of Computer Science Portland State University United States Department of Computer and Information Science The State Key Laboratory of Internet of Things for Smart City University of Macau China The Future City Lab Terminus Group China The School of Computer Science and Engineering Nanyang Technological University Singapore
Graph clustering aims to divide the graph into different clusters. The recently emerging deep graph clustering approaches are largely built on graph neural networks (GNN). However, GNN is designed for general graph en... 详细信息
来源: 评论