咨询与建议

限定检索结果

文献类型

  • 1,827 篇 会议
  • 1,582 篇 期刊文献

馆藏范围

  • 3,409 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,289 篇 工学
    • 1,672 篇 计算机科学与技术...
    • 1,310 篇 软件工程
    • 613 篇 信息与通信工程
    • 306 篇 电气工程
    • 244 篇 电子科学与技术(可...
    • 229 篇 控制科学与工程
    • 224 篇 生物工程
    • 156 篇 机械工程
    • 127 篇 网络空间安全
    • 111 篇 光学工程
    • 111 篇 仪器科学与技术
    • 107 篇 生物医学工程(可授...
    • 83 篇 化学工程与技术
    • 76 篇 动力工程及工程热...
    • 76 篇 交通运输工程
    • 58 篇 安全科学与工程
    • 55 篇 建筑学
  • 1,080 篇 理学
    • 638 篇 数学
    • 247 篇 生物学
    • 229 篇 物理学
    • 198 篇 统计学(可授理学、...
    • 93 篇 系统科学
    • 89 篇 化学
  • 670 篇 管理学
    • 387 篇 管理科学与工程(可...
    • 308 篇 图书情报与档案管...
    • 141 篇 工商管理
  • 106 篇 法学
    • 71 篇 社会学
  • 87 篇 医学
    • 72 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 60 篇 经济学
    • 60 篇 应用经济学
  • 39 篇 农学
  • 23 篇 军事学
  • 12 篇 教育学
  • 11 篇 文学
  • 9 篇 艺术学

主题

  • 135 篇 feature extracti...
  • 123 篇 semantics
  • 94 篇 accuracy
  • 79 篇 computational mo...
  • 78 篇 training
  • 65 篇 data models
  • 61 篇 deep learning
  • 59 篇 federated learni...
  • 49 篇 protocols
  • 49 篇 clustering algor...
  • 47 篇 data mining
  • 45 篇 cryptography
  • 44 篇 neural networks
  • 44 篇 visualization
  • 43 篇 privacy
  • 42 篇 predictive model...
  • 42 篇 robustness
  • 41 篇 optimization
  • 41 篇 security
  • 40 篇 wireless sensor ...

机构

  • 216 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 165 篇 school of comput...
  • 80 篇 key laboratory o...
  • 64 篇 college of compu...
  • 63 篇 computer network...
  • 59 篇 college of infor...
  • 57 篇 key laboratory o...
  • 56 篇 college of mathe...
  • 50 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 44 篇 key laboratory o...
  • 44 篇 institute of inf...
  • 43 篇 school of cyber ...
  • 42 篇 the key laborato...
  • 40 篇 school of comput...
  • 37 篇 university of ch...
  • 36 篇 shandong provinc...
  • 35 篇 key laboratory o...

作者

  • 49 篇 zhao yao
  • 42 篇 ren jiadong
  • 36 篇 zhou deyu
  • 29 篇 zhang min-ling
  • 26 篇 cong runmin
  • 24 篇 guo wenzhong
  • 23 篇 yang yang
  • 22 篇 min-ling zhang
  • 21 篇 xiaoming wu
  • 21 篇 guang cheng
  • 20 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 du bo
  • 19 篇 geng xin
  • 19 篇 wang yun
  • 18 篇 liu ximeng
  • 17 篇 xiaoping li
  • 16 篇 niyato dusit
  • 16 篇 di xiaoqiang
  • 16 篇 he yulan

语言

  • 3,096 篇 英文
  • 180 篇 其他
  • 148 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Integration"
3409 条 记 录,以下是131-140 订阅
排序:
Robust privacy-preserving aggregation against poisoning attacks for secure distributed data fusion
收藏 引用
information Fusion 2025年 122卷
作者: Huang, Chao Yao, Yanqing Zhang, Xiaojun Key Laboratory of Aerospace Network Security Ministry of Industry and Information Technology School of Cyber Science and Technology Beihang University Beijing100191 China State Key Laboratory of Cryptology Beijing100878 China State Key Laboratory of Complex and Critical Software Environment Beihang University Beijing100191 China Shanghai Artificial Intelligence Laboratory Shanghai200232 China School of Computer Science and Software Engineering Southwest Petroleum University Chengdu610500 China
Privacy-preserving data aggregation could be well applied in federated learning, enabling an aggregator to learn a specified fusion statistics over private data held by clients. Besides, robustness is a critical requi... 详细信息
来源: 评论
Privacy-Preserving IoT Image Transmission: Multi-Stage SVD Data Embedding and Heatmap Alignment
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Du, Kaixin Ma, Bin Yang, Meihong Wang, Xiaoyu Li, Xiaolong Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250101 China Beijing Jiaotong University School of Computer and Information Technology Beijing100044 China
The images transmitted by IoT devices, particularly those used for surveillance or sensor data, are vulnerable to malicious screenshots and unauthorized access, leading to potential privacy breaches. To address this, ... 详细信息
来源: 评论
Energy-and-Spectrum-Efficient Trade-off Oriented Multi-Domains Resource Management Approach in RIS-Aided IABN Using NOMA With Imperfect SIC
IEEE Transactions on Green Communications and Networking
收藏 引用
IEEE Transactions on Green Communications and networking 2025年
作者: Ma, Zhongyu Li, Jing Han, Guangjie Wang, Yajing Liu, Zhirong Hao, Zhanjun Guo, Qun Northwest Normal University College of Computer Science and Engineering Lanzhou730070 China Hohai University Key Laboratory of Maritime Intelligent Network Information Technology Ministry of Education 213000 China Northwestern Polytechnical University School of Electronic Information Xi'an710129 China Lanzhou University of Technology College of Electrical and Information Engineering Lanzhou730050 China
Although reconfigurable intelligent surface (RIS)-assisted millimeter-wave integrated access and backhaul networks (mmWave IABN) offer a cost-effective solution for 6G systems, they face difficulties in meeting the sp... 详细信息
来源: 评论
Continual Reinforcement Learning for Digital Twin Synchronization Optimization
arXiv
收藏 引用
arXiv 2025年
作者: Tong, Haonan Chen, Mingzhe Zhao, Jun Hu, Ye Yang, Zhaohui Liu, Yuchen Yin, Changchuan The Beijing Key Laboratory of Network System Architecture and Convergence The Beijing Advanced Information Network Laboratory Beijing University of Posts and Telecommunications Beijing China Singapore The Department of Electrical and Computer Engineering Frost Institute for Data Science and Computing University of Miami Coral GablesFL33146 United States The Department of Industrial and Systems Engineering University of Miami Coral GablesFL33146 United States The College of Information Science and Electronic Engineering Zhejiang University Zhejiang Hangzhou310027 China The Department of Computer Science North Carolina State University RaleighNC27695 United States The Beijing Key Laboratory of Network System Architecture and Convergence China The Beijing Advanced Information Network Laboratory Beijing University of Posts and Telecommunications Beijing100876 China
This article investigates the adaptive resource allocation scheme for digital twin (DT) synchronization optimization over dynamic wireless networks. In our considered model, a base station (BS) continuously collects f... 详细信息
来源: 评论
Asynchronous Tag-based Physical-Layer Authentication in Wireless Communications
收藏 引用
IEEE Transactions on Wireless Communications 2025年
作者: Tan, Haijun Xu, Yuntao Du, Jiewei Xie, Ning Li, Hongbin Peng Cheng Laboratory Control and Network Foundation Laboratory Frontier Research Center Shenzhen518107 China Shenzhen University State Key Laboratory of Radio Frequency Heterogeneous Integration The Guangdong Key Laboratory of Intelligent Information Processing College of Electronics and Information Engineering Shenzhen518060 China Beijing Jiaotong University School of Electronic and Information Engineering Beijing100044 China National Innovation Center of High Speed Train Qingdao266111 China Stevens Institute of Technology Department of Electrical and Computer Engineering HobokenNJ07030 United States
Tag-based physical-layer authentication (PLA) has gained significant research interest due to its high security and low complexity compared to traditional upper-layer authentication mechanisms. However, conventional t... 详细信息
来源: 评论
Symbiosis Rather Than Aggregation: Towards Generalized Federated Learning via Model Symbiosis
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Liu, Yuange Liu, Yuru Zhang, Weishan Zheng, Chaoqun Jiang, Wei Luo, Daobin Qiao, Qiao Meng, Lingzhao Zhao, Hongwei Yang, Su College of Computer Science and Technology Qingdao266580 China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan250014 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Jinan250014 China Information Science Academy of China Electronics Technology Group Corporation Beijing100036 China Fudan University School of Computer Science Shanghai200433 China
Federated Learning (FL) faces significant challenges in scenarios with non-IID (non-independent and identically distributed) data distributions across participating clients. Traditional aggregation-based approaches of... 详细信息
来源: 评论
ChainPIM: A ReRAM-Based Processing-in-Memory Accelerator for HGNNs via Chain Structure
收藏 引用
IEEE Transactions on computer-Aided Design of Integrated Circuits and Systems 2025年
作者: Xiao, Wenjing Wang, Jianyu Chen, Dan Shi, Chenglong Ling, Xin Chen, Min Wu, Thomas School of Computer Electronics and Information Guangxi University Guangxi Key Laboratory of Multimedia Communications and Network Technology Nanning530004 China School of Computer Electronics and Information Guangxi University Nanning530004 China School of Computing National University of Singapore 119077 Singapore School of Computer Science and Engineering South China University of Technology Guangzhou510006 China Pazhou Laboratory Guangzhou510330 China School of Electrical Engineering Guangxi University Nanning530004 China
Heterogeneous graph neural networks (HGNNs) have recently demonstrated significant advantages of capturing powerful structural and semantic information in heterogeneous graphs. Different from homogeneous graph neural ... 详细信息
来源: 评论
Self-Attention Policy Optimization for Task Offloading and Resource Allocation in Low-Carbon Agricultural Consumer Electronic Devices
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Huang, Yi Zeng, Jisong Wei, Yanting Chen, Miaojiang Xiao, Wenjing Yang, Yang Liu, Zhiquan Farouk, Ahmed Song, Houbing Herbert Guangxi University School of Computer Electronics and Information China Guangxi Key Laboratory of Multimedia Communications and Network Technology Nanning530004 China Jinan University College of Cyber Security Guangzhou510632 China Faculty of Computers and Artificial Intelligence Egypt Department of Information Systems BaltimoreMD21250 United States
In recent years, the widespread use of edge agricultural consumer electronics has greatly contributed to the level of intelligence in agricultural production, bringing higher efficiency and quality. However, offloadin... 详细信息
来源: 评论
Partially Hidden Policy Attribute-Based Multi-keyword Searchable Encryption with Verification and Revocation
收藏 引用
IEEE Transactions on Mobile Computing 2025年
作者: Chen, Liqing Xu, Shiguo Jin, Chunhua Zhang, Hao Weng, Jian Huaiyin Institute of Technology Faculty of Computer and Software Engineering Jiangsu Huai'an223003 China Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Fuzhou350117 China Jinan University College of Information Science and Technology Guangdong Guangzhou510632 China
Data security is becoming increasingly critical as outsourced data services flourish. An effective solution for ensuring data confidentiality in the cloud is attribute-based searchable encryption (ABSE). However, most... 详细信息
来源: 评论
STAD: Joint Spatial-Temporal Dimension and Channel Correlation for Time Series Anomaly Detection
STAD: Joint Spatial-Temporal Dimension and Channel Correlati...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Mingle Zhou Xingli Wang Delong Han Jin Wan Jiachen Li Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China SHANDONG SCICOM Information and Economy Research Institute Co. Ltd
Accurately identifying real anomalies and pseudo-anomalies in complex multi-dimensional time series data has been a difficult problem in time series anomaly detection. To solve this problem, this paper proposes a new ... 详细信息
来源: 评论