咨询与建议

限定检索结果

文献类型

  • 1,827 篇 会议
  • 1,580 篇 期刊文献

馆藏范围

  • 3,407 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,290 篇 工学
    • 1,679 篇 计算机科学与技术...
    • 1,314 篇 软件工程
    • 615 篇 信息与通信工程
    • 308 篇 电气工程
    • 248 篇 电子科学与技术(可...
    • 235 篇 控制科学与工程
    • 224 篇 生物工程
    • 156 篇 机械工程
    • 132 篇 网络空间安全
    • 109 篇 光学工程
    • 109 篇 仪器科学与技术
    • 107 篇 生物医学工程(可授...
    • 83 篇 化学工程与技术
    • 76 篇 动力工程及工程热...
    • 75 篇 交通运输工程
    • 58 篇 安全科学与工程
    • 53 篇 建筑学
  • 1,078 篇 理学
    • 635 篇 数学
    • 247 篇 生物学
    • 228 篇 物理学
    • 197 篇 统计学(可授理学、...
    • 93 篇 系统科学
    • 89 篇 化学
  • 671 篇 管理学
    • 387 篇 管理科学与工程(可...
    • 309 篇 图书情报与档案管...
    • 140 篇 工商管理
  • 106 篇 法学
    • 71 篇 社会学
  • 88 篇 医学
    • 73 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 60 篇 经济学
    • 60 篇 应用经济学
  • 39 篇 农学
  • 23 篇 军事学
  • 11 篇 教育学
  • 11 篇 文学
  • 9 篇 艺术学

主题

  • 135 篇 feature extracti...
  • 123 篇 semantics
  • 94 篇 accuracy
  • 79 篇 computational mo...
  • 78 篇 training
  • 65 篇 data models
  • 61 篇 deep learning
  • 59 篇 federated learni...
  • 49 篇 protocols
  • 48 篇 clustering algor...
  • 47 篇 data mining
  • 45 篇 cryptography
  • 44 篇 neural networks
  • 44 篇 visualization
  • 43 篇 privacy
  • 42 篇 predictive model...
  • 42 篇 robustness
  • 41 篇 optimization
  • 41 篇 security
  • 40 篇 wireless sensor ...

机构

  • 215 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 165 篇 school of comput...
  • 80 篇 key laboratory o...
  • 64 篇 college of compu...
  • 62 篇 computer network...
  • 59 篇 college of infor...
  • 57 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 50 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 44 篇 key laboratory o...
  • 44 篇 institute of inf...
  • 43 篇 school of cyber ...
  • 42 篇 the key laborato...
  • 40 篇 school of comput...
  • 36 篇 university of ch...
  • 36 篇 shandong provinc...
  • 35 篇 key laboratory o...

作者

  • 49 篇 zhao yao
  • 42 篇 ren jiadong
  • 36 篇 zhou deyu
  • 29 篇 zhang min-ling
  • 26 篇 cong runmin
  • 24 篇 guo wenzhong
  • 23 篇 yang yang
  • 22 篇 min-ling zhang
  • 21 篇 xiaoming wu
  • 21 篇 guang cheng
  • 20 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 du bo
  • 19 篇 geng xin
  • 19 篇 wang yun
  • 17 篇 xiaoping li
  • 17 篇 liu ximeng
  • 16 篇 niyato dusit
  • 16 篇 di xiaoqiang
  • 16 篇 he yulan

语言

  • 3,100 篇 英文
  • 175 篇 其他
  • 147 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Integration"
3407 条 记 录,以下是171-180 订阅
排序:
CroPrompt: Cross-task Interactive Prompting for Zero-shot Spoken Language Understanding
CroPrompt: Cross-task Interactive Prompting for Zero-shot Sp...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Libo Qin Fuxuan Wei Qiguang Chen Jingxuan Zhou Shijue Huang Jiasheng Si Wenpeng Lu Wanxiang Che School of Computer Science and Engineering Central South University China Key Laboratory of Data Intelligence and Advanced Computing in Provincial Universities Soochow University China Research Center for Social Computing and Information Retrieval Harbin Institute of Technology China Harbin Institute of Technology Shenzhen China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology (Shandong Academy of Sciences)
Slot filling and intent detection are two highly correlated tasks in spoken language understanding (SLU). Recent SLU research attempts to explore zero-shot prompting techniques in large language models to alleviate th... 详细信息
来源: 评论
VFLMonitor: Defending One-Party Hijacking Attacks in Vertical Federated Learning
收藏 引用
IEEE Transactions on information Forensics and Security 2025年 20卷 4828-4843页
作者: Xiangrui Xu Yiwen Zhao Yufei Han Yongsheng Zhu Zhen Han Guangquan Xu Bin Wang Shouling Ji Wei Wang School of Information Science and Technology Qingdao University of Science and Technology Qingdao China Thomas Lord Department of Computer Science University of Southern California Los Angeles CA USA INRIA Rennes Brittany France Institute of Computing Technologies China Academy of Railway Sciences Corporation Ltd. Beijing China Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing Jiaotong University Beijing China Tianjin Key Laboratory of Advanced Networking (TANK) College of Intelligence and Computing Tianjin University Tianjin China Zhejiang Key Laboratory of Artificial Intelligence of Things (AIoT) Network and Data Security Hangzhou China College of Computer Science and Technology Zhejiang University Zhejiang China Ministry of Education Key Laboratory for Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an China
Vertical Federated Learning (VFL) is susceptible to various one-party hijacking attacks, such as Replay and Generation attacks, where a single malicious client can manipulate the model to produce attacker-specified re... 详细信息
来源: 评论
Mamba-Sea: A Mamba-based Framework with Global-to-Local Sequence Augmentation for Generalizable Medical Image Segmentation
收藏 引用
IEEE Transactions on Medical Imaging 2025年 PP卷 PP页
作者: Cheng, Zihan Guo, Jintao Zhang, Jian Qi, Lei Zhou, Luping Shi, Yinghuan Gao, Yang Shanghai Jiao Tong University School of Medicine Shanghai 200025 China Nanjing University National Institute of Healthcare Data Science Jiangsu Nanjing 210093 China Nanjing University State Key Laboratory for Novel Software Technology National Institute of Healthcare Data Science Jiangsu Nanjing 210093 China Southeast University School of Computer Science and Engineering Key Lab of Computer Network and Information Integration Jiangsu Nanjing 211189 China The University of Sydney School of Electrical and Information Engineering Sydney 2006 NSW Australia
To segment medical images with distribution shifts, domain generalization (DG) has emerged as a promising setting to train models on source domains that can generalize to unseen target domains. Existing DG methods are... 详细信息
来源: 评论
AISCW: Artificial Intelligence Supported Cooperative Work The New Frontier of CSCW  19th
AISCW: Artificial Intelligence Supported Cooperative Work Th...
收藏 引用
19th CCF Conference on computer Supported Cooperative Work and Social Computing, ChineseCSCW 2024
作者: Shi, Meilin Wang, Guiling Zhang, Shaohua Jiang, Jinlei Xiang, Yong Computer Science Department Tsinghua University Beijing100084 China Beijing Key Laboratory on Integration and Analysis of Large-scale Stream Data Beijing China School of Information Science and Technology North China University of Technology Beijing100144 China Camford Royal School Beijing102211 China
Under today’s natural environmental, social and technological conditions, the global and large-scale challenges faced by humanity are becoming increasingly significant, making collaborative work increasingly importan... 详细信息
来源: 评论
Compact-yet-Separate: Proto-centric Multi-modal Hashing with Pronounced Category Differences for Multi-modal Retrieval
收藏 引用
IEEE Transactions on Multimedia 2025年
作者: Zuo, Ruifan Zheng, Chaoqun Zhu, Lei Lu, Wenpeng Si, Jiasheng Zhang, Weiyu Shandong Fundamental Research Center for Computer Science Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Jinan China Tongji University School of Electronic and Information Engineering Shanghai China
Multi-modal hashing achieves low storage costs and high retrieval speeds by using compact hash codes to represent complex and heterogeneous multi-modal data, effectively addressing the inefficiency and resource intens... 详细信息
来源: 评论
Fine-Grained Access Control with Privacy-Preserving Data Retrieval for Cloud-Assisted IoV
收藏 引用
IEEE Transactions on Vehicular Technology 2025年
作者: Li, Wenchao Xia, Chunhe Yang, Simiao Wang, Kangming Huang, Guotao Huang, Luqi Guo, Fuchun Susilo, Willy Wang, Tianbo Beihang University School of Cyber Science and Technology Beijing100191 China University of Wollongong School of Computing and Information Technology Institute of Cybersecurity and Cryptology WollongongNSW2522 Australia Beihang University Beijing Key Laboratory of Network Technology Beijing100191 China Guangxi Normal University Guangxi Collab. Innovation Center of Multi-source Information Integration and Intelligent Processing Guilin541004 China Beihang University Sino-French Engineer School Beijing100191 China Beihang University Computer Science and Engineering School Beijing100191 China
In addition to the autonomous driving technology of single vehicles, the inter-group control algorithm serving the data sharing of multi-vehicle cooperative driving has also attracted widespread attention. To ensure s... 详细信息
来源: 评论
Task Offloading and Resource Allocation Based on Reinforcement Learning and Load Balancing in Vehicular networking
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Tian, Shujuan Xiang, Shuhuan Zhou, Ziqi Dai, Haipeng Yu, Enze Deng, Qingyong Xiangtan University Key Laboratory of Hunan Province for Internet of Things and Information Security Hunan International Scientific and Technological Cooperation Base of Intelligent network School of Computer Science and School of Cyberspace Security Xiangtan411105 China Nanjing University School of Computer Science and Technology Nanjing211189 China Guangxi Normal University Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guilin541004 China Guangxi Normal University Guangxi Key Lab of Multi-source Information Mining and Security Guilin541004 China
Due to limited on-board resources and the mobility characteristics of vehicles in a multi-access edge computing (MEC)-based vehicular network, efficient task offloading and resource allocation schemes are essential fo... 详细信息
来源: 评论
A 3D Memristive Cubic Map with Dual Discrete Memristors: Design, Implementation, and Application in Image Encryption
收藏 引用
IEEE Transactions on Circuits and Systems for Video Technology 2025年
作者: Gao, Suo Iu, Herbert Ho-Ching Erkan, Ugur Simsek, Cemaleddin Toktas, Abdurrahim Cao, Yinghong Wu, Rui Mou, Jun Li, Qi Wang, Chunpeng Dalian Polytechnic University School of Information Science and Engineering Dalian116034 China The University of Western Australia School of Electrical Electronic and Computer Engineering Perth6009 Australia Faculty of Engineering Electrical and Electronics Engineering Respectively Karamanoglu Mehmetbey University Karaman70200 Turkey Ankara University Engineering Faculty Department of Artificial Intelligence and Data Engineering Ankara06830 Turkey Harbin Institute of Technology School of Computer Science and Technology Harbin150001 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan250000 China
Discrete chaotic systems based on memristors exhibit excellent dynamical properties and are more straightforward to implement in hardware, making them highly suitable for generating cryptographic keystreams. However, ... 详细信息
来源: 评论
A Grouping Strategy-Based Progressive Fusion network for Hyperspectral Image Super-Resolution
A Grouping Strategy-Based Progressive Fusion Network for Hyp...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Guohua Lv Baodong Zhang Yongbiao Gao Guixin Zhao Guotao Wang Juncan Wang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China Shandong Key Laboratory of Ubiquitous Intelligent Computing Jinan China Key Laboratory of New Generation Artificial Intelligence Technology and Its Interdisciplinary Application (Southeast University) Ministry of Education China Beihang University Beijing China
Hyperspectral super-resolution involves combining low-resolution hyperspectral images with high-resolution multispectral images to produce a high-resolution hyperspectral image. Recently, although many methods for hyp... 详细信息
来源: 评论
TRNet: Two-Tier Recursion network for Co-Salient Object Detection
收藏 引用
IEEE Transactions on Circuits and Systems for Video Technology 2025年
作者: Cong, Runmin Yang, Ning Liu, Hongyu Zhang, Dingwen Huang, Qingming Kwong, Sam Zhang, Wei Shandong University School of Control Science and Engineering Jinan250061 China Ministry of Education Key Laboratory of Machine Intelligence and System Control Jinan250061 China Beijing Jiaotong University Institute of Information Science Beijing100044 China Beijing Key Laboratory of Advanced Information Science and Network Technology Beijing100044 China Northwestern Polytechnical University Brain and Artificial Intelligence Laboratory School of Automation Xi'an710129 China University of Chinese Academy of Sciences School of Computer Science and Technology Beijing101408 China Lingnan University Hong Kong
Co-salient object detection (CoSOD) is to find the salient and recurring objects from a series of relevant images, where modeling inter-image relationships plays a crucial role. Different from the commonly used direct... 详细信息
来源: 评论