咨询与建议

限定检索结果

文献类型

  • 1,827 篇 会议
  • 1,582 篇 期刊文献

馆藏范围

  • 3,409 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,289 篇 工学
    • 1,672 篇 计算机科学与技术...
    • 1,310 篇 软件工程
    • 613 篇 信息与通信工程
    • 306 篇 电气工程
    • 244 篇 电子科学与技术(可...
    • 229 篇 控制科学与工程
    • 224 篇 生物工程
    • 156 篇 机械工程
    • 127 篇 网络空间安全
    • 111 篇 光学工程
    • 111 篇 仪器科学与技术
    • 107 篇 生物医学工程(可授...
    • 83 篇 化学工程与技术
    • 76 篇 动力工程及工程热...
    • 76 篇 交通运输工程
    • 58 篇 安全科学与工程
    • 55 篇 建筑学
  • 1,080 篇 理学
    • 638 篇 数学
    • 247 篇 生物学
    • 229 篇 物理学
    • 198 篇 统计学(可授理学、...
    • 93 篇 系统科学
    • 89 篇 化学
  • 670 篇 管理学
    • 387 篇 管理科学与工程(可...
    • 308 篇 图书情报与档案管...
    • 141 篇 工商管理
  • 106 篇 法学
    • 71 篇 社会学
  • 87 篇 医学
    • 72 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 60 篇 经济学
    • 60 篇 应用经济学
  • 39 篇 农学
  • 23 篇 军事学
  • 12 篇 教育学
  • 11 篇 文学
  • 9 篇 艺术学

主题

  • 135 篇 feature extracti...
  • 123 篇 semantics
  • 94 篇 accuracy
  • 79 篇 computational mo...
  • 78 篇 training
  • 65 篇 data models
  • 61 篇 deep learning
  • 59 篇 federated learni...
  • 49 篇 protocols
  • 49 篇 clustering algor...
  • 47 篇 data mining
  • 45 篇 cryptography
  • 44 篇 neural networks
  • 44 篇 visualization
  • 43 篇 privacy
  • 42 篇 predictive model...
  • 42 篇 robustness
  • 41 篇 optimization
  • 41 篇 security
  • 40 篇 wireless sensor ...

机构

  • 216 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 165 篇 school of comput...
  • 80 篇 key laboratory o...
  • 64 篇 college of compu...
  • 63 篇 computer network...
  • 59 篇 college of infor...
  • 57 篇 key laboratory o...
  • 56 篇 college of mathe...
  • 50 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 44 篇 key laboratory o...
  • 44 篇 institute of inf...
  • 43 篇 school of cyber ...
  • 42 篇 the key laborato...
  • 40 篇 school of comput...
  • 37 篇 university of ch...
  • 36 篇 shandong provinc...
  • 35 篇 key laboratory o...

作者

  • 49 篇 zhao yao
  • 42 篇 ren jiadong
  • 36 篇 zhou deyu
  • 29 篇 zhang min-ling
  • 26 篇 cong runmin
  • 24 篇 guo wenzhong
  • 23 篇 yang yang
  • 22 篇 min-ling zhang
  • 21 篇 xiaoming wu
  • 21 篇 guang cheng
  • 20 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 du bo
  • 19 篇 geng xin
  • 19 篇 wang yun
  • 18 篇 liu ximeng
  • 17 篇 xiaoping li
  • 16 篇 niyato dusit
  • 16 篇 di xiaoqiang
  • 16 篇 he yulan

语言

  • 3,096 篇 英文
  • 180 篇 其他
  • 148 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Integration"
3409 条 记 录,以下是271-280 订阅
排序:
An Overview on Economic Analysis of Internet of Everything
收藏 引用
IEEE Communications Surveys and Tutorials 2025年
作者: Ding, Ningning Ouyang, Xiaomin Gao, Lin Huang, Jianwei Xing, Guoliang Guangzhou511453 China Hong Kong University of Science and Technology Department of Computer Science and Engineering 999077 Hong Kong Harbin Institute of Technology School of Electronics and Information Engineering Guangdong Provincial Key Laboratory of Aerospace Communication and Networking Technology Shenzhen China Chinese University of Hong Kong School of Science and Engineering Shenzhen Institute of Artificial Intelligence and Robotics for Society Shenzhen Key Laboratory of Crowd Intelligence Empowered Low-Carbon Energy Network CSIJRI Joint Research Centre on Smart Energy Storage Guangdong Shenzhen518172 China The Chinese University of Hong Kong Department of Information Engineering 999077 Hong Kong
The Internet of Everything (IoE) integrates people, processes, data, and things into a unified network, enabling highly interconnected systems with enhanced performance in terms of delay, reliability, and connection d... 详细信息
来源: 评论
A novel quantum multiparty summation protocol based on a cooperative random number mechanism
收藏 引用
EPJ Quantum Technology 2025年 第1期12卷 1-19页
作者: Zhang, Kejia Zhang, Yu Zhang, Xue Liu, Hongyan Song, Tingting Du, Gang School of Computer Science and Big Data (School of Cybersecurity) Heilongjiang University Harbin China State Key Laboratory of Public Big Data Guizhou University Guiyang China School of Mathematical Science Heilongjiang University Harbin China Institute for Cryptology and Network Security Heilongjiang University Harbin China School of China Construction Bank University Northeastern Institute Harbin China College of Information Science and Technology Jinan University Guangzhou China
As a particular area of quantum security multiparty computation, quantum secure multiparty summation plays a critical role in modern cryptography. It is widely known that most of the existing quantum summation protoco...
来源: 评论
Compromising Rechargeable Sensor networks in Marine Environment
收藏 引用
IEEE Transactions on Mobile Computing 2025年
作者: Wang, Qiwei Lin, Chi Dai, Haipeng Obaidat, Mohammad S. Hsiao, Kuei-Fang Fan, Xin Dalian University of Technology School of Software Technology & DUT-RU International School of Information Science and Engineering China Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province Dalian116620 China Nanjing University State Key Laboratory for Novel Software Technology Nanjing210023 China University of Science and Technology Beijing School of Computer and Communication Engineering Beijing100083 China SRM University Department of Computational Intelligence School of Computing SRM Nagar TN Kattankulathur603203 India The Amity University School of Engineering UP Noida201301 India The King Abdullah II School of Information Technology The University of Jordan Amman11942 Jordan
Marine Wireless Rechargeable Sensor networks (MWRSNs), enhanced by recent Wireless Power Transfer (WPT) technology, present a significant advancement in extending network life. Traditional methods improve network perf... 详细信息
来源: 评论
Non-uniform spacing clustering interval multi-hop routing leach algorithms for wireless sensor network
收藏 引用
Journal of Computational information Systems 2015年 第10期11卷 3613-3622页
作者: Wang, Honglin Shen, Jun School of computer Science and Engineering of Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration of Southeast University Nanjing China School of Electronic & Information Engineering of Nanjing University of Information Science & Technology Nanjing China
For mine tunnel distances ribbon special communications environment, proposed a non-uniform spacing clustering multi-hop routing algorithm. The core idea is: to change the cluster head election strategy, considering t... 详细信息
来源: 评论
Examining the Fourier Spectrum of Speech Signal from a Time-Frequency Perspective for Automatic Depression Level Prediction
收藏 引用
IEEE Transactions on Affective Computing 2025年
作者: Niu, Mingyue Tao, Jianhua He, Yongjun Zhang, Shiqing Li, Ming YanShan University School of Information Science and Engineering Qinhuangdao066004 China Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province China Tsinghua University Department of Automation Bejing100190 China University of Chinese Academy of Sciences School of Artificial Intelligence Beijing100049 China Harbin Institute of Technology School of Computer Science and Technology Harbin150001 China Taizhou University Institute of Intelligent Information Processing Taizhou318000 China Zhejiang Normal University Zhejiang Key Laboratory of Intelligent Education Technology and Application Jinhua321004 China Zhejiang Institute of Optoelectronics Jinhua321004 China
Currently, many studies use Fourier amplitude spectra of speech signals to predict depression levels. However, those works often treat Fourier amplitude spectra as images or sequences to capture depression cues using ... 详细信息
来源: 评论
A Memory-efficient Simulation Method of Grover’s Search Algorithm
收藏 引用
computers, Materials & Continua 2018年 第11期57卷 307-319页
作者: Xuwei Tang Juan Xu Bojia Duan College of Computer Science and Technology Nanjing University of Aeronautics and AstronauticsNanjingChina Institute for Quantum Computing University of WaterlooCanada Key Laboratory of Computer Network and Information Integration(Southeast University) Ministry of EducationChina
Grover’s search algorithm is one of the most significant quantum algorithms,which can obtain quadratic speedup of the extensive search *** Grover's search algorithm cannot be implemented on a real quantum compute... 详细信息
来源: 评论
Towards kernelizing the classifier for hyperbolic data
收藏 引用
Frontiers of computer Science 2024年 第1期18卷 17-31页
作者: Meimei YANG Qiao LIU Xinkai SUN Na SHI Hui XUE School of Computer Science and Engineering Southeast UniversityNanjing 210096China MOE Key Laboratory of Computer Science and Information Integration(Southeast University) Nanjing 210096China
Data hierarchy,as a hidden property of data structure,exists in a wide range of machine learning applications.A common practice to classify such hierarchical data is first to encode the data in the Euclidean space,and... 详细信息
来源: 评论
Steganalysis and improvement of a quantum steganography protocol via a GHZ_4 state
收藏 引用
Chinese Physics B 2013年 第6期22卷 199-202页
作者: 徐淑奖 陈秀波 钮心忻 杨义先 Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and Telecommunications Shandong Provincial Key Laboratory of Computer Network Shandong Computer Science Center State Key Laboratory of Information Security (Institute of Information EngineeringChinese Academy of Sciences)
Quantum steganography that utilizes the quantum mechanical effect to achieve the purpose of information hiding is a popular topic of quantum information. Recently, E1 Allati et al. proposed a new quantum steganography... 详细信息
来源: 评论
Traffic classification based on port connection pattern
Traffic classification based on port connection pattern
收藏 引用
2011 International Conference on computer Science and Service System, CSSS 2011
作者: Cheng, Guang Wang, Song Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Nanjing 210096 China
While the traditional Web, Email and other Internet applications are still used large-scale, Internet applications, such as typical P2P resource sharing, streaming, games, instant messaging and other new applications ... 详细信息
来源: 评论
SEE-Few: Seed, Expand and Entail for Few-shot Named Entity Recognition  29
SEE-Few: Seed, Expand and Entail for Few-shot Named Entity R...
收藏 引用
29th International Conference on Computational Linguistics, COLING 2022
作者: Yang, Zeng Zhang, Linhai Zhou, Deyu School of Computer Science and Engineering Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University China
Few-shot named entity recognition (NER) aims at identifying named entities based on only few labeled instances. Current few-shot NER methods focus on leveraging existing datasets in the rich-resource domains which mig... 详细信息
来源: 评论