咨询与建议

限定检索结果

文献类型

  • 1,826 篇 会议
  • 1,549 篇 期刊文献

馆藏范围

  • 3,375 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,263 篇 工学
    • 1,657 篇 计算机科学与技术...
    • 1,300 篇 软件工程
    • 606 篇 信息与通信工程
    • 290 篇 电气工程
    • 240 篇 电子科学与技术(可...
    • 227 篇 控制科学与工程
    • 223 篇 生物工程
    • 156 篇 机械工程
    • 127 篇 网络空间安全
    • 109 篇 仪器科学与技术
    • 107 篇 光学工程
    • 106 篇 生物医学工程(可授...
    • 83 篇 化学工程与技术
    • 75 篇 动力工程及工程热...
    • 75 篇 交通运输工程
    • 58 篇 安全科学与工程
    • 53 篇 建筑学
  • 1,076 篇 理学
    • 635 篇 数学
    • 246 篇 生物学
    • 228 篇 物理学
    • 198 篇 统计学(可授理学、...
    • 93 篇 系统科学
    • 89 篇 化学
  • 665 篇 管理学
    • 387 篇 管理科学与工程(可...
    • 303 篇 图书情报与档案管...
    • 141 篇 工商管理
  • 106 篇 法学
    • 71 篇 社会学
  • 87 篇 医学
    • 72 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 60 篇 经济学
    • 60 篇 应用经济学
  • 38 篇 农学
  • 23 篇 军事学
  • 11 篇 教育学
  • 11 篇 文学
  • 9 篇 艺术学

主题

  • 135 篇 feature extracti...
  • 123 篇 semantics
  • 94 篇 accuracy
  • 78 篇 computational mo...
  • 77 篇 training
  • 64 篇 data models
  • 61 篇 deep learning
  • 58 篇 federated learni...
  • 48 篇 protocols
  • 48 篇 clustering algor...
  • 47 篇 data mining
  • 45 篇 cryptography
  • 44 篇 neural networks
  • 44 篇 visualization
  • 42 篇 privacy
  • 42 篇 robustness
  • 41 篇 optimization
  • 41 篇 predictive model...
  • 40 篇 wireless sensor ...
  • 40 篇 security

机构

  • 215 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 165 篇 school of comput...
  • 80 篇 key laboratory o...
  • 64 篇 college of compu...
  • 62 篇 computer network...
  • 59 篇 college of infor...
  • 57 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 49 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 44 篇 key laboratory o...
  • 44 篇 institute of inf...
  • 43 篇 school of cyber ...
  • 42 篇 the key laborato...
  • 40 篇 school of comput...
  • 36 篇 university of ch...
  • 36 篇 shandong provinc...
  • 35 篇 key laboratory o...

作者

  • 49 篇 zhao yao
  • 42 篇 ren jiadong
  • 36 篇 zhou deyu
  • 29 篇 zhang min-ling
  • 26 篇 cong runmin
  • 24 篇 guo wenzhong
  • 23 篇 yang yang
  • 22 篇 min-ling zhang
  • 21 篇 xiaoming wu
  • 21 篇 guang cheng
  • 20 篇 guo kun
  • 20 篇 du bo
  • 19 篇 geng xin
  • 19 篇 wang yun
  • 19 篇 zhang zhenrong
  • 18 篇 liu ximeng
  • 17 篇 xiaoping li
  • 16 篇 niyato dusit
  • 16 篇 di xiaoqiang
  • 16 篇 he yulan

语言

  • 3,076 篇 英文
  • 169 篇 其他
  • 145 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Integration"
3375 条 记 录,以下是21-30 订阅
排序:
Persuasion Should be Double-Blind: A Multi-Domain Dialogue Dataset With Faithfulness Based on Causal Theory of Mind
arXiv
收藏 引用
arXiv 2025年
作者: Zhang, Dingyi Zhou, Deyu School of Computer Science and Engineering Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University China
Persuasive dialogue plays a pivotal role in human communication, influencing various domains. Recent persuasive dialogue datasets often fail to align with real-world interpersonal interactions, leading to unfaithful r... 详细信息
来源: 评论
Fingerprint Revocable Template Protection of Variable Window-Based Random Permutation && Check Code  18th
Fingerprint Revocable Template Protection of Variable Windo...
收藏 引用
18th Chinese Conference on Biometric Recognition, CCBR 2024
作者: Xu, Zilong Bian, Weixin Hu, Yao Luo, Feng School of Computer and Information Anhui Normal University Anhui Wuhu241002 China Anhui Provincial Key Laboratory of Network and Information Security Anhui Wuhu241002 China
The Uniformly Random Permutation Hashing (URP-IoM) algorithm demonstrates reliable performance and irreversibility in biometric template protection. However, URP-IoM, through random permutation and Hadamard product co... 详细信息
来源: 评论
MMH-FE:AMulti-Precision and Multi-Sourced Heterogeneous Privacy-Preserving Neural network Training Based on Functional Encryption
收藏 引用
computers, Materials & Continua 2025年 第3期82卷 5387-5405页
作者: Hao Li Kuan Shao Xin Wang Mufeng Wang Zhenyong Zhang The State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang550025China Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science CenterQilu University of Technology(Shandong Academy of Sciences)Jinan250014China China Industrial Control Systems Cyber Emergency Response Team Beijing100040China
Due to the development of cloud computing and machine learning,users can upload their data to the cloud for machine learning model ***,dishonest clouds may infer user data,resulting in user data *** schemes have achie... 详细信息
来源: 评论
MSCACodec: A Low-Rate Neural Speech Codec With Multi-scale Residual Channel Attention  21st
MSCACodec: A Low-Rate Neural Speech Codec With Multi-scale R...
收藏 引用
21st Pacific Rim International Conference on Artificial Intelligence, PRICAI 2024
作者: Yu, Xingye Li, Ye Zhang, Peng Lin, Lingxia Cai, Tianyu Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
In the development of modern communication technology, although wideband speech coding provides high-fidelity speech transmission, its high bandwidth requirement limits its application in resource-constrained environm... 详细信息
来源: 评论
High-Capacity Image Hiding via Compressible Invertible Neural network  24th
High-Capacity Image Hiding via Compressible Invertible Neur...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Wang, Changguang Shi, Haoyi Li, Qingru Zhao, Dongmei Wang, Fangwei College of Computer and Cyber Security Hebei Normal University Shijiazhuang050024 China Hebei Key Laboratory of Network and Information Security Shijiazhuang050024 China
Image steganography involves the concealment of confidential information within images, rendering it undetectable to unauthorized observers, and subsequently retrieving the hidden information following secure transmis... 详细信息
来源: 评论
Privacy Preserving Adjacency Query Supporting Homoionym Search over Medical Graph Data in Cloud Computing  17th
Privacy Preserving Adjacency Query Supporting Homoionym Sear...
收藏 引用
17th International Conference on Cloud Computing, CLOUD 2024, Held as Part of the Services Conference Federation, SCF 2024
作者: Li, Hourong Tian, Yun Wu, Bin Shi, Jiaoli School of Computer and Big Data Science Jiujiang University Jiujiang332005 China Jiujiang Key Laboratory of Network and Information Security Jiujiang332005 China
Cloud computing is widely used in all walks of life today. Massive amounts of medical graph data are being outsourced to cloud servers to reduce overhead. The untrustworthiness of cloud servers puts the sensitive info... 详细信息
来源: 评论
A Throughput and Priority Optimization Strategy for High Density Healthcare IoT
收藏 引用
Intelligent and Converged networks 2025年 第1期6卷 41-52页
作者: Su, Zhenlang Ren, Junyu Huang, Yeheng Liao, Yang Qin, Tuanfa School of Computer Electronic and Information Guangxi University Nanning530004 China School of Physics and Electronic Information Guangxi Minzu University Nanning530006 China School of Computer Electronic and Information Guangxi University Guangxi Key Laboratory of Multimedia Communications and Network Technology Nanning530004 China
In the field of wireless body area networks (WBANs), for solving the complex interference problem of inter-WBANs, a density-based adaptive optimization strategy (DAOS) is proposed in this paper. Firstly, the complex i... 详细信息
来源: 评论
Task Offloading in Internet of Vehicles: A DRL-based Approach with Representation Learning for DAG Scheduling
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第06期24卷 5045-5060页
作者: Deng, Xiaoheng Yang, Haoyu Zhang, Jingjing Gui, Jinsong Lin, Siyu Wang, Xin Min, Geyong Central South University School of Electronic Information Changsha410075 China Central South University Shenzhen Research Institute China Beijing Jiaotong University School of Electronic and Information Engineering The State Key Laboratory of Rail Traffic Control and Safety Beijing100044 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250014 China University of Exeter Department of Computer Science ExeterEX4 4QF United Kingdom
The rapid evolution of the Internet-of-Vehicles (IoV) has amplified the need for mobile computing resources, driving the shift toward offloading tasks to edge servers or vehicles with idle resources to optimize comput... 详细信息
来源: 评论
Distributed Stochastic Gradient Descent with Staleness: A Stochastic Delay Differential Equation Based Framework
收藏 引用
IEEE Transactions on Signal Processing 2025年 73卷 1708-1726页
作者: Yu, Siyuan Chen, Wei Poor, H. Vincent Department of Electronic Engineering State Key Laboratory of Space Network and Communications and Beijing National Research Center for Information Science and Technology (BNRist) Tsinghua University Beijing China Department of Electrical and Computer Engineering Princeton University Princeton NJ USA
Distributed stochastic gradient descent (SGD) has attracted considerable recent attention due to its potential for scaling computational resources, reducing training time, and helping protect user privacy in machine l... 详细信息
来源: 评论
Chain-of-Specificity: Enhancing Task-Specific Constraint Adherence in Large Language Models  31
Chain-of-Specificity: Enhancing Task-Specific Constraint Adh...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Wei, Kaiwen Zhong, Jiang Zhang, Hongzhi Zhang, Di Jin, Li Yu, Yue Zhang, Jingyuan College of Computer Science Chongqing University China Kuaishou Inc. China Key Laboratory of Network Information System Technology Aerospace Information Research Institute Chinese Academy of Sciences China
Large Language Models (LLMs) exhibit remarkable generative capabilities, enabling the generation of valuable information. Despite these advancements, previous research found that LLMs sometimes struggle with adhering ... 详细信息
来源: 评论