咨询与建议

限定检索结果

文献类型

  • 1,831 篇 会议
  • 1,603 篇 期刊文献

馆藏范围

  • 3,434 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,323 篇 工学
    • 1,698 篇 计算机科学与技术...
    • 1,320 篇 软件工程
    • 628 篇 信息与通信工程
    • 318 篇 电气工程
    • 257 篇 电子科学与技术(可...
    • 240 篇 控制科学与工程
    • 223 篇 生物工程
    • 158 篇 机械工程
    • 136 篇 网络空间安全
    • 113 篇 光学工程
    • 112 篇 仪器科学与技术
    • 106 篇 生物医学工程(可授...
    • 84 篇 化学工程与技术
    • 79 篇 交通运输工程
    • 77 篇 动力工程及工程热...
    • 62 篇 安全科学与工程
    • 56 篇 建筑学
  • 1,090 篇 理学
    • 645 篇 数学
    • 247 篇 生物学
    • 231 篇 物理学
    • 202 篇 统计学(可授理学、...
    • 93 篇 系统科学
    • 91 篇 化学
  • 681 篇 管理学
    • 394 篇 管理科学与工程(可...
    • 316 篇 图书情报与档案管...
    • 143 篇 工商管理
  • 108 篇 法学
    • 71 篇 社会学
  • 88 篇 医学
    • 72 篇 临床医学
    • 64 篇 基础医学(可授医学...
  • 59 篇 经济学
    • 59 篇 应用经济学
  • 39 篇 农学
  • 23 篇 军事学
  • 12 篇 教育学
  • 11 篇 文学
  • 9 篇 艺术学

主题

  • 140 篇 feature extracti...
  • 123 篇 semantics
  • 95 篇 accuracy
  • 79 篇 computational mo...
  • 79 篇 training
  • 66 篇 data models
  • 63 篇 deep learning
  • 63 篇 federated learni...
  • 49 篇 protocols
  • 49 篇 clustering algor...
  • 47 篇 data mining
  • 45 篇 cryptography
  • 44 篇 neural networks
  • 44 篇 visualization
  • 44 篇 privacy
  • 43 篇 predictive model...
  • 43 篇 security
  • 43 篇 robustness
  • 41 篇 optimization
  • 41 篇 adaptation model...

机构

  • 220 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 166 篇 school of comput...
  • 80 篇 key laboratory o...
  • 65 篇 computer network...
  • 65 篇 college of compu...
  • 59 篇 college of infor...
  • 59 篇 key laboratory o...
  • 56 篇 college of mathe...
  • 51 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 43 篇 institute of inf...
  • 42 篇 school of cyber ...
  • 42 篇 the key laborato...
  • 40 篇 school of comput...
  • 37 篇 university of ch...
  • 37 篇 shandong provinc...
  • 36 篇 key laboratory o...

作者

  • 48 篇 zhao yao
  • 41 篇 ren jiadong
  • 36 篇 zhou deyu
  • 29 篇 zhang min-ling
  • 27 篇 yang yang
  • 26 篇 cong runmin
  • 24 篇 guo wenzhong
  • 22 篇 min-ling zhang
  • 21 篇 xiaoming wu
  • 21 篇 guang cheng
  • 20 篇 zhang zhenrong
  • 20 篇 guo kun
  • 19 篇 geng xin
  • 19 篇 wang yun
  • 19 篇 du bo
  • 18 篇 liu ximeng
  • 17 篇 xiaoping li
  • 16 篇 niyato dusit
  • 16 篇 di xiaoqiang
  • 16 篇 he yulan

语言

  • 3,111 篇 英文
  • 191 篇 其他
  • 147 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Integration"
3434 条 记 录,以下是371-380 订阅
排序:
Similarity-Difference Relation network for Few-Shot Learning
Similarity-Difference Relation Network for Few-Shot Learning
收藏 引用
2021 IEEE International Conference on Artificial Intelligence and Industrial Design, AIID 2021
作者: Changhu, Cheng Peng, Yang School of Computer Science and Engineering Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Southeast University Nanjing China
Few-shot learning aims to build a classification model by training a small amount of labeled sample data, which can be well adapted to new domains. The key point of few-shot learning is that a small amount of sample d... 详细信息
来源: 评论
Estimation packet loss ratios for the two segments of end-to-end path on the monitor
Estimation packet loss ratios for the two segments of end-to...
收藏 引用
2012 International Conference on computer Science and Service System, CSSS 2012
作者: Cheng, Guang Gao, Zhongyao School of Computer Science and Engineering Southeast University Nanjing 210096 China Key Laboratory of Computer Network and Information Integration Ministry of Education China
Packet loss may cause the degradation of network and application performance. This paper proposes a passive measurement method called LTS to estimate end-to-end path packet loss ratio for the two segments of the path ... 详细信息
来源: 评论
Intrusion Model for Intrusion Tolerance System by Using Capabilities of Attackers
收藏 引用
电子学报(英文版) 2006年 第4期15卷 613-618页
作者: WANG Liangmin MA Jianfeng ZHANG Jiaming Key Laboratory of Computer Network and Information Security Ministry of Education Xidian University Xi'an 710071 China Computer Security Laboratory Department of Computer Science Jiangsu University Zhenjiang 212013 China
To solve the problem of modeling the intrusion in Intrusion Tolerance System, an intrusion model of state transition and its constructing algorithm is presented in this paper, which places its emphasis on the influenc... 详细信息
来源: 评论
Encrypted traffic identification based on N-gram entropy and cumulative sum test  2018
Encrypted traffic identification based on N-gram entropy and...
收藏 引用
13th International Conference on Future Internet Technologies, CFI 2018
作者: Cheng, Guang Hu, Ying School of Cyber Science and Engineering Southeast University China Key Laboratory of Computer Network and Information Integration Ministry of Education China
Since existing methods using entropy are less effective in characterizing encrypted traffic, this paper proposes an encrypted traffic identification method based on n-gram entropy and cumulative sum. This method analy... 详细信息
来源: 评论
Few-Shot Semantic Dependency Parsing via Graph Contrastive Learning  30
Few-Shot Semantic Dependency Parsing via Graph Contrastive L...
收藏 引用
Joint 30th International Conference on Computational Linguistics and 14th International Conference on Language Resources and Evaluation, LREC-COLING 2024
作者: Li, Bin Fan, Yunlong Sataer, Yikemaiti Shi, Chuanqi Gao, Miao Gao, Zhiqiang School of Computer Science and Engineering Southeast University Nanjing210096 China Key Laboratory of Computer Network and Information Integration Ministry of Education China
Graph neural networks (GNNs) have achieved promising performance on semantic dependency parsing (SDP), owing to their powerful graph representation learning ability. However, training a high-performing GNN-based model... 详细信息
来源: 评论
Light Up Fireflies: Towards Understanding the Design of Interpersonal Bodily Intertwinement in Bodily Play  24
Light Up Fireflies: Towards Understanding the Design of Inte...
收藏 引用
11th ACM SIGCHI Annual Symposium on computer-Human Interaction in Play, CHI-PLAY Companion 2024
作者: Lu, Yingtong Li, Zhuying Ding, Ding Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Nanjing China
In this paper, we explore the design of interpersonal bodily intertwinement through a VR social game, "Light Up Fireflies". Inspired by works of virtual co-embodiment, our game lets two players embody a sing... 详细信息
来源: 评论
Ponzi Scheme Detection in Smart Contracts Using Heterogeneous Semantic Graph  6th
Ponzi Scheme Detection in Smart Contracts Using Heterogeneo...
收藏 引用
6th International Conference on Blockchain and Trustworthy Systems, BlockSys 2024
作者: Chen, Wei Jiang, Xinjun Lan, Tian Liu, Leyuan Li, Chengyu Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Chengdu610000 China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu610000 China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu610000 China Shenzhen Institute for Advanced Study University of Electronic Science and Technology of China Shenzhen518000 China
Behind the booming decentralized finance (DeFi) ecosystem driven by blockchain technology, various financial risks lurking, including money laundering, gambling, Ponzi schemes, and phishing. Due to the decentralizatio... 详细信息
来源: 评论
A genetic algorithm for multiple mobile data collectors' path planning in WSNs
A genetic algorithm for multiple mobile data collectors' pat...
收藏 引用
2012 International Conference on information Technology and Software Engineering, ITSE 2012
作者: Shen, Zhuowei Cao, Min Key Lab. of Computer Network and Information Integration School of Computer and Engineering Southeast University Nanjing China
In mobile data collector (MDC)-based wireless sensor networks, we need to design paths for MDCs for better data collection. In this paper, we use predictable mobility pattern and apply a heuristic algorithm to design ... 详细信息
来源: 评论
Double-branch fusion network with a parallel attention selection mechanism for camouflaged object detection
收藏 引用
Science China(information Sciences) 2023年 第6期66卷 258-266页
作者: Junjiang XIANG Qing PAN Zhengrong ZHANG Songnian FU Yuwen QIN Advanced Institute of Photonics Technology School of Information EngineeringGuangdong University of Technology Guangdong Provincial Key Laboratory of Photonics Information Technology Guangdong University of Technology Guangxi Key Laboratory of Multimedia Communications and Network Technology School of Computer Electronics and InformationGuangxi University
To meet the challenge of camouflaged object detection (COD),which has a high degree of intrinsic similarity between the object and background,this paper proposes a double-branch fusion network(DBFN)with a parallel... 详细信息
来源: 评论
An Iterative Detection/Decoding Algorithm of Correlated Sources for the LDPC-Based Relay Systems
收藏 引用
China Communications 2017年 第9期14卷 190-198页
作者: Haiqiang Chen Hang Cao Xiangcheng Li Youming Sun Haibin Wan Tuanfa Qin The School of Computer and Electronic Information Guangxi University Guangxi Key Laboratory of Multimedia Communications and Network Technology Guangxi University Guangxi Colleges and Universities Key Laboratory of Multimedia Communications and Information Processing Guangxi University
An iterative detection/decoding algorithm of correlated sources for the LDPC-based relay systems is presented. The signal from the source-destination(S-D) link is formulated as a highly correlated counterpart from the... 详细信息
来源: 评论