咨询与建议

限定检索结果

文献类型

  • 1,831 篇 会议
  • 1,603 篇 期刊文献

馆藏范围

  • 3,434 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,323 篇 工学
    • 1,698 篇 计算机科学与技术...
    • 1,320 篇 软件工程
    • 628 篇 信息与通信工程
    • 318 篇 电气工程
    • 257 篇 电子科学与技术(可...
    • 240 篇 控制科学与工程
    • 223 篇 生物工程
    • 158 篇 机械工程
    • 136 篇 网络空间安全
    • 113 篇 光学工程
    • 112 篇 仪器科学与技术
    • 106 篇 生物医学工程(可授...
    • 84 篇 化学工程与技术
    • 79 篇 交通运输工程
    • 77 篇 动力工程及工程热...
    • 62 篇 安全科学与工程
    • 56 篇 建筑学
  • 1,090 篇 理学
    • 645 篇 数学
    • 247 篇 生物学
    • 231 篇 物理学
    • 202 篇 统计学(可授理学、...
    • 93 篇 系统科学
    • 91 篇 化学
  • 681 篇 管理学
    • 394 篇 管理科学与工程(可...
    • 316 篇 图书情报与档案管...
    • 143 篇 工商管理
  • 108 篇 法学
    • 71 篇 社会学
  • 88 篇 医学
    • 72 篇 临床医学
    • 64 篇 基础医学(可授医学...
  • 59 篇 经济学
    • 59 篇 应用经济学
  • 39 篇 农学
  • 23 篇 军事学
  • 12 篇 教育学
  • 11 篇 文学
  • 9 篇 艺术学

主题

  • 140 篇 feature extracti...
  • 123 篇 semantics
  • 95 篇 accuracy
  • 79 篇 computational mo...
  • 79 篇 training
  • 66 篇 data models
  • 63 篇 deep learning
  • 63 篇 federated learni...
  • 49 篇 protocols
  • 49 篇 clustering algor...
  • 47 篇 data mining
  • 45 篇 cryptography
  • 44 篇 neural networks
  • 44 篇 visualization
  • 44 篇 privacy
  • 43 篇 predictive model...
  • 43 篇 security
  • 43 篇 robustness
  • 41 篇 optimization
  • 41 篇 adaptation model...

机构

  • 220 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 166 篇 school of comput...
  • 80 篇 key laboratory o...
  • 65 篇 computer network...
  • 65 篇 college of compu...
  • 59 篇 college of infor...
  • 59 篇 key laboratory o...
  • 56 篇 college of mathe...
  • 51 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 43 篇 institute of inf...
  • 42 篇 school of cyber ...
  • 42 篇 the key laborato...
  • 40 篇 school of comput...
  • 37 篇 university of ch...
  • 37 篇 shandong provinc...
  • 36 篇 key laboratory o...

作者

  • 48 篇 zhao yao
  • 41 篇 ren jiadong
  • 36 篇 zhou deyu
  • 29 篇 zhang min-ling
  • 27 篇 yang yang
  • 26 篇 cong runmin
  • 24 篇 guo wenzhong
  • 22 篇 min-ling zhang
  • 21 篇 xiaoming wu
  • 21 篇 guang cheng
  • 20 篇 zhang zhenrong
  • 20 篇 guo kun
  • 19 篇 geng xin
  • 19 篇 wang yun
  • 19 篇 du bo
  • 18 篇 liu ximeng
  • 17 篇 xiaoping li
  • 16 篇 niyato dusit
  • 16 篇 di xiaoqiang
  • 16 篇 he yulan

语言

  • 3,111 篇 英文
  • 191 篇 其他
  • 147 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Integration"
3434 条 记 录,以下是421-430 订阅
排序:
Chosen Ciphertext Secure Identity-Based Broadcast Encryption in the Standard Model
收藏 引用
Journal of Shanghai Jiaotong university(Science) 2011年 第6期16卷 672-676页
作者: 孙瑾 胡予濮 张乐友 Key Laboratory of Computer Network and Information Security Xidian University Department of Application Mathematics Xi'an University of Technology
To give concurrent consideration both the efficiency and the security(intensity of intractable problem) in the standard model,a chosen ciphertext secure identity-based broadcast encryption is *** the chosen ciphertext... 详细信息
来源: 评论
BCE-PPDS: Blockchain-based cloud–edge collaborative privacy-preserving data sharing scheme for IoT
收藏 引用
Future Generation computer Systems 2026年 174卷
作者: Guijuan Wang Qi Liu Zhongyuan Yu Hongliang Zhang Anming Dong Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan Shandong 250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan Shandong 250353 China China University of Petroleum Qingdao Shandong 266000 China
Internet of Things (IoT) devices generate large amounts of data every day that can be combined with intelligent platforms for predictive analytics and scientific research. However, concerns about privacy and security ...
来源: 评论
Revolutionizing Symbiotic Radio: Exploiting Tradeoffs in Hybrid Active-Passive Communications
arXiv
收藏 引用
arXiv 2025年
作者: Xu, Rui Ye, Yinghui Sun, Haijian Shi, Liqin Lu, Guangyue Shaanxi Key Laboratory of Information Communication Network and Security Xi’an University of Posts & Telecommunications China School of Electrical and Computer Engineering The University of Georgia AthensGA United States
Symbiotic radio (SR), a novel energy- and spectrum-sharing paradigm of backscatter communications (BC), has been deemed a promising solution for ambient Internet of Things (A-IoT), enabling ultra-low power consumption... 详细信息
来源: 评论
Development of yellow-light TiO2 integrated photonics
收藏 引用
Optics Letters 2025年 第11期50卷 3489-3492页
作者: Zequn Chen Yiheng Tang Maoliang Wei Xiaojing Li Boshu Sun Yingchun Wu Sishuo Zou Ji Huang Ke Si Wei Gong Hongtao Lin Lan Li Institute of Advanced Technology Westlake Institute for Advanced Study Hangzhou 310024 China Zhejiang Key Laboratory of 3D Micro/Nano Fabrication and Characterization School of Engineering Westlake University Hangzhou 310030 China The State Key Lab of Brain-Machine Intelligence College of Information Science and Electronic Engineering Zhejiang University Hangzhou 310027 China MOE Frontier Science Center for Brain Science & Brain-Machine Integration Zhejiang University Hangzhou 310027 China Nanhu Brain-Computer Interface Institute Hangzhou 311100 China College of Optical Science and Engineering Zhejiang University Hangzhou 310027 China Westlake Institute for Optoelectronics Fuyang Hangzhou Zhejiang 311421 China
Visible-light photonic integrated circuits (PICs) are rapidly emerging as a crucial technology to overcome the scaling challenges in quantum information processing and biosensing. Titanium dioxide (TiO 2 ), with its h... 详细信息
来源: 评论
Cooperative Agent-based QoS Framework for heterogeneous networks
Cooperative Agent-based QoS Framework for heterogeneous netw...
收藏 引用
2011 International Conference on information Technology, computer Engineering and Management Sciences, ICM 2011
作者: Ding, Feng Zhang, Shuai Wang, Heng Huang, Songhua Tao, Jun Key Laboratory of Science and Technology on Information Systems Engineering Nanjing Research Institute of Electronics Engineering Nanjing China Key Laboratory of Computer Network and Information Integration of Ministry of Education Southeast University Nanjing China
With the fast development of network technology and expansion of the network scale, the heterogeneity of Internet makes the Quality of Service (QoS) guarantee techniques even more challenging. In this paper the state-... 详细信息
来源: 评论
Density-aware and Depth-aware Visual Representation for Zero-Shot Object Counting
Density-aware and Depth-aware Visual Representation for Zero...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Fang Nan Feng Tian Ni Zhang Nian Liu Haonan Miao Guang Dai Mengmeng Wang Faculty of Electronic and Information Engineering Xi’an Jiaotong University Xi’an China Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an China School of Automation Northwestern Polytechnical University Xi’an China Computer Vision Department Mohamed bin Zayed University of Artificial Intelligence Abu Dhabi UAE SGIT AI Lab State Grid Corporation of China Zhejiang University of Technology Hang Zhou China
Previous methods often utilize CLIP semantic classifiers with class names for zero-shot object counting. However, they ignore crucial density and depth knowledge for counting tasks. Thus, we propose a density-aware an... 详细信息
来源: 评论
Pre-Chirp-Domain Index Modulation for Full-Diversity Affine Frequency Division Multiplexing towards 6G
收藏 引用
IEEE Transactions on Wireless Communications 2025年
作者: Liu, Guangyao Mao, Tianqi Xiao, Zhenyu Wen, Miaowen Liu, Ruiqi Zhao, Jingjing Basar, Ertugrul Wang, Zhaocheng Chen, Sheng Beihang University School of Electronic and Information Engineering State Key Laboratory of CNS/ATM Beijing100191 China Greater Bay Area Innovation Research Institute of BIT Zhuhai519000 China Zhuhai519088 China South China University of Technology School of Electronic and Information Engineering Guangzhou510640 China ZTE Corporation Wireless and Computing Research Institute Beijing100029 China State Key Laboratory of Mobile Network and Mobile Multimedia Technology Shenzhen518055 China Tampere University Department of Electrical Engineering Tampere33720 Finland Koc University Department of Electrical and Electronics Engineering Sariyer Istanbul34450 Turkey Tsinghua University Department of Electronic Engineering Beijing100084 China University of Southampton School of Electronics and Computer Science SouthamptonSO17 1BJ United Kingdom
As a superior multicarrier technique utilizing chirp signals for high-mobility communications, affine frequency division multiplexing (AFDM) is envisioned to be a promising candidate for sixth-generation (6G) wireless... 详细信息
来源: 评论
An adaptive offloading framework for Android applications in mobile edge computing
收藏 引用
Science China(information Sciences) 2019年 第8期62卷 114-130页
作者: Xing CHEN Shihong CHEN Yun MA Bichun LIU Ying ZHANG Gang HUANG College of Mathematics and Computer Science Fuzhou University Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University School of Software Tsinghua University Key Laboratory of High Confidence Software Technologies Ministry of Education
Mobile edge computing(MEC) provides a fresh opportunity to significantly reduce the latency and battery energy consumption of mobile applications. It does so by enabling the offloading of parts of the applications on ... 详细信息
来源: 评论
A static technique for detecting input validation vulnerabilities in Android apps
收藏 引用
Science China(information Sciences) 2017年 第5期60卷 210-225页
作者: Zhejun FANG Qixu LIU Yuqing ZHANG Kai WANG Zhiqiang WANG Qianru WU National Computer Network Intrusion Protection Center University of Chinese Academy of Sciences National Computer Network Emergency Response Technical Team/Coordination Center of China State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of Sciences Beijing Electronic Science and Technology Institute
Input validation vulnerabilities are common in Android apps, especially in inter-component communications. Malicious attacks can exploit this kind of vulnerability to bypass Android security mechanism and compromise t... 详细信息
来源: 评论
A new quantum key distribution resource allocation and routing optimization scheme
收藏 引用
Chinese Physics B 2024年 第3期33卷 244-259页
作者: 毕琳 袁晓同 吴炜杰 林升熙 School of Computer Science and Technology Changchun University of Science and TechnologyChangchun 130012China Key Laboratory of Network and Information Security in Jilin Province Changchun 130012China
Quantum key distribution(QKD)is a technology that can resist the threat of quantum computers to existing conventional cryptographic ***,due to the stringent requirements of the quantum key generation environment,the g... 详细信息
来源: 评论