咨询与建议

限定检索结果

文献类型

  • 1,829 篇 会议
  • 1,568 篇 期刊文献

馆藏范围

  • 3,397 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,289 篇 工学
    • 1,677 篇 计算机科学与技术...
    • 1,316 篇 软件工程
    • 613 篇 信息与通信工程
    • 301 篇 电气工程
    • 249 篇 电子科学与技术(可...
    • 232 篇 控制科学与工程
    • 222 篇 生物工程
    • 155 篇 机械工程
    • 129 篇 网络空间安全
    • 110 篇 仪器科学与技术
    • 109 篇 光学工程
    • 105 篇 生物医学工程(可授...
    • 83 篇 化学工程与技术
    • 77 篇 动力工程及工程热...
    • 75 篇 交通运输工程
    • 59 篇 安全科学与工程
    • 55 篇 建筑学
  • 1,074 篇 理学
    • 636 篇 数学
    • 244 篇 生物学
    • 228 篇 物理学
    • 197 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 91 篇 化学
  • 675 篇 管理学
    • 391 篇 管理科学与工程(可...
    • 311 篇 图书情报与档案管...
    • 142 篇 工商管理
  • 107 篇 法学
    • 71 篇 社会学
  • 83 篇 医学
    • 68 篇 临床医学
    • 60 篇 基础医学(可授医学...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 38 篇 农学
  • 23 篇 军事学
  • 11 篇 文学
  • 10 篇 教育学
  • 9 篇 艺术学

主题

  • 139 篇 feature extracti...
  • 122 篇 semantics
  • 95 篇 accuracy
  • 78 篇 computational mo...
  • 77 篇 training
  • 65 篇 data models
  • 64 篇 deep learning
  • 62 篇 federated learni...
  • 49 篇 protocols
  • 48 篇 clustering algor...
  • 47 篇 data mining
  • 45 篇 cryptography
  • 44 篇 neural networks
  • 44 篇 visualization
  • 44 篇 privacy
  • 43 篇 security
  • 43 篇 robustness
  • 41 篇 optimization
  • 41 篇 predictive model...
  • 41 篇 adaptation model...

机构

  • 218 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 166 篇 school of comput...
  • 80 篇 key laboratory o...
  • 64 篇 college of compu...
  • 63 篇 computer network...
  • 59 篇 college of infor...
  • 57 篇 key laboratory o...
  • 56 篇 college of mathe...
  • 50 篇 shandong fundame...
  • 47 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 43 篇 institute of inf...
  • 42 篇 school of cyber ...
  • 41 篇 the key laborato...
  • 40 篇 school of comput...
  • 37 篇 shandong provinc...
  • 36 篇 key laboratory o...
  • 36 篇 fujian provincia...

作者

  • 46 篇 zhao yao
  • 41 篇 ren jiadong
  • 36 篇 zhou deyu
  • 29 篇 zhang min-ling
  • 27 篇 yang yang
  • 26 篇 cong runmin
  • 24 篇 guo wenzhong
  • 22 篇 min-ling zhang
  • 21 篇 xiaoming wu
  • 21 篇 guang cheng
  • 20 篇 zhang zhenrong
  • 20 篇 guo kun
  • 19 篇 geng xin
  • 19 篇 wang yun
  • 19 篇 du bo
  • 18 篇 liu ximeng
  • 17 篇 xiaoping li
  • 17 篇 xia chunhe
  • 16 篇 di xiaoqiang
  • 16 篇 he yulan

语言

  • 3,074 篇 英文
  • 191 篇 其他
  • 147 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Integration"
3397 条 记 录,以下是481-490 订阅
排序:
Efficient subtree results computation for XML keyword queries
收藏 引用
Frontiers of computer Science 2015年 第2期9卷 253-264页
作者: Ziyang CHEN School of Information Science and Engineering Yanshan University Hebei 066004 China Environmental Management College of China Hebei 066004 China The Key Laboratory for Computer Virtual Technology and System Integration of HeBei Province Yanshan University Hebei 066004 China
In this paper, we focus on efficient construction of restricted subtree (RSubtree) results for XML keyword queries on a multicore system. We firstly show that the perfor- mance bottlenecks for existing methods lie i... 详细信息
来源: 评论
Enhancing encrypted traffic analysis via source APIs: A robust approach for malicious traffic detection
收藏 引用
computers and Security 2025年 156卷
作者: Lin, Wanshuang Xia, Chunhe Wang, Tianbo Liu, Mengyao Li, Yang School of Cyber Science and Technology Beihang University Beijing100191 China Key Laboratory of Beijing Network Technology Beihang University Beijing100191 China Guangxi Collaborative Innovation Center of MultiSource Information Integration and Intelligent Processing Guangxi Normal University Guilin541004 China
The widespread adoption of encryption protocols has increased the complexity of detecting malicious Android traffic. By randomizing payload content, encryption obscures semantically explicit features in network traffi... 详细信息
来源: 评论
Reliability Assessment of a New General Matching Composed network
收藏 引用
China Communications 2024年 第2期21卷 245-257页
作者: Zhengyuan Liang Junbin Liang Guoxuan Zhong Guangxi Key Laboratory of Multimedia Communications and Network Technology School of ComputerElectronics and InformationGuangxi UniversityNanning 530004China Jiangxi Engineering Laboratory of IoT Technologies for Crop Growth Ji’an 343000China
The reliability of a network is an important indicator for maintaining communication and ensuring its stable operation. Therefore, the assessment of reliability in underlying interconnection networks has become an inc... 详细信息
来源: 评论
Make your webpage carry abundant secret information unawarely
Make your webpage carry abundant secret information unawarel...
收藏 引用
15th IEEE International Conference on High Performance Computing and Communications, HPCC 2013 and 11th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, EUC 2013
作者: Guo, Xiaojun Cheng, Guang Zhu, Chengang Zhou, Aiping Pan, Wubin Truong, Dinhtu School of Computer Science and Engineering Southeast University Nanjing 210096 China School of Information Engineering Tibet Nationalities Institute Xianyang 712082 China Key Laboratory of Computer Network and Information Integration Southeast University Nanjing 210096 China
How to embed more secret message into web page with keeping good imperceptibility simultaneously is a trade-off problem for information hiding schemes. This paper presents a novel web page information hiding method ba... 详细信息
来源: 评论
Web service selection with quantitative and qualitative user preferences
Web service selection with quantitative and qualitative user...
收藏 引用
2011 IEEE/WIC/ACM International Conference on Web Intelligence, WI 2011
作者: Wang, Hongbing Liu, Weihong Key Lab of Computer Network and Information Integration School of Computer Science and Engineering Southeast University 211189 China School of Computer Science Anhui Unversity of Technology 243002 China
Most existing approaches of Web service selection with user preferences are either quantitative or qualitative. However, using a qualitative or quantitative approach alone cannot handle all the non-functional properti... 详细信息
来源: 评论
Covert Communications with Enhanced Physical Layer Security in RIS-Assisted Cooperative networks
收藏 引用
IEEE Transactions on Wireless Communications 2025年
作者: Li, Xingwang Liu, Musen Dang, Shuping Luong, Nguyen Cong Yuen, Chau Nallanathan, Arumugam Niyato, Dusit Henan Polytechnic University School of Physics and Electronic Information Engineering Jiaozuo454003 China Southeast University National Mobile Communications Research Laboratory Nanjing210096 China Jiaozuo Key Laboratory of Crow-Sensing Network Jiaozuo454003 China University of Bristol School of Electrical Electronic and Mechanical Engineering BristolBS8 1UB United Kingdom Phenikaa University Faculty of Computer Science Hanoi12116 Viet Nam Nanyang Technological University Singapore School of Electrical and Electronics Engineering 639798 Singapore Queen Mary University of London School of Electronic Engineering and Computer Science London United Kingdom Kyung Hee University Department of Electronic Engineering Gyeonggi-do Yongin-si17104 Korea Republic of Nanyang Technological University Singapore College of Computing and Data Science 639798 Singapore
Reconfigurable intelligent surface (RIS) and ambient backscatter communication (AmBC) technologies are recognized for their programmability and high energy efficiency respectively, which will be the key parts of the f... 详细信息
来源: 评论
Analysis and Improvement of an Efficient Controlled Quantum Secure Direct Communication and Authentication Protocol
收藏 引用
computers, Materials & Continua 2018年 第12期57卷 621-633页
作者: Jifeng Zhong Zhihao Liu Juan Xu Navigation College Jimei UniversityXiamen361021China School of Computer Science and Engineering Southeast UniversityNanjing211189China Key Laboratory of Computer Network and Information Integration Southeast UniversityMinistry of EducationNanjing211189China Institute for Quantum Computing University of WaterlooWaterlooONCanadaN2L3G1
The controlled quantum secure direct communication(CQSDC)with authentication protocol based on four particle cluster states via quantum one-time pad and local unitary operations is *** is found that there are some ser... 详细信息
来源: 评论
An Ensemble Detection Method for Shilling Attacks Based on Features of Automatic Extraction
收藏 引用
China Communications 2019年 第8期16卷 130-146页
作者: Yaojun Hao Fuzhi Zhang Jinbo Chao School of Information Science and Engineering Yanshan UniversityQinhuangdao 066004China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao 066004China Department of Computer Science and Technology Xinzhou Teachers UniversityXinzhou 034000China
Faced with the evolving attacks in recommender systems, many detection features have been proposed by human engineering and used in supervised or unsupervised detection methods. However, the detection features extract... 详细信息
来源: 评论
Inference rules based on XML functional dependency and XML multi-valued dependency
Inference rules based on XML functional dependency and XML m...
收藏 引用
2014 International Conference on Future information Engineering and Manufacturing Science(FIEMS 2014)
作者: Zhongping Zhang Shanshan Shi The School of Information Science and Engineering Yanshan University The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province
There not only exists the relation of the functional dependency and multi-valued dependency in XML data constraint,but also exists the relation of data dependency obtained only from a certain existing relationship ins... 详细信息
来源: 评论
Conflict-based belief revision operators in possibilistic logic  26
Conflict-based belief revision operators in possibilistic lo...
收藏 引用
26th AAAI Conference on Artificial Intelligence and the 24th Innovative Applications of Artificial Intelligence Conference, AAAI-12 / IAAI-12
作者: Qi, Guilin Wang, Kewen Key Laboratory of Computer Network and Information Integration of State Education Ministry School of Computer Science and Engineering Southeast University China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun 130012 China School of Computing and Information Technology Griffith University Australia
In this paper, we investigate belief revision in possibilistic logic, which is a weighted logic proposed to deal with incomplete and uncertain information. Existing revision operators in possibilistic logic are restri... 详细信息
来源: 评论