咨询与建议

限定检索结果

文献类型

  • 1,831 篇 会议
  • 1,603 篇 期刊文献

馆藏范围

  • 3,434 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,323 篇 工学
    • 1,698 篇 计算机科学与技术...
    • 1,320 篇 软件工程
    • 628 篇 信息与通信工程
    • 318 篇 电气工程
    • 257 篇 电子科学与技术(可...
    • 240 篇 控制科学与工程
    • 223 篇 生物工程
    • 158 篇 机械工程
    • 136 篇 网络空间安全
    • 113 篇 光学工程
    • 112 篇 仪器科学与技术
    • 106 篇 生物医学工程(可授...
    • 84 篇 化学工程与技术
    • 79 篇 交通运输工程
    • 77 篇 动力工程及工程热...
    • 62 篇 安全科学与工程
    • 56 篇 建筑学
  • 1,090 篇 理学
    • 645 篇 数学
    • 247 篇 生物学
    • 231 篇 物理学
    • 202 篇 统计学(可授理学、...
    • 93 篇 系统科学
    • 91 篇 化学
  • 681 篇 管理学
    • 394 篇 管理科学与工程(可...
    • 316 篇 图书情报与档案管...
    • 143 篇 工商管理
  • 108 篇 法学
    • 71 篇 社会学
  • 88 篇 医学
    • 72 篇 临床医学
    • 64 篇 基础医学(可授医学...
  • 59 篇 经济学
    • 59 篇 应用经济学
  • 39 篇 农学
  • 23 篇 军事学
  • 12 篇 教育学
  • 11 篇 文学
  • 9 篇 艺术学

主题

  • 140 篇 feature extracti...
  • 123 篇 semantics
  • 95 篇 accuracy
  • 79 篇 computational mo...
  • 79 篇 training
  • 66 篇 data models
  • 63 篇 deep learning
  • 63 篇 federated learni...
  • 49 篇 protocols
  • 49 篇 clustering algor...
  • 47 篇 data mining
  • 45 篇 cryptography
  • 44 篇 neural networks
  • 44 篇 visualization
  • 44 篇 privacy
  • 43 篇 predictive model...
  • 43 篇 security
  • 43 篇 robustness
  • 41 篇 optimization
  • 41 篇 adaptation model...

机构

  • 220 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 166 篇 school of comput...
  • 80 篇 key laboratory o...
  • 65 篇 computer network...
  • 65 篇 college of compu...
  • 59 篇 college of infor...
  • 59 篇 key laboratory o...
  • 56 篇 college of mathe...
  • 51 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 43 篇 institute of inf...
  • 42 篇 school of cyber ...
  • 42 篇 the key laborato...
  • 40 篇 school of comput...
  • 37 篇 university of ch...
  • 37 篇 shandong provinc...
  • 36 篇 key laboratory o...

作者

  • 48 篇 zhao yao
  • 41 篇 ren jiadong
  • 36 篇 zhou deyu
  • 29 篇 zhang min-ling
  • 27 篇 yang yang
  • 26 篇 cong runmin
  • 24 篇 guo wenzhong
  • 22 篇 min-ling zhang
  • 21 篇 xiaoming wu
  • 21 篇 guang cheng
  • 20 篇 zhang zhenrong
  • 20 篇 guo kun
  • 19 篇 geng xin
  • 19 篇 wang yun
  • 19 篇 du bo
  • 18 篇 liu ximeng
  • 17 篇 xiaoping li
  • 16 篇 niyato dusit
  • 16 篇 di xiaoqiang
  • 16 篇 he yulan

语言

  • 3,111 篇 英文
  • 191 篇 其他
  • 147 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Integration"
3434 条 记 录,以下是571-580 订阅
排序:
Secure multi-party confidential protocol of matrix factorization
Secure multi-party confidential protocol of matrix factoriza...
收藏 引用
5th IEEE International Conference on Intelligent networking and Collaborative Systems, INCoS 2013
作者: Xiao, Haiyan Yang, Xiaoyuan Key Laboratory of computer Network Information Security of Engineering Institute of the Armed Police Xi'an Shanxi China
The confidential computation of matrix is a very important issue in secure multi-party computation. But there is no literature proposed truly multi-party confidential computation protocol on matrix factorization. In t... 详细信息
来源: 评论
A novel search engine-based method for discovering command and control server  15th
A novel search engine-based method for discovering command a...
收藏 引用
15th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2015
作者: Guo, Xiaojun Cheng, Guang Pan, Wubin Dinhtu, Truong Liang, Yixin School of Computer Science and Engineering Southeast University Nanjing211189 China Key Laboratory of Computer Network and Information Integration Southeast University Nanjing211189 China School of Information Engineering Xizang Minzu University Xianyang712082 China XiZang Key Laboratory of Optical Information Processing and Visualization Technology Xizang Minzu University Xianyang712082 China
To solve the problem of getting command and control (C&C) server address covertly for malware of Botnet or advanced persistent threats, we propose a novel C&C-server address discovery scheme via search engine.... 详细信息
来源: 评论
Performance Analysis of 802.11 Broadcast Channel Access Based on Finite Queue and Markov Chain
Performance Analysis of 802.11 Broadcast Channel Access Base...
收藏 引用
International Workshop on Intelligent Communication and Social networks
作者: Zheng Liu Sanfeng Zhang Yi Ji Minjie Xu Key Laboratory of Computer Network and Information Integration of Ministry of Education Southeast University
network coding and opportunistic routing as transmission technologies of Wireless Mesh network, which are based on the 802.11 broadcast channel access, have become more sophisticated. It is important to build more acc... 详细信息
来源: 评论
Robust Disaster Recovery System Model
收藏 引用
Wuhan University Journal of Natural Sciences 2006年 第1期11卷 170-174页
作者: WANG Kun SU Rui-dan LI Zeng-xin CAI Zhen ZHOU Li-hua Key Laboratory of Computer Network and Information Security of the Ministry of Education Xidian University Xi' an 710071 Shaanxi China National Information Security Engineering and Technology Research Center Beijing 100093 China
Highly security-critical system should possess features of continuous service. We present a new Robust Disaster Recovery System Model (RDRSM). Through strengthening the ability of safe communications, RDRSM guarante... 详细信息
来源: 评论
Resource Cooperative Scheduling Optimization Considering Security in Edge Mobile networks  19th
Resource Cooperative Scheduling Optimization Considering Sec...
收藏 引用
19th EAI International Conference on Collaborative Computing: networking, Applications and Worksharing, CollaborateCom 2023
作者: Fang, Cheng Yang, Peng Yi, Meng Du, Miao Li, Bing Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Nanjing China School of Computer Science and Engineering Southeast University Nanjing China School of Cyber Science and Engineering Southeast University Nanjing China
With the rapid development of technologies such as the Internet of Things and artificial intelligence, the contradiction between limited user computing resources and real-time, fast, and safe processing of large amoun... 详细信息
来源: 评论
Opinions Are Not Always Positive: Debiasing Opinion Summarization With Model-Specific and Model-Agnostic Methods  30
Opinions Are Not Always Positive: Debiasing Opinion Summariz...
收藏 引用
Joint 30th International Conference on Computational Linguistics and 14th International Conference on Language Resources and Evaluation, LREC-COLING 2024
作者: Zhang, Yanyue Lai, Yilong Wang, Zhenglin Li, Pengfei Zhou, Deyu He, Yulan School of Computer Science and Engineering Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University China Department of Informatics King's College London United Kingdom The Alan Turing Institute United Kingdom
As in the existing opinion summary data set, more than 70% are positive texts, the current opinion summarization approaches are reluctant to generate the negative opinion summary given the input of negative opinions. ... 详细信息
来源: 评论
PIWD: A plugin-based framework for well-designed SPARQL  6
PIWD: A plugin-based framework for well-designed SPARQL
收藏 引用
6th Joint International Conference on Semantic Technology, JIST 2016
作者: Zhang, Xiaowang Song, Zhenyu Feng, Zhiyong Wang, Xin School of Computer Science and Technology Tianjin University Tianjin China School of Computer Software Tianjin University Tianjin300350 China Tianjin Key Laboratory of Cognitive Computing and Application Tianjin China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Nanjing211189 China
In the real world datasets (e.g., DBpedia query log), queries built on well-designed patterns containing only AND and OPT operators (for short, WDAO-patterns) account for a large proportion among all SPARQL queries. I... 详细信息
来源: 评论
Offensive Text Style Transfer based on Unsupervised Learning
Offensive Text Style Transfer based on Unsupervised Learning
收藏 引用
2022 International Conference on Artificial Intelligence and Intelligent information Processing, AIIIP 2022
作者: Zhao, Hanlin Yang, Peng School of Cyber Science and Engineering Southeast University Nanjing China School of Computer Science and Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Nanjing China
As the current mainstream social networking method, online social networking brings convenience to people, but also generates negative problems such as language violence. Therefore, offensive text style transfer resea... 详细信息
来源: 评论
Coverage Enhancement Strategy Based on Novel Perception and Co-evolution for Multimedia Sensor networks
收藏 引用
电子学报(英文版) 2013年 第1期22卷 135-140页
作者: XIAO Fu WANG Jing SUN Lijuan WANG Ruchuan GUO Jian College of Computer Nanjing University of Posts and Telecommunications Nanjing 210003 China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing 210003 China Key Laboratory of Broadband Wireless Communication and Sensor Network Technology Ministry of Education Nanjing 210003 China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou 215006 China
Coverage enhancement is one of the hot research topics in wireless multimedia sensor net- works. A novel Coverage-enhancing algorithm based on three-dimensional Directional perception and co-evolution (DPCCA) is propo... 详细信息
来源: 评论
A robust approach for palm ROI extraction based on real-time region learning
收藏 引用
2012 International Conference on Service-Oriented Computing, ICSOC 2012
作者: Yan, Meng Sun, Dongmei Zhao, Shouguo Zhou, Jiajia Key Laboratory of Advanced Information Science and Network Technology of Beijing School of Computer and Information Technology Beijing Jiaotong University China
A palmprint based authentication system that can work with a popular webcam in non-contact acquisition mode is potentially a good choice for biometric ***,this camera based imaging acquisition mode causes the difficul... 详细信息
来源: 评论