咨询与建议

限定检索结果

文献类型

  • 1,831 篇 会议
  • 1,603 篇 期刊文献

馆藏范围

  • 3,434 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,323 篇 工学
    • 1,698 篇 计算机科学与技术...
    • 1,320 篇 软件工程
    • 628 篇 信息与通信工程
    • 318 篇 电气工程
    • 257 篇 电子科学与技术(可...
    • 240 篇 控制科学与工程
    • 223 篇 生物工程
    • 158 篇 机械工程
    • 136 篇 网络空间安全
    • 113 篇 光学工程
    • 112 篇 仪器科学与技术
    • 106 篇 生物医学工程(可授...
    • 84 篇 化学工程与技术
    • 79 篇 交通运输工程
    • 77 篇 动力工程及工程热...
    • 62 篇 安全科学与工程
    • 56 篇 建筑学
  • 1,090 篇 理学
    • 645 篇 数学
    • 247 篇 生物学
    • 231 篇 物理学
    • 202 篇 统计学(可授理学、...
    • 93 篇 系统科学
    • 91 篇 化学
  • 681 篇 管理学
    • 394 篇 管理科学与工程(可...
    • 316 篇 图书情报与档案管...
    • 143 篇 工商管理
  • 108 篇 法学
    • 71 篇 社会学
  • 88 篇 医学
    • 72 篇 临床医学
    • 64 篇 基础医学(可授医学...
  • 59 篇 经济学
    • 59 篇 应用经济学
  • 39 篇 农学
  • 23 篇 军事学
  • 12 篇 教育学
  • 11 篇 文学
  • 9 篇 艺术学

主题

  • 140 篇 feature extracti...
  • 123 篇 semantics
  • 95 篇 accuracy
  • 79 篇 computational mo...
  • 79 篇 training
  • 66 篇 data models
  • 63 篇 deep learning
  • 63 篇 federated learni...
  • 49 篇 protocols
  • 49 篇 clustering algor...
  • 47 篇 data mining
  • 45 篇 cryptography
  • 44 篇 neural networks
  • 44 篇 visualization
  • 44 篇 privacy
  • 43 篇 predictive model...
  • 43 篇 security
  • 43 篇 robustness
  • 41 篇 optimization
  • 41 篇 adaptation model...

机构

  • 220 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 166 篇 school of comput...
  • 80 篇 key laboratory o...
  • 65 篇 computer network...
  • 65 篇 college of compu...
  • 59 篇 college of infor...
  • 59 篇 key laboratory o...
  • 56 篇 college of mathe...
  • 51 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 43 篇 institute of inf...
  • 42 篇 school of cyber ...
  • 42 篇 the key laborato...
  • 40 篇 school of comput...
  • 37 篇 university of ch...
  • 37 篇 shandong provinc...
  • 36 篇 key laboratory o...

作者

  • 48 篇 zhao yao
  • 41 篇 ren jiadong
  • 36 篇 zhou deyu
  • 29 篇 zhang min-ling
  • 27 篇 yang yang
  • 26 篇 cong runmin
  • 24 篇 guo wenzhong
  • 22 篇 min-ling zhang
  • 21 篇 xiaoming wu
  • 21 篇 guang cheng
  • 20 篇 zhang zhenrong
  • 20 篇 guo kun
  • 19 篇 geng xin
  • 19 篇 wang yun
  • 19 篇 du bo
  • 18 篇 liu ximeng
  • 17 篇 xiaoping li
  • 16 篇 niyato dusit
  • 16 篇 di xiaoqiang
  • 16 篇 he yulan

语言

  • 3,111 篇 英文
  • 191 篇 其他
  • 147 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Integration"
3434 条 记 录,以下是581-590 订阅
排序:
Detecting and mitigating a sophisticated interest flooding attack in NDN from the network-wide view  1
Detecting and mitigating a sophisticated interest flooding a...
收藏 引用
1st International Workshop on network Meets Intelligent Computations, NMIC 2019
作者: Cheng, Guang Zhao, Lixia Hu, Xiaoyan Zheng, Shaoqi Wu, Hua Li, Ruidong Fan, Chengyu School of Cyber Science and Engineering Southeast University Nanjing211189 China Key Laboratory of Computer Network and Information Integration Ministry of Education of China Southeast University China Key Laboratory of Computer Network Technology of Jiangsu Province China National Institute of Information and Communications Technology Tokyo184-8795 Japan Computer Science Department Colorado State University Fort Collins United States
Interest Flooding Attack (IFA) is one of the main security threats for the Named Data networking (NDN). Most of its existing countermeasures enable intermediate routers near the attackers to independently detect the a... 详细信息
来源: 评论
Joint Optimization of Latency and Energy Consumption for Mobile Edge Computing Based Proximity Detection in Road networks
收藏 引用
China Communications 2022年 第4期19卷 274-290页
作者: Tongyu Zhao Yaqiong Liu Guochu Shou Xinwei Yao School of Information and Communication Engineering Beijing University of Posts and TelecommunicationsBeijing 100876China Beijing Laboratory of Advanced Information Networks Beijing Key Laboratory of Network System Architecture and ConvergenceBeijing 100876China School of Computer Science and Technology Zhejiang University of TechnologyChina
In recent years, artificial intelligence and automotive industry have developed rapidly, and autonomous driving has gradually become the focus of the industry. In road networks, the problem of proximity detection refe... 详细信息
来源: 评论
Task Offloading and Resource Allocation with Privacy Constraints in End-Edge-Cloud Environment  17th
Task Offloading and Resource Allocation with Privacy Constra...
收藏 引用
17th CCF Conference on computer Supported Cooperative Work and Social Computing, ChineseCSCW 2022
作者: Zhu, Xia Sun, Wei Li, Xiaoping School of Computer Science and Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University Nanjing China School of Cyber Science and Engineering Southeast University Nanjing China
The end-edge-cloud architecture brings an efficient solution to the big data processing problem caused by massive IoT devices. The characteristics of this architecture, such as massive devices, heterogeneous resources... 详细信息
来源: 评论
Cs 5D_(5/2)-6F 728 nm Laser Spectroscopy with Single Pumping Laser
收藏 引用
Chinese Physics Letters 2017年 第3期34卷 53-56页
作者: 周琦 常鹏媛 刘忠征 张晓刚 祝传文 陈景标 School of Optoelectronic Information University of Electronic Science and Technology of China State Key Laboratory of Advanced Optical Communication System and Network Institute of Quantum ElectronicsSchool of Electronics Engineering & Computer SciencePeking University
The sub-Doppler absorption laser spectroscopy at 728nm transition from the 5D5/2 state to the 6F state of cesium with linewidth near 10 MHz is first experimentally performed with indirect pumping from the ground state... 详细信息
来源: 评论
A cooperative method for supervised learning in Spiking neural networks
A cooperative method for supervised learning in Spiking neur...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Hong, Shen Ning, Liu Xiaoping, Li Qian, Wang School of Computer Science and Engineering Southeast University Nanjing China School of Golden Audit Nanjing Audit University Nanjing China Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University Nanjing China
In Spiking neural networks, information is encoded in separate spike times. The traditional gradient descent based learning algorithm (SpikeProp) trends to be trapped in local optima and cannot converge if the negativ... 详细信息
来源: 评论
Data Security and Privacy in Bitcoin System:A Survey
收藏 引用
Journal of computer Science & Technology 2020年 第4期35卷 843-862页
作者: Lie-Huang Zhu Bao-Kun Zheng Meng Shen Feng Gao Hong-Yu Li Ke-Xin Shi School of Computer Science and Technology Beijing Institute of TechnologyBeijing 100081China School of Information Management for Law China University of Political Science and LawBeijing 102249China Key Laboratory of Information Network Security Ministry of Public SecurityShanghai 201204China
To date,bitcoin has been the most successful application of blockchain technology and has received considerable attention from both industry and *** is an electronic payment system based on cryptography rather than on... 详细信息
来源: 评论
A blockchain-based framework for data quality in edge-computing-enabled crowdsensing
收藏 引用
Frontiers of computer Science 2023年 第4期17卷 127-139页
作者: Jian AN Siyuan WU Xiaolin GUI Xin HE Xuejun ZHANG School of Computer Science and Technology Shaanxi Province Key Laboratory of Computer NetworkXi’an Jiaotong UniversityXi’an 710049China School of Software Henan UniversityKaifeng 475001China School of Electronic and Information Engineering Lanzhou Jiaotong UniversityLanzhou 730070China
With the rapid development of mobile technology and smart devices,crowdsensing has shown its large potential to collect massive *** the limitation of calculation power,edge computing is introduced to release unnecessa... 详细信息
来源: 评论
Mobility-Aware Multi-Task Migration and Offloading Scheme for Internet of Vehicles
收藏 引用
Chinese Journal of Electronics 2023年 第6期32卷 1192-1202页
作者: LI Xujie TANG Jing XU Yuan SUN Ying College of Computer and Information Hohai University State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Key Lab for Wireless Sensor Network and Communication Shanghai Institute of Microsystem School of Information Engineering Jiangsu Open University
In Internet of vehicles, vehicular edge computing(VEC) as a new paradigm can effectively accomplish various tasks. Due to limited computing resources of the roadside units(RSUs), computing ability of vehicles can be a... 详细信息
来源: 评论
Can Nano-Particle Melt below the Melting Temperature of Its Free Surface Partner?
收藏 引用
Communications in Theoretical Physics 2015年 第2期63卷 249-254页
作者: 眭晓红 王宗国 康凯 覃绍京 王垂林 State Key Laboratory of Theoretical Physics Institute of Theoretical Physics Chinese Academy of Sciences Computer Network Information Center Chinese Academy of Sciences Science and Technology on Surface Physics and Chemistry Laboratory China Center of Advanced Science and Technology
The phonon thermal contribution to the melting temperature of nano-particles is inspected. The discrete summation of phonon states and its corresponding integration form as an approximation for a nano-particle or for ... 详细信息
来源: 评论
Variable-length sequential dynamic features-based malware detection
收藏 引用
High Technology Letters 2016年 第4期22卷 362-367页
作者: 杜冬高 Li Gaochao Ma Yan Network and Information Center Institute of Network TechnologyBeijing University of Posts and Telecommunications National Computer Network Emergency Response Technical Team/Coordination Center of China Institute of Information Engineering Chinese Academy of Sciences Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia Beijing University of Posts and Telecommunications
In order to solve the problem that traditional signature-based malware detection systems are inefficacious in detecting new malware,a practical malware detection system is constructed to find out new malware. Applicat... 详细信息
来源: 评论