咨询与建议

限定检索结果

文献类型

  • 1,829 篇 会议
  • 1,568 篇 期刊文献

馆藏范围

  • 3,397 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,289 篇 工学
    • 1,677 篇 计算机科学与技术...
    • 1,316 篇 软件工程
    • 613 篇 信息与通信工程
    • 301 篇 电气工程
    • 249 篇 电子科学与技术(可...
    • 232 篇 控制科学与工程
    • 222 篇 生物工程
    • 155 篇 机械工程
    • 129 篇 网络空间安全
    • 110 篇 仪器科学与技术
    • 109 篇 光学工程
    • 105 篇 生物医学工程(可授...
    • 83 篇 化学工程与技术
    • 77 篇 动力工程及工程热...
    • 75 篇 交通运输工程
    • 59 篇 安全科学与工程
    • 55 篇 建筑学
  • 1,074 篇 理学
    • 636 篇 数学
    • 244 篇 生物学
    • 228 篇 物理学
    • 197 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 91 篇 化学
  • 675 篇 管理学
    • 391 篇 管理科学与工程(可...
    • 311 篇 图书情报与档案管...
    • 142 篇 工商管理
  • 107 篇 法学
    • 71 篇 社会学
  • 83 篇 医学
    • 68 篇 临床医学
    • 60 篇 基础医学(可授医学...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 38 篇 农学
  • 23 篇 军事学
  • 11 篇 文学
  • 10 篇 教育学
  • 9 篇 艺术学

主题

  • 139 篇 feature extracti...
  • 122 篇 semantics
  • 95 篇 accuracy
  • 78 篇 computational mo...
  • 77 篇 training
  • 65 篇 data models
  • 64 篇 deep learning
  • 62 篇 federated learni...
  • 49 篇 protocols
  • 48 篇 clustering algor...
  • 47 篇 data mining
  • 45 篇 cryptography
  • 44 篇 neural networks
  • 44 篇 visualization
  • 44 篇 privacy
  • 43 篇 security
  • 43 篇 robustness
  • 41 篇 optimization
  • 41 篇 predictive model...
  • 41 篇 adaptation model...

机构

  • 218 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 166 篇 school of comput...
  • 80 篇 key laboratory o...
  • 64 篇 college of compu...
  • 63 篇 computer network...
  • 59 篇 college of infor...
  • 57 篇 key laboratory o...
  • 56 篇 college of mathe...
  • 50 篇 shandong fundame...
  • 47 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 43 篇 institute of inf...
  • 42 篇 school of cyber ...
  • 41 篇 the key laborato...
  • 40 篇 school of comput...
  • 37 篇 shandong provinc...
  • 36 篇 key laboratory o...
  • 36 篇 fujian provincia...

作者

  • 46 篇 zhao yao
  • 41 篇 ren jiadong
  • 36 篇 zhou deyu
  • 29 篇 zhang min-ling
  • 27 篇 yang yang
  • 26 篇 cong runmin
  • 24 篇 guo wenzhong
  • 22 篇 min-ling zhang
  • 21 篇 xiaoming wu
  • 21 篇 guang cheng
  • 20 篇 zhang zhenrong
  • 20 篇 guo kun
  • 19 篇 geng xin
  • 19 篇 wang yun
  • 19 篇 du bo
  • 18 篇 liu ximeng
  • 17 篇 xiaoping li
  • 17 篇 xia chunhe
  • 16 篇 di xiaoqiang
  • 16 篇 he yulan

语言

  • 3,074 篇 英文
  • 191 篇 其他
  • 147 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Integration"
3397 条 记 录,以下是601-610 订阅
排序:
Deep Iterative Reconstruction network Based on Residual Constraint for Low-Dose CT Imaging
Deep Iterative Reconstruction Network Based on Residual Cons...
收藏 引用
International Conference on Systems and Informatics (ICSAI)
作者: Jin Liu Yanqin Kang Tao Liu TingYu Zhang Yikun Zhang School of Computer and Information Anhui Polytechnic University Wuhu China Key Laboratory of Computer Network and Information Integration (Southeast University) Ministry of Education Nanjing China School of Computer Science and Engineering Southeast University Nanjing China
clinical low X-ray dose computed tomography (LDCT) scanner often induce high intensity strip artifact and spot nosie, compromising diagnoses and intervention plans. Recently, sparsely constrained and network learning-... 详细信息
来源: 评论
An Approach to New Bearing Fault Diagnosis Utilizing Deep Transfer Learning
An Approach to New Bearing Fault Diagnosis Utilizing Deep Tr...
收藏 引用
Smart World Congress (SWC), IEEE
作者: HuiJuan Hao Yue Feng HongGe Zhao SiJian Zhu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China Jinan China
Bearings, serving as crucial components in mechanical equipment, exert a direct influence on the overall performance of the system. Deep transfer learning has garnered significant attention in the realm of intelligent... 详细信息
来源: 评论
Ranking Aggregation with Interactive Feedback for Collaborative Person Re-identification  33
Ranking Aggregation with Interactive Feedback for Collaborat...
收藏 引用
33rd British Machine Vision Conference Proceedings, BMVC 2022
作者: Huang, Ji Liang, Chao Zhang, Yue Wang, Zhongyuan Zhang, Chunjie National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University Wuhan430072 China Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University Wuhan430072 China Beijing Key Laboratory of Advanced Information Science and Network Technology Beijing Jiaotong University Beijing100044 China
Person re-identification (re-ID) aims to retrieve the same person from a group of networking cameras. Ranking aggregation (RA), a method to aggregates multiple ranking results, can further improve the retrieval accura... 详细信息
来源: 评论
A Category-Driven Contrastive Recovery network for Double Incomplete Multi-view Multi-label Classification
收藏 引用
IEEE Transactions on Multimedia 2025年
作者: Wang, Yiming Li, Qun Chang, Dongxia Wen, Jie Xiao, Fu Zhao, Yao Nanjing University of Posts and Telecommunications School of Computer Science Nanjing China Beijing Jiaotong University Institute of Information Science Beijing100044 China Beijing Key Laboratory of Advanced Information Science and Network Technology Beijing100044 China Harbin Institute of Technology Shenzhen Key Laboratory of Visual Object Detection and Recognition Shenzhen China
In the field of multi-view multi-label learning, the challenges of incomplete views and missing labels are prevalent due to the complexity of manual labeling and data acquisition errors. These challenges significantly... 详细信息
来源: 评论
A Dirty Data Identification Method in Mechanical Equipment Condition Monitoring
A Dirty Data Identification Method in Mechanical Equipment C...
收藏 引用
Smart World Congress (SWC), IEEE
作者: Huijuan Hao Hongge Zhao Sijian Zhu Yue Feng Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China Jinan China
The rise of the Industrial Internet of Things (IIOT) has brought new opportunities for the mechanical equipment condition monitoring. The trend towards intelligent and automated production of mechanical equipment has ... 详细信息
来源: 评论
Verifiable and Forward-Secure Multi-keyword Query in Internet of Medical Things
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Li, Hongjun He, Debiao Feng, Qi Luo, Min Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan China Wuhan University School of Cyber Science and Engineering Wuhan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250014 China National Key Laboratory of Security Communication Chengdu China
The Internet of Medical Things (IoMT) plays a pivotal role in modern healthcare systems, enhancing patients' medical experiences and improving the efficiency of public medical services. However, concerns regarding... 详细信息
来源: 评论
Enhancing Unknown Encrypted Traffic Clustering with Self-Supervised Learning
Enhancing Unknown Encrypted Traffic Clustering with Self-Sup...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Ke Ding Xia Zhou Xiaoyan Hu Guang Cheng Ruidong Li Hua Wu School of Cyber Science & Engineering Southeast University Nanjing China Purple Mountain Laboratories for Network and Communication Security Nanjing China Jiangsu Province Engineering Research Center of Security for Ubiquitous Network Nanjing China Ministry of Education Key Laboratory of Computer Network and Information Integration (Southeast University) China Institute of Science and Engineering Kanazawa University Kanazawa Japan
Many malicious attacks are launched through encrypted traffic from unknown proprietary network protocols. Timely identification of such malicious unknown encrypted traffic is essential for the defense. However, it is ... 详细信息
来源: 评论
A Multidimensional Adaptive Perception Model for Security Contraband Detection
SSRN
收藏 引用
SSRN 2023年
作者: Bian, Weixin Feng, Luo Xu, Deqin Jie, Biao Huang, Yi The School of Computer and Information Anhui Normal University Wuhu241002 China Anhui Province Key Laboratory of Network and Information Security Wuhu241002 China
Identifying prohibited items in security X-ray images is a challenging task. Since prohibited items may be intentionally concealed, and the background of X-ray images is complex and the image representation ability is... 详细信息
来源: 评论
WMLink: Wearable Smart Devices and Mobile Phones Linking through Passive Sniffing BLE and WiFi Signals
WMLink: Wearable Smart Devices and Mobile Phones Linking thr...
收藏 引用
International Conference on Advanced Cloud and Big Data (CBD)
作者: Naixuan Guo Zhaofeng Chen Heyang Xu Zhechun Zhao Yu Liu Sen Xu School of Information Engineering Yancheng Institute of Technology Yancheng China School of Computer Science and Engineering Southeast University Nanjing China Ministry of Education Key Laboratory of Computer Network and Information Integration (Southeast University)
In recent years, wearable smart devices have entered people’s lives. These devices can help users to record their daily activities, health data and so on. These devices periodically send out packets to keep connected... 详细信息
来源: 评论
Adaptive NAD: Online and Self-adaptive Unsupervised network Anomaly Detector
arXiv
收藏 引用
arXiv 2024年
作者: Yuan, Yachao Huang, Yu Yuan, Yali Wang, Jin School of Future Science and Engineering Soochow University Jiangsu Suzhou China Independent Researcher Guangxi Nanning China School of Cyber Science and Engineering Southeast University Jiangsu Nanjing China the Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Bangladesh
The widespread usage of the Internet of Things (IoT) has raised the risks of cyber threats, thus developing Anomaly Detection Systems (ADSs) that can adapt to evolving or new attacks is critical. Previous studies prim... 详细信息
来源: 评论