咨询与建议

限定检索结果

文献类型

  • 1,837 篇 会议
  • 1,571 篇 期刊文献

馆藏范围

  • 3,408 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,283 篇 工学
    • 1,671 篇 计算机科学与技术...
    • 1,305 篇 软件工程
    • 612 篇 信息与通信工程
    • 297 篇 电气工程
    • 249 篇 电子科学与技术(可...
    • 230 篇 控制科学与工程
    • 222 篇 生物工程
    • 154 篇 机械工程
    • 129 篇 网络空间安全
    • 110 篇 仪器科学与技术
    • 109 篇 光学工程
    • 105 篇 生物医学工程(可授...
    • 83 篇 化学工程与技术
    • 77 篇 动力工程及工程热...
    • 75 篇 交通运输工程
    • 59 篇 安全科学与工程
    • 54 篇 建筑学
  • 1,073 篇 理学
    • 634 篇 数学
    • 244 篇 生物学
    • 228 篇 物理学
    • 196 篇 统计学(可授理学、...
    • 91 篇 化学
    • 91 篇 系统科学
  • 672 篇 管理学
    • 389 篇 管理科学与工程(可...
    • 310 篇 图书情报与档案管...
    • 142 篇 工商管理
  • 106 篇 法学
    • 71 篇 社会学
  • 83 篇 医学
    • 68 篇 临床医学
    • 59 篇 基础医学(可授医学...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 38 篇 农学
  • 23 篇 军事学
  • 11 篇 文学
  • 10 篇 教育学
  • 9 篇 艺术学

主题

  • 138 篇 feature extracti...
  • 123 篇 semantics
  • 95 篇 accuracy
  • 79 篇 computational mo...
  • 77 篇 training
  • 65 篇 data models
  • 64 篇 deep learning
  • 62 篇 federated learni...
  • 49 篇 protocols
  • 48 篇 clustering algor...
  • 47 篇 data mining
  • 45 篇 cryptography
  • 44 篇 neural networks
  • 44 篇 visualization
  • 44 篇 privacy
  • 43 篇 security
  • 43 篇 robustness
  • 42 篇 adaptation model...
  • 41 篇 optimization
  • 41 篇 predictive model...

机构

  • 221 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 166 篇 school of comput...
  • 80 篇 key laboratory o...
  • 65 篇 college of compu...
  • 64 篇 computer network...
  • 59 篇 college of infor...
  • 57 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 50 篇 shandong fundame...
  • 47 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 43 篇 institute of inf...
  • 42 篇 school of cyber ...
  • 41 篇 the key laborato...
  • 40 篇 school of comput...
  • 37 篇 university of ch...
  • 37 篇 shandong provinc...
  • 36 篇 key laboratory o...

作者

  • 46 篇 zhao yao
  • 41 篇 ren jiadong
  • 36 篇 zhou deyu
  • 29 篇 zhang min-ling
  • 27 篇 yang yang
  • 27 篇 min-ling zhang
  • 26 篇 cong runmin
  • 24 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 20 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 geng xin
  • 19 篇 wang yun
  • 19 篇 du bo
  • 18 篇 xia chunhe
  • 17 篇 xiaoping li
  • 17 篇 liu ximeng
  • 16 篇 di xiaoqiang
  • 16 篇 he yulan

语言

  • 3,089 篇 英文
  • 187 篇 其他
  • 147 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Integration"
3408 条 记 录,以下是681-690 订阅
排序:
Experimental secure entanglement-free quantum remote sensing over 50 km of optical fiber
arXiv
收藏 引用
arXiv 2024年
作者: He, Wenjie Huang, Chunfeng Guan, Rui Chen, Ye Zhang, Zhenrong Wei, Kejin Guangxi Key Laboratory for Relativistic Astrophysics School of Physical Science and Technology Guangxi University Nanning530004 China Guangxi Key Laboratory of Multimedia Communications and Network Technology School of Computer Electronics and Information Guangxi University Nanning530004 China
Secure quantum remote sensing (SQRS) uses quantum states to gather information about distant objects or environments while ensuring secure data transmission against eavesdropping. It has potential applications in vari... 详细信息
来源: 评论
Refrence-Frame-Independent Quantum key Distribution over 250 km of Optical Fiber
arXiv
收藏 引用
arXiv 2024年
作者: Liu, Xin Luo, Di Luo, Zhicheng Li, Shizhuo Zhang, Zhenrong Wei, Kejin Guangxi Key Laboratory for Relativistic Astrophysics School of Physical Science and Technology Guangxi University Nanning530004 China Guangxi Key Laboratory of Multimedia Communications and Network Technology School of Computer Electronics and Information Guangxi University Nanning530004 China
The reference-frame-independent quantum key distribution (RFI QKD) protocol enables QKD systems to function effectively despite slowly varying reference frames, offering a distinct advantage in practical scenarios, pa... 详细信息
来源: 评论
Practical asynchronous measurement-device-independent quantum key distribution with advantage distillation
arXiv
收藏 引用
arXiv 2024年
作者: Luo, Di Liu, Xin Qin, Kaibiao Zhang, Zhenrong Wei, Kejin Guangxi Key Laboratory for Relativistic Astrophysics School of Physical Science and Technology Guangxi University Nanning530004 China Guangxi Key Laboratory of Multimedia Communications and Network Technology School of Computer Electronics and Information Guangxi University Nanning530004 China
The advantage distillation (AD) method has proven effective in improving the performance of quantum key distribution (QKD). In this paper, we introduce the AD method into a recently proposed asynchronous measurement-d... 详细信息
来源: 评论
High-Fidelity and High-Efficiency Talking Portrait Synthesis With Detail-Aware Neural Radiance Fields
收藏 引用
IEEE Transactions on Visualization and computer Graphics 2024年 PP卷 PP-PP页
作者: Wang, Muyu Zhao, Sanyuan Dong, Xingping Shen, Jianbing Wuhan University School of Computer Science National Engineering Research Center for Multimedia Software Institute of Artificial Intelligence Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan430072 China Beijing Institute of Technology School of Computer Science Beijing China University of Macau State Key Laboratory of Internet of Things for Smart City Department of Computer and Information Science China
In this paper, we propose a novel rendering framework based on neural radiance fields (NeRF) named HH-NeRF that can generate high-resolution audio-driven talking portrait videos with high fidelity and fast rendering. ... 详细信息
来源: 评论
Memory-guided two-stream spatio-temporal coding network based for video anomaly detection  23
Memory-guided two-stream spatio-temporal coding network base...
收藏 引用
Proceedings of the 2023 International Conference on information Education and Artificial Intelligence
作者: Bonan Li Hong Zhang Xingang Wang Rui Cao Jinyan Zhou China Radio and Television Shandong Network Co Ltd China Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) China
In the paper, we propose a memory-guided dual-stream spatio-temporal encoder network (MSTAE) based on the U-Net network as the backbone, the spatial stream uses the time displacement module to obtain the spatial featu...
来源: 评论
A Patent Fast Recommendation Algorithm Based on User Requirements Combined with an Inverted Table
A Patent Fast Recommendation Algorithm Based on User Require...
收藏 引用
Advanced information, Mechanical Engineering, Robotics and Automation (AIMERA), IEEE International Conference on
作者: Wan Zheng Qingyan Ding Na Li Yu Pan Xuecheng Dong Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Patent recommendation has always been an essential service for the innovation and development of all walks of life. The matching of demand and patent information can enable enterprises to quickly obtain the innovation... 详细信息
来源: 评论
Improvement in the Transferability of Target Adversarial Examples Based on Data Augmentation
Improvement in the Transferability of Target Adversarial Exa...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Kun Wang Xing Jin Fuqiang Wang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Despite the high performance of deep neural networks in image classification, they are very sensitive to those adversarial examples with small perturbations, which is likely to cause classification errors. Currently, ... 详细信息
来源: 评论
Lightweight Malicious Encrypted Traffic Detection Method Based on KL Image Compression
Lightweight Malicious Encrypted Traffic Detection Method Bas...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Yuecheng Wen Xiaotong Li Haiqing Lv Menglu Wang Wenbo Zuo Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Timely and accurate detection of and response to potentially malicious encrypted traffic is crucial in cybersecurity strategies. Convolutional neural network-based approaches that convert traffic loads into images for... 详细信息
来源: 评论
Context-Guided and Syntactic Augmented Dual Graph Convolutional network for Aspect-Based Sentiment Analysis
Context-Guided and Syntactic Augmented Dual Graph Convolutio...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Jia Yi Xiaoming Wu Xiangzhi Liu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Predicting the sentiment polarity of aspect terms in sentences is the goal of Aspect-Based Sentiment Analysis(ABSA) task. Graph Convolutional network(GCN) is used in majority of the ABSA task due to its ability to eff...
来源: 评论
An Efficient Token Mixer Model for Sheet Metal Defect Detection
An Efficient Token Mixer Model for Sheet Metal Defect Detect...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Huijuan Hao Sijian Zhu Changle Yi Yu Chen Hongge Zhao Yue Feng Rong Yang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Defects such as scratches, patches, and cracks frequently occur during sheet metal production. However, the low detection accuracy and slow processing speed of industrial defect detection models significantly impede e... 详细信息
来源: 评论