咨询与建议

限定检索结果

文献类型

  • 1,826 篇 会议
  • 1,549 篇 期刊文献

馆藏范围

  • 3,375 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,263 篇 工学
    • 1,657 篇 计算机科学与技术...
    • 1,300 篇 软件工程
    • 606 篇 信息与通信工程
    • 290 篇 电气工程
    • 240 篇 电子科学与技术(可...
    • 227 篇 控制科学与工程
    • 223 篇 生物工程
    • 156 篇 机械工程
    • 127 篇 网络空间安全
    • 109 篇 仪器科学与技术
    • 107 篇 光学工程
    • 106 篇 生物医学工程(可授...
    • 83 篇 化学工程与技术
    • 75 篇 动力工程及工程热...
    • 75 篇 交通运输工程
    • 58 篇 安全科学与工程
    • 53 篇 建筑学
  • 1,076 篇 理学
    • 635 篇 数学
    • 246 篇 生物学
    • 228 篇 物理学
    • 198 篇 统计学(可授理学、...
    • 93 篇 系统科学
    • 89 篇 化学
  • 665 篇 管理学
    • 387 篇 管理科学与工程(可...
    • 303 篇 图书情报与档案管...
    • 141 篇 工商管理
  • 106 篇 法学
    • 71 篇 社会学
  • 87 篇 医学
    • 72 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 60 篇 经济学
    • 60 篇 应用经济学
  • 38 篇 农学
  • 23 篇 军事学
  • 11 篇 教育学
  • 11 篇 文学
  • 9 篇 艺术学

主题

  • 135 篇 feature extracti...
  • 123 篇 semantics
  • 94 篇 accuracy
  • 78 篇 computational mo...
  • 77 篇 training
  • 64 篇 data models
  • 61 篇 deep learning
  • 58 篇 federated learni...
  • 48 篇 protocols
  • 48 篇 clustering algor...
  • 47 篇 data mining
  • 45 篇 cryptography
  • 44 篇 neural networks
  • 44 篇 visualization
  • 42 篇 privacy
  • 42 篇 robustness
  • 41 篇 optimization
  • 41 篇 predictive model...
  • 40 篇 wireless sensor ...
  • 40 篇 security

机构

  • 215 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 165 篇 school of comput...
  • 80 篇 key laboratory o...
  • 64 篇 college of compu...
  • 62 篇 computer network...
  • 59 篇 college of infor...
  • 57 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 49 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 44 篇 key laboratory o...
  • 44 篇 institute of inf...
  • 43 篇 school of cyber ...
  • 42 篇 the key laborato...
  • 40 篇 school of comput...
  • 36 篇 university of ch...
  • 36 篇 shandong provinc...
  • 35 篇 key laboratory o...

作者

  • 49 篇 zhao yao
  • 42 篇 ren jiadong
  • 36 篇 zhou deyu
  • 29 篇 zhang min-ling
  • 26 篇 cong runmin
  • 24 篇 guo wenzhong
  • 23 篇 yang yang
  • 22 篇 min-ling zhang
  • 21 篇 xiaoming wu
  • 21 篇 guang cheng
  • 20 篇 guo kun
  • 20 篇 du bo
  • 19 篇 geng xin
  • 19 篇 wang yun
  • 19 篇 zhang zhenrong
  • 18 篇 liu ximeng
  • 17 篇 xiaoping li
  • 16 篇 niyato dusit
  • 16 篇 di xiaoqiang
  • 16 篇 he yulan

语言

  • 3,076 篇 英文
  • 169 篇 其他
  • 145 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Integration"
3375 条 记 录,以下是61-70 订阅
排序:
A Byzantine Client Detection Method for Federated Learning Based on Encrypted Repeated Median Linear Regression  24
A Byzantine Client Detection Method for Federated Learning B...
收藏 引用
5th International Conference on computer Science and Management Technology, ICCSMT 2024
作者: Guo, Jinlong Yang, Ming Li, Huijuan Wu, Xiaoming He, Yunpeng Wang, Xin Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Shandong Jinan China Shandong Evayinfo Technology Co. Ltd. Shandong Jinan China
Federated learning is an emerging distributed machine learning technology that allows participants to jointly train machine learning models locally without the need for large-scale data transmission and sharing, there... 详细信息
来源: 评论
Efficient and fine-grained access control with fully-hidden policies for cloud-enabled IoT
收藏 引用
Digital Communications and networks 2025年 第2期11卷 473-481页
作者: Li, Qi Liu, Gaozhan Zhang, Qianqian Han, Lidong Chen, Wei Li, Rui Xiong, Jinbo School of Computer Science Nanjing University of Posts and Telecommunications Nanjing210023 China Key Laboratory of Cryptography of Zhejiang Province Hangzhou Normal University Hangzhou311121 China Tongda College of Nanjing University of Posts and Telecommunications Yangzhou225127 China Henan Key Laboratory of Network Cryptography Technology Zhengzhou450001 China School of Computer Science and Technology Xidian University Xi'an710071 China State Key Laboratory of Tibetan Intelligent Information Processing and Application Qinghai Normal University Xining810008 China Faculty of Software Fujian Normal University Fuzhou350108 China
Ciphertext-Policy Attribute-Based Encryption (CP-ABE) enables fine-grained access control on ciphertexts, making it a promising approach for managing data stored in the cloud-enabled Internet of Things. But existing s... 详细信息
来源: 评论
A Fast recognition method for DVS perimeter security intrusion signals based on transfer learning
收藏 引用
Optical Fiber Technology 2025年 93卷
作者: Shen, Yongxu Wang, Chang Sun, Zhihui Zhang, Faxiang Jiang, Shaodong Liu, Xu Gao, Fengxia Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
In the perimeter security intrusion signal monitoring based on the Distributed Optical Fiber Vibration Sensing (DVS) system, the common approach for identifying intrusion signals in new scenarios is to collect large a... 详细信息
来源: 评论
Optimal Illumination Distance Metrics for Person Re-identification  21st
Optimal Illumination Distance Metrics for Person Re-identif...
收藏 引用
21st Pacific Rim International Conference on Artificial Intelligence, PRICAI 2024
作者: Wang, Chao Wang, Zhongyuan Hu, Ruimin Wang, Xiaochen Zhou, Wen National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University Wuhan China Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University Wuhan China College of Information Engineering Nanjing University of Finance Economics Nanjing China
Person re-identification (Re-ID) has been widely used in public security and surveillance. Due to the influence of different shooting times and locations, can lead to lighting variations in the images captured by the ... 详细信息
来源: 评论
A High-Quality and Efficient Bus-Aware Global Router
收藏 引用
Chinese Journal of Electronics 2025年 第2期34卷 444-456页
作者: Genggeng Liu Ling Wei Yantao Yu Ning Xu College of Computer and Data Science Fuzhou University Fuzhou China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou China School of Information Engineering Wuhan University of Technology Wuhan China
As advanced technology nodes enter the nanometer era, the complexity of integrated circuit design is increasing, and the proportion of bus in the net is also increasing. The bus routing has become a key factor affecti... 详细信息
来源: 评论
Disentangled Noisy Correspondence Learning
收藏 引用
IEEE Transactions on Image Processing 2025年 34卷 2602-2615页
作者: Dang, Zhuohang Luo, Minnan Wang, Jihong Jia, Chengyou Han, Haochen Wan, Herun Dai, Guang Chang, Xiaojun Wang, Jingdong Xi’an Jiaotong University School of Computer Science and Technology Ministry of Education Key Laboratory of Intelligent Networks and Network Security Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Shaanxi Xi’an710049 China SGIT AI Lab China State Grid Corporation of China State Grid Shaanxi Electric Power Company Limited Shaanxi China University of Science and Technology of China School of Information Science and Technology China Department of Computer Vision China Baidu Inc China
Cross-modal retrieval is crucial in understanding latent correspondences across modalities. However, existing methods implicitly assume well-matched training data, which is impractical as real-world data inevitably in... 详细信息
来源: 评论
In Vivo Bioelectronic Nose Based on a Bioengineered Rat for the Explosive Odors with Benzene Ring Detection and Identification  24
In Vivo Bioelectronic Nose Based on a Bioengineered Rat for ...
收藏 引用
11th International Conference on Biomedical and Bioinformatics Engineering, ICBBE 2024
作者: Ma, Jing Wang, Yimeng Yang, Jun Sun, Biao Yang, Qing Zheng, Chenguang Academy of Medical Engineering and Translational Medicine Medical College Tianjin University Tianjin China College of Precision Instruments & Optoelectronics Engineering Tianjin University Tianjin China School of Electrical and Information Engineering Tianjin University Tianjin China Tianjin Key Laboratory of Brain Science and Neuroengineering Tianjin China Haihe Laboratory of Brain-Computer Interaction and Human-Machine Integration Tianjin China
Accidents caused by explosives occur frequently, which seriously threaten people's lives and health, so it is urgent to develop new technologies for sensitively and rapidly detecting trace explosives. In this stud... 详细信息
来源: 评论
Source-free Domain Adaptation with Multiple Alignment for Efficient Image Retrieval
Source-free Domain Adaptation with Multiple Alignment for Ef...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Jinghui Ni Hui Cui Lihai Zhao Fengling Li Xiaohui Han Lijuan Xu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Quan Cheng Laboratory Shandong Open University University of Technology Sydney
Domain adaptation techniques help models generalize to target domains by addressing domain discrepancies between the source and target domain data distributions. These techniques are particularly valuable for cross-do... 详细信息
来源: 评论
On the -differential spectra of two classes of power functions over finite fields
收藏 引用
Applicable Algebra in Engineering, Communication and Computing 2025年 1-30页
作者: Liu, Qian Huang, Zhiwei Chen, Zhixiong Jiang, Rong Zhang, Liupiao Key Laboratory of Information Security of Network Systems College of Computer and Data Science Fuzhou University Fuzhou China Hubei Key Laboratory of Applied Mathematics Faculty of Mathematics and Statistics Hubei University Wuhan China Yunnan Key Laboratory of Service Computing Yunnan University of Finance and Economics Kunming China Fujian Key Laboratory of Financial Information Processing Putian University Putian China School of Computer Science and Technology Dongguan University of Technology Dongguan China
Recently, a new concept called multiplicative differential was introduced by Ellingsen et al. [7]. As an extension of the differential uniformity, it is theoretically appealing to determine the properties of c-differe...
来源: 评论
Classification of Zhuang Dialect combined with Bert and SimAM
Classification of Zhuang Dialect combined with Bert and SimA...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Min Huang Xuejun Zhang Wenkang Chen School of Computer Electronics and Information Guangxi Key Laboratory of Multimedia Communications and Network Technology Guangxi University Nanning China School of Electrical Engineering Guangxi Key Laboratory of Multimedia Communications and Network Technology Guangxi University Nanning China
Language recognition refers to the automatic recognition of the language type of the given speech segments. Zhuang is an important language in Southeast Asia, with more than 16 million native speakers. Due to the scar... 详细信息
来源: 评论