咨询与建议

限定检索结果

文献类型

  • 1,826 篇 会议
  • 1,549 篇 期刊文献

馆藏范围

  • 3,375 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,263 篇 工学
    • 1,657 篇 计算机科学与技术...
    • 1,300 篇 软件工程
    • 606 篇 信息与通信工程
    • 290 篇 电气工程
    • 240 篇 电子科学与技术(可...
    • 227 篇 控制科学与工程
    • 223 篇 生物工程
    • 156 篇 机械工程
    • 127 篇 网络空间安全
    • 109 篇 仪器科学与技术
    • 107 篇 光学工程
    • 106 篇 生物医学工程(可授...
    • 83 篇 化学工程与技术
    • 75 篇 动力工程及工程热...
    • 75 篇 交通运输工程
    • 58 篇 安全科学与工程
    • 53 篇 建筑学
  • 1,076 篇 理学
    • 635 篇 数学
    • 246 篇 生物学
    • 228 篇 物理学
    • 198 篇 统计学(可授理学、...
    • 93 篇 系统科学
    • 89 篇 化学
  • 665 篇 管理学
    • 387 篇 管理科学与工程(可...
    • 303 篇 图书情报与档案管...
    • 141 篇 工商管理
  • 106 篇 法学
    • 71 篇 社会学
  • 87 篇 医学
    • 72 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 60 篇 经济学
    • 60 篇 应用经济学
  • 38 篇 农学
  • 23 篇 军事学
  • 11 篇 教育学
  • 11 篇 文学
  • 9 篇 艺术学

主题

  • 135 篇 feature extracti...
  • 123 篇 semantics
  • 94 篇 accuracy
  • 78 篇 computational mo...
  • 77 篇 training
  • 64 篇 data models
  • 61 篇 deep learning
  • 58 篇 federated learni...
  • 48 篇 protocols
  • 48 篇 clustering algor...
  • 47 篇 data mining
  • 45 篇 cryptography
  • 44 篇 neural networks
  • 44 篇 visualization
  • 42 篇 privacy
  • 42 篇 robustness
  • 41 篇 optimization
  • 41 篇 predictive model...
  • 40 篇 wireless sensor ...
  • 40 篇 security

机构

  • 215 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 165 篇 school of comput...
  • 80 篇 key laboratory o...
  • 64 篇 college of compu...
  • 62 篇 computer network...
  • 59 篇 college of infor...
  • 57 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 49 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 44 篇 key laboratory o...
  • 44 篇 institute of inf...
  • 43 篇 school of cyber ...
  • 42 篇 the key laborato...
  • 40 篇 school of comput...
  • 36 篇 university of ch...
  • 36 篇 shandong provinc...
  • 35 篇 key laboratory o...

作者

  • 49 篇 zhao yao
  • 42 篇 ren jiadong
  • 36 篇 zhou deyu
  • 29 篇 zhang min-ling
  • 26 篇 cong runmin
  • 24 篇 guo wenzhong
  • 23 篇 yang yang
  • 22 篇 min-ling zhang
  • 21 篇 xiaoming wu
  • 21 篇 guang cheng
  • 20 篇 guo kun
  • 20 篇 du bo
  • 19 篇 geng xin
  • 19 篇 wang yun
  • 19 篇 zhang zhenrong
  • 18 篇 liu ximeng
  • 17 篇 xiaoping li
  • 16 篇 niyato dusit
  • 16 篇 di xiaoqiang
  • 16 篇 he yulan

语言

  • 3,076 篇 英文
  • 169 篇 其他
  • 145 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Integration"
3375 条 记 录,以下是81-90 订阅
排序:
Online Flow Scheduling in Virtualized Time-Sensitive networks: A Joint Admission Control and VNF Embedding Approach
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第06期24卷 4651-4667页
作者: Zhang, Yajing Chen, Cailian Li, Mingyan You, Chaoqun Guan, Xinping Quek, Tony Q. S. Shanghai Satellite Network Research Institute Co. Ltd. Shanghai200120 China Shanghai Jiao Tong University Department of Automation Shanghai200240 China Ministry of Education of China Key Laboratory of System Control and Information Processing Shanghai200240 China Shanghai Engineering Research Center of Intelligent Control and Management Shanghai200240 China Chongqing University College of Computer Science Chongqing400044 China Fudan University School of Computer Science Shanghai200433 China Singapore University of Technology and Design 487372 Singapore
Time-sensitive networking (TSN) is proposed to satisfy the increasingly stringent demands of Industrial 4.0 for deterministic transmission. This is achieved by generating a series of centrally configured gate control ... 详细信息
来源: 评论
Skyrmionic spin textures in nonparaxial light
收藏 引用
Advanced Photonics 2025年 第1期7卷 85-92页
作者: Xinrui Lei Aiping Yang Xusheng Chen Luping Du Peng Shi Qiwen Zhan Xiaocong Yuan Shenzhen University Institute of Microscale Optoelectronics and State Key Laboratory of Radio Frequency Heterogeneous IntegrationNanophotonics Research CenterShenzhen Key Laboratory of Micro-Scale Optical Information TechnologyShenzhenChina University of Shanghai for Science and Technology School of Optical-Electrical and Computer EngineeringShanghaiChina Dongguan University of Technology Research Institute of Interdisciplinary Sciences and School of Materials Science and EngineeringDongguanChina Research Centre for Frontier Fundamental Studies Zhejiang LabHangzhouChina
Topological textures in optics such as skyrmions and merons are increasingly studied for their potential functions in light–matter interactions,deep-subwavelength imaging,and ***,they were previously generated either... 详细信息
来源: 评论
A two Stage Mixed Integer Programming Model for Distributionally Robust State Based Non-Intrusive Load Monitoring
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Zhang, Chen Chai, Zimo Yang, Linfeng University of Shanghai for Science and Technology School of Mechanical Engineering Shanghai China Guangxi University School of Computer Electronics and Information the Guangxi Key Laboratory of Multimedia Communication and Network Technology Nanning China
This paper presents a non-intrusive load monitoring (NILM) model based on two-stage mixed-integer linear programming theory. Compared with other mixed integer optimization-based models, this paper model introduces few... 详细信息
来源: 评论
Source-free Domain Adaptation with Multiple Alignment for Efficient Image Retrieval
Source-free Domain Adaptation with Multiple Alignment for Ef...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Ni, Jinghui Cui, Hui Zhao, Lihai Li, Fengling Han, Xiaohui Xu, Lijuan Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science China Quan Cheng Laboratory China Shandong Open University China University of Technology Sydney Australia
Domain adaptation techniques help models generalize to target domains by addressing domain discrepancies between the source and target domain data distributions. These techniques are particularly valuable for cross-do... 详细信息
来源: 评论
Crop Classification Methods Based on Siamese CBMM-CNN Architectures Using Hyperspectral Remote Sensing Data  24th
Crop Classification Methods Based on Siamese CBMM-CNN Archi...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Xie, Bin Zhang, Jiahao Li, Yuling Li, Yusong Dong, Xinyu College of Computer and Cyber Security Hebei Normal University Hebei Shijiazhuang China Hebei Provincial Key Laboratory of Network and Information Security Hebei Normal University Hebei Shijiazhuang China Hebei Provincial Engineering Research Center for Supply Chain Big Data Analytics and Data Security Hebei Normal University Hebei Shijiazhuang China
Amidst global population growth and escalating food demands, real-time agricultural monitoring is crucial for ensuring food security. During the initial stages of crop growth, however, it faces significant challenges ... 详细信息
来源: 评论
ENS-RFMC: An Encrypted network Traffic Sampling Method Based on Rule-Based Feature Extraction and Multi-hierarchical Clustering for Intrusion Detection  27th
ENS-RFMC: An Encrypted Network Traffic Sampling Method Based...
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Chen, Liang-Chen Gao, Shu Wei, Zi-Xuan Liu, Bao-Xu Zhang, Xu-Yao School of Computer Science and Artificial Intelligence Wuhan University of Technology Wuhan430063 China Institute of Automation NLPR Chinese Academy of Sciences Beijing100190 China Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China School of Computer China University of Labor Relations Beijing100048 China Key Laboratory of Network Assessment Technology Chinese Academy of Sciences Beijing100093 China
Efficiently and quickly identifying malware in encrypted network traffic is a major challenge. This research presents and evaluates a novel approach for sampling encrypted network traffic, called ENS-RFMC. Initially, ... 详细信息
来源: 评论
A Category-Driven Contrastive Recovery network for Double Incomplete Multi-view Multi-label Classification
收藏 引用
IEEE Transactions on Multimedia 2025年
作者: Wang, Yiming Li, Qun Chang, Dongxia Wen, Jie Xiao, Fu Zhao, Yao Nanjing University of Posts and Telecommunications School of Computer Science Nanjing China Beijing Jiaotong University Institute of Information Science Beijing100044 China Beijing Key Laboratory of Advanced Information Science and Network Technology Beijing100044 China Harbin Institute of Technology Shenzhen Key Laboratory of Visual Object Detection and Recognition Shenzhen China
In the field of multi-view multi-label learning, the challenges of incomplete views and missing labels are prevalent due to the complexity of manual labeling and data acquisition errors. These challenges significantly... 详细信息
来源: 评论
Verifiable and Forward-Secure Multi-keyword Query in Internet of Medical Things
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Li, Hongjun He, Debiao Feng, Qi Luo, Min Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan China Wuhan University School of Cyber Science and Engineering Wuhan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250014 China National Key Laboratory of Security Communication Chengdu China
The Internet of Medical Things (IoMT) plays a pivotal role in modern healthcare systems, enhancing patients' medical experiences and improving the efficiency of public medical services. However, concerns regarding... 详细信息
来源: 评论
TLDP: An Algorithm of Local Differential Privacy for Tensors
arXiv
收藏 引用
arXiv 2025年
作者: Yuan, Yachao Tang, Xiao Huang, Yu Wang, Jin School of Future Science and Engineering Soochow University Jiangsu Suzhou China School of Mathematics Southeast University Jiangsu Nanjing China School of Cyber Science and Engineering Southeast University Jiangsu Nanjing China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education China
Tensor-valued data, increasingly common in applications like spatiotemporal modeling and social networks, pose unique challenges for privacy protection due to their multidimensional structure and the risk of losing cr... 详细信息
来源: 评论
UAD-DPL: An Unknown Encrypted Attack Detection Method Based on Deep Prototype Learning  27th
UAD-DPL: An Unknown Encrypted Attack Detection Method Based ...
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Chen, Liang-Chen Gao, Shu Liu, Bao-Xu Zhang, Xu-Yao School of Computer Science and Artificial Intelligence Wuhan University of Technology Wuhan430063 China Institute of Automation NLPR Institute of Automation Chinese Academy of Sciences Beijing100190 China Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China School of Computer China University of Labor Relations Beijing100048 China Key Laboratory of Network Assessment Technology Chinese Academy of Sciences Beijing100093 China
In the field of cybersecurity, a significant concern is the potential for unknown attacks to occur at any moment. The primary obstacle faced by intrusion detection systems lies in the identification of unknown attacks... 详细信息
来源: 评论