咨询与建议

限定检索结果

文献类型

  • 372 篇 会议
  • 289 篇 期刊文献

馆藏范围

  • 661 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 442 篇 工学
    • 348 篇 计算机科学与技术...
    • 288 篇 软件工程
    • 127 篇 信息与通信工程
    • 44 篇 控制科学与工程
    • 38 篇 生物工程
    • 34 篇 电气工程
    • 29 篇 机械工程
    • 28 篇 电子科学与技术(可...
    • 24 篇 生物医学工程(可授...
    • 19 篇 仪器科学与技术
    • 18 篇 光学工程
    • 16 篇 网络空间安全
    • 14 篇 动力工程及工程热...
    • 11 篇 交通运输工程
    • 8 篇 化学工程与技术
    • 8 篇 安全科学与工程
  • 183 篇 理学
    • 124 篇 数学
    • 39 篇 生物学
    • 36 篇 统计学(可授理学、...
    • 25 篇 物理学
    • 18 篇 系统科学
    • 10 篇 化学
  • 148 篇 管理学
    • 79 篇 管理科学与工程(可...
    • 72 篇 图书情报与档案管...
    • 31 篇 工商管理
  • 19 篇 医学
    • 17 篇 临床医学
    • 12 篇 基础医学(可授医学...
    • 9 篇 药学(可授医学、理...
  • 16 篇 法学
    • 15 篇 社会学
  • 10 篇 经济学
    • 10 篇 应用经济学
  • 6 篇 农学
  • 3 篇 文学
  • 3 篇 艺术学
  • 2 篇 教育学
  • 2 篇 军事学

主题

  • 30 篇 semantics
  • 19 篇 routing
  • 19 篇 training
  • 16 篇 feature extracti...
  • 16 篇 machine learning
  • 16 篇 protocols
  • 16 篇 clustering algor...
  • 14 篇 wireless sensor ...
  • 12 篇 computational mo...
  • 12 篇 privacy
  • 11 篇 deep learning
  • 11 篇 optimization
  • 10 篇 network topology
  • 10 篇 educational inst...
  • 10 篇 contrastive lear...
  • 10 篇 estimation
  • 9 篇 computer science
  • 9 篇 peer to peer com...
  • 9 篇 laboratories
  • 9 篇 quality of servi...

机构

  • 167 篇 school of comput...
  • 81 篇 key laboratory o...
  • 60 篇 key laboratory o...
  • 46 篇 key laboratory o...
  • 42 篇 school of cyber ...
  • 40 篇 school of comput...
  • 36 篇 key laboratory o...
  • 19 篇 key laboratory o...
  • 19 篇 purple mountain ...
  • 15 篇 ministry of educ...
  • 13 篇 the school of co...
  • 12 篇 college of softw...
  • 11 篇 school of cyber ...
  • 10 篇 national mobile ...
  • 10 篇 department of co...
  • 9 篇 guangxi collabor...
  • 9 篇 national key lab...
  • 9 篇 shanghai key lab...
  • 8 篇 the key laborato...
  • 8 篇 southeast univer...

作者

  • 36 篇 zhou deyu
  • 28 篇 zhang min-ling
  • 23 篇 min-ling zhang
  • 21 篇 guang cheng
  • 20 篇 wang yun
  • 19 篇 geng xin
  • 16 篇 xiaoping li
  • 16 篇 he yulan
  • 16 篇 sanfeng zhang
  • 13 篇 cheng guang
  • 13 篇 shu huazhong
  • 12 篇 li xiaoping
  • 12 篇 qi guilin
  • 12 篇 kong youyong
  • 11 篇 jia yuheng
  • 11 篇 yang peng
  • 11 篇 tao jun
  • 10 篇 wei tong
  • 10 篇 yang guanyu
  • 9 篇 xiaoyan hu

语言

  • 544 篇 英文
  • 76 篇 其他
  • 43 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Integration in Southeast University"
661 条 记 录,以下是241-250 订阅
排序:
Instance-dependent partial label learning  21
Instance-dependent partial label learning
收藏 引用
Proceedings of the 35th International Conference on Neural information Processing Systems
作者: Ning Xu Congyu Qiao Xin Geng Min-Ling Zhang School of Computer Science and Engineering Southeast University Nanjing China and MOE Key Laboratory of Computer Network and Information Integration Ministry of Education China
Partial label learning (PLL) is a typical weakly supervised learning problem, where each training example is associated with a set of candidate labels among which only one is true. Most existing PLL approaches assume ...
来源: 评论
A Private Statistic Query Scheme for Encrypted Electronic Medical Record System *
A Private Statistic Query Scheme for Encrypted Electronic Me...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Xianxian Li Xuemei Fu Feng Yu Zhenkui Shi Jie Li Junhao Yang Guangxi Key Lab of Multi-source Information Mining & Security Guilin China Key Laboratory of Computer Network and Information Integration Southeast University Nanjing China
In this paper, we propose a scheme that supports statistic query and authorized access control on an Encrypted Electronic Medical Records Databases(EMDB). Different from other schemes, it is based on Differential-Priv... 详细信息
来源: 评论
Cone-Beam Computed Tomography Limited-Angle Image Reconstruction Using Planning CT-Guided Deep Diffusion Model
收藏 引用
IEEE Transactions on Instrumentation and Measurement 2025年
作者: Wu, Zhan Yang, Yang Hu, Dianlin Lyu, Tianling Li, Yinsheng Tang, Hao Shu, Huazhong Xi, Yan Zhang, Yi Chen, Yang Southeast University Laboratory of Image Science and Technology Nanjing210096 China Southeast University Ministry of Education Key Laboratory of Computer Network and Information Integration Nanjing210096 China Zhejiang University of Technology Academy for Advanced Interdisciplinary Science and Technology Hangzhou China Chinese Academy of Sciences Key Laboratory of Biomedical Imaging Science and System China Capital Medical University Beijing Jishuitan Hospital China First-Imaging Tech Shanghai China Sichuan University School of Cyber Science and Engineering Chengdu China Laboratory of New Generation Artificial Intelligence Technology and Its Interdisciplinary Applications Southeast University Ministry of Education Jiangsu Provincial Joint International Research Laboratory of Medical Information Processing Laboratory of Image Science and Technology the School of Computer Science and Engineering Nanjing210096 China
For existing image-guided radiation therapy systems (IGRT), the limited angular range of the cone-beam computed tomography (CBCT) scanning improves the compactness of the system and compatibility between CBCT and line... 详细信息
来源: 评论
BEIR:A Blockchain-based Encrypted Image Retrieval Scheme
BEIR:A Blockchain-based Encrypted Image Retrieval Scheme
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Xianxian Li Jie Li Feng Yu Xuemei Fu JunHao Yang Yue Chen Guangxi Key Lab of Multi-source Information Mining & Security Guilin China Key Laboratory of Computer Network and Information Integration Southeast University Nanjing China
Encrypted image retrieval may return incorrect or incomplete results due to threats from malicious cloud servers. Most of the existing solutions focus on the efficiency and accuracy of retrieval, lack of verification ... 详细信息
来源: 评论
PPBFL: A Privacy Protected Blockchain-based Federated Learning Model
arXiv
收藏 引用
arXiv 2024年
作者: Li, Yang Xia, Chunhe Lin, Wanshuang Wang, Tianbo The Key Laboratory of Beijing Network Technology Beihang University Beijing100191 China The Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin541004 China The School of Cyber Science and Technology Beihang University Beijing100191 China The Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai201112 China
With the rapid development of machine learning and a growing concern for data privacy, federated learning has become a focal point of attention. However, attacks on model parameters and a lack of incentive mechanisms ... 详细信息
来源: 评论
No Place to Hide: Dual Deep Interaction Channel network for Fake News Detection based on Data Augmentation
arXiv
收藏 引用
arXiv 2023年
作者: Cao, Biwei Hua, Lulu Cao, Jiuxin Gui, Jie Liu, Bo Kwok, James Tin-Yau The School of Cyber Science and Engineering Southeast University Nanjing211189 China The Key Laboratory of Computer Network and Information of Ministry of Education of China Nanjing211189 China The School of Computer Science and Engineering Southeast University Nanjing211189 China The Department of Computer Science and Engineering The Hong Kong University of Science and Technology 999077 Hong Kong
Online Social network (OSN) has become a hotbed of fake news due to the low cost of information dissemination. Although the existing methods have made many attempts in news content and propagation structure, the detec... 详细信息
来源: 评论
Efficient Registered Attribute Based Access Control with Same Sub-policies in Mobile Cloud Computing
收藏 引用
IEEE Transactions on Mobile Computing 2025年
作者: Weng, Wuwei Li, Jiguo Zhang, Yichen Lu, Yang Shen, Jian Han, Jinguang Fujian Normal University College of Computer and Cyber Security Fuzhou350117 China Fujian Fuzhou350117 China Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou350117 China Nanjing Normal University School of Computer and Electronic Information Nanjing210023 China Zhejiang Sci-Tech University School of Information Science and Engineering Hangzhou310018 China Southeast University School of Cyber Science and Engineering Nanjing210096 China
Ciphertext-policy attribute-based encryption (CP-ABE) has long been considered as a promising access control technology for cloud storage. However, CP-ABE depends on a central trusted authority to generate and distrib... 详细信息
来源: 评论
Mining Latent Classes for Few-shot Segmentation
Mining Latent Classes for Few-shot Segmentation
收藏 引用
International Conference on computer Vision (ICCV)
作者: Lihe Yang Wei Zhuo Lei Qi Yinghuan Shi Yang Gao State Key Laboratory for Novel Software Technology Nanjing University Tencent Key Lab of Computer Network and Information Integration (Ministry of Education) Southeast University
Few-shot segmentation (FSS) aims to segment unseen classes given only a few annotated samples. Existing methods suffer the problem of feature undermining, i.e., potential novel classes are treated as background during... 详细信息
来源: 评论
A Revocable Pairing-Free Certificateless Signature Scheme Based on RSA Accumulator
A Revocable Pairing-Free Certificateless Signature Scheme Ba...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Zhuowei Shen Xiao Kou Taiyao Yang Haoqin Xu Dongbin Wang Shaobo Niu School of Cyber Science and Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Intergration Minster of Education Nanjing China School of Cyberspace Security Beijing University of Post and Telecommunications Beijing China Engineering Research Center of Blockchain and Network Convergence Technology Ministry of Education Beijing China
Certificateless public key cryptography (CL-PKC) has garnered significant attention in recent years due to its ability to address the complex certificate management requirements inherent in public key infrastructure (... 详细信息
来源: 评论
Retrieve, program, repeat: Complex knowledge base question answering via alternate meta-learning  29
Retrieve, program, repeat: Complex knowledge base question a...
收藏 引用
29th International Joint Conference on Artificial Intelligence, IJCAI 2020
作者: Hua, Yuncheng Li, Yuan-Fang Haffari, Gholamreza Qi, Guilin Wu, Wei School of Computer Science and Engineering Southeast University Nanjing China Faculty of Information Technology Monash University Melbourne Australia Southeast University Monash University Joint Research Institute Suzhou China Key Laboratory of Computer Network and Information Integration Southeast University China
A compelling approach to complex question answering is to convert the question to a sequence of actions, which can then be executed on the knowledge base to yield the answer, aka the programmer-interpreter approach. U... 详细信息
来源: 评论