咨询与建议

限定检索结果

文献类型

  • 377 篇 会议
  • 290 篇 期刊文献

馆藏范围

  • 667 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 444 篇 工学
    • 350 篇 计算机科学与技术...
    • 288 篇 软件工程
    • 127 篇 信息与通信工程
    • 44 篇 控制科学与工程
    • 38 篇 生物工程
    • 34 篇 电气工程
    • 29 篇 机械工程
    • 28 篇 电子科学与技术(可...
    • 24 篇 生物医学工程(可授...
    • 19 篇 仪器科学与技术
    • 18 篇 光学工程
    • 16 篇 网络空间安全
    • 14 篇 动力工程及工程热...
    • 11 篇 交通运输工程
    • 8 篇 化学工程与技术
    • 8 篇 安全科学与工程
  • 183 篇 理学
    • 124 篇 数学
    • 39 篇 生物学
    • 36 篇 统计学(可授理学、...
    • 25 篇 物理学
    • 18 篇 系统科学
    • 10 篇 化学
  • 148 篇 管理学
    • 79 篇 管理科学与工程(可...
    • 72 篇 图书情报与档案管...
    • 31 篇 工商管理
  • 19 篇 医学
    • 17 篇 临床医学
    • 12 篇 基础医学(可授医学...
    • 9 篇 药学(可授医学、理...
  • 16 篇 法学
    • 15 篇 社会学
  • 10 篇 经济学
    • 10 篇 应用经济学
  • 6 篇 农学
  • 3 篇 文学
  • 3 篇 艺术学
  • 2 篇 教育学
  • 2 篇 军事学

主题

  • 30 篇 semantics
  • 19 篇 routing
  • 19 篇 training
  • 16 篇 feature extracti...
  • 16 篇 machine learning
  • 16 篇 protocols
  • 16 篇 clustering algor...
  • 14 篇 wireless sensor ...
  • 12 篇 computational mo...
  • 12 篇 privacy
  • 11 篇 deep learning
  • 11 篇 optimization
  • 10 篇 network topology
  • 10 篇 educational inst...
  • 10 篇 contrastive lear...
  • 10 篇 estimation
  • 9 篇 computer science
  • 9 篇 peer to peer com...
  • 9 篇 laboratories
  • 9 篇 quality of servi...

机构

  • 167 篇 school of comput...
  • 81 篇 key laboratory o...
  • 60 篇 key laboratory o...
  • 46 篇 key laboratory o...
  • 42 篇 school of cyber ...
  • 40 篇 school of comput...
  • 36 篇 key laboratory o...
  • 19 篇 key laboratory o...
  • 19 篇 purple mountain ...
  • 15 篇 ministry of educ...
  • 13 篇 the school of co...
  • 12 篇 college of softw...
  • 11 篇 school of cyber ...
  • 11 篇 school of comput...
  • 10 篇 national mobile ...
  • 10 篇 department of co...
  • 9 篇 guangxi collabor...
  • 9 篇 national key lab...
  • 9 篇 shanghai key lab...
  • 8 篇 the key laborato...

作者

  • 36 篇 zhou deyu
  • 28 篇 min-ling zhang
  • 28 篇 zhang min-ling
  • 21 篇 guang cheng
  • 20 篇 wang yun
  • 19 篇 geng xin
  • 16 篇 xiaoping li
  • 16 篇 he yulan
  • 16 篇 sanfeng zhang
  • 13 篇 cheng guang
  • 13 篇 shu huazhong
  • 12 篇 li xiaoping
  • 12 篇 qi guilin
  • 12 篇 kong youyong
  • 11 篇 jia yuheng
  • 11 篇 yang peng
  • 11 篇 tao jun
  • 10 篇 wei tong
  • 10 篇 yang guanyu
  • 9 篇 xiaoyan hu

语言

  • 550 篇 英文
  • 76 篇 其他
  • 43 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Integration in Southeast University"
667 条 记 录,以下是271-280 订阅
排序:
FLSSM: A Federated Learning Storage Security Model with Homomorphic Encryption
arXiv
收藏 引用
arXiv 2025年
作者: Li, Yang Xia, Chunhe Li, Chang Li, Xiaojian Wang, Tianbo School of Computer Science and Engineering Beihang University Beijing100191 China Key Laboratory of Beijing Network Technology Beihang University Beijing100191 China Guangxi Collaborative Innovation Center Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin541004 China School of Computer Science and Technology Zhengzhou University of Light Industry Zhengzhou450000 China College of Computer Science and Information Technology Guangxi Normal University Guilin541004 China School of Cyber Science and Technology Beihang University Beijing100191 China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai201112 China
Federated learning based on homomorphic encryption has received widespread attention due to its high security and enhanced protection of user data privacy. However, the characteristics of encrypted computation lead to... 详细信息
来源: 评论
Image-Text Retrieval with Intra-Modal Soft Labels
SSRN
收藏 引用
SSRN 2022年
作者: Zhang, Yu Liu, Haoliang Xiong, Wei Mi, Siya Bian, Yali School of Computer Science and Engineering The Key Lab of Computer Network and Information Integration Ministry of Education Southeast University Nanjing211189 China School of Cyber Science and Engineering Southeast University Nanjing211189 China Purple Mountain Laboratories Nanjing China Intel Labs United States
Image-text retrieval attempts to find relevant images from a huge corpus of images given a textual description, and vice versa. Existing works usually denote the negative/positive image-text pair with a binary label. ... 详细信息
来源: 评论
A Semi-Supervised Deep network Embedding Approach Based on the Neighborhood Structure
收藏 引用
Big Data Mining and Analytics 2019年 第3期2卷 205-216页
作者: Wenmao Wu Zhizhou Yu Jieyue He School of Computer Science and Engineering Southeast UniversityNanjing 211100China MOE Key Laboratory of Computer Network and Information Integration Southeast UniversityNanjing 211100China
network embedding is a very important task to represent the high-dimensional network in a lowdimensional vector space,which aims to capture and preserve the network *** existing network embedding methods are based on ... 详细信息
来源: 评论
A parameter-independent algorithm of finding maximum clique with Seidel continuous-time quantum walks
收藏 引用
iScience 2024年 第2期27卷 108953页
作者: Li, Xi Chen, Xiao Hu, Shouwei Xu, Juan Liu, Zhihao School of Computer Science and Engineering Southeast University No.2 Sipailou District Nanjing 210096 Jiangsu China Key Laboratory of Computer Network and Information Integration (Southeast University) Ministry of Education No.2 Southeast University Road Jiangning District Nanjing 211189 Jiangsu China College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics No.29 Junjun Dadao Jiangning District Nanjing 210016 Jiangsu China Collaborative Innovation Center of Novel Software Technology and Industrialization No.29 Junjun Dadao Jiangning District Nanjing 210023 Jiangsu China
The maximum clique (MC) problem holds significance in network analysis. Quantum-based algorithms have recently emerged as promising approaches for this problem. However, these algorithms heavily depend on parameters o... 详细信息
来源: 评论
Computing Power in the Sky: Digital Twin-assisted Collaborative Computing with Multi-UAV networks
收藏 引用
IEEE Transactions on Vehicular Technology 2025年
作者: Wang, Chao Han, Yu Zhang, Long Jia, Ziye Zhang, Hongliang Hong, Choong Seon Han, Zhu Hebei University of Engineering School of Information and Electrical Engineering Handan056038 China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan250014 China Nanjing University of Aeronautics and Astronautics College of Electronic and Information Engineering Nanjing211106 China Southeast University National Mobile Communications Research Laboratory Jiangsu Nanjing211111 China Peking University State Key Laboratory of Advanced Optical Communication Systems and Networks School of Electronics Beijing100871 China Kyung Hee University Department of Computer Science and Engineering Gyeonggi-do Yongin-si17104 Korea Republic of University of Houston Department of Electrical and Computer Engineering HoustonTX77004 United States Kyung Hee University Department of Computer Science and Engineering Seoul446-701 Korea Republic of
The collaboration of computing powers (CPs) among unmanned aerial vehicles (UAVs)-mounted edge servers is essential to handle data-intensive tasks of user equipments (UEs). This paper presents a multi-UAV computing po... 详细信息
来源: 评论
Sequential-Scanning Dual-Energy CT Imaging Using High Temporal Resolution Image Reconstruction and Error-Compensated Material Basis Image Generation
arXiv
收藏 引用
arXiv 2024年
作者: Li, Qiaoxin Chen, Ruifeng Wang, Peng Quan, Guotao Du, Yanfeng Liang, Dong Li, Yinsheng Research Center for Medical Artificial Intelligence Shenzhen Institutes of Advanced Technology Chinese Academy of Sciences Shenzhen China University of Chinese Academy of Sciences Beijing China Laboratory of Image Science and Technology Key Laboratory of Computer Network and Information Integration Southeast University Nanjing China CT RPA Department United Imaging Healthcare Company Ltd. Shanghai China Research Center for Medical Artificial Intelligence Key Laboratory of Biomedical Imaging Science and System Shenzhen Institutes of Advanced Technology Chinese Academy of Sciences Shenzhen China
Dual-energy computed tomography (DECT) has been widely used to obtain quantitative elemental composition of imaged subjects for personalized and precise medical diagnosis. Compared with DECT leveraging advanced X-ray ... 详细信息
来源: 评论
BFLN: A Blockchain-based Federated Learning Model for Non-IID Data
arXiv
收藏 引用
arXiv 2024年
作者: Li, Yang Xia, Chunhe Huang, Dongchi Li, Xiaojian Wang, Tianbo School of Computer Science and Engineering Beihang University Beijing100191 China Key Laboratory of Beijing Network Technology Beihang University Beijing100191 China Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin541004 China College of Computer Science and Information Technology Guangxi Normal University Guilin541001 China School of Cyber Science and Technology Beihang University Beijing100191 China
As the application of federated learning becomes increasingly widespread, the issue of imbalanced training data distribution has emerged as a significant challenge. Federated learning utilizes local data stored on dif... 详细信息
来源: 评论
Joint Beamforming Design for Integrated Sensing and Communication Systems with Hybrid-Colluding Eavesdroppers
收藏 引用
IEEE Transactions on Communications 2025年
作者: Liu, Meiding Zhou, Zhengchun Shi, Qiao Li, Guyue Liu, Zilong Fan, Pingzhi Lee, Inkyu Southwest Jiaotong University School of Information Science and Technology Chengdu611756 China Key Laboratory of Analytical Mathematics and Applications China Southeast University School of Cyber Science and Engineering Nanjing210096 China Purple Mountain Laboratories for Network and Communication Security Nanjing210096 China University of Essex School of Computer Science and Electronics Engineering ColchesterCO4 3SQ United Kingdom Southwest Jiaotong University Key Laboratory of Information Coding and Transmission Chengdu611756 China Korea University School of Electrical Engineering Seoul02841 Korea Republic of
In this paper, we consider the physical layer security (PLS) problem for integrated sensing and communication (ISAC) systems in the presence of hybrid-colluding eavesdroppers, where an active eavesdropper (AE) and a p... 详细信息
来源: 评论
FFCNet: Fourier Transform-Based Frequency Learning and Complex Convolutional network for Colon Disease Classification
arXiv
收藏 引用
arXiv 2022年
作者: Wang, Kai-Ni He, Yuting Zhuang, Shuaishuai Miao, Juzheng He, Xiaopu Zhou, Ping Yang, Guanyu Zhou, Guang-Quan Li, Shuo School of Biological Science and Medical Engineering Southeast University Nanjing China LIST Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Nanjing China The first affiliated hospital of Nanjing medical university Nanjing China Strasbourg France Department of Medical Biophysics University of Western Ontario LondonON Canada
Reliable automatic classification of colonoscopy images is of great significance in assessing the stage of colonic lesions and formulating appropriate treatment plans. However, it is challenging due to uneven brightne... 详细信息
来源: 评论
Differential Privacy Based on Data Provenance Publishing Method
收藏 引用
Jisuanji Xuebao/Chinese Journal of computers 2020年 第3期43卷 573-586页
作者: Ni, Wei-Wei Shen, Tao Yan, Dong Department of Computer Science and Engineering Southeast University Nanjing211189 China Key Laboratory of Computer Network and Information Integration in Southeast University Ministry of Education Nanjing211189 China
Data provenance describes the mechanism and process of data generation and evolution, which records information about the node module executions used to produce concrete data items, as well as those intermediate data ... 详细信息
来源: 评论