咨询与建议

限定检索结果

文献类型

  • 377 篇 会议
  • 290 篇 期刊文献

馆藏范围

  • 667 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 444 篇 工学
    • 350 篇 计算机科学与技术...
    • 288 篇 软件工程
    • 127 篇 信息与通信工程
    • 44 篇 控制科学与工程
    • 38 篇 生物工程
    • 34 篇 电气工程
    • 29 篇 机械工程
    • 28 篇 电子科学与技术(可...
    • 24 篇 生物医学工程(可授...
    • 19 篇 仪器科学与技术
    • 18 篇 光学工程
    • 16 篇 网络空间安全
    • 14 篇 动力工程及工程热...
    • 11 篇 交通运输工程
    • 8 篇 化学工程与技术
    • 8 篇 安全科学与工程
  • 183 篇 理学
    • 124 篇 数学
    • 39 篇 生物学
    • 36 篇 统计学(可授理学、...
    • 25 篇 物理学
    • 18 篇 系统科学
    • 10 篇 化学
  • 148 篇 管理学
    • 79 篇 管理科学与工程(可...
    • 72 篇 图书情报与档案管...
    • 31 篇 工商管理
  • 19 篇 医学
    • 17 篇 临床医学
    • 12 篇 基础医学(可授医学...
    • 9 篇 药学(可授医学、理...
  • 16 篇 法学
    • 15 篇 社会学
  • 10 篇 经济学
    • 10 篇 应用经济学
  • 6 篇 农学
  • 3 篇 文学
  • 3 篇 艺术学
  • 2 篇 教育学
  • 2 篇 军事学

主题

  • 30 篇 semantics
  • 19 篇 routing
  • 19 篇 training
  • 16 篇 feature extracti...
  • 16 篇 machine learning
  • 16 篇 protocols
  • 16 篇 clustering algor...
  • 14 篇 wireless sensor ...
  • 12 篇 computational mo...
  • 12 篇 privacy
  • 11 篇 deep learning
  • 11 篇 optimization
  • 10 篇 network topology
  • 10 篇 educational inst...
  • 10 篇 contrastive lear...
  • 10 篇 estimation
  • 9 篇 computer science
  • 9 篇 peer to peer com...
  • 9 篇 laboratories
  • 9 篇 quality of servi...

机构

  • 167 篇 school of comput...
  • 81 篇 key laboratory o...
  • 60 篇 key laboratory o...
  • 46 篇 key laboratory o...
  • 42 篇 school of cyber ...
  • 40 篇 school of comput...
  • 36 篇 key laboratory o...
  • 19 篇 key laboratory o...
  • 19 篇 purple mountain ...
  • 15 篇 ministry of educ...
  • 13 篇 the school of co...
  • 12 篇 college of softw...
  • 11 篇 school of cyber ...
  • 11 篇 school of comput...
  • 10 篇 national mobile ...
  • 10 篇 department of co...
  • 9 篇 guangxi collabor...
  • 9 篇 national key lab...
  • 9 篇 shanghai key lab...
  • 8 篇 the key laborato...

作者

  • 36 篇 zhou deyu
  • 28 篇 min-ling zhang
  • 28 篇 zhang min-ling
  • 21 篇 guang cheng
  • 20 篇 wang yun
  • 19 篇 geng xin
  • 16 篇 xiaoping li
  • 16 篇 he yulan
  • 16 篇 sanfeng zhang
  • 13 篇 cheng guang
  • 13 篇 shu huazhong
  • 12 篇 li xiaoping
  • 12 篇 qi guilin
  • 12 篇 kong youyong
  • 11 篇 jia yuheng
  • 11 篇 yang peng
  • 11 篇 tao jun
  • 10 篇 wei tong
  • 10 篇 yang guanyu
  • 9 篇 xiaoyan hu

语言

  • 550 篇 英文
  • 76 篇 其他
  • 43 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Integration in Southeast University"
667 条 记 录,以下是301-310 订阅
排序:
FBChain: A Blockchain-based Federated Learning Model with Efficiency and Secure Communication
arXiv
收藏 引用
arXiv 2023年
作者: Li, Yang Xia, Chunhe Wang, Tianbo School of Computer Science and Engineering Beihang University Beijing China Key Laboratory of Beijing Network Technology Beihang University Beijing China Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin China School of Cyber Science and Technology Beihang University Beijing China
Privacy and security in the parameter transmission process of federated learning are currently among the most prominent concerns. However, there are two thorny problems caused by unprotected communication methods: &qu... 详细信息
来源: 评论
LIFT+: Lightweight Fine-Tuning for Long-Tail Learning
arXiv
收藏 引用
arXiv 2025年
作者: Shi, Jiang-Xin Wei, Tong Li, Yu-Feng National Key Laboratory for Novel Software Technology Nanjing University Nanjing210023 China School of Artificial Intelligence Nanjing University Nanjing210023 China School of Computer Science and Engineering Southeast University Nanjing210096 China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education China
The fine-tuning paradigm has emerged as a prominent approach for addressing long-tail learning tasks in the era of foundation models. However, the impact of fine-tuning strategies on long-tail learning performance rem...
来源: 评论
Tigc-Net: Transformer-Improved Graph Convolution network for Spatio-Temporal Prediction
SSRN
收藏 引用
SSRN 2022年
作者: Chen, Kai Yang, Chunfeng Zhou, Zhengyuan Liu, Yao Ji, Tianjiao Sun, Weiya Chen, Yang School of Cyber Science and Engineering Southeast University Nanjing210096 China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Nanjing210096 China The College of Software Engineering Southeast University Nanjing210096 China Laboratory of Image Science and Technology The School of Computer Science and Engineering Southeast University Nanjing210096 China Jiangsu Key Laboratory of Molecular and Functional Imaging Department of Radiology Zhongda Hospital Southeast University Nanjing210009 China Jiangsu Provincial Joint International Research Laboratory of Medical Information Processing School of Computer Science and Engineering Southeast University Nanjing210096 China NHC Key Laboratory of Medical Virology and Viral Diseases National Institute for Viral Disease Control and Prevention Chinese Center for Disease Control and Prevention Beijing China Beijing Institute of Tracking and Communication Technology Beijing100094 China
Modeling spatio-temporal sequences is an important topic yet challenging for existing neural networks. Most of the current spatio-temporal sequence prediction methods usually capture features separately in temporal an... 详细信息
来源: 评论
Variational Gaussian Topic Model with Invertible Neural Projections
arXiv
收藏 引用
arXiv 2021年
作者: Wang, Rui Zhou, Deyu Xiong, Yuxuan Huang, Haiping School of Computer Science Nanjing University of Posts and Telecommunications China Key Laboratory of Computer Network and Information Integration School of Computer Science and Engineering Ministry of Education Southeast University China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing China
Neural topic models have triggered a surge of interest in extracting topics from text automatically since they avoid the sophisticated derivations in conventional topic models. However, scarce neural topic models inco... 详细信息
来源: 评论
Detecting Cryptojacking Traffic Based on network Behavior Features
Detecting Cryptojacking Traffic Based on Network Behavior Fe...
收藏 引用
2021 IEEE Global Communications Conference (GLOBECOM)
作者: Xiaoyan Hu Zhuozhuo Shu Xiaoyi Song Guang Cheng Jian Gong School of Cyber Science & Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education China Research Base of International Cyberspace Governance (Southeast University) Nanjing China Purple Mountain Laboratories for Network and Communication Security Nanjing China
Bitcoin and other digital cryptocurrencies have de-veloped rapidly in recent years. To reduce hardware and power costs, many criminals use the botnet to infect other hosts to mine cryptocurrency for themselves, which ... 详细信息
来源: 评论
Finding the most reliable maximum flow in transport network  2nd
Finding the most reliable maximum flow in transport network
收藏 引用
2nd International Cognitive Cities Conference, IC3 2019
作者: Wang, Jie Cai, Wei Zhou, Sihai Liu, Yundi Liao, Weicheng Zhang, Baili School of Computer Science and Engineering Southeast University Nanjing211189 China Key Laboratory of Computer Network and Information Integration of Ministry of Education Nanjing China Research Center for Judicial Big Data Supreme Count of China Nanjing211189 China
This paper intends to solve the most reliable maximum flow problem (MRMF) on transport network. A subgraph path division algorithm (SPDA) is proposed to get the most reliable maximum flow distribution, which avoid the... 详细信息
来源: 评论
BRFL: A Blockchain-based Byzantine-Robust Federated Learning Model
arXiv
收藏 引用
arXiv 2023年
作者: Li, Yang Xia, Chunhe Li, Chang Wang, Tianbo The Key Laboratory of Beijing Network Technology Beihang University Beijing100191 China The Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin541004 China The School of Computer Science and Technology Zhengzhou University of Light Industry Zhengzhou450000 China The School of Cyber Science and Technology Beihang University Beijing100191 China The Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai201112 China
With the increasing importance of machine learning, the privacy and security of training data have become critical. Federated learning, which stores data in distributed nodes and shares only model parameters, has gain... 详细信息
来源: 评论
A Dilated Transformer network for Time Series Anomaly Detection
A Dilated Transformer Network for Time Series Anomaly Detect...
收藏 引用
International Conference on Tools for Artificial Intelligence (ICTAI)
作者: Bo Wu Zhenjie Yao Yanhui Tu Yixin Chen Key Laboratory of Computer Network and Information Integration (Southeast University) Ministry of Education Purple Mountain Laboratories Nanjing China Institute of Microelectronics Chinese Academy of Sciences Purple Mountain Laboratories Beijing China Shandong Future Network Research Institute Purple Mountain Laboratories Beijing China Washington University in St.Louis Purple Mountain Laboratories Washington USA
Unsupervised anomaly detection for time series has been an active research area due to its enormous potential for wireless network management. Existing works have made extraordinary progress in time series representat... 详细信息
来源: 评论
Learning from noisy labels via dynamic loss thresholding
arXiv
收藏 引用
arXiv 2021年
作者: Yang, Hao Jin, Youzhi Li, Ziyin Wang, Deng-Bao Miao, Lei Geng, Xin Zhang, Min-Ling School of Computer Science and Engineering Southeast University Nanjing210096 China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education China AI Technology Application Department Huawei Technologies Collaborative Innovation Center of Wireless Communications Technology China
Numerous researches have proved that deep neural networks (DNNs) can fit everything in the end even given data with noisy labels, and result in poor generalization performance. However, recent studies suggest that DNN... 详细信息
来源: 评论
Joint Beamforming Design for Integrated Sensing and Communication Systems with Hybrid-Colluding Eavesdroppers
arXiv
收藏 引用
arXiv 2025年
作者: Liu, Meiding Zhou, Zhengchun Shi, Qiao Li, Guyue Liu, Zilong Fan, Pingzhi Lee, Inkyu School of Information Science and Technology Southwest Jiaotong University Chengdu611756 China Key Laboratory of Analytical Mathematics and Applications [Fujian Normal University Ministry of Education China Purple Mountain Laboratories for Network and Communication Security Nanjing210096 China School of Cyber Science and Engineering Southeast University Nanjing210096 China School of Computer Science and Electronics Engineering University of Essex ColchesterCO4 3SQ United Kingdom Key Laboratory of Information Coding and Transmission Southwest Jiaotong University Chengdu611756 China School of Electrical Engineering Korea University Seoul02841 Korea Republic of
In this paper, we consider the physical layer security (PLS) problem for integrated sensing and communication (ISAC) systems in the presence of hybrid-colluding eavesdroppers, where an active eavesdropper (AE) and a p... 详细信息
来源: 评论