咨询与建议

限定检索结果

文献类型

  • 385 篇 会议
  • 294 篇 期刊文献

馆藏范围

  • 679 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 455 篇 工学
    • 359 篇 计算机科学与技术...
    • 290 篇 软件工程
    • 127 篇 信息与通信工程
    • 51 篇 控制科学与工程
    • 38 篇 生物工程
    • 35 篇 电气工程
    • 29 篇 机械工程
    • 29 篇 电子科学与技术(可...
    • 24 篇 生物医学工程(可授...
    • 19 篇 仪器科学与技术
    • 18 篇 光学工程
    • 16 篇 网络空间安全
    • 14 篇 动力工程及工程热...
    • 11 篇 交通运输工程
    • 8 篇 化学工程与技术
    • 8 篇 安全科学与工程
  • 185 篇 理学
    • 125 篇 数学
    • 39 篇 生物学
    • 36 篇 统计学(可授理学、...
    • 26 篇 物理学
    • 18 篇 系统科学
    • 10 篇 化学
  • 148 篇 管理学
    • 79 篇 管理科学与工程(可...
    • 72 篇 图书情报与档案管...
    • 31 篇 工商管理
  • 19 篇 医学
    • 17 篇 临床医学
    • 12 篇 基础医学(可授医学...
    • 9 篇 药学(可授医学、理...
  • 16 篇 法学
    • 15 篇 社会学
  • 10 篇 经济学
    • 10 篇 应用经济学
  • 6 篇 农学
  • 3 篇 文学
  • 3 篇 艺术学
  • 2 篇 教育学
  • 2 篇 军事学

主题

  • 30 篇 semantics
  • 19 篇 routing
  • 19 篇 training
  • 16 篇 feature extracti...
  • 16 篇 machine learning
  • 16 篇 protocols
  • 16 篇 clustering algor...
  • 14 篇 wireless sensor ...
  • 12 篇 contrastive lear...
  • 12 篇 computational mo...
  • 12 篇 privacy
  • 11 篇 deep learning
  • 11 篇 optimization
  • 10 篇 network topology
  • 10 篇 educational inst...
  • 10 篇 estimation
  • 9 篇 computer science
  • 9 篇 peer to peer com...
  • 9 篇 laboratories
  • 9 篇 quality of servi...

机构

  • 175 篇 school of comput...
  • 85 篇 key laboratory o...
  • 62 篇 key laboratory o...
  • 46 篇 key laboratory o...
  • 43 篇 school of cyber ...
  • 41 篇 school of comput...
  • 36 篇 key laboratory o...
  • 21 篇 purple mountain ...
  • 19 篇 key laboratory o...
  • 16 篇 ministry of educ...
  • 13 篇 the school of co...
  • 12 篇 college of softw...
  • 11 篇 school of cyber ...
  • 11 篇 school of comput...
  • 10 篇 national mobile ...
  • 10 篇 department of co...
  • 9 篇 southeast univer...
  • 9 篇 guangxi collabor...
  • 9 篇 national key lab...
  • 9 篇 shanghai key lab...

作者

  • 37 篇 zhou deyu
  • 33 篇 zhang min-ling
  • 29 篇 min-ling zhang
  • 21 篇 guang cheng
  • 20 篇 wang yun
  • 19 篇 geng xin
  • 17 篇 he yulan
  • 16 篇 xiaoping li
  • 16 篇 sanfeng zhang
  • 13 篇 cheng guang
  • 13 篇 shu huazhong
  • 12 篇 li xiaoping
  • 12 篇 qi guilin
  • 12 篇 kong youyong
  • 11 篇 jia yuheng
  • 11 篇 yang peng
  • 11 篇 tao jun
  • 10 篇 wei tong
  • 10 篇 yang guanyu
  • 9 篇 liu bo

语言

  • 546 篇 英文
  • 92 篇 其他
  • 44 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Integration in Southeast University"
679 条 记 录,以下是361-370 订阅
排序:
Group whitening: Balancing learning efficiency and representational capacity
arXiv
收藏 引用
arXiv 2020年
作者: Huang, Lei Zhou, Yi Liu, Li Zhu, Fan Shao, Ling SKLSDE Institute of Artificial Intelligence Beihang University Beijing China MOE Key Laboratory of Computer Network and Information Integration Southeast University China Abu Dhabi United Arab Emirates
Batch normalization (BN) is an important technique commonly incorporated into deep learning models to perform standardization within mini-batches. The merits of BN in improving a model's learning efficiency can be... 详细信息
来源: 评论
A Topology-Adaptive Deep Model for Power System Multifault Diagnosis
A Topology-Adaptive Deep Model for Power System Multifault D...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Yangyang Liu Aibo Song Jiahui Jin Mingyu zhai Yingying Xue Feng Li School of Computer Science and Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education China NARI Group Corporation/State Grid Electric Power Research Institute Nanjing China
Quickly identifying faulty sections is tremendously important for power systems, yet challenging due to handling the variations of complex alarm patterns. Existing works have focused on finding fault section clues sol... 详细信息
来源: 评论
No-Reference Defocused Image Quality Assessment Based on Human Visual System
No-Reference Defocused Image Quality Assessment Based on Hum...
收藏 引用
2019 IEEE International Conference on Signal, information and Data Processing, ICSIDP 2019
作者: Dong, Han Shen, Aodong Kong, Youyong Shen, Yu Shu, Huazhong School of Computer Science and Engineering Southeast University Sipailou 2 Nanjing210096 China Key Laboratory of Computer Network and Infomration Display and Visualization Southeast University Nanjing China International Joint Laboratory of Infomration Integration Southeast University Nanjing China
The no-reference image quality assessment is receiving more and more attention. With no need for clear images as a reference during the evaluation process, it has a wide range of application scenarios. By analyzing th... 详细信息
来源: 评论
Automated Authentication of Large-Scale IoT Devices with Hybrid Feature Selection  7th
Automated Authentication of Large-Scale IoT Devices with Hyb...
收藏 引用
7th International Conference on Artificial Intelligence and Security, ICAIS 2021
作者: Chen, Qi Song, Yubo Hu, Aiqun Wang, Junbo Key Laboratory of Computer Network Technology of Jiangsu Province School of Cyber Science and Engineering Southeast University Nanjing211189 China Purple Mountain Laboratories Nanjing211189 China National Mobile Communications Research Laboratory Nanjing211189 China School of Information Science and Engineering Southeast University Nanjing211189 China
Nowadays, large-scale IoT (Internet of Things) devices are connected to the network. However, due to the simplicity, limited memory and poor computing power of most IoT devices, it is difficult to apply complex securi... 详细信息
来源: 评论
Detecting and mitigating a sophisticated interest flooding attack in NDN from the network-wide view  1
Detecting and mitigating a sophisticated interest flooding a...
收藏 引用
1st International Workshop on network Meets Intelligent Computations, NMIC 2019
作者: Cheng, Guang Zhao, Lixia Hu, Xiaoyan Zheng, Shaoqi Wu, Hua Li, Ruidong Fan, Chengyu School of Cyber Science and Engineering Southeast University Nanjing211189 China Key Laboratory of Computer Network and Information Integration Ministry of Education of China Southeast University China Key Laboratory of Computer Network Technology of Jiangsu Province China National Institute of Information and Communications Technology Tokyo184-8795 Japan Computer Science Department Colorado State University Fort Collins United States
Interest Flooding Attack (IFA) is one of the main security threats for the Named Data networking (NDN). Most of its existing countermeasures enable intermediate routers near the attackers to independently detect the a... 详细信息
来源: 评论
Learning Expectation of Label Distribution for Facial Age and Attractiveness Estimation
arXiv
收藏 引用
arXiv 2020年
作者: Gao, Bin-Bin Liu, Xin-Xin Zhou, Hong-Yu Wu, Jianxin Geng, Xin YouTu Lab Tencent Shenzhen518075 China National Key Laboratory for Novel Software Technology Nanjing University Nanjing210023 China MOE Key Laboratory of Computer Network and Information Integration Southeast University Nanjing211189 China
Facial attributes (e.g., age and attractiveness) estimation performance has been greatly improved by using convolutional neural networks. However, existing methods have an inconsistency between the training objectives... 详细信息
来源: 评论
A Control Task Assignment Algorithm based on sub-graph isomorphism
A Control Task Assignment Algorithm based on sub-graph isomo...
收藏 引用
International Conference on Advanced Cloud and Big Data (CBD)
作者: Feng Yu Xixian Li Huimin Zhang Li-e Wang College of computer science Guangxi Normal University Guilin China Key Laboratory of Computer Network and Information Integration Southeast University Nanjing China Guangxi Key Lab of Multi-source Information Mining & Security Guilin China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin China
To enhance the controllability and trustworthiness of the Internet, a new network control architecture has been presented with control task extracted to the intra-domain control node and executed in distributed multi-... 详细信息
来源: 评论
Secure Data Propagation in Edge-Cloud Orchestrated Computing Paradigms: Statistcs and Taxonomy
Secure Data Propagation in Edge-Cloud Orchestrated Computing...
收藏 引用
International Conference on Advanced Cloud and Big Data (CBD)
作者: Feng Yu Xixian Li Huimin Zhang Li-e Wang College of computer science Guangxi Normal University Guilin China Key Laboratory of Computer Network and Information Integration Southeast University Nanjing China Guangxi Key Lab of Multi-source Information Mining &Security Guilin China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin China
Despite the importance of the secure data propagation in the edge-cloud orchestrated computing paradigms, to the best of our knowledge, there is lack of systematic and comprehensive review on this research topic. The ... 详细信息
来源: 评论
A High-Fidelity Virtual Liver Model Incorporating Biological Characteristics
SSRN
收藏 引用
SSRN 2022年
作者: Zhang, Xiaorui Zhang, Wenzheng Sun, Wei Song, Aiguo Xu, Tong Wuxi Research Institute Nanjing University of Information Science & Technology Wuxi214100 China Engineering Research Center of Digital Forensics Ministry of Education Jiangsu Engineering Center of Network Monitoring School of Computer and Software Nanjing University of Information Science & Technology Nanjing210044 China School of Automation Nanjing University of Information Science & Technology Nanjing210044 China State Key Laboratory of Bioelectronics Jiangsu Key Lab of Remote Measurement and Control School of Instrument Science and Engineering Southeast University Nanjing210096 China University of Southern California Los AngelesCA United States
Flexible tissue modeling plays an important role in the field of telemedicine. It is related to whether the soft tissue deformation process can be accurately, real-time and vividly simulated during surgery. Most exist... 详细信息
来源: 评论
Uncertain Ontology Embeddings
Uncertain Ontology Embeddings
收藏 引用
Symposium of Image, Signal Processing, and Artificial Vision (STSIVA)
作者: Khaoula Boutouhami Guilin Qi Qiu Ji Jiatao Zhang Huan Gao School of Computer Science and Engineering Key Laboratory of Computer Network and Information Integration (Southeast University) Ministry of Education Nanjing China School of Modern Posts & Institute of Modern Posts Nanjing University of Posts and Telecommunications Nanjing China
Ontologies are an expressive power used as a crucial element to enrich knowledge graphs by their rich data and ontological concepts that are often necessary for logical inference. Recently, ontology embedding has gain... 详细信息
来源: 评论