咨询与建议

限定检索结果

文献类型

  • 373 篇 会议
  • 290 篇 期刊文献

馆藏范围

  • 663 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 443 篇 工学
    • 349 篇 计算机科学与技术...
    • 288 篇 软件工程
    • 128 篇 信息与通信工程
    • 45 篇 控制科学与工程
    • 38 篇 生物工程
    • 34 篇 电气工程
    • 29 篇 机械工程
    • 28 篇 电子科学与技术(可...
    • 24 篇 生物医学工程(可授...
    • 19 篇 仪器科学与技术
    • 18 篇 光学工程
    • 17 篇 网络空间安全
    • 14 篇 动力工程及工程热...
    • 12 篇 交通运输工程
    • 9 篇 安全科学与工程
    • 8 篇 化学工程与技术
  • 185 篇 理学
    • 126 篇 数学
    • 39 篇 生物学
    • 37 篇 统计学(可授理学、...
    • 25 篇 物理学
    • 18 篇 系统科学
    • 10 篇 化学
  • 149 篇 管理学
    • 80 篇 管理科学与工程(可...
    • 73 篇 图书情报与档案管...
    • 31 篇 工商管理
  • 19 篇 医学
    • 17 篇 临床医学
    • 12 篇 基础医学(可授医学...
    • 9 篇 药学(可授医学、理...
  • 16 篇 法学
    • 15 篇 社会学
  • 10 篇 经济学
    • 10 篇 应用经济学
  • 6 篇 农学
  • 3 篇 文学
  • 3 篇 艺术学
  • 2 篇 教育学
  • 2 篇 军事学

主题

  • 30 篇 semantics
  • 19 篇 routing
  • 19 篇 training
  • 16 篇 feature extracti...
  • 16 篇 machine learning
  • 16 篇 protocols
  • 16 篇 clustering algor...
  • 14 篇 wireless sensor ...
  • 12 篇 computational mo...
  • 12 篇 privacy
  • 11 篇 deep learning
  • 11 篇 optimization
  • 10 篇 network topology
  • 10 篇 educational inst...
  • 10 篇 contrastive lear...
  • 10 篇 estimation
  • 9 篇 computer science
  • 9 篇 peer to peer com...
  • 9 篇 laboratories
  • 9 篇 quality of servi...

机构

  • 167 篇 school of comput...
  • 81 篇 key laboratory o...
  • 62 篇 key laboratory o...
  • 46 篇 key laboratory o...
  • 42 篇 school of cyber ...
  • 40 篇 school of comput...
  • 36 篇 key laboratory o...
  • 19 篇 key laboratory o...
  • 19 篇 purple mountain ...
  • 15 篇 ministry of educ...
  • 13 篇 the school of co...
  • 12 篇 college of softw...
  • 11 篇 school of cyber ...
  • 10 篇 national mobile ...
  • 10 篇 department of co...
  • 9 篇 guangxi collabor...
  • 9 篇 national key lab...
  • 9 篇 shanghai key lab...
  • 8 篇 the key laborato...
  • 8 篇 southeast univer...

作者

  • 36 篇 zhou deyu
  • 28 篇 zhang min-ling
  • 23 篇 min-ling zhang
  • 21 篇 guang cheng
  • 20 篇 wang yun
  • 19 篇 geng xin
  • 16 篇 xiaoping li
  • 16 篇 he yulan
  • 16 篇 sanfeng zhang
  • 13 篇 cheng guang
  • 13 篇 shu huazhong
  • 12 篇 li xiaoping
  • 12 篇 qi guilin
  • 12 篇 kong youyong
  • 11 篇 jia yuheng
  • 11 篇 yang peng
  • 11 篇 tao jun
  • 10 篇 wei tong
  • 10 篇 yang guanyu
  • 9 篇 xiaoyan hu

语言

  • 545 篇 英文
  • 77 篇 其他
  • 43 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Integration in Southeast University"
663 条 记 录,以下是31-40 订阅
排序:
Identifying Abnormal Hosts in Data Streams Using Reversible Sketch
Engineering Reports
收藏 引用
Engineering Reports 2025年 第5期7卷
作者: Aiping Zhou Jin Qian School of Information Engineering Taizhou University Taizhou China Key Laboratory of Computer Network and Information Integration (Southeast University) Ministry of Education Nanjing China
Significant cardinality change is an important sign of the beginning of network attacks. Hosts associated with significant cardinality changes usually exhibit abnormal behavior. Identifying abnormal hosts is meaningfu... 详细信息
来源: 评论
Cone-Beam Computed Tomography Limited-Angle Image Reconstruction Using Planning CT-Guided Deep Diffusion Model
收藏 引用
IEEE Transactions on Instrumentation and Measurement 2025年
作者: Wu, Zhan Yang, Yang Hu, Dianlin Lyu, Tianling Li, Yinsheng Tang, Hao Shu, Huazhong Xi, Yan Zhang, Yi Chen, Yang Southeast University Laboratory of Image Science and Technology Nanjing 210096 China Southeast University Ministry of Education Key Laboratory of Computer Network and Information Integration Nanjing 210096 China Zhejiang University of Technology Academy for Advanced Interdisciplinary Science and Technology Hangzhou China Chinese Academy of Sciences Key Laboratory of Biomedical Imaging Science and System China Capital Medical University Beijing Jishuitan Hospital China First-Imaging Tech Shanghai China Sichuan University School of Cyber Science and Engineering Chengdu China Laboratory of New Generation Artificial Intelligence Technology and Its Interdisciplinary Applications Southeast University Ministry of Education Jiangsu Provincial Joint International Research Laboratory of Medical Information Processing Laboratory of Image Science and Technology the School of Computer Science and Engineering Nanjing 210096 China
For existing image-guided radiation therapy systems (IGRT), the limited angular range of the cone-beam computed tomography (CBCT) scanning improves the compactness of the system and compatibility between CBCT and line... 详细信息
来源: 评论
Parallel Sketch Based Super Node Detection with Traceability
收藏 引用
Chinese Journal of Electronics 2018年 第6期27卷 1133-1140页
作者: ZHOU Aiping LIU Lijun ZHU Huisheng ZHU Chen'gang CHEN Lin School of Computer Science and Technology Taizhou UniversityTaizhou 225300 China Key Laboratory of Computer Network and Information Integration (Southeast University) Ministry of Education
Traffic measurement and monitoring is crucial for network applications, such as network security, network management and so on. One central problem is to detect super nodes, which have significant change of connection... 详细信息
来源: 评论
Efficient Registered Attribute Based Access Control with Same Sub-policies in Mobile Cloud Computing
收藏 引用
IEEE Transactions on Mobile Computing 2025年
作者: Weng, Wuwei Li, Jiguo Zhang, Yichen Lu, Yang Shen, Jian Han, Jinguang Fujian Normal University College of Computer and Cyber Security Fuzhou350117 China Fujian Fuzhou350117 China Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou350117 China Nanjing Normal University School of Computer and Electronic Information Nanjing210023 China Zhejiang Sci-Tech University School of Information Science and Engineering Hangzhou310018 China Southeast University School of Cyber Science and Engineering Nanjing210096 China
Ciphertext-policy attribute-based encryption (CP-ABE) has long been considered as a promising access control technology for cloud storage. However, CP-ABE depends on a central trusted authority to generate and distrib... 详细信息
来源: 评论
Universal and General Quantum Simultaneous Secret Distribution with Dense Coding by Using One-Dimensional High-Level Cluster States
收藏 引用
Journal of computer Science & Technology 2021年 第1期36卷 221-230页
作者: Zhi-Hao Liu Han-Wu Chen School of Computer Science and Engineering Southeast UniversityNanjing 211189China Key Laboratory of Computer Network and Information Integration(Southeast University) Ministry of Education Nanjing 211189China
A universal and general quantum simultaneous secret distribution(QSSD)protocol is put forward based on the properties of the one-dimensional high-level cluster states,in which one sender dispatches different high-leve... 详细信息
来源: 评论
Community-Preserving Social Graph Release with Node Differential Privacy
收藏 引用
Journal of computer Science & Technology 2023年 第6期38卷 1369-1386页
作者: 张森 倪巍伟 付楠 School of Computer Science and Engineering Southeast UniversityNanjing 211189China Key Laboratory of Computer Network and Information Integration(Southeast University) Ministry of EducationNanjing 211189China
The goal of privacy-preserving social graph release is to protect individual privacy while preserving data *** structure,which is an important global pattern of nodes,is a crucial data utility as it is fundamental to ... 详细信息
来源: 评论
CGNet: Classification-Guided Multi-Task Interactive network for Hyperspectral and Multispectral Image Fusion
CGNet: Classification-Guided Multi-Task Interactive Network ...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Guohua Lv Yanlong Xu Yongbiao Gao Guixin Zhao Guotao Wang Xiangcheng Sun Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science China Shandong Key Laboratory of Ubiquitous Intelligent Computing China Key Laboratory of New Generation Artificial Intelligence Technology and Its Interdisciplinary Application (Southeast University) Ministry of Education China Beihang University Beijing China
The goal of fusing hyperspectral images (HSI) and multispectral images (MSI) is to generate high-resolution hyperspectral images for downstream tasks. However, most existing methods overlook the specific requirements ... 详细信息
来源: 评论
A Novel Deep Hybrid Recommender System Based on Auto-encoder with Neural Collaborative Filtering
收藏 引用
Big Data Mining and Analytics 2018年 第3期1卷 211-221页
作者: Yu Liu Shuai Wang M.Shahrukh Khan Jieyu He School of Computer Science and Engineering and also with MOE Key Laboratory of Computer Network and Information Integration Southeast University
Due to the widespread availability of implicit feedback(e.g., clicks and purchases), some researchers have endeavored to design recommender systems based on implicit feedback. However, unlike explicit feedback,implici... 详细信息
来源: 评论
Residual diverse ensemble for long-tailed multi-label text classification
收藏 引用
Science China(information Sciences) 2024年 第11期67卷 92-105页
作者: Jiangxin SHI Tong WEI Yufeng LI National Key Laboratory for Novel Software Technology Nanjing University School of Artificial Intelligence Nanjing University School of Computer Science and Engineering Southeast University Key Laboratory of Computer Network and Information Integration Southeast UniversityMinistry of Education
Long-tailed multi-label text classification aims to identify a subset of relevant labels from a large candidate label set, where the training datasets usually follow long-tailed label distributions. Many of the previo... 详细信息
来源: 评论
YOLO-CORE: Contour Regression for Efficient Instance Segmentation
收藏 引用
Machine Intelligence Research 2023年 第5期20卷 716-728页
作者: Haoliang Liu Wei Xiong Yu Zhang School of Computer Science and Engineering and the Key Laboratory of Computer Network and Information Integration(Ministry of Education) Southeast UniversityNanjing 211189China
Instance segmentation has drawn mounting attention due to its significant ***,high computational costs have been widely acknowledged in this domain,as the instance mask is generally achieved by pixel-level *** this pa... 详细信息
来源: 评论