咨询与建议

限定检索结果

文献类型

  • 372 篇 会议
  • 289 篇 期刊文献

馆藏范围

  • 661 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 442 篇 工学
    • 348 篇 计算机科学与技术...
    • 288 篇 软件工程
    • 127 篇 信息与通信工程
    • 44 篇 控制科学与工程
    • 38 篇 生物工程
    • 34 篇 电气工程
    • 29 篇 机械工程
    • 28 篇 电子科学与技术(可...
    • 24 篇 生物医学工程(可授...
    • 19 篇 仪器科学与技术
    • 18 篇 光学工程
    • 16 篇 网络空间安全
    • 14 篇 动力工程及工程热...
    • 11 篇 交通运输工程
    • 8 篇 化学工程与技术
    • 8 篇 安全科学与工程
  • 183 篇 理学
    • 124 篇 数学
    • 39 篇 生物学
    • 36 篇 统计学(可授理学、...
    • 25 篇 物理学
    • 18 篇 系统科学
    • 10 篇 化学
  • 148 篇 管理学
    • 79 篇 管理科学与工程(可...
    • 72 篇 图书情报与档案管...
    • 31 篇 工商管理
  • 19 篇 医学
    • 17 篇 临床医学
    • 12 篇 基础医学(可授医学...
    • 9 篇 药学(可授医学、理...
  • 16 篇 法学
    • 15 篇 社会学
  • 10 篇 经济学
    • 10 篇 应用经济学
  • 6 篇 农学
  • 3 篇 文学
  • 3 篇 艺术学
  • 2 篇 教育学
  • 2 篇 军事学

主题

  • 30 篇 semantics
  • 19 篇 routing
  • 19 篇 training
  • 16 篇 feature extracti...
  • 16 篇 machine learning
  • 16 篇 protocols
  • 16 篇 clustering algor...
  • 14 篇 wireless sensor ...
  • 12 篇 computational mo...
  • 12 篇 privacy
  • 11 篇 deep learning
  • 11 篇 optimization
  • 10 篇 network topology
  • 10 篇 educational inst...
  • 10 篇 contrastive lear...
  • 10 篇 estimation
  • 9 篇 computer science
  • 9 篇 peer to peer com...
  • 9 篇 laboratories
  • 9 篇 quality of servi...

机构

  • 167 篇 school of comput...
  • 81 篇 key laboratory o...
  • 60 篇 key laboratory o...
  • 46 篇 key laboratory o...
  • 42 篇 school of cyber ...
  • 40 篇 school of comput...
  • 36 篇 key laboratory o...
  • 19 篇 key laboratory o...
  • 19 篇 purple mountain ...
  • 15 篇 ministry of educ...
  • 13 篇 the school of co...
  • 12 篇 college of softw...
  • 11 篇 school of cyber ...
  • 10 篇 national mobile ...
  • 10 篇 department of co...
  • 9 篇 guangxi collabor...
  • 9 篇 national key lab...
  • 9 篇 shanghai key lab...
  • 8 篇 the key laborato...
  • 8 篇 southeast univer...

作者

  • 36 篇 zhou deyu
  • 28 篇 zhang min-ling
  • 23 篇 min-ling zhang
  • 21 篇 guang cheng
  • 20 篇 wang yun
  • 19 篇 geng xin
  • 16 篇 xiaoping li
  • 16 篇 he yulan
  • 16 篇 sanfeng zhang
  • 13 篇 cheng guang
  • 13 篇 shu huazhong
  • 12 篇 li xiaoping
  • 12 篇 qi guilin
  • 12 篇 kong youyong
  • 11 篇 jia yuheng
  • 11 篇 yang peng
  • 11 篇 tao jun
  • 10 篇 wei tong
  • 10 篇 yang guanyu
  • 9 篇 xiaoyan hu

语言

  • 544 篇 英文
  • 76 篇 其他
  • 43 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Integration in Southeast University"
661 条 记 录,以下是41-50 订阅
排序:
Intelligent Optimization Method for Mobile NOMA network using IMBO  6
Intelligent Optimization Method for Mobile NOMA Network usin...
收藏 引用
6th IEEE International Conference on Electronic information and Communication Technology, ICEICT 2023
作者: Fu, Xingyue Xu, Lingwei Gao, Zhihe Chen, Zhe Li, Yufang Cao, Shubo Qingdao University of Science & Technology Qingdao China Southeast University Ministry of Education Key Laboratory of Computer Network and Information Integration Nanjing211189 China
Non-orthogonal multiple access (NOMA) technology can significantly increase access volume and spectrum efficiency. The introduction of NOMA technology into the mobile communication system can significantly enhance com... 详细信息
来源: 评论
Topgformer: Topological-Based Graph Transformer for Mapping Brain Structural Connectivity to Functional Connectivity  48
Topgformer: Topological-Based Graph Transformer for Mapping ...
收藏 引用
48th IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2023
作者: Guo, Dalu Zhang, Ke Li, Jiaxing Kong, Youyong Southeast University Jiangsu Provincial Joint International Research Laboratory of Medical Information Processing School of Computer Science and Engineering Nanjing China Southeast University Ministry of Education Key Laboratory of Computer Network and Information Integration Nanjing China
Exploring the mapping between structural connectivity (SC) and functional connectivity (FC) is of essential importance to understanding the working mechanism of the human brain. Traditional methods are difficult to re... 详细信息
来源: 评论
Topology Uncertainty Modeling For Imbalanced Node Classification on Graphs  48
Topology Uncertainty Modeling For Imbalanced Node Classifica...
收藏 引用
48th IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2023
作者: Gao, Jiayi Li, Jiaxing Zhang, Ke Kong, Youyong Southeast University Jiangsu Provincial Joint International Research Laboratory of Medical Information Processing School of Computer Science and Engineering Nanjing China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Nanjing China
Most existing graph neural networks work under a class-balanced assumption, while ignoring class-imbalanced scenarios that widely exist in real-world graphs. Although there are many methods in other fields that can al... 详细信息
来源: 评论
Length matters:Scalable fast encrypted internet traffic service classification based on multiple protocol data unit length sequence with composite deep learning
收藏 引用
Digital Communications and networks 2022年 第3期8卷 289-302页
作者: Zihan Chen Guang Cheng Ziheng Xu Shuyi Guo Yuyang Zhou Yuyu Zhao School of Cyber Science and Engineering Southeast UniversityNanjing211189China Key Laboratory of Computer Network and Information Integration Ministry of EducationNanjing211189China Purple Mountain Laboratories Nanjing211111China
As an essential function of encrypted Internet traffic analysis,encrypted traffic service classification can support both coarse-grained network service traffic management and security ***,the traditional plaintext-ba... 详细信息
来源: 评论
Task Offloading and Resource Allocation with Privacy Constraints in End-Edge-Cloud Environment  17th
Task Offloading and Resource Allocation with Privacy Constra...
收藏 引用
17th CCF Conference on computer Supported Cooperative Work and Social Computing, ChineseCSCW 2022
作者: Zhu, Xia Sun, Wei Li, Xiaoping School of Computer Science and Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University Nanjing China School of Cyber Science and Engineering Southeast University Nanjing China
The end-edge-cloud architecture brings an efficient solution to the big data processing problem caused by massive IoT devices. The characteristics of this architecture, such as massive devices, heterogeneous resources... 详细信息
来源: 评论
Contract-Based Incentive Mechanisms for UAV networks in Covert Communications
收藏 引用
IEEE Transactions on Vehicular Technology 2025年 第5期74卷 7378-7391页
作者: Tian, Wen Fan, Hao Liu, Guangjie Du, Miao Liu, Yinqiu Niyato, Dusit Han, Zhu Nanjing University of Information Science and Technology School of Electronic and Information Engineering Nanjing University of Information Science and Technology Key Laboratory of Intelligent Support Technology In Complex Environment Ministry of Education Nanjing210044 China Southeat University School of Computer Science and Engineering China Southeast University Key Laboratory of Computer Network and Information Integration Ministry of Education Nanjing China Nanyang Technological University School of Computer Science and Engineering 639798 Singapore University of Houston Department of Electrical and Computer Engineering HoustonTX77004 United States Kyung Hee University Department of Computer Science and Engineering Seoul446-701 Korea Republic of
Covert communication is considered a promising technology for hiding transmission processes and activities from malicious eavesdropping. With the development of detection technology, the traditional point-to-point cov... 详细信息
来源: 评论
Faster Zero-shot Multi-modal Entity Linking via Visual-Linguistic Representation
收藏 引用
Data Intelligence 2022年 第3期4卷 493-508页
作者: Qiushuo Zheng Hao Wen Meng Wang Guilin Qi Chaoyu Bai School of Cyber Science and Engineering Southeast UniversityNanjing 211189China School of Computer Science and Engineering Southeast UniversityNanjing 211189China Key Laboratory of Computer Network and Information Integration(Southeast University) Ministry of EducationNanjing 211189China
Multi-modal entity linking plays a crucial role in a wide range of knowledge-based modal-fusion tasks, i.e., multi-modal retrieval and multi-modal event extraction. We introduce the new ZEro-shot Multi-modal Entity Li... 详细信息
来源: 评论
Visual Entity Linking via Multi-modal Learning
收藏 引用
Data Intelligence 2022年 第1期4卷 1-19页
作者: Qiushuo Zheng Hao Wen Meng Wang Guilin Qi School of Cyber Science and Engineering Southeast UniversityNanjing 211189China School of Computer Science and Engineering Southeast UniversityNanjing 211189China Key Laboratory of Computer Network and Information Integration(Southeast University) Ministry of EducationNanjing 211189China
Existing visual scene understanding methods mainly focus on identifying coarse-grained concepts about the visual objects and their relationships,largely neglecting fine-grained scene *** fact,many data-driven applicat... 详细信息
来源: 评论
Universal and General Quantum Simultaneous Secret Distribution with Dense Coding by Using One-Dimensional High-Level Cluster States
收藏 引用
Journal of computer Science & Technology 2021年 第1期36卷 221-230页
作者: Zhi-Hao Liu Han-Wu Chen School of Computer Science and Engineering Southeast UniversityNanjing 211189China Key Laboratory of Computer Network and Information Integration(Southeast University) Ministry of Education Nanjing 211189China
A universal and general quantum simultaneous secret distribution(QSSD)protocol is put forward based on the properties of the one-dimensional high-level cluster states,in which one sender dispatches different high-leve... 详细信息
来源: 评论
Structured Fourier Contour Embedding for Arbitrary-shaped Slender Text Detection  3
Structured Fourier Contour Embedding for Arbitrary-shaped Sl...
收藏 引用
3rd International Conference on Artificial Intelligence, Virtual Reality, and Visualization, AIVRV 2023
作者: Chen, Jianyong Liang, Lingyu Xiao, Wocheng South China University of Technology Guangzhou China Guangzhou China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Nanjing China
Arbitrary-shaped text detection is a challenging task where a text instance representation should be well designed to cover diverse text geometry variances. Most of current methods represent text instances as image ma... 详细信息
来源: 评论