咨询与建议

限定检索结果

文献类型

  • 347 篇 会议
  • 253 篇 期刊文献

馆藏范围

  • 600 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 396 篇 工学
    • 320 篇 计算机科学与技术...
    • 258 篇 软件工程
    • 104 篇 信息与通信工程
    • 37 篇 控制科学与工程
    • 34 篇 生物工程
    • 24 篇 电气工程
    • 24 篇 电子科学与技术(可...
    • 22 篇 机械工程
    • 21 篇 生物医学工程(可授...
    • 19 篇 网络空间安全
    • 17 篇 仪器科学与技术
    • 16 篇 光学工程
    • 12 篇 动力工程及工程热...
    • 9 篇 交通运输工程
    • 8 篇 化学工程与技术
    • 7 篇 建筑学
    • 7 篇 土木工程
  • 164 篇 理学
    • 109 篇 数学
    • 34 篇 生物学
    • 29 篇 统计学(可授理学、...
    • 25 篇 物理学
    • 15 篇 系统科学
    • 10 篇 化学
  • 133 篇 管理学
    • 73 篇 管理科学与工程(可...
    • 62 篇 图书情报与档案管...
    • 24 篇 工商管理
  • 17 篇 法学
    • 15 篇 社会学
  • 15 篇 医学
    • 13 篇 临床医学
    • 10 篇 基础医学(可授医学...
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 6 篇 农学
  • 3 篇 文学
  • 3 篇 艺术学
  • 2 篇 教育学
  • 2 篇 军事学

主题

  • 30 篇 semantics
  • 16 篇 routing
  • 16 篇 feature extracti...
  • 16 篇 training
  • 15 篇 machine learning
  • 15 篇 protocols
  • 14 篇 clustering algor...
  • 12 篇 wireless sensor ...
  • 11 篇 network topology
  • 11 篇 estimation
  • 11 篇 privacy
  • 10 篇 deep learning
  • 10 篇 peer to peer com...
  • 10 篇 big data
  • 10 篇 educational inst...
  • 10 篇 computer network...
  • 9 篇 optimization
  • 9 篇 computational mo...
  • 9 篇 benchmark testin...
  • 9 篇 cloud computing

机构

  • 160 篇 school of comput...
  • 81 篇 key laboratory o...
  • 60 篇 key laboratory o...
  • 46 篇 key laboratory o...
  • 40 篇 school of comput...
  • 36 篇 key laboratory o...
  • 30 篇 school of cyber ...
  • 19 篇 key laboratory o...
  • 15 篇 ministry of educ...
  • 11 篇 school of cyber ...
  • 11 篇 school of comput...
  • 10 篇 college of softw...
  • 9 篇 guangxi collabor...
  • 9 篇 national key lab...
  • 9 篇 shanghai key lab...
  • 9 篇 the school of co...
  • 8 篇 the key laborato...
  • 8 篇 southeast univer...
  • 8 篇 moe key laborato...
  • 8 篇 department of co...

作者

  • 35 篇 zhou deyu
  • 28 篇 min-ling zhang
  • 28 篇 zhang min-ling
  • 20 篇 guang cheng
  • 17 篇 xiaoping li
  • 16 篇 geng xin
  • 16 篇 wang yun
  • 16 篇 he yulan
  • 14 篇 sanfeng zhang
  • 13 篇 cheng guang
  • 12 篇 li xiaoping
  • 12 篇 qi guilin
  • 11 篇 jia yuheng
  • 11 篇 shu huazhong
  • 11 篇 kong youyong
  • 10 篇 wei tong
  • 10 篇 yang guanyu
  • 10 篇 yang peng
  • 9 篇 xiaoyan hu
  • 9 篇 gao zhiqiang

语言

  • 501 篇 英文
  • 60 篇 其他
  • 40 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Integration of MOE"
600 条 记 录,以下是71-80 订阅
排序:
Brainnetformer: Decoding Brain Cognitive States with Spatial-Temporal Cross Attention  48
Brainnetformer: Decoding Brain Cognitive States with Spatial...
收藏 引用
48th IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2023
作者: Sheng, Leheng Wang, Wenhan Shi, Zhiyi Zhan, Jichao Kong, Youyong Southeast University Chien-Shiung Wu College China Southeast University Jiangsu Provincial Joint International Research Laboratory of Medical Information Processing School of Computer Science and Engineering China Southeast University Ministry of Education Key Laboratory of Computer Network and Information Integration Nanjing China
Learning about the cognitive state of the brain has always been a popular topic. Based on the fact that fluctuations of brain signals and functional connectome (FC) relate to specific human behaviors, deep learning ba... 详细信息
来源: 评论
Calibration bottleneck: over-compressed representations are less calibratable  24
Calibration bottleneck: over-compressed representations are ...
收藏 引用
Proceedings of the 41st International Conference on Machine Learning
作者: Deng-Bao Wang Min-Ling Zhang School of Computer Science and Engineering Southeast University Nanjing China and Key Lab. of Computer Network and Information Integration (Southeast University) MOE China
Although deep neural networks have achieved remarkable success, they often exhibit a significant deficiency in reliable uncertainty calibration. This paper focus on model calibratability, which assesses how amenable a...
来源: 评论
Task Offloading and Resource Allocation with Privacy Constraints in End-Edge-Cloud Environment  17th
Task Offloading and Resource Allocation with Privacy Constra...
收藏 引用
17th CCF Conference on computer Supported Cooperative Work and Social Computing, ChineseCSCW 2022
作者: Zhu, Xia Sun, Wei Li, Xiaoping School of Computer Science and Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University Nanjing China School of Cyber Science and Engineering Southeast University Nanjing China
The end-edge-cloud architecture brings an efficient solution to the big data processing problem caused by massive IoT devices. The characteristics of this architecture, such as massive devices, heterogeneous resources... 详细信息
来源: 评论
HIFI-Stego: A High-Fidelity Embedding Audio Steganography Based on Audio Features Decoupling
IEEE Transactions on Audio, Speech and Language Processing
收藏 引用
IEEE Transactions on Audio, Speech and Language Processing 2025年 33卷 2032-2044页
作者: Sanfeng Zhang Baiyu Tian Yang Gao Xingyu Liu Wang Yang School of Cyber Science and Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Nanjing China
The higher audio quality of steganography is directly correlated with the increased resistance to steganalysis tools. The advancement of generative AI technologies, particularly those that decouple style features from... 详细信息
来源: 评论
Joint Optimization of UAV Deployment and Task Computation Offloading Decision in UAV-assisted Edge Computing network
Joint Optimization of UAV Deployment and Task Computation Of...
收藏 引用
IEEE International Conference on High Performance Computing and Communications (HPCC)
作者: Yichuan Liu Jinbin Tu Yun Wang Key Lab of Computer Network and Information Integration MOE School of Computer Science and Engineering Southeast University Nanjing China
The UAVs' deployment decision and task computation offloading decision in the UAV-assisted edge computing network significantly impact the operating efficiency of edge network. On the basis of this, the Optimizati...
来源: 评论
Improving Scene Text Image Super-resolution via Dual Prior Modulation network
arXiv
收藏 引用
arXiv 2023年
作者: Zhu, Shipeng Zhao, Zuoyan Fang, Pengfei Xue, Hui School of Computer Science and Engineering Southeast University Nanjing210096 China MOE Key Laboratory of Computer Network and Information Integration Southeast University China
Scene text image super-resolution (STISR) aims to simultaneously increase the resolution and legibility of the text images, and the resulting images will significantly affect the performance of downstream tasks. Altho... 详细信息
来源: 评论
Visual Entity Linking via Multi-modal Learning
收藏 引用
Data Intelligence 2022年 第1期4卷 1-19页
作者: Qiushuo Zheng Hao Wen Meng Wang Guilin Qi School of Cyber Science and Engineering Southeast UniversityNanjing 211189China School of Computer Science and Engineering Southeast UniversityNanjing 211189China Key Laboratory of Computer Network and Information Integration(Southeast University) Ministry of EducationNanjing 211189China
Existing visual scene understanding methods mainly focus on identifying coarse-grained concepts about the visual objects and their relationships,largely neglecting fine-grained scene *** fact,many data-driven applicat... 详细信息
来源: 评论
Identity-based threshold proxy re-encryption scheme from lattices and its applications
收藏 引用
Frontiers of information Technology & Electronic Engineering 2022年 第2期23卷 258-277页
作者: Liqiang WU Yiliang HAN Xiaoyuan YANG Minqing ZHANG Key Laboratory of Network and Information Security Engineering University of People’s Armed PoliceXi'an 710086China MOE Key Laboratory of Computer Network and Information Security Xidian UniversityXi'an 710071China
Threshold proxy re-encryption(TPRE)can prevent collusion between a single proxy and a delegatee from converting arbitrary files against the wishes of the delegator through multiple proxies,and can also provide normal ... 详细信息
来源: 评论
T-Sorokin: A General Mobility Model in Opportunistic networks
T-Sorokin: A General Mobility Model in Opportunistic Network...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Jinbin Tu Qing Li Yun Wang School of Computer Science and Engineering Southeast University Key Lab of Computer Network and Information Integration MOE Nanjing China
The opportunistic networks are a kind of ad hoc networks that rely on the chance of nodes meeting to transmit messages. Acting as an effective supplement to 4G and 5G networks in some special scenarios where hardware ...
来源: 评论
A Non-Intrusive and Real-Time Data Provenance Method for DDS Systems
A Non-Intrusive and Real-Time Data Provenance Method for DDS...
收藏 引用
International Conference on Mobile Ad-hoc and Sensor networks, MSN
作者: Siyi Wei Jinbin Tu Yun Wang School of Computer Science and Engineering Southeast University Key Lab of Computer Network and Information Integration MOE Nanjing China
In the era of big data, because of the escalating data security threats, the importance of data provenance is widely recognized. It facilitates the tracking of data origins and evolution, improving the ability to diag... 详细信息
来源: 评论