咨询与建议

限定检索结果

文献类型

  • 1,687 篇 会议
  • 1,331 篇 期刊文献

馆藏范围

  • 3,018 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,994 篇 工学
    • 1,476 篇 计算机科学与技术...
    • 1,159 篇 软件工程
    • 542 篇 信息与通信工程
    • 278 篇 电气工程
    • 215 篇 电子科学与技术(可...
    • 203 篇 控制科学与工程
    • 200 篇 生物工程
    • 136 篇 机械工程
    • 125 篇 网络空间安全
    • 98 篇 仪器科学与技术
    • 95 篇 光学工程
    • 89 篇 生物医学工程(可授...
    • 66 篇 交通运输工程
    • 64 篇 动力工程及工程热...
    • 64 篇 化学工程与技术
    • 52 篇 安全科学与工程
    • 42 篇 建筑学
  • 910 篇 理学
    • 529 篇 数学
    • 218 篇 生物学
    • 196 篇 物理学
    • 165 篇 统计学(可授理学、...
    • 83 篇 系统科学
    • 74 篇 化学
  • 561 篇 管理学
    • 342 篇 管理科学与工程(可...
    • 243 篇 图书情报与档案管...
    • 122 篇 工商管理
  • 94 篇 法学
    • 59 篇 社会学
  • 71 篇 医学
    • 58 篇 临床医学
    • 51 篇 基础医学(可授医学...
  • 51 篇 经济学
    • 51 篇 应用经济学
  • 30 篇 农学
  • 21 篇 军事学
  • 10 篇 教育学
  • 10 篇 文学
  • 9 篇 艺术学

主题

  • 136 篇 feature extracti...
  • 118 篇 semantics
  • 93 篇 accuracy
  • 76 篇 computational mo...
  • 76 篇 training
  • 64 篇 data models
  • 60 篇 deep learning
  • 60 篇 federated learni...
  • 45 篇 protocols
  • 45 篇 cryptography
  • 44 篇 privacy
  • 43 篇 neural networks
  • 42 篇 security
  • 42 篇 robustness
  • 41 篇 visualization
  • 40 篇 adaptation model...
  • 39 篇 data mining
  • 39 篇 predictive model...
  • 38 篇 optimization
  • 37 篇 authentication

机构

  • 221 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 156 篇 school of comput...
  • 80 篇 key laboratory o...
  • 65 篇 college of compu...
  • 63 篇 computer network...
  • 58 篇 key laboratory o...
  • 56 篇 college of mathe...
  • 50 篇 shandong fundame...
  • 47 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 43 篇 institute of inf...
  • 40 篇 school of comput...
  • 37 篇 school of cyber ...
  • 37 篇 shandong provinc...
  • 36 篇 key laboratory o...
  • 36 篇 fujian provincia...
  • 35 篇 university of ch...
  • 33 篇 fujian key labor...

作者

  • 46 篇 zhao yao
  • 36 篇 zhou deyu
  • 26 篇 cong runmin
  • 26 篇 yang yang
  • 26 篇 min-ling zhang
  • 25 篇 zhang min-ling
  • 24 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 21 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 du bo
  • 19 篇 liu ximeng
  • 17 篇 geng xin
  • 17 篇 xiaoping li
  • 16 篇 di xiaoqiang
  • 16 篇 he yulan
  • 16 篇 xia chunhe
  • 16 篇 wang jin
  • 15 篇 zhenrong zhang

语言

  • 2,733 篇 英文
  • 176 篇 其他
  • 121 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Intergration"
3018 条 记 录,以下是111-120 订阅
排序:
An overview on IRS-enabled sensing and communications for 6G: architectures, fundamental limits, and joint beamforming designs
收藏 引用
Science China(information Sciences) 2025年 第5期68卷 170-193页
作者: Xianxin SONG Yuan FANG Feng WANG Zixiang REN Xianghao YU Ye ZHANG Fan LIU Jie XU Derrick Wing Kwan NG Rui ZHANG Shuguang CUI School of Science and Engineering (SSE) Shenzhen Future Network of Intelligence Institute (FNii-Shenzhen)and Guangdong Provincial Key Laboratory of Future Networks of Intelligence The Chinese University of Hong Kong Department of Electrical Engineering City University of Hong Kong School of Information Engineering Guangdong University of Technology Key Laboratory of Wireless-Optical Communications Chinese Academy of Sciences School of Information Science and Technology University of Science and Technology of China Computer School Beijing Information Science and Technology University National Mobile Communications Research Laboratory School of Information Science and Engineering Southeast University School of Electrical Engineering and Telecommunications University of New South Wales School of Science and Engineering Shenzhen Research Institute of Big Data The Chinese University of Hong Kong Department of Electrical and Computer Engineering National University of Singapore
This study presents an overview on intelligent reflecting surface(IRS)-enabled sensing and communication for the forthcoming sixth-generation(6G) wireless networks, in which IRSs are strategically deployed to proactiv... 详细信息
来源: 评论
A Dirty Data Identification Method in Mechanical Equipment Condition Monitoring  10
A Dirty Data Identification Method in Mechanical Equipment C...
收藏 引用
10th IEEE Smart World Congress, SWC 2024
作者: Hao, Huijuan Zhao, Hongge Zhu, Sijian Feng, Yue Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China JinanChina
The rise of the Industrial Internet of Things (IIOT) has brought new opportunities for the mechanical equipment condition monitoring. The trend towards intelligent and automated production of mechanical equipment has ... 详细信息
来源: 评论
Text Guided Road Marking Point Cloud Completion  6
Text Guided Road Marking Point Cloud Completion
收藏 引用
6th International Conference on Next Generation Data-Driven networks, NGDN 2024
作者: He, Xu Xu, Qihong Luo, Huan Fuzhou University College of Computer and Data Science Fuzhou China Fuzhou University Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou China
With the continuous development of intelligent transportation technologies such as autonomous driving and navigation, accurate perception of road markings becomes crucial. However, due to limitations in sensor perspec... 详细信息
来源: 评论
An SDN Traffic Engineering Approach Based on Traffic Unsupervised Contrastive Representation and Reinforcement Learning  6
An SDN Traffic Engineering Approach Based on Traffic Unsuper...
收藏 引用
6th International Conference on Next Generation Data-Driven networks, NGDN 2024
作者: Yang, Ruiyu Tang, Qi Guo, Yingya College of Computer and Data Science Fuzhou University Fuzhou China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou China
With the rapid development of Internet technology and the continuous explosive growth of network traffic, Traffic Engineering (TE), as a viable method for optimizing network traffic distribution and improving network ... 详细信息
来源: 评论
An Approach to New Bearing Fault Diagnosis Utilizing Deep Transfer Learning  10
An Approach to New Bearing Fault Diagnosis Utilizing Deep Tr...
收藏 引用
10th IEEE Smart World Congress, SWC 2024
作者: Hao, HuiJuan Feng, Yue Zhao, HongGe Zhu, SiJian Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China Jinan China
Bearings, serving as crucial components in mechanical equipment, exert a direct influence on the overall performance of the system. Deep transfer learning has garnered significant attention in the realm of intelligent... 详细信息
来源: 评论
Multi-dimensional Classification via Selective Feature Augmentation
收藏 引用
Machine Intelligence Research 2022年 第1期19卷 38-51页
作者: Bin-Bin Jia Min-Ling Zhang School of Computer Science and Engineering Southeast UniversityNanjing 210096China College of Electrical and Information Engineering Lanzhou University of TechnologyLanzhou 730050China Key Laboratory of Computer Network and Information Integration Southeast UniversityMinistry of EducationChina
In multi-dimensional classification(MDC), the semantics of objects are characterized by multiple class spaces from different dimensions. Most MDC approaches try to explicitly model the dependencies among class spaces ... 详细信息
来源: 评论
Stereoscopic Video Retargeting Based on Camera Motion Classification  48
Stereoscopic Video Retargeting Based on Camera Motion Classi...
收藏 引用
48th IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2023
作者: Cai, Linghui Tang, Zhenhua Guangxi University School of Computer and Electronics Information Nanning China Guangxi Key Laboratory of Multimedia Communication and Network Technology Nanning China
The existing stereo video retargeting algorithms commonly use a same methodology to perform resizing without considering different videos with various features, leading to the low quality of reconstructed videos. To a... 详细信息
来源: 评论
Privacy-Preserving Multi-keyword Fuzzy Adjacency Search Strategy for Encrypted Graph in Cloud Environment
收藏 引用
computers, Materials & Continua 2024年 第3期78卷 3177-3194页
作者: Bin Wu Xianyi Chen Jinzhou Huang Caicai Zhang Jing Wang Jing Yu Zhiqiang Zhao Zhuolin Mei School of Computer and Big Data Science Jiujiang UniversityJiujiang332005China Jiujiang Key Laboratory of Network and Information Security Jiujiang332005China School of Computer and Software Nanjing University of Information Science&TechnologyNanjing210044China School of Computer Engineering Hubei University of Arts and ScienceXiangyang441053China School of Modern Information Technology Zhejiang Institute of Mechanical and Electrical EngineeringHangzhou310053China Information Center Jiangxi Changjiang Chemical Co.Ltd.Jiujiang332005China School of Mathematics and Computer Science Ningxia Normal UniversityGuyuan756099China
In a cloud environment,outsourced graph data is widely used in companies,enterprises,medical institutions,and so *** owners and users can save costs and improve efficiency by storing large amounts of graph data on clo... 详细信息
来源: 评论
Robust Voice Activity Detection using Locality-Sensitive Hashing and Residual Frequency-Temporal Attention  25
Robust Voice Activity Detection using Locality-Sensitive Has...
收藏 引用
25th Interspeech Conferece 2024
作者: Li, Shu Zhang, Peng Li, Ye Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science China
For voice activity detection (VAD), recent works focus on learning the attention distribution on contextual information of speech to reduce the impact of irrelevant noise. However, contextual frames selected with spec... 详细信息
来源: 评论
IGED:Towards Intelligent DDoS Detection Model Using Improved Generalized Entropy and DNN
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 1851-1866页
作者: Yanhua Liu Yuting Han HuiChen Baokang Zhao XiaofengWang Ximeng Liu College of Computer and Data Science Fuzhou UniversityFuzhou350108China Engineering Research Center of Big Data Intelligence Ministry of EducationFuzhou350108China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou UniversityFuzhou350108China College of Computer National University of Defense TechnologyChangsha410073China
As the scale of the networks continually expands,the detection of distributed denial of service(DDoS)attacks has become increasingly *** propose an intelligent detection model named IGED by using improved generalized ... 详细信息
来源: 评论