咨询与建议

限定检索结果

文献类型

  • 1,687 篇 会议
  • 1,331 篇 期刊文献

馆藏范围

  • 3,018 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,994 篇 工学
    • 1,476 篇 计算机科学与技术...
    • 1,159 篇 软件工程
    • 542 篇 信息与通信工程
    • 278 篇 电气工程
    • 215 篇 电子科学与技术(可...
    • 203 篇 控制科学与工程
    • 200 篇 生物工程
    • 136 篇 机械工程
    • 125 篇 网络空间安全
    • 98 篇 仪器科学与技术
    • 95 篇 光学工程
    • 89 篇 生物医学工程(可授...
    • 66 篇 交通运输工程
    • 64 篇 动力工程及工程热...
    • 64 篇 化学工程与技术
    • 52 篇 安全科学与工程
    • 42 篇 建筑学
  • 910 篇 理学
    • 529 篇 数学
    • 218 篇 生物学
    • 196 篇 物理学
    • 165 篇 统计学(可授理学、...
    • 83 篇 系统科学
    • 74 篇 化学
  • 561 篇 管理学
    • 342 篇 管理科学与工程(可...
    • 243 篇 图书情报与档案管...
    • 122 篇 工商管理
  • 94 篇 法学
    • 59 篇 社会学
  • 71 篇 医学
    • 58 篇 临床医学
    • 51 篇 基础医学(可授医学...
  • 51 篇 经济学
    • 51 篇 应用经济学
  • 30 篇 农学
  • 21 篇 军事学
  • 10 篇 教育学
  • 10 篇 文学
  • 9 篇 艺术学

主题

  • 136 篇 feature extracti...
  • 118 篇 semantics
  • 93 篇 accuracy
  • 76 篇 computational mo...
  • 76 篇 training
  • 64 篇 data models
  • 60 篇 deep learning
  • 60 篇 federated learni...
  • 45 篇 protocols
  • 45 篇 cryptography
  • 44 篇 privacy
  • 43 篇 neural networks
  • 42 篇 security
  • 42 篇 robustness
  • 41 篇 visualization
  • 40 篇 adaptation model...
  • 39 篇 data mining
  • 39 篇 predictive model...
  • 38 篇 optimization
  • 37 篇 authentication

机构

  • 221 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 156 篇 school of comput...
  • 80 篇 key laboratory o...
  • 65 篇 college of compu...
  • 63 篇 computer network...
  • 58 篇 key laboratory o...
  • 56 篇 college of mathe...
  • 50 篇 shandong fundame...
  • 47 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 43 篇 institute of inf...
  • 40 篇 school of comput...
  • 37 篇 school of cyber ...
  • 37 篇 shandong provinc...
  • 36 篇 key laboratory o...
  • 36 篇 fujian provincia...
  • 35 篇 university of ch...
  • 33 篇 fujian key labor...

作者

  • 46 篇 zhao yao
  • 36 篇 zhou deyu
  • 26 篇 cong runmin
  • 26 篇 yang yang
  • 26 篇 min-ling zhang
  • 25 篇 zhang min-ling
  • 24 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 21 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 du bo
  • 19 篇 liu ximeng
  • 17 篇 geng xin
  • 17 篇 xiaoping li
  • 16 篇 di xiaoqiang
  • 16 篇 he yulan
  • 16 篇 xia chunhe
  • 16 篇 wang jin
  • 15 篇 zhenrong zhang

语言

  • 2,733 篇 英文
  • 176 篇 其他
  • 121 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Intergration"
3018 条 记 录,以下是191-200 订阅
排序:
LGDB-Net: Dual-Branch Path for Building Extraction from Remote Sensing Image  30
LGDB-Net: Dual-Branch Path for Building Extraction from Remo...
收藏 引用
30th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2024
作者: Zhang, Ronghuan Zhao, Jing Li, Ming Zou, Qingzhi Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China Shandong University of Traditional Chinese Medicine School of Intelligence and Information Engineering Jinan China
Extracting buildings from remote sensing images using deep learning techniques is a widely applied and crucial task. Convolutional Neural networks (CNNs) adopt hierarchical feature representation, showcasing powerful ... 详细信息
来源: 评论
Identity-based threshold proxy re-encryption scheme from lattices and its applications
收藏 引用
Frontiers of information Technology & Electronic Engineering 2022年 第2期23卷 258-277页
作者: Liqiang WU Yiliang HAN Xiaoyuan YANG Minqing ZHANG Key Laboratory of Network and Information Security Engineering University of People’s Armed PoliceXi'an 710086China MOE Key Laboratory of Computer Network and Information Security Xidian UniversityXi'an 710071China
Threshold proxy re-encryption(TPRE)can prevent collusion between a single proxy and a delegatee from converting arbitrary files against the wishes of the delegator through multiple proxies,and can also provide normal ... 详细信息
来源: 评论
Community Evolution Tracking Based on Core Node Extension and Edge Variation Discerning  17th
Community Evolution Tracking Based on Core Node Extension a...
收藏 引用
17th CCF Conference on computer Supported Cooperative Work and Social Computing, ChineseCSCW 2022
作者: Zhuang, Qifeng Yu, Zhiyong Guo, Kun College of Computer and Data Science Fuzhou University Fuzhou350108 China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou350108 China Key Laboratory of Spatial Data Mining and Information Sharing Ministry of Education Fuzhou350108 China
Communities exist anywhere in various complex networks, and community evolution tracking is one of the most well-liked areas of inquiry in the study of dynamic complex networks. Community evolution tracking has many a... 详细信息
来源: 评论
A k-nearest neighbor query method based on trust and location privacy protection
A k-nearest neighbor query method based on trust and locatio...
收藏 引用
作者: Guo, Liangmin Zhu, Ying Yang, Hao Luo, Yonglong Sun, Liping Zheng, Xiaoyao School of Computer and Information Anhui Normal University Wuhu China Anhui Provincial Key Laboratory of Network and Information Security Wuhu China
Spatial query is an important supporting technology in the Internet of Things (IoT) and location-based services (LBS). The k-nearest neighbor query is widely used for spatial queries. However, user location privacy ma... 详细信息
来源: 评论
Code Generation From Flowcharts with Texts: A Benchmark Dataset and An Approach
Code Generation From Flowcharts with Texts: A Benchmark Data...
收藏 引用
2022 Findings of the Association for Computational Linguistics: EMNLP 2022
作者: Liu, Zejie Hu, Xiaoyu Zhou, Deyu Li, Lin Zhang, Xu Xiang, Yanzheng Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University China Nanjing Origin Information Technology Company China
Currently, researchers focus on generating codes from the requirement documents. However, current approaches still perform poorly on some requirements needing complex problem-solving skills. In reality, to tackle such... 详细信息
来源: 评论
Decomposition-Based Classifier Chains for Multi-Dimensional Classification
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2022年 第2期3卷 176-191页
作者: Jia, Bin-Bin Zhang, Min-Ling School of Computer Science and Engineering Southeast University Nanjing210096 China College of Electrical and Information Engineering Lanzhou University of Technology Lanzhou730050 China Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University Nanjing210096 China
In multi-dimensional classification, the semantics of objects are characterized by multiple class variables from different dimensions. To model the dependencies among class variables, one natural strategy is to build ... 详细信息
来源: 评论
A Semi-supervised Protein Complex Identification Algorithm Based on Sparseness Constraint
A Semi-supervised Protein Complex Identification Algorithm B...
收藏 引用
2024 International Conference on Applied Mathematics, Modelling and Statistics Application, AMMSA 2024
作者: Liu, Guangming Dang, Fengqing Wang, Bin Peng, Yonghong Wang, Xiaofan Tan, Li School of Computer Science and Engineering Shaanxi Key Laboratory for Network Computing and Security Technology Xi'An University of Technology Shaanxi Xi'an China Faculty of Science and Engineering Computing and Information Science Cambridge United Kingdom School of Computer and Information Engineering Beijing Technology and Business University Beijing China
Recognising protein complexes in protein interaction networks is crucial, but poses a major challenge due to the frequency of noisy interactions. These networks typically involve numerous protein complexes, with each ... 详细信息
来源: 评论
Slew-Driven Layer Assignment for Advanced Non-default-rule Wires  20th
Slew-Driven Layer Assignment for Advanced Non-default-rule W...
收藏 引用
Proceedings of the 20th Web information Systems and Applications Conference, WISA 2023
作者: Lu, Ren Zhang, Wei Jiang, Lieqiu Liu, Genggeng College of Computer and Data Science Fuzhou University Fuzhou350116 China Key Laboratory of Network Computing and Intelligent Information Processing Fujian Province Fuzhou350116 China
With the rapid increase in circuit density in Very Large Scale Integration, the proportion of interconnect delay in circuit timing is also increasing. This makes the importance of layer assignment algorithms increasin... 详细信息
来源: 评论
Optimal replication strategy for mitigating burst traffic in information-centric satellite networks: a focus on remote sensing image transmission
收藏 引用
Frontiers of information Technology & Electronic Engineering 2024年 第6期25卷 791-808页
作者: Ziyang XING Xiaoqiang DI Hui QI Jing CHEN Jinhui CAO Jinyao LIU Xusheng LI Zichu ZHANG Yuchen ZHU Lei CHEN Kai HUANG Xinghan HUO Jilin Key Laboratory of Network and Information Security Changchun 130022China School of Computer Science and Technology Changchun University of Science and TechnologyChangchun 130022China Information Center Changchun University of Science and TechnologyChangchun 130022China
information-centric satellite networks play a crucial role in remote sensing applications,particularly in the transmission of remote sensing ***,the occurrence of burst traffic poses significant challenges in meeting ... 详细信息
来源: 评论
SCREADER: Prompting Large Language Models to Interpret scRNA-seq Data  24
SCREADER: Prompting Large Language Models to Interpret scRNA...
收藏 引用
24th IEEE International Conference on Data Mining Workshops, ICDMW 2024
作者: Li, Cong Long, Qingqing Zhou, Yuanchun Xiao, Meng Institute of Zoology Chinese Academy of Sciences State Key Laboratory of Stem Cell and Reproductive Biology China University of Chinese Academy of Sciences China Chinese Academy of Sciences Computer Network Information Center China
Large language models (LLMs) have demonstrated remarkable advancements, primarily due to their capabilities in modeling the hidden relationships within text sequences. This innovation presents a unique opportunity in ... 详细信息
来源: 评论