咨询与建议

限定检索结果

文献类型

  • 1,687 篇 会议
  • 1,322 篇 期刊文献

馆藏范围

  • 3,009 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,984 篇 工学
    • 1,467 篇 计算机科学与技术...
    • 1,153 篇 软件工程
    • 541 篇 信息与通信工程
    • 270 篇 电气工程
    • 215 篇 电子科学与技术(可...
    • 203 篇 控制科学与工程
    • 200 篇 生物工程
    • 135 篇 机械工程
    • 125 篇 网络空间安全
    • 98 篇 仪器科学与技术
    • 95 篇 光学工程
    • 89 篇 生物医学工程(可授...
    • 66 篇 交通运输工程
    • 64 篇 动力工程及工程热...
    • 64 篇 化学工程与技术
    • 52 篇 安全科学与工程
    • 41 篇 建筑学
  • 910 篇 理学
    • 528 篇 数学
    • 218 篇 生物学
    • 196 篇 物理学
    • 164 篇 统计学(可授理学、...
    • 82 篇 系统科学
    • 74 篇 化学
  • 561 篇 管理学
    • 342 篇 管理科学与工程(可...
    • 243 篇 图书情报与档案管...
    • 122 篇 工商管理
  • 93 篇 法学
    • 59 篇 社会学
  • 71 篇 医学
    • 58 篇 临床医学
    • 51 篇 基础医学(可授医学...
  • 51 篇 经济学
    • 51 篇 应用经济学
  • 30 篇 农学
  • 21 篇 军事学
  • 10 篇 教育学
  • 10 篇 文学
  • 9 篇 艺术学

主题

  • 136 篇 feature extracti...
  • 118 篇 semantics
  • 93 篇 accuracy
  • 76 篇 computational mo...
  • 75 篇 training
  • 64 篇 data models
  • 60 篇 deep learning
  • 60 篇 federated learni...
  • 45 篇 protocols
  • 45 篇 cryptography
  • 44 篇 privacy
  • 43 篇 neural networks
  • 42 篇 security
  • 42 篇 robustness
  • 40 篇 visualization
  • 40 篇 adaptation model...
  • 39 篇 data mining
  • 39 篇 predictive model...
  • 38 篇 optimization
  • 37 篇 authentication

机构

  • 221 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 156 篇 school of comput...
  • 80 篇 key laboratory o...
  • 65 篇 college of compu...
  • 64 篇 computer network...
  • 58 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 50 篇 shandong fundame...
  • 47 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 43 篇 institute of inf...
  • 40 篇 school of comput...
  • 37 篇 school of cyber ...
  • 37 篇 shandong provinc...
  • 36 篇 key laboratory o...
  • 36 篇 fujian provincia...
  • 35 篇 university of ch...
  • 33 篇 fujian key labor...

作者

  • 46 篇 zhao yao
  • 36 篇 zhou deyu
  • 26 篇 cong runmin
  • 26 篇 yang yang
  • 26 篇 min-ling zhang
  • 25 篇 zhang min-ling
  • 24 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 21 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 du bo
  • 18 篇 liu ximeng
  • 17 篇 geng xin
  • 17 篇 xiaoping li
  • 16 篇 di xiaoqiang
  • 16 篇 he yulan
  • 16 篇 xia chunhe
  • 16 篇 wang jin
  • 15 篇 zhenrong zhang

语言

  • 2,727 篇 英文
  • 173 篇 其他
  • 121 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Intergration"
3009 条 记 录,以下是261-270 订阅
排序:
Extinction Chains Reveal Intermediate Phases Between the Safety and Collapse in Mutualistic Ecosystems
收藏 引用
Engineering 2024年 第12期43卷 89-98页
作者: Guangwei Wang Xueming Liu Ying Xiao Ye Yuan Linqiang Pan Xiaohong Guan Jianxi Gao Hai-Tao Zhang The MOE Engineering Research Center of Autonomous Intelligent Unmanned Systems State Key Laboratory of Digital Manufacturing Equipment and TechnologySchool of Artificial Intelligence and AutomationHuazhong University of Science and TechnologyWuhan 430074China Guangdong HUST Industrial Technology Research Institute Huazhong University of Science and TechnologyDongguan 523808China Guangdong Provincial Engineering Technology Center of Autonomous Unmanned Vessels Dongguan 523808China MOE Key Laboratory of Intelligent Networks and Network Security&State Key Laboratory of Manufacturing Systems Xi’an Jiaotong UniversityXi’an 710049China Tsinghua National Laboratory of Information Science and Technology Department of AutomationTsinghua UniversityBeijing 100084China Department of Computer Science Rensselaer Polytechnic InstituteTroyNY 12180USA
Ecosystems are undergoing unprecedented persistent deterioration due to unsustainable anthropogenic human activities,such as overfishing and deforestation,and the effects of such damage on ecological stability are ***... 详细信息
来源: 评论
Scale‐wise interaction fusion and knowledge distillation network for aerial scene recognition
收藏 引用
CAAI Transactions on Intelligence Technology 2023年 第4期8卷 1178-1190页
作者: Hailong Ning Tao Lei Mengyuan An Hao Sun Zhanxuan Hu Asoke K.Nandi School of Computer Science and Technology Xi'an University of Posts and TelecommunicationsShaanxi Key Laboratory of Network Data Analysis and Intelligent ProcessingXi'anChina Xi'an Key Laboratory of Big Data and Intelligent Computing Xi'anChina School of Electronic Information and Artificial Intelligence Shaanxi University of Science and TechnologyXi'anChina School of Computer Central China Normal UniversityWuhanChina Department of Electronic and Electrical Engineering Brunel University LondonLondonUK Xi'an Jiaotong University Xi'anChina
Aerial scene recognition(ASR)has attracted great attention due to its increasingly essential *** of the ASR methods adopt the multi‐scale architecture because both global and local features play great roles in ***,th... 详细信息
来源: 评论
Semi-supervised Multi-label Learning with Balanced Binary Angular Margin Loss  38
Semi-supervised Multi-label Learning with Balanced Binary An...
收藏 引用
38th Conference on Neural information Processing Systems, NeurIPS 2024
作者: Li, Ximing Liang, Silong Li, Changchun Wang, Pengfei Gu, Fangming College of Computer Science and Technology Jilin University China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University China Computer Network Information Center Chinese Academy of Sciences China University of Chinese Academy of Sciences Chinese Academy of Sciences China
Semi-supervised multi-label learning (SSMLL) refers to inducing classifiers using a small number of samples with multiple labels and many unlabeled samples. The prevalent solution of SSMLL involves forming pseudo-labe...
来源: 评论
A Shortest Path Query Approach for Encrypted Graphs Based on Padding Dictionary Structure
A Shortest Path Query Approach for Encrypted Graphs Based on...
收藏 引用
2023 China Automation Congress, CAC 2023
作者: Yang, Ming Zhang, Kaiyang Mu, Chao Wang, Xin Liu, Yuanlong Zhang, Heng Key Laboratory of Computing Power Network and Information Security Shandong Computer Science Center Ministry of Education Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China State Grid Shandong Electric Power Company Jinan China School of Computer Engineering Jiangsu Ocean University Lianyungang China
Hybrid intelligence has emerged as an innovative approach that synergistically combines the strengths of human intelligence and artificial intelligence (AI) to address complex problems. In this paradigm, knowledge gra... 详细信息
来源: 评论
Volume Hiding Conjunctive Searchable Symmetric Encryption over Cloud  16
Volume Hiding Conjunctive Searchable Symmetric Encryption ov...
收藏 引用
16th International Conference on Cyber-Enabled Distributed Computing and Knowledge Discover, CyberC 2024
作者: Deng, Qinghua Chen, Lanxiang Zhu, Yizhao Mu, Yi City University of Macau Faculty of Data Science 999078 China Hanshan Normal University School of Computer and Information Engineering Chaozhou521041 China Fujian Normal University Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fuzhou China
Symmetric searchable encryption (SSE) is crucial for promoting cloud storage. It enables users to encrypt private data and outsource it to untrusted servers while retaining query capabilities. To prevent the cloud fro... 详细信息
来源: 评论
Design of power supply system for portable aviation inspection equipment  3
Design of power supply system for portable aviation inspecti...
收藏 引用
2023 3rd International Conference on Measurement Control and Instrumentation, MCAI 2023
作者: Yang, Yang Ai, Hao Li, Shibo Xiao, Guokai Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Standard Institute of Emerging Technologies and Innovations Co. Ltd. Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Given that airborne electronic equipment may have a variety of wiring methods and may encounter a set of systems using multiple power supplies, it is necessary to take some measures on the circuit to ensure the normal... 详细信息
来源: 评论
Wishart Deeplab network for Polarimetric SAR Image Classification  3rd
Wishart Deeplab Network for Polarimetric SAR Image Classific...
收藏 引用
3rd China Intelligent Robotics Annual Conference, CCF CIRAC 2022
作者: Shi, Junfei He, Tiansheng Jin, Haiyan Wang, Hua Xu, Weinan State Key Laboratory of Geo-Information Engineering Shaanxi Xi’an710048 China School of Computer Science and Engineering Xi’an University of Technology Shaanxi Xi’an710048 China Shaanxi Key Laboratory for Network Computing and Security Technology Shaanxi Xi’an710048 China
Polarimetric Synthetic Aperture Radar (PolSAR) images have attracted much attention with abundant polarimetric scattering information. In recent years, many deep learning models have been proposed and highly expanded ... 详细信息
来源: 评论
PE: A Poincare Explanation Method for Fast Text Hierarchy Generation
PE: A Poincare Explanation Method for Fast Text Hierarchy Ge...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Chen, Qian Li, Dongyang He, Xiaofeng Li, Hongzhao Yi, Hongyu School of Computer Science and Technology East China Normal University Shanghai China NPPA Key Laboratory of Publishing Integration Development ECNUP Shanghai China Sichuan Caizi Software Information Network Co. Ltd. China
The black-box nature of deep learning models in NLP hinders their widespread *** research focus has shifted to Hierarchical Attribution (HA) for its ability to model feature *** works model non-contiguous combinations... 详细信息
来源: 评论
Resource Allocation for MEC in Ultra-dense networks
收藏 引用
Journal of computers (Taiwan) 2025年 第1期36卷 143-162页
作者: Ma, Huan Li, Shuyun Wang, Zhihui Dou, Xubing Zhang, Xinchang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China Shandong Normal University Jinan China
In the complex context of 5G ultra-dense networks, the unprecedented growth in traffic and computing demand has made the interaction between edge devices and edge servers extremely intricate due to the time-varying na... 详细信息
来源: 评论
Decoy-state quantum-key-distribution-based quantum private query with error tolerance bound
收藏 引用
Physical Review A 2024年 第5期109卷 052442-052442页
作者: Bin Liu Zhonghao Liang Wei Huang Fei Gao Jiayi Yuan Bingjie Xu College of Computer Science The State Key Laboratory of Networking and Switching Technology Center for Network and Information Science and Technology on Communication Security Laboratory Institute of Southwestern Communication Chengdu 610041 China
Quantum private query (QPQ) faces many challenges in practical applications. At present, some scholars have made substantial work on overcoming channel loss, channel noise, and nonideal light sources, respectively. Ho... 详细信息
来源: 评论