咨询与建议

限定检索结果

文献类型

  • 1,687 篇 会议
  • 1,322 篇 期刊文献

馆藏范围

  • 3,009 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,984 篇 工学
    • 1,467 篇 计算机科学与技术...
    • 1,153 篇 软件工程
    • 541 篇 信息与通信工程
    • 270 篇 电气工程
    • 215 篇 电子科学与技术(可...
    • 203 篇 控制科学与工程
    • 200 篇 生物工程
    • 135 篇 机械工程
    • 125 篇 网络空间安全
    • 98 篇 仪器科学与技术
    • 95 篇 光学工程
    • 89 篇 生物医学工程(可授...
    • 66 篇 交通运输工程
    • 64 篇 动力工程及工程热...
    • 64 篇 化学工程与技术
    • 52 篇 安全科学与工程
    • 41 篇 建筑学
  • 910 篇 理学
    • 528 篇 数学
    • 218 篇 生物学
    • 196 篇 物理学
    • 164 篇 统计学(可授理学、...
    • 82 篇 系统科学
    • 74 篇 化学
  • 561 篇 管理学
    • 342 篇 管理科学与工程(可...
    • 243 篇 图书情报与档案管...
    • 122 篇 工商管理
  • 93 篇 法学
    • 59 篇 社会学
  • 71 篇 医学
    • 58 篇 临床医学
    • 51 篇 基础医学(可授医学...
  • 51 篇 经济学
    • 51 篇 应用经济学
  • 30 篇 农学
  • 21 篇 军事学
  • 10 篇 教育学
  • 10 篇 文学
  • 9 篇 艺术学

主题

  • 136 篇 feature extracti...
  • 118 篇 semantics
  • 93 篇 accuracy
  • 76 篇 computational mo...
  • 75 篇 training
  • 64 篇 data models
  • 60 篇 deep learning
  • 60 篇 federated learni...
  • 45 篇 protocols
  • 45 篇 cryptography
  • 44 篇 privacy
  • 43 篇 neural networks
  • 42 篇 security
  • 42 篇 robustness
  • 40 篇 visualization
  • 40 篇 adaptation model...
  • 39 篇 data mining
  • 39 篇 predictive model...
  • 38 篇 optimization
  • 37 篇 authentication

机构

  • 221 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 156 篇 school of comput...
  • 80 篇 key laboratory o...
  • 65 篇 college of compu...
  • 64 篇 computer network...
  • 58 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 50 篇 shandong fundame...
  • 47 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 43 篇 institute of inf...
  • 40 篇 school of comput...
  • 37 篇 school of cyber ...
  • 37 篇 shandong provinc...
  • 36 篇 key laboratory o...
  • 36 篇 fujian provincia...
  • 35 篇 university of ch...
  • 33 篇 fujian key labor...

作者

  • 46 篇 zhao yao
  • 36 篇 zhou deyu
  • 26 篇 cong runmin
  • 26 篇 yang yang
  • 26 篇 min-ling zhang
  • 25 篇 zhang min-ling
  • 24 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 21 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 du bo
  • 18 篇 liu ximeng
  • 17 篇 geng xin
  • 17 篇 xiaoping li
  • 16 篇 di xiaoqiang
  • 16 篇 he yulan
  • 16 篇 xia chunhe
  • 16 篇 wang jin
  • 15 篇 zhenrong zhang

语言

  • 2,727 篇 英文
  • 173 篇 其他
  • 121 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Intergration"
3009 条 记 录,以下是291-300 订阅
排序:
GHTO: Improving Byzantine Robustness in Distributed Machine Learning Through Gradient Heterogeneity Twofold Optimization  6
GHTO: Improving Byzantine Robustness in Distributed Machine ...
收藏 引用
6th International Conference on Frontier Technologies of information and computer, ICFTIC 2024
作者: Li, Caiyun Yang, Ming Cao, Jian Wu, Xiaoming He, Yunpeng Wang, Xin Jinan250014 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan250014 China Shandong Evayinfo Technology Co. Ltd Jinan250101 China
Heterogeneous datasets induce local gradient variance and global gradient variance in distributed learning, collectively referred to as gradient heterogeneity. Gradient heterogeneity increases the system's vulnera... 详细信息
来源: 评论
Visual malware classification and detection method based on convolutional neural network  9
Visual malware classification and detection method based on ...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Huang, Hua Sheng, Hua Han, Xingwang Zhang, Wenbin Zhao, Zilin State Grid Shandong Electric Power Company Information and Telecommunications Company Jinan China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China
With the rapid development of Internet technology, leading to the evolution of malware variants, and malicious threats are also increasing. Therefore, rapid and accurate classification of malware becomes crucial. In r... 详细信息
来源: 评论
Self-Evaluation of Large Language Model based on Glass-box Features
Self-Evaluation of Large Language Model based on Glass-box F...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Huang, Hui Qu, Yingqi Liu, Jing Yang, Muyun Xu, Bing Zhao, Tiejun Lu, Wenpeng Faculty of Computing Harbin Institute of Technology Harbin China Baidu Inc. Beijing China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Jinan China
The proliferation of open-source Large Language Models (LLMs) underscores the pressing need for evaluation methods. Existing works primarily rely on external evaluators, focusing on training and prompting strategies. ... 详细信息
来源: 评论
Convertible certificateless proxy re-signcryption for data access control in cloud computing
Convertible certificateless proxy re-signcryption for data a...
收藏 引用
2023 International Conference on computer Application and information Security, ICCAIS 2023
作者: Wu, Chenhuang Yang, Linghui Yuan, Beibei Li, Huimin Huang, Hui Fujian Key Laboratory of Financial Information Processing Putian University Fujian Putian351100 China Fujian Zhongxin Network Security Information Technology Co. Ltd. Fujian Fuzhou350011 China School of Computer Science Minnan Normal University Fujian Zhangzhou363000 China
Cloud storage service enables users not only to save their local data storage costs but also to access their outsourced data at any time and anywhere. Traditionally, a data owner outsources the encrypted data to the c... 详细信息
来源: 评论
M2G4RTP: A Multi-Level and Multi-Task Graph Model for Instant-Logistics Route and Time Joint Prediction  39
M2G4RTP: A Multi-Level and Multi-Task Graph Model for Instan...
收藏 引用
39th IEEE International Conference on Data Engineering, ICDE 2023
作者: Cai, Tianyue Wan, Huaiyu Wu, Fan Wen, Haomin Guo, Shengnan Wu, Lixia Hu, Haoyuan Lin, Youfang Beijing Jiaotong University School of Computer and Information Technology Beijing China Cainiao Network Artificial Intelligence Department Hangzhou China Beijing Key Laboratory of Traffic Data Analysis and Mining Beijing China
Instant-logistics (e.g., food delivery and package pick-up) is increasingly calling for Route and Time Prediction (RTP), which aims to predict both future route and arrival time of a courier's unvisited locations.... 详细信息
来源: 评论
Partial Offloading Strategy Based on Deep Reinforcement Learning in the Internet of Vehicles
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第7期24卷 6517-6531页
作者: Tian, Shujuan Zhu, Xinjie Feng, Bochao Zheng, Zhirun Liu, Haolin Li, Zhetao Xiangtan University School of Computer Science School of Cyberspace Security Xiangtan411105 China Xiangtan University Hunan International Scientific and Technological Cooperation Base of Intelligent network Xiangtan411105 China Xiangtan University Key Laboratory of Hunan Province for Internet of Things and Information Security Xiangtan411105 China Xiangtan University School of Mathematics and Compulational Science Xiangtan China Jinan University College of Information Science and Technology Guangzhou510632 China
Driven by the increasing demands of vehicular tasks, edge offloading has emerged as a promising paradigm to enhance quality of experience (QoE) in Internet of Vehicles (IoV) networks. This approach enables vehicles to... 详细信息
来源: 评论
A Byzantine Client Detection Method for Federated Learning Based on Encrypted Repeated Median Linear Regression  24
A Byzantine Client Detection Method for Federated Learning B...
收藏 引用
5th International Conference on computer Science and Management Technology, ICCSMT 2024
作者: Guo, Jinlong Yang, Ming Li, Huijuan Wu, Xiaoming He, Yunpeng Wang, Xin Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Shandong Jinan China Shandong Evayinfo Technology Co. Ltd. Shandong Jinan China
Federated learning is an emerging distributed machine learning technology that allows participants to jointly train machine learning models locally without the need for large-scale data transmission and sharing, there... 详细信息
来源: 评论
Spatio-Temporal Context Modeling for Road Obstacle Detection  1
收藏 引用
4th International Conference on Machine Learning for Cyber Security, ML4CS 2022
作者: Wu, Xiuen Wang, Tao Liang, Lingyu Li, Zuoyong Ching, Fum Yew College of Computer and Data Science Fuzhou University Fuzhou350108 China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control Minjiang University Fuzhou350108 China The Key Laboratory of Cognitive Computing and Intelligent Information Processing of Fujian Education Institutions Wuyi University Wuyishan354300 China School of Electronic and Information Engineering South China University of Technology Guangzhou510641 China Ministry of Education Key Laboratory of Computer Network and Information Integration Southeast University Nanjing211189 China Guangzhou510320 China Penang11800 Malaysia
Road obstacle detection is an important problem for vehicle driving safety. In this paper, we aim to obtain robust road obstacle detection based on spatio-temporal context modeling. Firstly, a data-driven spatial cont... 详细信息
来源: 评论
Smoothing Neural network for Non-Lipschitz Optimization with Linear Inequality Constraints
收藏 引用
Chinese Journal of Electronics 2021年 第4期30卷 634-643页
作者: YU Xin WU Lingzhen XIE Mian WANG Yanlin XU Liuming LU Huixia XU Chenhua Department of Computer and Electronic Information Guangxi University The Guangxi Key Laboratory of Multimedia Communications and Network Technology School of Computer Science and Engineering Guilin University of Aerospace Technology Department of Electrical Engineering Guangxi University
This paper presents a smoothing neural network to solve a class of non-Lipschitz optimization problem with linear inequality constraints. The proposed neural network is modelled with a differential inclusion equation,... 详细信息
来源: 评论
Task Offloading Strategy with Emergency Handling and Blockchain Security in SDN-Empowered and Fog-Assisted Healthcare IoT
收藏 引用
Tsinghua Science and Technology 2022年 第4期27卷 760-776页
作者: Junyu Ren Jinze Li Huaxing Liu Tuanfa Qin School of Electronic and Information Engineering South China University of TechnologyGuangzhou 510640China Guangxi University Xingjian College of Science and Liberal Arts Nanning 530004China Guangxi Key Laboratory of Multimedia Communications and Network Technology Guangxi UniversityNanning 530004China Guangxi Key Laboratory of Multimedia Communications and Network Technology School of ComputerElectronics and InformationGuangxi UniversityNanning 530004China Faculty of Earth Sciences&Geography Trinity CollegeUniversity of CambridgeCambridgeCB21TNUK
With the rapid advancement of the Internet of Things(IoT),the typical application of wireless body area networks(WBANs)based smart healthcare has drawn wide attention from all sectors of *** alleviate the pressing cha... 详细信息
来源: 评论