咨询与建议

限定检索结果

文献类型

  • 1,687 篇 会议
  • 1,322 篇 期刊文献

馆藏范围

  • 3,009 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,984 篇 工学
    • 1,467 篇 计算机科学与技术...
    • 1,153 篇 软件工程
    • 541 篇 信息与通信工程
    • 270 篇 电气工程
    • 215 篇 电子科学与技术(可...
    • 203 篇 控制科学与工程
    • 200 篇 生物工程
    • 135 篇 机械工程
    • 125 篇 网络空间安全
    • 98 篇 仪器科学与技术
    • 95 篇 光学工程
    • 89 篇 生物医学工程(可授...
    • 66 篇 交通运输工程
    • 64 篇 动力工程及工程热...
    • 64 篇 化学工程与技术
    • 52 篇 安全科学与工程
    • 41 篇 建筑学
  • 910 篇 理学
    • 528 篇 数学
    • 218 篇 生物学
    • 196 篇 物理学
    • 164 篇 统计学(可授理学、...
    • 82 篇 系统科学
    • 74 篇 化学
  • 561 篇 管理学
    • 342 篇 管理科学与工程(可...
    • 243 篇 图书情报与档案管...
    • 122 篇 工商管理
  • 93 篇 法学
    • 59 篇 社会学
  • 71 篇 医学
    • 58 篇 临床医学
    • 51 篇 基础医学(可授医学...
  • 51 篇 经济学
    • 51 篇 应用经济学
  • 30 篇 农学
  • 21 篇 军事学
  • 10 篇 教育学
  • 10 篇 文学
  • 9 篇 艺术学

主题

  • 136 篇 feature extracti...
  • 118 篇 semantics
  • 93 篇 accuracy
  • 76 篇 computational mo...
  • 75 篇 training
  • 64 篇 data models
  • 60 篇 deep learning
  • 60 篇 federated learni...
  • 45 篇 protocols
  • 45 篇 cryptography
  • 44 篇 privacy
  • 43 篇 neural networks
  • 42 篇 security
  • 42 篇 robustness
  • 40 篇 visualization
  • 40 篇 adaptation model...
  • 39 篇 data mining
  • 39 篇 predictive model...
  • 38 篇 optimization
  • 37 篇 authentication

机构

  • 221 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 156 篇 school of comput...
  • 80 篇 key laboratory o...
  • 65 篇 college of compu...
  • 64 篇 computer network...
  • 58 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 50 篇 shandong fundame...
  • 47 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 43 篇 institute of inf...
  • 40 篇 school of comput...
  • 37 篇 school of cyber ...
  • 37 篇 shandong provinc...
  • 36 篇 key laboratory o...
  • 36 篇 fujian provincia...
  • 35 篇 university of ch...
  • 33 篇 fujian key labor...

作者

  • 46 篇 zhao yao
  • 36 篇 zhou deyu
  • 26 篇 cong runmin
  • 26 篇 yang yang
  • 26 篇 min-ling zhang
  • 25 篇 zhang min-ling
  • 24 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 21 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 du bo
  • 18 篇 liu ximeng
  • 17 篇 geng xin
  • 17 篇 xiaoping li
  • 16 篇 di xiaoqiang
  • 16 篇 he yulan
  • 16 篇 xia chunhe
  • 16 篇 wang jin
  • 15 篇 zhenrong zhang

语言

  • 2,727 篇 英文
  • 173 篇 其他
  • 121 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Intergration"
3009 条 记 录,以下是301-310 订阅
排序:
Deep Spatial Spectral Convolutional Sparse Coding for Spectral CT Image Reconstruction
Deep Spatial Spectral Convolutional Sparse Coding for Spectr...
收藏 引用
International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI)
作者: Jin Liu Jingjing Xie Kun Wang Jun Qiang College of Computer and Information Anhui Polytechnic University Wuhu China Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University Nanjing China
Spectral computed tomography (CT) provides the potential to generate attenuation maps at varying spectral bins, which can subsequently be employed for the resolve of tissue materials. However, the majority of reconstr... 详细信息
来源: 评论
Generalization analysis for label-specific representation learning  24
Generalization analysis for label-specific representation le...
收藏 引用
Proceedings of the 38th International Conference on Neural information Processing Systems
作者: Yi-Fan Zhang Min-Ling Zhang School of Cyber Science and Engineering Southeast University Nanjing China and Key Laboratory of Computer Network and Information Integration (Southeast University) Ministry of Education China School of Computer Science and Engineering Southeast University Nanjing China and Key Laboratory of Computer Network and Information Integration (Southeast University) Ministry of Education China
Label-specific representation learning (LSRL), i.e., constructing the representation with specific discriminative properties for each class label, is an effective strategy to improve the performance of multi-label lea...
来源: 评论
Heterophilic Graph Representation Learning Based on Multi-Order information Extraction and High and Low Pass Filters  10
Heterophilic Graph Representation Learning Based on Multi-Or...
收藏 引用
10th IEEE Smart World Congress, SWC 2024
作者: Wu, Ling Li, Xinyu Yang, Yingjie Guo, Kun Zhang, Qishan Fuzhou University College of Computer and Data Science Fuzhou China Fujian Key Laboratory of Network Computing and Intelligent Information Processing China De Montfort University School of Computer Science and Informatics Leicester United Kingdom Shanghai International Studies University College of Economics and Humanities Shanghai China
Real-world networks can be divided into homophilic and heterophilic graphs. Significantly, many nodes tend to be heterophilic in a homophilic graph. Graph representation learning in heterophilic graphs has attracted c... 详细信息
来源: 评论
Research and Application of Smart Water Meter Monitoring System Based on NB-IoT  7
Research and Application of Smart Water Meter Monitoring Sys...
收藏 引用
7th IEEE information Technology and Mechatronics Engineering Conference, ITOEC 2023
作者: Zhao, Yuanyuan Zhang, Tixiang Hao, Huijuan Zhang, Xiaojie Shandong Computer Science Center Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science No. 19 Keyuan Road Shandong Jinan250014 China Shandong Yonate Environmental Technology Co. Ltd. Shandong Jinan250014 China
With the increasing shortage of water resources and the improvement of environmental awareness, intelligent water meter monitoring systems have become a hot research topic in the field of water conservation. This pape... 详细信息
来源: 评论
3D mesh pose transfer based on skeletal deformation
3D mesh pose transfer based on skeletal deformation
收藏 引用
作者: Yang, Shigeng Yin, Mengxiao Li, Ming Li, Guiqing Chang, Kan Yang, Feng School of Computer Electronics and Information Guangxi University Guangxi Nanning China Guangxi Key Laboratory of Multimedia Communications Network Technology Guangxi University Guangxi China School of Computer Science and Engineering South China University of Technology Guangdong China
For 3D mesh pose transfer, the target model is obtained by transferring the pose of the reference mesh to the source mesh, where the shape and pose of the source are usually different from that of the reference. In th... 详细信息
来源: 评论
Deep Iterative Reconstruction network Based on Residual Constraint for Low-Dose CT Imaging  8
Deep Iterative Reconstruction Network Based on Residual Cons...
收藏 引用
8th International Conference on Systems and Informatics, ICSAI 2022
作者: Liu, Jin Kang, Yanqin Liu, Tao Zhang, TingYu Zhang, Yikun Anhui Polytechnic University School of Computer and Information Wuhu China Southeast University Ministry of Education Key Laboratory of Computer Network and Information Integration Nanjing China Southeast University School of Computer Science and Engineering Nanjing China
clinical low X-ray dose computed tomography (LDCT) scanner often induce high intensity strip artifact and spot nosie, compromising diagnoses and intervention plans. Recently, sparsely constrained and network learning-... 详细信息
来源: 评论
Research on Setting of Two Firewall Rules Based on Ubuntu Linux System  5
Research on Setting of Two Firewall Rules Based on Ubuntu Li...
收藏 引用
5th International Conference on computer network, Electronic and Automation, ICCNEA 2022
作者: Ma, Limei Zhao, Dongmei Hebei Normal University College of Computer and Cyber Security Shijiazhuang China Key Laboratory of Network and Information Security in Hebei Province Shijiazhuang China
'Security first' is the most concerned issue of Linux administrators. Security refers to the integrity of data. The authentication security and integrity of data are higher than the privacy security of data. F... 详细信息
来源: 评论
A two-path fiber-optic AE demodulation algorithm based on Numerically Stable Direct Least Squares Fitting of Ellipses
收藏 引用
Journal of Lightwave Technology 2025年
作者: Li, Xinhao Zhang, Faxiang Sun, Zhihui Jiang, Shaodong Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
The 3 × 3 coupler demodulation algorithm commonly employs ellipse fitting algorithms (EFAs) to eliminate coupler asymmetry. In the detection scenario of fiber-optic acoustic emission (AE) sensor arrays, the amoun... 详细信息
来源: 评论
A Fast recognition method for DVS perimeter security intrusion signals based on transfer learning
收藏 引用
Optical Fiber Technology 2025年 93卷
作者: Shen, Yongxu Wang, Chang Sun, Zhihui Zhang, Faxiang Jiang, Shaodong Liu, Xu Gao, Fengxia Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
In the perimeter security intrusion signal monitoring based on the Distributed Optical Fiber Vibration Sensing (DVS) system, the common approach for identifying intrusion signals in new scenarios is to collect large a... 详细信息
来源: 评论
An Efficient Direct Downlink Sensing Method Using 5G NR SSB Signals in Perceptive Mobile networks
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 15360-15369页
作者: Li, Hang Xiang, Yang Guo, Qinghua Liu, Lizhe Huang, Xiaojing Cheng, Zhiqun Pang, Yashan Hangzhou Dianzi University School of Electronics and Information Hangzhou310018 China Academy of Network and Communications of CETC National Key Laboratory of Advanced Communication Networks Hebei Shijiazhuang050081 China University of Wollongong School of Electrical Computer and Telecommunications Engineering WollongongNSW2522 Australia University of Technology Sydney Global Big Data Technologies Centre UltimoNSW2007 Australia
In perceptive mobile networks (PMNs), using 5G New Radio (NR) signals for direct sensing poses a significant challenge to practical implementation due to the high computational complexity involved in estimating sensin... 详细信息
来源: 评论