咨询与建议

限定检索结果

文献类型

  • 1,687 篇 会议
  • 1,322 篇 期刊文献

馆藏范围

  • 3,009 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,984 篇 工学
    • 1,467 篇 计算机科学与技术...
    • 1,153 篇 软件工程
    • 541 篇 信息与通信工程
    • 270 篇 电气工程
    • 215 篇 电子科学与技术(可...
    • 203 篇 控制科学与工程
    • 200 篇 生物工程
    • 135 篇 机械工程
    • 125 篇 网络空间安全
    • 98 篇 仪器科学与技术
    • 95 篇 光学工程
    • 89 篇 生物医学工程(可授...
    • 66 篇 交通运输工程
    • 64 篇 动力工程及工程热...
    • 64 篇 化学工程与技术
    • 52 篇 安全科学与工程
    • 41 篇 建筑学
  • 910 篇 理学
    • 528 篇 数学
    • 218 篇 生物学
    • 196 篇 物理学
    • 164 篇 统计学(可授理学、...
    • 82 篇 系统科学
    • 74 篇 化学
  • 561 篇 管理学
    • 342 篇 管理科学与工程(可...
    • 243 篇 图书情报与档案管...
    • 122 篇 工商管理
  • 93 篇 法学
    • 59 篇 社会学
  • 71 篇 医学
    • 58 篇 临床医学
    • 51 篇 基础医学(可授医学...
  • 51 篇 经济学
    • 51 篇 应用经济学
  • 30 篇 农学
  • 21 篇 军事学
  • 10 篇 教育学
  • 10 篇 文学
  • 9 篇 艺术学

主题

  • 136 篇 feature extracti...
  • 118 篇 semantics
  • 93 篇 accuracy
  • 76 篇 computational mo...
  • 75 篇 training
  • 64 篇 data models
  • 60 篇 deep learning
  • 60 篇 federated learni...
  • 45 篇 protocols
  • 45 篇 cryptography
  • 44 篇 privacy
  • 43 篇 neural networks
  • 42 篇 security
  • 42 篇 robustness
  • 40 篇 visualization
  • 40 篇 adaptation model...
  • 39 篇 data mining
  • 39 篇 predictive model...
  • 38 篇 optimization
  • 37 篇 authentication

机构

  • 221 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 156 篇 school of comput...
  • 80 篇 key laboratory o...
  • 65 篇 college of compu...
  • 64 篇 computer network...
  • 58 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 50 篇 shandong fundame...
  • 47 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 43 篇 institute of inf...
  • 40 篇 school of comput...
  • 37 篇 school of cyber ...
  • 37 篇 shandong provinc...
  • 36 篇 key laboratory o...
  • 36 篇 fujian provincia...
  • 35 篇 university of ch...
  • 33 篇 fujian key labor...

作者

  • 46 篇 zhao yao
  • 36 篇 zhou deyu
  • 26 篇 cong runmin
  • 26 篇 yang yang
  • 26 篇 min-ling zhang
  • 25 篇 zhang min-ling
  • 24 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 21 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 du bo
  • 18 篇 liu ximeng
  • 17 篇 geng xin
  • 17 篇 xiaoping li
  • 16 篇 di xiaoqiang
  • 16 篇 he yulan
  • 16 篇 xia chunhe
  • 16 篇 wang jin
  • 15 篇 zhenrong zhang

语言

  • 2,727 篇 英文
  • 173 篇 其他
  • 121 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Intergration"
3009 条 记 录,以下是341-350 订阅
排序:
Benchmarking Temporal Reasoning and Alignment Across Chinese Dynasties
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Zhenglin Wu, Jialong Li, Pengfei Jiang, Yong Zhou, Deyu School of Computer Science and Engineering Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University China Tongyi Lab Alibaba Group China
Temporal reasoning is fundamental to human cognition and is crucial for various real-world applications. While recent advances in Large Language Models have demonstrated promising capabilities in temporal reasoning, e... 详细信息
来源: 评论
Malicious Traffic Detection with Noise Labels Based on Cross-Modal Consistency
IEEE Networking Letters
收藏 引用
IEEE networking Letters 2024年 第2期6卷 148-151页
作者: Yuan, Qingjun Niu, Weina Wang, Yongjuan Gou, Gaopeng Lu, Bin Henan Key Laboratory of Network Cryptography Technology Zhengzhou450001 China Institute for Cyber Security School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu611731 China Shenzhen Institute for Advanced Study University of Electronic Science and Technology of China Shenzhen518110 China Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China
To train robust malicious traffic identification models under noisy labeled datasets, a number of learning with noise labels approaches have been introduced, among which parallel training methods have been proved to b... 详细信息
来源: 评论
UAV Swarm Path Planning for Sensor Data Collection via Double Pre-Partitioned Deep Q-network
收藏 引用
IEEE Sensors Journal 2025年
作者: Zhang, Heng Gao, Yuan Wang, Xin He, Yunpeng Yang, Ming Wu, Xiaoming Yang, Chaoqun Cao, Xianghui Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250014 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250014 China Jiangsu Ocean University School of Computer Engineering Lianyungang222000 China Southeast University School of Automation Nanjing210096 China
Collision-free path planning is a significant challenge in deploying unmanned aerial vehicle (UAV) swarms for sensor data collection tasks, particularly in uncertain environments. This paper addresses the problem of d... 详细信息
来源: 评论
DDoS Detection and Defense Based on FLAD and SDN  20
DDoS Detection and Defense Based on FLAD and SDN
收藏 引用
20th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery, ICNC-FSKD 2024
作者: Dong, Jie Fang, Wenyu Zheng, Wanling Liu, Jinkun Liu, Yanhua College of Computer and Data Science Fuzhou University Fuzhou350108 China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou350108 China Engineering Research Center of Big Data Intelligence Ministry of Education Fuzhou350108 China
In order to achieve more efficient and accurate DDoS detection while ensuring data privacy, this paper proposes a DDoS detection method based on FLAD. Firstly, this paper uses the FLAD algorithm to train a global DDoS... 详细信息
来源: 评论
Attribute-Based Data Sharing Scheme with Flexible Search Functionality for Cloud-Assisted Autonomous Transportation System
收藏 引用
IEEE Transactions on Industrial Informatics 2023年 第11期19卷 10977-10986页
作者: Xiong, Hu Wang, Hanxiao Meng, Weizhi Yeh, Kuo-Hui University of Electronic Science and Technology of China School of Information and Software Engineering Network and Data Security Key Laboratory of Sichuan Province Chengdu610054 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610025 China Technical University of Denmark Department of Applied Mathematics and Computer Science Kongens Lyngby2800 Denmark National Dong Hwa University Department of Information Management Hualien97401 Taiwan National Sun Yat-sen University Department of Computer Science and Engineering Kaohsiung804201 Taiwan
The existing group public key encryption with equality test schemes could only support one-to-one data sharing and are not suitable for cloud-assisted autonomous transportation systems, which demand one-to-many data s... 详细信息
来源: 评论
Source-free Domain Adaptation with Multiple Alignment for Efficient Image Retrieval
Source-free Domain Adaptation with Multiple Alignment for Ef...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Jinghui Ni Hui Cui Lihai Zhao Fengling Li Xiaohui Han Lijuan Xu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Quan Cheng Laboratory Shandong Open University University of Technology Sydney
Domain adaptation techniques help models generalize to target domains by addressing domain discrepancies between the source and target domain data distributions. These techniques are particularly valuable for cross-do... 详细信息
来源: 评论
On the -differential spectra of two classes of power functions over finite fields
收藏 引用
Applicable Algebra in Engineering, Communication and Computing 2025年 1-30页
作者: Liu, Qian Huang, Zhiwei Chen, Zhixiong Jiang, Rong Zhang, Liupiao Key Laboratory of Information Security of Network Systems College of Computer and Data Science Fuzhou University Fuzhou China Hubei Key Laboratory of Applied Mathematics Faculty of Mathematics and Statistics Hubei University Wuhan China Yunnan Key Laboratory of Service Computing Yunnan University of Finance and Economics Kunming China Fujian Key Laboratory of Financial Information Processing Putian University Putian China School of Computer Science and Technology Dongguan University of Technology Dongguan China
Recently, a new concept called multiplicative differential was introduced by Ellingsen et al. [7]. As an extension of the differential uniformity, it is theoretically appealing to determine the properties of c-differe...
来源: 评论
Compositional metric learning for multi-label classification
收藏 引用
Frontiers of computer Science 2021年 第5期15卷 1-12页
作者: Yan-Ping SUN Min-Ling ZHANG School of Computer Science and Engineering Southeast UniversityNanjing 210096China Key Laboratory of Computer Network and Information Integration(Southeast University) Ministry of EducationChina Collaborative Innovation Center for Wireless Communications Technology Nanjing 211100China
Multi-label classification aims to assign a set of proper labels for each instance,where distance metric learning can help improve the generalization ability of instance-based multi-label classification *** multi-labe... 详细信息
来源: 评论
Cooperative Caching Strategy Based on Two-Layer Caching Model for Remote Sensing Satellite networks
收藏 引用
computers, Materials & Continua 2023年 第5期75卷 3903-3922页
作者: Rui Xu Xiaoqiang Di Hao Luo Hui Qi Xiongwen He Wenping Lei School of Computer Science and Technology Changchun University of Science and TechnologyChangchun130022China School of Information Engineering Henan Institute of Science and TechnologyXinxiang453003China Jilin Province Key Laboratory of Network and Information Security Changchun University of Science and TechnologyChangchun130022China Information Center Changchun University of Science and TechnologyChangchun130022China Beijing Institute of Spacecraft System Engineering Beijing100094China Beijing Institute of Space Mechanic and Electricity Beijing100094China
In information Centric networking(ICN)where content is the object of exchange,in-network caching is a unique functional feature with the ability to handle data storage and distribution in remote sensing satellite *** ... 详细信息
来源: 评论
PROMIPL: A Probabilistic Generative Model for Multi-Instance Partial-Label Learning
PROMIPL: A Probabilistic Generative Model for Multi-Instance...
收藏 引用
IEEE International Conference on Data Mining (ICDM)
作者: Yin-Fang Yang Wei Tang Min-Ling Zhang School of Computer Science and Engineering Southeast University Nanjing China Key Laboratory of Computer Network Information Integration (Southeast University) Ministry of Education China
Multi-instance partial-label learning (MIPL) tackles scenarios where each training sample is represented as a multiinstance bag associated with a candidate label set. This set contains one true label and several false... 详细信息
来源: 评论