咨询与建议

限定检索结果

文献类型

  • 1,687 篇 会议
  • 1,322 篇 期刊文献

馆藏范围

  • 3,009 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,984 篇 工学
    • 1,467 篇 计算机科学与技术...
    • 1,153 篇 软件工程
    • 541 篇 信息与通信工程
    • 270 篇 电气工程
    • 215 篇 电子科学与技术(可...
    • 203 篇 控制科学与工程
    • 200 篇 生物工程
    • 135 篇 机械工程
    • 125 篇 网络空间安全
    • 98 篇 仪器科学与技术
    • 95 篇 光学工程
    • 89 篇 生物医学工程(可授...
    • 66 篇 交通运输工程
    • 64 篇 动力工程及工程热...
    • 64 篇 化学工程与技术
    • 52 篇 安全科学与工程
    • 41 篇 建筑学
  • 910 篇 理学
    • 528 篇 数学
    • 218 篇 生物学
    • 196 篇 物理学
    • 164 篇 统计学(可授理学、...
    • 82 篇 系统科学
    • 74 篇 化学
  • 561 篇 管理学
    • 342 篇 管理科学与工程(可...
    • 243 篇 图书情报与档案管...
    • 122 篇 工商管理
  • 93 篇 法学
    • 59 篇 社会学
  • 71 篇 医学
    • 58 篇 临床医学
    • 51 篇 基础医学(可授医学...
  • 51 篇 经济学
    • 51 篇 应用经济学
  • 30 篇 农学
  • 21 篇 军事学
  • 10 篇 教育学
  • 10 篇 文学
  • 9 篇 艺术学

主题

  • 136 篇 feature extracti...
  • 118 篇 semantics
  • 93 篇 accuracy
  • 76 篇 computational mo...
  • 75 篇 training
  • 64 篇 data models
  • 60 篇 deep learning
  • 60 篇 federated learni...
  • 45 篇 protocols
  • 45 篇 cryptography
  • 44 篇 privacy
  • 43 篇 neural networks
  • 42 篇 security
  • 42 篇 robustness
  • 40 篇 visualization
  • 40 篇 adaptation model...
  • 39 篇 data mining
  • 39 篇 predictive model...
  • 38 篇 optimization
  • 37 篇 authentication

机构

  • 221 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 156 篇 school of comput...
  • 80 篇 key laboratory o...
  • 65 篇 college of compu...
  • 64 篇 computer network...
  • 58 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 50 篇 shandong fundame...
  • 47 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 43 篇 institute of inf...
  • 40 篇 school of comput...
  • 37 篇 school of cyber ...
  • 37 篇 shandong provinc...
  • 36 篇 key laboratory o...
  • 36 篇 fujian provincia...
  • 35 篇 university of ch...
  • 33 篇 fujian key labor...

作者

  • 46 篇 zhao yao
  • 36 篇 zhou deyu
  • 26 篇 cong runmin
  • 26 篇 yang yang
  • 26 篇 min-ling zhang
  • 25 篇 zhang min-ling
  • 24 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 21 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 du bo
  • 18 篇 liu ximeng
  • 17 篇 geng xin
  • 17 篇 xiaoping li
  • 16 篇 di xiaoqiang
  • 16 篇 he yulan
  • 16 篇 xia chunhe
  • 16 篇 wang jin
  • 15 篇 zhenrong zhang

语言

  • 2,727 篇 英文
  • 173 篇 其他
  • 121 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Intergration"
3009 条 记 录,以下是451-460 订阅
排序:
Transformer Helps Gnns Express Better Via Distillation of Long-Range Dependencies
SSRN
收藏 引用
SSRN 2024年
作者: Li, Jiaxing Zhang, Xiaotong Zhang, Ke Kong, Youyong Jiangsu Provincial Joint International Research Laboratory of Medical Information Processing School of Computer Science and Engineering Southeast University Jiangsu Province Nanjing China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Nanjing China
Graph neural networks (GNNs) are powerful architectures for graph representation learning. However, GNNs based on message-passing cannot make fully use of the valuable long-range dependencies in graph-structured data.... 详细信息
来源: 评论
Offensive Text Style Transfer based on Unsupervised Learning
Offensive Text Style Transfer based on Unsupervised Learning
收藏 引用
2022 International Conference on Artificial Intelligence and Intelligent information Processing, AIIIP 2022
作者: Zhao, Hanlin Yang, Peng School of Cyber Science and Engineering Southeast University Nanjing China School of Computer Science and Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Nanjing China
As the current mainstream social networking method, online social networking brings convenience to people, but also generates negative problems such as language violence. Therefore, offensive text style transfer resea... 详细信息
来源: 评论
Efficient survivable mapping algorithm for logical topology in IP-over-WDM optical networks against node failure
收藏 引用
Journal of Supercomputing 2023年 第5期79卷 5037-5063页
作者: Cheng, Dun-Wei Chang, Jo-Yi Lin, Chen-Yen Lin, Limei Huang, Yanze Thulasiraman, Krishnaiyan Hsieh, Sun-Yuan Department of Computer Science and Information Engineering National Yunlin University of Science and Technology 123 University Road Yunlin64002 Taiwan Department of Computer Science and Information Engineering National Cheng Kung University No. 1 University Road Tainan701 Taiwan College of Mathematics and Informatics and the Key Laboratory of Network Security and Cryptology Fujian Normal University Fujian Fuzhou350117 China Fujian Provincial Key Laboratory of Big Data Mining and Applications School of Mathematics and Physics Fujian University of Technology Fujian Fuzhou350118 China Department of Computer Science University of Oklahoma 660 Parrington Oval NormanOK73019 United States Department of Computer Science and Information Engineering National Chi Nan University No. 1 Daxue Rd Nantou County Puli Township54561 Taiwan
The survivable mapping problem in an IP-over-WDM network with a logical graph and physical graph is the problem of finding a mapping of a logical network in a physical layer so that any failure in physical topology do... 详细信息
来源: 评论
Efficient and Long-Tailed Generalization for Pre-trained Vision-Language Model
arXiv
收藏 引用
arXiv 2024年
作者: Shi, Jiang-Xin Zhang, Chi Wei, Tong Li, Yu-Feng National Key Laboratory for Novel Software Technology School of Artificial Intelligence Nanjing University China National Key Laboratory for Novel Software Technology Nanjing University China School of Computer Science and Engineering Key Laboratory of Computer Network and Information Integration of Ministry of Education Southeast University China
Pre-trained vision-language models like CLIP have shown powerful zero-shot inference ability via image-text matching and prove to be strong few-shot learners in various downstream tasks. However, in real-world scenari... 详细信息
来源: 评论
ENS-RFMC: An Encrypted network Traffic Sampling Method Based on Rule-Based Feature Extraction and Multi-hierarchical Clustering for Intrusion Detection  27th
ENS-RFMC: An Encrypted Network Traffic Sampling Method Based...
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Chen, Liang-Chen Gao, Shu Wei, Zi-Xuan Liu, Bao-Xu Zhang, Xu-Yao School of Computer Science and Artificial Intelligence Wuhan University of Technology Wuhan430063 China Institute of Automation NLPR Chinese Academy of Sciences Beijing100190 China Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China School of Computer China University of Labor Relations Beijing100048 China Key Laboratory of Network Assessment Technology Chinese Academy of Sciences Beijing100093 China
Efficiently and quickly identifying malware in encrypted network traffic is a major challenge. This research presents and evaluates a novel approach for sampling encrypted network traffic, called ENS-RFMC. Initially, ... 详细信息
来源: 评论
Deep Imputation Bi-stochastic Graph Regularized Matrix Factorization for Clustering Single-cell RNA-sequencing Data
收藏 引用
IEEE/ACM Transactions on Computational Biology and Bioinformatics 2024年 PP卷 1-11页
作者: Lan, Wei Chen, Jianwei Liu, Mingyang Chen, Qingfeng Liu, Jin Wang, Jianxin Chen, Yi-Ping Phoebe Wei Lan is School of Computer Electronic and Information and Guangxi Key Laboratory of Multimedia Communications and Network Technology Guangxi University Nanning Guangxi China School of Computer Electronic and Information Guangxi University Nanning Guangxi China School of Computer Electronic and Information and State Key Laboratory for Conservation and Utilization of Subtropical Agro-bioresources Guangxi University Nanning Guangxi China Hunan Provincial Key Lab on Bioinformatics School of Computer Science and Engineering Central South University Changsha Hunan China Department of Computer Science and Information Technology La Trobe University Melbourne Victoria Australia
By generating massive gene transcriptome data and analyzing transcriptomic variations at the cell level, single-cell RNA-sequencing (scRNA-seq) technology has provided new way to explore cellular heterogeneity and fun... 详细信息
来源: 评论
Data-consistent Unsupervised Diffusion Model for Metal Artifact Reduction
Data-consistent Unsupervised Diffusion Model for Metal Artif...
收藏 引用
2023 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2023
作者: Tong, Zhan Wu, Zhan Yang, Yang Mao, Weilong Wang, Shijie Li, Yinsheng Chen, Yang Southeast University Laboratory of Image Science and Technology Nanjing210096 China Southeast University Ministry of Education Key Laboratory of Computer Network and Information Integration Nanjing210096 China Chinese Academy of Sciences Research Center for Medical Artificial Intelligence Shenzhen Institutes of Advanced Technology Shenzhen518055 China School of Computer Science and Engineering Key Lab. of New Generation Artificial Intelligence Technology and Its Interdisciplinary Applications Jiangsu Provincial Joint International Research Laboratory of Medical Information Processing The Laboratory of Image Science and Technology Nanjing210096 China
Computed Tomography (CT) is an imaging technique widely used in clinical diagnosis. However, high-attenuation metallic implants result in the obstruction of low-energy Xrays and further lead to metal artifacts in the ... 详细信息
来源: 评论
A Data Security Protection Method for Deep Neural network Model Based on Mobility and Sharing  1
收藏 引用
18th International Conference on Green, Pervasive, and Cloud Computing, GPC 2023
作者: Zhao, Xinjian Li, Qianmu Wang, Qi Chen, Shi Li, Tengfei Li, Nianzhe State Grid Jiangsu Information and Telecommunication Company Jiangsu Nanjing210024 China School of Computer Science and Engineering Nanjing University of Science and Technology Jiangsu Nanjing210094 China State Grid Smart Grid Research Institute Co. Ltd. Jiangsu Nanjing210003 China State Grid Key Laboratory of Information and Network Security Jiangsu Nanjing210003 China
With the rapid development of digital economy, numerous business scenarios, such as smart grid, energy network, intelligent transportation, etc., require the design and distribution of deep neural network (DNN) models... 详细信息
来源: 评论
AI-Enabled Multimedia Semantic Communications
收藏 引用
IEEE Communications Magazine 2025年 第6期63卷 66-73页
作者: Chenxing Li Yiping Duan Liejun Wang Xiaoming Tao Department of Electronic Engineering Tsinghua University China State Key Laboratory of Space Network China Beijing National Research Center for Information Science and Technology China School of Computer Science and Technology Xinjiang University China
With increasing demand for mobile communication and the development of artificial intelligence, the development of the sixth-generation mobile communication network (6G) will be oriented toward more intelligent and mu... 详细信息
来源: 评论
HiRes: Hierarchical Feature Optimization and Rescorer for Automatic ICD Coding
HiRes: Hierarchical Feature Optimization and Rescorer for Au...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Liang, Zhenpeng Guan, Hongjiao Lu, Wenpeng Peng, Xueping Xu, Bing Yang, Muyun Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China Australian Artificial Intelligence Institute University of Technology Sydney Sydney Australia Faculty of Computing Harbin Institute of Technology Harbin China
The International Classification of Diseases (ICD) coding assigns standardized codes to diseases. Automating this process enhances the efficiency and accuracy of clinical records processing. However, current methods s... 详细信息
来源: 评论