咨询与建议

限定检索结果

文献类型

  • 1,687 篇 会议
  • 1,331 篇 期刊文献

馆藏范围

  • 3,018 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,994 篇 工学
    • 1,476 篇 计算机科学与技术...
    • 1,159 篇 软件工程
    • 542 篇 信息与通信工程
    • 278 篇 电气工程
    • 215 篇 电子科学与技术(可...
    • 203 篇 控制科学与工程
    • 200 篇 生物工程
    • 136 篇 机械工程
    • 125 篇 网络空间安全
    • 98 篇 仪器科学与技术
    • 95 篇 光学工程
    • 89 篇 生物医学工程(可授...
    • 66 篇 交通运输工程
    • 64 篇 动力工程及工程热...
    • 64 篇 化学工程与技术
    • 52 篇 安全科学与工程
    • 42 篇 建筑学
  • 910 篇 理学
    • 529 篇 数学
    • 218 篇 生物学
    • 196 篇 物理学
    • 165 篇 统计学(可授理学、...
    • 83 篇 系统科学
    • 74 篇 化学
  • 561 篇 管理学
    • 342 篇 管理科学与工程(可...
    • 243 篇 图书情报与档案管...
    • 122 篇 工商管理
  • 94 篇 法学
    • 59 篇 社会学
  • 71 篇 医学
    • 58 篇 临床医学
    • 51 篇 基础医学(可授医学...
  • 51 篇 经济学
    • 51 篇 应用经济学
  • 30 篇 农学
  • 21 篇 军事学
  • 10 篇 教育学
  • 10 篇 文学
  • 9 篇 艺术学

主题

  • 136 篇 feature extracti...
  • 118 篇 semantics
  • 93 篇 accuracy
  • 76 篇 computational mo...
  • 76 篇 training
  • 64 篇 data models
  • 60 篇 deep learning
  • 60 篇 federated learni...
  • 45 篇 protocols
  • 45 篇 cryptography
  • 44 篇 privacy
  • 43 篇 neural networks
  • 42 篇 security
  • 42 篇 robustness
  • 41 篇 visualization
  • 40 篇 adaptation model...
  • 39 篇 data mining
  • 39 篇 predictive model...
  • 38 篇 optimization
  • 37 篇 authentication

机构

  • 221 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 156 篇 school of comput...
  • 80 篇 key laboratory o...
  • 65 篇 college of compu...
  • 63 篇 computer network...
  • 58 篇 key laboratory o...
  • 56 篇 college of mathe...
  • 50 篇 shandong fundame...
  • 47 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 43 篇 institute of inf...
  • 40 篇 school of comput...
  • 37 篇 school of cyber ...
  • 37 篇 shandong provinc...
  • 36 篇 key laboratory o...
  • 36 篇 fujian provincia...
  • 35 篇 university of ch...
  • 33 篇 fujian key labor...

作者

  • 46 篇 zhao yao
  • 36 篇 zhou deyu
  • 26 篇 cong runmin
  • 26 篇 yang yang
  • 26 篇 min-ling zhang
  • 25 篇 zhang min-ling
  • 24 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 21 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 du bo
  • 19 篇 liu ximeng
  • 17 篇 geng xin
  • 17 篇 xiaoping li
  • 16 篇 di xiaoqiang
  • 16 篇 he yulan
  • 16 篇 xia chunhe
  • 16 篇 wang jin
  • 15 篇 zhenrong zhang

语言

  • 2,733 篇 英文
  • 176 篇 其他
  • 121 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Intergration"
3018 条 记 录,以下是41-50 订阅
排序:
RFSD-YOLO: An Enhanced X-Ray Object Detection Model for Prohibited Items
RFSD-YOLO: An Enhanced X-Ray Object Detection Model for Proh...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Kong, Xiaotong Li, Aimin Li, Wenqiang Li, Zhiyao Zhang, Yuechen Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
X-ray image detection is essential for ensuring public safety, but traditional methods rely heavily on human analysis and are relatively inefficient. To address this issue, this paper proposes a new object detection m... 详细信息
来源: 评论
CB-YOLO: A Small Object Detection Algorithm for Industrial Scenarios
CB-YOLO: A Small Object Detection Algorithm for Industrial S...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Chen, Hao Wu, Xiaoming Su, Zhanzhi Zhao, Ying Dong, Yunfeng Liu, Xiangzhi Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
In certain specific industrial scenarios, smoking and cellphone usage are strictly prohibited behaviors. In these scenarios, it is crucial to rapidly and accurately detect smoking and cell phone usage, and promptly is... 详细信息
来源: 评论
YOLOv8-GR: Gesture Recognition by Improving of YOLOv8 Algorithm  12
YOLOv8-GR: Gesture Recognition by Improving of YOLOv8 Algori...
收藏 引用
12th International Conference on Advanced Cloud and Big Data, CBD 2024
作者: Ding, Yi Guo, Naixuan Meng, Haitao School of Information Engineering Yancheng Institute of Technology Yancheng China Southeast University Ministry of Education Key Laboratory of Computer Network and Information Integration China
Gesture recognition has been widely used in many situations, such as human-computer interaction, virtual reality and smart home. To meet the current demands for accuracy and speed in gesture recognition, this paper pr... 详细信息
来源: 评论
DP-GenFL: a local differentially private federated learning system through generative data
收藏 引用
Science China(information Sciences) 2023年 第8期66卷 275-276页
作者: Jun LI Kang WEI Chuan MA Feng SHU School of Electronic and Optical Engineering Nanjing University of Science and Technology Zhejiang Lab Key Laboratory of Computer Network and Information Integration (Southeast University) Ministry of Education School of Information and Communication Engineering Hainan University
With the rapid development of the Internet of Things(Io T),the amount of data from intelligent devices is propagating at unprecedented scales. Meanwhile, machine learning(ML),which relies heavily on such data, is revo... 详细信息
来源: 评论
A knowledge-enhanced interest segment division attention network for click-through rate prediction
收藏 引用
Neural Computing and Applications 2024年 第34期36卷 21817-21837页
作者: Liu, Zhanghui Chen, Shijie Chen, Yuzhong Su, Jieyang Zhong, Jiayuan Dong, Chen College of Computer and Data Science Fuzhou University Fujian Province Fuzhou350108 China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fujian Province Fuzhou350108 China
Click-through rate (CTR) prediction aims to estimate the probability of a user clicking on a particular item, making it one of the core tasks in various recommendation platforms. In such systems, user behavior data ar... 详细信息
来源: 评论
Light Up Fireflies: Towards Understanding the Design of Interpersonal Bodily Intertwinement in Bodily Play  24
Light Up Fireflies: Towards Understanding the Design of Inte...
收藏 引用
11th ACM SIGCHI Annual Symposium on computer-Human Interaction in Play, CHI-PLAY Companion 2024
作者: Lu, Yingtong Li, Zhuying Ding, Ding Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Nanjing China
In this paper, we explore the design of interpersonal bodily intertwinement through a VR social game, "Light Up Fireflies". Inspired by works of virtual co-embodiment, our game lets two players embody a sing... 详细信息
来源: 评论
Fingerprint Revocable Template Protection of Variable Window-Based Random Permutation && Check Code  18th
Fingerprint Revocable Template Protection of Variable Windo...
收藏 引用
18th Chinese Conference on Biometric Recognition, CCBR 2024
作者: Xu, Zilong Bian, Weixin Hu, Yao Luo, Feng School of Computer and Information Anhui Normal University Anhui Wuhu241002 China Anhui Provincial Key Laboratory of Network and Information Security Anhui Wuhu241002 China
The Uniformly Random Permutation Hashing (URP-IoM) algorithm demonstrates reliable performance and irreversibility in biometric template protection. However, URP-IoM, through random permutation and Hadamard product co... 详细信息
来源: 评论
AQROM:A quality of service aware routing optimization mechanism based on asynchronous advantage actor-critic in software-defined networks
收藏 引用
Digital Communications and networks 2024年 第5期10卷 1405-1414页
作者: Wei Zhou Xing Jiang Qingsong Luo Bingli Guo Xiang Sun Fengyuan Sun Lingyu Meng School of Information and Communication Guilin University of Electronic TechnologyGuilin541004China The 34th Research Institute of China Electronics Technology Group Corporation Guilin541004China Guangxi Key Laboratory of Optical Network and Optical Information Security Guilin541004China State Key Laboratory of Information Photonics and Optical Communications BeijingUniversity of Posts and TelecommunicationsBeijing100876China Department of Electrical and Computer Engineering University of New MexicoAlbuquerqueNM87131USA
In Software-Defined networks(SDNs),determining how to efficiently achieve Quality of Service(QoS)-aware routing is challenging but critical for significantly improving the performance of a network,where the metrics of... 详细信息
来源: 评论
Probabilistic Reliability via Subsystem Structures of Arrangement Graph networks
收藏 引用
IEEE Transactions on Reliability 2024年 第1期73卷 279-289页
作者: Huang, Yanze Lin, Limei Xu, Li Hsieh, Sun-Yuan Fujian University of Technology Fujian Provincial Key Laboratory of Big Data Mining and Applications School of Computer Science and Mathematics Fuzhou350118 China Fujian Normal University College of Computer and Cyber Security Key Laboratory of Network Security and Cryptology Fuzhou350117 China National Cheng Kung University Department of Computer Science and Information Engineering Tainan701 Taiwan
With the rapid growth of the number of processors in a multiprocessor system, faulty processors occur in it with a probability that rises quickly. The probability of a subsystem with an appropriate size being fault-fr... 详细信息
来源: 评论
MMH-FE:AMulti-Precision and Multi-Sourced Heterogeneous Privacy-Preserving Neural network Training Based on Functional Encryption
收藏 引用
computers, Materials & Continua 2025年 第3期82卷 5387-5405页
作者: Hao Li Kuan Shao Xin Wang Mufeng Wang Zhenyong Zhang The State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang550025China Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science CenterQilu University of Technology(Shandong Academy of Sciences)Jinan250014China China Industrial Control Systems Cyber Emergency Response Team Beijing100040China
Due to the development of cloud computing and machine learning,users can upload their data to the cloud for machine learning model ***,dishonest clouds may infer user data,resulting in user data *** schemes have achie... 详细信息
来源: 评论