咨询与建议

限定检索结果

文献类型

  • 1,706 篇 会议
  • 1,361 篇 期刊文献

馆藏范围

  • 3,067 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,032 篇 工学
    • 1,508 篇 计算机科学与技术...
    • 1,173 篇 软件工程
    • 552 篇 信息与通信工程
    • 278 篇 电气工程
    • 221 篇 控制科学与工程
    • 220 篇 电子科学与技术(可...
    • 200 篇 生物工程
    • 136 篇 机械工程
    • 129 篇 网络空间安全
    • 98 篇 仪器科学与技术
    • 96 篇 光学工程
    • 89 篇 生物医学工程(可授...
    • 66 篇 交通运输工程
    • 65 篇 动力工程及工程热...
    • 65 篇 化学工程与技术
    • 53 篇 安全科学与工程
    • 43 篇 建筑学
  • 921 篇 理学
    • 535 篇 数学
    • 218 篇 生物学
    • 198 篇 物理学
    • 166 篇 统计学(可授理学、...
    • 83 篇 系统科学
    • 75 篇 化学
  • 567 篇 管理学
    • 345 篇 管理科学与工程(可...
    • 246 篇 图书情报与档案管...
    • 124 篇 工商管理
  • 93 篇 法学
    • 59 篇 社会学
  • 72 篇 医学
    • 59 篇 临床医学
    • 51 篇 基础医学(可授医学...
  • 51 篇 经济学
    • 51 篇 应用经济学
  • 30 篇 农学
  • 22 篇 军事学
  • 11 篇 教育学
  • 10 篇 文学
  • 10 篇 艺术学

主题

  • 136 篇 feature extracti...
  • 118 篇 semantics
  • 94 篇 accuracy
  • 76 篇 computational mo...
  • 75 篇 training
  • 64 篇 data models
  • 62 篇 federated learni...
  • 61 篇 deep learning
  • 45 篇 protocols
  • 45 篇 privacy
  • 45 篇 cryptography
  • 44 篇 neural networks
  • 43 篇 security
  • 42 篇 robustness
  • 40 篇 predictive model...
  • 40 篇 visualization
  • 40 篇 adaptation model...
  • 39 篇 data mining
  • 39 篇 authentication
  • 38 篇 optimization

机构

  • 228 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 164 篇 school of comput...
  • 84 篇 key laboratory o...
  • 69 篇 college of compu...
  • 66 篇 computer network...
  • 60 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 52 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 44 篇 institute of inf...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 37 篇 fujian provincia...
  • 37 篇 shandong provinc...
  • 36 篇 key laboratory o...
  • 36 篇 university of ch...
  • 33 篇 fujian key labor...

作者

  • 48 篇 zhao yao
  • 37 篇 zhou deyu
  • 30 篇 zhang min-ling
  • 27 篇 min-ling zhang
  • 26 篇 cong runmin
  • 26 篇 yang yang
  • 25 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 21 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 du bo
  • 18 篇 liu ximeng
  • 17 篇 geng xin
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 16 篇 zhenrong zhang
  • 16 篇 di xiaoqiang
  • 16 篇 xia chunhe
  • 15 篇 xiangzhi liu

语言

  • 2,708 篇 英文
  • 250 篇 其他
  • 123 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Intergration"
3067 条 记 录,以下是491-500 订阅
排序:
LDD-YOLO: An Improved Lightweight Detection Method for Steel Surface Defects Based on YOLOv8
LDD-YOLO: An Improved Lightweight Detection Method for Steel...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Yuechen Zhang Aimin Li Zhiyao Li Xiaotong Kong Wenqiang Li Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Steel is an indispensable raw material in the industrial field, steel surface defects seriously affect the quality of steel, in recent years a lot of research has been carried out on the detection of steel surface def... 详细信息
来源: 评论
RFSD-YOLO: An Enhanced X-Ray Object Detection Model for Prohibited Items
RFSD-YOLO: An Enhanced X-Ray Object Detection Model for Proh...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Xiaotong Kong Aimin Li Wenqiang Li Zhiyao Li Yuechen Zhang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
X-ray image detection is essential for ensuring public safety, but traditional methods rely heavily on human analysis and are relatively inefficient. To address this issue, this paper proposes a new object detection m... 详细信息
来源: 评论
HSD-YOLO: A Lightweight and Accurate Method for PCB Defect Detection
HSD-YOLO: A Lightweight and Accurate Method for PCB Defect D...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Zhiyao Li Aimin Li Wenqiang Li Xiaotong Kong Yuechen Zhang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
PCB defect detection is a typical small objects detection task, as with other objects, there is a small object size, the detection process is susceptible to the problem of background interference. In practical industr... 详细信息
来源: 评论
Dynamic Heterogeneous Federated Learning with Multi-Level Prototypes
SSRN
收藏 引用
SSRN 2024年
作者: Guo, Shunxin Wang, Hongsong Geng, Xin School of Computer Science and Engineering Southeast University Nanjing210096 China MOE Key Laboratory of Computer Network and Information Integration China Key Laboratory of New Generation Artificial Intelligence Technology and Its Interdisciplinary Applications Southeast University Ministry of Education China
Federated learning shows promise as a privacy-preserving collaborative learning technique. Existing research mainly focuses on skewing the label distribution across clients. However, most approaches suffer from catast... 详细信息
来源: 评论
A Blockchain-based PHR Sharing Scheme with Attribute Privacy Protection
A Blockchain-based PHR Sharing Scheme with Attribute Privacy...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Chaohe Lu Zhongyuan Yu Guijuan Wang Anming Dong Xiang Tian School of Computer Science Qufu Normal University Rizhao China School of Information Science and Engineering Lanzhou University Lanzhou China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
With the rapid advancement and application of the Internet of Medical Things (IoMT), personal health records (PHRs) are now increasingly comprised of data collected by Internet of Things (IoT) devices and medical reco... 详细信息
来源: 评论
UAD-DPL: An Unknown Encrypted Attack Detection Method Based on Deep Prototype Learning  27th
UAD-DPL: An Unknown Encrypted Attack Detection Method Based ...
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Chen, Liang-Chen Gao, Shu Liu, Bao-Xu Zhang, Xu-Yao School of Computer Science and Artificial Intelligence Wuhan University of Technology Wuhan430063 China Institute of Automation NLPR Institute of Automation Chinese Academy of Sciences Beijing100190 China Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China School of Computer China University of Labor Relations Beijing100048 China Key Laboratory of Network Assessment Technology Chinese Academy of Sciences Beijing100093 China
In the field of cybersecurity, a significant concern is the potential for unknown attacks to occur at any moment. The primary obstacle faced by intrusion detection systems lies in the identification of unknown attacks... 详细信息
来源: 评论
Transmission Energy Allocation for Over-the-Air Computation with Energy Harvesting
收藏 引用
Journal of Communications and information networks 2024年 第2期9卷 126-136页
作者: Siyao Zhang Zixiang Ren Xinmin Li Yin Long Jie Xu Shuguang Cui School of Computer Science and Technology Southwest University of Science and TechnologyMianyang 621010China Shenzhen Future Network of Intelligence Institute(FNii-Shenzhen) The Chinese University of Hong KongShenzhenGuangdong 518172China School of Information Science and Technology University of Science and Technology of ChinaHefei 230027China FNii-Shenzhen The Chinese University of Hong KongShenzhenGuangdong 518172China College of Computer Science Chengdu UniversityChengdu 610100China School of Science and Engineering FNii-Shenzhenand Guangdong Provincial Key Laboratory of Future Networks of IntelligenceThe Chinese University of Hong KongShenzhenGuangdong 518172China
Over-the-air computation(AirComp)has recently emerged as a promising multiple-access technique for fast wireless data aggregation(WDA)from distributed wireless devices(WDs). This paper investigates an energy harvestin... 详细信息
来源: 评论
Rehearse With User: Personalized Opinion Summarization via Role-Playing based on Large Language Models
arXiv
收藏 引用
arXiv 2025年
作者: Zhang, Yanyue He, Yulan Zhou, Deyu School of Computer Science and Engineering Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University China Department of Informatics King’s College London United Kingdom The Alan Turing Institute
Personalized opinion summarization is crucial as it considers individual user interests while generating product summaries. Recent studies show that although large language models demonstrate powerful text summarizati... 详细信息
来源: 评论
DDoS Attack Detection and Mitigation Based on Asynchronous Personalized Federated Learning
收藏 引用
Jisuanji Xuebao/Chinese Journal of computers 2025年 第4期48卷 808-827页
作者: Zhu, Hai-Ting Wei, Ming-Gang Liu, Feng-Ning He, Gao-Feng Zhang, Lu School of Internet of Things Nanjing University of Posts and Telecommunications Nanjing210003 China Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University Nanjing210096 China School of Computer Science Nanjing Audit University Nanjing211815 China
network traffic classification serves as a fundamental component of both network management and cybersecurity, playing a pivotal role in ensuring the stability and security of modern communication infrastructures. Amo... 详细信息
来源: 评论
$k$k-TEVS: A $ k$k-Times E-Voting Scheme on Blockchain With Supervision
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2024年 第3期22卷 2326-2337页
作者: Yang Liu Debiao He Min Luo Lianhai Wang Cong Peng School of Cyber Science and Engineering Wuhan University Wuhan China Institute of Information Technology Shenzhen Institute of Information Technology Shenzhen China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shanghai Technology Innovation Centre of Distributed Privacy-Preserving Artificial Intelligence Matrix Elements Technologies Shanghai China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
The e-vote is regarded as a way to express the opinion that the voters ask for. Actually, the e-vote could be applied wildly like questionnaire, survey and feedback. Moreover, the coexistences of efficiency and securi... 详细信息
来源: 评论