咨询与建议

限定检索结果

文献类型

  • 1,702 篇 会议
  • 1,349 篇 期刊文献

馆藏范围

  • 3,051 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,017 篇 工学
    • 1,493 篇 计算机科学与技术...
    • 1,173 篇 软件工程
    • 546 篇 信息与通信工程
    • 275 篇 电气工程
    • 214 篇 电子科学与技术(可...
    • 208 篇 控制科学与工程
    • 199 篇 生物工程
    • 134 篇 机械工程
    • 127 篇 网络空间安全
    • 98 篇 仪器科学与技术
    • 97 篇 光学工程
    • 89 篇 生物医学工程(可授...
    • 67 篇 交通运输工程
    • 65 篇 化学工程与技术
    • 64 篇 动力工程及工程热...
    • 54 篇 安全科学与工程
    • 42 篇 建筑学
  • 920 篇 理学
    • 532 篇 数学
    • 219 篇 生物学
    • 199 篇 物理学
    • 165 篇 统计学(可授理学、...
    • 82 篇 系统科学
    • 75 篇 化学
  • 565 篇 管理学
    • 344 篇 管理科学与工程(可...
    • 244 篇 图书情报与档案管...
    • 124 篇 工商管理
  • 94 篇 法学
    • 60 篇 社会学
  • 72 篇 医学
    • 59 篇 临床医学
    • 51 篇 基础医学(可授医学...
  • 51 篇 经济学
    • 51 篇 应用经济学
  • 31 篇 农学
  • 22 篇 军事学
  • 11 篇 教育学
  • 10 篇 文学
  • 9 篇 艺术学

主题

  • 135 篇 feature extracti...
  • 118 篇 semantics
  • 94 篇 accuracy
  • 76 篇 computational mo...
  • 75 篇 training
  • 64 篇 data models
  • 59 篇 deep learning
  • 59 篇 federated learni...
  • 45 篇 protocols
  • 45 篇 cryptography
  • 44 篇 neural networks
  • 44 篇 privacy
  • 42 篇 robustness
  • 41 篇 security
  • 40 篇 predictive model...
  • 40 篇 visualization
  • 40 篇 adaptation model...
  • 39 篇 data mining
  • 39 篇 authentication
  • 38 篇 optimization

机构

  • 225 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 162 篇 school of comput...
  • 83 篇 key laboratory o...
  • 67 篇 computer network...
  • 67 篇 college of compu...
  • 58 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 52 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 44 篇 institute of inf...
  • 41 篇 school of comput...
  • 39 篇 fujian provincia...
  • 37 篇 school of cyber ...
  • 36 篇 university of ch...
  • 36 篇 shandong provinc...
  • 35 篇 key laboratory o...
  • 31 篇 fujian key labor...

作者

  • 48 篇 zhao yao
  • 37 篇 zhou deyu
  • 28 篇 zhang min-ling
  • 26 篇 cong runmin
  • 26 篇 yang yang
  • 26 篇 min-ling zhang
  • 26 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 20 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 du bo
  • 18 篇 liu ximeng
  • 17 篇 geng xin
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 16 篇 zhenrong zhang
  • 16 篇 di xiaoqiang
  • 16 篇 xia chunhe
  • 15 篇 xiangzhi liu

语言

  • 2,708 篇 英文
  • 237 篇 其他
  • 120 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Intergration"
3051 条 记 录,以下是581-590 订阅
排序:
DTBNet: medical image segmentation model based on dual transformer bridge
DTBNet: medical image segmentation model based on dual trans...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Kequan Chen Yuli Wang Jinyong Cheng Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center(National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Accurate medical image segmentation [1] techniques help doctors make better diagnoses. The traditional U-Net [2] model usually uses skip connections to directly connect the corresponding layers of the encoder and deco... 详细信息
来源: 评论
TIBS: A Deep-Learning Model for network Intrusion Detection for SDN Environments
TIBS: A Deep-Learning Model for Network Intrusion Detection ...
收藏 引用
International Conference on computers, Communications, and Systems (ICCCS)
作者: Yilin Zhang Xiaoming Wu Huomin Dong Key Laboratory of Computing Power Network and Information Security Shandong Computer Science Center (National Supercomputer Center in Jinan) Ministry of Education Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Software-Defined networking (SDN) is a modern network strategy that replaces traditional network structures. Its management efficiency and convenience are significantly higher than traditional networks. However, it sh... 详细信息
来源: 评论
An Efficient Multi-Layer Indexing Method on Blockchain for Multimodal Data Querying
An Efficient Multi-Layer Indexing Method on Blockchain for M...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Haoyu Jia Xiaoming Wu Shanshan Liu Qile Yuan Bei Qi Xiangzhi Liu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
In the digital society era, the generation frequency of multimodal data is rapidly increasing. Blockchain, recognized as a trusted distributed database technology, provides a new solution for the trustworthy storage a... 详细信息
来源: 评论
Semantic Reconstruction Guided Missing Cross-modal Hashing
Semantic Reconstruction Guided Missing Cross-modal Hashing
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Yafang Li Chaoqun Zheng Ruifan Zuo Wenpeng Lu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Cross-modal hashing is favored in the field of large-scale cross-modal retrieval for its fast query and low storage cost. Existing cross-modal hashing methods are typically based on an idealized assumption that data f... 详细信息
来源: 评论
Cross Auto-Encoder for Inscription Character Inpainting
Cross Auto-Encoder for Inscription Character Inpainting
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Long Zhao Zonglong Yuan Yuhao Lou Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Character inpainting, a challenging task, has seen slow development. Existing networks focus on either enhancing the encoding process, involving feature extraction or improving the decoding process, which revolves aro... 详细信息
来源: 评论
An Adaptive Residual Coordinate Attention-Based network for Hat and Mask Wearing Detection in Kitchen Environments
An Adaptive Residual Coordinate Attention-Based Network for ...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Ying Zhao Xiaoming Wu Xiangzhi Liu Hao Chen Bei Qi Huomin Dong Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
In order to ensure food safety, it is required for personnel to wear hats and masks during food handling processes. To accurately detect the wearing status of kitchen staff, the ARP-YOLO model is proposed. Firstly, im... 详细信息
来源: 评论
Efficient CNN-Transformer Aggregation network for Remote Sensing Image Change Detection
Efficient CNN-Transformer Aggregation Network for Remote Sen...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Bingjie Kong Qinglong Meng Fengqi Hao Jinqiang Bai Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Change detection is a crucial task in the field of remote sensing, focusing on identifying areas where significant changes occur between two remote sensing images captured at different time points. However, existing c... 详细信息
来源: 评论
BTP-CAResNet: An Encrypted Traffic Classification Method Based on Byte Transfer Probability and Coordinate Attention Mechanism
BTP-CAResNet: An Encrypted Traffic Classification Method Bas...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Junhao Li Huiling Shi Wei Zhang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
With the extensive application of network traffic encryption technology, the accurate and efficient classification of encrypted traffic has become a critical need for network management. Deep learning has become the p... 详细信息
来源: 评论
Student Behavior Detection Method Based on Improved YOLOv5 Algorithm
Student Behavior Detection Method Based on Improved YOLOv5 A...
收藏 引用
computer Vision, Image and Deep Learning (CVIDL), International Conference on
作者: Haitao Hu Meihong Yang Ying Guo Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
When using computer vision technology to identify students in the classroom, it will be affected by the inconsistency of the seating layout in different classrooms, the complexity of the background, as well as the exi... 详细信息
来源: 评论
Lightweight Fusion Model with Time-Frequency Features for Speech Emotion Recognition
Lightweight Fusion Model with Time-Frequency Features for Sp...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Peng Zhang Meijuan Li Hui Zhao Yida Chen Fuqiang Wang Ye Li Wei Zhao Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Automatic speech emotion recognition (SER) is the task to predict the emotional state from speech, and has become a vital part of human-machine interaction. Recent studies focus on learning from multiple features via ... 详细信息
来源: 评论