咨询与建议

限定检索结果

文献类型

  • 1,706 篇 会议
  • 1,361 篇 期刊文献

馆藏范围

  • 3,067 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,032 篇 工学
    • 1,508 篇 计算机科学与技术...
    • 1,173 篇 软件工程
    • 552 篇 信息与通信工程
    • 278 篇 电气工程
    • 221 篇 控制科学与工程
    • 220 篇 电子科学与技术(可...
    • 200 篇 生物工程
    • 136 篇 机械工程
    • 129 篇 网络空间安全
    • 98 篇 仪器科学与技术
    • 96 篇 光学工程
    • 89 篇 生物医学工程(可授...
    • 66 篇 交通运输工程
    • 65 篇 动力工程及工程热...
    • 65 篇 化学工程与技术
    • 53 篇 安全科学与工程
    • 43 篇 建筑学
  • 921 篇 理学
    • 535 篇 数学
    • 218 篇 生物学
    • 198 篇 物理学
    • 166 篇 统计学(可授理学、...
    • 83 篇 系统科学
    • 75 篇 化学
  • 567 篇 管理学
    • 345 篇 管理科学与工程(可...
    • 246 篇 图书情报与档案管...
    • 124 篇 工商管理
  • 93 篇 法学
    • 59 篇 社会学
  • 72 篇 医学
    • 59 篇 临床医学
    • 51 篇 基础医学(可授医学...
  • 51 篇 经济学
    • 51 篇 应用经济学
  • 30 篇 农学
  • 22 篇 军事学
  • 11 篇 教育学
  • 10 篇 文学
  • 10 篇 艺术学

主题

  • 136 篇 feature extracti...
  • 118 篇 semantics
  • 94 篇 accuracy
  • 76 篇 computational mo...
  • 75 篇 training
  • 64 篇 data models
  • 62 篇 federated learni...
  • 61 篇 deep learning
  • 45 篇 protocols
  • 45 篇 privacy
  • 45 篇 cryptography
  • 44 篇 neural networks
  • 43 篇 security
  • 42 篇 robustness
  • 40 篇 predictive model...
  • 40 篇 visualization
  • 40 篇 adaptation model...
  • 39 篇 data mining
  • 39 篇 authentication
  • 38 篇 optimization

机构

  • 228 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 164 篇 school of comput...
  • 84 篇 key laboratory o...
  • 69 篇 college of compu...
  • 66 篇 computer network...
  • 60 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 52 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 44 篇 institute of inf...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 37 篇 fujian provincia...
  • 37 篇 shandong provinc...
  • 36 篇 key laboratory o...
  • 36 篇 university of ch...
  • 33 篇 fujian key labor...

作者

  • 48 篇 zhao yao
  • 37 篇 zhou deyu
  • 30 篇 zhang min-ling
  • 27 篇 min-ling zhang
  • 26 篇 cong runmin
  • 26 篇 yang yang
  • 25 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 21 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 du bo
  • 18 篇 liu ximeng
  • 17 篇 geng xin
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 16 篇 zhenrong zhang
  • 16 篇 di xiaoqiang
  • 16 篇 xia chunhe
  • 15 篇 xiangzhi liu

语言

  • 2,708 篇 英文
  • 250 篇 其他
  • 123 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Intergration"
3067 条 记 录,以下是621-630 订阅
排序:
A Knowledge Distillation-Driven Lightweight CNN Model for Detecting Malicious Encrypted network Traffic
A Knowledge Distillation-Driven Lightweight CNN Model for De...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Yuecheng Wen Xiaohui Han Wenbo Zuo Weihua Liu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Quancheng Provincial Laboratory Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
In the realm of cybersecurity, efficiently and precisely identifying and mitigating potential threats from malicious encrypted traffic is crucial. As deep learning evolves, methods relying on Convolutional Neural Netw... 详细信息
来源: 评论
SyntaxBridge: Protocol Description Transformer for Enhanced Formal Analysis of Security Protocols
SyntaxBridge: Protocol Description Transformer for Enhanced ...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Liujia Cai Tong Yu Yumeng Li Siqi Lu Hanjie Dong Guangying Cai Guangong Li Yongjuan Wang Henan Key Laboratory of Network Cryptography Technology Information Engineering University Zhengzhou China School of Information and Communication Engineering Hainan University Haikou China School of Computer Science and Artificial Intelligence Zhengzhou University Zhengzhou China
Currently, formal analysis of security protocols under the symbolic model has become a crucial approach in the field of protocol analysis, owing to its intuitiveness and universality. However, researchers using variou... 详细信息
来源: 评论
LIFT+: Lightweight Fine-Tuning for Long-Tail Learning
arXiv
收藏 引用
arXiv 2025年
作者: Shi, Jiang-Xin Wei, Tong Li, Yu-Feng National Key Laboratory for Novel Software Technology Nanjing University Nanjing210023 China School of Artificial Intelligence Nanjing University Nanjing210023 China School of Computer Science and Engineering Southeast University Nanjing210096 China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education China
The fine-tuning paradigm has emerged as a prominent approach for addressing long-tail learning tasks in the era of foundation models. However, the impact of fine-tuning strategies on long-tail learning performance rem...
来源: 评论
PTGFI: A Prompt-Based Two-Stage Generative Framework for Function Name Inference
PTGFI: A Prompt-Based Two-Stage Generative Framework for Fun...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Menglu Wang Xiaohui Han Peipei Wang Wenbo Zuo Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Quan Cheng Laboratory Jinan China
In the field of cybersecurity, analyzing malicious software or programs is crucial for preventing network attacks. Malicious code often exists in a stripped binary form to thwart analysis, presenting challenges for an... 详细信息
来源: 评论
SyntaxBridge: Protocol Description Transformer for Enhanced Formal Analysis of Security Protocols  23
SyntaxBridge: Protocol Description Transformer for Enhanced ...
收藏 引用
23rd IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024
作者: Cai, Liujia Yu, Tong Li, Yumeng Lu, Siqi Dong, Hanjie Cai, Guangying Li, Guangong Wang, Yongjuan Information Engineering University Henan Key Laboratory of Network Cryptography Technology Zhengzhou China Hainan University School of Information and Communication Engineering Haikou China Zhengzhou University School of Computer Science and Artificial Intelligence Zhengzhou China
Currently, formal analysis of security protocols under the symbolic model has become a crucial approach in the field of protocol analysis, owing to its intuitiveness and universality. However, researchers using variou... 详细信息
来源: 评论
A Deep Learning-Based Algorithm for Energy and Performance Optimization of Computational Offloading in Mobile Edge Computing
收藏 引用
Wireless Communications and Mobile Computing 2023年 第1期2023卷
作者: Khan, Israr Raza, Salman Rehman, Waheed Ur Khan, Razaullah Nahida, Kiran Tao, Xiaofeng National Engineering Laboratory for Mobile Network Technologies Beijing University of Posts and Telecommunications Beijing100876 China Department of Computer Science National Textile University Faisalabad Pakistan Department of Computer Science University of Peshawar Peshawar Pakistan Department of Computer Science University of Engineering and Technology Mardan Pakistan Beijing Laboratory of Advanced Information Network Beijing Key Laboratory of Network System Architecture and Convergence Beijing University of Posts and Telecommunications China
Mobile edge computing (MEC) has produced incredible outcomes in the context of computationally intensive mobile applications by offloading computation to a neighboring server to limit the energy usage of user equipmen... 详细信息
来源: 评论
TPMARL-MSS Thought-Perception Multi-Agent Reinforcement Learning Meeting Scheduling System  25
TPMARL-MSS Thought-Perception Multi-Agent Reinforcement Lear...
收藏 引用
25th IEEE International Conferences on High Performance Computing and Communications, 9th International Conference on Data Science and Systems, 21st IEEE International Conference on Smart City and 9th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC/DSS/SmartCity/DependSys 2023
作者: Zhang, Jinsong Mao, Xiaoxuan Li, Lu Wu, Hanqian Joint Graduate School Southeast University Nanjing China College of Software Engineering Southeast University Nanjing China School of Cyber Science and Engineering Southeast University Nanjing China School of Cyber Science and Engineering Southeast University Key Laboratory of Computer Network and Information Integration of Ministry of Education Nanjing China
In today's evolving society, the increasing complexity and frequency of meetings necessitate advanced scheduling systems. Traditional methods are constrained by rigid prede-fined strategies, lack intelligent negot... 详细信息
来源: 评论
Coronavirus Pandemic Analysis Through Tripartite Graph Clustering in Online Social networks
收藏 引用
Big Data Mining and Analytics 2021年 第4期4卷 242-251页
作者: Xueting Liao Danyang Zheng Xiaojun Cao Department of Computer Science Georgia State UniversityAtlantaGA 30302USA Suzhou Key Laboratory of Advanced Optical Communication Network Technology School of Electronic and Information EngineeringSoochow UniversitySuzhou 215006China
The COVID-19 pandemic has hit the world *** reaction to the pandemic related issues has been pouring into social platforms,such as *** public officials and governments use Twitter to make policy *** keep close track o... 详细信息
来源: 评论
Video Summarization Method Integrating Universal Demand Elements
SSRN
收藏 引用
SSRN 2024年
作者: Tong, Jianglei Gui, Xiaolin Teng, Xiaoyu Faculty of Electronic and Information Engineering Xi'an Jiaotong University Xi'An710049 China Shaanxi Province Key Laboratory of Computer Network Xi'An710049 China School of Information Xi'an University of Finance and Economics Xi'An710100 China
Given the lack of linkage between demand analysis and video elements in current video summary algorithms, it is difficult to cover user needs with summary results. In this paper, a video summary method integrating uni... 详细信息
来源: 评论
A Real-time Cutting Model Based on Finite Element and Order Reduction
收藏 引用
computer Systems Science & Engineering 2022年 第10期43卷 1-15页
作者: Xiaorui Zhang Wenzheng Zhang Wei Sun Hailun Wu Aiguo Song Sunil Kumar Jha Wuxi Research Institute Nanjing University of Information Science&TechnologyWuxi214100China Engineering Research Center of Digital Forensics Ministry of EducationJiangsu Engineering Center of Network MonitoringSchool of Computer and SoftwareNanjing University of Information Science&TechnologyNanjing210044China School of Automation Nanjing University of Information Science&TechnologyNanjing210044China State Key Laboratory of Bioelectronics Jiangsu Key Lab of Remote Measurement and ControlSchool of Instrument Science and EngineeringSoutheast UniversityNanjing210096China IT Fundamentals and Education Technologies Applications University of Information Technology and Management in RzeszowRzeszow Voivodeship100031Poland
Telemedicine plays an important role in Corona Virus Disease 2019(COVID-19).The virtual surgery simulation system,as a key component in telemedicine,requires to compute in ***,this paper proposes a realtime cutting mo... 详细信息
来源: 评论