咨询与建议

限定检索结果

文献类型

  • 1,702 篇 会议
  • 1,349 篇 期刊文献

馆藏范围

  • 3,051 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,017 篇 工学
    • 1,493 篇 计算机科学与技术...
    • 1,173 篇 软件工程
    • 546 篇 信息与通信工程
    • 275 篇 电气工程
    • 214 篇 电子科学与技术(可...
    • 208 篇 控制科学与工程
    • 199 篇 生物工程
    • 134 篇 机械工程
    • 127 篇 网络空间安全
    • 98 篇 仪器科学与技术
    • 97 篇 光学工程
    • 89 篇 生物医学工程(可授...
    • 67 篇 交通运输工程
    • 65 篇 化学工程与技术
    • 64 篇 动力工程及工程热...
    • 54 篇 安全科学与工程
    • 42 篇 建筑学
  • 920 篇 理学
    • 532 篇 数学
    • 219 篇 生物学
    • 199 篇 物理学
    • 165 篇 统计学(可授理学、...
    • 82 篇 系统科学
    • 75 篇 化学
  • 565 篇 管理学
    • 344 篇 管理科学与工程(可...
    • 244 篇 图书情报与档案管...
    • 124 篇 工商管理
  • 94 篇 法学
    • 60 篇 社会学
  • 72 篇 医学
    • 59 篇 临床医学
    • 51 篇 基础医学(可授医学...
  • 51 篇 经济学
    • 51 篇 应用经济学
  • 31 篇 农学
  • 22 篇 军事学
  • 11 篇 教育学
  • 10 篇 文学
  • 9 篇 艺术学

主题

  • 135 篇 feature extracti...
  • 118 篇 semantics
  • 94 篇 accuracy
  • 76 篇 computational mo...
  • 75 篇 training
  • 64 篇 data models
  • 59 篇 deep learning
  • 59 篇 federated learni...
  • 45 篇 protocols
  • 45 篇 cryptography
  • 44 篇 neural networks
  • 44 篇 privacy
  • 42 篇 robustness
  • 41 篇 security
  • 40 篇 predictive model...
  • 40 篇 visualization
  • 40 篇 adaptation model...
  • 39 篇 data mining
  • 39 篇 authentication
  • 38 篇 optimization

机构

  • 225 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 162 篇 school of comput...
  • 83 篇 key laboratory o...
  • 67 篇 computer network...
  • 67 篇 college of compu...
  • 58 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 52 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 44 篇 institute of inf...
  • 41 篇 school of comput...
  • 39 篇 fujian provincia...
  • 37 篇 school of cyber ...
  • 36 篇 university of ch...
  • 36 篇 shandong provinc...
  • 35 篇 key laboratory o...
  • 31 篇 fujian key labor...

作者

  • 48 篇 zhao yao
  • 37 篇 zhou deyu
  • 28 篇 zhang min-ling
  • 26 篇 cong runmin
  • 26 篇 yang yang
  • 26 篇 min-ling zhang
  • 26 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 20 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 du bo
  • 18 篇 liu ximeng
  • 17 篇 geng xin
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 16 篇 zhenrong zhang
  • 16 篇 di xiaoqiang
  • 16 篇 xia chunhe
  • 15 篇 xiangzhi liu

语言

  • 2,708 篇 英文
  • 237 篇 其他
  • 120 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Intergration"
3051 条 记 录,以下是671-680 订阅
排序:
BEW-YOLO: An Improved Method for PCB Defect Detection Based on YOLOv7
BEW-YOLO: An Improved Method for PCB Defect Detection Based ...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Zhiyao Li Aimin Li Yuechen Zhang Xiaotong Kong Wenqiang Li Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
The PCB defect object size is small and the detection process is susceptible to background interference, usually have the problem of missed and false detection. In order to solve the above problems, an improved method...
来源: 评论
Vulnerable Smart Contract Function Locating Based on Multi-Relational Nested Graph Convolutional network
arXiv
收藏 引用
arXiv 2023年
作者: Liu, Haiyang Fan, Yuqi Feng, Lin Wei, Zhenchun School of Computer Science and Information Engineering Anhui Province Key Laboratory of Industry Safety and Emergency Technology Hefei University of Technology Hefei230601 China Anhui Provincial Key Laboratory of Network and Information Security Anhui Normal Unviersity Wuhu241002 China
The immutable and trustable characteristics of blockchain enable smart contracts to be applied in various fields. Unfortunately, smart contracts are subject to various vulnerabilities, which are frequently exploited b... 详细信息
来源: 评论
SCESP: An Edge Server Placement Method Based on Spectral Clustering in Mobile Edge Computing  8th
SCESP: An Edge Server Placement Method Based on Spectral Cl...
收藏 引用
8th International Conference on Artificial Intelligence and Security , ICAIS 2022
作者: Wang, Lijuan Guo, Yingya Yao, Jiangyuan Zhou, Siyu College of Computer and Data Science Fuzhou University Fuzhou350000 China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou350000 China Key Laboratory of Spatial Data Mining and Information Sharing Ministry of Education Fuzhou350003 China School of Computer Science and Cyberspace Security Hainan University Haikou570228 China Tandon School of Engineering New York University New York10012 United States
With the rapid development of Internet of Things (IoT) and 5G, mobile edge computing is gaining popularity for its low computation latency, bandwidth costs and energy consumption. In mobile edge computing, the placeme... 详细信息
来源: 评论
CTI-JE: A Joint Extraction Framework of Entities and Relations in Unstructured Cyber Threat Intelligence
CTI-JE: A Joint Extraction Framework of Entities and Relatio...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Yang Liu Xiaohui Han Wenbo Zuo Haiqing Lv Jing Guo Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Quan Cheng Laboratory Jinan China Information Research Institute Qilu University of Technology(Shandong Academy of Sciences) Jinan China
Advanced Persistent Threat (APT) pose an increasingly serious challenge to the security of businesses and organizations. In order to cope with these threats more effectively, effective utilization of cybers threat int... 详细信息
来源: 评论
Self-temperature compensation approach for fiber specklegram magnetic field sensor based on polarization specklegram analysis  8
Self-temperature compensation approach for fiber specklegram...
收藏 引用
8th Symposium on Novel Photoelectronic Detection Technology and Applications
作者: Hu, Shicheng Liu, Haifeng Liu, Bo Lin, Wei Zhang, Hao Song, Binbin Wu, Jixuan Tianjin Key Laboratory of Micro-Scale Optical Information Science and Technology Institute of Modern Optics Nankai University Tianjin300350 China Tianjin Key Laboratory of Optoelectronic Sensor and Sensing Network Technology Institute of Modern Optics Nankai University Tianjin300350 China Southern Marine Science and Engineering Guangdong Laboratory Zhuhai519000 China Key Laboratory of Computer Vision and Systems Ministry of Education School of Computer Science and Engineering Tianjin University of Technology Tianjin300384 China Tianjin Key Laboratory of Optoelectronic Detection Technology and Systems College of Electronic and Information Engineering Tianjin Polytechnic University Tianjin300387 China
In this letter, we proposed a self-temperature-compensation approach for fiber specklegram sensor (FSS) based on polarization specklegram analysis. The temperature compensation is achieved by comparing the variation d... 详细信息
来源: 评论
Federated Online/Offline Remote Data Inspection for Distributed Edge Computing
arXiv
收藏 引用
arXiv 2023年
作者: Ali, Mohammad Liu, Ximeng The Department of Mathematics and Computer Science Amirkabir University of Technology Tehran Iran The Key Laboratory of Information Security of Network Systems College of Computer and Data Science Fuzhou University Fuzhou350108 China
In edge computing environments, app vendors can cache their data to be shared with their users in many geographically distributed edge servers. However, the cached data is particularly vulnerable to several intentiona... 详细信息
来源: 评论
Privacy-Preserving IoT Image Transmission: Multi-Stage SVD Data Embedding and Heatmap Alignment
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Du, Kaixin Ma, Bin Yang, Meihong Wang, Xiaoyu Li, Xiaolong Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250101 China Beijing Jiaotong University School of Computer and Information Technology Beijing100044 China
The images transmitted by IoT devices, particularly those used for surveillance or sensor data, are vulnerable to malicious screenshots and unauthorized access, leading to potential privacy breaches. To address this, ... 详细信息
来源: 评论
Grouped Federated Meta-Learning for Privacy-Preserving Rare Disease Diagnosis
Grouped Federated Meta-Learning for Privacy-Preserving Rare ...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Xinru Song Feng Wu Zongchao Xie Longxiang Gao Lei Cui Youyang Qu Shujun Gu Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China School of Computer Science University of Technology Sydney Australia Faculty of Science University of Melbourne Australia
Federated learning (FL) has been widely applied in medical field, which allows clients to collaboratively train global models without sharing local data. Nevertheless, the diversity and scarcity of samples from rare d... 详细信息
来源: 评论
Towards Few-Shot Learning in the Open World: A Review and Beyond
arXiv
收藏 引用
arXiv 2024年
作者: Xue, Hui An, Yuexuan Qin, Yongchun Li, Wenqian Wu, Yixin Che, Yongjuan Fang, Pengfei Zhang, Min-Ling The School of Computer Science and Engineering Southeast University Nanjing210096 China The Key Laboratory of New Generation Artificial Intelligence Technology and Its Interdisciplinary Applications Southeast University Ministry of Education Nanjing211189 China The Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Nanjing211189 China
Human intelligence is characterized by our ability to absorb and apply knowledge from the world around us, especially in rapidly acquiring new concepts from minimal examples, underpinned by prior knowledge. Few-shot l... 详细信息
来源: 评论
Color and Feature Space Classification Methods Solve the Problem of Covariate Semantic information Deviation in Complex Scene Detection Tasks
Color and Feature Space Classification Methods Solve the Pro...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Mingle Zhou Rui Xing Min Li Delong Han Gang Li Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Shandong SCICOM Information and Economy Research Institute Co. Ltd Jinan China
The field weed detection task under the perspective of Plant Protection UAVs (PPU) is characterized by multi-scale targets and rich background semantic information, which belongs to the target detection task in comple... 详细信息
来源: 评论