咨询与建议

限定检索结果

文献类型

  • 1,702 篇 会议
  • 1,349 篇 期刊文献

馆藏范围

  • 3,051 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,017 篇 工学
    • 1,493 篇 计算机科学与技术...
    • 1,173 篇 软件工程
    • 546 篇 信息与通信工程
    • 275 篇 电气工程
    • 214 篇 电子科学与技术(可...
    • 208 篇 控制科学与工程
    • 199 篇 生物工程
    • 134 篇 机械工程
    • 127 篇 网络空间安全
    • 98 篇 仪器科学与技术
    • 97 篇 光学工程
    • 89 篇 生物医学工程(可授...
    • 67 篇 交通运输工程
    • 65 篇 化学工程与技术
    • 64 篇 动力工程及工程热...
    • 54 篇 安全科学与工程
    • 42 篇 建筑学
  • 920 篇 理学
    • 532 篇 数学
    • 219 篇 生物学
    • 199 篇 物理学
    • 165 篇 统计学(可授理学、...
    • 82 篇 系统科学
    • 75 篇 化学
  • 565 篇 管理学
    • 344 篇 管理科学与工程(可...
    • 244 篇 图书情报与档案管...
    • 124 篇 工商管理
  • 94 篇 法学
    • 60 篇 社会学
  • 72 篇 医学
    • 59 篇 临床医学
    • 51 篇 基础医学(可授医学...
  • 51 篇 经济学
    • 51 篇 应用经济学
  • 31 篇 农学
  • 22 篇 军事学
  • 11 篇 教育学
  • 10 篇 文学
  • 9 篇 艺术学

主题

  • 135 篇 feature extracti...
  • 118 篇 semantics
  • 94 篇 accuracy
  • 76 篇 computational mo...
  • 75 篇 training
  • 64 篇 data models
  • 59 篇 deep learning
  • 59 篇 federated learni...
  • 45 篇 protocols
  • 45 篇 cryptography
  • 44 篇 neural networks
  • 44 篇 privacy
  • 42 篇 robustness
  • 41 篇 security
  • 40 篇 predictive model...
  • 40 篇 visualization
  • 40 篇 adaptation model...
  • 39 篇 data mining
  • 39 篇 authentication
  • 38 篇 optimization

机构

  • 225 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 162 篇 school of comput...
  • 83 篇 key laboratory o...
  • 67 篇 computer network...
  • 67 篇 college of compu...
  • 58 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 52 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 44 篇 institute of inf...
  • 41 篇 school of comput...
  • 39 篇 fujian provincia...
  • 37 篇 school of cyber ...
  • 36 篇 university of ch...
  • 36 篇 shandong provinc...
  • 35 篇 key laboratory o...
  • 31 篇 fujian key labor...

作者

  • 48 篇 zhao yao
  • 37 篇 zhou deyu
  • 28 篇 zhang min-ling
  • 26 篇 cong runmin
  • 26 篇 yang yang
  • 26 篇 min-ling zhang
  • 26 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 20 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 du bo
  • 18 篇 liu ximeng
  • 17 篇 geng xin
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 16 篇 zhenrong zhang
  • 16 篇 di xiaoqiang
  • 16 篇 xia chunhe
  • 15 篇 xiangzhi liu

语言

  • 2,708 篇 英文
  • 237 篇 其他
  • 120 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Intergration"
3051 条 记 录,以下是691-700 订阅
排序:
A New Collaborative Scheduling Mechanism Based on Grading Mapping for Resource Balance in Distributed Object Cloud Storage System  16th
A New Collaborative Scheduling Mechanism Based on Grading Ma...
收藏 引用
16th EAI International Conference on Collaborative Computing: networking, Applications, and Worksharing, CollaborateCom 2020
作者: Lu, Yu Chen, Ningjiang Pu, Wenjuan Wang, Ruifeng School of Computer and Electronic Information Guangxi University Nanning530004 China Guangxi Key Laboratory of Multimedia Communications and Network Technology Nanning530004 China
An algorithmic mapping of storage locations brings high storage efficiency to the storage system, but the loss of efficient scheduling makes systems prone to crashing at low usage. This paper uses the Ceph storage sys... 详细信息
来源: 评论
Task allocation based on profit maximization for mobile crowdsourcing
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2020年 第1期27卷 26-37页
作者: Hou Yinglin Cheng Weiqing School of Computer Science Nanjing University of Posts and TelecommunicationsNanjing 210023China Key Laboratory of Computer Network and Information Integration Southeast UniversityNanjing 211189China
In recent years, with the development of smart devices, mobile users can use them to sense the environment. In order to improve the data quality and achieve maximum profits, incentive mechanism is needed to motivate u... 详细信息
来源: 评论
SFTA: Spiking Neural networks Vulnerable to Spiking Feature Transferable Attack
SFTA: Spiking Neural Networks Vulnerable to Spiking Feature ...
收藏 引用
IEEE International Symposium on Parallel and Distributed Processing with Applications and IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC)
作者: Xuanwei Lin Chen Dong Ximeng Liu College of Computer and Data Science Fuzhou University Fujian Key Laboratory of Network Computing and Intelligent Information Processing (Fuzhou University) Key Lab of Information Security of Network Systems (Fuzhou University)
Many recent works have shown that spiking neural networks (SNNs) are vulnerable to well-crafted adversarial attacks in the white-box setting, which may lead to misclassification of the trained model. However, the info... 详细信息
来源: 评论
A High-Dimensional Temporal Data Publishing Method Based on Dynamic Bayesian networks and Differential Privacy
A High-Dimensional Temporal Data Publishing Method Based on ...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Yaxin Wang Zhen Zhang Heng Qian Yongchao Gao Qiuyue Wang Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Massive high-dimensional data generated by the Internet typically contains sensitive privacy information. Protecting data privacy while maintaining utility has become a pressing challenge. We propose a novel high-dime... 详细信息
来源: 评论
ESNet: evolution and succession network for high-resolution salient object detection  24
ESNet: evolution and succession network for high-resolution ...
收藏 引用
Proceedings of the 41st International Conference on Machine Learning
作者: Hongyu Liu Runmin Cong Hua Li Qianqian Xu Qingming Huang Wei Zhang Institute of Information Science Beijing Jiaotong University & Beijing Key Laboratory of Advanced Information Science and Network Technology Beijing China School of Control Science and Engineering Shandong University & Key Laboratory of Machine Intelligence and System Control Ministry of Education Jinan China School of Computer Science and Technology Hainan University Hainan China Key Laboratory of Intelligent Information Processing Institute of Computing Technology CAS Beijing China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China
Preserving details and avoiding high computational costs are the two main challenges for the High-Resolution Salient Object Detection (HRSOD) task. In this paper, we propose a two-stage HRSOD model from the perspectiv...
来源: 评论
DW-MLSR: Unsupervised Deformable Medical Image Registration Based on Dual-Window Attention and Multi-Latent Space
SSRN
收藏 引用
SSRN 2024年
作者: Huang, YuXuan Yin, MengXiao Zhong, Cheng Li, ZhiPan Yang, Feng School of Computer and Electronic Information Guangxi University Nanning530004 China Guangxi Key Laboratory of Multimedia Communications Network Technology Guangxi University Guangxi Nanning530004 China Key Laboratory of Parallel Distributed and Intelligent Computing of Guangxi Universities and Colleges Nanning530004 China
Thanks to the emergence of transformers and Vision Transformer (VIT), attention mechanisms have also been applied to medical image registration. However, the current attention mechanisms in medical image registration ... 详细信息
来源: 评论
Multi-Signal Fusion of Social Diffusion Graph with Bi-Directional Semantic Consistency
Multi-Signal Fusion of Social Diffusion Graph with Bi-Direct...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Huacheng Li Chunhe Xia Tianbo Wang Wanshuang Lin Changnan Jiang Chen Chen Yuan Zhao Key Laboratory of Beijing Network Technology Beihang University Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing Guangxi Normal University School of Cyber Science and Technology Beihang University Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai
Devising diffusion graph to learn user representations is a crucial step in studying information propagation prediction. However, previous works mainly focused on structural and temporal features. To better incorporat...
来源: 评论
Continuous Contrastive Learning for Long-Tailed Semi-Supervised Recognition
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Zi-Hao Fang, Siyuan Zhou, Zi-Jing Wei, Tong Wan, Yuanyu Zhang, Min-Ling School of Computer Science and Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education China Xiaomi Inc. China School of Software Technology Zhejiang University Ningbo China
Long-tailed semi-supervised learning poses a significant challenge in training models with limited labeled data exhibiting a long-tailed label distribution. Current state-of-the-art LTSSL approaches heavily rely on hi... 详细信息
来源: 评论
Establishing Multi-Party Trust Architecture for DRM by Using Game-Theoretic Analysis of Security Policies
收藏 引用
Chinese Journal of Electronics 2023年 第3期18卷 519-524页
作者: Zhiyong Zhang Qingqi Pei Jianfeng Ma Lin Yang Ministry of Education Key Laboratory of Computer Network and Information Security Xidian University Xi'an China Electronic and Information Engineering College Henan University of Science and Technology Luoyang China The Research Institute China Electronic Equipment and Systems Engineering Corporation Beijing China
A successful transaction of digital contents is primarily dependent on security policies, trust mechanisms and benefits balances, as well as the simple adoption of the combination of enhanced security policies would n... 详细信息
来源: 评论
Symbiosis Rather Than Aggregation: Towards Generalized Federated Learning via Model Symbiosis
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Liu, Yuange Liu, Yuru Zhang, Weishan Zheng, Chaoqun Jiang, Wei Luo, Daobin Qiao, Qiao Meng, Lingzhao Zhao, Hongwei Yang, Su College of Computer Science and Technology Qingdao266580 China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan250014 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Jinan250014 China Information Science Academy of China Electronics Technology Group Corporation Beijing100036 China Fudan University School of Computer Science Shanghai200433 China
Federated Learning (FL) faces significant challenges in scenarios with non-IID (non-independent and identically distributed) data distributions across participating clients. Traditional aggregation-based approaches of... 详细信息
来源: 评论