咨询与建议

限定检索结果

文献类型

  • 1,706 篇 会议
  • 1,361 篇 期刊文献

馆藏范围

  • 3,067 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,032 篇 工学
    • 1,508 篇 计算机科学与技术...
    • 1,173 篇 软件工程
    • 552 篇 信息与通信工程
    • 278 篇 电气工程
    • 221 篇 控制科学与工程
    • 220 篇 电子科学与技术(可...
    • 200 篇 生物工程
    • 136 篇 机械工程
    • 129 篇 网络空间安全
    • 98 篇 仪器科学与技术
    • 96 篇 光学工程
    • 89 篇 生物医学工程(可授...
    • 66 篇 交通运输工程
    • 65 篇 动力工程及工程热...
    • 65 篇 化学工程与技术
    • 53 篇 安全科学与工程
    • 43 篇 建筑学
  • 921 篇 理学
    • 535 篇 数学
    • 218 篇 生物学
    • 198 篇 物理学
    • 166 篇 统计学(可授理学、...
    • 83 篇 系统科学
    • 75 篇 化学
  • 567 篇 管理学
    • 345 篇 管理科学与工程(可...
    • 246 篇 图书情报与档案管...
    • 124 篇 工商管理
  • 93 篇 法学
    • 59 篇 社会学
  • 72 篇 医学
    • 59 篇 临床医学
    • 51 篇 基础医学(可授医学...
  • 51 篇 经济学
    • 51 篇 应用经济学
  • 30 篇 农学
  • 22 篇 军事学
  • 11 篇 教育学
  • 10 篇 文学
  • 10 篇 艺术学

主题

  • 136 篇 feature extracti...
  • 118 篇 semantics
  • 94 篇 accuracy
  • 76 篇 computational mo...
  • 75 篇 training
  • 64 篇 data models
  • 62 篇 federated learni...
  • 61 篇 deep learning
  • 45 篇 protocols
  • 45 篇 privacy
  • 45 篇 cryptography
  • 44 篇 neural networks
  • 43 篇 security
  • 42 篇 robustness
  • 40 篇 predictive model...
  • 40 篇 visualization
  • 40 篇 adaptation model...
  • 39 篇 data mining
  • 39 篇 authentication
  • 38 篇 optimization

机构

  • 228 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 164 篇 school of comput...
  • 84 篇 key laboratory o...
  • 69 篇 college of compu...
  • 66 篇 computer network...
  • 60 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 52 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 44 篇 institute of inf...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 37 篇 fujian provincia...
  • 37 篇 shandong provinc...
  • 36 篇 key laboratory o...
  • 36 篇 university of ch...
  • 33 篇 fujian key labor...

作者

  • 48 篇 zhao yao
  • 37 篇 zhou deyu
  • 30 篇 zhang min-ling
  • 27 篇 min-ling zhang
  • 26 篇 cong runmin
  • 26 篇 yang yang
  • 25 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 21 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 du bo
  • 18 篇 liu ximeng
  • 17 篇 geng xin
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 16 篇 zhenrong zhang
  • 16 篇 di xiaoqiang
  • 16 篇 xia chunhe
  • 15 篇 xiangzhi liu

语言

  • 2,708 篇 英文
  • 250 篇 其他
  • 123 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Intergration"
3067 条 记 录,以下是711-720 订阅
排序:
Long-Tail Learning with Foundation Model: Heavy Fine-Tuning Hurts
arXiv
收藏 引用
arXiv 2023年
作者: Jiang-Xin, Shi Tong, Wei Zhi, Zhou Jie-Jing, Shao Xin-Yan, Han Yu-Feng, Li National Key Laboratory for Novel Software Technology Nanjing University China School of Artificial Intelligence Nanjing University China School of Computer Science and Engineering Southeast University China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education China
The fine-tuning paradigm in addressing long-tail learning tasks has sparked significant interest since the emergence of foundation models. Nonetheless, how fine-tuning impacts performance in long-tail learning was not... 详细信息
来源: 评论
TSF-Net:Abnormal Video Behavior Detection Framework Based on Two-Stream Appearance Motion Semantic Fusion  23
TSF-Net:Abnormal Video Behavior Detection Framework Based on...
收藏 引用
Proceedings of the 2023 International Conference on information Education and Artificial Intelligence
作者: Bonan Li Rui Cao Xingang Wang Hong Zhang Jinyan Zhou China Radio and Television Shandong Network Co Ltd China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) China
Video anomalous behavior detection aims to detect rare and random anomalous events, which usually deviate from expectations. Existing detection methods do not consider the appearance semantics and motion semantics of ...
来源: 评论
Resource Allocation for Mutualistic Symbiotic Radio with Hybrid Active-Passive Communications
Resource Allocation for Mutualistic Symbiotic Radio with Hyb...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Hong Guo Yinghui Ye Haijian Sun Liqin Shi Shaanxi Key Laboratory of Information Communication Network and Security Xi'an University of Posts & Telecommunications China School of Electrical and Computer Engineering The University of Georgia Athens GA USA
To address the limitation on the rate of secondary users (SUs) in traditional mutualistic symbiotic radio (SR) systems, this paper proposes a new mutualistic SR with hybrid active-passive communications. Unlike the tr...
来源: 评论
STAD: Joint Spatial-Temporal Dimension and Channel Correlation for Time Series Anomaly Detection
STAD: Joint Spatial-Temporal Dimension and Channel Correlati...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Mingle Zhou Xingli Wang Delong Han Jin Wan Jiachen Li Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China SHANDONG SCICOM Information and Economy Research Institute Co. Ltd
Accurately identifying real anomalies and pseudo-anomalies in complex multi-dimensional time series data has been a difficult problem in time series anomaly detection. To solve this problem, this paper proposes a new ... 详细信息
来源: 评论
DLFaaS:Serverless Platform for Data-Intensive Tasks Based on Interval Access Patterns
DLFaaS:Serverless Platform for Data-Intensive Tasks Based on...
收藏 引用
IEEE/ACM Int'l Conference on & Int'l Conference on Cyber, Physical and Social Computing (CPSCom) Green Computing and Communications (GreenCom)
作者: Yang Cao Wenbin Song Hanqian Wu Shengchao Yuan School of Computer Science and Engineering Southeast University China School of Cyber Science and Engineering Southeast University China Key Laboratory of Computer Network and Information Integration of Ministry of Education Southeast University China
Serverless architecture is a novel paradigm in cloud computing. The increasing trend in applications is shifting towards serverless platforms to achieve on-demand payment and elastic scalability. However, for data-int...
来源: 评论
Adaptive group personalization for federated mutual transfer learning  24
Adaptive group personalization for federated mutual transfer...
收藏 引用
Proceedings of the 41st International Conference on Machine Learning
作者: Haoqing Xu Dian Shen Meng Wang Beilun Wang School of Computer Science and Engineering Southeast University Nanjing China School of Computer Science and Engineering Southeast University Nanjing China and Key Laboratory of Computer Network and Information Integration (Southeast University) Ministry of Education China College of Design and Innovation Tongji University Shanghai China
Mutual transfer learning aims to improve prediction with knowledge from related domains. Recently, federated learning is applied in this field to address the communication and privacy concerns. However, previous clust...
来源: 评论
Revocable Registered Attribute-Based Encryption With User Deregistration
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Li, Jiguo Chen, Shaobo Lu, Yang Ning, Jianting Shen, Jian Zhang, Yichen Fujian Normal University College of Computer and Cyber Security Fuzhou 350117 China Key Laboratory of Analytical Mathematics and Applications (Ministry of Education) Fuzhou 350117 China Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou 350117 China Nanjing Normal University School of Computer and Electronic Information Nanjing 210023 China Fujian Normal University Key Laboratory of Analytical Mathematics and Applications (Ministry of Education) Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fuzhou 350117 China Zhejiang Sci-Tech University School of Information Science and Engineering Hangzhou 310018 China
Many businesses are putting their sensitive data in the cloud with the fast growth of cloud computing and storage. To ensure user privacy, it is necessary to keep encrypted data only in the cloud. Attribute-based encr... 详细信息
来源: 评论
Variable projection algorithms with sparse constraint for separable nonlinear models
收藏 引用
Control Theory and Technology 2024年 第1期22卷 135-146页
作者: Hui-Lang Xu Guang-Yong Chen Si-Qing Cheng Min Gan Jing Chen College of Computer and Data Science Fuzhou UniversityFuzhou350116FujianChina Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou UniversityFuzhou350116FujianChina Key Laboratory of Intelligent Metro of Universities in Fujian Fuzhou UniversityFuzhou350116FujianChina Engineering Research Center of Big Data Intelligence Ministry of EducationFuzhou UniversityFuzhou350116FujianChina School of Science Jiangnan UniversityWuxi214122JiangsuChina
Separable nonlinear models are widely used in various fields such as time series analysis, system modeling, and machine learning, due to their flexible structures and ability to capture nonlinear behavior of data. How... 详细信息
来源: 评论
Integrated Sensing and Communications for 6G: Prospects and Challenges of Using THz Radios
Integrated Sensing and Communications for 6G: Prospects and ...
收藏 引用
IEEE Conference on Wireless Communications and networking
作者: Tingguang Gan Shuping Dang Xiangcheng Li Zhenrong Zhang Guangxi Key Laboratory of Multimedia Communications and Network Technology School of Computer Electronics and Information Guangxi University Nanning China School of Electrical Electronic and Mechanical Engineering University of Bristol Bristol U.K.
The integrated sensing and communication (ISAC), which will power the future sixth generation (6G) of mobile communication, is anticipated to offer smarter and varied services. The functions of communication and sensi... 详细信息
来源: 评论
Hey! You Photographed My Screen without Approved: A Practical Screen Content Protection Scheme Based on Visual Cryptography
Hey! You Photographed My Screen without Approved: A Practica...
收藏 引用
2022 International Conference on networking and network Applications, NaNA 2022
作者: Liu, Kui Wang, Bin Shi, Ziwei Chen, Jiadong Zhang, Zhiwei School of Computer Science and Technology Xidian University Shaanxi Xi’an710071 China Network and Information Security Laboratory Hangzhou Hikvision Digital Technology Co. LTD. Hangzhou China Zhejiang Key Laboratory of Multi-dimensional Perception Technology Application and Cybersecurity Hangzhou310053 China
Nowadays , with the continuous development of digital media, electronic screens have become the most direct tool for people to interact with information. Various styles of electronic screens provide vivid information ... 详细信息
来源: 评论