咨询与建议

限定检索结果

文献类型

  • 4,511 篇 会议
  • 3,407 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 7,926 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,322 篇 工学
    • 4,005 篇 计算机科学与技术...
    • 3,158 篇 软件工程
    • 1,357 篇 信息与通信工程
    • 658 篇 电气工程
    • 588 篇 控制科学与工程
    • 531 篇 电子科学与技术(可...
    • 452 篇 网络空间安全
    • 440 篇 生物工程
    • 301 篇 机械工程
    • 233 篇 光学工程
    • 224 篇 仪器科学与技术
    • 188 篇 生物医学工程(可授...
    • 165 篇 安全科学与工程
    • 153 篇 动力工程及工程热...
    • 147 篇 化学工程与技术
    • 129 篇 建筑学
    • 127 篇 交通运输工程
  • 2,306 篇 理学
    • 1,374 篇 数学
    • 504 篇 物理学
    • 478 篇 生物学
    • 425 篇 统计学(可授理学、...
    • 207 篇 系统科学
    • 167 篇 化学
  • 1,340 篇 管理学
    • 818 篇 管理科学与工程(可...
    • 579 篇 图书情报与档案管...
    • 295 篇 工商管理
  • 287 篇 法学
    • 167 篇 社会学
    • 118 篇 法学
  • 156 篇 医学
    • 128 篇 临床医学
  • 116 篇 经济学
    • 116 篇 应用经济学
  • 99 篇 军事学
  • 54 篇 农学
  • 44 篇 教育学
  • 24 篇 文学
  • 23 篇 艺术学

主题

  • 238 篇 feature extracti...
  • 229 篇 semantics
  • 214 篇 cryptography
  • 184 篇 authentication
  • 181 篇 information secu...
  • 163 篇 computational mo...
  • 160 篇 security
  • 151 篇 protocols
  • 144 篇 deep learning
  • 144 篇 accuracy
  • 139 篇 privacy
  • 122 篇 laboratories
  • 122 篇 training
  • 103 篇 data models
  • 102 篇 federated learni...
  • 99 篇 cloud computing
  • 94 篇 servers
  • 92 篇 public key crypt...
  • 92 篇 blockchain
  • 89 篇 data privacy

机构

  • 204 篇 shandong provinc...
  • 179 篇 key laboratory o...
  • 166 篇 school of comput...
  • 151 篇 state key labora...
  • 112 篇 school of comput...
  • 111 篇 school of cyber ...
  • 106 篇 department of co...
  • 98 篇 information secu...
  • 84 篇 key laboratory o...
  • 81 篇 institute of inf...
  • 67 篇 computer network...
  • 67 篇 guangdong provin...
  • 66 篇 university of ch...
  • 64 篇 college of mathe...
  • 64 篇 state grid key l...
  • 63 篇 peng cheng labor...
  • 60 篇 key laboratory o...
  • 59 篇 school of softwa...
  • 57 篇 school of comput...
  • 56 篇 key laboratory o...

作者

  • 55 篇 jianfeng ma
  • 53 篇 yang yang
  • 49 篇 ma jianfeng
  • 45 篇 yixian yang
  • 43 篇 ding yong
  • 41 篇 zheng wei-shi
  • 38 篇 huang qingming
  • 31 篇 cong runmin
  • 31 篇 wang wei
  • 31 篇 zhang huanguo
  • 31 篇 hu yupu
  • 30 篇 xu an wang
  • 30 篇 yang yixian
  • 29 篇 wang bin
  • 28 篇 zhou deyu
  • 27 篇 zhang minqing
  • 27 篇 min-ling zhang
  • 25 篇 xie xiaohua
  • 24 篇 liu xin
  • 23 篇 wang yujue

语言

  • 7,128 篇 英文
  • 536 篇 其他
  • 282 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Computer Network and Information Security"
7926 条 记 录,以下是361-370 订阅
排序:
Graph Prompt Clustering
收藏 引用
IEEE Transactions on Pattern Analysis and Machine Intelligence 2025年 第7期47卷 5794-5805页
作者: Chen, Man-Sheng Lai, Pei-Yuan Liao, De-Zhang Wang, Chang-Dong Lai, Jian-Huang Sun Yat-sen University School of Computer Science and Engineering Guangzhou510275 China Guangxi Zhuang Autonomous Region Information Center Guangxi Key Laboratory of Digital Infrastructure Nanning530219 China Guangdong Key Laboratory of Big Data Analysis and Processing Guangzhou510006 China Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing Beijing100816 China South China Technology Commercialization Center Guangzhou510006 China Guangdong University of Technology School of Information Engineering Guangzhou510006 China Guangdong Key Laboratory of Information Security Technology Guangzhou510033 China Ministry of Education Beijing100044 China
Due to the wide existence of unlabeled graph-structured data (e.g., molecular structures), the graph-level clustering has recently attracted increasing attention, whose goal is to divide the input graphs into several ... 详细信息
来源: 评论
Fiber-based quantum secure direct communication without active polarization compensation
收藏 引用
Science China(Physics,Mechanics & Astronomy) 2022年 第12期65卷 91-96页
作者: Xin Liu Di Luo Guangshen Lin Zihao Chen Chunfeng Huang Shizhuo Li Chengxian Zhang Zhenrong Zhang Kejin Wei Guangxi Key Laboratory for Relativistic Astrophysics School of Physical Science and TechnologyGuangxi UniversityNanning530004China Guangxi Key Laboratory of Multimedia Communications and Network Technology School of ComputerElectronicsand InformationGuangxi UniversityNanning530004China
Quantum secure direct communication(QSDC)that allows people to directly transmit confidential information through insecure channels is an important branch of quantum *** widespread adoption of the QSDC demands the dev... 详细信息
来源: 评论
Temporal Refinement Graph Convolutional network for Skeleton-Based Action Recognition
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第4期5卷 1586-1598页
作者: Zhuang, Tianming Qin, Zhen Ding, Yi Deng, Fuhu Chen, Leduo Qin, Zhiguang Raymond Choo, Kim-Kwang University of Electronic Science and Technology of China Network and Data Security Key Laboratory of Sichuan Province Chengdu Sichuan610054 China University of Electronic Science and Technology of China School of Information and Software Engineering Chengdu Sichuan610054 China School of Advanced Technology Suzhou Jiangsu215123 China University of Texas at San Antonio Department of Information Systems and Cyber Security San AntonioTX78249 United States
Human skeleton data, which has served in the aspect of human activity recognition, ought to be the most representative biometric characteristics due to its intuitivity and visuality. The state-of-the-art approaches ma... 详细信息
来源: 评论
Method and system of power load classification and decomposition based on deep learning  4
Method and system of power load classification and decomposi...
收藏 引用
4th International Conference on Smart Grid and Energy Engineering, SGEE 2023
作者: Sun, Hao Yuan, Hongtai Geng, Yudong Chen, Jing Zhang, Chuanfu Li, Wen Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
This paper introduces a system for the classification and decomposition of electrical loads, addressing the shortcomings of current non-intrusive load decomposition methods that are prone to errors. We propose a metho... 详细信息
来源: 评论
A Global Task Scheduling Method Based on network Measurement and Prediction in Computing Power networks  29
A Global Task Scheduling Method Based on Network Measurement...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Zhang, Chuanfu Li, Wen Chen, Jing Ge, Jing Wang, Di Li, Na Sun, Hao Geng, Yudong Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
To improve the task scheduling efficiency in computing power networks, this paper proposes a global task scheduling method based on network measurement and prediction in computing power networks (GTS-MP), which select... 详细信息
来源: 评论
Self-Paced Self-Training Based on K-Nearest Neighbors  4
Self-Paced Self-Training Based on K-Nearest Neighbors
收藏 引用
4th International Conference on Machine Learning and computer Application, ICMLCA 2023
作者: Ma, Yongzheng Sun, Zhengkai Zhang, Yintong Guan, Hongjiao Qiao, Xinxiao Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Self-training is a classical semi-supervised classification method, which iteratively trains labeled samples that are enhanced using unlabeled samples. However, traditional self-training selects pseudo-labeled example... 详细信息
来源: 评论
Research on Low-Light Image Enhancement method based on UNet  5
Research on Low-Light Image Enhancement method based on UNet
收藏 引用
5th International Conference on Telecommunications, Optics, and computer Science, TOCS 2024
作者: Zhu, Fuyu Fei, Rong Ji, Chengjie School of Computer Science and Engineering Xi'an University of Technology Xi'an China Shannxi Key Laboratory for Network Computing and Security Technology Xi'an University of Technology Xi'an China
As technology develops continuously, digital images are being applied more and more extensively in daily life. Digital images are mainly divided into two categories: one is the images obtained by photosensitive device... 详细信息
来源: 评论
General Simultaneous Localization and Mapping Scheme for mmWave Communication Systems
收藏 引用
IEEE Internet of Things Journal 2024年 第12期11卷 22521-22536页
作者: Du, Tao Yang, Jie Wen, Chao-Kai Xia, Shuqiang Jin, Shi Southeast University National Mobile Communications Research Laboratory Nanjing210096 China Southeast University Key Laboratory Of Measurement And Control Of Complex Systems Of Engineering Ministry Of Education The Frontiers Science Center For Mobile Information Communication And Security Nanjing210096 China Institute Of Communications Engineering National Sun Yat-sen University Kaohsiung80424 Taiwan Zte Corporation The State Key Laboratory Of Mobile Network And Mobile Multimedia Technology Shenzhen518055 China Southeast University National Mobile Communications Research Laboratory The Frontiers Science Center For Mobile Information Communication And Security Nanjing210096 China
Utilizing high-resolution antenna arrays and wide bandwidth of the millimeter-wave (mmWave) spectrum in 5G new radio (NR) mmWave communication systems holds the potential for high-throughput data transmission while en... 详细信息
来源: 评论
Research on Classroom Behavior Target Detection Algorithm based on YOLOv7  6
Research on Classroom Behavior Target Detection Algorithm ba...
收藏 引用
6th IEEE Advanced information Management, Communicates, Electronic and Automation Control Conference, IMCEC 2024
作者: Qiu, Wenke Wu, Xiaoming Liu, Xiangzhi Computer Science and Qilu University of Technology Shandong Academy of Sciences ShanDong Jinan China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
The integration of video information for the purpose of detecting students' behavior in the classroom, with the aim of enhancing teaching efficiency and maintaining a stable classroom environment, offers significa... 详细信息
来源: 评论
A two-path fiber-optic AE demodulation algorithm based on Numerically Stable Direct Least Squares Fitting of Ellipses
收藏 引用
Journal of Lightwave Technology 2025年
作者: Li, Xinhao Zhang, Faxiang Sun, Zhihui Jiang, Shaodong Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
The 3 × 3 coupler demodulation algorithm commonly employs ellipse fitting algorithms (EFAs) to eliminate coupler asymmetry. In the detection scenario of fiber-optic acoustic emission (AE) sensor arrays, the amoun... 详细信息
来源: 评论