咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 555 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 1,229 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 785 篇 工学
    • 462 篇 计算机科学与技术...
    • 351 篇 软件工程
    • 303 篇 信息与通信工程
    • 150 篇 电子科学与技术(可...
    • 140 篇 电气工程
    • 81 篇 控制科学与工程
    • 65 篇 网络空间安全
    • 63 篇 光学工程
    • 51 篇 仪器科学与技术
    • 47 篇 机械工程
    • 34 篇 动力工程及工程热...
    • 33 篇 生物工程
    • 27 篇 航空宇航科学与技...
    • 24 篇 交通运输工程
    • 22 篇 建筑学
    • 20 篇 安全科学与工程
    • 17 篇 土木工程
    • 16 篇 化学工程与技术
    • 15 篇 生物医学工程(可授...
  • 327 篇 理学
    • 205 篇 数学
    • 88 篇 物理学
    • 78 篇 统计学(可授理学、...
    • 38 篇 生物学
    • 24 篇 系统科学
    • 17 篇 化学
  • 152 篇 管理学
    • 111 篇 管理科学与工程(可...
    • 48 篇 工商管理
    • 47 篇 图书情报与档案管...
  • 32 篇 法学
    • 22 篇 社会学
  • 17 篇 医学
    • 16 篇 临床医学
  • 13 篇 经济学
  • 9 篇 军事学
  • 4 篇 农学
  • 3 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 58 篇 feature extracti...
  • 51 篇 accuracy
  • 44 篇 cryptography
  • 43 篇 computational mo...
  • 35 篇 semantics
  • 33 篇 wireless sensor ...
  • 29 篇 federated learni...
  • 27 篇 protocols
  • 27 篇 training
  • 26 篇 data models
  • 25 篇 deep learning
  • 25 篇 information secu...
  • 22 篇 authentication
  • 22 篇 privacy
  • 21 篇 neural networks
  • 21 篇 servers
  • 20 篇 public key crypt...
  • 20 篇 transformers
  • 20 篇 computer network...
  • 19 篇 visualization

机构

  • 216 篇 shandong provinc...
  • 160 篇 key laboratory o...
  • 70 篇 state key labora...
  • 60 篇 key laboratory o...
  • 53 篇 shandong fundame...
  • 42 篇 shandong enginee...
  • 42 篇 state key labora...
  • 41 篇 state key labora...
  • 41 篇 key laboratory o...
  • 27 篇 state key labora...
  • 25 篇 jiangsu high tec...
  • 24 篇 key laboratory o...
  • 22 篇 state key labora...
  • 20 篇 ministry of educ...
  • 16 篇 state key labora...
  • 15 篇 college of compu...
  • 15 篇 qilu university ...
  • 15 篇 school of electr...
  • 15 篇 state key labora...
  • 14 篇 college of infor...

作者

  • 40 篇 guo hong
  • 32 篇 jianfeng ma
  • 26 篇 ma jianfeng
  • 26 篇 hu yupu
  • 20 篇 zhang yichen
  • 18 篇 hui li
  • 18 篇 ma jian-feng
  • 17 篇 yu song
  • 17 篇 xiaoming wu
  • 17 篇 huang chongwen
  • 16 篇 yang yang
  • 16 篇 han zhu
  • 16 篇 luo bin
  • 16 篇 li hui
  • 14 篇 hu yu-pu
  • 13 篇 wu guohua
  • 13 篇 wei zhang
  • 12 篇 yin longfei
  • 12 篇 yupu hu
  • 12 篇 yang dongyue

语言

  • 1,105 篇 英文
  • 64 篇 其他
  • 59 篇 中文
检索条件"机构=Key Laboratory of Computer Networks and Information"
1229 条 记 录,以下是31-40 订阅
排序:
A Novel 3D Medical Image Segmentation Model Using Improved SAM
A Novel 3D Medical Image Segmentation Model Using Improved S...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Kuang, Yuansen Ma, Xitong Zhao, Jing Wang, Guangchen Zeng, Yijie Liu, Song Key Laboratory of Computing Power Network and Information Security Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
3D medical image segmentation is an essential task in the medical image field, which aims to segment organs or tumours into different labels. A number of issues exist with the current 3D medical image segmentation tas... 详细信息
来源: 评论
Overview of Task Offloading of Wireless Sensor Network in Edge Computing Environment  6
Overview of Task Offloading of Wireless Sensor Network in Ed...
收藏 引用
6th IEEE International Conference on Electronic information and Communication Technology, ICEICT 2023
作者: Hou, XiQiang Hu, YiFan Wang, Fuqiang School of Information and Control Engineering Qingdao University of Technology Qingdao China Shandong Computer Science Center Shandong Provincial Key Laboratory of Computer Networks Jinan China
This review article introduces the concepts, server architecture and application scenarios of Mobile Edge Computing (MEC) and Wireless Sensor Network (WSN). By differentiating between rechargeable and non-rechargeable... 详细信息
来源: 评论
A Survey on Channel Measurements and Models for Underground MIMO Communication Systems
收藏 引用
China Communications 2023年 第8期20卷 103-119页
作者: Asad Saleem Yejun He Guoxin Zheng Zhining Chen State Key Laboratory of Radio Frequency Heterogeneous Integration Guangdong Engineering Research Center of Base Station Antennas and PropagationShenzhen Key Laboratory of Antennas and PropagationCollege of Electronics and Information EngineeringShenzhen UniversityShenzhen 518060China Key Laboratory of Specialty Fiber Optics and Optical Access Networks Shanghai UniversityShanghai 200444China Department of Electrical and Computer Engineering National University of SingaporeSingapore
The high reliability of the communication system is critical in metro and mining applications for personal safety,channel optimization,and improving operational *** paper surveys the progress of wireless communication... 详细信息
来源: 评论
Distributed acoustic sensing signal event recognition and localization based on improved YOLOv7
Distributed acoustic sensing signal event recognition and lo...
收藏 引用
2023 International Congress on Ultrasonics, ICU Beijing 2023
作者: Zhang, Hongyu Wang, Chang Zhang, Faxiang Jiang, Shaodong Sun, Zhihui Wang, Xiaodong Duan, Zhenhui Gao, Fengxia Liu, Zhaoying Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
The distributed acoustic sensing (DAS) system based on phase-sensitive optical time domain reflection (Φ -OTDR) technology is widely used in pipeline safety monitoring, perimeter security, structure monitoring, etc. ... 详细信息
来源: 评论
Intelligent Detection and Analysis Techniques for Botnet Malicious Traffic  24
Intelligent Detection and Analysis Techniques for Botnet Mal...
收藏 引用
8th International Conference on High Performance Compilation, Computing and Communications, HP3C 2024
作者: Wang, Yunxiao Qu, Yansheng Sang, Lin Cui, Bo Xu, Lijuan Li, Xin Information and Telecommunications Company State Grid Shandong Electric Power Company Jinan China Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
The continuous evolution of botnets has brought significant challenges to network security. Aiming at the limitations of traditional botnet detection methods in the face of new botnets, we propose a feature selection ... 详细信息
来源: 评论
An adaptive time-convolutional network online prediction method for ocean observation data  36
An adaptive time-convolutional network online prediction met...
收藏 引用
36th International Conference on Software Engineering and Knowledge Engineering, SEKE 2024
作者: Li, Enjing Li, Xiang Zhao, Zhigang Wu, Lu Wang, Yinglong Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Deep learning is particularly important in the field of time series data analysis, and has been applied to tasks such as marine data prediction. However, there is a’concept drift’ problem in marine observation data,... 详细信息
来源: 评论
MTRNet: An Efficient Hybrid Network Model for Surface Defect Detection of Sheet Metal  36
MTRNet: An Efficient Hybrid Network Model for Surface Defect...
收藏 引用
36th International Conference on Software Engineering and Knowledge Engineering, SEKE 2024
作者: Hao, Huijuan Zhu, Sijian Chen, Yu Yi, Changle Zhao, Hongge Feng, Yue Yang, Rong Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Addressing the challenges posed by the insufficient computational power of low-spec devices to achieve the inference efficiency of prevailing deep learning models, alongside the variability in type and shape within in... 详细信息
来源: 评论
A Patent Fast Recommendation Algorithm Based on User Requirements Combined with an Inverted Table
A Patent Fast Recommendation Algorithm Based on User Require...
收藏 引用
2024 lEEE International Conference on Advanced information, Mechanical Engineering, Robotics and Automation, AIMERA 2024
作者: Zheng, Wan Ding, Qingyan Li, Na Pan, Yu Dong, Xuecheng Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
Patent recommendation has always been an essential service for the innovation and development of all walks of life. The matching of demand and patent information can enable enterprises to quickly obtain the innovation... 详细信息
来源: 评论
Lightweight Malicious Encrypted Traffic Detection Method Based on KL Image Compression  9
Lightweight Malicious Encrypted Traffic Detection Method Bas...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Wen, Yuecheng Li, Xiaotong Lv, Haiqing Wang, Menglu Zuo, Wenbo Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
Timely and accurate detection of and response to potentially malicious encrypted traffic is crucial in cybersecurity strategies. Convolutional neural network-based approaches that convert traffic loads into images for... 详细信息
来源: 评论
Patent Recommendation Methods Based on Transformer Encoders and Regularization Strategies
Patent Recommendation Methods Based on Transformer Encoders ...
收藏 引用
2024 lEEE International Conference on Advanced information, Mechanical Engineering, Robotics and Automation, AIMERA 2024
作者: Zheng, Wan Ding, Qingyan Li, Na Pan, Yu Dong, Xuecheng Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
Patent recommendation service has become a major demand of all walks of life in the society. Patent data collection and analysis can not only help enterprises grasp the development status of the industry, but also pro... 详细信息
来源: 评论