咨询与建议

限定检索结果

文献类型

  • 1,250 篇 会议
  • 516 篇 期刊文献

馆藏范围

  • 1,766 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,071 篇 工学
    • 757 篇 计算机科学与技术...
    • 628 篇 软件工程
    • 253 篇 信息与通信工程
    • 230 篇 电气工程
    • 141 篇 控制科学与工程
    • 129 篇 电子科学与技术(可...
    • 112 篇 生物工程
    • 94 篇 机械工程
    • 58 篇 光学工程
    • 56 篇 化学工程与技术
    • 50 篇 安全科学与工程
    • 49 篇 生物医学工程(可授...
    • 43 篇 交通运输工程
    • 40 篇 网络空间安全
    • 39 篇 材料科学与工程(可...
    • 35 篇 仪器科学与技术
    • 27 篇 建筑学
  • 493 篇 理学
    • 296 篇 数学
    • 122 篇 物理学
    • 120 篇 统计学(可授理学、...
    • 119 篇 生物学
    • 50 篇 化学
    • 26 篇 系统科学
  • 281 篇 管理学
    • 172 篇 管理科学与工程(可...
    • 132 篇 图书情报与档案管...
    • 69 篇 工商管理
  • 63 篇 法学
    • 51 篇 社会学
  • 55 篇 医学
    • 47 篇 临床医学
    • 43 篇 基础医学(可授医学...
  • 27 篇 经济学
    • 27 篇 应用经济学
  • 18 篇 农学
  • 5 篇 教育学
  • 5 篇 军事学
  • 3 篇 文学
  • 3 篇 艺术学

主题

  • 118 篇 feature extracti...
  • 85 篇 accuracy
  • 63 篇 semantics
  • 62 篇 training
  • 60 篇 computational mo...
  • 51 篇 data models
  • 50 篇 federated learni...
  • 44 篇 deep learning
  • 36 篇 neural networks
  • 30 篇 data mining
  • 29 篇 predictive model...
  • 29 篇 visualization
  • 27 篇 object detection
  • 26 篇 transformers
  • 26 篇 privacy
  • 26 篇 robustness
  • 25 篇 image segmentati...
  • 24 篇 security
  • 24 篇 network security
  • 24 篇 adaptation model...

机构

  • 223 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 193 篇 school of inform...
  • 125 篇 shandong provinc...
  • 82 篇 shandong provinc...
  • 58 篇 college of compu...
  • 50 篇 college of mathe...
  • 50 篇 shandong fundame...
  • 46 篇 shandong enginee...
  • 40 篇 shandong provinc...
  • 38 篇 fujian provincia...
  • 38 篇 state grid key l...
  • 35 篇 fujian key labor...
  • 34 篇 shandong provinc...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 27 篇 shandong provinc...
  • 27 篇 state grid key l...
  • 26 篇 fujian key labor...
  • 24 篇 quan cheng labor...

作者

  • 34 篇 feng zhiquan
  • 25 篇 chen yuehui
  • 24 篇 zhiquan feng
  • 23 篇 guo wenzhong
  • 21 篇 yang bo
  • 20 篇 xiaoming wu
  • 20 篇 guo kun
  • 18 篇 yang yang
  • 18 篇 zhang bo
  • 18 篇 xi zesheng
  • 15 篇 lin peng
  • 15 篇 xiangzhi liu
  • 15 篇 niu sijie
  • 15 篇 wang gang
  • 14 篇 chen zhenxiang
  • 13 篇 lu wenpeng
  • 13 篇 guohua lv
  • 13 篇 zhenxiang chen
  • 13 篇 zhang jing
  • 13 篇 yang xiaohui

语言

  • 1,670 篇 英文
  • 58 篇 其他
  • 47 篇 中文
  • 2 篇 斯洛文尼亚文
检索条件"机构=Key Laboratory of Computing Power Network and Information"
1766 条 记 录,以下是111-120 订阅
排序:
A Privacy-friendly sequential progressive framework for segmented decision making
A Privacy-friendly sequential progressive framework for segm...
收藏 引用
2023 International Conference on Artificial Intelligence of Things and Systems, AIoTSys 2023
作者: Liu, Peng Yu, Zhiyong Huang, Fangwan Fuzhou University College of Computer and Data Science Fuzhou China Fuzhou University Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou China
To achieve progressive and accurate decision-making for long-term time series data while meeting the needs of privacy-friendly and early, this paper proposes a universal framework for sequential progressive decision-m... 详细信息
来源: 评论
A Survey of SDN Data Plane Attacks and Defense Strategies  23
A Survey of SDN Data Plane Attacks and Defense Strategies
收藏 引用
2nd International Conference on networks, Communications and information Technology, CNCIT 2023
作者: Zhang, Wenxiu Jing, Shan Zhao, Chuan School of Information Science and Engineering University of Jinan Jinan China Shandong Provincial Key Laboratory of Network-based Intelligent Computing Jinan China Quan Cheng Laboratory Jinan China
The Software-Defined networking (SDN) paradigm proposes the decoupling of control and data planes and a centralized software-oriented management approach based on a central controller, easing the development of new ap... 详细信息
来源: 评论
AH-TDMA: An Adaptive Heterogeneous Tridiagonal Matrix Algorithm on the New Sunway Supercomputer  29
AH-TDMA: An Adaptive Heterogeneous Tridiagonal Matrix Algori...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Tian, Min Liu, Qi Li, Yanlong Du, Wei Ren, Zenghui Liu, Yue Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks China Jinan Institute of Supercomputing Technology Jinan Key Laboratory of High Performance Computing China
The solution of tridiagonal linear systems is used in in various fields and plays a crucial role in numerical simulations. However, there is few efficient solver for tridiagonal linear systems on the new Sunway superc... 详细信息
来源: 评论
TM-HOL: Topic memory model for detection of hate speech and offensive language
TM-HOL: Topic memory model for detection of hate speech and ...
收藏 引用
作者: Chen, Jing Ma, Kun Ji, Ke Chen, Zhenxiang College of Information Science and Engineering University of Jinan Jinan China Shandong Provincial Key Laboratory of Network Based Intelligent Computing University of Jinan Jinan China
In the era of the explosion of digital content of large-scale self-media, user-friendly social platforms such as Twitter and Facebook, provide opportunities for people to express their ideas and opinions freely. Due t... 详细信息
来源: 评论
hcaPCG: A Heterogeneous and communication-avoid PCG with Jacobi preconditioner on SW26010-Pro architecture  29
hcaPCG: A Heterogeneous and communication-avoid PCG with Jac...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Tian, Min Liu, Yue Wang, Li Chen, Yanyan Liu, Qi Pan, Jingshan Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks China Jinan Institute of Supercomputing Technology Jinan Key Laboratory of High Performance Computing China
Due to its efficiency and versatility, the preconditioned conjugate gradient algorithm has long been a staple in the realm of iterative linear system solvers. In this paper, we proposed an optimized preconditioned con... 详细信息
来源: 评论
Multi-party privacy-preserving decision tree training with a privileged party
收藏 引用
Science China(information Sciences) 2024年 第8期67卷 253-268页
作者: Yiwen TONG Qi FENG Min LUO Debiao HE Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Shanghai Technology Innovation Centre of Distributed Privacy-Preserving Artificial Intelligence Matrix Elements Technologies Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science Center Qilu University of Technology(Shandong Academy of Sciences)
Currently, a decision tree is the most commonly used data mining algorithm for classification tasks. While a significant number of studies have investigated privacy-preserving decision trees, the methods proposed in t... 详细信息
来源: 评论
Joint Learning Based on Discriminant Representation and Group Collaborative Measurement for Image Set Classification  2nd
Joint Learning Based on Discriminant Representation and Grou...
收藏 引用
2nd International Conference on Image, Vision and Intelligent Systems, ICIVIS 2022
作者: Liu, Xingrui Feng, Zeming Gao, Xizhan School of Information Science and Engineering University of Jinan Jinan250022 China Shandong Provincial Key Laboratory of Network-Based Intelligent Computing Jinan250022 China
In daily life, it is easy to obtain a large number of images in the form of sets. How to extract discriminative information from a wide range of images become very important. Most of the existing image set classificat... 详细信息
来源: 评论
A Semi-supervised Protein Complex Identification Algorithm Based on Sparseness Constraint
A Semi-supervised Protein Complex Identification Algorithm B...
收藏 引用
2024 International Conference on Applied Mathematics, Modelling and Statistics Application, AMMSA 2024
作者: Liu, Guangming Dang, Fengqing Wang, Bin Peng, Yonghong Wang, Xiaofan Tan, Li School of Computer Science and Engineering Shaanxi Key Laboratory for Network Computing and Security Technology Xi'An University of Technology Shaanxi Xi'an China Faculty of Science and Engineering Computing and Information Science Cambridge United Kingdom School of Computer and Information Engineering Beijing Technology and Business University Beijing China
Recognising protein complexes in protein interaction networks is crucial, but poses a major challenge due to the frequency of noisy interactions. These networks typically involve numerous protein complexes, with each ... 详细信息
来源: 评论
Time Series Anomaly Detection Based on Normalized Flow and Bayesian networks  9
Time Series Anomaly Detection Based on Normalized Flow and B...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Yao, Honglei Liu, Donglan Chang, Yingxian Liu, Xin Tang, Chaofan State Grid Shandong Electric Power Research Institute Jinan China State Grid Shandong Electric Power Company Jinan China Qilu University of Technology Shandong Academy of Sciences Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China
Time series anomaly detection often faces significant challenges due to the high dimensionality, interdependence, and label sparsity of the data. Traditional methods struggle to model the intricate relationships betwe... 详细信息
来源: 评论
CurMIM: Curriculum Masked Image Modeling
CurMIM: Curriculum Masked Image Modeling
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Liu, Hao Wang, Kun Han, Yudong Wang, Haocong Hu, Yupeng Wang, Chunxiao Nie, Liqiang School of Software Shandong University Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology Shandong Academy of Sciences Jinan China School of Computer Science and Technology Harbin Institute of Technology Shenzhen China
Masked Image Modeling (MIM), following "mask-and-reconstruct" scheme, is a promising self-supervised method to learn scalable visual representation. Studies indicate that selecting an effective mask strategy... 详细信息
来源: 评论