咨询与建议

限定检索结果

文献类型

  • 355 篇 会议
  • 253 篇 期刊文献

馆藏范围

  • 608 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 397 篇 工学
    • 321 篇 计算机科学与技术...
    • 262 篇 软件工程
    • 101 篇 信息与通信工程
    • 41 篇 控制科学与工程
    • 36 篇 生物工程
    • 26 篇 机械工程
    • 23 篇 生物医学工程(可授...
    • 20 篇 电气工程
    • 19 篇 电子科学与技术(可...
    • 16 篇 光学工程
    • 16 篇 仪器科学与技术
    • 14 篇 网络空间安全
    • 12 篇 动力工程及工程热...
    • 10 篇 交通运输工程
    • 7 篇 建筑学
    • 7 篇 土木工程
    • 7 篇 化学工程与技术
  • 161 篇 理学
    • 104 篇 数学
    • 36 篇 生物学
    • 25 篇 统计学(可授理学、...
    • 22 篇 物理学
    • 13 篇 系统科学
    • 9 篇 化学
  • 132 篇 管理学
    • 70 篇 管理科学与工程(可...
    • 63 篇 图书情报与档案管...
    • 24 篇 工商管理
  • 16 篇 医学
    • 14 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 15 篇 法学
    • 14 篇 社会学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 6 篇 农学
  • 3 篇 文学
  • 3 篇 艺术学
  • 2 篇 军事学
  • 1 篇 教育学

主题

  • 31 篇 semantics
  • 19 篇 training
  • 16 篇 routing
  • 16 篇 machine learning
  • 16 篇 protocols
  • 15 篇 feature extracti...
  • 13 篇 clustering algor...
  • 11 篇 privacy
  • 10 篇 deep learning
  • 10 篇 network topology
  • 10 篇 educational inst...
  • 10 篇 estimation
  • 9 篇 peer to peer com...
  • 9 篇 big data
  • 9 篇 optimization
  • 9 篇 contrastive lear...
  • 9 篇 wireless sensor ...
  • 9 篇 benchmark testin...
  • 9 篇 accuracy
  • 9 篇 cloud computing

机构

  • 162 篇 school of comput...
  • 86 篇 key laboratory o...
  • 61 篇 key laboratory o...
  • 40 篇 school of comput...
  • 39 篇 key laboratory o...
  • 35 篇 key laboratory o...
  • 34 篇 school of cyber ...
  • 19 篇 key laboratory o...
  • 15 篇 ministry of educ...
  • 12 篇 school of cyber ...
  • 11 篇 school of comput...
  • 10 篇 guangxi collabor...
  • 10 篇 the school of co...
  • 10 篇 college of softw...
  • 9 篇 southeast univer...
  • 9 篇 purple mountain ...
  • 9 篇 national key lab...
  • 8 篇 the key laborato...
  • 8 篇 moe key laborato...
  • 8 篇 department of co...

作者

  • 36 篇 zhou deyu
  • 32 篇 zhang min-ling
  • 28 篇 min-ling zhang
  • 21 篇 guang cheng
  • 18 篇 geng xin
  • 18 篇 wang yun
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 15 篇 sanfeng zhang
  • 13 篇 cheng guang
  • 12 篇 shu huazhong
  • 12 篇 qi guilin
  • 11 篇 jia yuheng
  • 11 篇 li xiaoping
  • 11 篇 kong youyong
  • 10 篇 wei tong
  • 10 篇 yang guanyu
  • 10 篇 yang peng
  • 9 篇 xiaoyan hu
  • 9 篇 gao zhiqiang

语言

  • 481 篇 英文
  • 101 篇 其他
  • 29 篇 中文
检索条件"机构=Key Library of Computer Network and Information Integration"
608 条 记 录,以下是241-250 订阅
排序:
REDA: Malicious Traffic Detection Based on Record Length and Frequency Domain Analysis
REDA: Malicious Traffic Detection Based on Record Length and...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Wanshuang Lin Chunhe Xia Tianbo Wang Chen Chen Yuan Zhao Weidong Zhou School of Cyber Science and Technology Beihang University Beijing China Beijing Key Lab. of Network Technology Beihang University Beijing China Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China
The TLS encryption protocol plays a vital role in securing data transmission, but it also presents challenges for payload-based network Intrusion Detection Systems (NIDS). Existing methods utilize statistical characte... 详细信息
来源: 评论
DRRNet: Macro–Micro Feature Fusion and Dual Reverse Refinement for Camouflaged Object Detection
arXiv
收藏 引用
arXiv 2025年
作者: Sun, Jianlin Fang, Xiaolin Guan, Juwei Gui, Dongdong Wang, Teqi Zhu, Tongxin School of Computer Science and Engineering Southeast University Nanjing211189 China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education China
The core challenge in Camouflage Object Detection (COD) lies in the indistinguishable similarity between targets and backgrounds in terms of color, texture, and shape. This causes existing methods to either lose edge ... 详细信息
来源: 评论
EGRC-Net: Embedding-induced Graph Refinement Clustering network
arXiv
收藏 引用
arXiv 2022年
作者: Peng, Zhihao Liu, Hui Jia, Yuheng Hou, Junhui The Department of Computer Science City University of Hong Kong Kowloon999077 Hong Kong The School of Computing & Information Sciences Caritas In-stitute of Higher Education Hong Kong School of Computer Science and Engineering SoutheastUniversity Nanjing210096 China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education China
Existing graph clustering networks heavily rely on a predefined yet fixed graph, which can lead to failures when the initial graph fails to accurately capture the data topology structure of the embedding space. In ord... 详细信息
来源: 评论
Mining Latent Classes for Few-shot Segmentation
Mining Latent Classes for Few-shot Segmentation
收藏 引用
International Conference on computer Vision (ICCV)
作者: Lihe Yang Wei Zhuo Lei Qi Yinghuan Shi Yang Gao State Key Laboratory for Novel Software Technology Nanjing University Tencent Key Lab of Computer Network and Information Integration (Ministry of Education) Southeast University
Few-shot segmentation (FSS) aims to segment unseen classes given only a few annotated samples. Existing methods suffer the problem of feature undermining, i.e., potential novel classes are treated as background during... 详细信息
来源: 评论
MNet: Rethinking 2D/3D networks for Anisotropic Medical Image Segmentation
arXiv
收藏 引用
arXiv 2022年
作者: Dong, Zhangfu He, Yuting Qi, Xiaoming Chen, Yang Shu, Huazhong Coatrieux, Jean-Louis Yang, Guanyu Li, Shuo LIST Key Laboratory of Computer Network and Information Integration [Southeast University Ministry of Education Nanjing China Jiangsu Provincial Joint International Research Laboratory of Medical Information Processing China Dept. of Medical Biophysics University of Western Ontario LondonON Canada
The nature of thick-slice scanning causes severe inter-slice discontinuities of 3D medical images, and the vanilla 2D/3D convolutional neural networks (CNNs) fail to represent sparse inter-slice information and dense ... 详细信息
来源: 评论
FedDRC: A Robust Federated Learning-based Android Malware Classifier under Heterogeneous Distribution
FedDRC: A Robust Federated Learning-based Android Malware Cl...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Changnan Jiang Chunhe Xia Mengyao Liu Chen Chen Huacheng Li Tianbo Wang Pengfei Li Beijing Key Lab. of Network Technology Beihang University Beijing China Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin China School of Cyber Science and Technology Beihang University Beijing China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China SNationa Innovation Center of Intelligent and Connected Vehicles Beijing China
In the traditional centralized Android malware classification framework, privacy concerns exist due to collected users’ apps containing sensitive information. A new classification framework based on Federated Learnin... 详细信息
来源: 评论
Funny words detection via Contrastive Representations and Pre-trained Language Model
Funny words detection via Contrastive Representations and Pr...
收藏 引用
Artificial Intelligence, networking and information Technology (AINIT), International Seminar on
作者: Yiming Du Zelin Tian Key Lab of Computer Network and Information Integration School of Computer Science and Engineering- Southeast University (SEU) Nanjing China University of British Columbia Vancouver Canada
Funniness detection of news headlines is a challenging task in computational linguistics. However, most existing works on funniness detection mainly tackle the scenario by simply judging whether a sentence is humorous... 详细信息
来源: 评论
Topic-aware evidence reasoning and stance-aware aggregation for fact verification
arXiv
收藏 引用
arXiv 2021年
作者: Si, Jiasheng Zhou, Deyu Li, Tongzhe Shi, Xingyu He, Yulan School of Computer Science and Engineering Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University China Department of Computer Science University of Warwick United Kingdom
Fact verification is a challenging task that requires simultaneously reasoning and aggregating over multiple retrieved pieces of evidence to evaluate the truthfulness of a claim. Existing approaches typically (i) expl... 详细信息
来源: 评论
Topic-driven and knowledge-aware transformer for dialogue emotion detection
arXiv
收藏 引用
arXiv 2021年
作者: Zhu, Lixing Pergola, Gabriele Gui, Lin Zhou, Deyu He, Yulan Department of Computer Science University of Warwick United Kingdom School of Computer Science and Engineering Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University China
Emotion detection in dialogues is challenging as it often requires the identification of thematic topics underlying a conversation, the relevant commonsense knowledge, and the intricate transition patterns between the... 详细信息
来源: 评论
TPMARL-MSS Thought-Perception Multi-Agent Reinforcement Learning Meeting Scheduling System
TPMARL-MSS Thought-Perception Multi-Agent Reinforcement Lear...
收藏 引用
IEEE International Conference on High Performance Computing and Communications (HPCC)
作者: Jinsong Zhang Xiaoxuan Mao Lu Li Hanqian Wu Joint graduate school Southeast University Nanjing China College of Software Engineering Southeast University Nanjing China School of Cyber Science and Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration of Ministry of Education School of Cyber Science and Engineering Southeast University Nanjing China
In today's evolving society, the increasing complexity and frequency of meetings necessitate advanced scheduling systems. Traditional methods are constrained by rigid prede-fined strategies, lack intelligent negot...
来源: 评论