咨询与建议

限定检索结果

文献类型

  • 355 篇 会议
  • 253 篇 期刊文献

馆藏范围

  • 608 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 397 篇 工学
    • 321 篇 计算机科学与技术...
    • 262 篇 软件工程
    • 101 篇 信息与通信工程
    • 41 篇 控制科学与工程
    • 36 篇 生物工程
    • 26 篇 机械工程
    • 23 篇 生物医学工程(可授...
    • 20 篇 电气工程
    • 19 篇 电子科学与技术(可...
    • 16 篇 光学工程
    • 16 篇 仪器科学与技术
    • 14 篇 网络空间安全
    • 12 篇 动力工程及工程热...
    • 10 篇 交通运输工程
    • 7 篇 建筑学
    • 7 篇 土木工程
    • 7 篇 化学工程与技术
  • 161 篇 理学
    • 104 篇 数学
    • 36 篇 生物学
    • 25 篇 统计学(可授理学、...
    • 22 篇 物理学
    • 13 篇 系统科学
    • 9 篇 化学
  • 132 篇 管理学
    • 70 篇 管理科学与工程(可...
    • 63 篇 图书情报与档案管...
    • 24 篇 工商管理
  • 16 篇 医学
    • 14 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 15 篇 法学
    • 14 篇 社会学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 6 篇 农学
  • 3 篇 文学
  • 3 篇 艺术学
  • 2 篇 军事学
  • 1 篇 教育学

主题

  • 31 篇 semantics
  • 19 篇 training
  • 16 篇 routing
  • 16 篇 machine learning
  • 16 篇 protocols
  • 15 篇 feature extracti...
  • 13 篇 clustering algor...
  • 11 篇 privacy
  • 10 篇 deep learning
  • 10 篇 network topology
  • 10 篇 educational inst...
  • 10 篇 estimation
  • 9 篇 peer to peer com...
  • 9 篇 big data
  • 9 篇 optimization
  • 9 篇 contrastive lear...
  • 9 篇 wireless sensor ...
  • 9 篇 benchmark testin...
  • 9 篇 accuracy
  • 9 篇 cloud computing

机构

  • 162 篇 school of comput...
  • 86 篇 key laboratory o...
  • 60 篇 key laboratory o...
  • 41 篇 school of comput...
  • 39 篇 key laboratory o...
  • 35 篇 key laboratory o...
  • 34 篇 school of cyber ...
  • 19 篇 key laboratory o...
  • 15 篇 ministry of educ...
  • 12 篇 school of cyber ...
  • 11 篇 school of comput...
  • 10 篇 guangxi collabor...
  • 10 篇 the school of co...
  • 10 篇 college of softw...
  • 9 篇 southeast univer...
  • 9 篇 purple mountain ...
  • 9 篇 national key lab...
  • 8 篇 the key laborato...
  • 8 篇 moe key laborato...
  • 8 篇 department of co...

作者

  • 36 篇 zhou deyu
  • 32 篇 zhang min-ling
  • 28 篇 min-ling zhang
  • 21 篇 guang cheng
  • 18 篇 geng xin
  • 18 篇 wang yun
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 15 篇 sanfeng zhang
  • 13 篇 cheng guang
  • 12 篇 shu huazhong
  • 12 篇 li xiaoping
  • 12 篇 qi guilin
  • 11 篇 jia yuheng
  • 11 篇 kong youyong
  • 10 篇 wei tong
  • 10 篇 yang guanyu
  • 10 篇 yang peng
  • 9 篇 xiaoyan hu
  • 9 篇 gao zhiqiang

语言

  • 481 篇 英文
  • 101 篇 其他
  • 29 篇 中文
检索条件"机构=Key Library of Computer Network and Information Integration"
608 条 记 录,以下是261-270 订阅
排序:
Image-Text Retrieval with Intra-Modal Soft Labels
SSRN
收藏 引用
SSRN 2022年
作者: Zhang, Yu Liu, Haoliang Xiong, Wei Mi, Siya Bian, Yali School of Computer Science and Engineering The Key Lab of Computer Network and Information Integration Ministry of Education Southeast University Nanjing211189 China School of Cyber Science and Engineering Southeast University Nanjing211189 China Purple Mountain Laboratories Nanjing China Intel Labs United States
Image-text retrieval attempts to find relevant images from a huge corpus of images given a textual description, and vice versa. Existing works usually denote the negative/positive image-text pair with a binary label. ... 详细信息
来源: 评论
NCAGC: A Neighborhood Contrast Framework for Attributed Graph Clustering
arXiv
收藏 引用
arXiv 2022年
作者: Wang, Tong Yang, Guanyu He, Qijia Zhang, Zhenquan Wu, Junhua The Laboratory of Image Science and Technology The Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University Nanjing210096 China The CAS Key Laboratory of FAST National Astronomical Observatory Chinese Academy of Sciences Beijing100101 China The Department of School of Computer Science and Technology Nanjing Tech University Jiangsu211816 China
Attributed graph clustering is one of the most fundamental tasks among graph learning field, the goal of which is to group nodes with similar representations into the same cluster without human annotations. Recent stu... 详细信息
来源: 评论
AIDE: Attack Inference Based on Heterogeneous Dependency Graphs with MITRE ATT&CK
AIDE: Attack Inference Based on Heterogeneous Dependency Gra...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Weidong Zhou Chunhe Xia Nan Feng Xinyi Pan Tianbo Wang Xiaojian Li Beijing Key Lab. of Network Technology Beihang University Beijing China Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin China School of Software & Microelectronics Peking University Beijing China School of Cyber Science and Technology Beihang University Beijing China School of Computer Science and Engineering Guangxi Normal University Guilin China
The MITRE ATT&CK Framework provides a rich and actionable repository of adversarial tactics, techniques, and procedures (TTPs). By leveraging the associations among these techniques, we can infer unobserved techni... 详细信息
来源: 评论
Asynchronous Tag-based Physical-Layer Authentication in Wireless Communications
收藏 引用
IEEE Transactions on Wireless Communications 2025年
作者: Tan, Haijun Xu, Yuntao Du, Jiewei Xie, Ning Li, Hongbin Peng Cheng Laboratory Control and Network Foundation Laboratory Frontier Research Center Shenzhen518107 China Shenzhen University State Key Laboratory of Radio Frequency Heterogeneous Integration The Guangdong Key Laboratory of Intelligent Information Processing College of Electronics and Information Engineering Shenzhen518060 China Beijing Jiaotong University School of Electronic and Information Engineering Beijing100044 China National Innovation Center of High Speed Train Qingdao266111 China Stevens Institute of Technology Department of Electrical and Computer Engineering HobokenNJ07030 United States
Tag-based physical-layer authentication (PLA) has gained significant research interest due to its high security and low complexity compared to traditional upper-layer authentication mechanisms. However, conventional t... 详细信息
来源: 评论
Slnspeech: Solving Extended Speech Separation Problem with the Help of Sign Language
SSRN
收藏 引用
SSRN 2023年
作者: Wu, Jiasong Li, Xuan Li, Taotao Meng, Fanman Kong, Youyong Yang, Guanyu Senhadji, Lotfi Shu, Huazhong Laboratory of Image Science and Technology Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Nanjing210096 China Jiangsu Provincial Joint International Research Laboratory of Medical Information Processing Southeast University Nanjing210096 China Univ Rennes INSERM LTSI - UMR 1099 RennesF-35000 France Univ Rennes INSERM RennesF-35000 France
Previous audio-visual speech separation methods use the synchronization of the speaker's facial movement and speech in the video to supervise the speech separation in a self-supervised way. In this paper, we propo... 详细信息
来源: 评论
MutexMatch: Semi-Supervised Learning with Mutex-Based Consistency Regularization
arXiv
收藏 引用
arXiv 2022年
作者: Duan, Yue Zhao, Zhen Qi, Lei Wang, Lei Zhou, Luping Shi, Yinghuan Gao, Yang The National Key Laboratory for Novel Software Technology The National Institute of Healthcare Data Science Nanjing University Nanjing210023 China The School of Electrical and Information Engineering The University of Sydney SydneyNSW2006 Australia The School of Computer Science and Engineering The Key Lab of Computer Network and Information Integration Ministry of Education Southeast University Nanjing211189 China The School of Computing and Information Technology University of Wollongong WollongongNSW2522 Australia
The core issue in semi-supervised learning (SSL) lies in how to effectively leverage unlabeled data, whereas most existing methods tend to put a great emphasis on the utilization of high-confidence samples yet seldom ... 详细信息
来源: 评论
Enhancing Interest Forwarding for Fast Recovery from Unanticipated Data Access Failure in NDN
收藏 引用
China Communications 2019年 第7期16卷 120-130页
作者: Xiaoyan Hu Xuhui Liu Lixia Zhao Jian Gong Guang Cheng School of Cyber Science & Engineering Southeast University Nanjing 211189 China Key Laboratory of Computer Network and Information Integration of Ministry of Education Southeast University Nanjing China Key Laboratory of Computer Network Technology of Jiangsu Province Nanjing China
We show that an aggregated Interest in Named Data networking (NDN) may fail to retrieve desired data since the Interest previously sent upstream for the same content is judged as a duplicate one and then dropped by an... 详细信息
来源: 评论
IP Traffic Behavior Characterization via Semantic Mining
SSRN
收藏 引用
SSRN 2022年
作者: Zang, Xiaodong Gong, Jian Gao, Peng Zhang, Guowei School of Cyber Science and Engineering Qufu Normal University Qufu273100 China School of Cyber Science and Engineering Southeast University Nanjing211189 China Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University Nanjing211189 China
Discovering and describing IP traffic behavior is becoming more and more significant for efficient network management and security monitoring. Although the vast majority of modeling techniques have been proposed, most... 详细信息
来源: 评论
BRFL: A Blockchain-based Byzantine-Robust Federated Learning Model
arXiv
收藏 引用
arXiv 2023年
作者: Li, Yang Xia, Chunhe Li, Chang Wang, Tianbo The Key Laboratory of Beijing Network Technology Beihang University Beijing100191 China The Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin541004 China The School of Computer Science and Technology Zhengzhou University of Light Industry Zhengzhou450000 China The School of Cyber Science and Technology Beihang University Beijing100191 China The Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai201112 China
With the increasing importance of machine learning, the privacy and security of training data have become critical. Federated learning, which stores data in distributed nodes and shares only model parameters, has gain... 详细信息
来源: 评论
Rethinking calibration of deep neural networks: do not be afraid of overconfidence  21
Rethinking calibration of deep neural networks: do not be af...
收藏 引用
Proceedings of the 35th International Conference on Neural information Processing Systems
作者: Deng-Bao Wang Lei Feng Min-Ling Zhang School of Computer Science and Engineering Southeast University Nanjing China and Key Laboratory of Computer Network and Information Integration (Southeast University) Ministry of Education China College of Computer Science Chongqing University Chongqing China
Capturing accurate uncertainty quantification of the predictions from deep neural networks is important in many real-world decision-making applications. A reliable predictor is expected to be accurate when it is confi...
来源: 评论