咨询与建议

限定检索结果

文献类型

  • 355 篇 会议
  • 253 篇 期刊文献

馆藏范围

  • 608 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 397 篇 工学
    • 321 篇 计算机科学与技术...
    • 262 篇 软件工程
    • 101 篇 信息与通信工程
    • 41 篇 控制科学与工程
    • 36 篇 生物工程
    • 26 篇 机械工程
    • 23 篇 生物医学工程(可授...
    • 20 篇 电气工程
    • 19 篇 电子科学与技术(可...
    • 16 篇 光学工程
    • 16 篇 仪器科学与技术
    • 14 篇 网络空间安全
    • 12 篇 动力工程及工程热...
    • 10 篇 交通运输工程
    • 7 篇 建筑学
    • 7 篇 土木工程
    • 7 篇 化学工程与技术
  • 161 篇 理学
    • 104 篇 数学
    • 36 篇 生物学
    • 25 篇 统计学(可授理学、...
    • 22 篇 物理学
    • 13 篇 系统科学
    • 9 篇 化学
  • 132 篇 管理学
    • 70 篇 管理科学与工程(可...
    • 63 篇 图书情报与档案管...
    • 24 篇 工商管理
  • 16 篇 医学
    • 14 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 15 篇 法学
    • 14 篇 社会学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 6 篇 农学
  • 3 篇 文学
  • 3 篇 艺术学
  • 2 篇 军事学
  • 1 篇 教育学

主题

  • 31 篇 semantics
  • 19 篇 training
  • 16 篇 routing
  • 16 篇 machine learning
  • 16 篇 protocols
  • 15 篇 feature extracti...
  • 13 篇 clustering algor...
  • 11 篇 privacy
  • 10 篇 deep learning
  • 10 篇 network topology
  • 10 篇 educational inst...
  • 10 篇 estimation
  • 9 篇 peer to peer com...
  • 9 篇 big data
  • 9 篇 optimization
  • 9 篇 contrastive lear...
  • 9 篇 wireless sensor ...
  • 9 篇 benchmark testin...
  • 9 篇 accuracy
  • 9 篇 cloud computing

机构

  • 162 篇 school of comput...
  • 86 篇 key laboratory o...
  • 60 篇 key laboratory o...
  • 41 篇 school of comput...
  • 39 篇 key laboratory o...
  • 35 篇 key laboratory o...
  • 34 篇 school of cyber ...
  • 19 篇 key laboratory o...
  • 15 篇 ministry of educ...
  • 12 篇 school of cyber ...
  • 11 篇 school of comput...
  • 10 篇 guangxi collabor...
  • 10 篇 the school of co...
  • 10 篇 college of softw...
  • 9 篇 southeast univer...
  • 9 篇 purple mountain ...
  • 9 篇 national key lab...
  • 8 篇 the key laborato...
  • 8 篇 moe key laborato...
  • 8 篇 department of co...

作者

  • 36 篇 zhou deyu
  • 32 篇 zhang min-ling
  • 28 篇 min-ling zhang
  • 21 篇 guang cheng
  • 18 篇 geng xin
  • 18 篇 wang yun
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 15 篇 sanfeng zhang
  • 13 篇 cheng guang
  • 12 篇 shu huazhong
  • 12 篇 li xiaoping
  • 12 篇 qi guilin
  • 11 篇 jia yuheng
  • 11 篇 kong youyong
  • 10 篇 wei tong
  • 10 篇 yang guanyu
  • 10 篇 yang peng
  • 9 篇 xiaoyan hu
  • 9 篇 gao zhiqiang

语言

  • 481 篇 英文
  • 101 篇 其他
  • 29 篇 中文
检索条件"机构=Key Library of Computer Network and Information Integration"
608 条 记 录,以下是331-340 订阅
排序:
Maximum entropy subspace clustering network
arXiv
收藏 引用
arXiv 2020年
作者: Peng, Zhihao Jia, Yuheng Liu, Hui Hou, Junhui Zhang, Qingfu The Department of Computer Science City University of Hong Kong Kowloon999077 Hong Kong The School of Computer Science and Engineering Southeast University China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Nanjing211189 China
Deep subspace clustering networks have attracted much attention in subspace clustering, in which an auto-encoder non-linearly maps the input data into a latent space, and a fully connected layer named self-expressiven... 详细信息
来源: 评论
Retrieve, program, repeat: Complex knowledge base question answering via alternate meta-learning
arXiv
收藏 引用
arXiv 2020年
作者: Hua, Yuncheng Li, Yuan-Fang Haffari, Gholamreza Qi, Guilin Wu, Wei School of Computer Science and Engineering Southeast University Nanjing China Faculty of Information Technology Monash University Melbourne Australia Southeast University-Monash University Joint Research Institute Suzhou China Key Laboratory of Computer Network and Information Integration Southeast University China
A compelling approach to complex question answering is to convert the question to a sequence of actions, which can then be executed on the knowledge base to yield the answer, aka the programmer-interpreter approach. U... 详细信息
来源: 评论
Cascade ResUnet with Noise Power Spectrum Loss for Low Dose CT Imaging
Cascade ResUnet with Noise Power Spectrum Loss for Low Dose ...
收藏 引用
International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI)
作者: Jin Liu Yanqin Kang Dianlin Hu Yang Chen College of Computer and Information Anhui Polytechnic University Wuhu China Key Laboratory of Computer Network and Information Integration (Southeast University) Ministry of Education Nanjing China School of Cyber Science and Engineering Southeast University Nanjing China School of Computer Science and Engineering Southeast University Nanjing China
The suppression of noise-artifacts in computed tomography (CT) with a low dose scan protocol is a well-known challenge. Conventional statistical iterative algorithms are able to provide improved reconstructions, but d... 详细信息
来源: 评论
FLSSM: A Federated Learning Storage Security Model with Homomorphic Encryption
arXiv
收藏 引用
arXiv 2025年
作者: Li, Yang Xia, Chunhe Li, Chang Li, Xiaojian Wang, Tianbo School of Computer Science and Engineering Beihang University Beijing100191 China Key Laboratory of Beijing Network Technology Beihang University Beijing100191 China Guangxi Collaborative Innovation Center Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin541004 China School of Computer Science and Technology Zhengzhou University of Light Industry Zhengzhou450000 China College of Computer Science and Information Technology Guangxi Normal University Guilin541004 China School of Cyber Science and Technology Beihang University Beijing100191 China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai201112 China
Federated learning based on homomorphic encryption has received widespread attention due to its high security and enhanced protection of user data privacy. However, the characteristics of encrypted computation lead to... 详细信息
来源: 评论
Detecting and mitigating a sophisticated interest flooding attack in NDN from the network-wide view  1
Detecting and mitigating a sophisticated interest flooding a...
收藏 引用
1st International Workshop on network Meets Intelligent Computations, NMIC 2019
作者: Cheng, Guang Zhao, Lixia Hu, Xiaoyan Zheng, Shaoqi Wu, Hua Li, Ruidong Fan, Chengyu School of Cyber Science and Engineering Southeast University Nanjing211189 China Key Laboratory of Computer Network and Information Integration Ministry of Education of China Southeast University China Key Laboratory of Computer Network Technology of Jiangsu Province China National Institute of Information and Communications Technology Tokyo184-8795 Japan Computer Science Department Colorado State University Fort Collins United States
Interest Flooding Attack (IFA) is one of the main security threats for the Named Data networking (NDN). Most of its existing countermeasures enable intermediate routers near the attackers to independently detect the a... 详细信息
来源: 评论
dptCry: an approach to decrypting ransomware WannaCry based on API hooking
收藏 引用
CCF Transactions on networking 2019年 第3-4期2卷 207-216页
作者: Guang Cheng Chunsheng Guo Yongning Tang Southeast University Key Lab of Computer Network and Information Integration (Southeast University) Ministry of Education Illinois State University
来源: 评论
Neural topic modeling with bidirectional adversarial training
arXiv
收藏 引用
arXiv 2020年
作者: Wang, Rui Hu, Xuemeng Zhou, Deyu He, Yulan Xiong, Yuxuan Ye, Chenchen Xu, Haiyang School of Computer Science and Engineering Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University China Department of Computer Science University of Warwick United Kingdom AI Labs Didi Chuxing Co. Ltd. Beijing China
Recent years have witnessed a surge of interests of using neural topic models for automatic topic extraction from text, since they avoid the complicated mathematical derivations for model inference as in traditional t... 详细信息
来源: 评论
Learning Expectation of Label Distribution for Facial Age and Attractiveness Estimation
arXiv
收藏 引用
arXiv 2020年
作者: Gao, Bin-Bin Liu, Xin-Xin Zhou, Hong-Yu Wu, Jianxin Geng, Xin YouTu Lab Tencent Shenzhen518075 China National Key Laboratory for Novel Software Technology Nanjing University Nanjing210023 China MOE Key Laboratory of Computer Network and Information Integration Southeast University Nanjing211189 China
Facial attributes (e.g., age and attractiveness) estimation performance has been greatly improved by using convolutional neural networks. However, existing methods have an inconsistency between the training objectives... 详细信息
来源: 评论
A Topology-Adaptive Deep Model for Power System Multifault Diagnosis
A Topology-Adaptive Deep Model for Power System Multifault D...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Yangyang Liu Aibo Song Jiahui Jin Mingyu zhai Yingying Xue Feng Li School of Computer Science and Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education China NARI Group Corporation/State Grid Electric Power Research Institute Nanjing China
Quickly identifying faulty sections is tremendously important for power systems, yet challenging due to handling the variations of complex alarm patterns. Existing works have focused on finding fault section clues sol... 详细信息
来源: 评论
Less is More: Data-Efficient Complex Question Answering over Knowledge Bases
arXiv
收藏 引用
arXiv 2020年
作者: Hua, Yuncheng Li, Yuan-Fang Qi, Guilin Wu, Wei Zhang, Jingyao Qi, Daiqing School of Computer Science and Engineering Southeast University Nanjing China Faculty of Information Technology Monash University Melbourne Australia Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Nanjing China Southeast University Monash University Joint Research Institute Suzhou China
Question answering is an effective method for obtaining information from knowledge bases (KB). In this paper, we propose the Neural-Symbolic Complex Question Answering (NS-CQA) model, a data-efficient reinforcement le... 详细信息
来源: 评论