咨询与建议

限定检索结果

文献类型

  • 355 篇 会议
  • 253 篇 期刊文献

馆藏范围

  • 608 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 397 篇 工学
    • 321 篇 计算机科学与技术...
    • 262 篇 软件工程
    • 101 篇 信息与通信工程
    • 41 篇 控制科学与工程
    • 36 篇 生物工程
    • 26 篇 机械工程
    • 23 篇 生物医学工程(可授...
    • 20 篇 电气工程
    • 19 篇 电子科学与技术(可...
    • 16 篇 光学工程
    • 16 篇 仪器科学与技术
    • 14 篇 网络空间安全
    • 12 篇 动力工程及工程热...
    • 10 篇 交通运输工程
    • 7 篇 建筑学
    • 7 篇 土木工程
    • 7 篇 化学工程与技术
  • 161 篇 理学
    • 104 篇 数学
    • 36 篇 生物学
    • 25 篇 统计学(可授理学、...
    • 22 篇 物理学
    • 13 篇 系统科学
    • 9 篇 化学
  • 132 篇 管理学
    • 70 篇 管理科学与工程(可...
    • 63 篇 图书情报与档案管...
    • 24 篇 工商管理
  • 16 篇 医学
    • 14 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 15 篇 法学
    • 14 篇 社会学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 6 篇 农学
  • 3 篇 文学
  • 3 篇 艺术学
  • 2 篇 军事学
  • 1 篇 教育学

主题

  • 31 篇 semantics
  • 19 篇 training
  • 16 篇 routing
  • 16 篇 machine learning
  • 16 篇 protocols
  • 15 篇 feature extracti...
  • 13 篇 clustering algor...
  • 11 篇 privacy
  • 10 篇 deep learning
  • 10 篇 network topology
  • 10 篇 educational inst...
  • 10 篇 estimation
  • 9 篇 peer to peer com...
  • 9 篇 big data
  • 9 篇 optimization
  • 9 篇 contrastive lear...
  • 9 篇 wireless sensor ...
  • 9 篇 benchmark testin...
  • 9 篇 accuracy
  • 9 篇 cloud computing

机构

  • 162 篇 school of comput...
  • 86 篇 key laboratory o...
  • 60 篇 key laboratory o...
  • 41 篇 school of comput...
  • 39 篇 key laboratory o...
  • 35 篇 key laboratory o...
  • 34 篇 school of cyber ...
  • 19 篇 key laboratory o...
  • 15 篇 ministry of educ...
  • 12 篇 school of cyber ...
  • 11 篇 school of comput...
  • 10 篇 guangxi collabor...
  • 10 篇 the school of co...
  • 10 篇 college of softw...
  • 9 篇 southeast univer...
  • 9 篇 purple mountain ...
  • 9 篇 national key lab...
  • 8 篇 the key laborato...
  • 8 篇 moe key laborato...
  • 8 篇 department of co...

作者

  • 36 篇 zhou deyu
  • 32 篇 zhang min-ling
  • 28 篇 min-ling zhang
  • 21 篇 guang cheng
  • 18 篇 geng xin
  • 18 篇 wang yun
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 15 篇 sanfeng zhang
  • 13 篇 cheng guang
  • 12 篇 shu huazhong
  • 12 篇 li xiaoping
  • 12 篇 qi guilin
  • 11 篇 jia yuheng
  • 11 篇 kong youyong
  • 10 篇 wei tong
  • 10 篇 yang guanyu
  • 10 篇 yang peng
  • 9 篇 xiaoyan hu
  • 9 篇 gao zhiqiang

语言

  • 481 篇 英文
  • 101 篇 其他
  • 29 篇 中文
检索条件"机构=Key Library of Computer Network and Information Integration"
608 条 记 录,以下是351-360 订阅
排序:
Generative networks as inverse problems with fractional wavelet scattering networks
arXiv
收藏 引用
arXiv 2020年
作者: Wu, Jiasong Zhang, Jing Wu, Fuzhi Kong, Youyong Yang, Guanyu Senhadji, Lotfi Shu, Huazhong Laboratory of Image Science and Technology Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Nanjing210096 China Université de Rennes INSERM LTSI-UMR 1099 RennesF-35042 France Université de Rennes INSERM Southeast University Rennes France
Deep learning is a hot research topic in the field of machine learning methods and applications. Generative Adversarial networks (GANs) and Variational Auto-Encoders (VAEs) provide impressive image generations from Ga... 详细信息
来源: 评论
Encrypted traffic identification based on N-gram entropy and cumulative sum test  2018
Encrypted traffic identification based on N-gram entropy and...
收藏 引用
13th International Conference on Future Internet Technologies, CFI 2018
作者: Cheng, Guang Hu, Ying School of Cyber Science and Engineering Southeast University China Key Laboratory of Computer Network and Information Integration Ministry of Education China
Since existing methods using entropy are less effective in characterizing encrypted traffic, this paper proposes an encrypted traffic identification method based on n-gram entropy and cumulative sum. This method analy... 详细信息
来源: 评论
Mining hypernym-hyponym relations from social tags via tag embedding  5th
Mining hypernym-hyponym relations from social tags via tag e...
收藏 引用
5th International Conference on Artificial Intelligence and Security, ICAIS 2019
作者: Zhang, Mengyi Wu, Tianxing Ji, Qiu Qi, Guilin Sun, Zhixin School of Computer Science and Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Nanjing China School of Computer Science and Engineering Nanyang Technological University Singapore Singapore School of Modern Posts and Institute of Modern Posts Nanjing University of Posts and Telecommunications Nanjing China YuanTong Express Co. LTD. Shanghai China
With the rapid development of Internet of Thing, mobile Internet, cloud computing and other technologies, network data increases dramatically and Folksonomy plays an important role in web systems. How to obtain valuab... 详细信息
来源: 评论
Optimal Defense Policies for Cost-Constrained Cyber Physical System
Optimal Defense Policies for Cost-Constrained Cyber Physical...
收藏 引用
International Conference on Advanced Cloud and Big Data (CBD)
作者: Yong Cheng Yonggang Yang Qian Guo Bingfeng Xu Gaofeng He State Grid Shanxi Eelectric Power Company Xian China Global Energy Interconnection Research Institute co. Ltd Nanjing China College of Information Science and Technology Nanjing Forestry University Nanjing China College of Internet of Things Nanjing University of Posts and Telecommunications Nanjing China Ministry of Education Key Laboratory of Computer Network and Information Integration (Southeast University)
Cyber-Physical System (CPS) usually consists of vast amounts of heterogeneous nodes, and several types of nodes may not be upgraded or installed with new programs during their life spans. How to choose appropriate nod... 详细信息
来源: 评论
Building an efficient intrusion detection system based on feature selection and ensemble classifier
arXiv
收藏 引用
arXiv 2019年
作者: Zhou, Yuyang Cheng, Guang Jiang, Shanqing Dai, Mian School of Cyber Science and Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration Ministry of Education Nanjing China Jiangsu Provincial Key Laboratory of Computer Network Technology Southeast University Nanjing China National Key Laboratory of Science and Technology on Information System Security Beijing China
Intrusion detection system (IDS) is one of extensively used techniques in a network topology to safeguard the integrity and availability of sensitive assets in the protected systems. Although many supervised and unsup... 详细信息
来源: 评论
Neural storyline extraction model for storyline generation from news articles
Neural storyline extraction model for storyline generation f...
收藏 引用
2018 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, NAACL HLT 2018
作者: Zhou, Deyu Guo, Linsen He, Yulan School of Computer Science and Engineering Key Laboratory of Computer Network and Information Integration Southeast University China School of Engineering and Applied Science Aston University United Kingdom
Storyline generation aims to extract events described on news articles under a certain topic and reveal how those events evolve over time. Most existing approaches first train supervised models to extract events from ... 详细信息
来源: 评论
Generalization Based Privacy-Preserving Provenance Publishing  15th
Generalization Based Privacy-Preserving Provenance Publishin...
收藏 引用
15th Web information Systems and Applications Conference, WISA 2018
作者: Wu, Jian Ni, Weiwei Zhang, Sen Department of Computer Science and Engineering Southeast University Nanjing211189 China Key Laboratory of Computer Network and Information Integration in Southeast University Ministry of Education Nanjing211189 China
With thriving of data sharing, demands of data provenance publishing become increasingly urgent. Data provenance describes about how data is generated and evolves with time. Data provenance has many applications, in-c... 详细信息
来源: 评论
COSINE:a software development model integrating collective intelligence, service and ecosystem
COSINE:a software development model integrating collective i...
收藏 引用
IEEE World Congress on Services (SERVICES)
作者: Hongbing Wang Tianjing Hong Jian Cao Haijun Zhang Changhai Nie Bo Cheng Yangfan He Li Kuang Dunwei Gong Wuhui Chen Yuliang Shi Deyi Huang School of Computer Science and Engineering and Key Laboratory of Computer Network and Information Integration Southeast University Nanjing China Shanghai Jiaotong University Shanghai China College of Computer Science and Technology Harbin Institute of Technology Shenzhen China Nanjing University Nanjing China Wuhan University Wuhan China Research Institute of Network Technology Beijing University of Posts and Telecommunications Beijing China Software College Central South University Changsha China College of information and control engineering China University of mining and technology Xuzhou China College of data science and computer science Zhongshan University Guangzhou China Shandong University Jinan China Landry Company Shenzhen China
With the development of the internet technology, a large amount of softwares have emerged to meet users' increasing needs. At the mean time, software systems have been faced with a problem that they must adapt to ... 详细信息
来源: 评论
Relevant emotion ranking from text constrained with emotion relationships
Relevant emotion ranking from text constrained with emotion ...
收藏 引用
2018 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, NAACL HLT 2018
作者: Zhou, Deyu Yang, Yang He, Yulan School of Computer Science and Engineering Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University China School of Engineering and Applied Science Aston University United Kingdom
Text might contain or invoke multiple emotions with varying intensities. As such, emotion detection, to predict multiple emotions associated with a given text, can be cast into a multi-label classification problem. We... 详细信息
来源: 评论
Analysis and Improvement of an Efficient Controlled Quantum Secure Direct Communication and Authentication Protocol
收藏 引用
computers, Materials & Continua 2018年 第12期57卷 621-633页
作者: Jifeng Zhong Zhihao Liu Juan Xu Navigation College Jimei UniversityXiamen361021China School of Computer Science and Engineering Southeast UniversityNanjing211189China Key Laboratory of Computer Network and Information Integration Southeast UniversityMinistry of EducationNanjing211189China Institute for Quantum Computing University of WaterlooWaterlooONCanadaN2L3G1
The controlled quantum secure direct communication(CQSDC)with authentication protocol based on four particle cluster states via quantum one-time pad and local unitary operations is *** is found that there are some ser... 详细信息
来源: 评论