咨询与建议

限定检索结果

文献类型

  • 155 篇 会议
  • 109 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 265 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 189 篇 工学
    • 149 篇 计算机科学与技术...
    • 124 篇 软件工程
    • 41 篇 信息与通信工程
    • 24 篇 控制科学与工程
    • 21 篇 网络空间安全
    • 19 篇 电气工程
    • 16 篇 电子科学与技术(可...
    • 12 篇 生物工程
    • 11 篇 机械工程
    • 9 篇 生物医学工程(可授...
    • 6 篇 交通运输工程
    • 5 篇 仪器科学与技术
    • 4 篇 光学工程
    • 4 篇 化学工程与技术
    • 4 篇 安全科学与工程
  • 84 篇 理学
    • 54 篇 数学
    • 15 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 13 篇 生物学
    • 10 篇 系统科学
    • 5 篇 化学
  • 43 篇 管理学
    • 28 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 9 篇 法学
    • 6 篇 社会学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 8 篇 医学
    • 7 篇 临床医学
    • 6 篇 基础医学(可授医学...
    • 5 篇 药学(可授医学、理...
  • 4 篇 军事学
    • 4 篇 军队指挥学
  • 2 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 17 篇 authentication
  • 11 篇 cryptography
  • 9 篇 cloud computing
  • 8 篇 deep learning
  • 8 篇 security
  • 7 篇 training
  • 6 篇 protocols
  • 5 篇 feature extracti...
  • 5 篇 malware
  • 5 篇 heuristic algori...
  • 4 篇 internet of thin...
  • 4 篇 access control
  • 4 篇 reinforcement le...
  • 4 篇 optimization
  • 4 篇 servers
  • 4 篇 internet
  • 4 篇 computers
  • 4 篇 semantics
  • 4 篇 blockchain
  • 4 篇 trusted computin...

机构

  • 21 篇 key lab of infor...
  • 7 篇 key lab of netwo...
  • 6 篇 guangxi key labo...
  • 6 篇 national compute...
  • 5 篇 network informat...
  • 5 篇 computer departm...
  • 5 篇 institute of inf...
  • 4 篇 ministry of edu....
  • 4 篇 key lab. of comp...
  • 4 篇 hebei provincial...
  • 4 篇 key lab of netwo...
  • 4 篇 college of compu...
  • 4 篇 college of mathe...
  • 4 篇 national languag...
  • 4 篇 national compute...
  • 4 篇 school of cyber ...
  • 4 篇 hubei provincial...
  • 4 篇 school of comput...
  • 4 篇 key laboratory o...
  • 4 篇 guangxi key lab ...

作者

  • 9 篇 meng deyu
  • 9 篇 tan zuowen
  • 9 篇 li hui
  • 7 篇 cao xiangyong
  • 6 篇 lopez javier
  • 5 篇 zhang yuqing
  • 5 篇 wang fangwei
  • 5 篇 javier lopez
  • 5 篇 feng yu
  • 5 篇 sun jin
  • 4 篇 fan kai
  • 4 篇 yong-zhen li
  • 4 篇 weizhong zhao
  • 4 篇 yong zhao
  • 4 篇 ma wenping
  • 4 篇 tingting he
  • 4 篇 wang yue
  • 4 篇 hu yupu
  • 4 篇 xingpeng jiang
  • 4 篇 guo shu

语言

  • 237 篇 英文
  • 17 篇 其他
  • 11 篇 中文
检索条件"机构=Lab of Computer Network and Information Security"
265 条 记 录,以下是101-110 订阅
排序:
Modeling of Layered Supply Chain network Considering Similarity
Modeling of Layered Supply Chain Network Considering Similar...
收藏 引用
第32届中国控制与决策会议
作者: Yi Zhang Yurong Song Guoping Jiang Bin Yu School of Computer Science Software and Network Space SecurityNanjing University of Posts and Telecommunications School of Automation Nanjing University of Posts and Telecommunications Jiangsu Engineering Lab for IOT Intelligent Robots(IOTRobot) Hengyang Key Laboratory of Information Secure and its application research
The supply chain network is a complex network with the risk of cascading *** study the cascading failure in it,an accurate supply chain network model needs to be *** this paper,we construct a layered supply chain netw... 详细信息
来源: 评论
ZSTAD: Zero-Shot Temporal Activity Detection
ZSTAD: Zero-Shot Temporal Activity Detection
收藏 引用
Conference on computer Vision and Pattern Recognition (CVPR)
作者: Lingling Zhang Xiaojun Chang Jun Liu Minnan Luo Sen Wang Zongyuan Ge Alexander Hauptmann School of Computer Science and Technology Xi'an Jiaotong University Xian China Ministry of Education Key Lab For Intelligent Networks and Network Security Xian China Faculty of Information Technology Monash University Australia National Engineering Lab for Big Data Analytics Xi'an Jiaotong University Xian China School of Information Technology and Electrical Engineering The University of Queensland Australia School of Computer Science Carnegie Mellon University USA
An integral part of video analysis and surveillance is temporal activity detection, which means to simultaneously recognize and localize activities in long untrimmed videos. Currently, the most effective methods of te... 详细信息
来源: 评论
label Noise Robust Curriculum for Deep Paraphrase Identification
Label Noise Robust Curriculum for Deep Paraphrase Identifica...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Boxin Li Tingwen Liu Bin Wang Lihong Wang Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Xiaomi AI Lab Beijing China National Computer Network Emergency Response Technical Team Coordination Center of China Beijing China
In this paper, we study the effect of label noise on deep learning models for paraphrase identification. Curriculum learning, a learning paradigm that learns easy samples first and then gradually proceeds with hard on... 详细信息
来源: 评论
Investigating Bi-level optimization for learning and vision from a unified perspective: A survey and beyond
arXiv
收藏 引用
arXiv 2021年
作者: Liu, Risheng Gao, Jiaxin Zhang, Jin Meng, Deyu Lin, Zhouchen DUT-RU International School of Information Science & Engineering Dalian University of Technology Key Laboratory for Ubiquitous Network Service Software of Liaoning Province Dalian116024 China Department of Mathematics Southern University of Science and Technology National Center for Applied Mathematics Shenzhen China School of Mathematics and Statistics Ministry of Education Key Lab of Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an Shaanxi China School of Electronics Engineering and Computer Science Peking University Beijing100871 China Cooperative Medianet Innovation Center Shanghai Jiao Tong University Shanghai200240 China
Bi-Level Optimization (BLO) is originated from the area of economic game theory and then introduced into the optimization community. BLO is able to handle problems with a hierarchical structure, involving two levels o... 详细信息
来源: 评论
ZSTAD: Zero-shot temporal activity detection
arXiv
收藏 引用
arXiv 2020年
作者: Zhang, Lingling Chang, Xiaojun Liu, Jun Luo, Minnan Wang, Sen Ge, Zongyuan Hauptmann, Alexander School of Computer Science and Technology Xian Jiaotong University Xian China Ministry of Education Key Lab For Intelligent Networks and Network Security Xian China Faculty of Information Technology Monash University Australia National Engineering Lab for Big Data Analytics Xian Jiaotong University Xian China School of Information Technology and Electrical Engineering University of Queensland Australia School of Computer Science Carnegie Mellon University United States
An integral part of video analysis and surveillance is temporal activity detection, which means to simultaneously recognize and localize activities in long untrimmed videos. Currently, the most effective methods of te... 详细信息
来源: 评论
The Indoor Positioning System Using Fingerprint Method Based Deep Neural network  1
The Indoor Positioning System Using Fingerprint Method Based...
收藏 引用
1st International Conference on Smart City Innovation, ICSCI 2018
作者: Malik, R.F. Gustifa, R. Farissi, A. Stiawan, D. Ubaya, H. Ahmad, M.R. Khirbeet, A.S. Communication Network and Information Security Research Lab Faculty of Computer Science Universitas Sriwijaya Jalan Srijaya Negara Bukit Besar Bukit Lama Ilir Bar. I Sumatera Selatan Palembang30128 Indonesia Faculty of Electronics and Computer Engineering Universiti Teknikal Malaysia Melaka Jalan Hang Tuah Jaya Durian Tunggal Melaka76100 Malaysia
Highly dynamic indoor environments being one of the challenge in the Indoor Positioning System (IPS). Collecting the Received Signal Strength (RSS) value from every WiFi access point known fingerprint method is presen... 详细信息
来源: 评论
WLAN Based Position Estimation System Using Classification Fuzzy K-Nearest Neighbor (FK-NN)  1
WLAN Based Position Estimation System Using Classification F...
收藏 引用
1st International Conference on Smart City Innovation, ICSCI 2018
作者: Malik, R.F. Mardiah Farissi, A. Stiawan, D. Zulfahmi, R. Ahmad, M.R. Khirbeet, A.S. Communication Network and Information Security Research Lab Faculty of Computer Science Universitas Sriwijaya Jalan Srijaya Negara Bukit Besar Bukit Lama Ilir Bar. I Kota Palembang Sumatera Selatan30128 Indonesia Faculty of Electronics and Computer Engineering Universiti Teknikal Malaysia Melaka Jalan Hang Tuah Jaya Durian Tunggal Melaka76100 Malaysia
Increasing the number of public hotspots using Wi-Fi technology is one of opportunity to gain advantage for proposing many new technologies. One of emerging technology is an estimation system to locate the object/pers... 详细信息
来源: 评论
Triple-view Learning for Predicting Antibiotic Resistance Genes
Triple-view Learning for Predicting Antibiotic Resistance Ge...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Shujie Luo Haifang Wu Weizhong Zhao Xingpeng Jiang Tingting He Hubei Provincial Key Laboratory of Artificial Intelligence and Smart Learning Central China Normal University Wuhan PR China School of Computer Central China Normal University Wuhan PR China National Language Resources Monitoring & Research Center for Network Media Central China Normal University Wuhan PR China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin PR China Guangxi Key Lab of Multi-source Information Mining & Security Guangxi Normal University Guilin PR China
With the increasing resistance of bacteria to antibiotics, the problem of antibiotic resistance has become a major challenge in healthcare. Therefore, the accurate identification of antibiotic resistance genes (ARGs) ... 详细信息
来源: 评论
Optimizing network resource allocation with graph pointer neural network in large-scale AI systems
收藏 引用
Digital Communications and networks 2024年
作者: Peiying Zhang Yilin Li Athanasios V. Vasilakos Konstantin Igorevich Kostromitin Jianyong Zhang Mohsen Guizani Qingdao Institute of Software College of Computer Science and Technology China University of Petroleum (East China) Qingdao 266580 China State Key Laboratory of Integrated Services Networks Xidian University Xi'an 710071 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan 250013 China Department of Networks and Communications College of Computer Science and Information Technology Imam Abdulrahman Bin Faisal University P.O. Box 1982 Dammam 31441 Saudi Arabia Department of Physics of Nanoscale Systems South Ural State University Chelyabinsk 454080 the Russian Federation Institute of Lightwave Technology Beijing Jiaotong University Beijing 100044 China Key Lab of All Optical Network and Advanced Telecommunication of EMC Institute of Lightwave Technology Beijing Jiaotong University Beijing 100044 China Machine Learning Department Mohamed Bin Zayed University of Artificial Intelligence (MBZUAI) Abu Dhabi 999041 United Arab Emirates
For increasingly complex communication demands of large-scale AI communication systems, the Space-Air-Ground Integrated network (SAGIN) better caters to demands but also raises concerns about resource scarcity and div... 详细信息
来源: 评论
An improved RL-based framework for multiple biomedical event extraction via self-supervised learning
An improved RL-based framework for multiple biomedical event...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Yao Zhao Weizhong Zhao Xingpeng Jiang Tingting He Bianping Su Hubei Provincial Key Laboratory of Artificial Intelligence and Smart Learning Central China Normal University Wuhan Hubei PR China School of Computer Central China Normal University Wuhan Hubei PR China National Language Resources Monitoring & Research Center for Network Media Central China Normal University Wuhan Hubei PR China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin PR China Guangxi Key Lab of Multi-source Information Mining & Security Guangxi Normal University Guilin PR China Xi’an University of Architecture and Technology Xi’an Shanxi PR China
The main goal of biomedical event extraction is to structurally extract biomedical events from texts, however, the specificity of the domain makes both text modeling and data annotation very difficult. We propose a se... 详细信息
来源: 评论