咨询与建议

限定检索结果

文献类型

  • 1,855 篇 会议
  • 1,001 篇 期刊文献
  • 15 册 图书

馆藏范围

  • 2,871 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,767 篇 工学
    • 937 篇 计算机科学与技术...
    • 714 篇 信息与通信工程
    • 708 篇 软件工程
    • 414 篇 电子科学与技术(可...
    • 295 篇 电气工程
    • 206 篇 光学工程
    • 195 篇 控制科学与工程
    • 160 篇 仪器科学与技术
    • 106 篇 机械工程
    • 89 篇 动力工程及工程热...
    • 82 篇 生物工程
    • 64 篇 网络空间安全
    • 55 篇 材料科学与工程(可...
    • 51 篇 航空宇航科学与技...
    • 46 篇 生物医学工程(可授...
    • 44 篇 交通运输工程
    • 39 篇 建筑学
    • 38 篇 土木工程
    • 38 篇 化学工程与技术
  • 842 篇 理学
    • 434 篇 数学
    • 294 篇 物理学
    • 149 篇 统计学(可授理学、...
    • 98 篇 生物学
    • 91 篇 系统科学
    • 54 篇 化学
  • 319 篇 管理学
    • 230 篇 管理科学与工程(可...
    • 114 篇 工商管理
    • 99 篇 图书情报与档案管...
  • 55 篇 法学
    • 38 篇 社会学
  • 38 篇 医学
    • 35 篇 临床医学
  • 21 篇 经济学
  • 12 篇 文学
  • 11 篇 军事学
  • 9 篇 农学
  • 4 篇 教育学
  • 2 篇 艺术学

主题

  • 187 篇 computer network...
  • 135 篇 laboratories
  • 104 篇 wireless sensor ...
  • 79 篇 bandwidth
  • 70 篇 computational mo...
  • 63 篇 quality of servi...
  • 60 篇 protocols
  • 55 篇 wireless communi...
  • 54 篇 real time system...
  • 53 篇 throughput
  • 53 篇 interference
  • 51 篇 computer archite...
  • 50 篇 resource managem...
  • 49 篇 application soft...
  • 49 篇 delay
  • 45 篇 wireless network...
  • 44 篇 processor schedu...
  • 43 篇 hardware
  • 42 篇 signal to noise ...
  • 42 篇 energy consumpti...

机构

  • 195 篇 computer enginee...
  • 119 篇 state key labora...
  • 115 篇 state key labora...
  • 81 篇 state key labora...
  • 76 篇 shandong provinc...
  • 56 篇 computer enginee...
  • 51 篇 key laboratory o...
  • 43 篇 peng cheng labor...
  • 42 篇 shandong enginee...
  • 39 篇 computer enginee...
  • 39 篇 state key labora...
  • 36 篇 state key labora...
  • 28 篇 state key labora...
  • 27 篇 state key labora...
  • 27 篇 state key labora...
  • 27 篇 state key labora...
  • 25 篇 eth zurich compu...
  • 23 篇 shandong fundame...
  • 22 篇 frontiers scienc...
  • 21 篇 state key labora...

作者

  • 114 篇 lothar thiele
  • 69 篇 thiele lothar
  • 47 篇 wattenhofer roge...
  • 45 篇 guo hong
  • 36 篇 wang xingjun
  • 35 篇 xingjun wang
  • 31 篇 zhigang zhang
  • 28 篇 han zhu
  • 27 篇 jian-jia chen
  • 24 篇 hui li
  • 24 篇 zhang zhigang
  • 23 篇 l. thiele
  • 23 篇 zhu han
  • 23 篇 xiang cheng
  • 22 篇 haowen shu
  • 22 篇 zhiping zhou
  • 21 篇 pratyush kumar
  • 21 篇 hong guo
  • 21 篇 jan beutel
  • 20 篇 cheng xiang

语言

  • 2,654 篇 英文
  • 118 篇 其他
  • 99 篇 中文
检索条件"机构=Laboratory of Computer Engineering and Networks"
2871 条 记 录,以下是221-230 订阅
排序:
A Six Components Seismic Detection Method Based on Rotation and Motion  13th
A Six Components Seismic Detection Method Based on Rotation ...
收藏 引用
13th International Field Exploration and Development Conference, IFEDC 2023
作者: Feng, Hai-Xin Li, You-Ming Si, Jie-Ge Li, Zheng-Bin Cao, Yu The 3rd Research Institute of CETC Beijing China Key Laboratory of Petroleum Resources Research Institute of Geology and Geophysics Chinese Academy of Sciences Beijing China State Key Laboratory of Advanced Optical Communication Systems and Networks School of Electronics Engineering and Computer Science Peking University Beijing China Institute of Acoustics Chinese Academy of Sciences Beijing100190 China University of Chinese Academy of Sciences Beijing100049 China
This paper is based on elastic wave propagation and six component seismic detection methods to detect underwater targets, which makes up for the shortcomings of traditional underwater acoustic passive detection method... 详细信息
来源: 评论
Optimization for UAV-assisted simultaneous transmission and reception communications in the existence of malicious jammers
收藏 引用
Security and Safety 2024年 第1期3卷 68-87页
作者: Zhiyu Huang Shuzhen Liu Zhichao Sheng Hongwen Yu Antonino Masaracchia Key Laboratory of Specialty Fiber Optics and Optical Access Networks Shanghai UniversityShanghai 200444China School of Electronics Electrical Engineering and Computer ScienceQueen's University BelfastBelfast BT71NNUK
In this paper,we study an unmanned aerial vehicle(UAV)-assisted communication system,where the UAV is dispatched to implement simultaneous transmission and reception(STR)in the existence of multiple malicious *** sche... 详细信息
来源: 评论
Imperceptible and Reliable Adversarial Attack  1
收藏 引用
4th International Conference on Frontiers in Cyber Security, FCS 2021
作者: Zhang, Jiawei Wang, Jinwei Luo, Xiangyang Ma, Bin Xiong, Naixue School of Computer and Software Engineering Research Center of Digital Forensics Ministry of Education Nanjing University of Information Science and Technology Nanjing210044 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhenzhou450001 China Shandong Provincial Key Laboratory of Computer Networks and Qilu University of Technology Jinan250353 China Department of Computer Science and Mathematics Sul Ross State University AlpineTX79830 United States
Deep neural networks are vulnerable to adversarial examples, which can fool classifiers by adding small perturbations. Various adversarial attack methods have been proposed in the past several years, and most of them ... 详细信息
来源: 评论
Efficient Multi-Query Oriented Continuous Subgraph Matching  40
Efficient Multi-Query Oriented Continuous Subgraph Matching
收藏 引用
40th IEEE International Conference on Data engineering, ICDE 2024
作者: Ma, Ziyi Yang, Jianye Zhou, Xu Xiao, Guoqing Wang, Jianhua Yang, Liang Li, Kenli Lin, Xuemin School of Artificial Intelligence Hebei University of Technology China Wuzhou University Guangxi Key Laboratory of Machine Vision and Intelligent Control China Cyberspace Institute of Advanced Technology Guangzhou University China PengCheng Laboratory Department of New Networks China College of Computer Science and Electronic Engineering Hunan University China Shenzhen Research Institute Hunan University China Antai College of Economics and Management Shanghai Jiao Tong University China
Continuous subgraph matching (CSM) is a critical task for analyzing dynamic graphs and has a wide range of applications, such as merchant fraud detection, cyber-attack hunting, and rumor detection. Although many effic... 详细信息
来源: 评论
DIP: Diffusion Learning of Inconsistency Pattern for General DeepFake Detection
arXiv
收藏 引用
arXiv 2024年
作者: Nie, Fan Ni, Jiangqun Zhang, Jian Zhang, Bin Zhang, Weizhe School of Computer Science and Engineering Sun Yat-sen University Guangzhou510006 China The Department of New Networks Pengcheng Laboratory Shenzhen518066 China School of Cyber Science and Technology Sun Yat-sen University Shenzhen510275 China The Department of Networks Pengcheng Laboratory Shenzhen518066 China Department of Networks Pengcheng Laboratory Shenzhen518066 China School of Cyberspace Science Harbin Institute of Technology Harbin150001 China The Department of New Networks Peng Cheng Laboratory Shenzhen518066 China
With the advancement of deepfake generation techniques, the importance of deepfake detection in protecting multimedia content integrity has become increasingly obvious. Recently, temporal inconsistency clues have been... 详细信息
来源: 评论
Integrated Parallel Chaos driven LiDAR System with High Interference Tolerance
Integrated Parallel Chaos driven LiDAR System with High Inte...
收藏 引用
2023 Conference on Lasers and Electro-Optics, CLEO 2023
作者: Chen, Ruixuan Shen, Bitao Shu, Haowen Chang, Lin Xie, Weiqiang Liao, Wenchao Tao, Zihan Bowers, John Wang, Xingjun State Key Laboratory of Advanced Optical Communications System and Networks School of Electronics Peking University Beijing100871 China Department of Electrical and Computer Engineering University of California Santa BarbaraCA93106 United States Frontiers Science Center for Nano-Optoelectronics Peking University Beijing100871 China
We introduce a chaotic microcomb based high interference-tolerance parallel LiDAR. Parallel chaos with record-high noise spectra beyond 7 GHz leads to sub-cm-level ranging accuracy. The intrinsic orthogonality permits... 详细信息
来源: 评论
Simultaneous Communication and Localization for Double-RIS Aided Multi-UE ISAC Systems  23
Simultaneous Communication and Localization for Double-RIS A...
收藏 引用
23rd IEEE International Conference on Communication Technology, ICCT 2023
作者: Gan, Xu Huang, Chongwen Yang, Zhaohui Zhong, Caijun Chen, Xiaoming He, Jiguang Zhang, Zhaoyang Guo, Qinghua Yuen, Chau Debbah, Merouane College of Information Science and Electronic Engineering Zhejiang University China Xidian University State Key Laboratory of Integrated Service Networks China Technology Innovation Institute Abu Dhabi United Arab Emirates School of Electrical Computer and Telecommunications Engineering University of Wollongong Australia School of Electrical and Electronics Engineering Nanyang Technological University Singapore Khalifa University of Science and Technology United Arab Emirates
Reconfigurable intelligent surface (RIS) has great potential to improve the performance of integrated sensing and communication (ISAC) systems, especially in scenarios where line-of-sight paths between the base statio... 详细信息
来源: 评论
Autonomous Navigation of Agricultural Robots Utilizing Path Points and Deep Reinforcement Learning
Autonomous Navigation of Agricultural Robots Utilizing Path ...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Jipeng Kang Zhibin Zhang Yajie Liang Xu Chen Key Laboratory of Wireless Networks and Mobile Computing School of Computer Science Inner Mongolia University Hohhot China Engineering Research Center of Ecological Big Data School of Computer Science Inner Mongolia University Hohhot China
When using deep reinforcement learning algorithms for reactive navigation, it is common to encounter situations where the agent gets stuck in a local optimum. In autonomous exploration without any prior knowledge, the... 详细信息
来源: 评论
Overview of Task Offloading of Wireless Sensor Network in Edge Computing Environment
Overview of Task Offloading of Wireless Sensor Network in Ed...
收藏 引用
IEEE International Conference on Electronic Information and Communication Technology (ICEICT)
作者: XiQiang Hou YiFan Hu Fuqiang Wang School of information and control engineering Qingdao University of Technology Qingdao China Shandong Computer Science Center and Shandong Provincial Key Laboratory of Computer Networks Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Computer Science Center and Shandong Provincial Key Laboratory of Computer Networks Qilu University of Technology (Shandong Academy of Sciences) China
This review article introduces the concepts, server architecture and application scenarios of Mobile Edge Computing (MEC) and Wireless Sensor Network (WSN). By differentiating between rechargeable and non-rechargeable...
来源: 评论
A 3D Memristive Cubic Map with Dual Discrete Memristors: Design, Implementation, and Application in Image Encryption
收藏 引用
IEEE Transactions on Circuits and Systems for Video Technology 2025年
作者: Gao, Suo Iu, Herbert Ho-Ching Erkan, Ugur Simsek, Cemaleddin Toktas, Abdurrahim Cao, Yinghong Wu, Rui Mou, Jun Li, Qi Wang, Chunpeng Dalian Polytechnic University School of Information Science and Engineering Dalian116034 China The University of Western Australia School of Electrical Electronic and Computer Engineering Perth6009 Australia Faculty of Engineering Electrical and Electronics Engineering Respectively Karamanoglu Mehmetbey University Karaman70200 Turkey Ankara University Engineering Faculty Department of Artificial Intelligence and Data Engineering Ankara06830 Turkey Harbin Institute of Technology School of Computer Science and Technology Harbin150001 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan250000 China
Discrete chaotic systems based on memristors exhibit excellent dynamical properties and are more straightforward to implement in hardware, making them highly suitable for generating cryptographic keystreams. However, ... 详细信息
来源: 评论