咨询与建议

限定检索结果

文献类型

  • 1,855 篇 会议
  • 1,001 篇 期刊文献
  • 15 册 图书

馆藏范围

  • 2,871 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,767 篇 工学
    • 937 篇 计算机科学与技术...
    • 714 篇 信息与通信工程
    • 708 篇 软件工程
    • 414 篇 电子科学与技术(可...
    • 295 篇 电气工程
    • 206 篇 光学工程
    • 195 篇 控制科学与工程
    • 160 篇 仪器科学与技术
    • 106 篇 机械工程
    • 89 篇 动力工程及工程热...
    • 82 篇 生物工程
    • 64 篇 网络空间安全
    • 55 篇 材料科学与工程(可...
    • 51 篇 航空宇航科学与技...
    • 46 篇 生物医学工程(可授...
    • 44 篇 交通运输工程
    • 39 篇 建筑学
    • 38 篇 土木工程
    • 38 篇 化学工程与技术
  • 842 篇 理学
    • 434 篇 数学
    • 294 篇 物理学
    • 149 篇 统计学(可授理学、...
    • 98 篇 生物学
    • 91 篇 系统科学
    • 54 篇 化学
  • 319 篇 管理学
    • 230 篇 管理科学与工程(可...
    • 114 篇 工商管理
    • 99 篇 图书情报与档案管...
  • 55 篇 法学
    • 38 篇 社会学
  • 38 篇 医学
    • 35 篇 临床医学
  • 21 篇 经济学
  • 12 篇 文学
  • 11 篇 军事学
  • 9 篇 农学
  • 4 篇 教育学
  • 2 篇 艺术学

主题

  • 187 篇 computer network...
  • 135 篇 laboratories
  • 104 篇 wireless sensor ...
  • 79 篇 bandwidth
  • 70 篇 computational mo...
  • 63 篇 quality of servi...
  • 60 篇 protocols
  • 55 篇 wireless communi...
  • 54 篇 real time system...
  • 53 篇 throughput
  • 53 篇 interference
  • 51 篇 computer archite...
  • 50 篇 resource managem...
  • 49 篇 application soft...
  • 49 篇 delay
  • 45 篇 wireless network...
  • 44 篇 processor schedu...
  • 43 篇 hardware
  • 42 篇 signal to noise ...
  • 42 篇 energy consumpti...

机构

  • 195 篇 computer enginee...
  • 119 篇 state key labora...
  • 115 篇 state key labora...
  • 81 篇 state key labora...
  • 76 篇 shandong provinc...
  • 56 篇 computer enginee...
  • 51 篇 key laboratory o...
  • 43 篇 peng cheng labor...
  • 42 篇 shandong enginee...
  • 39 篇 computer enginee...
  • 39 篇 state key labora...
  • 36 篇 state key labora...
  • 28 篇 state key labora...
  • 27 篇 state key labora...
  • 27 篇 state key labora...
  • 27 篇 state key labora...
  • 25 篇 eth zurich compu...
  • 23 篇 shandong fundame...
  • 22 篇 frontiers scienc...
  • 21 篇 state key labora...

作者

  • 114 篇 lothar thiele
  • 69 篇 thiele lothar
  • 47 篇 wattenhofer roge...
  • 45 篇 guo hong
  • 36 篇 wang xingjun
  • 35 篇 xingjun wang
  • 31 篇 zhigang zhang
  • 28 篇 han zhu
  • 27 篇 jian-jia chen
  • 24 篇 hui li
  • 24 篇 zhang zhigang
  • 23 篇 l. thiele
  • 23 篇 zhu han
  • 23 篇 xiang cheng
  • 22 篇 haowen shu
  • 22 篇 zhiping zhou
  • 21 篇 pratyush kumar
  • 21 篇 hong guo
  • 21 篇 jan beutel
  • 20 篇 cheng xiang

语言

  • 2,654 篇 英文
  • 118 篇 其他
  • 99 篇 中文
检索条件"机构=Laboratory of Computer Engineering and Networks"
2871 条 记 录,以下是371-380 订阅
排序:
Enhancing Vehicular Edge Intelligence through Distributed Collaborative Generative AI Inference
Enhancing Vehicular Edge Intelligence through Distributed Co...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Gaochang Xie Renchao Xie Xinyuan Zhang Jiangtian Nie Qinqin Tang Qian Chen Dusit Niyato State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China Purple Mountain Laboratories Nanjing China School of Computer Science and Engineering Nanyang Technological University Singapore Singapore State Key Laboratory of Integrated Service Networks Xidian University Xi'an China
In recent years, there has been a proliferation of Edge Intelligence (EI) services, especially within Internet of Vehicles (IoV) scenarios, accompanied by a growing demand for multi-modal content generation. In respon... 详细信息
来源: 评论
Large Scale Model Enabled Semantic Communications Based on Robust Knowledge Distillation
Large Scale Model Enabled Semantic Communications Based on R...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Kuiyuan Ding Fangfang Liu Yang Yang Mingzhe Chen Caili Guo Beijing Key Laboratory of Network System Architecture and Convergence School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China Department of Electrical and Computer Engineering and the Institute for Data Science and Computing University of Miami Coral Gables FL USA Beijing Laboratory of Advanced Information Networks School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China
Large scale artificial intelligence (AI) models possess excellent capabilities in semantic representation and understanding, making them particularly well-suited for semantic encoding and decoding. However, the substa... 详细信息
来源: 评论
CoG-DQA: Chain-of-Guiding Learning with Large Language Models for Diagram Question Answering
CoG-DQA: Chain-of-Guiding Learning with Large Language Model...
收藏 引用
Conference on computer Vision and Pattern Recognition (CVPR)
作者: Shaowei Wang Lingling Zhang Longji Zhu Tao Qin Kim-Hui Yap Xinyu Zhang Jun Liu School of Computer Science and Technology Xi'an Jiaotong University China Key Laboratory of Intelligent Networks and Network Security Xi'an Jiaotong University Ministry of Education Xi'an Shaanxi China School of Electrical & Electronic Engineering Nanyang Technological University Singapore
Diagram Question Answering (DQA) is a challenging task, requiring models to answer natural language questions based on visual diagram contexts. It serves as a crucial basis for academic tutoring, technical support, an... 详细信息
来源: 评论
RedAgent: Red Teaming Large Language Models with Context-aware Autonomous Language Agent
arXiv
收藏 引用
arXiv 2024年
作者: Xu, Huiyu Zhang, Wenhui Wang, Zhibo Xiao, Feng Zheng, Rui Feng, Yunhe Ba, Zhongjie Ren, Kui The State Key Laboratory of Blockchain and Data Security Zhejiang University China School of Cyber Science and Technology Zhejiang University China Palo Alto Networks United States Department of Computer Science and Engineering University of North Texas United States
Recently, advanced Large Language Models (LLMs) such as GPT-4 have been integrated into many real-world applications like Code Copilot. These applications have significantly expanded the attack surface of LLMs, exposi... 详细信息
来源: 评论
Covert Communication Based on Non-Ideal Detection of Overt Channels
Covert Communication Based on Non-Ideal Detection of Overt C...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Xinyu Zhao Danyang Wang Zan Li Lei Qian Chenxi Li Ning Zhang State Key Laboratory of Integrated Service Networks Xidian University Xi'an China Northwest Air Traffic Management Bureau Xi'an China Department of Electrical and Computer Engineering University of Windsor Windsor ON Canada
In this paper, we study a covert communication strategy based on non-ideal detection on overt channels in Internet of Things (IoT) networks, where IoT device utilizes existing overt channels as spectrum masks to achie...
来源: 评论
Knowledge Representation-Actuated Based Spatio-Temporal Graph Neural Network Traffic Flow Prediction
Knowledge Representation-Actuated Based Spatio-Temporal Grap...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Yihan Liu Nianwen Ning Ning Lu Yi Zhou School of Artificial Intelligence Henan University Zhengzhou China International Joint Research Laboratory for Cooperative Vehicular Networks of Henan Zhengzhou China Department of Electrical and Computer Engineering Queen's University Canada
In the task of traffic flow forecasting, various external factors need to be considered to interfere with the flow, such as weather conditions, traffic accidents, emergency events, and Points of Interest (POIs). While...
来源: 评论
Robust Visual Question Answering: Datasets, Methods, and Future Challenges
arXiv
收藏 引用
arXiv 2023年
作者: Ma, Jie Wang, Pinghui Kong, Dechen Wang, Zewei Liu, Jun Pei, Hongbin Zhao, Junzhou Di, Jia The Ministry of Education of Key Laboratory for Intelligent Networks and Network Security School of Cyber Science and Engineering Xi’an Jiaotong University Shaanxi Xi’an710049 China The Ministry of Education of Key Laboratory for Intelligent Networks and Network Security School of Automation Science and Engineering Xi’an Jiaotong University Shaanxi Xi’an710049 China The Shannxi Provincial Key Laboratory of Big Data Knowledge Engineering School of Computer Science and Technology Xi’an Jiaotong University Shaanxi Xi’an710049 China
Visual question answering requires a system to provide an accurate natural language answer given an image and a natural language question. However, it is widely recognized that previous generic VQA methods often tend ... 详细信息
来源: 评论
FlowMur: A Stealthy and Practical Audio Backdoor Attack with Limited Knowledge
arXiv
收藏 引用
arXiv 2023年
作者: Lan, Jiahe Wang, Jie Yan, Baochen Yan, Zheng Bertino, Elisa The State Key Laboratory on Integrated Services Networks School of Cyber Engineering Xidian University China Hangzhou Institute of Technology Xidian University China Department of Computer Science Purdue University United States
Speech recognition systems driven by Deep Neural networks (DNNs) have revolutionized human-computer interaction through voice interfaces, which significantly facilitate our daily lives. However, the growing popularity... 详细信息
来源: 评论
Few-shot Open Relation Extraction with Gaussian Prototype and Adaptive Margin
arXiv
收藏 引用
arXiv 2024年
作者: Guo, Tianlin Zhang, Lingling Wang, Jiaxin Lei, Yunkuo Li, Yifei Wang, Haofen Liu, Jun School of Computer Science and Technology Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi'an Jiaotong University Xi’an710049 China School of Computer Science and Technology Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Xi'an Jiaotong University Xi’an710049 China College of Design and Innovation Tongji University Shanghai200092 China
Few-shot relation extraction with none-of-the-above (FsRE with NOTA) aims at predicting labels in few-shot scenarios with unknown classes. FsRE with NOTA is more challenging than the conventional few-shot relation ext... 详细信息
来源: 评论
A Method for Person Re-Identification and Trajectory Tracking in Cross-Device Edge Environments
A Method for Person Re-Identification and Trajectory Trackin...
收藏 引用
International Conference on Mobile Ad-hoc and Sensor networks, MSN
作者: Jian An Yunxiang Zhao Feifei Wang Xin He Xiaolin Gui School of Computer Science and Technology Shaanxi Provincial Key Laboratory of Computer Networks Xi’an Jiaotong University Xi’an China Henan Jiaoyuan Engineering Technology Group Co. LTD Henan China School of Software Henan University Henan China
Addressing expanded surveillance scopes, cross-device person re-identification emerges as a crucial issue. Traditional approaches to re-identification and tracking confront challenges in feature matching challenges, a... 详细信息
来源: 评论