咨询与建议

限定检索结果

文献类型

  • 304 篇 会议
  • 232 篇 期刊文献

馆藏范围

  • 536 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 349 篇 工学
    • 282 篇 计算机科学与技术...
    • 233 篇 软件工程
    • 95 篇 信息与通信工程
    • 35 篇 控制科学与工程
    • 31 篇 生物工程
    • 22 篇 电气工程
    • 18 篇 机械工程
    • 18 篇 电子科学与技术(可...
    • 16 篇 生物医学工程(可授...
    • 15 篇 网络空间安全
    • 14 篇 光学工程
    • 13 篇 仪器科学与技术
    • 12 篇 动力工程及工程热...
    • 7 篇 建筑学
    • 7 篇 土木工程
    • 7 篇 交通运输工程
    • 6 篇 化学工程与技术
  • 148 篇 理学
    • 100 篇 数学
    • 31 篇 生物学
    • 25 篇 统计学(可授理学、...
    • 19 篇 物理学
    • 14 篇 系统科学
    • 8 篇 化学
  • 122 篇 管理学
    • 68 篇 管理科学与工程(可...
    • 58 篇 图书情报与档案管...
    • 25 篇 工商管理
  • 14 篇 法学
    • 13 篇 社会学
  • 10 篇 医学
    • 9 篇 临床医学
    • 7 篇 基础医学(可授医学...
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 5 篇 农学
  • 3 篇 文学
  • 3 篇 艺术学
  • 2 篇 教育学
  • 2 篇 军事学

主题

  • 28 篇 semantics
  • 17 篇 routing
  • 16 篇 training
  • 15 篇 feature extracti...
  • 15 篇 machine learning
  • 15 篇 protocols
  • 15 篇 clustering algor...
  • 12 篇 network topology
  • 12 篇 wireless sensor ...
  • 11 篇 privacy
  • 10 篇 educational inst...
  • 10 篇 computer network...
  • 9 篇 peer to peer com...
  • 9 篇 cloud computing
  • 9 篇 heuristic algori...
  • 8 篇 computer science
  • 8 篇 deep learning
  • 8 篇 big data
  • 8 篇 laboratories
  • 8 篇 quality of servi...

机构

  • 154 篇 school of comput...
  • 81 篇 key laboratory o...
  • 62 篇 key laboratory o...
  • 46 篇 key laboratory o...
  • 40 篇 school of comput...
  • 36 篇 key laboratory o...
  • 30 篇 school of cyber ...
  • 19 篇 key laboratory o...
  • 15 篇 ministry of educ...
  • 11 篇 school of cyber ...
  • 9 篇 guangxi collabor...
  • 9 篇 department of co...
  • 9 篇 national key lab...
  • 9 篇 shanghai key lab...
  • 9 篇 the school of co...
  • 9 篇 college of softw...
  • 8 篇 the key laborato...
  • 8 篇 southeast univer...
  • 8 篇 moe key laborato...
  • 7 篇 jiangsu provinci...

作者

  • 35 篇 zhou deyu
  • 25 篇 zhang min-ling
  • 22 篇 min-ling zhang
  • 20 篇 guang cheng
  • 17 篇 xiaoping li
  • 16 篇 geng xin
  • 16 篇 he yulan
  • 14 篇 sanfeng zhang
  • 13 篇 cheng guang
  • 12 篇 li xiaoping
  • 12 篇 qi guilin
  • 11 篇 jia yuheng
  • 11 篇 shu huazhong
  • 11 篇 yang peng
  • 11 篇 kong youyong
  • 10 篇 wang yun
  • 10 篇 yang guanyu
  • 9 篇 xiaoyan hu
  • 9 篇 gao zhiqiang
  • 9 篇 chen yang

语言

  • 441 篇 英文
  • 60 篇 其他
  • 36 篇 中文
检索条件"机构=Laboratory of Computer Network and Information Integration"
536 条 记 录,以下是21-30 订阅
排序:
HilAnchor:Location Privacy Protection in the Presence of Users' Preferences
收藏 引用
Journal of computer Science & Technology 2012年 第2期27卷 413-427页
作者: 倪巍伟 郑锦旺 崇志宏 School of Computer Science and Engineering Southeast University Key Laboratory of Computer Network and Information Integration in Southeast University Ministry of Education
Location privacy receives considerable attentions in emerging location based *** current practices however either ignore users' preferences or incompletely fulfill privacy *** this paper,we propose a privacy protecti... 详细信息
来源: 评论
The Distributed Intelligent Collaboration to UAV-Assisted VEC: Joint Position Optimization and Task Scheduling
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Yi, Meng Lee, Vincent C.S. Yang, Peng Li, Peisong Zhang, Yifan Wei, Wei Gao, Honghao Southeast University School of Computer Science and Engineering Nanjing211189 China Monash University Faculty of IT Department of DS and AI ClaytonVIC3800 Australia Southeast University School of Computer Science and Engineering the Key Laboratory of Computer Network and Information Integration Ministry of Education Nanjing211189 China Xidian University Hangzhou Institute of Technology Hangzhou311200 China Southeast University-Monash University Joint Graduate School Suzhou215123 China Xi'an University of Technology School of Computer Science and Engineering Xi'an710048 China Shanghai University School of Computer Engineering and Science Shanghai200444 China
Deploying Unmanned Aerial Vehicles (UAVs) as aerial base stations enhances the coverage and performance of communication networks in Vehicular Edge Computing (VEC) scenarios. However, due to the limited communication ... 详细信息
来源: 评论
FLSSM: A Federated Learning Storage Security Model with Homomorphic Encryption
arXiv
收藏 引用
arXiv 2025年
作者: Li, Yang Xia, Chunhe Li, Chang Li, Xiaojian Wang, Tianbo School of Computer Science and Engineering Beihang University Beijing100191 China Key Laboratory of Beijing Network Technology Beihang University Beijing100191 China Guangxi Collaborative Innovation Center Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin541004 China School of Computer Science and Technology Zhengzhou University of Light Industry Zhengzhou450000 China College of Computer Science and Information Technology Guangxi Normal University Guilin541004 China School of Cyber Science and Technology Beihang University Beijing100191 China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai201112 China
Federated learning based on homomorphic encryption has received widespread attention due to its high security and enhanced protection of user data privacy. However, the characteristics of encrypted computation lead to... 详细信息
来源: 评论
Identifying Abnormal Hosts in Data Streams Using Reversible Sketch
Engineering Reports
收藏 引用
Engineering Reports 2025年 第5期7卷
作者: Aiping Zhou Jin Qian School of Information Engineering Taizhou University Taizhou China Key Laboratory of Computer Network and Information Integration (Southeast University) Ministry of Education Nanjing China
Significant cardinality change is an important sign of the beginning of network attacks. Hosts associated with significant cardinality changes usually exhibit abnormal behavior. Identifying abnormal hosts is meaningfu... 详细信息
来源: 评论
A Direction-Based Data Forwarding Algorithm for Opportunistic networks
收藏 引用
Journal of Electronic Science and Technology 2016年 第2期14卷 152-159页
作者: Jie Yu Yue Ling Si-Ying Li Hui-Qi Fang Lin-Feng Liu School of Computer Science and Technology Nangjing University of Posts and Telecommunications Laboratory of Computer Network and Information Integration Southeast University
In this paper, the forwarding objective and mobility law of nodes in opportunistic networks are first investigated to establish a mathematical model for further analysis, then a gradually accelerated data forwarding a... 详细信息
来源: 评论
Asynchronous Tag-based Physical-Layer Authentication in Wireless Communications
收藏 引用
IEEE Transactions on Wireless Communications 2025年
作者: Tan, Haijun Xu, Yuntao Du, Jiewei Xie, Ning Li, Hongbin Peng Cheng Laboratory Control and Network Foundation Laboratory Frontier Research Center Shenzhen518107 China Shenzhen University State Key Laboratory of Radio Frequency Heterogeneous Integration The Guangdong Key Laboratory of Intelligent Information Processing College of Electronics and Information Engineering Shenzhen518060 China Beijing Jiaotong University School of Electronic and Information Engineering Beijing100044 China National Innovation Center of High Speed Train Qingdao266111 China Stevens Institute of Technology Department of Electrical and Computer Engineering HobokenNJ07030 United States
Tag-based physical-layer authentication (PLA) has gained significant research interest due to its high security and low complexity compared to traditional upper-layer authentication mechanisms. However, conventional t... 详细信息
来源: 评论
Design and Implementation of Not So Cooperative Caching System
收藏 引用
China Communications 2015年 第7期12卷 31-46页
作者: HU Xiaoyan GONG Jian CHENG Guang ZHANG Weiwei Ahmad Jakalan School of Computer Science and Engineering Southeast University Key Laboratory of Computer Network and Information Integration (Southeast University) Ministry of Education
Not So Cooperative Caching(NSCC) considers a network comprised of selfish nodes; each is with caching capability and an objective of reducing its own access cost by fetching data from its local cache or from neighbori... 详细信息
来源: 评论
Parallel Sketch Based Super Node Detection with Traceability
收藏 引用
Chinese Journal of Electronics 2018年 第6期27卷 1133-1140页
作者: ZHOU Aiping LIU Lijun ZHU Huisheng ZHU Chen'gang CHEN Lin School of Computer Science and Technology Taizhou UniversityTaizhou 225300 China Key Laboratory of Computer Network and Information Integration (Southeast University) Ministry of Education
Traffic measurement and monitoring is crucial for network applications, such as network security, network management and so on. One central problem is to detect super nodes, which have significant change of connection... 详细信息
来源: 评论
A Novel Deep Hybrid Recommender System Based on Auto-encoder with Neural Collaborative Filtering
收藏 引用
Big Data Mining and Analytics 2018年 第3期1卷 211-221页
作者: Yu Liu Shuai Wang M.Shahrukh Khan Jieyu He School of Computer Science and Engineering and also with MOE Key Laboratory of Computer Network and Information Integration Southeast University
Due to the widespread availability of implicit feedback(e.g., clicks and purchases), some researchers have endeavored to design recommender systems based on implicit feedback. However, unlike explicit feedback,implici... 详细信息
来源: 评论
YOLO-CORE: Contour Regression for Efficient Instance Segmentation
收藏 引用
Machine Intelligence Research 2023年 第5期20卷 716-728页
作者: Haoliang Liu Wei Xiong Yu Zhang School of Computer Science and Engineering and the Key Laboratory of Computer Network and Information Integration(Ministry of Education) Southeast UniversityNanjing 211189China
Instance segmentation has drawn mounting attention due to its significant ***,high computational costs have been widely acknowledged in this domain,as the instance mask is generally achieved by pixel-level *** this pa... 详细信息
来源: 评论