咨询与建议

限定检索结果

文献类型

  • 451 篇 会议
  • 210 篇 期刊文献

馆藏范围

  • 661 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 324 篇 工学
    • 249 篇 计算机科学与技术...
    • 200 篇 软件工程
    • 87 篇 电气工程
    • 72 篇 信息与通信工程
    • 43 篇 控制科学与工程
    • 31 篇 网络空间安全
    • 29 篇 电子科学与技术(可...
    • 19 篇 安全科学与工程
    • 16 篇 光学工程
    • 15 篇 机械工程
    • 15 篇 交通运输工程
    • 14 篇 生物工程
    • 12 篇 生物医学工程(可授...
    • 9 篇 建筑学
    • 7 篇 仪器科学与技术
    • 5 篇 动力工程及工程热...
    • 5 篇 土木工程
  • 118 篇 理学
    • 82 篇 数学
    • 27 篇 统计学(可授理学、...
    • 24 篇 物理学
    • 14 篇 生物学
    • 14 篇 系统科学
    • 5 篇 化学
  • 76 篇 管理学
    • 49 篇 管理科学与工程(可...
    • 41 篇 图书情报与档案管...
    • 11 篇 工商管理
  • 15 篇 法学
    • 8 篇 法学
    • 8 篇 社会学
  • 7 篇 医学
    • 7 篇 临床医学
    • 6 篇 基础医学(可授医学...
  • 3 篇 经济学
  • 2 篇 教育学
  • 1 篇 军事学

主题

  • 73 篇 feature extracti...
  • 66 篇 accuracy
  • 55 篇 semantics
  • 40 篇 computational mo...
  • 38 篇 federated learni...
  • 35 篇 data models
  • 33 篇 training
  • 25 篇 deep learning
  • 24 篇 neural networks
  • 23 篇 transformers
  • 22 篇 privacy
  • 20 篇 adaptation model...
  • 19 篇 speech processin...
  • 19 篇 visualization
  • 19 篇 information secu...
  • 19 篇 security
  • 18 篇 noise
  • 18 篇 robustness
  • 18 篇 attention mechan...
  • 17 篇 object detection

机构

  • 227 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 45 篇 shandong fundame...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 24 篇 shandong provinc...
  • 20 篇 key laboratory o...
  • 16 篇 qilu university ...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 shandong fundame...
  • 14 篇 key laboratory o...
  • 13 篇 key laboratory o...
  • 11 篇 faculty of data ...
  • 10 篇 shandong enginee...
  • 10 篇 shandong fundame...
  • 10 篇 engineering rese...
  • 10 篇 key laboratory o...

作者

  • 19 篇 xiaoming wu
  • 15 篇 xiangzhi liu
  • 13 篇 guohua lv
  • 13 篇 mingle zhou
  • 12 篇 lu wenpeng
  • 12 篇 delong han
  • 12 篇 meng deyu
  • 12 篇 wenpeng lu
  • 11 篇 jing zhao
  • 11 篇 xiaohui han
  • 11 篇 fu chong
  • 11 篇 wang changwei
  • 11 篇 wei zhang
  • 10 篇 chen zhong
  • 9 篇 liu jun
  • 9 篇 guixin zhao
  • 9 篇 wenbo zuo
  • 9 篇 lianhai wang
  • 9 篇 gang li
  • 9 篇 min li

语言

  • 585 篇 英文
  • 64 篇 其他
  • 13 篇 中文
检索条件"机构=Ministry of Education Key Laboratory of Computer Network and InfoT~mation Security"
661 条 记 录,以下是41-50 订阅
排序:
An adaptive time-convolutional network online prediction method for ocean observation data  36
An adaptive time-convolutional network online prediction met...
收藏 引用
36th International Conference on Software Engineering and Knowledge Engineering, SEKE 2024
作者: Li, Enjing Li, Xiang Zhao, Zhigang Wu, Lu Wang, Yinglong Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Deep learning is particularly important in the field of time series data analysis, and has been applied to tasks such as marine data prediction. However, there is a’concept drift’ problem in marine observation data,... 详细信息
来源: 评论
An Adaptive Heterogeneous Credit Card Fraud Detection Model Based on Deep Reinforcement Training Subset Selection
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第8期5卷 4026-4041页
作者: Zhu, Kun Zhang, Nana Ding, Weiping Jiang, Changjun the Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai201804 China Collaborative Innovation Center for Financial Network Security Tongji University Shanghai201804 China the School of Computer Science and Technology Donghua University Shanghai201620 China the School of Information Science and Technology Nantong University Nantong226019 China
Heterogeneous fraud detection is an important means of credit card security assurance, which can utilize historical transaction records in a source and target domain to build an effective fraud detection model. Nevert... 详细信息
来源: 评论
LESaET: Low-Dimensional Embedding Method for Link Prediction Combining Self-Attention and Enhanced-TuckER
LESaET: Low-Dimensional Embedding Method for Link Prediction...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Ding, Lichao Zhao, Jing Lu, Kai Hao, Zenghao Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Knowledge graphs (KGs) provide a structured representation of the real world through entity-relation triples. However, current KGs are often incomplete, typically containing only a small fraction of all possible facts... 详细信息
来源: 评论
Source-free Domain Adaptation with Multiple Alignment for Efficient Image Retrieval
Source-free Domain Adaptation with Multiple Alignment for Ef...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Ni, Jinghui Cui, Hui Zhao, Lihai Li, Fengling Han, Xiaohui Xu, Lijuan Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science China Quan Cheng Laboratory China Shandong Open University China University of Technology Sydney Australia
Domain adaptation techniques help models generalize to target domains by addressing domain discrepancies between the source and target domain data distributions. These techniques are particularly valuable for cross-do... 详细信息
来源: 评论
A firmware upgrade solution based on hardware unique ID and SM4 cryptographic algorithm
A firmware upgrade solution based on hardware unique ID and ...
收藏 引用
2023 International Conference on computer Graphics, Artificial Intelligence, and Data Processing, ICCAID 2023
作者: Gao, Shaofeng Wang, Kun Chen, Xinze Fu, Yong Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan250000 China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan250000 China
This article presents and implements a firmware upgrade solution for embedded systems, which aims to address the vulnerability of using the same file that can be easily copied or stolen. When upgrading firmware, a txt... 详细信息
来源: 评论
Feature Aggregation network for Memory-Based Industrial Anomaly Detection  9
Feature Aggregation Network for Memory-Based Industrial Anom...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Li, Min Han, Delong Shao, Rui He, Jinghui City University of Macau Faculty of Data Science China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
In the process of large-scale industrial production, complex defects of different shapes and sizes can occur in industrial products and their components, and these defects seriously affect the performance of industria... 详细信息
来源: 评论
Provably Secure Efficient key-Exchange Protocol for Intelligent Supply Line Surveillance in Smart Grids
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 21784-21792页
作者: Ayub, Muhammad Faizan Li, Xiong Mahmood, Khalid Alenazi, Mohammed J.F. Das, Ashok Kumar Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu12599 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan Department of Computer Engineering Riyadh11451 Saudi Arabia International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500 032 India Korea University College of Informatics Department of Computer Science and Engineering Anam-ro Seoul145 Korea Republic of Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security China Shandong Fundamental Research Center for Computer Science Jinan 250353 China
Intelligent supply line surveillance is critical for modern smart grids. Smart sensors and gateway nodes are strategically deployed along supply lines to achieve intelligent surveillance. They collect data continuousl... 详细信息
来源: 评论
T³Planner: Multi-Phase Planning Across Structure-Constrained Optical, IP, and Routing Topologies
收藏 引用
IEEE Journal on Selected Areas in Communications 2025年 第5期43卷 1823-1839页
作者: Hao, Yijun Yang, Shusen Li, Fang Zhang, Yifan Zhao, Cong Ren, Xuebin Zhao, Peng Xu, Chenren Wang, Shibo Xi’an Jiaotong University National Engineering Laboratory for Big Data Analytics Xi’an710049 China Xi’an Jiaotong University National Engineering Laboratory for Big Data Analytics Ministry of Education Key Laboratory for Intelligent Networks and Network Security Xi’an710049 China Peking University School of Computer Science Beijing100871 China The Chinese University of Hong Kong Department of Computer Science and Engineering Hong Kong National Engineering Laboratory for Big Data Analytics Xi'an Jiaotong University Xi'an710049 China
network topology planning is an essential multi-phase process to build and jointly optimize the multi-layer network topologies in wide-area networks (WANs). Most existing practices target single-phase/layer planning, ... 详细信息
来源: 评论
BEW-YOLO: An Improved Method for PCB Defect Detection Based on YOLOv7  29
BEW-YOLO: An Improved Method for PCB Defect Detection Based ...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Li, Zhiyao Li, Aimin Zhang, Yuechen Kong, Xiaotong Li, Wenqiang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
The PCB defect object size is small and the detection process is susceptible to background interference, usually have the problem of missed and false detection. In order to solve the above problems, an improved method... 详细信息
来源: 评论
Visible Light Positioning Method for Indoor Line-of-Sight Scene Based on Time Series Coding  9
Visible Light Positioning Method for Indoor Line-of-Sight Sc...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Yu, Yonghao Guo, Yongde Zhao, Dawei Fu, Kexue Tang, Yongwei Wang, Qinyuan City University of Macau Faculty of Data Science China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Shandong University School of Mechanical Engineering Key Laboratory of High Efficiency and Clean Mechanical Manufacture Ministry of Education Jinan China
Existing indoor visible light positioning methods, such as those based on fingerprint database algorithms, are complex to construct and consume significant resources. In response to this issue, the text proposes an en... 详细信息
来源: 评论