咨询与建议

限定检索结果

文献类型

  • 2,171 篇 会议
  • 1,830 篇 期刊文献
  • 15 册 图书

馆藏范围

  • 4,016 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,697 篇 工学
    • 1,938 篇 计算机科学与技术...
    • 1,559 篇 软件工程
    • 710 篇 信息与通信工程
    • 352 篇 电气工程
    • 285 篇 电子科学与技术(可...
    • 283 篇 生物工程
    • 279 篇 控制科学与工程
    • 166 篇 机械工程
    • 158 篇 光学工程
    • 141 篇 生物医学工程(可授...
    • 129 篇 仪器科学与技术
    • 107 篇 网络空间安全
    • 105 篇 动力工程及工程热...
    • 100 篇 化学工程与技术
    • 93 篇 交通运输工程
    • 70 篇 安全科学与工程
    • 66 篇 土木工程
  • 1,257 篇 理学
    • 649 篇 数学
    • 324 篇 物理学
    • 303 篇 生物学
    • 182 篇 统计学(可授理学、...
    • 111 篇 系统科学
    • 104 篇 化学
  • 752 篇 管理学
    • 454 篇 管理科学与工程(可...
    • 311 篇 图书情报与档案管...
    • 180 篇 工商管理
  • 144 篇 医学
    • 111 篇 临床医学
    • 91 篇 基础医学(可授医学...
  • 121 篇 法学
    • 85 篇 社会学
  • 74 篇 经济学
    • 74 篇 应用经济学
  • 30 篇 农学
  • 28 篇 教育学
  • 21 篇 军事学
  • 16 篇 文学
  • 9 篇 艺术学

主题

  • 95 篇 semantics
  • 94 篇 feature extracti...
  • 79 篇 deep learning
  • 74 篇 accuracy
  • 72 篇 computational mo...
  • 67 篇 training
  • 63 篇 security
  • 56 篇 machine learning
  • 50 篇 protocols
  • 49 篇 cloud computing
  • 49 篇 cryptography
  • 48 篇 computer science
  • 47 篇 authentication
  • 45 篇 predictive model...
  • 44 篇 blockchain
  • 44 篇 data models
  • 43 篇 privacy
  • 42 篇 optimization
  • 42 篇 computer network...
  • 41 篇 federated learni...

机构

  • 171 篇 school of comput...
  • 79 篇 school of comput...
  • 68 篇 school of comput...
  • 65 篇 key laboratory o...
  • 62 篇 school of cyber ...
  • 62 篇 hubei key labora...
  • 61 篇 jiangsu engineer...
  • 57 篇 school of comput...
  • 50 篇 national compute...
  • 48 篇 national compute...
  • 45 篇 school of comput...
  • 43 篇 computer network...
  • 42 篇 key laboratory o...
  • 38 篇 school of comput...
  • 36 篇 school of comput...
  • 32 篇 beijing key labo...
  • 31 篇 national enginee...
  • 31 篇 school of comput...
  • 30 篇 school of comput...
  • 30 篇 beijing key labo...

作者

  • 62 篇 du bo
  • 35 篇 tao dacheng
  • 29 篇 zhou deyu
  • 27 篇 liu zhi
  • 27 篇 wang jin
  • 25 篇 sun xingming
  • 24 篇 yang yang
  • 23 篇 zhang min-ling
  • 22 篇 lianzhong liu
  • 22 篇 min-ling zhang
  • 22 篇 yichuan wang
  • 21 篇 konstantinou s.
  • 21 篇 xinhong hei
  • 21 篇 guang cheng
  • 21 篇 xia chunhe
  • 21 篇 zhao yao
  • 20 篇 lethuillier m.
  • 20 篇 pauls a.
  • 20 篇 lehti s.
  • 20 篇 waltenberger w.

语言

  • 3,701 篇 英文
  • 209 篇 其他
  • 107 篇 中文
  • 2 篇 日文
  • 1 篇 德文
检索条件"机构=School of Computer Science and Network Engineering"
4016 条 记 录,以下是121-130 订阅
排序:
Advances and challenges in artificial intelligence text generation
收藏 引用
Frontiers of Information Technology & Electronic engineering 2024年 第1期25卷 64-83页
作者: Bing LI Peng YANG Yuankang SUN Zhongjian HU Meng YI School of Computer Science and Engineering Southeast UniversityNanjing 210000China Key Laboratory of Computer Network and Information Integration Ministry of EducationSoutheast UniversityNanjing 210000China
Text generation is an essential research area in artificial intelligence(AI)technology and natural language processing and provides key technical support for the rapid development of AI-generated content(AIGC).It is b... 详细信息
来源: 评论
JNMR: Joint Non-Linear Motion Regression for Video Frame Interpolation
收藏 引用
IEEE Transactions on Image Processing 2023年 32卷 5283-5295页
作者: Liu, Meiqin Xu, Chenming Yao, Chao Lin, Chunyu Zhao, Yao Beijing Jiaotong University Institute of Information Science Beijing100044 China Beijing Key Laboratory of Advanced Information Science and Network Technology Beijing100044 China University of Science and Technology Beijing School of Computer and Communication Engineering Beijing100083 China
Video frame interpolation (VFI) aims to generate predictive frames by motion-warping from bidirectional references. Most examples of VFI utilize spatiotemporal semantic information to realize motion estimation and int... 详细信息
来源: 评论
BiRSwinT: Bilinear full-scale residual swin-transformer for fine-grained driver behavior recognition
收藏 引用
Journal of the Franklin Institute 2023年 第2期360卷 1166-1183页
作者: Yang, Wenxuan Tan, Chenghao Chen, Yuxin Xia, Huang Tang, Xuexi Cao, Yifan Zhou, Wenhui Lin, Lili Dai, Guojun School of Computer Science and Technology Hangzhou Dianzi University Hangzhou China Hangzhou Ocean Engine Network Technology Co. Ltd. China School of Information and Electronic Engineering Zhejiang Gongshang University Hangzhou China
Driver behavior recognition has attracted extensive attention recently. Numerous methods have been developed on the basis of various deep neural networks. However, the existing models still suffer from various challen... 详细信息
来源: 评论
Improving Multimodal Rumor Detection via Dynamic Graph Modeling  27th
Improving Multimodal Rumor Detection via Dynamic Graph Model...
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Wu, Xinyu Hu, Xiaoxu Qin, Xugong Zhang, Peng Zeng, Gangyan Guo, Yu Zhao, Runbo Huang, Xinjian School of Cyber Science and Engineering Nanjing University of Science and Technology Nanjing China National Computer Network Response Technical Team/Coordination Center Technology Beijing China Laboratory for Advanced Computing and Intelligence Engineering Wuxi China
Due to the proliferation of rumors in social networks, automatic rumor detection has evoked increasing attention in recent years. Despite great progress achieved by exploiting multimodal features, existing works suffe... 详细信息
来源: 评论
DTGCN: a method combining dependency tree and graph convolutional networks for Chinese long-interval named entity relationship extraction
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第10期14卷 13361-13373页
作者: Li, Taoyuan Ma, Liangli Qin, Jiwei Ren, Wei College of Electronic Engineering Naval University of Engineering Wuhan China School of Computer Science China University of Geosciences Wuhan China Key Laboratory of Network Assessment Technology CAS Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China Henan Key Laboratory of Network Cryptography Technology Zhengzhou China
The extraction of relationships between military entities and descriptive entities is a key task for automated construction of military knowledge graphs. This category of text unstructured imposed problems such as unf... 详细信息
来源: 评论
LT-DBFT: A Hierarchical Blockchain Consensus Using Location and Trust in IoT
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Wang, Yang Xing, Xiaofei Li, Peiqiang Wang, Guojun Guangzhou University School of Computer Science and Cyber Engineering Guangzhou510006 China Guangzhou University School of Computer Science and Network Engineering Guangzhou510006 China
The exponential growth of IoT devices has led to the proposal of edge computing for data processing. The decentralized nature of edge computing servers and IoT devices makes blockchain ideal for connecting IoT users a... 详细信息
来源: 评论
Uncovering network Vulnerabilities and Conducting Digital Forensics Analysis for IoT Device Security in 6G  17
Uncovering Network Vulnerabilities and Conducting Digital Fo...
收藏 引用
17th IEEE International Conference on Advanced networks and Telecommunications Systems, ANTS 2023
作者: Siddiqui, Shams Tabrez Shahid Kamal, Mohammad Qidwai, Khalid Ali Imran Alam, Md Khan, Haneef Alam, Malik Zaib Budhiraja, Ishan Chintham, Sandeep Jazan University Department of Computer Science 45142 Saudi Arabia Jazan University Department of Computer and Network Engineering 45142 Saudi Arabia Bennett University School of Computer Science Engineering and Technology Greater Noida India Sr University School of Computer Science and Artificial Intelligence Telangana Warangal India
The proliferation of IoT gadgets has introduced game-changing technologies across a range of sectors. This widespread use has, however, revealed serious security holes, underscoring the importance of rigorous security... 详细信息
来源: 评论
HY-PC:Enabling Consistent Positioning and Communication Using Visible Light
收藏 引用
China Communications 2023年 第4期20卷 180-194页
作者: Xiangyu Liu Yaoheng Chen Lei Guo Song Song School of Information Science and Engineering Shenyang Ligong UniversityShenyang 110158China Department of Computer Science and Engineering Southern University of Science and TechnologyShenzhen 518055China School of Communication and Information Engineering Chongqing University of Posts and TelecommunicationsChongqing 400065China Hangzhou Institute of Advanced Technology Hangzhou 310056China Institute of Intelligent Communications and Network Security Chongqing University of Posts and TelecommunicationsChongqing 400065China
Visible light(VL)plays an important role in achieving high-precision positioning and low bit error radio(BER)data ***,most VL-based systems can not achieve positioning and communication,*** are two problems:1)the hybr... 详细信息
来源: 评论
SenseFuzz: Black-box Fuzzing of ICS Protocols via Runtime Statistics Sensing  9
SenseFuzz: Black-box Fuzzing of ICS Protocols via Runtime St...
收藏 引用
9th IEEE Smart World Congress, SWC 2023
作者: Li, Yin Fu, Anmin Zhang, Yuqing University of Chinese Academy of Sciences National Computer Network Intrusion Protection Center Beijing China Nanjing University of Science and Technology School of Computer Science and Engineering Nanjing China
The ICS protocols undertake critical functions in industrial control systems, by enabling real-time data exchange, data acquisition, parameter configuration, status monitoring, fault diagnosis, command issuance and ex... 详细信息
来源: 评论
Never Lost Keys:A Novel Key Generation Scheme Based on Motor Imagery EEG in End-Edge-Cloud System
收藏 引用
China Communications 2022年 第7期19卷 172-184页
作者: Yichuan Wang Dan Wu Xiaoxue Liu Xinhong Hei School of computer science and Engineering Xi’an University of TechnologyXi’an 710048China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an 710048China
Biometric key is generated from the user’s unique biometric features,and can effectively solve the security problems in ***,the current prevailing biometric key generation techniques such as fingerprint recognition a... 详细信息
来源: 评论