咨询与建议

限定检索结果

文献类型

  • 2,171 篇 会议
  • 1,830 篇 期刊文献
  • 15 册 图书

馆藏范围

  • 4,016 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,697 篇 工学
    • 1,938 篇 计算机科学与技术...
    • 1,559 篇 软件工程
    • 710 篇 信息与通信工程
    • 352 篇 电气工程
    • 285 篇 电子科学与技术(可...
    • 283 篇 生物工程
    • 279 篇 控制科学与工程
    • 166 篇 机械工程
    • 158 篇 光学工程
    • 141 篇 生物医学工程(可授...
    • 129 篇 仪器科学与技术
    • 107 篇 网络空间安全
    • 105 篇 动力工程及工程热...
    • 100 篇 化学工程与技术
    • 93 篇 交通运输工程
    • 70 篇 安全科学与工程
    • 66 篇 土木工程
  • 1,257 篇 理学
    • 649 篇 数学
    • 324 篇 物理学
    • 303 篇 生物学
    • 182 篇 统计学(可授理学、...
    • 111 篇 系统科学
    • 104 篇 化学
  • 752 篇 管理学
    • 454 篇 管理科学与工程(可...
    • 311 篇 图书情报与档案管...
    • 180 篇 工商管理
  • 144 篇 医学
    • 111 篇 临床医学
    • 91 篇 基础医学(可授医学...
  • 121 篇 法学
    • 85 篇 社会学
  • 74 篇 经济学
    • 74 篇 应用经济学
  • 30 篇 农学
  • 28 篇 教育学
  • 21 篇 军事学
  • 16 篇 文学
  • 9 篇 艺术学

主题

  • 95 篇 semantics
  • 94 篇 feature extracti...
  • 79 篇 deep learning
  • 74 篇 accuracy
  • 72 篇 computational mo...
  • 67 篇 training
  • 63 篇 security
  • 56 篇 machine learning
  • 50 篇 protocols
  • 49 篇 cloud computing
  • 49 篇 cryptography
  • 48 篇 computer science
  • 47 篇 authentication
  • 45 篇 predictive model...
  • 44 篇 blockchain
  • 44 篇 data models
  • 43 篇 privacy
  • 42 篇 optimization
  • 42 篇 computer network...
  • 41 篇 federated learni...

机构

  • 171 篇 school of comput...
  • 79 篇 school of comput...
  • 68 篇 school of comput...
  • 65 篇 key laboratory o...
  • 62 篇 school of cyber ...
  • 62 篇 hubei key labora...
  • 61 篇 jiangsu engineer...
  • 57 篇 school of comput...
  • 50 篇 national compute...
  • 48 篇 national compute...
  • 45 篇 school of comput...
  • 43 篇 computer network...
  • 42 篇 key laboratory o...
  • 38 篇 school of comput...
  • 36 篇 school of comput...
  • 32 篇 beijing key labo...
  • 31 篇 national enginee...
  • 31 篇 school of comput...
  • 30 篇 school of comput...
  • 30 篇 beijing key labo...

作者

  • 62 篇 du bo
  • 35 篇 tao dacheng
  • 29 篇 zhou deyu
  • 27 篇 liu zhi
  • 27 篇 wang jin
  • 25 篇 sun xingming
  • 24 篇 yang yang
  • 23 篇 zhang min-ling
  • 22 篇 lianzhong liu
  • 22 篇 min-ling zhang
  • 22 篇 yichuan wang
  • 21 篇 konstantinou s.
  • 21 篇 xinhong hei
  • 21 篇 guang cheng
  • 21 篇 xia chunhe
  • 21 篇 zhao yao
  • 20 篇 lethuillier m.
  • 20 篇 pauls a.
  • 20 篇 lehti s.
  • 20 篇 waltenberger w.

语言

  • 3,701 篇 英文
  • 209 篇 其他
  • 107 篇 中文
  • 2 篇 日文
  • 1 篇 德文
检索条件"机构=School of Computer Science and Network Engineering"
4016 条 记 录,以下是151-160 订阅
排序:
Adaptive Compression-Encryption Scheme for Medical Image Based on Improved Compressive Sensing and Deoxyribonucleic Acid Coding-Compression
Adaptive Compression-Encryption Scheme for Medical Image Bas...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Xue, Xianglian Jin, Haiyan Zhou, Changjun Xi'an University of Technology School of Computer Science and Engineering Xi'an China Shaanxi University of Chinese Medicine Section of Computer Teaching and Research Xianyang China Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China Zhejiang Normal University School of Computer Science and Technology Jinhua China
Medical images often occupy large storage space and contain patient privacy or sensitive information, which makes them difficult and unsafe to be transmitted through the network. This paper proposed an adaptive compre... 详细信息
来源: 评论
AN EFFICIENT AND INTERPRETABLE SPEECH ENHANCEMENT network VIA DEEP DICTIONARY LEARNING  49
AN EFFICIENT AND INTERPRETABLE SPEECH ENHANCEMENT NETWORK VI...
收藏 引用
2024 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2024
作者: Xu, Xinmeng Zhang, Yiqun Tu, Weiping Yang, Yuhong NERCMS School of Computer Science Wuhan University China Hubei Luojia Laboratory China Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University China
Speech enhancement is a vital and highly ill-posed problem for many speech downstream tasks. While currently existing deep learning based speech enhancement methods have held state-of-the-art results, they still posse... 详细信息
来源: 评论
A Hybrid Perturbed Secret Sharing Federated Learning Framework  6
A Hybrid Perturbed Secret Sharing Federated Learning Framewo...
收藏 引用
6th International Conference on Next Generation Data-Driven networks, NGDN 2024
作者: Feng, Yinglin Chen, Shuhong Cheng, Zhaoyi Su, Weifeng Wang, Tian Guangzhou University School of Computer Science and Network Engineering Guangzhou China Beijing Normal University BNU-UIC Institute of Artificial Intelligence and Future Networks Beijing China
In recent years, the problem of privacy leakage in federated learning has received much attention. To address this issue, researchers have applied privacy preserving techniques to federated learning. However, differen... 详细信息
来源: 评论
Enriching molecular graph representation via substructure learning
Enriching molecular graph representation via substructure le...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Wang, HongHao Zhang, Acong Li, Ping Southwest Petroleum University School of Computer Science and Software Engineering Chengdu China China Mobile Jiangxi Co. Ltd. Network Department Ganzhou China
Continuous molecular graph representations are highly useful for effective molecule property predictions. However, learning graph-specific structure information remains challenging. Current graph neural network models... 详细信息
来源: 评论
Semi-supervised Medical Image Segmentation via Feature-perturbed Consistency
Semi-supervised Medical Image Segmentation via Feature-pertu...
收藏 引用
2023 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2023
作者: Yang, Yang Wang, Ruixuan Zhang, Tong Su, Jingyong Harbin Institute of Technology School of Computer Science and Technology Shenzhen China Peng Cheng Laboratory Department of Network Intelligence Shenzhen China Sun Yat-sen University School of Computer Science and Engineering Guangzhou China
Although deep convolutional neural networks have achieved satisfactory performance in many medical image segmentation tasks, a considerable annotation challenge still needs to be solved, which is expensive and time-co... 详细信息
来源: 评论
A Pseudonym Exchange-Based Traceable Location Privacy Protection Scheme for IoV
A Pseudonym Exchange-Based Traceable Location Privacy Protec...
收藏 引用
2023 International Conference on networking and network Applications, NaNA 2023
作者: Ma, Weigang Yu, Yaping Wang, Yichuan Liu, Xiaoxue Wang, Zhoukai School of Computer Science and Engineering Xi'an University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology China
Internet of Vehicles (IoV) is a network built by communicating entities such as vehicles and roadside infrastructure, etc. The entities can communicate with each other, sharing data and providing services. However, th... 详细信息
来源: 评论
A Novel On-Demand Service Architecture for Efficient Cloud-Edge Collaboration
A Novel On-Demand Service Architecture for Efficient Cloud-E...
收藏 引用
2023 International Conference on networking and network Applications, NaNA 2023
作者: Zhang, Yaling Chen, Jingjing Wang, Yichuan Xiao, Yeqiu Liu, Xiaoxue School of Computer Science and Engineering Xi'an University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology China
With the advent of 5G era, the model of cloud-edge collaboration is used to handle massive data computing tasks with significant superiority. However, this architecture still uses the traditional web service model, wh... 详细信息
来源: 评论
Popularization and Advancement of Cybersecurity in China: Status and Measures  6
Popularization and Advancement of Cybersecurity in China: St...
收藏 引用
6th IEEE International Conference on Electronic Information and Communication Technology, ICEICT 2023
作者: Yao, Junhao Lai, Guoming Wang, Huabin Chung, Kwok L. Huang, Sibo Chen, Jun School of Computer Science and Engineering Huizhou University Huizhou516007 China Huizhou University Network and Information Center Huizhou516007 China
In recent years, due to the increasing frequency of global cyber-attacks, the importance of cybersecurity has also increased. The popularization of security science in the entire cyberspace has become a key issue in C... 详细信息
来源: 评论
An Improved DVB-S2 Phase Coarse Synchronization Algorithm and Its FPGA Implementation  8
An Improved DVB-S2 Phase Coarse Synchronization Algorithm an...
收藏 引用
8th International Conference on Intelligent Computing and Signal Processing, ICSP 2023
作者: Zhang, Xianyu Zhang, Jing Huang, Zixuan Hefei University of Technology School of Computer Science and Information Engineering Hefei China Institude of Space Integrated Ground Network Hefei China
This paper proposes an improved phase coarse synchronization algorithm, which can be applied to the DVB-S2 system. The improved algorithm can handle the uncorrected residual frequency offset from the frequency synchro... 详细信息
来源: 评论
DDoS Attack Detection Based on Information Entropy Feature Extraction in Software Defined networks
DDoS Attack Detection Based on Information Entropy Feature E...
收藏 引用
2023 International Conference on networking and network Applications, NaNA 2023
作者: Ji, Wenjiang Yang, Yixin Zhang, Yaling Wang, Yichuan Tian, Mengjie Qiu, Yuan Xi'an University of Technology School of Computer Science and Engineering Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology China
Distributed Denial of Service(DDoS) attacks target the forwarding-control separation feature of Software-Defined networking(SDN) to launch attacks, causing network disruptions. Therefore security against DDoS attack d... 详细信息
来源: 评论