咨询与建议

限定检索结果

文献类型

  • 1,067 篇 会议
  • 997 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 2,066 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,367 篇 工学
    • 895 篇 计算机科学与技术...
    • 697 篇 软件工程
    • 440 篇 信息与通信工程
    • 196 篇 电子科学与技术(可...
    • 181 篇 电气工程
    • 134 篇 控制科学与工程
    • 94 篇 光学工程
    • 82 篇 网络空间安全
    • 81 篇 生物工程
    • 78 篇 机械工程
    • 74 篇 仪器科学与技术
    • 59 篇 动力工程及工程热...
    • 41 篇 建筑学
    • 40 篇 生物医学工程(可授...
    • 38 篇 化学工程与技术
    • 37 篇 交通运输工程
    • 36 篇 土木工程
    • 35 篇 航空宇航科学与技...
  • 607 篇 理学
    • 385 篇 数学
    • 136 篇 物理学
    • 129 篇 统计学(可授理学、...
    • 91 篇 生物学
    • 45 篇 系统科学
    • 39 篇 化学
  • 364 篇 管理学
    • 212 篇 管理科学与工程(可...
    • 160 篇 图书情报与档案管...
    • 84 篇 工商管理
  • 56 篇 法学
    • 45 篇 社会学
  • 34 篇 医学
    • 31 篇 临床医学
  • 27 篇 经济学
    • 27 篇 应用经济学
  • 16 篇 农学
  • 13 篇 军事学
  • 6 篇 文学
  • 5 篇 教育学
  • 4 篇 艺术学

主题

  • 74 篇 feature extracti...
  • 65 篇 semantics
  • 60 篇 accuracy
  • 51 篇 computational mo...
  • 48 篇 cryptography
  • 44 篇 protocols
  • 43 篇 training
  • 40 篇 wireless sensor ...
  • 37 篇 federated learni...
  • 35 篇 deep learning
  • 33 篇 privacy
  • 30 篇 servers
  • 30 篇 machine learning
  • 30 篇 data models
  • 29 篇 clustering algor...
  • 28 篇 computer network...
  • 27 篇 information secu...
  • 26 篇 data mining
  • 25 篇 laboratories
  • 24 篇 routing

机构

  • 216 篇 shandong provinc...
  • 162 篇 school of comput...
  • 160 篇 key laboratory o...
  • 84 篇 key laboratory o...
  • 71 篇 state key labora...
  • 60 篇 key laboratory o...
  • 59 篇 college of infor...
  • 59 篇 key laboratory o...
  • 53 篇 shandong fundame...
  • 45 篇 key laboratory o...
  • 42 篇 shandong enginee...
  • 42 篇 the key laborato...
  • 41 篇 state key labora...
  • 41 篇 state key labora...
  • 41 篇 school of comput...
  • 41 篇 key laboratory o...
  • 35 篇 key laboratory o...
  • 33 篇 school of inform...
  • 30 篇 school of cyber ...
  • 27 篇 state key labora...

作者

  • 43 篇 ren jiadong
  • 40 篇 guo hong
  • 37 篇 zhou deyu
  • 32 篇 jianfeng ma
  • 28 篇 zhang min-ling
  • 27 篇 min-ling zhang
  • 26 篇 ma jianfeng
  • 26 篇 hu yupu
  • 21 篇 yang yang
  • 20 篇 han zhu
  • 20 篇 zhang yichen
  • 20 篇 guang cheng
  • 18 篇 hui li
  • 18 篇 ma jian-feng
  • 17 篇 yu song
  • 17 篇 xiaoming wu
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 17 篇 huang chongwen
  • 16 篇 geng xin

语言

  • 1,817 篇 英文
  • 143 篇 其他
  • 110 篇 中文
检索条件"机构=The Key Laboratory for Computer Networks and Information Integration"
2066 条 记 录,以下是381-390 订阅
排序:
TIBS: A Deep-Learning Model for Network Intrusion Detection for SDN Environments
TIBS: A Deep-Learning Model for Network Intrusion Detection ...
收藏 引用
International Conference on computers, Communications, and Systems (ICCCS)
作者: Yilin Zhang Xiaoming Wu Huomin Dong Key Laboratory of Computing Power Network and Information Security Shandong Computer Science Center (National Supercomputer Center in Jinan) Ministry of Education Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Software-Defined Networking (SDN) is a modern network strategy that replaces traditional network structures. Its management efficiency and convenience are significantly higher than traditional networks. However, it sh... 详细信息
来源: 评论
The Task Collaborative Migration Method for Marine IoT Based on Edge Computing-RESTful Architecture
The Task Collaborative Migration Method for Marine IoT Based...
收藏 引用
International Conference on Artificial Intelligence in information and Communication (ICAIIC)
作者: Yifan Hu Fuqiang Wang School of information and control engineering Qingdao University of Technology Qingdao China Shandong Computer Science Center and Shandong Provincial Key Laboratory of Computer Networks Qilu University of Technology (Shandong Academy of Sciences) Jinan China
Marine Internet of Things (Marine IoT) has garnered increasing interest in monitoring oceanic environments. But establishing a Marine IoT system for observing and processing marine environmental data presents various ...
来源: 评论
Collaborative Computation Model Based on Dependency Types and Constituent Trees for Aspect-Based Sentiment Analysis
Collaborative Computation Model Based on Dependency Types an...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Jia Yi Xiaoming Wu Yunfeng Dong Bei Qi Xiangzhi Liu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Aspect-based sentiment analysis(ABSA) is a fine-grained sentiment classification task that aims to identify the sentiment polarity of specific aspects in a sentence. Graph convolutional networks(GCN) have recently bee... 详细信息
来源: 评论
Semantic Reconstruction Guided Missing Cross-modal Hashing
Semantic Reconstruction Guided Missing Cross-modal Hashing
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Yafang Li Chaoqun Zheng Ruifan Zuo Wenpeng Lu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Cross-modal hashing is favored in the field of large-scale cross-modal retrieval for its fast query and low storage cost. Existing cross-modal hashing methods are typically based on an idealized assumption that data f... 详细信息
来源: 评论
Android Malware Detection Method Based on Graph Convolutional networks
Android Malware Detection Method Based on Graph Convolutiona...
收藏 引用
Artificial Intelligence and Power Systems (AIPS), International Conference on
作者: Qingling Xu Shumian Yang Lijuan Xu Dawei Zhao Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) (Shandong Academy of Sciences) Qilu University of Technology Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Facing the serious security threats posed by Android malware amidst the rapid development of mobile internet, there is an urgent need to develop more accurate and efficient detection technologies. This paper introduce... 详细信息
来源: 评论
In-band Network-Wide Telemetry for Topology-Varying LEO Satellite networks
In-band Network-Wide Telemetry for Topology-Varying LEO Sate...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Yan Zhang Tian Pan Qiang Fu Yan Zheng Xinyu Feng Jiang Liu Haipeng Yao Tao Huang Purple Mountain Laboratories Nanjing China Beijing University of Posts and Telecommunications Beijing China Ministry of Education Key Laboratory of Computer Network and Information Integration (Southeast University) China RMIT University Melbourne Australia
Driven by technological advances and new business models, we have seen a renewed interest in LEO satellite constellations. The deployment of large-scale LEO satellite networks is becoming a reality. The network topolo... 详细信息
来源: 评论
I Can See Your Secrets, A Way to Recognize User Pin Codes by Surveillance Camera  10
I Can See Your Secrets, A Way to Recognize User Pin Codes by...
收藏 引用
10th IEEE Smart World Congress, SWC 2024
作者: Guo, Zhenyang Cao, Jin Zan, Xiaoyong Yang, Jiawei Li, Ang Niu, Ben Sun, Zhe Yin, Lihua Li, Hui Xidian University School of Cyber Engineering Xi'an China The State Key Laboratory of Integrated Services Networks Xi'an China ByteDance Ltd Beijing China University of Maryland Department of Electrical & Computer Engineering College Park United States Institute of Information Engineering Chinese Academy of Sciences Beijing China Cyberspace Institute of Advanced Technology Guangzhou University Guangzhou China
Surveillance cameras are currently widely used in public and private places to enhance area security and reduce crime rates. However, the extensive use of surveillance cameras also poses significant threats, particula... 详细信息
来源: 评论
Tourist Attraction Recommendation System Based on Django and Collaborative Filtering  1st
Tourist Attraction Recommendation System Based on Django and...
收藏 引用
1st International Conference on Applied Intelligence, ICAI 2023
作者: Jiang, Yufeng Zhang, Yushu Li, Zhujun Yu, Wendong Wei, Hongwei Yuan, Lin Shandong Jinan250353 China Shandong Jinan250353 China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Shandong Jinan250353 China School of Art Nantong University Jiangsu Nantong226019 China Jinan Springs Patent and Trademark Office Shandong Jinan250014 China Shandong Tianyi Information Technology Co. Ltd. Jinan Shandong250101 China
Recently, with the development of social and economic levels and people's pursuit of quality of life, tourism has become the first choice for more and more people. However, the traditional travel agency-based tour... 详细信息
来源: 评论
Knowledge Distillation Using Global Fusion and Feature Restoration for Industrial Defect Detectors
Knowledge Distillation Using Global Fusion and Feature Resto...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Zhengqian Feng Xiyao Yue Wang Li Mingle Zhou Delong Han Gang Li SHANDONG SCICOM Information and Economy Research Institute CO. . Ltd Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Deep learning technology has been widely applied in industrial quality inspection tasks to improve the accuracy of defect detection, object recognition, and classification. However, in the task of object detection, bo... 详细信息
来源: 评论
Multi-Signal Fusion of Social Diffusion Graph with Bi-Directional Semantic Consistency
Multi-Signal Fusion of Social Diffusion Graph with Bi-Direct...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Huacheng Li Chunhe Xia Tianbo Wang Wanshuang Lin Changnan Jiang Chen Chen Yuan Zhao Key Laboratory of Beijing Network Technology Beihang University Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing Guangxi Normal University School of Cyber Science and Technology Beihang University Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai
Devising diffusion graph to learn user representations is a crucial step in studying information propagation prediction. However, previous works mainly focused on structural and temporal features. To better incorporat...
来源: 评论