咨询与建议

限定检索结果

文献类型

  • 1,059 篇 会议
  • 982 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 2,043 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,353 篇 工学
    • 886 篇 计算机科学与技术...
    • 687 篇 软件工程
    • 439 篇 信息与通信工程
    • 193 篇 电子科学与技术(可...
    • 177 篇 电气工程
    • 130 篇 控制科学与工程
    • 92 篇 光学工程
    • 82 篇 网络空间安全
    • 81 篇 生物工程
    • 77 篇 机械工程
    • 73 篇 仪器科学与技术
    • 59 篇 动力工程及工程热...
    • 41 篇 建筑学
    • 40 篇 生物医学工程(可授...
    • 37 篇 化学工程与技术
    • 36 篇 土木工程
    • 34 篇 交通运输工程
    • 34 篇 航空宇航科学与技...
  • 600 篇 理学
    • 383 篇 数学
    • 135 篇 物理学
    • 128 篇 统计学(可授理学、...
    • 89 篇 生物学
    • 45 篇 系统科学
    • 38 篇 化学
  • 363 篇 管理学
    • 213 篇 管理科学与工程(可...
    • 158 篇 图书情报与档案管...
    • 84 篇 工商管理
  • 56 篇 法学
    • 45 篇 社会学
  • 33 篇 医学
    • 31 篇 临床医学
  • 27 篇 经济学
    • 27 篇 应用经济学
  • 16 篇 农学
  • 13 篇 军事学
  • 6 篇 文学
  • 5 篇 教育学
  • 4 篇 艺术学

主题

  • 77 篇 feature extracti...
  • 65 篇 semantics
  • 60 篇 accuracy
  • 51 篇 computational mo...
  • 48 篇 cryptography
  • 44 篇 protocols
  • 43 篇 training
  • 40 篇 wireless sensor ...
  • 37 篇 federated learni...
  • 36 篇 deep learning
  • 33 篇 privacy
  • 30 篇 servers
  • 30 篇 data models
  • 29 篇 machine learning
  • 29 篇 clustering algor...
  • 28 篇 computer network...
  • 27 篇 information secu...
  • 26 篇 data mining
  • 25 篇 laboratories
  • 24 篇 routing

机构

  • 214 篇 shandong provinc...
  • 158 篇 key laboratory o...
  • 157 篇 school of comput...
  • 81 篇 key laboratory o...
  • 71 篇 state key labora...
  • 60 篇 key laboratory o...
  • 59 篇 college of infor...
  • 59 篇 key laboratory o...
  • 51 篇 shandong fundame...
  • 45 篇 key laboratory o...
  • 42 篇 shandong enginee...
  • 42 篇 the key laborato...
  • 41 篇 state key labora...
  • 41 篇 state key labora...
  • 41 篇 key laboratory o...
  • 40 篇 school of comput...
  • 36 篇 key laboratory o...
  • 35 篇 school of inform...
  • 31 篇 school of cyber ...
  • 27 篇 state key labora...

作者

  • 43 篇 ren jiadong
  • 40 篇 guo hong
  • 36 篇 zhou deyu
  • 32 篇 jianfeng ma
  • 27 篇 min-ling zhang
  • 26 篇 ma jianfeng
  • 26 篇 hu yupu
  • 25 篇 zhang min-ling
  • 21 篇 yang yang
  • 21 篇 han zhu
  • 20 篇 zhang yichen
  • 20 篇 guang cheng
  • 18 篇 hui li
  • 18 篇 ma jian-feng
  • 17 篇 yu song
  • 17 篇 xiaoming wu
  • 17 篇 xiaoping li
  • 16 篇 geng xin
  • 16 篇 he yulan
  • 16 篇 luo bin

语言

  • 1,834 篇 英文
  • 110 篇 中文
  • 101 篇 其他
检索条件"机构=The Key Laboratory for Computer Networks and Information Integration"
2043 条 记 录,以下是31-40 订阅
排序:
Data secure transmission intelligent prediction algorithm for mobile industrial IoT networks
收藏 引用
Digital Communications and networks 2023年 第2期9卷 400-410页
作者: Lingwei Xu Hao Yin Hong Jia Wenzhong Lin Xinpeng Zhou Yong Fu Xu Yu Department of Information Science and Technology Qingdao University of Science and TechnologyQingdao266061China Fujian Key Laboratory of Sensing and Computing for Smart Cities Xiamen UniversityXiamen361005China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control(Minjiang University) Fuzhou350121China Faculty of Information Science and Engineering Ocean University of ChinaQingdao266100China Shandong Provincial Key Laboratory of Computer Networks Shandong Computer Science Center(National Supercomputer Center in Jinan)JinanChina
Mobile Industrial Internet of Things(IIoT)applications have achieved the explosive growth in recent *** mobile IIoT has flourished and become the backbone of the industry,laying a solid foundation for the interconnect... 详细信息
来源: 评论
Analog parallel processor for broadband multifunctional integrated system based on silicon photonic platform
收藏 引用
Light(Science & Applications) 2025年 第3期14卷 746-756页
作者: Na Qian Defu Zhou Haowen Shu Ming Zhang Xingjun Wang Daoxin Dai Xiao Deng Weiwen Zou State Key Laboratory of Advanced Optical Communication Systems and Networks Intelligent Microwave Lightwave Integration Innovation Center(imLic)Department of Electronic EngineeringShanghai Jiao Tong UniversityShanghaiChina State Key Laboratory of Advanced Optical Communications System and Networks Department of ElectronicsSchool of Electronics Engineering and Computer SciencePeking UniversityBejingChina State Key Laboratory of Extreme Photonics and Instrumentation College of Optical Science and EngineeringInternational Research Center for Advanced PhotonicsZhejiang UniversityHangzhouChina
Sharing the hardware platform between diverse information systems to establish full cooperation among different functionalities has attracted substantial ***,broadband multifunctional integrated systems with large ope... 详细信息
来源: 评论
CB-YOLO: A Small Object Detection Algorithm for Industrial Scenarios
CB-YOLO: A Small Object Detection Algorithm for Industrial S...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Chen, Hao Wu, Xiaoming Su, Zhanzhi Zhao, Ying Dong, Yunfeng Liu, Xiangzhi Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
In certain specific industrial scenarios, smoking and cellphone usage are strictly prohibited behaviors. In these scenarios, it is crucial to rapidly and accurately detect smoking and cell phone usage, and promptly is... 详细信息
来源: 评论
BTP-CAResNet: An Encrypted Traffic Classification Method Based on Byte Transfer Probability and Coordinate Attention Mechanism
BTP-CAResNet: An Encrypted Traffic Classification Method Bas...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Li, Junhao Shi, Huiling Zhang, Wei Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
With the extensive application of network traffic encryption technology, the accurate and efficient classification of encrypted traffic has become a critical need for network management. Deep learning has become the p... 详细信息
来源: 评论
RFSD-YOLO: An Enhanced X-Ray Object Detection Model for Prohibited Items
RFSD-YOLO: An Enhanced X-Ray Object Detection Model for Proh...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Kong, Xiaotong Li, Aimin Li, Wenqiang Li, Zhiyao Zhang, Yuechen Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
X-ray image detection is essential for ensuring public safety, but traditional methods rely heavily on human analysis and are relatively inefficient. To address this issue, this paper proposes a new object detection m... 详细信息
来源: 评论
Contract-Based Incentive Mechanisms for UAV networks in Covert Communications
收藏 引用
IEEE Transactions on Vehicular Technology 2025年 第5期74卷 7378-7391页
作者: Tian, Wen Fan, Hao Liu, Guangjie Du, Miao Liu, Yinqiu Niyato, Dusit Han, Zhu Nanjing University of Information Science and Technology School of Electronic and Information Engineering Nanjing University of Information Science and Technology Key Laboratory of Intelligent Support Technology In Complex Environment Ministry of Education Nanjing210044 China Southeat University School of Computer Science and Engineering China Southeast University Key Laboratory of Computer Network and Information Integration Ministry of Education Nanjing China Nanyang Technological University School of Computer Science and Engineering 639798 Singapore University of Houston Department of Electrical and Computer Engineering HoustonTX77004 United States Kyung Hee University Department of Computer Science and Engineering Seoul446-701 Korea Republic of
Covert communication is considered a promising technology for hiding transmission processes and activities from malicious eavesdropping. With the development of detection technology, the traditional point-to-point cov... 详细信息
来源: 评论
Attack based on data: a novel perspective to attack sensitive points directly
收藏 引用
Cybersecurity 2024年 第3期7卷 111-123页
作者: Yuyao Ge Zhongguo Yang Lizhe Chen Yiming Wang Chengyang Li School of Information Science and Technology North China University of TechnologyBeijingChina Bejing Key Laboratory on Integration and Analysis of Large-Scale Stream Data North China University of TechnologyBeijingChina School of Computer Science Peking UniversityBeijingChina
Adversarial attack for time-series classification model is widely explored and many attack methods are *** there is not a method of attack based on the data *** this paper,we innovatively proposed a black-box sparse a... 详细信息
来源: 评论
LDD-YOLO: An Improved Lightweight Detection Method for Steel Surface Defects Based on YOLOv8
LDD-YOLO: An Improved Lightweight Detection Method for Steel...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Zhang, Yuechen Li, Aimin Li, Zhiyao Kong, Xiaotong Li, Wenqiang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
Steel is an indispensable raw material in the industrial field, steel surface defects seriously affect the quality of steel, in recent years a lot of research has been carried out on the detection of steel surface def... 详细信息
来源: 评论
Integrating Syntactic and Semantic Knowledge in AMR Parsing with Heterogeneous Graph Attention Network  48
Integrating Syntactic and Semantic Knowledge in AMR Parsing ...
收藏 引用
48th IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2023
作者: Sataer, Yikemaiti Shi, Chuanqi Gao, Miao Fan, Yunlong Li, Bin Gao, Zhiqiang Southeast University School of Computer Science and Engineering Nanjing China Ministry of Education Key Laboratory of Computer Network and Information Integration Nanjing China
Meaning Representation (AMR) parsing is the task of translating a sentence to an AMR semantic graph which captures the basic meaning of the sentence, and is empowered by pre-trained Transformer models recently. These ... 详细信息
来源: 评论
GCAT: graph calibration attention transformer for robust object tracking
收藏 引用
Neural Computing and Applications 2024年 第23期36卷 14151-14172页
作者: Chen, Si Hu, Xinxin Wang, Da-Han Yan, Yan Zhu, Shunzhi Fujian Key Laboratory of Pattern Recognition and Image Understanding School of Computer and Information Engineering Xiamen University of Technology Xiamen361024 China State Key Laboratory of Integrated Services Networks Xidian University Xi’an710071 China Fujian Key Laboratory of Sensing and Computing for Smart City School of Informatics Xiamen University Xiamen361005 China
Recent Siamese trackers have taken advantage of transformers to achieve impressive advancements. However, existing transformer trackers ignore considering the positional and structural information between tokens, and ... 详细信息
来源: 评论