咨询与建议

限定检索结果

文献类型

  • 1,067 篇 会议
  • 997 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 2,066 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,367 篇 工学
    • 895 篇 计算机科学与技术...
    • 697 篇 软件工程
    • 440 篇 信息与通信工程
    • 196 篇 电子科学与技术(可...
    • 181 篇 电气工程
    • 134 篇 控制科学与工程
    • 94 篇 光学工程
    • 82 篇 网络空间安全
    • 81 篇 生物工程
    • 78 篇 机械工程
    • 74 篇 仪器科学与技术
    • 59 篇 动力工程及工程热...
    • 41 篇 建筑学
    • 40 篇 生物医学工程(可授...
    • 38 篇 化学工程与技术
    • 37 篇 交通运输工程
    • 36 篇 土木工程
    • 35 篇 航空宇航科学与技...
  • 607 篇 理学
    • 385 篇 数学
    • 136 篇 物理学
    • 129 篇 统计学(可授理学、...
    • 91 篇 生物学
    • 45 篇 系统科学
    • 39 篇 化学
  • 364 篇 管理学
    • 212 篇 管理科学与工程(可...
    • 160 篇 图书情报与档案管...
    • 84 篇 工商管理
  • 56 篇 法学
    • 45 篇 社会学
  • 34 篇 医学
    • 31 篇 临床医学
  • 27 篇 经济学
    • 27 篇 应用经济学
  • 16 篇 农学
  • 13 篇 军事学
  • 6 篇 文学
  • 5 篇 教育学
  • 4 篇 艺术学

主题

  • 74 篇 feature extracti...
  • 65 篇 semantics
  • 60 篇 accuracy
  • 51 篇 computational mo...
  • 48 篇 cryptography
  • 44 篇 protocols
  • 43 篇 training
  • 40 篇 wireless sensor ...
  • 37 篇 federated learni...
  • 35 篇 deep learning
  • 33 篇 privacy
  • 30 篇 servers
  • 30 篇 machine learning
  • 30 篇 data models
  • 29 篇 clustering algor...
  • 28 篇 computer network...
  • 27 篇 information secu...
  • 26 篇 data mining
  • 25 篇 laboratories
  • 24 篇 routing

机构

  • 216 篇 shandong provinc...
  • 162 篇 school of comput...
  • 160 篇 key laboratory o...
  • 84 篇 key laboratory o...
  • 71 篇 state key labora...
  • 60 篇 key laboratory o...
  • 59 篇 college of infor...
  • 59 篇 key laboratory o...
  • 53 篇 shandong fundame...
  • 45 篇 key laboratory o...
  • 42 篇 shandong enginee...
  • 42 篇 the key laborato...
  • 41 篇 state key labora...
  • 41 篇 state key labora...
  • 41 篇 school of comput...
  • 41 篇 key laboratory o...
  • 35 篇 key laboratory o...
  • 33 篇 school of inform...
  • 30 篇 school of cyber ...
  • 27 篇 state key labora...

作者

  • 43 篇 ren jiadong
  • 40 篇 guo hong
  • 37 篇 zhou deyu
  • 32 篇 jianfeng ma
  • 28 篇 zhang min-ling
  • 27 篇 min-ling zhang
  • 26 篇 ma jianfeng
  • 26 篇 hu yupu
  • 21 篇 yang yang
  • 20 篇 han zhu
  • 20 篇 zhang yichen
  • 20 篇 guang cheng
  • 18 篇 hui li
  • 18 篇 ma jian-feng
  • 17 篇 yu song
  • 17 篇 xiaoming wu
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 17 篇 huang chongwen
  • 16 篇 geng xin

语言

  • 1,817 篇 英文
  • 143 篇 其他
  • 110 篇 中文
检索条件"机构=The Key Laboratory for Computer Networks and Information Integration"
2066 条 记 录,以下是421-430 订阅
排序:
Enhancing Security and Efficiency in Vehicle-to-Sensor Authentication: A Multi-Factor Approach with Cloud Assistance
Enhancing Security and Efficiency in Vehicle-to-Sensor Authe...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Xinrui Zhang Pincan Zhao Jason Jaskolka Department of Systems and Computer Engineering Carleton University Ottawa Canada State Key Laboratory of Integrated Services Networks Xidian University Xi’an China School of Information Technology Carleton University Ottawa Canada
Connected and Autonomous Vehicles (CAVs) can improve their perception by integrating data from roadside sensors. However, ensuring secure authentication between CAVs and sensors is challenging due to the limited capab... 详细信息
来源: 评论
Outage Probability Analysis of Uplink Heterogeneous Non-terrestrial networks: A Novel Stochastic Geometry Model
arXiv
收藏 引用
arXiv 2024年
作者: Dong, Wen-Yu Yang, Shaoshi Lin, Wei Zhao, Wei Gui, Jia-Xing Chen, Sheng The School of Information and Communication Engineering Beijing University of Posts and Telecommunications The Key Laboratory of Universal Wireless Communications Ministry of Education China The Key Laboratory of Mathematics and Information Networks Beijing100876 China The School of Electronics and Computer Science University of Southampton SouthamptonSO17 1BJ United Kingdom
In harsh environments such as mountainous terrain, dense vegetation areas, or urban landscapes, a single type of unmanned aerial vehicles (UAVs) may encounter challenges like flight restrictions, difficulty in task ex... 详细信息
来源: 评论
BEW-YOLO: An Improved Method for PCB Defect Detection Based on YOLOv7
BEW-YOLO: An Improved Method for PCB Defect Detection Based ...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Zhiyao Li Aimin Li Yuechen Zhang Xiaotong Kong Wenqiang Li Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
The PCB defect object size is small and the detection process is susceptible to background interference, usually have the problem of missed and false detection. In order to solve the above problems, an improved method...
来源: 评论
Geo-Enhanced High-Order Feature Interaction Network for Cloud API QoS Prediction  19th
Geo-Enhanced High-Order Feature Interaction Network for Clou...
收藏 引用
19th CCF Conference on computer Supported Cooperative Work and Social Computing, ChineseCSCW 2024
作者: Ma, Xinhong Zeng, Yehong Qi, Mingyang Si, Yali Chen, Zhen School of Information Science and Engineering Yanshan University Qinhuangdao066004 China Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Yanshan University Qinhuangdao066004 China Changshu Institute of Technology Jiangsu Changshu215500 China
In the era of open cloud, cloud API is an important component and key enabling technology to achieve efficient data transmission, artificial intelligence algorithm empowerment, and software development cost reduction ... 详细信息
来源: 评论
Learning to Cluster Person in the Video via Graph Convolution Network
Learning to Cluster Person in the Video via Graph Convolutio...
收藏 引用
IEEE International Symposium on information (IT) in Medicine and Education, ITME
作者: Wei Li Sixin Liang Ang Bian Guodong Du College of Computer Science Sichuan University Chengdu China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province School of Information Science and Engineering Yanshan University Qinhuangdao P.R. China
Video person re-identification is receiving academic interest. However, the practical application of the algorithm is hardly supported because of prohibitive annotated data. Hence, the study for unlabeled data will le...
来源: 评论
CTI-JE: A Joint Extraction Framework of Entities and Relations in Unstructured Cyber Threat Intelligence
CTI-JE: A Joint Extraction Framework of Entities and Relatio...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Yang Liu Xiaohui Han Wenbo Zuo Haiqing Lv Jing Guo Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Quan Cheng Laboratory Jinan China Information Research Institute Qilu University of Technology(Shandong Academy of Sciences) Jinan China
Advanced Persistent Threat (APT) pose an increasingly serious challenge to the security of businesses and organizations. In order to cope with these threats more effectively, effective utilization of cybers threat int... 详细信息
来源: 评论
Service-Based Event Penetration from IoT Sensors to Businesses: a Case Study
Service-Based Event Penetration from IoT Sensors to Business...
收藏 引用
2022 CCF International Conference on Service Science, CCF ICSS 2022
作者: Wang, Guiling Fang, Jun Wang, Jing Yu, Jian Zhang, Liang Han, Yanbo Beijing Key Laboratory on Integration and Analysis of Large-Scale Stream Data Beijing China North China University of Technology School of Information Science and Technology Beijing China Auckland University of Technology Department of Computer Science Auckland New Zealand Shanghai Key Laboratory of Data Science Shanghai China Shanghai Institute of Intelligent Electronics & Systems Shanghai China
By leveraging IoT Big Data, BPM can gain real-time physical world information to make faster and more accurate decisions, but there is a technical gap between IoT sensors and businesses. To bridge the gap, an event pe... 详细信息
来源: 评论
High-quality Arabidopsis thaliana Genome Assembly with Nanopore and HiFi Long Reads
收藏 引用
Genomics, Proteomics & Bioinformatics 2022年 第1期20卷 4-13页
作者: Bo Wang Xiaofei Yang Yanyan Jia Yu Xu Peng Jia Ningxin Dang Songbo Wang Tun Xu Xixi Zhao Shenghan Gao Quanbin Dong Kai Ye MOE Key Laboratory for Intelligent Networks&Network Security Faculty of Electronic and Information EngineeringXi’an Jiaotong UniversityXi’an 710049China School of Computer Science and Technology Faculty of Electronic and Information EngineeringXi’an Jiaotong UniversityXi’an 710049China School of Life Science and Technology Xi’an Jiaotong UniversityXi’an 710049China School of Automation Science and Engineering Faculty of Electronic and Information EngineeringXi’an Jiaotong UniversityXi’an 710049China Genome Institute the First Affiliated Hospital of Xi’an Jiaotong UniversityXi’an 710061China
Arabidopsis thaliana is an important and long-established model species for plant molecular biology,genetics,epigenetics,and ***,the latest version of reference genome still contains a significant number of missing **... 详细信息
来源: 评论
Grouped Federated Meta-Learning for Privacy-Preserving Rare Disease Diagnosis
Grouped Federated Meta-Learning for Privacy-Preserving Rare ...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Xinru Song Feng Wu Zongchao Xie Longxiang Gao Lei Cui Youyang Qu Shujun Gu Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China School of Computer Science University of Technology Sydney Australia Faculty of Science University of Melbourne Australia
Federated learning (FL) has been widely applied in medical field, which allows clients to collaboratively train global models without sharing local data. Nevertheless, the diversity and scarcity of samples from rare d... 详细信息
来源: 评论
Color and Feature Space Classification Methods Solve the Problem of Covariate Semantic information Deviation in Complex Scene Detection Tasks
Color and Feature Space Classification Methods Solve the Pro...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Mingle Zhou Rui Xing Min Li Delong Han Gang Li Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Shandong SCICOM Information and Economy Research Institute Co. Ltd Jinan China
The field weed detection task under the perspective of Plant Protection UAVs (PPU) is characterized by multi-scale targets and rich background semantic information, which belongs to the target detection task in comple... 详细信息
来源: 评论