咨询与建议

限定检索结果

文献类型

  • 1,067 篇 会议
  • 997 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 2,066 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,367 篇 工学
    • 895 篇 计算机科学与技术...
    • 697 篇 软件工程
    • 440 篇 信息与通信工程
    • 196 篇 电子科学与技术(可...
    • 181 篇 电气工程
    • 134 篇 控制科学与工程
    • 94 篇 光学工程
    • 82 篇 网络空间安全
    • 81 篇 生物工程
    • 78 篇 机械工程
    • 74 篇 仪器科学与技术
    • 59 篇 动力工程及工程热...
    • 41 篇 建筑学
    • 40 篇 生物医学工程(可授...
    • 38 篇 化学工程与技术
    • 37 篇 交通运输工程
    • 36 篇 土木工程
    • 35 篇 航空宇航科学与技...
  • 607 篇 理学
    • 385 篇 数学
    • 136 篇 物理学
    • 129 篇 统计学(可授理学、...
    • 91 篇 生物学
    • 45 篇 系统科学
    • 39 篇 化学
  • 364 篇 管理学
    • 212 篇 管理科学与工程(可...
    • 160 篇 图书情报与档案管...
    • 84 篇 工商管理
  • 56 篇 法学
    • 45 篇 社会学
  • 34 篇 医学
    • 31 篇 临床医学
  • 27 篇 经济学
    • 27 篇 应用经济学
  • 16 篇 农学
  • 13 篇 军事学
  • 6 篇 文学
  • 5 篇 教育学
  • 4 篇 艺术学

主题

  • 74 篇 feature extracti...
  • 65 篇 semantics
  • 60 篇 accuracy
  • 51 篇 computational mo...
  • 48 篇 cryptography
  • 44 篇 protocols
  • 43 篇 training
  • 40 篇 wireless sensor ...
  • 37 篇 federated learni...
  • 35 篇 deep learning
  • 33 篇 privacy
  • 30 篇 servers
  • 30 篇 machine learning
  • 30 篇 data models
  • 29 篇 clustering algor...
  • 28 篇 computer network...
  • 27 篇 information secu...
  • 26 篇 data mining
  • 25 篇 laboratories
  • 24 篇 routing

机构

  • 216 篇 shandong provinc...
  • 162 篇 school of comput...
  • 160 篇 key laboratory o...
  • 84 篇 key laboratory o...
  • 71 篇 state key labora...
  • 60 篇 key laboratory o...
  • 59 篇 college of infor...
  • 59 篇 key laboratory o...
  • 53 篇 shandong fundame...
  • 45 篇 key laboratory o...
  • 42 篇 shandong enginee...
  • 42 篇 the key laborato...
  • 41 篇 state key labora...
  • 41 篇 state key labora...
  • 41 篇 school of comput...
  • 41 篇 key laboratory o...
  • 35 篇 key laboratory o...
  • 33 篇 school of inform...
  • 30 篇 school of cyber ...
  • 27 篇 state key labora...

作者

  • 43 篇 ren jiadong
  • 40 篇 guo hong
  • 37 篇 zhou deyu
  • 32 篇 jianfeng ma
  • 28 篇 zhang min-ling
  • 27 篇 min-ling zhang
  • 26 篇 ma jianfeng
  • 26 篇 hu yupu
  • 21 篇 yang yang
  • 20 篇 han zhu
  • 20 篇 zhang yichen
  • 20 篇 guang cheng
  • 18 篇 hui li
  • 18 篇 ma jian-feng
  • 17 篇 yu song
  • 17 篇 xiaoming wu
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 17 篇 huang chongwen
  • 16 篇 geng xin

语言

  • 1,817 篇 英文
  • 143 篇 其他
  • 110 篇 中文
检索条件"机构=The Key Laboratory for Computer Networks and Information Integration"
2066 条 记 录,以下是441-450 订阅
排序:
Explainable Topic-Enhanced Argument Mining from Heterogeneous Sources
arXiv
收藏 引用
arXiv 2023年
作者: Si, Jiasheng Zhu, Yingjie Shi, Xingyu Zhou, Deyu He, Yulan School of Computer Science and Engineering Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University China Department of informatics King’s College London United Kingdom Alan Turing Insitute United Kingdom
Given a controversial target such as "nuclear energy", argument mining aims to identify the argumentative text from heterogeneous sources. Current approaches focus on exploring better ways of integrating the... 详细信息
来源: 评论
Through-Wall Multihuman Activity Recognition Based on MIMO Radar
收藏 引用
computers, Materials & Continua 2025年 第6期83卷 4537-4550页
作者: Changlong Wang Jiawei Jiang Chong Han Hengyi Ren Lijuan Sun Jian Guo College of Computer Nanjing University of Posts and TelecommunicationsNanjing210003China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing University of Posts and TelecommunicationsNanjing210023China College of Information Science and Technology Nanjing Forestry UniversityNanjing210000China
Existing through-wall human activity recognition methods often rely on Doppler information or reflective signal characteristics of the human ***,static individuals,lacking prominent motion features,do not generate Dop... 详细信息
来源: 评论
EXPLAIN, EDIT, GENERATE: Rationale-Sensitive Counterfactual Data Augmentation for Multi-hop Fact Verification
arXiv
收藏 引用
arXiv 2023年
作者: Zhu, Yingjie Si, Jiasheng Zhao, Yibo Zhu, Haiyang Zhou, Deyu He, Yulan School of Computer Science and Engineering Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University China Department of Informatics King’s College London United Kingdom The Alan Turing Institute United Kingdom
Automatic multi-hop fact verification task has gained significant attention in recent years. Despite impressive results, these well-designed models perform poorly on out-of-domain data. One possible solution is to aug... 详细信息
来源: 评论
Leveled Group key Management with Efficient Revocations for Wireless Sensor networks
收藏 引用
Chinese Journal of Electronics 2023年 第3期18卷 494-499页
作者: Fenghua Li Junzhi Yan Jianfeng Ma Wei Wang Key Laboratory of Computer Networks and Information Security (Ministry of Education) Xidian University Xi'an China Graduate School Beijing Electronic Science and Technology Institute Beijing China No. 36 Research Institute of CETC Jiaxing China
Wireless sensor networks are often deployed in hostile environments. Protecting the communication against node capture is one of the most important design objectives. Focused on the revocations of resource constrained... 详细信息
来源: 评论
Intelligent Contract Vulnerability Detection Method Based on Bic-RL
Intelligent Contract Vulnerability Detection Method Based on...
收藏 引用
Data Security and Privacy Protection (DSPP), International Conference on
作者: Shuhui Zhang Changdong Hu Tian Lan LianHai Wang Shujiang Xu Wei Shao Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Blockchain technology is praised for its decentralization, anonymity, and tamper-proof nature, but its complex architecture has led to numerous attacks, particularly against smart contracts. These attacks have caused ...
来源: 评论
A Higher-Order Semantic Dependency Parser
arXiv
收藏 引用
arXiv 2022年
作者: Li, Bin Fan, Yunlong Sataer, Yikemaiti Gao, Zhiqiang School of Computer Science and Engineering Southeast University Nanjing210096 China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education China
Higher-order features bring significant accuracy gains in semantic dependency parsing. However, modeling higher-order features with exact inference is NP-hard. Graph neural networks (GNNs) have been demonstrated to be... 详细信息
来源: 评论
hcaPCG: A Heterogeneous and communication-avoid PCG with Jacobi preconditioner on SW26010-Pro architecture
hcaPCG: A Heterogeneous and communication-avoid PCG with Jac...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Min Tian Yue Liu Li Wang Yanyan Chen Qi Liu Jingshan Pan Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan Key Laboratory of High Performance Computing Jinan Institute of Supercomputing Technology
Due to its efficiency and versatility, the preconditioned conjugate gradient algorithm has long been a staple in the realm of iterative linear system solvers. In this paper, we proposed an optimized preconditioned con...
来源: 评论
AH-TDMA: An Adaptive Heterogeneous Tridiagonal Matrix Algorithm on the New Sunway Supercomputer
AH-TDMA: An Adaptive Heterogeneous Tridiagonal Matrix Algori...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Min Tian Qi Liu Yanlong Li Wei Du Zenghui Ren Yue Liu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan Key Laboratory of High Performance Computing Jinan Institute of Supercomputing Technology
The solution of tridiagonal linear systems is used in in various fields and plays a crucial role in numerical simulations. However, there is few efficient solver for tridiagonal linear systems on the new Sunway superc...
来源: 评论
PIOD: An Efficient Parallel Iterative Algorithm for Solving Over-determined Equations
PIOD: An Efficient Parallel Iterative Algorithm for Solving ...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Min Tian Zhenguo Wei Yanlong Li Wei Du Lei Xiao Chaoshuai Xu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan Key Laboratory of High Performance Computing Jinan Institute of Supercomputing Technology
The solution of over-determined equations plays a very important role in fields such as data fitting, signal processing, and machine learning. It is of great significance in predicting natural phenomena, optimizing en...
来源: 评论
Unknown-Aware Bilateral Dependency Optimization for Defending Against Model Inversion Attacks
收藏 引用
IEEE Transactions on Pattern Analysis and Machine Intelligence 2025年 PP卷 PP页
作者: Peng, Xiong Liu, Feng Wang, Nannan Lan, Long Liu, Tongliang Cheung, Yiu-Ming Han, Bo Hong Kong Baptist University Department of Computer Science Hong Kong The University of Melbourne School of Computing and Information Systems Australia Xidian University State Key Laboratory of Integrated Services Networks School of Telecommunications Engineering Shaanxi Xi'an710071 China National University of Defense Technology State Key Laboratory of High Performance Computing School of Computer Hunan Changsha410000 China The University of Sydney Sydney AI Centre School of Computer Science Faculty of Engineering Australia
By abusing access to a well-trained classifier, model inversion (MI) attacks pose a significant threat as they can recover the original training data, leading to privacy leakage. Previous studies mitigated MI attacks ... 详细信息
来源: 评论