咨询与建议

限定检索结果

文献类型

  • 1,067 篇 会议
  • 997 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 2,066 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,367 篇 工学
    • 895 篇 计算机科学与技术...
    • 697 篇 软件工程
    • 440 篇 信息与通信工程
    • 196 篇 电子科学与技术(可...
    • 181 篇 电气工程
    • 134 篇 控制科学与工程
    • 94 篇 光学工程
    • 82 篇 网络空间安全
    • 81 篇 生物工程
    • 78 篇 机械工程
    • 74 篇 仪器科学与技术
    • 59 篇 动力工程及工程热...
    • 41 篇 建筑学
    • 40 篇 生物医学工程(可授...
    • 38 篇 化学工程与技术
    • 37 篇 交通运输工程
    • 36 篇 土木工程
    • 35 篇 航空宇航科学与技...
  • 607 篇 理学
    • 385 篇 数学
    • 136 篇 物理学
    • 129 篇 统计学(可授理学、...
    • 91 篇 生物学
    • 45 篇 系统科学
    • 39 篇 化学
  • 364 篇 管理学
    • 212 篇 管理科学与工程(可...
    • 160 篇 图书情报与档案管...
    • 84 篇 工商管理
  • 56 篇 法学
    • 45 篇 社会学
  • 34 篇 医学
    • 31 篇 临床医学
  • 27 篇 经济学
    • 27 篇 应用经济学
  • 16 篇 农学
  • 13 篇 军事学
  • 6 篇 文学
  • 5 篇 教育学
  • 4 篇 艺术学

主题

  • 74 篇 feature extracti...
  • 65 篇 semantics
  • 60 篇 accuracy
  • 51 篇 computational mo...
  • 48 篇 cryptography
  • 44 篇 protocols
  • 43 篇 training
  • 40 篇 wireless sensor ...
  • 37 篇 federated learni...
  • 35 篇 deep learning
  • 33 篇 privacy
  • 30 篇 servers
  • 30 篇 machine learning
  • 30 篇 data models
  • 29 篇 clustering algor...
  • 28 篇 computer network...
  • 27 篇 information secu...
  • 26 篇 data mining
  • 25 篇 laboratories
  • 24 篇 routing

机构

  • 216 篇 shandong provinc...
  • 162 篇 school of comput...
  • 160 篇 key laboratory o...
  • 84 篇 key laboratory o...
  • 71 篇 state key labora...
  • 60 篇 key laboratory o...
  • 59 篇 college of infor...
  • 59 篇 key laboratory o...
  • 53 篇 shandong fundame...
  • 45 篇 key laboratory o...
  • 42 篇 shandong enginee...
  • 42 篇 the key laborato...
  • 41 篇 state key labora...
  • 41 篇 state key labora...
  • 41 篇 school of comput...
  • 41 篇 key laboratory o...
  • 35 篇 key laboratory o...
  • 33 篇 school of inform...
  • 30 篇 school of cyber ...
  • 27 篇 state key labora...

作者

  • 43 篇 ren jiadong
  • 40 篇 guo hong
  • 37 篇 zhou deyu
  • 32 篇 jianfeng ma
  • 28 篇 zhang min-ling
  • 27 篇 min-ling zhang
  • 26 篇 ma jianfeng
  • 26 篇 hu yupu
  • 21 篇 yang yang
  • 20 篇 han zhu
  • 20 篇 zhang yichen
  • 20 篇 guang cheng
  • 18 篇 hui li
  • 18 篇 ma jian-feng
  • 17 篇 yu song
  • 17 篇 xiaoming wu
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 17 篇 huang chongwen
  • 16 篇 geng xin

语言

  • 1,817 篇 英文
  • 143 篇 其他
  • 110 篇 中文
检索条件"机构=The Key Laboratory for Computer Networks and Information Integration"
2066 条 记 录,以下是501-510 订阅
排序:
Modeling and application of service relationships  3
Modeling and application of service relationships
收藏 引用
3rd IEEE International Conference on Civil Aviation Safety and information Technology, ICCASIT 2021
作者: Shaoxi, Liu Jun, Shen Jie, Ren Ying, Huang Southeast University Key Laboratory of Computer Network & Information Integration of Ministry of Education Nanjing China AVIC Chengdu Aircraft Design and Research Institute Chengdu China Nanjing Origin Information Technology Co. Ltd Nanjing China
In some new network architectures, in order to improve the scalability of services, scholars in recent years have been trying their best to explore the strategy of combining several small-grained services into large-g... 详细信息
来源: 评论
A Scientific Workflow Engine Design and Implementation
A Scientific Workflow Engine Design and Implementation
收藏 引用
第四届公共管理与智能社会国际学术会议
作者: Zhichao Zhang Meng Guo Tingting Guo Key Laboratory of' Computing Power Network and Information Security of Ministry of Education Shandong Computer Science Center (National Supercomputing Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Inspur General Software Co.Ltd. Shandong Carbon Manager Group Co.Ltd.
This paper designs and implements a scientific workflow engine that follows the BPMN 2.0, enriching existing research on scientific workflow engine specification and theory. The engine is implemented using the Java la... 详细信息
来源: 评论
Detection method of trusted blockchain link flood attack based on trusted execution environment
Detection method of trusted blockchain link flood attack bas...
收藏 引用
information Technology: IoT and Smart City (ITIoTSC), International Conference on
作者: Ruixue Kuang Lianhai Wang Shuhui Zhang Shujiang Xu Wei Shao Qizheng Wang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan Shandong China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan Shandong China
In order to improve the detection accuracy and improve the detection speed, this paper designs a detection method of trusted blockchain link flood attack based on the trusted execution environment. First, above all, a... 详细信息
来源: 评论
Proceedings Research on the Path of High-Quality Development of Big Data Industry in Shandong Province
Proceedings Research on the Path of High-Quality Development...
收藏 引用
作者: Yu Wang Mingle Zhou Chunjing Wang Xingheng Mei Yumei Li Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Qilu University of Technology (Shandong Academy of Sciences)
The big data industry is a major opportunity to promote the development of the digital economy. This paper analyzes the status quo and problems of the big data industry in Shandong Province, combines the connotation o... 详细信息
来源: 评论
Deep Iterative Reconstruction Network Based on Residual Constraint for Low-Dose CT Imaging
Deep Iterative Reconstruction Network Based on Residual Cons...
收藏 引用
International Conference on Systems and Informatics (ICSAI)
作者: Jin Liu Yanqin Kang Tao Liu TingYu Zhang Yikun Zhang School of Computer and Information Anhui Polytechnic University Wuhu China Key Laboratory of Computer Network and Information Integration (Southeast University) Ministry of Education Nanjing China School of Computer Science and Engineering Southeast University Nanjing China
clinical low X-ray dose computed tomography (LDCT) scanner often induce high intensity strip artifact and spot nosie, compromising diagnoses and intervention plans. Recently, sparsely constrained and network learning-... 详细信息
来源: 评论
Practical Volume-Hiding Encrypted Multi-Maps with Optimal Overhead and Beyond  22
Practical Volume-Hiding Encrypted Multi-Maps with Optimal Ov...
收藏 引用
28th ACM SIGSAC Conference on computer and Communications Security, CCS 2022
作者: Wang, Jianfeng Sun, Shi-Feng Li, Tianci Qi, Saiyu Chen, Xiaofeng School of Cyber Engineering Xidian University China School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University China School of Computer Science and Technology Xi'an Jiao Tong University China State Key Laboratory of Integrated Service Networks Xidian University China
Encrypted multi-map (EMM), as a special case of structured encryption, has attracted extensive attention recently. However, most of EMM constructions reveal the real volumes of queried keys, which can be leveraged to ... 详细信息
来源: 评论
A Note on "Constructing Bent Functions Outside the Maiorana-McFarland Class Using a General Form of Rothaus"
arXiv
收藏 引用
arXiv 2025年
作者: Guo, Fei Wang, Zilong Gong, Guang State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou450001 China State Key Laboratory of Integrated Service Networks Xidian University Xi’an710071 China Department of Electrical and Computer Engineering University of Waterloo WaterlooONN2L 3G1 Canada
In 2017, Zhang et al. proposed a question (not open problem) and two open problems in [IEEE TIT 63 (8): 5336–5349, 2017] about constructing bent functions by using Rothaus’ construction. In this note, we prove that ... 详细信息
来源: 评论
A homogenization method for nonlinear inhomogeneous elastic materials
收藏 引用
Virtual Reality & Intelligent Hardware 2021年 第2期3卷 156-170页
作者: Jing ZHAO Fei ZHU Liyou XU Yong TANG Sheng LI College of Information Science and Engineering Yanshan UniversityQinhuangdaoHebei 066004China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province QinhuangdaoHebei 066004China School of Electronics Engineering and Computer Science Peking UniversityBeijing 100871China Beijing Engineering Research Center for Virtual Simulation and Visualization Beijing 100871China
Background Fast simulation techniques are strongly favored in computer graphics,especially for the nonlinear inhomogeneous elastic *** homogenization theory is a perfect match to simulate inhomogeneous deformable obje... 详细信息
来源: 评论
SFedXL: Semi-Synchronous Federated Learning With Cross-Sharpness and Layer-Freezing
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 18692-18707页
作者: Zhao, Mingxiong Zhao, Shihao Feng, Chenyuan Yang, Howard H. Niyato, Dusit Quek, Tony Q. S. Yunnan University National Pilot School of Software Kunming650500 China Ministry of Education Engineering Research Center of Integration and Application of Digital Learning Technology Beijing100039 China Ministry of Education Engineering Research Center of Cyberspace Kunming650504 China Yunnan University of Finance and Economics Yunnan Key Laboratory of Service Computing Kunming650221 China EURECOM Sophia Antipolis06410 France Zhejiang University University of Illinois Urbana-Champaign Institute Zhejiang University Haining314400 China Nanyang Technological University School of Computer Science and Engineering 639798 Singapore Singapore University of Technology and Design Information Systems Technology and Design Pillar 487372 Singapore
Federated learning (FL) emerges as a potential solution for enabling multiple terminal devices to collaboratively accomplish computational tasks within an Unmanned Aerial Vehicle (UAV) swarm. However, traditional FL a... 详细信息
来源: 评论
FusionNet: An Effective Network Phishing Website Detection Framework Based on Multi-Modal Fusion
FusionNet: An Effective Network Phishing Website Detection F...
收藏 引用
IEEE International Conference on High Performance Computing and Communications (HPCC)
作者: Yu Sun Guangqi Liu Xiaohui Han Wenbo Zuo Weihua Liu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) (Shandong Academy of Sciences) Qilu University of Technology Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Quancheng Provincial Laboratory Jinan China
Recently, the rapid advancement of communication technology has undoubtedly improved people's lives. Unfortunately, this progress has also given rise to a significant issue: the proliferation of phishing websites....
来源: 评论