咨询与建议

限定检索结果

文献类型

  • 1,067 篇 会议
  • 979 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 2,048 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,349 篇 工学
    • 880 篇 计算机科学与技术...
    • 681 篇 软件工程
    • 427 篇 信息与通信工程
    • 195 篇 电子科学与技术(可...
    • 178 篇 电气工程
    • 130 篇 控制科学与工程
    • 90 篇 光学工程
    • 83 篇 生物工程
    • 80 篇 网络空间安全
    • 76 篇 机械工程
    • 74 篇 仪器科学与技术
    • 58 篇 动力工程及工程热...
    • 41 篇 建筑学
    • 40 篇 生物医学工程(可授...
    • 39 篇 化学工程与技术
    • 37 篇 交通运输工程
    • 36 篇 土木工程
    • 35 篇 航空宇航科学与技...
    • 26 篇 安全科学与工程
  • 599 篇 理学
    • 376 篇 数学
    • 137 篇 物理学
    • 125 篇 统计学(可授理学、...
    • 92 篇 生物学
    • 43 篇 系统科学
    • 40 篇 化学
  • 354 篇 管理学
    • 204 篇 管理科学与工程(可...
    • 157 篇 图书情报与档案管...
    • 79 篇 工商管理
  • 56 篇 法学
    • 45 篇 社会学
  • 34 篇 医学
    • 31 篇 临床医学
  • 25 篇 经济学
  • 16 篇 农学
  • 13 篇 军事学
  • 6 篇 文学
  • 5 篇 教育学
  • 4 篇 艺术学

主题

  • 74 篇 feature extracti...
  • 65 篇 semantics
  • 62 篇 accuracy
  • 51 篇 computational mo...
  • 48 篇 cryptography
  • 45 篇 training
  • 44 篇 protocols
  • 39 篇 federated learni...
  • 38 篇 wireless sensor ...
  • 35 篇 deep learning
  • 33 篇 privacy
  • 31 篇 data models
  • 30 篇 servers
  • 30 篇 machine learning
  • 28 篇 clustering algor...
  • 27 篇 information secu...
  • 27 篇 computer network...
  • 26 篇 data mining
  • 25 篇 laboratories
  • 24 篇 routing

机构

  • 215 篇 shandong provinc...
  • 162 篇 key laboratory o...
  • 157 篇 school of comput...
  • 86 篇 key laboratory o...
  • 71 篇 state key labora...
  • 61 篇 key laboratory o...
  • 59 篇 college of infor...
  • 53 篇 key laboratory o...
  • 50 篇 shandong fundame...
  • 42 篇 shandong enginee...
  • 42 篇 the key laborato...
  • 41 篇 state key labora...
  • 41 篇 state key labora...
  • 41 篇 school of comput...
  • 41 篇 key laboratory o...
  • 39 篇 key laboratory o...
  • 35 篇 key laboratory o...
  • 32 篇 school of inform...
  • 31 篇 school of cyber ...
  • 27 篇 state key labora...

作者

  • 43 篇 ren jiadong
  • 40 篇 guo hong
  • 37 篇 zhou deyu
  • 32 篇 jianfeng ma
  • 28 篇 zhang min-ling
  • 27 篇 min-ling zhang
  • 26 篇 hu yupu
  • 22 篇 ma jianfeng
  • 21 篇 yang yang
  • 20 篇 han zhu
  • 20 篇 zhang yichen
  • 20 篇 guang cheng
  • 18 篇 yu song
  • 18 篇 xiaoming wu
  • 18 篇 hui li
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 17 篇 huang chongwen
  • 17 篇 ma jian-feng
  • 16 篇 geng xin

语言

  • 1,733 篇 英文
  • 226 篇 其他
  • 96 篇 中文
检索条件"机构=The Key Laboratory for Computer Networks and Information Integration"
2048 条 记 录,以下是621-630 订阅
排序:
A Data Contribution-Based Adaptive Federated Learning Approach for Wearable Activity Recognition
A Data Contribution-Based Adaptive Federated Learning Approa...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Yi Zhao Chunyu Hu Xiaodong Yang Lin Yuan Xiang Tian Tianlei Gao Yiqiang Chen Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Beijing Key Laboratory of Mobile Computing and Pervasive Device Institute of Computing Technology Chinese Academy of Sciences Beijing China Shandong Artificial Intelligence Institute Qilu University of Technology (Shandong Academy of Sciences) Jinan China College of Computer Science and Engineering Shandong University of Science and Technology Qingdao China
Wearable activity recognition is crucial for ubiquitous computing, enhancing human-machine interaction, medical monitoring, and personalized services. As wearable devices collect user activity data that often contain ... 详细信息
来源: 评论
Mixture of Experts for Intelligent networks: A Large Language Model-enabled Approach
Mixture of Experts for Intelligent Networks: A Large Languag...
收藏 引用
International Wireless Communications and Mobile Computing Conference, IWCMC
作者: Hongyang Du Guangyuan Liu Yijing Lin Dusit Niyato Jiawen Kang Zehui Xiong Dong In Kim School of Computer Science and Engineering Nanyang Technological University Singapore Singapore State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China School of Automation Guangdong University of Technology and Key Laboratory of Intelligent Information Processing and System Integration of IoT Ministry of Education Guangzhou China Guangdong-HongKong-Macao Joint Laboratory for Smart Discrete Manufacturing Guangzhou China Pillar of Information Systems Technology and Design Singapore University of Technology and Design Singapore Singapore Department of Electrical and Computer Engineering Sungkyunkwan University Suwon South Korea
Optimizing various wireless user tasks poses a significant challenge for networking systems because of the expanding range of user requirements. Despite advancements in Deep Reinforcement Learning (DRL), the need for ... 详细信息
来源: 评论
Secure Integrated Sensing and SWIPT via Active IRS
收藏 引用
IEEE Transactions on Wireless Communications 2025年
作者: Xu, Jinlei Zhang, Jifa Liu, Mingqian Zhao, Nan Al-Dhahir, Naofal Wang, Xianbin Dalian University of Technology School of Information and Communication Engineering Dalian116024 China Xidian University State Key Laboratory of Integrated Service Networks Shanxi Xian710071 China University of Texas at Dallas Department of Electrical and Computer Engineering RichardsonTX75083 United States Western University Department of Electrical and Computer Engineering LondonONN6A 5B9 Canada
To achieve sustainable communication and sensing, simultaneous wireless information and power transfer (SWIPT) has been introduced into integrated sensing and communication (ISAC). However, this combination brings sig... 详细信息
来源: 评论
Impact of Hardware Impairments on Covert Cooperative Backscatter Communications
Impact of Hardware Impairments on Covert Cooperative Backsca...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Huan Li Yinghui Ye Lu Lv Guangyue Lu Naofal Al-Dhahir Shaanxi information communication network and security Laboratory Xi'an University of Posts and Telecommunications Xi'an China State Key Laboratory of Integrated Services Networks Xidian University Xi'an China Department of Electrical and Computer Engineering The University of Texas at Dallas Richardson TX USA
In this paper, we investigate a covert cooperative backscatter communication (BackCom) network under residual hardware impairments (RHIs) that are unavoidable in practical radio frequency transceivers and may have an ...
来源: 评论
Text information Mining in Cyberspace: An information Extraction Method Based on T5 and keyBERT
Text Information Mining in Cyberspace: An Information Extrac...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Kuan Liu Yumei Li Yuanhua Qi Ning Qi Mengran Zhai Information Research Institute of Shandong Academy of Sciences Qilu University of Technology (Shandong Academy of Sciences) Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Shandong Institute of Economy and Informatization Development Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China SHANDONG SCICOM Information and Economy Research Institute Co. Ltd Jinan China Shandong Institute of Economy and Informatization Development Jinan China
With the development of the digital economy and the advent of the big data era, the rapid growth of textual information in cyberspace has placed higher demands on information processing technology. This paper proposes... 详细信息
来源: 评论
$k$kTCQ: Achieving Privacy-Preserving $k$k-Truss Community Queries Over Outsourced Data
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2023年 第4期21卷 2750-2765页
作者: Yunguo Guan Rongxing Lu Songnian Zhang Yandong Zheng Jun Shao Guiyi Wei School of Information Security and Applied Computing Eastern Michigan University Ypsilanti MI USA Faculty of Computer Science University of New Brunswick Fredericton NB Canada State Key Laboratory of Integrated Services Networks Xidian University Xi’an China Zhejiang Gongshang University Hangzhou China
Community search over graphs, which is believed as a powerful tool for locating subgraphs of closely related vertices, has received considerable attention in recent years, and $k$ -truss is such a popular community s... 详细信息
来源: 评论
TSdetector: Temporal-Spatial Self-correction Collaborative Learning for Colonoscopy Video Detection
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Kai-Ni Wang, Haolin Zhou, Guang-Quan Wang, Yangang Yang, Ling Chen, Yang Li, Shuo School of Biological Science and Medical Engineering Southeast University Nanjing China Jiangsu Key Laboratory of Biomaterials and Devices Southeast University Nanjing China Laboratory of Image Science and Technology Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration Southeast University Nanjing China TUGE Healthcare Nanjing China Institute of Medical Technology Peking University Health Science Center China Department of Computer and Data Science Department of Biomedical Engineering Case Western Reserve University United States
CNN-based object detection models that strike a balance between performance and speed have been gradually used in polyp detection tasks. Nevertheless, accurately locating polyps within complex colonoscopy video scenes... 详细信息
来源: 评论
Asynchronous Tag-based Physical-Layer Authentication in Wireless Communications
收藏 引用
IEEE Transactions on Wireless Communications 2025年
作者: Tan, Haijun Xu, Yuntao Du, Jiewei Xie, Ning Li, Hongbin Peng Cheng Laboratory Control and Network Foundation Laboratory Frontier Research Center Shenzhen518107 China Shenzhen University State Key Laboratory of Radio Frequency Heterogeneous Integration The Guangdong Key Laboratory of Intelligent Information Processing College of Electronics and Information Engineering Shenzhen518060 China Beijing Jiaotong University School of Electronic and Information Engineering Beijing100044 China National Innovation Center of High Speed Train Qingdao266111 China Stevens Institute of Technology Department of Electrical and Computer Engineering HobokenNJ07030 United States
Tag-based physical-layer authentication (PLA) has gained significant research interest due to its high security and low complexity compared to traditional upper-layer authentication mechanisms. However, conventional t... 详细信息
来源: 评论
A Simulation Model for Proactive Services: A Case Study on Evading Dangerous Areas for LNG Ships  16th
A Simulation Model for Proactive Services: A Case Study on...
收藏 引用
16th International Conference on Service Science, ICSS 2023
作者: Shi, Yongpeng Wang, Guiling Zhang, Jiayu Li, Zhenyu Yu, Jian School of Information Science and Technology North China University of Technology Beijing100144 China Beijing Key Laboratory on Integration and Analysis of Large-scale Stream Data Beijing China Department of Computer Science Auckland University of Technology Auckland New Zealand
Proactive service is a kind of service that can be automatically provided based on logical judgment without human intervention. The traditional approach to evaluating proactive services involves conducting quantitativ... 详细信息
来源: 评论
Partial Vessels Annotation-based Coronary Artery Segmentation with Self-training and Prototype Learning
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Zheng Zhang, Xiaolei Qi, Yaolei Yang, Guanyu LIST Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Nanjing210096 China Dept. of Diagnostic Radiology Jinling Hospital Medical School of Nanjing University Nanjing China Jiangsu Provincial Joint International Research Laboratory of Medical Information Processing Southeast University Nanjing210096 China Strasbourg France
Coronary artery segmentation on coronary-computed tomography angiography (CCTA) images is crucial for clinical use. Due to the expertise-required and labor-intensive annotation process, there is a growing demand for t... 详细信息
来源: 评论