咨询与建议

限定检索结果

文献类型

  • 306 篇 期刊文献
  • 264 篇 会议

馆藏范围

  • 570 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 383 篇 工学
    • 260 篇 计算机科学与技术...
    • 222 篇 软件工程
    • 112 篇 信息与通信工程
    • 81 篇 电气工程
    • 47 篇 电子科学与技术(可...
    • 43 篇 生物工程
    • 38 篇 控制科学与工程
    • 25 篇 仪器科学与技术
    • 22 篇 生物医学工程(可授...
    • 21 篇 机械工程
    • 18 篇 光学工程
    • 18 篇 网络空间安全
    • 17 篇 动力工程及工程热...
    • 12 篇 航空宇航科学与技...
    • 11 篇 化学工程与技术
    • 11 篇 安全科学与工程
  • 179 篇 理学
    • 92 篇 数学
    • 52 篇 生物学
    • 34 篇 物理学
    • 31 篇 统计学(可授理学、...
    • 15 篇 系统科学
    • 11 篇 化学
  • 97 篇 管理学
    • 52 篇 管理科学与工程(可...
    • 45 篇 图书情报与档案管...
    • 24 篇 工商管理
  • 27 篇 医学
    • 21 篇 临床医学
    • 17 篇 基础医学(可授医学...
    • 13 篇 公共卫生与预防医...
  • 17 篇 法学
    • 13 篇 社会学
  • 12 篇 经济学
    • 12 篇 应用经济学
  • 9 篇 农学
  • 4 篇 军事学
  • 2 篇 教育学
  • 1 篇 艺术学

主题

  • 31 篇 semantics
  • 20 篇 feature extracti...
  • 18 篇 federated learni...
  • 18 篇 accuracy
  • 15 篇 deep learning
  • 15 篇 image segmentati...
  • 15 篇 training
  • 11 篇 neural networks
  • 11 篇 computational mo...
  • 10 篇 internet of thin...
  • 10 篇 data mining
  • 10 篇 network security
  • 10 篇 data models
  • 9 篇 visualization
  • 9 篇 correlation
  • 8 篇 optimization
  • 8 篇 noise
  • 8 篇 predictive model...
  • 7 篇 simulation
  • 7 篇 vectors

机构

  • 54 篇 shandong provinc...
  • 46 篇 shandong enginee...
  • 46 篇 key laboratory o...
  • 21 篇 network and data...
  • 12 篇 shandong enginee...
  • 12 篇 school of comput...
  • 12 篇 shandong fundame...
  • 12 篇 shenzhen researc...
  • 11 篇 shaanxi key labo...
  • 10 篇 school of comput...
  • 10 篇 key laboratory o...
  • 9 篇 school of inform...
  • 9 篇 cas key laborato...
  • 8 篇 computer network...
  • 8 篇 network and data...
  • 8 篇 school of comput...
  • 7 篇 network and data...
  • 7 篇 beijing key labo...
  • 7 篇 school of comput...
  • 7 篇 school of comput...

作者

  • 15 篇 qin zhen
  • 14 篇 liu jun
  • 11 篇 jing zhao
  • 11 篇 qin zhiguang
  • 10 篇 liu bin
  • 9 篇 zhenyu yang
  • 8 篇 yang yang
  • 8 篇 ding yi
  • 8 篇 chen yanping
  • 8 篇 yang shenghao
  • 8 篇 wang zhongmin
  • 8 篇 zhang hongbin
  • 7 篇 niyato dusit
  • 7 篇 yi ding
  • 7 篇 zhao dongmei
  • 6 篇 hu liang
  • 6 篇 zhen qin
  • 6 篇 cao mingsheng
  • 6 篇 qin lu
  • 6 篇 ding ming

语言

  • 524 篇 英文
  • 39 篇 其他
  • 8 篇 中文
检索条件"机构=Data Engineering and Network Technology Laboratory"
570 条 记 录,以下是91-100 订阅
排序:
A Parallelizable Counterfactual Generation Method Based on Gradient Optimization  29
A Parallelizable Counterfactual Generation Method Based on G...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Ding, Haorun Jiang, Xuesong Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Quan Cheng Laboratory Jinan China State Key Laboratory of High-end Server and Storage Technology Jinan China
Post-hoc explanations are important for people to understand the predictions of explanation models. One class of methods in post-hoc explanation is the generation of counterfactuals, where a hypothetical example is ob... 详细信息
来源: 评论
Class Incremental Learning for Knowledge Acquisition Based on Prototype network Gating Mechanism
Class Incremental Learning for Knowledge Acquisition Based o...
收藏 引用
Medical Artificial Intelligence (MedAI), IEEE International Conference on
作者: Yuming Feng Xiaolong Jin Haozhe Liang Jiafeng Guo School of Computer Science and Technology University of Chinese Academy of Sciences CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Institute of Systems Engineering Academy of Military Science
With the development of information technology, the medical field has accumulated a large amount of medical data, which continues to grow. Efficient extraction and effective utilization of knowledge from this vast amo... 详细信息
来源: 评论
network Security Situation Assessment Method Based on Absorbing Markov Chain
Network Security Situation Assessment Method Based on Absorb...
收藏 引用
2022 International Conference on networking and network Applications, NaNA 2022
作者: Gao, Hongbin Wang, Shangxing Zhang, Hongbin Liu, Bin Zhao, Dongmei Liu, Zhen Hebei University of Science and Technology School of Information Science and Engineering Shijiazhuang China Hebei University of Science and Technology School of Information Science and Engineering Hebei Key Laboratory of Network and Information Security Shijiazhuang China Hebei University of Science and Technology School of Economics and Management Research Center of Big Data and Social Computing Shijiazhuang China Hebei Normal University Hebei Key Laboratory of Network and Information Security Shijiazhuang China
This paper has a new network security evaluation method as an absorbing Markov chain-based assessment method. This method is different from other network security situation assessment methods based on graph theory. It... 详细信息
来源: 评论
Encrypted network Traffic Detection Based on Blockchain and Federated Learning
Encrypted Network Traffic Detection Based on Blockchain and ...
收藏 引用
Blockchain technology and Information Security (ICBCTIS), International Conference on
作者: Wei Liu Wentao Cui Wei She Zhao Tian Henan Key Laboratory of Network Cryptography Technology Zhengzhou Key Laboratory of Blockchain and Data Intelligence School of Cyber Science and Engineering Zhengzhou University Zhengzhou China School of Cyber Science and Engineering Zhengzhou University Zhengzhou China Zhengzhou Key Laboratory of Blockchain and Data Intelligence School of Cyber Science and Engineering Zhengzhou University Zhengzhou China
In recent years, encrypted malicious traffic has significantly threatened network security. Deep learning offers a viable solution for feature extraction, but its accuracy depends on data volume, and traffic data vari... 详细信息
来源: 评论
Real-Time Proportional-Integral-Derivative(PID)Tuning Based on Back Propagation(BP)Neural network for Intelligent Vehicle Motion Control
收藏 引用
Computers, Materials & Continua 2025年 第5期83卷 2375-2401页
作者: Liang Zhou Qiyao Hu Xianlin Peng Qianlong Liu School of Information Science and Technology Northwest UniversityXi’an710127China State-Province Joint Engineering and Research Center of Advanced Networking and Intelligent Information Services Northwest UniversityXi’an710127China Generative Artificial Intelligence and Mixed Reality Key Laboratory of Higher Education Institutions in Shaanxi Province Xi’an710127China Shaanxi Silk Road Cultural Heritage Digital Protection and Inheritance Collaborative Innovation Center Xi’an710127China School of Art Northwest UniversityXi’an710127China Network and Data Center Northwest UniversityXi’an710127China
Over 1.3 million people die annually in traffic accidents,and this tragic fact highlights the urgent need to enhance the intelligence of traffic safety and control *** modern industrial and technological applications ... 详细信息
来源: 评论
Each Fake News is Fake in its Own Way: An Attribution Multi-Granularity Benchmark for Multimodal Fake News Detection
arXiv
收藏 引用
arXiv 2024年
作者: Guo, Hao Ma, Zihan Zeng, Zhi Luo, Minnan Zeng, Weixin Tang, Jiuyang Zhao, Xiang Laboratory for Big Data and Decision Nation University of Defence Technology China School of Computer Science and Technology Xi’an Jiaotong University China Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi’an Jiaotong University China Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Xi’an Jiaotong University China
Social platforms, while facilitating access to information, have also become saturated with a plethora of fake news, resulting in negative consequences. Automatic multimodal fake news detection is a worthwhile pursuit... 详细信息
来源: 评论
PathReasoner: Modeling Reasoning Path with Equivalent Extension for Logical Question Answering
arXiv
收藏 引用
arXiv 2024年
作者: Xu, Fangzhi Lin, Qika Zhao, Tianzhe Han, Jiawei Liu, Jun School of Computer Science and Technology Xi’an Jiaotong University China Ministry of Education Key Laboratory of Intelligent Networks and Network Security China Shaanxi Province Key Laboratory of Big Data Knowledge Engineering China
Logical reasoning task has attracted great interest since it was proposed. Faced with such a task, current competitive models, even large language models (e.g., ChatGPT and PaLM 2), still perform badly. Previous promi... 详细信息
来源: 评论
THC-DL: Three-Party Homomorphic Computing Delegation Learning for Secure Optimization
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Yang, Ze Tian, Youliang Xiong, Jinbo Niu, Kun Li, Mengqian Zhang, Xinyu Ma, Jianfeng Guizhou University Guizhou Provincial Key Laboratory of Cryptography and Blockchain Technology College of Computer Science and Technology Guiyang550025 China Guizhou University College of Big Data and Information Engineering Guiyang550025 China Fujian Normal University Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fuzhou350117 China Xidian University State Key Laboratory of Integrated Services Network Xi’an710071 China Xidian University State Key Laboratory of Integrated Services Network School of Cyber Engineering Xi’an710071 China
Delegation Learning(DL) flourishes data sharing, enabling agents to delegate data to the cloud for model training. To preserve privacy, homomorphic encryption (HE) offers an effective solution for privacy-preserving m... 详细信息
来源: 评论
Self-feedback LSTM regression model for real-time particle source apportionment
收藏 引用
Journal of Environmental Sciences 2022年 第4期34卷 10-20页
作者: Wei Wang Weiman Xu Shuai Deng Yimeng Chai Ruoyu Ma Guoliang Shi Bo Xu Mei Li Yue Li Trusted AI System Laboratory College of Computer ScienceNankai UniversityTianjin 300350China KLMDASR Tianjin Key Laboratory of Network and Data Security TechnologyTianjin 300350China State Environmental Protection Key Laboratory of Urban Ambient Air Particulate Matter Pollution Prevention and Control College of Environmental Science and EngineeringNankai UniversityTianjin 300071China Institute of Mass Spectrometry and Atmospheric Environment Guangdong Provincial Engineering Research Center for on-line source apportionment system of air pollution Jinan UniversityGuangzhou 510632China Guangdong-Hongkong-Macao Joint Laboratory of Collaborative Innovation for Environmental Quality Guangzhou 510632China
Atmospheric particulate matter pollution has attracted much wider attention *** recent years,the development of atmospheric particle collection techniques has put forwards new demands on the real-time source apportion... 详细信息
来源: 评论
A trajectory association strategy for multi-object tracking  6
A trajectory association strategy for multi-object tracking
收藏 引用
6th International Conference on Artificial Intelligence and Pattern Recognition, AIPR 2023
作者: Ma, Sugang Duan, Shuaipeng Pu, Lei Hou, Zhiqiang School of Computer Science and Technology Xi'an University of Posts and Telecommunications Shaanxi Xi'an710121 China Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi'an University of Posts and Telecommunications Shaanxi Xi'an China School of Operational Support Rocket Force Engineering University Shaanxi Xi'an710025 China
When the multi-object tracking (MOT) algorithm confronts complex scenarios such as target occlusion and blurring, the trajectory missing and identity switching problems frequently occur. To address this issue, a traje... 详细信息
来源: 评论