咨询与建议

限定检索结果

文献类型

  • 74 篇 会议
  • 64 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 139 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 91 篇 工学
    • 65 篇 计算机科学与技术...
    • 51 篇 软件工程
    • 24 篇 电气工程
    • 24 篇 信息与通信工程
    • 9 篇 电子科学与技术(可...
    • 8 篇 生物医学工程(可授...
    • 6 篇 机械工程
    • 6 篇 生物工程
    • 5 篇 控制科学与工程
    • 4 篇 光学工程
    • 4 篇 仪器科学与技术
    • 4 篇 化学工程与技术
    • 4 篇 交通运输工程
    • 3 篇 材料科学与工程(可...
    • 2 篇 动力工程及工程热...
  • 45 篇 理学
    • 26 篇 数学
    • 10 篇 统计学(可授理学、...
    • 8 篇 物理学
    • 6 篇 生物学
    • 4 篇 化学
    • 3 篇 系统科学
  • 13 篇 管理学
    • 9 篇 管理科学与工程(可...
    • 4 篇 工商管理
    • 3 篇 图书情报与档案管...
  • 9 篇 医学
    • 7 篇 临床医学
    • 5 篇 基础医学(可授医学...
    • 4 篇 药学(可授医学、理...
    • 3 篇 公共卫生与预防医...
  • 4 篇 法学
    • 2 篇 社会学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 文学
  • 2 篇 农学
  • 1 篇 教育学

主题

  • 8 篇 computer network...
  • 7 篇 computational mo...
  • 7 篇 feature extracti...
  • 6 篇 accuracy
  • 5 篇 computer archite...
  • 5 篇 wireless sensor ...
  • 5 篇 ip networks
  • 4 篇 deep learning
  • 4 篇 application soft...
  • 4 篇 quality of servi...
  • 4 篇 servers
  • 4 篇 blockchain
  • 4 篇 cloud computing
  • 4 篇 privacy
  • 4 篇 training
  • 4 篇 attention mechan...
  • 3 篇 public key crypt...
  • 3 篇 ad hoc networks
  • 3 篇 grid computing
  • 3 篇 condition monito...

机构

  • 10 篇 key laboratory o...
  • 7 篇 state key labora...
  • 4 篇 school of comput...
  • 4 篇 the department o...
  • 4 篇 shandong fundame...
  • 4 篇 shandong provinc...
  • 3 篇 network and data...
  • 3 篇 department of co...
  • 3 篇 shandong provinc...
  • 3 篇 the institute of...
  • 3 篇 institute for ne...
  • 3 篇 xi'an university...
  • 3 篇 school of comput...
  • 3 篇 engineering rese...
  • 3 篇 robotics and int...
  • 3 篇 shandong fundame...
  • 3 篇 state key labora...
  • 3 篇 shaanxi key labo...
  • 3 篇 the department o...
  • 3 篇 school of cyber ...

作者

  • 11 篇 eui-nam huh
  • 7 篇 luo xiangyang
  • 6 篇 zhou jiantao
  • 6 篇 lu wei
  • 5 篇 song biao
  • 5 篇 mohammad mehedi ...
  • 4 篇 shi zhenghao
  • 4 篇 biao song
  • 4 篇 huh eui nam
  • 4 篇 jin haiyan
  • 4 篇 sheng ziqi
  • 3 篇 zhao minghua
  • 3 篇 eui nam huh
  • 3 篇 huh eui-nam
  • 3 篇 tang wei
  • 3 篇 yajun liu
  • 3 篇 li aimin
  • 3 篇 xinhong hei
  • 3 篇 fei rong
  • 3 篇 lin you

语言

  • 116 篇 英文
  • 22 篇 其他
  • 1 篇 中文
检索条件"机构=Internet Computing and Network Security Laboratory Department of Computer Engineering"
139 条 记 录,以下是11-20 订阅
排序:
Prediction of piRNA-mRNA interactions based on an interactive inference network
Prediction of piRNA-mRNA interactions based on an interactiv...
收藏 引用
2023 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2023
作者: Liu, Yajun Li, Ru Li, Aimin Fei, Rong Guo, Xie Wu, Fang-Xiang Xi'an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China Xi'an University of Technology Shaanxi Key Laboratory of Complex System Control and Intelligent Information Processing Xi'an China University of Saskatchewan Division of Biomedical Engineering Department of Computer Science Department of Mechanical Engineering Saskatoon Canada
As the largest class of small non-coding RNAs, piRNAs primarily present in the reproductive cells of mammals, which influence post-transcriptional processes of mRNAs in multiple ways. Effective methods for predicting ... 详细信息
来源: 评论
DCGSD: Low-Light Image Enhancement with Dual-Conditional Guidance Sparse Diffusion Model
收藏 引用
IEEE Transactions on Circuits and Systems for Video Technology 2025年
作者: Jin, Haiyan Wang, Jing Zuo, Fengyuan Su, Haonan Xiao, Zhaolin Wang, Bin Zhang, Yuanlin Xi'an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology Department of Computer Science and Engineering NO. 5 South Jinhua Road Shaanxi Xi'an710048 China
When restoring low-light images, most methods largely overlook the ambiguity due to dark noise and lack discrimination for region and shape representations, resulting in invalid feature enhancement. In this work, we p... 详细信息
来源: 评论
Double-Blockchain Assisted Secure and Anonymous Data Aggregation for Fog-Enabled Smart Grid
收藏 引用
engineering 2022年 第1期8卷 159-169页
作者: Siguang Chen Li Yang Chuanxin Zhao Vijayakumar Varadarajan Kun Wang Jiangsu Key Lab of Broadband Wireless Communication and Internet of Things Nanjing University of Posts and TelecommunicationsNanjing 210003China Jiangsu Engineering Research Center of Communication and Network Technology Nanjing University of Posts and TelecommunicationsNanjing 210003China Anhui Provincial Key Laboratory of Network and Information Security Anhui Normal UniversityWuhu 241000China School of Computer Science and Engineering Vellore Institute of TechnologyChennai 600127India Department of Electrical and Computer Engineering University of CaliforniaLos AngelesCA 90095USA
As a future energy system,the smart grid is designed to improve the efficiency of traditional power systems while providing more stable and reliable ***,this efficient and reliable service relies on collecting and ana... 详细信息
来源: 评论
A Cloud computing User Experience Focused Load Balancing Method Based on Modified CMA-ES Algorithm  18th
A Cloud Computing User Experience Focused Load Balancing Met...
收藏 引用
18th International Conference on Green, Pervasive, and Cloud computing, GPC 2023
作者: Luo, Jihai Dong, Chen Chen, Zhenyi Xu, Li Chen, Tianci College of Computer and Data Science - Fuzhou University Xueyuan Road Fujian Fuzhou360108 China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou China Department of Computer Science and Engineering University of South Florida TampaFL33620 United States College of Computer and Cyber Security Fujian Normal University Fuzhou350007 China
The development of the software and hardware has brought about the abundance and overflow of computing resources. Many internet companies can lease idle computing resources based on the peak and valley cycles of usage... 详细信息
来源: 评论
Prediction of miRNA family based on class-incremental learning
Prediction of miRNA family based on class-incremental learni...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Yajun Liu Lulu Qiu Aimin Li Rong Fei Junhuai Li Fang-Xiang Wu Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an University of Technology Xi'an China Department of Mechanical Engineering Department of Computer Science Division of Biomedical Engineering Saskatoon Canada
With the development of deep sequencing, recent studies indicate that a miRNA precursor can generate multiple miRNA isoforms (isomiRs). The family prediction of canonical miRNAs and isomiRs could provide a basis for m... 详细信息
来源: 评论
Emotion Recognition from Occluded Facial Images Using Deep Ensemble Model
收藏 引用
computers, Materials & Continua 2022年 第12期73卷 4465-4487页
作者: Zia Ullah Muhammad Ismail Mohmand Sadaqat ur Rehman Muhammad Zubair Maha Driss Wadii Boulila Rayan Sheikh Ibrahim Alwawi Department of Computer Science The Brains InstitutePeshawar25000Pakistan School of Natural and Computing Sciences University of AberdeenAberdeenUK Department of Neurosciences KU Leuven Medical SchoolLeuven3000Belgium Security Engineering Laboratory CCISPrince Sultan UniversityRiyadh12435Saudi Arabia Robotics and Internet of Things Lab Prince Sultan UniversityRiyadh12435Saudi Arabia Department of Computer Science Robert Gordon UniversityAberdeenUK
Facial expression recognition has been a hot topic for decades,but high intraclass variation makes it *** overcome intraclass variation for visual recognition,we introduce a novel fusion methodology,in which the propo... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities  24
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
44th ACM/IEEE International Conference on Software engineering, ICSE 2024
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hong Kong Jin YinHu Laboratory Wuhan China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China University of Colorado Colorado Springs Department of Computer Science Colorado Springs Colorado United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
A Novel Riemannian Sparse Representation Learning network for Polarimetric SAR Image Classification
arXiv
收藏 引用
arXiv 2025年
作者: Shi, Junfei Nie, Mengmeng Lin, Weisi Jin, Haiyan Li, Junhuai Wang, Rui The Department of Computer Science and Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an University of Technology Xi’an China The Department of Computer Science and Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an University of Technology Xi’an710048 China the School of Computer Science and Engineering Nanyang Technological University 639798 Singapore The School of Artificial Intelligence and Computer Science Jiangnan University Wuxi214122 China
Deep learning is an effective end-to-end method for Polarimetric Synthetic Aperture Radar(PolSAR) image classification, but it lacks the guidance of related mathematical principle and is essentially a black-box model.... 详细信息
来源: 评论
An Enhanced Data-Driven Model for Lithium-Ion Battery State-of-Health Estimation with Optimized Features and Prior Knowledge
收藏 引用
Automotive Innovation 2022年 第2期5卷 134-145页
作者: Huanyang Huang Jinhao Meng Yuhong Wang Lei Cai Jichang Peng Ji Wu Qian Xiao Tianqi Liu Remus Teodorescu College of Electrical Engineering Sichuan UniversityChengduChina Faculty of Computer Science and Engineering Shanxi Key Laboratory for Network Computing and Security TechnologyXi’an University of TechnologyXi’anChina Smart Grid Research Institute Nanjing Institute of TechnologyNanjingChina Department of Automation University of Science and Technology of ChinaHefeiChina Key Laboratory of Smart Grid of Ministry of Education Tianjin UniversityTianjinChina Department of Energy Technology Aalborg University9220 AalborgDenmark
In the long-term prediction of battery degradation,the data-driven method has great potential with historical data recorded by the battery management *** paper proposes an enhanced data-driven model for Lithium-ion(Li... 详细信息
来源: 评论
Efficient Module-Lattice-based Certificateless Online/Offline Signcryption Scheme for internet of Medical Things
收藏 引用
IEEE internet of Things Journal 2025年
作者: Bai, Ye He, Debiao Yang, Zhichao Luo, Min Peng, Cong Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan430072 China Wuhan University School of Cyber Science and Engineering Wuhan430072 China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250014 China Naval University of Engineering Department of Information Security Wuhan430000 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250014 China
The internet of Medical Things (IoMT) has achieved remote diagnosis and real-time health monitoring through intelligent sensor devices and internet of Things (IoT) technology, providing great convenience for analyzing... 详细信息
来源: 评论