咨询与建议

限定检索结果

文献类型

  • 606 篇 会议
  • 179 篇 期刊文献

馆藏范围

  • 785 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 345 篇 工学
    • 272 篇 计算机科学与技术...
    • 230 篇 软件工程
    • 82 篇 信息与通信工程
    • 72 篇 电气工程
    • 42 篇 控制科学与工程
    • 27 篇 电子科学与技术(可...
    • 26 篇 生物工程
    • 26 篇 网络空间安全
    • 23 篇 机械工程
    • 20 篇 光学工程
    • 19 篇 交通运输工程
    • 17 篇 安全科学与工程
    • 15 篇 生物医学工程(可授...
    • 12 篇 化学工程与技术
    • 11 篇 仪器科学与技术
    • 9 篇 土木工程
    • 8 篇 建筑学
  • 159 篇 理学
    • 97 篇 数学
    • 39 篇 物理学
    • 27 篇 统计学(可授理学、...
    • 25 篇 生物学
    • 10 篇 化学
    • 10 篇 系统科学
  • 81 篇 管理学
    • 50 篇 管理科学与工程(可...
    • 45 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 25 篇 法学
    • 15 篇 社会学
    • 12 篇 法学
  • 13 篇 医学
    • 12 篇 临床医学
    • 9 篇 基础医学(可授医学...
  • 5 篇 教育学
  • 4 篇 经济学
  • 4 篇 军事学
  • 2 篇 农学
  • 1 篇 文学

主题

  • 99 篇 feature extracti...
  • 93 篇 accuracy
  • 61 篇 federated learni...
  • 59 篇 computational mo...
  • 58 篇 semantics
  • 50 篇 data models
  • 44 篇 training
  • 35 篇 transformers
  • 33 篇 neural networks
  • 30 篇 deep learning
  • 30 篇 adaptation model...
  • 28 篇 robustness
  • 24 篇 privacy
  • 23 篇 data mining
  • 23 篇 predictive model...
  • 23 篇 attention mechan...
  • 21 篇 optimization
  • 21 篇 visualization
  • 21 篇 measurement
  • 20 篇 real-time system...

机构

  • 265 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 56 篇 shandong provinc...
  • 51 篇 shandong enginee...
  • 43 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 37 篇 school of comput...
  • 36 篇 shandong fundame...
  • 32 篇 shandong provinc...
  • 32 篇 shaanxi key labo...
  • 27 篇 qilu university ...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 faculty of data ...
  • 14 篇 tianjin key labo...
  • 14 篇 qilu university ...
  • 13 篇 key laboratory o...
  • 13 篇 key laboratory o...
  • 11 篇 xi'an university...

作者

  • 29 篇 yichuan wang
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 24 篇 wang yichuan
  • 19 篇 hei xinhong
  • 18 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 14 篇 li wei
  • 14 篇 aimin li
  • 13 篇 guohua lv
  • 13 篇 lianhai wang
  • 13 篇 xiaohui han
  • 13 篇 mingle zhou
  • 13 篇 jin haiyan
  • 12 篇 lu wenpeng
  • 12 篇 jing zhao
  • 12 篇 delong han
  • 12 篇 chunxiao wang
  • 12 篇 zhenyu yang
  • 12 篇 lei zhu

语言

  • 676 篇 英文
  • 107 篇 其他
  • 8 篇 中文
检索条件"机构=Laboratory for Network Computing and Security Technology"
785 条 记 录,以下是101-110 订阅
排序:
Zero-Csc: Low-Light Image Enhancement with Zero-Reference Color Self-Calibration
SSRN
收藏 引用
SSRN 2024年
作者: Jin, Haiyan Chen, Yujia Zuo, Fengyuan Su, Haonan Zhang, YuanLin Department of Computer Science and Engineering Xi’an University of Technology Xi’an 710048 China Shaanxi Key Laboratory for Network Computing and Security Technology
Zero-reference low-light image enhancement (LLIE) techniques mainly focus on grey-scale inhomogeneities, and few approaches consider how to explicitly recover a given dark scene for achieving color and holistic illumi... 详细信息
来源: 评论
LampMark: Proactive Deepfake Detection via Training-Free Landmark Perceptual Watermarks  24
LampMark: Proactive Deepfake Detection via Training-Free Lan...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Wang, Tianyi Huang, Mengxiao Cheng, Harry Zhang, Xiao Shen, Zhiqi Nanyang Technological University Singapore Singapore Qilu University of Technology Jinan China Shandong University Qingdao China NTU-WeBank Research Centre on Fintech Nanyang Technological University Singapore Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology China College of Computing and Data Science Nanyang Technological University Singapore
Deepfake facial manipulation has garnered significant public attention due to its impacts on enhancing human experiences and posing privacy threats. Despite numerous passive algorithms that have been attempted to thwa... 详细信息
来源: 评论
Robust Voice Activity Detection using Locality-Sensitive Hashing and Residual Frequency-Temporal Attention  25
Robust Voice Activity Detection using Locality-Sensitive Has...
收藏 引用
25th Interspeech Conferece 2024
作者: Li, Shu Zhang, Peng Li, Ye Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science China
For voice activity detection (VAD), recent works focus on learning the attention distribution on contextual information of speech to reduce the impact of irrelevant noise. However, contextual frames selected with spec... 详细信息
来源: 评论
DCGSD: Low-Light Image Enhancement with Dual-Conditional Guidance Sparse Diffusion Model
收藏 引用
IEEE Transactions on Circuits and Systems for Video technology 2025年
作者: Jin, Haiyan Wang, Jing Zuo, Fengyuan Su, Haonan Xiao, Zhaolin Wang, Bin Zhang, Yuanlin Xi'an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology Department of Computer Science and Engineering NO. 5 South Jinhua Road Shaanxi Xi'an710048 China
When restoring low-light images, most methods largely overlook the ambiguity due to dark noise and lack discrimination for region and shape representations, resulting in invalid feature enhancement. In this work, we p... 详细信息
来源: 评论
Block-gram: Mining Knowledgeable Features for Smart Contract Vulnerability Detection  7th
Block-gram: Mining Knowledgeable Features for Smart Contrac...
收藏 引用
7th International Conference on Smart computing and Communication, SmartCom 2022
作者: Li, Tao Wang, Haolong Fang, Yaozheng Jian, Zhaolong Wang, Zichun Xie, Xueshuo Tianjin Key Laboratory of Network and Data Security Technology Tianjin China College of Computer Science Nankai University Tianjin China Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province Hangzhou China State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing China
Effective vulnerability detection of large-scale smart contracts is critical because smart contract attacks frequently bring about tremendous economic loss. However, code analysis requiring traversal paths and learnin... 详细信息
来源: 评论
Riemannian Complex Hermit Positive Definite Convolution network for Polarimetric SAR Image Classification
arXiv
收藏 引用
arXiv 2025年
作者: Shi, Junfei Nie, Mengmeng Li, Yuke Jin, Haiyan Lin, Weisi Department of Computer Science and Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an University of Technology Xi’an China College of Computing and Data Science Nanyang Technological University 639798 Singapore
Deep learning can learn high-level semantic features in Euclidean space effectively for PolSAR images, while they need to covert the complex covariance matrix into a feature vector or complex-valued vector as the netw... 详细信息
来源: 评论
LESaET: Low-Dimensional Embedding Method for Link Prediction Combining Self-Attention and Enhanced-TuckER
LESaET: Low-Dimensional Embedding Method for Link Prediction...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Ding, Lichao Zhao, Jing Lu, Kai Hao, Zenghao Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Knowledge graphs (KGs) provide a structured representation of the real world through entity-relation triples. However, current KGs are often incomplete, typically containing only a small fraction of all possible facts... 详细信息
来源: 评论
Improved Global and Local Graph Neural network for Session-based Recommendation  25
Improved Global and Local Graph Neural Network for Session-b...
收藏 引用
25th IEEE International Conference on Computer Supported Cooperative Work in Design, CSCWD 2022
作者: Wang, Yifan Yu, Qing Wang, Zuohua Tianjin University of Technology Tianjin Key Laboratory of Intelligence Computing and Network Security Tianjin China China Everbright Bank Co. Ltd Beijing China
The session-based recommendation(SBR) aims to predict user actions based on anonymous sessions. SBR focuses on recent sessions to make more real-time and reliable recommendations and does not need to extract user IDs,... 详细信息
来源: 评论
False Correspondence Removal via Revisiting Semantic Context with Position-Attentive Learning
False Correspondence Removal via Revisiting Semantic Context...
收藏 引用
IEEE International Conference on Image Processing
作者: Ruiyuan Li Zhaolin Xiao Meng Zhang Haonan Su Haiyan Jin Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China
False correspondence removal remains a challenge for many feature-matching-based applications. This paper proposes a solution that revisits the local semantic context via position-attentive learning. First, a cross-di...
来源: 评论
Feature Aggregation network for Memory-Based Industrial Anomaly Detection  9
Feature Aggregation Network for Memory-Based Industrial Anom...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Li, Min Han, Delong Shao, Rui He, Jinghui City University of Macau Faculty of Data Science China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
In the process of large-scale industrial production, complex defects of different shapes and sizes can occur in industrial products and their components, and these defects seriously affect the performance of industria... 详细信息
来源: 评论