咨询与建议

限定检索结果

文献类型

  • 606 篇 会议
  • 182 篇 期刊文献

馆藏范围

  • 788 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 345 篇 工学
    • 272 篇 计算机科学与技术...
    • 230 篇 软件工程
    • 82 篇 信息与通信工程
    • 72 篇 电气工程
    • 42 篇 控制科学与工程
    • 27 篇 电子科学与技术(可...
    • 26 篇 生物工程
    • 26 篇 网络空间安全
    • 23 篇 机械工程
    • 20 篇 光学工程
    • 19 篇 交通运输工程
    • 17 篇 安全科学与工程
    • 15 篇 生物医学工程(可授...
    • 12 篇 化学工程与技术
    • 11 篇 仪器科学与技术
    • 9 篇 土木工程
    • 8 篇 建筑学
  • 159 篇 理学
    • 97 篇 数学
    • 39 篇 物理学
    • 27 篇 统计学(可授理学、...
    • 25 篇 生物学
    • 10 篇 化学
    • 10 篇 系统科学
  • 81 篇 管理学
    • 50 篇 管理科学与工程(可...
    • 45 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 25 篇 法学
    • 15 篇 社会学
    • 12 篇 法学
  • 13 篇 医学
    • 12 篇 临床医学
    • 9 篇 基础医学(可授医学...
  • 5 篇 教育学
  • 4 篇 经济学
  • 4 篇 军事学
  • 2 篇 农学
  • 1 篇 文学

主题

  • 99 篇 feature extracti...
  • 93 篇 accuracy
  • 61 篇 federated learni...
  • 59 篇 computational mo...
  • 58 篇 semantics
  • 50 篇 data models
  • 44 篇 training
  • 35 篇 transformers
  • 33 篇 neural networks
  • 30 篇 deep learning
  • 30 篇 adaptation model...
  • 28 篇 robustness
  • 24 篇 privacy
  • 23 篇 data mining
  • 23 篇 predictive model...
  • 23 篇 attention mechan...
  • 21 篇 optimization
  • 21 篇 visualization
  • 21 篇 measurement
  • 20 篇 real-time system...

机构

  • 267 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 56 篇 shandong provinc...
  • 51 篇 shandong enginee...
  • 43 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 37 篇 school of comput...
  • 36 篇 shandong fundame...
  • 33 篇 shandong provinc...
  • 32 篇 shaanxi key labo...
  • 27 篇 qilu university ...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 faculty of data ...
  • 14 篇 tianjin key labo...
  • 14 篇 qilu university ...
  • 13 篇 key laboratory o...
  • 13 篇 key laboratory o...
  • 11 篇 xi'an university...

作者

  • 29 篇 yichuan wang
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 24 篇 wang yichuan
  • 19 篇 hei xinhong
  • 18 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 14 篇 li wei
  • 14 篇 aimin li
  • 13 篇 guohua lv
  • 13 篇 lianhai wang
  • 13 篇 xiaohui han
  • 13 篇 mingle zhou
  • 13 篇 jin haiyan
  • 12 篇 lu wenpeng
  • 12 篇 jing zhao
  • 12 篇 delong han
  • 12 篇 chunxiao wang
  • 12 篇 zhenyu yang
  • 12 篇 lei zhu

语言

  • 679 篇 英文
  • 107 篇 其他
  • 8 篇 中文
检索条件"机构=Laboratory for Network Computing and Security Technology"
788 条 记 录,以下是121-130 订阅
排序:
AH-TDMA: An Adaptive Heterogeneous Tridiagonal Matrix Algorithm on the New Sunway Supercomputer  29
AH-TDMA: An Adaptive Heterogeneous Tridiagonal Matrix Algori...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Tian, Min Liu, Qi Li, Yanlong Du, Wei Ren, Zenghui Liu, Yue Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks China Jinan Institute of Supercomputing Technology Jinan Key Laboratory of High Performance Computing China
The solution of tridiagonal linear systems is used in in various fields and plays a crucial role in numerical simulations. However, there is few efficient solver for tridiagonal linear systems on the new Sunway superc... 详细信息
来源: 评论
hcaPCG: A Heterogeneous and communication-avoid PCG with Jacobi preconditioner on SW26010-Pro architecture  29
hcaPCG: A Heterogeneous and communication-avoid PCG with Jac...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Tian, Min Liu, Yue Wang, Li Chen, Yanyan Liu, Qi Pan, Jingshan Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks China Jinan Institute of Supercomputing Technology Jinan Key Laboratory of High Performance Computing China
Due to its efficiency and versatility, the preconditioned conjugate gradient algorithm has long been a staple in the realm of iterative linear system solvers. In this paper, we proposed an optimized preconditioned con... 详细信息
来源: 评论
Research on Text Classification Based on BERT-BiGRU Model  3
Research on Text Classification Based on BERT-BiGRU Model
收藏 引用
2020 3rd International Conference on Modeling, Simulation and Optimization Technologies and Applications, MSOTA 2020
作者: Yu, Qing Wang, Ziyin Jiang, Kaiwen Tianjin Key Laboratory of Intelligence Computing and Network Security Tianjin University of Technology Tianjin China
Text classification is a typical application of natural language processing. At present, the most commonly used text classification method is deep learning. Meanwhile there are many difficulties in natural language pr... 详细信息
来源: 评论
Combine Superpixel-Wise GCN and Pixel-Wise CNN for Polsar Image Classification
Combine Superpixel-Wise GCN and Pixel-Wise CNN for Polsar Im...
收藏 引用
IEEE International Symposium on Geoscience and Remote Sensing (IGARSS)
作者: Haiyan Jin Tiansheng He Junfei Shi Shanshan Ji Department of Computer Science and Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an University of Technology Xi’an China
Superpixel-based graph convolution network (SGCN) can extract global features well and reduce computing time greatly, which has been widely used in image classification. However, SGCN ignores individual feature for ea...
来源: 评论
3D visualization and detection of glomeruli in whole mouse kidney  16
3D visualization and detection of glomeruli in whole mouse k...
收藏 引用
16th International Conference on Photonics and Imaging in Biology and Medicine, PIBM 2023
作者: Li, Yuxin Cao, Jia Li, Anan Li, Xiangning Feng, Zhao Shaanxi Key Laboratory for Network Computing and Security Technology School of Computer Science and Engineering Xi an University of Technology Xi an710048 China Britton Chance Center for Biomedical Photonics Wuhan National Laboratory for Optoelectronics MoE Key Laboratory for Biomedical Photonics Huazhong University of Science and Technology Wuhan430074 China HUST-Suzhou Institute for Brainsmatics Suzhou215123 China
The kidney is an important organ in the body to excrete metabolic waste, and the glomerulus is an essential structure for the kidney to play a role in blood filtration. Abnormal glomerular numbers are associated with ... 详细信息
来源: 评论
A firmware upgrade solution based on hardware unique ID and SM4 cryptographic algorithm
A firmware upgrade solution based on hardware unique ID and ...
收藏 引用
2023 International Conference on Computer Graphics, Artificial Intelligence, and Data Processing, ICCAID 2023
作者: Gao, Shaofeng Wang, Kun Chen, Xinze Fu, Yong Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan250000 China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan250000 China
This article presents and implements a firmware upgrade solution for embedded systems, which aims to address the vulnerability of using the same file that can be easily copied or stolen. When upgrading firmware, a txt... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities  24
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
44th ACM/IEEE International Conference on Software Engineering, ICSE 2024
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hong Kong Jin YinHu Laboratory Wuhan China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China University of Colorado Colorado Springs Department of Computer Science Colorado Springs Colorado United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
Scheduling Model of Scenic Tour Task Based on Heuristic Intelligent Search Algorithm
Scheduling Model of Scenic Tour Task Based on Heuristic Inte...
收藏 引用
Artificial Intelligence technology (ACAIT), Asian Conference on
作者: Hongbo Wang Rong Fei Zilong Wang Aimin Li Yajun Liu Fuyu Zhu School of Computer Science and Engineering Xi'an University of Technology Xi’an China Shannxi Key Laboratory for Network Computing and Security Technology Xi'an University of Technology Xi’an China
This paper constructs a scenic tour task scheduling model (hereinafter referred to as the model) based on heuristic intelligent search algorithm, puts forward the heuristic intelligent search solution scheme under sin... 详细信息
来源: 评论
Visual malware classification and detection method based on convolutional neural network  9
Visual malware classification and detection method based on ...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Huang, Hua Sheng, Hua Han, Xingwang Zhang, Wenbin Zhao, Zilin State Grid Shandong Electric Power Company Information and Telecommunications Company Jinan China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China
With the rapid development of Internet technology, leading to the evolution of malware variants, and malicious threats are also increasing. Therefore, rapid and accurate classification of malware becomes crucial. In r... 详细信息
来源: 评论
An Ecg Signal Synthesis Approach Based on the Synergy of Wgan and Attention Mechanisms
SSRN
收藏 引用
SSRN 2024年
作者: Zhou, Hongfang Li, Yijie Guo, Yifan Xue, Haolin School of Computer Science and Engineering Xi’an University of Technology Xi’an710048 China Shaanxi Key Laboratory of Network Computing and Security Technology Xi’an710048 China
Electrocardiogram (ECG) synthesis plays a key role in the diagnosis of heart diseases. However, ECG data involves patient privacy and has obvious imbalance issue. This leads to a disconnect between theoretical researc... 详细信息
来源: 评论