咨询与建议

限定检索结果

文献类型

  • 606 篇 会议
  • 179 篇 期刊文献

馆藏范围

  • 785 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 345 篇 工学
    • 272 篇 计算机科学与技术...
    • 230 篇 软件工程
    • 82 篇 信息与通信工程
    • 72 篇 电气工程
    • 42 篇 控制科学与工程
    • 27 篇 电子科学与技术(可...
    • 26 篇 生物工程
    • 26 篇 网络空间安全
    • 23 篇 机械工程
    • 20 篇 光学工程
    • 19 篇 交通运输工程
    • 17 篇 安全科学与工程
    • 15 篇 生物医学工程(可授...
    • 12 篇 化学工程与技术
    • 11 篇 仪器科学与技术
    • 9 篇 土木工程
    • 8 篇 建筑学
  • 159 篇 理学
    • 97 篇 数学
    • 39 篇 物理学
    • 27 篇 统计学(可授理学、...
    • 25 篇 生物学
    • 10 篇 化学
    • 10 篇 系统科学
  • 81 篇 管理学
    • 50 篇 管理科学与工程(可...
    • 45 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 25 篇 法学
    • 15 篇 社会学
    • 12 篇 法学
  • 13 篇 医学
    • 12 篇 临床医学
    • 9 篇 基础医学(可授医学...
  • 5 篇 教育学
  • 4 篇 经济学
  • 4 篇 军事学
  • 2 篇 农学
  • 1 篇 文学

主题

  • 99 篇 feature extracti...
  • 93 篇 accuracy
  • 61 篇 federated learni...
  • 59 篇 computational mo...
  • 58 篇 semantics
  • 50 篇 data models
  • 44 篇 training
  • 35 篇 transformers
  • 33 篇 neural networks
  • 30 篇 deep learning
  • 30 篇 adaptation model...
  • 28 篇 robustness
  • 24 篇 privacy
  • 23 篇 data mining
  • 23 篇 predictive model...
  • 23 篇 attention mechan...
  • 21 篇 optimization
  • 21 篇 visualization
  • 21 篇 measurement
  • 20 篇 real-time system...

机构

  • 265 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 56 篇 shandong provinc...
  • 51 篇 shandong enginee...
  • 43 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 37 篇 school of comput...
  • 36 篇 shandong fundame...
  • 32 篇 shandong provinc...
  • 32 篇 shaanxi key labo...
  • 27 篇 qilu university ...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 faculty of data ...
  • 14 篇 tianjin key labo...
  • 14 篇 qilu university ...
  • 13 篇 key laboratory o...
  • 13 篇 key laboratory o...
  • 11 篇 xi'an university...

作者

  • 29 篇 yichuan wang
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 24 篇 wang yichuan
  • 19 篇 hei xinhong
  • 18 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 14 篇 li wei
  • 14 篇 aimin li
  • 13 篇 guohua lv
  • 13 篇 lianhai wang
  • 13 篇 xiaohui han
  • 13 篇 mingle zhou
  • 13 篇 jin haiyan
  • 12 篇 lu wenpeng
  • 12 篇 jing zhao
  • 12 篇 delong han
  • 12 篇 chunxiao wang
  • 12 篇 zhenyu yang
  • 12 篇 lei zhu

语言

  • 676 篇 英文
  • 107 篇 其他
  • 8 篇 中文
检索条件"机构=Laboratory for Network Computing and Security Technology"
785 条 记 录,以下是151-160 订阅
排序:
Multilingual Knowledge Graph Completion via Multimodal Decouple and Relation-based Ensemble Inference  29
Multilingual Knowledge Graph Completion via Multimodal Decou...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Liu, Xiaojing Jiang, Xuesong Yi, Fengge Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
The objective of Multimodal Knowledge Graph Completion (MKGC) is to forecast absent entities within a knowledge graph by leveraging additional textual and visual modalities. Existing studies commonly utilize a singula... 详细信息
来源: 评论
Large-Scale network Adaptive Situation Awareness Method in Spatio-Temporal Dimension  1
收藏 引用
1st International Artificial Intelligence Conference, IAIC 2023
作者: Zhang, Hongbin Xu, Ying Liu, Bin Zhao, Dongmei Bai, Yikang School of Information Science and Engineering Hebei University of Science and Technology Shijiazhuang050000 China Hebei Key Laboratory of Network and Information Security Hebei Normal University Hebei Shijiazhuang050024 China School of Economics and Management Hebei University of Science and Technology Shijiazhuang050000 China Research Center of Big Data and Social Computing Hebei University of Science Shijiazhuang China
In large-scale networks, the state space is exploding and changing dynamically. This leads to difficulties in collecting and analyzing situational awareness data, so we construct an adaptive situational awareness mode... 详细信息
来源: 评论
Fusion of Dynamic Hypergraph and Clinical Event for Sequential Diagnosis Prediction  29
Fusion of Dynamic Hypergraph and Clinical Event for Sequenti...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Zhang, Xin Peng, Xueping Guan, Hongjiao Zhao, Long Qiao, Xinxiao Lu, Wenpeng Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China Australian Artificial Intelligence Institute University of Technology Sydney Sydney Australia
Sequential diagnosis prediction (SDP) is a challenging task, aiming to predict patients' future diagnoses based on their historical medical records. While methods based on graph neural networks (GNNs) have proven ... 详细信息
来源: 评论
Research on Classroom Behavior Target Detection Algorithm based on YOLOv7  6
Research on Classroom Behavior Target Detection Algorithm ba...
收藏 引用
6th IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference, IMCEC 2024
作者: Qiu, Wenke Wu, Xiaoming Liu, Xiangzhi Computer Science and Qilu University of Technology Shandong Academy of Sciences ShanDong Jinan China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
The integration of video information for the purpose of detecting students' behavior in the classroom, with the aim of enhancing teaching efficiency and maintaining a stable classroom environment, offers significa... 详细信息
来源: 评论
Petri Net-Based Attack Modeling for Industrial Control System networks  3rd
Petri Net-Based Attack Modeling for Industrial Control Syste...
收藏 引用
3rd China Intelligent Robotics Annual Conference, CCF CIRAC 2022
作者: Wang, Yichuan Lv, Zhaoqi Zhang, Yaling Xiao, Yeqiu Hei, Xinhong School of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China
Industrial control systems have been deeply involved in industrial facilities and infrastructure. With the integrated development of industry and information technology, industrial control systems are tied to the Inte... 详细信息
来源: 评论
Competitive Swarm Optimizer Based on Individual Learning Mechanism
Competitive Swarm Optimizer Based on Individual Learning Mec...
收藏 引用
High Performance Big Data and Intelligent Systems (HPBD&IS)
作者: JingQi Tang Wei Li Lei Wang School of Computer Science and Engineering Xi'an University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China
In view of the disadvantages of the traditional competitive swarm optimizer (CSO), such as falling into local minimization or poor convergence accuracy, this paper proposed an enhanced CSO algorithm called competitive...
来源: 评论
A Driving Risk Prediction Approach Based on Generative Adversarial networks and VANET for Autonomous Trams
A Driving Risk Prediction Approach Based on Generative Adver...
收藏 引用
2021 International Conference on networking and network Applications, NaNA 2021
作者: Ji, Wenjiang Yang, Jiangcheng Wang, Yichuan Zhu, Lei Qiu, Yuan Hei, Xinhong College of Computer Science and Engineering Xi'an University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China Shaanxi Key Laboratory for Net work Computing and Security T echnology Xi'an China
Driving safety is an essential prerequisite to the rapid development of autonomous trams. However, the relationship of driving risk factors is nonlinear, which makes modeling difficult. To improve the accuracy of driv... 详细信息
来源: 评论
Text Information Mining in Cyberspace: An Information Extraction Method Based on T5 and KeyBERT  9
Text Information Mining in Cyberspace: An Information Extrac...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Liu, Kuan Li, Yumei Qi, Yuanhua Qi, Ning Zhai, Mengran Qilu University of Technology Shandong Academy of Sciences Information Research Institute Shandong Academy of Sciences Jinan China Qilu University of Technology Shandong Academy of Sciences Shandong Institute of Economy and Informatization Development Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Qilu University of Technology Shandong Academy of Sciences Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China SHANDONG SCICOM Information and Economy Research Institute Co. Ltd Jinan China Shandong Institute of Economy and Informatization Development Jinan China
With the development of the digital economy and the advent of the big data era, the rapid growth of textual information in cyberspace has placed higher demands on information processing technology. This paper proposes... 详细信息
来源: 评论
Prediction of miRNA family based on class-incremental learning
Prediction of miRNA family based on class-incremental learni...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Yajun Liu Lulu Qiu Aimin Li Rong Fei Junhuai Li Fang-Xiang Wu Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an University of Technology Xi'an China Department of Mechanical Engineering Department of Computer Science Division of Biomedical Engineering Saskatoon Canada
With the development of deep sequencing, recent studies indicate that a miRNA precursor can generate multiple miRNA isoforms (isomiRs). The family prediction of canonical miRNAs and isomiRs could provide a basis for m... 详细信息
来源: 评论
Petri net modeling and vulnerability analysis of the Heartbleed
Petri net modeling and vulnerability analysis of the Heartbl...
收藏 引用
2021 International Conference on networking and network Applications, NaNA 2021
作者: Wang, Yichuan Wang, He Hei, Xinhong Ji, Wenjiang Zhu, Lei Xi'an University of technology School of computer science and engineering Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology China
In recent years, a variety of network attacks emerge in an endless stream, and network attacks gradually show the characteristics of higher secrecy and greater harm. At present, the analysis of system vulnerabilities ... 详细信息
来源: 评论