咨询与建议

限定检索结果

文献类型

  • 606 篇 会议
  • 182 篇 期刊文献

馆藏范围

  • 788 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 345 篇 工学
    • 272 篇 计算机科学与技术...
    • 230 篇 软件工程
    • 82 篇 信息与通信工程
    • 72 篇 电气工程
    • 42 篇 控制科学与工程
    • 27 篇 电子科学与技术(可...
    • 26 篇 生物工程
    • 26 篇 网络空间安全
    • 23 篇 机械工程
    • 20 篇 光学工程
    • 19 篇 交通运输工程
    • 17 篇 安全科学与工程
    • 15 篇 生物医学工程(可授...
    • 12 篇 化学工程与技术
    • 11 篇 仪器科学与技术
    • 9 篇 土木工程
    • 8 篇 建筑学
  • 159 篇 理学
    • 97 篇 数学
    • 39 篇 物理学
    • 27 篇 统计学(可授理学、...
    • 25 篇 生物学
    • 10 篇 化学
    • 10 篇 系统科学
  • 81 篇 管理学
    • 50 篇 管理科学与工程(可...
    • 45 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 25 篇 法学
    • 15 篇 社会学
    • 12 篇 法学
  • 13 篇 医学
    • 12 篇 临床医学
    • 9 篇 基础医学(可授医学...
  • 5 篇 教育学
  • 4 篇 经济学
  • 4 篇 军事学
  • 2 篇 农学
  • 1 篇 文学

主题

  • 99 篇 feature extracti...
  • 93 篇 accuracy
  • 61 篇 federated learni...
  • 59 篇 computational mo...
  • 58 篇 semantics
  • 50 篇 data models
  • 44 篇 training
  • 35 篇 transformers
  • 33 篇 neural networks
  • 30 篇 deep learning
  • 30 篇 adaptation model...
  • 28 篇 robustness
  • 24 篇 privacy
  • 23 篇 data mining
  • 23 篇 predictive model...
  • 23 篇 attention mechan...
  • 21 篇 optimization
  • 21 篇 visualization
  • 21 篇 measurement
  • 20 篇 real-time system...

机构

  • 267 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 56 篇 shandong provinc...
  • 51 篇 shandong enginee...
  • 43 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 37 篇 school of comput...
  • 36 篇 shandong fundame...
  • 33 篇 shandong provinc...
  • 32 篇 shaanxi key labo...
  • 27 篇 qilu university ...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 faculty of data ...
  • 14 篇 tianjin key labo...
  • 14 篇 qilu university ...
  • 13 篇 key laboratory o...
  • 13 篇 key laboratory o...
  • 11 篇 xi'an university...

作者

  • 29 篇 yichuan wang
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 24 篇 wang yichuan
  • 19 篇 hei xinhong
  • 18 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 14 篇 li wei
  • 14 篇 aimin li
  • 13 篇 guohua lv
  • 13 篇 lianhai wang
  • 13 篇 xiaohui han
  • 13 篇 mingle zhou
  • 13 篇 jin haiyan
  • 12 篇 lu wenpeng
  • 12 篇 jing zhao
  • 12 篇 delong han
  • 12 篇 chunxiao wang
  • 12 篇 zhenyu yang
  • 12 篇 lei zhu

语言

  • 679 篇 英文
  • 107 篇 其他
  • 8 篇 中文
检索条件"机构=Laboratory for Network Computing and Security Technology"
788 条 记 录,以下是181-190 订阅
排序:
WiViPose: A Video-aided Wi-Fi Framework for Environment-Independent 3D Human Pose Estimation
收藏 引用
IEEE Transactions on Multimedia 2025年
作者: Zhang, Lei Ning, Haoran Tang, Jiaxin Chen, Zhenxiang Zhong, Yaping Han, Yahong Tianjin University College of Intelligence and Computing the Tianjin Key Laboratory of Advanced Network Technology and Application Tianjin300050 China Key Laboratory of Computing Power Network and Information Security Ministry of Education China University of Jinan Shandong Provincial Key Laboratory of Ubiquitous Intelligent Computing the School of Information Science and Engineering Jinan250022 China Wuhan Sports University Sports Big-data Research Center Wuhan430079 China Tianjin University College of Intelligence and Computing the Tianjin Key Laboratory of Machine Learning Tianjin300350 China
The inherent complexity of Wi-Fi signals makes video-aided Wi-Fi 3D pose estimation difficult. The challenges include the limited generalizability of the task across diverse environments, its significant signal hetero... 详细信息
来源: 评论
Algorithm Contest of Calibration-free Motor Imagery BCI in the BCI Controlled Robot Contest in World Robot Contest 2021:A survey
收藏 引用
Brain Science Advances 2022年 第2期8卷 127-141页
作者: Jing Luo Qi Mao Yaojie Wang Zhenghao Shi Xinhong Hei Shaanxi Key Laboratory for Network Computing and Security Technology School of Computer Science and EngineeringXi’an University of TechnologyXi’an 710054ShaanxiChina
Objective:From September 10 to 13,2021,the finals of the BCI Controlled Robot Contest in World Robot Contest 2021 were held in Beijing,*** teams participated in the Algorithm Contest of Calibration-free Motor Imagery ... 详细信息
来源: 评论
network security Situation Assessment Method Based on Absorbing Markov Chain
Network Security Situation Assessment Method Based on Absorb...
收藏 引用
2022 International Conference on networking and network Applications, NaNA 2022
作者: Gao, Hongbin Wang, Shangxing Zhang, Hongbin Liu, Bin Zhao, Dongmei Liu, Zhen Hebei University of Science and Technology School of Information Science and Engineering Shijiazhuang China Hebei University of Science and Technology School of Information Science and Engineering Hebei Key Laboratory of Network and Information Security Shijiazhuang China Hebei University of Science and Technology School of Economics and Management Research Center of Big Data and Social Computing Shijiazhuang China Hebei Normal University Hebei Key Laboratory of Network and Information Security Shijiazhuang China
This paper has a new network security evaluation method as an absorbing Markov chain-based assessment method. This method is different from other network security situation assessment methods based on graph theory. It... 详细信息
来源: 评论
FDSC-YOLOv8:Advancements in Automated Crack Identification for Enhanced Safety in Underground Engineering
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第9期140卷 3035-3049页
作者: Rui Wang Zhihui Liu Hongdi Liu Baozhong Su Chuanyi Ma Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science Center(National Supercomputer Center in Jinan)Qilu University of Technology(Shandong Academy of Sciences)Jinan250353China School of Qilu Transportation Shandong UniversityJinan250100China Geotechnical and Structural Engineering Center Shandong UniversityJinan250061China Shandong Lairong High-Speed Railway Co. Ltd.Weihai264200China Shandong High-Speed Group Co. Ltd.Jinan250014China
In underground engineering,the detection of structural cracks on tunnel surfaces stands as a pivotal task in ensuring the health and reliability of tunnel ***,the dim and dusty environment inherent to under-ground eng... 详细信息
来源: 评论
Self-Evaluation of Large Language Model based on Glass-box Features
arXiv
收藏 引用
arXiv 2024年
作者: Huang, Hui Qu, Yingqi Liu, Jing Yang, Muyun Xu, Bing Zhao, Tiejun Lu, Wenpeng Faculty of Computing Harbin Institute of Technology Harbin China Baidu Inc. Beijing China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Jinan China
The proliferation of open-source Large Language Models (LLMs) underscores the pressing need for evaluation methods. Existing works primarily rely on external evaluators, focusing on training and prompting strategies. ... 详细信息
来源: 评论
FERI: Feature Enhancement and Relational Interaction for Image-text Matching  30
FERI: Feature Enhancement and Relational Interaction for Ima...
收藏 引用
30th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2024
作者: Zhang, Yu Zhang, Jianqiang Song, Gongpeng Lu, Qin Zhao, Shuo Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China Shandong Branch of China Mobile Communication Group Design Institute Co. Jinan China
Image-text matching is an important problem at the intersection of computer vision and natural language processing. It aims to establish the semantic link between image and text to achieve high-quality semantic alignm... 详细信息
来源: 评论
OpenViewer: Openness-Aware Multi-View Learning  39
OpenViewer: Openness-Aware Multi-View Learning
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Du, Shide Fang, Zihan Tan, Yanchao Wang, Changwei Wang, Shiping Guo, Wenzhong College of Computer and Data Science Fuzhou University Fuzhou China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Jinan China
Multi-view learning methods leverage multiple data sources to enhance perception by mining correlations across views, typically relying on predefined categories. However, deploying these models in real-world scenarios... 详细信息
来源: 评论
CBAT-ASG: Adversarial Sample Generation Method Based on CBA-Transformer
CBAT-ASG: Adversarial Sample Generation Method Based on CBA-...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Lijuan Xu Zhiang Yao Haoran Li Chengcai Diao Guangrun Zhou Dawei Zhao Hua Ding Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
In recent years, machine learning models have become prevalent for anomaly detection in industrial control systems (ICS). However, their vulnerability to adversarial samples poses a significant security threat. Curren... 详细信息
来源: 评论
Petri Net Model of MITM Attack Based on NDP Protocol
Petri Net Model of MITM Attack Based on NDP Protocol
收藏 引用
2022 International Conference on networking and network Applications, NaNA 2022
作者: Zhang, Liumei Han, Yu Wang, Yichuan Quan, Ruiqin School of Computer Science Xi’an Shiyou University Xi’an China School of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China Xinjiang Institute of Engineering China
Neighbor Discovery Protocol (NDP) is one of the core protocols of IPv6 networks. Since NDP messages are an unauthenticated stateless protocol, they are vulnerable to various types of attacks, and Man-In-The-Middle (MI... 详细信息
来源: 评论
SMGC-SBERT: A Multi-Feature Fusion Chinese Short Text Similarity Computation Model Based on Optimised SBERT
SMGC-SBERT: A Multi-Feature Fusion Chinese Short Text Simila...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Zhao, Shuo Gu, Qiliang Zhang, Jianqiang Song, Gongpeng Lu, Qin Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Shandong Branch of China Mobile Communication Group Design Institute Co. Jinan China
Chinese short text similarity computation stands as a pivotal task within natural language processing, garnering significant attention. However, existing models grapple with limitations in handling intricate semantic ... 详细信息
来源: 评论