咨询与建议

限定检索结果

文献类型

  • 622 篇 会议
  • 190 篇 期刊文献

馆藏范围

  • 812 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 362 篇 工学
    • 287 篇 计算机科学与技术...
    • 239 篇 软件工程
    • 88 篇 信息与通信工程
    • 84 篇 电气工程
    • 49 篇 控制科学与工程
    • 33 篇 电子科学与技术(可...
    • 29 篇 网络空间安全
    • 26 篇 生物工程
    • 25 篇 机械工程
    • 20 篇 光学工程
    • 20 篇 交通运输工程
    • 18 篇 安全科学与工程
    • 15 篇 生物医学工程(可授...
    • 12 篇 化学工程与技术
    • 11 篇 仪器科学与技术
    • 9 篇 土木工程
    • 8 篇 材料科学与工程(可...
  • 163 篇 理学
    • 101 篇 数学
    • 43 篇 物理学
    • 27 篇 统计学(可授理学、...
    • 25 篇 生物学
    • 11 篇 化学
    • 10 篇 系统科学
  • 84 篇 管理学
    • 53 篇 管理科学与工程(可...
    • 46 篇 图书情报与档案管...
    • 15 篇 工商管理
  • 25 篇 法学
    • 15 篇 社会学
    • 12 篇 法学
  • 14 篇 医学
    • 13 篇 临床医学
    • 9 篇 基础医学(可授医学...
  • 5 篇 教育学
  • 4 篇 经济学
  • 4 篇 军事学
  • 2 篇 农学
  • 1 篇 文学

主题

  • 100 篇 feature extracti...
  • 95 篇 accuracy
  • 65 篇 federated learni...
  • 59 篇 computational mo...
  • 58 篇 semantics
  • 52 篇 data models
  • 45 篇 training
  • 35 篇 transformers
  • 33 篇 neural networks
  • 32 篇 deep learning
  • 30 篇 robustness
  • 30 篇 adaptation model...
  • 25 篇 privacy
  • 24 篇 optimization
  • 24 篇 attention mechan...
  • 23 篇 data mining
  • 23 篇 predictive model...
  • 22 篇 measurement
  • 21 篇 real-time system...
  • 21 篇 visualization

机构

  • 274 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 60 篇 shandong provinc...
  • 51 篇 shandong enginee...
  • 43 篇 shaanxi key labo...
  • 40 篇 shandong provinc...
  • 38 篇 school of comput...
  • 37 篇 school of comput...
  • 36 篇 shandong fundame...
  • 32 篇 shaanxi key labo...
  • 27 篇 qilu university ...
  • 16 篇 quan cheng labor...
  • 15 篇 key laboratory o...
  • 15 篇 key laboratory o...
  • 15 篇 key laboratory o...
  • 14 篇 key laboratory o...
  • 14 篇 faculty of data ...
  • 14 篇 tianjin key labo...
  • 14 篇 qilu university ...
  • 13 篇 xi'an university...

作者

  • 29 篇 yichuan wang
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 24 篇 wang yichuan
  • 19 篇 hei xinhong
  • 18 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 15 篇 wei zhang
  • 14 篇 li wei
  • 14 篇 aimin li
  • 13 篇 guohua lv
  • 13 篇 lianhai wang
  • 13 篇 xiaohui han
  • 13 篇 chunxiao wang
  • 13 篇 mingle zhou
  • 13 篇 jin haiyan
  • 13 篇 wenpeng lu
  • 12 篇 lu wenpeng
  • 12 篇 jing zhao
  • 12 篇 delong han

语言

  • 660 篇 英文
  • 150 篇 其他
  • 10 篇 中文
检索条件"机构=Laboratory for Network Computing and Security Technology"
812 条 记 录,以下是321-330 订阅
排序:
Precise and Efficient:A Hybrid Analysis-Based Stack Overflow Detection Model under MIPS
Precise and Efficient:A Hybrid Analysis-Based Stack Overflow...
收藏 引用
Smart World Congress (SWC), IEEE
作者: Yichuan Wang Chenhao Huang Tong Zhang Li Zhao Zhendong Gu Gangyang Li Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Hanjiang.to.Weihan River Valley Water Diversion Project Construction.co.ltd Xi’an China
Although the vulnerability detection techniques under the MIPS platform can detect stack overflow vulnerabilities, the stack overflow vulnerability of the stack frame changes is complex and hard to recover. The input ...
来源: 评论
Feature Selection Method Based on FSA-Choquet Fuzzy Integral
Feature Selection Method Based on FSA-Choquet Fuzzy Integral
收藏 引用
Industrial IoT, Big Data and Supply Chain (IIoTBDSC), International Conference on
作者: Zhangyu Xu Huaijun Wang Ruijie Wang Junhuai Li Xunchao Shang School of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China
With the instant development and wide application of sensor technology, human behavior recognition based on wearable sensors has attracted wide attention and become a hot research topic. The typical Choquet fuzzy inte... 详细信息
来源: 评论
Unsupervised Anomalous Sound Detection for Mechanical Equipment Based on Domain Generalization Techniques
Unsupervised Anomalous Sound Detection for Mechanical Equipm...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Shumei Yang Kun Wang Kun Ma Fuqiang Wang Peng Zhang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China Qingdao Branch of China E-Port Data Center Qingdao China
Monitoring mechanical equipment is crucial for industrial efficiency and safety. Anomalous sound detection faces challenges due to limited labeled data and varying acoustic conditions. Supervised methods require exten... 详细信息
来源: 评论
DHD: Double Hard Decision Decoding Scheme for NAND Flash Memory
DHD: Double Hard Decision Decoding Scheme for NAND Flash Mem...
收藏 引用
Design, Automation and Test in Europe Conference and Exhibition
作者: Lanlan Cui Yichuan Wang Renzhi Xiao Miao Li Xiaoxue Liu Xinhong Hei School of Computer Science and Engineering XI'AN University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China School of Software Engineering Jiangxi University of Science and Technology Nanchang China School of Information Engineering Zhongnan University of Economics and Law Wuhan China
With the advancement of NAND flash technology, the increased storage density leads to intensified interference, which in turn raises the error rate during data retrieval. To ensure data reliability, low-density parity... 详细信息
来源: 评论
Joint Entity and Relation Extraction Based on Prompt Learning and Multi-channel Heterogeneous Graph Enhancement
Joint Entity and Relation Extraction Based on Prompt Learnin...
收藏 引用
International Symposium on Parallel and Distributed Processing with Applications, ISPA
作者: Haiqing Lv Xiaohui Han Peipei Wang Wenbo Zuo Jing Guo Lijuan Xu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China Quan Cheng Laboratory Jinan China Information Research Institute Qilu University of Technology (Shandong Academy of Sciences) Jinan China
Joint extraction of entity and relation is crucial in information extraction, aiming to extract all relation triples from unstructured text. However, current joint extraction methods face two main issues. Firstly, the... 详细信息
来源: 评论
A security Enhancement Scheme For Raft Consensus Algorithm Against Term Forgery Attacks
A Security Enhancement Scheme For Raft Consensus Algorithm A...
收藏 引用
IEEE International Symposium on Parallel and Distributed Processing with Applications and IEEE International Conference on Ubiquitous computing and Communications (ISPA/IUCC)
作者: Yichuan Wang Mengjie Tian Yaling Zhang Xiaoxue Liu Yeqiu Xiao Xinhong Hei School of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China
The consensus algorithm is the core component of blockchain technology and a key link to maintaining the security of the blockchain network. In the Raft consensus algorithm, since the term growth range is not specifie... 详细信息
来源: 评论
Pervasive Container computing–––a Fine-Grained Loosely Coupled Cloud Cluster
Pervasive Container Computing–––a Fine-Grained Loosely Co...
收藏 引用
IEEE International Symposium on Parallel and Distributed Processing with Applications and IEEE International Conference on Ubiquitous computing and Communications (ISPA/IUCC)
作者: Xinhong Hei Dan Wu YiFan Liu Wenjiang Ji Yichuan Wang Lei Zhu School of computer science and engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China
With the emergence of CaaS, a cloud service model that can quickly build a production environment, this model has been widely used in the industry. However, the degree of loose coupling of various containers in the cl... 详细信息
来源: 评论
Cross-chain Jamming Attack with Light Client Verification Clash in IBC Protocol
Cross-chain Jamming Attack with Light Client Verification Cl...
收藏 引用
IEEE International Symposium on Parallel and Distributed Processing with Applications and IEEE International Conference on Ubiquitous computing and Communications (ISPA/IUCC)
作者: Yaling Zhang Ziyan Wang Yichuan Wang Xiaoxue Liu Xinhong Hei School of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China
Inter-Blockchain Communication (IBC) in Cosmos is a Sidechains/Relays cross-chain protocol. During the implementation of the protocol, the blockchain uses relayers to establish connections, and uses light clients to t... 详细信息
来源: 评论
An Efficient Energy Consumption Prediction Framework for High Performance computing Cluster Jobs
An Efficient Energy Consumption Prediction Framework for Hig...
收藏 引用
International Conference on Computer Engineering and Applications (ICCEA)
作者: Yantao Lou Jibin Wang Shoupeng Feng Xian Yu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Department of Public Security of Shandong Province Shandong Intelligent Public Security Technology Innovation Center Jinan China
Energy consumption prediction is a crucial approach to enhance the operational efficiency of HPC (High Performance computing) clusters. Existing predicting methods for the energy consumption mainly rely on time series... 详细信息
来源: 评论
EML-SAM: Incorporating Multi-Scale Fusion in SAM for Cine-CMR Segmentation
EML-SAM: Incorporating Multi-Scale Fusion in SAM for Cine-CM...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Huijuan Hao Wenpeng Wang Qingyan Ding Haibo Cheng Fengqi Hao Hu Zhang Jinqiang Bai Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China Faculty of Data Science City University of Macau Macau China
Accurate and reproducible assessment of myocardial conditions is essential for the diagnosis of prior infarctions, cardiomyopathies, and inflammatory diseases. Although cardiac magnetic resonance imaging (CMR) is rega... 详细信息
来源: 评论