咨询与建议

限定检索结果

文献类型

  • 606 篇 会议
  • 182 篇 期刊文献

馆藏范围

  • 788 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 345 篇 工学
    • 272 篇 计算机科学与技术...
    • 230 篇 软件工程
    • 82 篇 信息与通信工程
    • 72 篇 电气工程
    • 42 篇 控制科学与工程
    • 27 篇 电子科学与技术(可...
    • 26 篇 生物工程
    • 26 篇 网络空间安全
    • 23 篇 机械工程
    • 20 篇 光学工程
    • 19 篇 交通运输工程
    • 17 篇 安全科学与工程
    • 15 篇 生物医学工程(可授...
    • 12 篇 化学工程与技术
    • 11 篇 仪器科学与技术
    • 9 篇 土木工程
    • 8 篇 建筑学
  • 159 篇 理学
    • 97 篇 数学
    • 39 篇 物理学
    • 27 篇 统计学(可授理学、...
    • 25 篇 生物学
    • 10 篇 化学
    • 10 篇 系统科学
  • 81 篇 管理学
    • 50 篇 管理科学与工程(可...
    • 45 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 25 篇 法学
    • 15 篇 社会学
    • 12 篇 法学
  • 13 篇 医学
    • 12 篇 临床医学
    • 9 篇 基础医学(可授医学...
  • 5 篇 教育学
  • 4 篇 经济学
  • 4 篇 军事学
  • 2 篇 农学
  • 1 篇 文学

主题

  • 99 篇 feature extracti...
  • 93 篇 accuracy
  • 61 篇 federated learni...
  • 59 篇 computational mo...
  • 58 篇 semantics
  • 50 篇 data models
  • 44 篇 training
  • 35 篇 transformers
  • 33 篇 neural networks
  • 30 篇 deep learning
  • 30 篇 adaptation model...
  • 28 篇 robustness
  • 24 篇 privacy
  • 23 篇 data mining
  • 23 篇 predictive model...
  • 23 篇 attention mechan...
  • 21 篇 optimization
  • 21 篇 visualization
  • 21 篇 measurement
  • 20 篇 real-time system...

机构

  • 267 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 56 篇 shandong provinc...
  • 51 篇 shandong enginee...
  • 43 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 37 篇 school of comput...
  • 36 篇 shandong fundame...
  • 33 篇 shandong provinc...
  • 32 篇 shaanxi key labo...
  • 27 篇 qilu university ...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 faculty of data ...
  • 14 篇 tianjin key labo...
  • 14 篇 qilu university ...
  • 13 篇 key laboratory o...
  • 13 篇 key laboratory o...
  • 11 篇 xi'an university...

作者

  • 29 篇 yichuan wang
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 24 篇 wang yichuan
  • 19 篇 hei xinhong
  • 18 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 14 篇 li wei
  • 14 篇 aimin li
  • 13 篇 guohua lv
  • 13 篇 lianhai wang
  • 13 篇 xiaohui han
  • 13 篇 mingle zhou
  • 13 篇 jin haiyan
  • 12 篇 lu wenpeng
  • 12 篇 jing zhao
  • 12 篇 delong han
  • 12 篇 chunxiao wang
  • 12 篇 zhenyu yang
  • 12 篇 lei zhu

语言

  • 679 篇 英文
  • 107 篇 其他
  • 8 篇 中文
检索条件"机构=Laboratory for Network Computing and Security Technology"
788 条 记 录,以下是31-40 订阅
排序:
An Improved YOLOv5s-Based Smoke Detection System for Outdoor Parking Lots
收藏 引用
Computers, Materials & Continua 2024年 第8期80卷 3333-3349页
作者: Ruobing Zuo Xiaohan Huang Xuguo Jiao Zhenyong Zhang State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang550025China School of Information and Control Engineering Qingdao University of TechnologyQingdao266520China State Key Laboratory of Industrial Control Technology College of Control Science and EngineeringZhejiang UniversityHangzhou310027China Key Laboratory of Computing Power Network and Information Security Ministry of EducationQilu University of Technology(Shandong Academy of Sciences)Jinan250353China Text Computing&Cognitive Intelligence Engineering Research Center of National Education Ministry Guizhou UniversityGuiyang550025China
In the rapidly evolving urban landscape,outdoor parking lots have become an indispensable part of the city’s transportation *** growth of parking lots has raised the likelihood of spontaneous vehicle combus-tion,a si... 详细信息
来源: 评论
Diffusion Model with Multi-layer Wavelet Transform for Low-Light Image Enhancement
Diffusion Model with Multi-layer Wavelet Transform for Low-L...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Haiyan Jin Jing Wang Fengyuan Zuo Haonan Su Zhaolin Xiao Bin Wang Yuanlin Zhang Xi’an University of Technology China Shaanxi Key Laboratory for Network Computing and Security Technology China
Low-light image enhancement methods based on diffusion models, though effective in improving image quality, often overrely on noise sensitivity and neglect the reconstruction deviations due to the naive up- and down-s... 详细信息
来源: 评论
An Adaptive Heterogeneous Credit Card Fraud Detection Model Based on Deep Reinforcement Training Subset Selection
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第8期5卷 4026-4041页
作者: Zhu, Kun Zhang, Nana Ding, Weiping Jiang, Changjun the Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai201804 China Collaborative Innovation Center for Financial Network Security Tongji University Shanghai201804 China the School of Computer Science and Technology Donghua University Shanghai201620 China the School of Information Science and Technology Nantong University Nantong226019 China
Heterogeneous fraud detection is an important means of credit card security assurance, which can utilize historical transaction records in a source and target domain to build an effective fraud detection model. Nevert... 详细信息
来源: 评论
A Semi-supervised Protein Complex Identification Algorithm Based on Sparseness Constraint
A Semi-supervised Protein Complex Identification Algorithm B...
收藏 引用
2024 International Conference on Applied Mathematics, Modelling and Statistics Application, AMMSA 2024
作者: Liu, Guangming Dang, Fengqing Wang, Bin Peng, Yonghong Wang, Xiaofan Tan, Li School of Computer Science and Engineering Shaanxi Key Laboratory for Network Computing and Security Technology Xi'An University of Technology Shaanxi Xi'an China Faculty of Science and Engineering Computing and Information Science Cambridge United Kingdom School of Computer and Information Engineering Beijing Technology and Business University Beijing China
Recognising protein complexes in protein interaction networks is crucial, but poses a major challenge due to the frequency of noisy interactions. These networks typically involve numerous protein complexes, with each ... 详细信息
来源: 评论
Research and Application of Speech Transmission Index in Acoustic Leakage Detection  17
Research and Application of Speech Transmission Index in Aco...
收藏 引用
17th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics, CISP-BMEI 2024
作者: Hao, Qiuyun Wang, FuQiang Zhang, Peng Ma, XiaoFeng Zhang, Jianqiang Zhao, Wei Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
Acoustic information in confidential premise can be leaked through channels such as walls, pipes, doors and windows. Acoustic leakage level needs to be measured through specific indicators. Acoustic leakage evaluation... 详细信息
来源: 评论
Augmentation-Aware Self-Supervision for Data-Efficient GAN Training  37
Augmentation-Aware Self-Supervision for Data-Efficient GAN T...
收藏 引用
37th Conference on Neural Information Processing Systems, NeurIPS 2023
作者: Hou, Liang Cao, Qi Yuan, Yige Zhao, Songtao Ma, Chongyang Pan, Siyuan Wan, Pengfei Wang, Zhongyuan Shen, Huawei Cheng, Xueqi CAS Key Laboratory of AI Safety and Security Institute of Computing Technology Chinese Academy of Sciences China CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China University of Chinese Academy of Sciences China Kuaishou Technology China
Training generative adversarial networks (GANs) with limited data is challenging because the discriminator is prone to overfitting. Previously proposed differentiable augmentation demonstrates improved data efficiency... 详细信息
来源: 评论
Multi-Label Text Classification for Judicial Texts via Dual Graph and Label Feature Fusion  10
Multi-Label Text Classification for Judicial Texts via Dual ...
收藏 引用
10th IEEE Smart World Congress, SWC 2024
作者: Gu, Qiliang Lu, Qin Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
The legal judgement prediction (LJP) of judicial texts represents a multi-label text classification (MLTC) problem, which in turn involves three distinct tasks: the prediction of charges, legal articles, and terms of ... 详细信息
来源: 评论
Reputation based Adaptive Federated Learning in Medical Scenarios  9
Reputation based Adaptive Federated Learning in Medical Scen...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Wang, Lianhai Liu, Tianrui Wang, Yingxiaochun Wang, Xinlei Li, Qi Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
Federated Learning (FL) is a distributed machine learning paradigm designed to address data silos and protect data privacy. However, in medical scenarios, the heterogeneity in data quality and the non-independent and ... 详细信息
来源: 评论
Infringement Detection and Traceability Scheme Based on Ciphertext Feature Extraction  9
Infringement Detection and Traceability Scheme Based on Ciph...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Wang, Lianhai Wang, Xinlei Liu, Tianrui Wang, Yingxiaochun Li, Qi Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
The rapid growth of healthcare data transactions has fostered win-win developments in healthcare technology innovation and economic benefits. However, the issue of secondary transactions makes data ownership vulnerabl... 详细信息
来源: 评论
A Sharding Scheme Based on Graph Partitioning Algorithm for Public Blockchain
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第6期139卷 3311-3327页
作者: Shujiang Xu Ziye Wang Lianhai Wang Miodrag J.Mihaljevi′c Shuhui Zhang Wei Shao Qizheng Wang Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science CenterQilu University of Technology(Shandong Academy of Sciences)Jinan250014China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer ScienceJinan250014China Mathematical Institute The Serbian Academy of Sciences and ArtsBelgrade11000Serbia
Blockchain technology,with its attributes of decentralization,immutability,and traceability,has emerged as a powerful catalyst for enhancing traditional industries in terms of optimizing business ***,transaction perfo... 详细信息
来源: 评论