咨询与建议

限定检索结果

文献类型

  • 606 篇 会议
  • 182 篇 期刊文献

馆藏范围

  • 788 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 345 篇 工学
    • 272 篇 计算机科学与技术...
    • 230 篇 软件工程
    • 82 篇 信息与通信工程
    • 72 篇 电气工程
    • 42 篇 控制科学与工程
    • 27 篇 电子科学与技术(可...
    • 26 篇 生物工程
    • 26 篇 网络空间安全
    • 23 篇 机械工程
    • 20 篇 光学工程
    • 19 篇 交通运输工程
    • 17 篇 安全科学与工程
    • 15 篇 生物医学工程(可授...
    • 12 篇 化学工程与技术
    • 11 篇 仪器科学与技术
    • 9 篇 土木工程
    • 8 篇 建筑学
  • 159 篇 理学
    • 97 篇 数学
    • 39 篇 物理学
    • 27 篇 统计学(可授理学、...
    • 25 篇 生物学
    • 10 篇 化学
    • 10 篇 系统科学
  • 81 篇 管理学
    • 50 篇 管理科学与工程(可...
    • 45 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 25 篇 法学
    • 15 篇 社会学
    • 12 篇 法学
  • 13 篇 医学
    • 12 篇 临床医学
    • 9 篇 基础医学(可授医学...
  • 5 篇 教育学
  • 4 篇 经济学
  • 4 篇 军事学
  • 2 篇 农学
  • 1 篇 文学

主题

  • 99 篇 feature extracti...
  • 93 篇 accuracy
  • 61 篇 federated learni...
  • 59 篇 computational mo...
  • 58 篇 semantics
  • 50 篇 data models
  • 44 篇 training
  • 35 篇 transformers
  • 33 篇 neural networks
  • 30 篇 deep learning
  • 30 篇 adaptation model...
  • 28 篇 robustness
  • 24 篇 privacy
  • 23 篇 data mining
  • 23 篇 predictive model...
  • 23 篇 attention mechan...
  • 21 篇 optimization
  • 21 篇 visualization
  • 21 篇 measurement
  • 20 篇 real-time system...

机构

  • 267 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 56 篇 shandong provinc...
  • 51 篇 shandong enginee...
  • 43 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 37 篇 school of comput...
  • 36 篇 shandong fundame...
  • 33 篇 shandong provinc...
  • 32 篇 shaanxi key labo...
  • 27 篇 qilu university ...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 faculty of data ...
  • 14 篇 tianjin key labo...
  • 14 篇 qilu university ...
  • 13 篇 key laboratory o...
  • 13 篇 key laboratory o...
  • 11 篇 xi'an university...

作者

  • 29 篇 yichuan wang
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 24 篇 wang yichuan
  • 19 篇 hei xinhong
  • 18 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 14 篇 li wei
  • 14 篇 aimin li
  • 13 篇 guohua lv
  • 13 篇 lianhai wang
  • 13 篇 xiaohui han
  • 13 篇 mingle zhou
  • 13 篇 jin haiyan
  • 12 篇 lu wenpeng
  • 12 篇 jing zhao
  • 12 篇 delong han
  • 12 篇 chunxiao wang
  • 12 篇 zhenyu yang
  • 12 篇 lei zhu

语言

  • 679 篇 英文
  • 107 篇 其他
  • 8 篇 中文
检索条件"机构=Laboratory for Network Computing and Security Technology"
788 条 记 录,以下是41-50 订阅
排序:
LCLB: Low Cross-Chain Transaction Ratio and Load Balancing for Blockchain Sharding  6
LCLB: Low Cross-Chain Transaction Ratio and Load Balancing f...
收藏 引用
6th International Conference on Robotics, Intelligent Control and Artificial Intelligence, RICAI 2024
作者: Wang, Yu Wu, Xiaoming Yuan, Qile Dong, Yunfeng Liu, Xiangzhi Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
As blockchain technology becomes widely applied, handling high volumes of transactions has become a critical challenge. Sharding has emerged as an effective solution to enhance the throughput of blockchain systems. Ye... 详细信息
来源: 评论
Advancing MobileNet security: Weighted Adversarial Learning in Convolutional Neural networks  11
Advancing MobileNet Security: Weighted Adversarial Learning ...
收藏 引用
11th International Conference on Machine Intelligence Theory and Applications, MiTA 2024
作者: Quadri, Hakeem Gu, Bruce Wang, Hua Islam, Sardar Victoria University Department of Information Technology Melbourne Australia Qilu University of Technology Key Laboratory of Computing Power Network and Information Security Jinan China Victoria University Institute for sustainable Industries and Liveable Cities Melbourne Australia
Convolutional Neural networks (CNN), particularly low latency models such as MobileNets have excelled in many applications, including object detection in images, speech recognition and natural language processing, but... 详细信息
来源: 评论
Neural network-Based State Estimation for Nonlinear Systems With Denial-of-Service Attack Under Try-Once-Discard Protocol
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第10期11卷 2182-2184页
作者: Xueli Wang Shangwei Zhao Ming Yang Xin Wang Xiaoming Wu the Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science CenterQilu University of Technology(Shandong Academy of Sciences)Jinan 250014 Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer ScienceJinan 250014China Department of Automation Shanghai Jiao Tong UniversityShanghai 200240China
Dear Editor,This letter deals with state estimation issues of discrete-time nonlinear systems subject to denial-of-service(DoS)attacks under the try-once-discard(TOD)*** specifically,to reduce the communication burden... 详细信息
来源: 评论
A Channel-Wise Guidance Sparse Transformer for Effective Dark Image Enhancement
A Channel-Wise Guidance Sparse Transformer for Effective Dar...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Haiyan Jin Yifan Shuai Fengyuan Zuo Haonan Su Zhaolin Xiao Bin Wang Yuanlin Zhang Xi’an University of Technology China Shaanxi Key Laboratory for Network Computing and Security Technology China
Dark Image Enhancement (DIE) aims to improve contrast and restore details for captured images under low illumination. Currently, traditional Transformer methods have achieved significant performance in the DIE problem... 详细信息
来源: 评论
Robust Imagined Speech Production Using AI-Generated Content network for Patients with Language Impairments
收藏 引用
IEEE Transactions on Consumer Electronics 2024年 第1期71卷 1402-1411页
作者: Xu, Xu Fu, Chong Dalian University of Technology School of Software Dalian116621 China Northeastern University School of Computer Science and Engineering Shenyang110004 China Northeastern University Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Shenyang110819 China Ministry of Education Engineering Research Center of Security Technology of Complex Network System Shenyang110004 China
Imagined speech production is critical for brain-computer interface systems. It is able to provide the communication ability for patients with language impairments. Nowadays, many studies have developed algorithms for... 详细信息
来源: 评论
Source-free Domain Adaptation with Multiple Alignment for Efficient Image Retrieval
Source-free Domain Adaptation with Multiple Alignment for Ef...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Ni, Jinghui Cui, Hui Zhao, Lihai Li, Fengling Han, Xiaohui Xu, Lijuan Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science China Quan Cheng Laboratory China Shandong Open University China University of Technology Sydney Australia
Domain adaptation techniques help models generalize to target domains by addressing domain discrepancies between the source and target domain data distributions. These techniques are particularly valuable for cross-do... 详细信息
来源: 评论
Voiceprint recognition model based on Ecapa-Tdnn and ResNet  5
Voiceprint recognition model based on Ecapa-Tdnn and ResNet
收藏 引用
5th International Conference on Telecommunications, Optics, and Computer Science, TOCS 2024
作者: Jia, Chengjie Fei, Rong Li, Xiaomeng School of Computer Science and Engineering Xi'an University of Technology Shaanxi Xi'an710004 China Shaanxi Key Laboratory for Network Computing and Security Technology School of Computer Science and Engineering Xi'an University of Technology Shaanxi Xi'an710048 China
In recent years, with the continuous progress of deep learning neural networks and the construction of large data sets, new breakthroughs in voiceprint verification technology for voice calls have been rapidly achieve... 详细信息
来源: 评论
Dynamic detection technology of encryption algorithm based on Pin  9
Dynamic detection technology of encryption algorithm based o...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Qu, Junpeng Du, Gaolei Sun, Yunge Fu, Yong Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan250014 China Quan Cheng Laboratory Jinan250103 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
Aiming at the problem that malicious software uses encryption algorithm to hide its own malicious code and avoid detection, a dynamic detection technology based on Pin encryption algorithm is proposed. Use Pin to get ... 详细信息
来源: 评论
Online Queue-Aware Service Migration and Resource Allocation in Mobile Edge computing
收藏 引用
IEEE Transactions on Vehicular technology 2025年 第5期74卷 8063-8078页
作者: Du, An Jia, Jie Chen, Jian Wang, Xingwei Huang, Min Northeastern University School of Computer Science and Engineering The Engineering Research Center of Security Technology of Complex Network System Shenyang110819 China Northeastern University Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Shenyang110819 China Northeastern University College of Information Science and Engineering State Key Laboratory of Synthetical Automation for Process Industries Shenyang110819 China
Mobile edge computing (MEC) integrated with network Functions Virtualization (NFV) helps run a wide range of services implemented by Virtual network Functions (VNFs) deployed at MEC networks. This emerging paradigm of... 详细信息
来源: 评论
DRL-Based Time-Varying Workload Scheduling With Priority and Resource Awareness
收藏 引用
IEEE Transactions on network and Service Management 2025年 第3期22卷 2838-2852页
作者: Liu, Qifeng Fan, Qilin Zhang, Xu Li, Xiuhua Wang, Kai Xiong, Qingyu Chongqing University School of Big Data and Software Engineering Chongqing400044 China Chongqing University Key Laboratory of Dependable Service Computing in Cyber Physical Society of Ministry of Education Chongqing400044 China Nanjing University School of Electronic Science and Engineering Nanjing210023 China Haihe Laboratory of Information Technology Application Innovation Tianjin300072 China Harbin Institute of Technology School of Computer Science and Technology Weihai264209 China Shandong Key Laboratory of Industrial Network Security Weihai264209 China
With the proliferation of cloud services and the continuous growth in enterprises' demand for dynamic multi-dimensional resources, the implementation of effective strategy for time-varying workload scheduling has ... 详细信息
来源: 评论