咨询与建议

限定检索结果

文献类型

  • 606 篇 会议
  • 179 篇 期刊文献

馆藏范围

  • 785 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 345 篇 工学
    • 272 篇 计算机科学与技术...
    • 230 篇 软件工程
    • 82 篇 信息与通信工程
    • 72 篇 电气工程
    • 42 篇 控制科学与工程
    • 27 篇 电子科学与技术(可...
    • 26 篇 生物工程
    • 26 篇 网络空间安全
    • 23 篇 机械工程
    • 20 篇 光学工程
    • 19 篇 交通运输工程
    • 17 篇 安全科学与工程
    • 15 篇 生物医学工程(可授...
    • 12 篇 化学工程与技术
    • 11 篇 仪器科学与技术
    • 9 篇 土木工程
    • 8 篇 建筑学
  • 159 篇 理学
    • 97 篇 数学
    • 39 篇 物理学
    • 27 篇 统计学(可授理学、...
    • 25 篇 生物学
    • 10 篇 化学
    • 10 篇 系统科学
  • 81 篇 管理学
    • 50 篇 管理科学与工程(可...
    • 45 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 25 篇 法学
    • 15 篇 社会学
    • 12 篇 法学
  • 13 篇 医学
    • 12 篇 临床医学
    • 9 篇 基础医学(可授医学...
  • 5 篇 教育学
  • 4 篇 经济学
  • 4 篇 军事学
  • 2 篇 农学
  • 1 篇 文学

主题

  • 99 篇 feature extracti...
  • 93 篇 accuracy
  • 61 篇 federated learni...
  • 59 篇 computational mo...
  • 58 篇 semantics
  • 50 篇 data models
  • 44 篇 training
  • 35 篇 transformers
  • 33 篇 neural networks
  • 30 篇 deep learning
  • 30 篇 adaptation model...
  • 28 篇 robustness
  • 24 篇 privacy
  • 23 篇 data mining
  • 23 篇 predictive model...
  • 23 篇 attention mechan...
  • 21 篇 optimization
  • 21 篇 visualization
  • 21 篇 measurement
  • 20 篇 real-time system...

机构

  • 265 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 56 篇 shandong provinc...
  • 51 篇 shandong enginee...
  • 43 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 37 篇 school of comput...
  • 36 篇 shandong fundame...
  • 32 篇 shandong provinc...
  • 32 篇 shaanxi key labo...
  • 27 篇 qilu university ...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 faculty of data ...
  • 14 篇 tianjin key labo...
  • 14 篇 qilu university ...
  • 13 篇 key laboratory o...
  • 13 篇 key laboratory o...
  • 11 篇 xi'an university...

作者

  • 29 篇 yichuan wang
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 24 篇 wang yichuan
  • 19 篇 hei xinhong
  • 18 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 14 篇 li wei
  • 14 篇 aimin li
  • 13 篇 guohua lv
  • 13 篇 lianhai wang
  • 13 篇 xiaohui han
  • 13 篇 mingle zhou
  • 13 篇 jin haiyan
  • 12 篇 lu wenpeng
  • 12 篇 jing zhao
  • 12 篇 delong han
  • 12 篇 chunxiao wang
  • 12 篇 zhenyu yang
  • 12 篇 lei zhu

语言

  • 676 篇 英文
  • 107 篇 其他
  • 8 篇 中文
检索条件"机构=Laboratory for Network Computing and Security Technology"
785 条 记 录,以下是651-660 订阅
排序:
A permission generation and configuration method based on Rules and FP-Growth algorithm
A permission generation and configuration method based on Ru...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Lei Zhu Ziheng Zhang Xinhong Hei Yichuan Wang Ziliang Yang Feixiong Hu Ping He School of Computer Science and Engineering Xi’an University of technology1 Xi’an Shaanxi China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an Shaanxi China Shenzhen Tencent Computer System Co. Ltd Shenzhen China
With the development of computer technology, lots of enterprises had begun to build a data platform, and the data and its services already paly the import role in enterprises. However, the guarantee the data security ... 详细信息
来源: 评论
Verifiable Privacy Preservation Scheme for Outsourcing Medi-cal Image to Cloud Through ROI Based Crypto-Watermarking
Verifiable Privacy Preservation Scheme for Outsourcing Medi-...
收藏 引用
IEEE/ACM Int'l Conference on & Int'l Conference on Cyber, Physical and Social computing (CPSCom) Green computing and Communications (GreenCom)
作者: Chuan Zhou Yi Zhou XingHan An Yan Liu Min Wang XiangZhi Liu Tianjin University Tianjin China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China College of Environmental Science and Engineering Beijing Forestry University Beijing China Inspur Software Co. Ltd. Jinan China The Party School of cpc Jinan Municipal Committee Jinan China
A novel verifiable privacy preservation scheme for outsourcing medical image to cloud through ROI based crypto-watermarking is proposed in the paper. In the proposed scheme, data owner firstly carries out substitution...
来源: 评论
LBBESA: An efficient software-defined networking load-balancing scheme based on elevator scheduling algorithm
LBBESA: An efficient software-defined networking load-balanc...
收藏 引用
作者: Li, Qiliang Cui, Jie Zhong, Hong Du, Yichao Luo, Yonglong Liu, Lu School of Computer Science and Technology Anhui University Hefei China Anhui Provincial Key Laboratory of Network and Information Security Wuhu China School of Electronics Computing and Mathematics University of Derby DerbyDE22 1GB United Kingdom
Elevator scheduling algorithms generally denote methods used to calculate how to use the elevator. These algorithms can distribute elevators to various floors of a building, thereby achieving efficient transportation.... 详细信息
来源: 评论
Auction Theory and Game Theory Based Pricing of Edge computing Resources: A Survey
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Yu, Jiguo Liu, Shun Zou, Yifei Wang, Guijuan Hu, Chunqiang University of Electronic Science and Technology of China School of Information and Software Engineering Chengdu610054 China Qilu University of Technology Big Data Institute Jinan250353 China Qufu Normal University School of Computer Science Shandong Rizhao China Shandong University School of Computer Science and Technology Shandong Qingdao266237 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan250353 China Chongqing University School of Big Data and Software Engineering Chongqing400044 China
The proliferation of Internet of Things (IoT) devices and edge computing applications has heightened the demand for efficient resource allocation and pricing mechanisms. Effective pricing strategies play a crucial rol... 详细信息
来源: 评论
computing Power in the Sky: Digital Twin-assisted Collaborative computing with Multi-UAV networks
收藏 引用
IEEE Transactions on Vehicular technology 2025年
作者: Wang, Chao Han, Yu Zhang, Long Jia, Ziye Zhang, Hongliang Hong, Choong Seon Han, Zhu Hebei University of Engineering School of Information and Electrical Engineering Handan056038 China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan250014 China Nanjing University of Aeronautics and Astronautics College of Electronic and Information Engineering Nanjing211106 China Southeast University National Mobile Communications Research Laboratory Jiangsu Nanjing211111 China Peking University State Key Laboratory of Advanced Optical Communication Systems and Networks School of Electronics Beijing100871 China Kyung Hee University Department of Computer Science and Engineering Gyeonggi-do Yongin-si17104 Korea Republic of University of Houston Department of Electrical and Computer Engineering HoustonTX77004 United States Kyung Hee University Department of Computer Science and Engineering Seoul446-701 Korea Republic of
The collaboration of computing powers (CPs) among unmanned aerial vehicles (UAVs)-mounted edge servers is essential to handle data-intensive tasks of user equipments (UEs). This paper presents a multi-UAV computing po... 详细信息
来源: 评论
WebIDE cloud server resource allocation with task pre-scheduling in IOT application development  2
WebIDE cloud server resource allocation with task pre-schedu...
收藏 引用
2nd IEEE International Conference on Industrial Internet Cloud, ICII 2019
作者: Wang, Huaijun Li, Junhuai Tian, Jubo Wang, Kan Shaanxi Key Laboratory for Network Computing and Security Technology School of Computer Science and Engineering Xian University of Technology Xian710048 China
WebIDE is leveraged for IOT applications development, which could adapt to the rapid growth of IOT applications and meanwhile facilitate the rapid development. Resource allocation is of vital significance in the WebID... 详细信息
来源: 评论
MedSteGAN: Medical Embedding-Optimized Steganography with Improved GAN
SSRN
收藏 引用
SSRN 2023年
作者: Peng, Yuxiang Fu, Chong Zheng, Yu Tian, Yunjia Cao, Guixing Chen, Junxin School of Computer Science and Engineering Northeastern University Liaoning Shenyang110819 China Engineering Research Center of Security Technology of Complex Network System Ministry of Education China Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Northeastern University Liaoning Shenyang110819 China Department of Information Engineering The Chinese University of Hong Kong Ma Liu Shui Shatin New Territories Hong Kong Institute of Telecommunication Satellite China Academy of Space Technology Beijing100094 China School of Software Dalian University of Technology Liaoning Dalian116621 China
Medical diagnosing systems contain sensitive information, especially the resulting certificate of diagnosis that involves the patient’s privacy, required to be protected carefully. An effective way is to secretly emb... 详细信息
来源: 评论
BCE-PPDS: Blockchain-based cloud–edge collaborative privacy-preserving data sharing scheme for IoT
收藏 引用
Future Generation Computer Systems 2026年 174卷
作者: Guijuan Wang Qi Liu Zhongyuan Yu Hongliang Zhang Anming Dong Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan Shandong 250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan Shandong 250353 China China University of Petroleum Qingdao Shandong 266000 China
Internet of Things (IoT) devices generate large amounts of data every day that can be combined with intelligent platforms for predictive analytics and scientific research. However, concerns about privacy and security ...
来源: 评论
Crsanet: Class Representations Self-Attention network for the Segmentation of Thyroid Nodules
SSRN
收藏 引用
SSRN 2023年
作者: Sun, Shiyao Fu, Chong Xu, Sen Wen, Yingyou Ma, Tao School of Computer Science and Engineering Northeastern University Shenyang110819 China Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Northeastern University Shenyang110819 China Engineering Research Center of Security Technology of Complex Network System Ministry of Education China General Hospital of Northern Theatre Command Shenyang110016 China Medical Imaging Research Department Neusoft Research of Intelligent Healthcare Technology Co. Ltd. Shenyang China Dopamine Group Ltd. Auckland1542 New Zealand
Segmenting accurate thyroid nodules in medical ultrasound images is always non-trivial due to the large variation in size, shape and texture of nodules, and also the presence of surrounding tissues and organs with sim... 详细信息
来源: 评论
Chinese named entity recognition method for the field of network security based on RoBERTa
Chinese named entity recognition method for the field of net...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Xiaoyan Zhu Yu Zhang Lei Zhu Xinhong Hei Yichuan Wang Feixiong Hu Yanni Yao School of Computer Science and Engineering Xi’an Jiaotong University Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China School of Computer Science and Technology Xi’an University of technology Xi’an China Shenzhen Tencent Computer System Co. Ltd Shenzhen China
As the mobile Internet is developing rapidly, people who use cell phones to access the Internet dominate, and the mobile Internet has changed the development environment of online public opinion and made online public... 详细信息
来源: 评论