咨询与建议

限定检索结果

文献类型

  • 606 篇 会议
  • 179 篇 期刊文献

馆藏范围

  • 785 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 345 篇 工学
    • 272 篇 计算机科学与技术...
    • 230 篇 软件工程
    • 82 篇 信息与通信工程
    • 72 篇 电气工程
    • 42 篇 控制科学与工程
    • 27 篇 电子科学与技术(可...
    • 26 篇 生物工程
    • 26 篇 网络空间安全
    • 23 篇 机械工程
    • 20 篇 光学工程
    • 19 篇 交通运输工程
    • 17 篇 安全科学与工程
    • 15 篇 生物医学工程(可授...
    • 12 篇 化学工程与技术
    • 11 篇 仪器科学与技术
    • 9 篇 土木工程
    • 8 篇 建筑学
  • 159 篇 理学
    • 97 篇 数学
    • 39 篇 物理学
    • 27 篇 统计学(可授理学、...
    • 25 篇 生物学
    • 10 篇 化学
    • 10 篇 系统科学
  • 81 篇 管理学
    • 50 篇 管理科学与工程(可...
    • 45 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 25 篇 法学
    • 15 篇 社会学
    • 12 篇 法学
  • 13 篇 医学
    • 12 篇 临床医学
    • 9 篇 基础医学(可授医学...
  • 5 篇 教育学
  • 4 篇 经济学
  • 4 篇 军事学
  • 2 篇 农学
  • 1 篇 文学

主题

  • 99 篇 feature extracti...
  • 93 篇 accuracy
  • 61 篇 federated learni...
  • 59 篇 computational mo...
  • 58 篇 semantics
  • 50 篇 data models
  • 44 篇 training
  • 35 篇 transformers
  • 33 篇 neural networks
  • 30 篇 deep learning
  • 30 篇 adaptation model...
  • 28 篇 robustness
  • 24 篇 privacy
  • 23 篇 data mining
  • 23 篇 predictive model...
  • 23 篇 attention mechan...
  • 21 篇 optimization
  • 21 篇 visualization
  • 21 篇 measurement
  • 20 篇 real-time system...

机构

  • 265 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 56 篇 shandong provinc...
  • 51 篇 shandong enginee...
  • 43 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 37 篇 school of comput...
  • 36 篇 shandong fundame...
  • 32 篇 shandong provinc...
  • 32 篇 shaanxi key labo...
  • 27 篇 qilu university ...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 faculty of data ...
  • 14 篇 tianjin key labo...
  • 14 篇 qilu university ...
  • 13 篇 key laboratory o...
  • 13 篇 key laboratory o...
  • 11 篇 xi'an university...

作者

  • 29 篇 yichuan wang
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 24 篇 wang yichuan
  • 19 篇 hei xinhong
  • 18 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 14 篇 li wei
  • 14 篇 aimin li
  • 13 篇 guohua lv
  • 13 篇 lianhai wang
  • 13 篇 xiaohui han
  • 13 篇 mingle zhou
  • 13 篇 jin haiyan
  • 12 篇 lu wenpeng
  • 12 篇 jing zhao
  • 12 篇 delong han
  • 12 篇 chunxiao wang
  • 12 篇 zhenyu yang
  • 12 篇 lei zhu

语言

  • 676 篇 英文
  • 107 篇 其他
  • 8 篇 中文
检索条件"机构=Laboratory for Network Computing and Security Technology"
785 条 记 录,以下是61-70 订阅
排序:
Policy network-Based Dual-Agent Deep Reinforcement Learning for Multi-Resource Task Offloading in Multi-Access Edge Cloud networks
收藏 引用
China Communications 2024年 第4期21卷 53-73页
作者: Feng Chuan Zhang Xu Han Pengchao Ma Tianchun Gong Xiaoxue School of Communications and Information Engineering Chongqing University of Posts and TelecommunicationsChongqing 400065China Institute of Intelligent Communication and Network Security Chongqing University of Posts and TelecommunicationsChongqing 400065China Key Laboratory of Big Data Intelligent Computing Chongqing University of Posts and TelecommunicationsChongqing 400065China School of Information Engineering Guangdong University of TechnologyGuangzhou 510006China
The Multi-access Edge Cloud(MEC) networks extend cloud computing services and capabilities to the edge of the networks. By bringing computation and storage capabilities closer to end-users and connected devices, MEC n... 详细信息
来源: 评论
A Robust Key Exchange and Tamper-Resistant Protocol for HAN and NAN networks in Smart Grids
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 21394-21403页
作者: Ayub, Muhammad Faizan Li, Xiong Mahmood, Khalid Shamshad, Salman Das, Ashok Kumar Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu611731 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan The University of Lahore Department of Software Engineering Lahore54590 Pakistan International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500 032 India Korea University College of Informatics Department of Computer Science and Engineering Anam-ro Seoul145 Korea Republic of Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250353 China
Smart Grids (SG) rely on Home Area networks (HAN) and Neighborhood Area networks (NAN) to ensure efficient power distribution, real-time monitoring, and seamless communication between smart devices. Despite these adva... 详细信息
来源: 评论
Provably Secure Efficient Key-Exchange Protocol for Intelligent Supply Line Surveillance in Smart Grids
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 21784-21792页
作者: Ayub, Muhammad Faizan Li, Xiong Mahmood, Khalid Alenazi, Mohammed J.F. Das, Ashok Kumar Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu12599 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan Department of Computer Engineering Riyadh11451 Saudi Arabia International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500 032 India Korea University College of Informatics Department of Computer Science and Engineering Anam-ro Seoul145 Korea Republic of Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security China Shandong Fundamental Research Center for Computer Science Jinan 250353 China
Intelligent supply line surveillance is critical for modern smart grids. Smart sensors and gateway nodes are strategically deployed along supply lines to achieve intelligent surveillance. They collect data continuousl... 详细信息
来源: 评论
Decoupled knowledge distillation method based on meta-learning
收藏 引用
High-Confidence computing 2024年 第1期4卷 1-6页
作者: Wenqing Du Liting Geng Jianxiong Liu Zhigang Zhao Chunxiao Wang Jidong Huo Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science Center(National Supercomputer Center in Jinan)Qilu University of Technology(Shandong Academy of Sciences)Jinan 250014China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer ScienceJinan 250014China Aerospace Science&Industry Network Information Development Co. LTDBeijing 100854China
With the advancement of deep learning techniques,the number of model parameters has been increasing,leading to significant memory consumption and limits in the deployment of such models in real-time *** reduce the num... 详细信息
来源: 评论
MMSFD: Multi-grained and Multi-modal Fusion for Short Video Fake News Detection  7
MMSFD: Multi-grained and Multi-modal Fusion for Short Video ...
收藏 引用
7th International Conference on Data Science and Information technology, DSIT 2024
作者: Ren, Shuai Liu, Yahui Zhu, Yaping Bing, Wanlong Ma, Hongliang Wang, Wei Shihezi University School of Information Science and Technology Shihezi China Xinjiang Production and Construction Corps Key Laboratory of Computing Intelligence and Network Information Security Shihezi China Beijing Jiaotong University School of Computer Science and Information Technology Beijing China
Short video platforms have become an essential part of people's daily lives, while also facing the challenge of the rapid spread of fake news. Therefore, the detection of fake news in short videos has attracted in... 详细信息
来源: 评论
StarMFND: Star Topology Multi-Domain Fake News Detection  7
StarMFND: Star Topology Multi-Domain Fake News Detection
收藏 引用
7th International Conference on Data Science and Information technology, DSIT 2024
作者: Gu, Pengfei Chen, Yibing Bing, Wanlong Liu, Yahui Ma, Hongliang Wang, Wei Shihezi University School of Information Science and Technology Shihezi China Xinjiang Production and Construction Corps Key Laboratory of Computing Intelligence and Network Information Security Shihezi China Beijing Jiaotong University School of Computer Science and Information Technology Beijing China
The proliferation of the Internet and the emergence of social media platforms have greatly accelerated the speed and scope of information dissemination, while also introducing the peril of fake news propagation, parti... 详细信息
来源: 评论
A Multi-Exposure Generation and Fusion Method for Low-Light Image Enhancement
A Multi-Exposure Generation and Fusion Method for Low-Light ...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Haiyan Jin Long Li Haonan Su YuanLin Zhang ZhaoLin Xiao Bin Wang Faculty of Computer Science and Engineering Xi’an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology
In the low light image enhancement, single exposure images contains a limited dynamic range, which hinders the restoration of contrast and texture. To address these problems, we propose a multi exposure generation and... 详细信息
来源: 评论
Generating Personalized Imputations for Patient Health Status Prediction in Electronic Health Records
Generating Personalized Imputations for Patient Health Statu...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Liu, Yang Zhang, Weiyu Si, Jiasheng Li, Zhao Peng, Xueping Lu, Wenpeng Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Evay Info Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Jinan China University of Technology Sydney Australian Artificial Intelligence Institute Sydney Australia
Electronic health records (EHRs) play a crucial role in the development of personalized treatment plans for patients. However, EHRs are often highly incomplete, posing significant challenges for predictive modeling. W... 详细信息
来源: 评论
Block-Streaming Service Loading Optimization of Android Dalvik Executable File for Cloud-End Collaboration
Block-Streaming Service Loading Optimization of Android Dalv...
收藏 引用
2022 International Conference on networking and network Applications, NaNA 2022
作者: Wang, Yichuan Feng, Yanhua Du, Yanning Hei, Xinhong Tian, Yuying Cui, Xiangjie School of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China
In recent years, dynamic loading technologies of Android applications have emerged in an endless stream. At present, the existing Android application loading method is to load the entire Android Dalvik Executable (DEX... 详细信息
来源: 评论
Multimodal Multi-objective Particle Swarm Optimization Algorithm Based on Multi-directional Guidance  4
Multimodal Multi-objective Particle Swarm Optimization Algor...
收藏 引用
4th International Conference on High Performance Big Data and Intelligent Systems, HDIS 2022
作者: Li, Wei Gao, Yetong Wang, Lei School of Computer Science and Engineering Xi'an University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China
In multimodal multi-objective optimization, the key issue is to find as many Pareto optimal solutions as possible and select promising solutions in the environmental selection. This paper proposes a multimodal multi-o... 详细信息
来源: 评论