咨询与建议

限定检索结果

文献类型

  • 226 篇 会议
  • 157 篇 期刊文献

馆藏范围

  • 383 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 245 篇 工学
    • 177 篇 计算机科学与技术...
    • 158 篇 软件工程
    • 87 篇 信息与通信工程
    • 27 篇 电气工程
    • 26 篇 电子科学与技术(可...
    • 26 篇 生物工程
    • 25 篇 控制科学与工程
    • 14 篇 机械工程
    • 11 篇 交通运输工程
    • 11 篇 生物医学工程(可授...
    • 11 篇 网络空间安全
    • 10 篇 光学工程
    • 10 篇 仪器科学与技术
    • 8 篇 安全科学与工程
    • 6 篇 土木工程
    • 5 篇 化学工程与技术
  • 138 篇 理学
    • 99 篇 数学
    • 28 篇 统计学(可授理学、...
    • 24 篇 生物学
    • 18 篇 系统科学
    • 17 篇 物理学
    • 6 篇 大气科学
  • 56 篇 管理学
    • 30 篇 图书情报与档案管...
    • 28 篇 管理科学与工程(可...
    • 7 篇 工商管理
  • 13 篇 法学
    • 9 篇 社会学
    • 5 篇 法学
  • 9 篇 医学
    • 7 篇 临床医学
    • 5 篇 基础医学(可授医学...
  • 4 篇 教育学
    • 4 篇 教育学
  • 4 篇 军事学
  • 3 篇 农学
  • 2 篇 经济学

主题

  • 16 篇 feature extracti...
  • 12 篇 security
  • 11 篇 semantics
  • 10 篇 deep learning
  • 9 篇 optimization
  • 9 篇 network security
  • 8 篇 image enhancemen...
  • 8 篇 neural networks
  • 8 篇 computational mo...
  • 8 篇 predictive model...
  • 8 篇 protocols
  • 8 篇 accuracy
  • 7 篇 petri nets
  • 7 篇 data models
  • 6 篇 object detection
  • 6 篇 wireless communi...
  • 6 篇 analytical model...
  • 6 篇 clustering algor...
  • 6 篇 cloud computing
  • 5 篇 deep neural netw...

机构

  • 41 篇 shaanxi key labo...
  • 37 篇 school of comput...
  • 35 篇 school of comput...
  • 32 篇 shaanxi key labo...
  • 12 篇 xi'an university...
  • 8 篇 shaanxi key labo...
  • 7 篇 ministry of educ...
  • 7 篇 department of co...
  • 7 篇 school of mathem...
  • 7 篇 college of xi'an...
  • 6 篇 xi'an university...
  • 6 篇 school of mathem...
  • 5 篇 shaanxi key labo...
  • 5 篇 moe key lab for ...
  • 5 篇 key lab of infor...
  • 5 篇 school of comput...
  • 5 篇 shaanxi key labo...
  • 5 篇 school of comput...
  • 5 篇 shaanxi key labo...
  • 5 篇 college of infor...

作者

  • 33 篇 meng deyu
  • 27 篇 yichuan wang
  • 26 篇 xinhong hei
  • 23 篇 wang yichuan
  • 18 篇 wang hui-ming
  • 17 篇 hei xinhong
  • 16 篇 haiyan jin
  • 14 篇 li wei
  • 13 篇 jin haiyan
  • 11 篇 hui-ming wang
  • 11 篇 wenjiang ji
  • 10 篇 wang lei
  • 10 篇 lei zhu
  • 10 篇 sun qindong
  • 10 篇 wei wei
  • 9 篇 bin wang
  • 9 篇 xu zongben
  • 9 篇 huang ke-wen
  • 9 篇 shen yulong
  • 8 篇 zhang lei

语言

  • 362 篇 英文
  • 18 篇 其他
  • 4 篇 中文
检索条件"机构=Network Computing and Security Key Lab of Shaanxi"
383 条 记 录,以下是1-10 订阅
排序:
HTC-HAD: A Hybrid Transformer-CNN Approach for Hyperspectral Anomaly Detection
收藏 引用
IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing 2025年 18卷 10144-10156页
作者: Zhao, Minghua Zheng, Wen Hu, Jing Xi'an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology School of Computer Science and Engineering Xi'an710048 China
Hyperspectral anomaly detection (HAD) identifies anomalies by analyzing differences between anomalies and background pixels without prior information, presenting a significant challenge. Most existing studies leverage... 详细信息
来源: 评论
Diffusion Model with Multi-layer Wavelet Transform for Low-Light Image Enhancement
Diffusion Model with Multi-layer Wavelet Transform for Low-L...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Jin, Haiyan Wang, Jing Zuo, Fengyuan Su, Haonan Xiao, Zhaolin Wang, Bin Zhang, Yuanlin Xi'an University of Technology 710048 China Shaanxi Key Laboratory for Network Computing and Security Technology 710048 China
Low-light image enhancement methods based on diffusion models, though effective in improving image quality, often overrely on noise sensitivity and neglect the reconstruction deviations due to the naive up- and down-s... 详细信息
来源: 评论
Textual Data De-Privatization Scheme Based on Generative Adversarial networks  24th
Textual Data De-Privatization Scheme Based on Generative Adv...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Du, Yanning Xu, Jinnan Zhang, Yaling Wang, Yichuan Wang, Zhoukai School of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China
In many fields, such as healthcare, finance, and scientific research, data sharing and collaboration are critical to achieving better outcomes. However, the sharing of personal data often involves privacy risks, so pr... 详细信息
来源: 评论
1+1>2: A Dual-Function Defense Framework for Adversarial Example Mitigation
收藏 引用
IEEE Transactions on Information Forensics and security 2025年 20卷 4121-4136页
作者: Yang, Rui Sun, Qindong Cao, Han Shen, Chao Cai, Jiaming Rong, Dongzhu Xi’an Jiaotong University School of Cyber Science and Engineering Xi’an710049 China Xi’an University of Technology Shaanxi Key Laboratory of Network Computing and Security Xi’an710049 China Xi’an Jiaotong University School of Software Engineering Xi’an710049 China
Current state-of-the-art plug-and-play countermeasures for mitigating adversarial examples (i.e., purification and detection) exhibit several fatal limitations, impeding their deployment in safety-critical real-world ... 详细信息
来源: 评论
Hedonic Coalition Formation Game and Contract-Based Federated Learning in AAV-Assisted Internet of Things
收藏 引用
IEEE Internet of Things Journal 2025年 第9期12卷 11258-11272页
作者: Liu, Jia Li, Xiaoxu Xu, Yang Lyu, Chen Wang, Yichuan Liu, Xiaoying Xidian University School of Computer Science and Technology Xi’an710071 China Shanghai University of Finance and Economics School of Computing and Artificial Intelligence MoE Key Laboratory of Interdisciplinary Research of Computation and Economics Shanghai200433 China Xi’an University of Technology Shaanxi Key Laboratory of Network Computing and Security Technology Xi’an710071 China Zhejiang University of Technology School of Computer Science and Technology Hangzhou310023 China
Coupled with the rise of Deep Learning, the wealth of data and enhanced computation capabilities of Internet of Things (IoT) components enable effective artificial intelligence (AI)-based models to be built. Beyond gr... 详细信息
来源: 评论
A Method for Removing Reflections from Water Surface Images Based on Pre-trained Image Restoration
A Method for Removing Reflections from Water Surface Images ...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Minghua Zhao Rui Zhi Shuangli Du Jing Hu Cheng Shi Lin Wang Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an University of Technology Xi’an China
Reflections on the water surface hinder the extraction of valuable information from water surface images. To remove reflections from water surface images, we construct a synthetic dataset and propose a multi-task netw... 详细信息
来源: 评论
Diffusion Model with Multi-layer Wavelet Transform for Low-Light Image Enhancement
Diffusion Model with Multi-layer Wavelet Transform for Low-L...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Haiyan Jin Jing Wang Fengyuan Zuo Haonan Su Zhaolin Xiao Bin Wang Yuanlin Zhang Xi’an University of Technology China Shaanxi Key Laboratory for Network Computing and Security Technology China
Low-light image enhancement methods based on diffusion models, though effective in improving image quality, often overrely on noise sensitivity and neglect the reconstruction deviations due to the naive up- and down-s... 详细信息
来源: 评论
EvolGCN: A Co-evolutionary Graph Convolutional network Model for Dynamically Spatio-Temporal Anomaly Event Inference
收藏 引用
IEEE Transactions on Dependable and Secure computing 2025年
作者: Liu, Xiaoming Pu, Hang Chen, Zhuo Zhang, Zhanwei Lan, Yu Shen, Chao Xi'an Jiaotong University Ministry of Education Key Lab for Intelligent Networks and Network Security Shaanxi Xi'an710049 China
Accurately spatio-temporal anomaly event inference is significant to enhance society's safety, such as crime prevention and traffic collision reduction, etc. However, it is hard to achieve good performance for its... 详细信息
来源: 评论
DCGSD: Low-Light Image Enhancement with Dual-Conditional Guidance Sparse Diffusion Model
收藏 引用
IEEE Transactions on Circuits and Systems for Video Technology 2025年
作者: Jin, Haiyan Wang, Jing Zuo, Fengyuan Su, Haonan Xiao, Zhaolin Wang, Bin Zhang, Yuanlin Xi'an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology Department of Computer Science and Engineering NO. 5 South Jinhua Road Shaanxi Xi'an710048 China
When restoring low-light images, most methods largely overlook the ambiguity due to dark noise and lack discrimination for region and shape representations, resulting in invalid feature enhancement. In this work, we p... 详细信息
来源: 评论
Riemannian Complex Hermit Positive Definite Convolution network for Polarimetric SAR Image Classification
arXiv
收藏 引用
arXiv 2025年
作者: Shi, Junfei Nie, Mengmeng Li, Yuke Jin, Haiyan Lin, Weisi Department of Computer Science and Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an University of Technology Xi’an China College of Computing and Data Science Nanyang Technological University 639798 Singapore
Deep learning can learn high-level semantic features in Euclidean space effectively for PolSAR images, while they need to covert the complex covariance matrix into a feature vector or complex-valued vector as the netw... 详细信息
来源: 评论