咨询与建议

限定检索结果

文献类型

  • 232 篇 会议
  • 150 篇 期刊文献

馆藏范围

  • 382 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 243 篇 工学
    • 178 篇 计算机科学与技术...
    • 159 篇 软件工程
    • 85 篇 信息与通信工程
    • 28 篇 电子科学与技术(可...
    • 26 篇 控制科学与工程
    • 26 篇 生物工程
    • 23 篇 电气工程
    • 14 篇 机械工程
    • 12 篇 交通运输工程
    • 11 篇 生物医学工程(可授...
    • 11 篇 网络空间安全
    • 10 篇 光学工程
    • 10 篇 仪器科学与技术
    • 8 篇 安全科学与工程
    • 6 篇 土木工程
    • 6 篇 化学工程与技术
  • 140 篇 理学
    • 99 篇 数学
    • 27 篇 统计学(可授理学、...
    • 24 篇 生物学
    • 20 篇 物理学
    • 18 篇 系统科学
    • 5 篇 大气科学
    • 4 篇 化学
  • 56 篇 管理学
    • 30 篇 图书情报与档案管...
    • 28 篇 管理科学与工程(可...
    • 7 篇 工商管理
  • 12 篇 法学
    • 9 篇 社会学
    • 4 篇 法学
  • 8 篇 医学
    • 7 篇 临床医学
    • 5 篇 基础医学(可授医学...
  • 4 篇 教育学
  • 4 篇 军事学
  • 3 篇 农学
  • 2 篇 经济学
  • 1 篇 文学

主题

  • 17 篇 feature extracti...
  • 12 篇 security
  • 11 篇 semantics
  • 10 篇 deep learning
  • 9 篇 optimization
  • 9 篇 network security
  • 8 篇 image enhancemen...
  • 8 篇 neural networks
  • 8 篇 computational mo...
  • 8 篇 predictive model...
  • 8 篇 protocols
  • 8 篇 accuracy
  • 7 篇 deep neural netw...
  • 7 篇 petri nets
  • 7 篇 data models
  • 6 篇 object detection
  • 6 篇 wireless communi...
  • 6 篇 analytical model...
  • 6 篇 clustering algor...
  • 6 篇 cloud computing

机构

  • 43 篇 shaanxi key labo...
  • 40 篇 school of comput...
  • 36 篇 school of comput...
  • 32 篇 shaanxi key labo...
  • 11 篇 xi'an university...
  • 8 篇 shaanxi key labo...
  • 7 篇 ministry of educ...
  • 7 篇 department of co...
  • 7 篇 school of mathem...
  • 7 篇 shaanxi key labo...
  • 7 篇 college of xi'an...
  • 6 篇 xi'an university...
  • 6 篇 school of mathem...
  • 5 篇 shaanxi key labo...
  • 5 篇 moe key lab for ...
  • 5 篇 shaanxi key labo...
  • 5 篇 key lab of infor...
  • 5 篇 school of comput...
  • 5 篇 shaanxi key labo...
  • 5 篇 school of comput...

作者

  • 33 篇 meng deyu
  • 28 篇 yichuan wang
  • 26 篇 xinhong hei
  • 23 篇 wang yichuan
  • 19 篇 hei xinhong
  • 18 篇 wang hui-ming
  • 15 篇 haiyan jin
  • 14 篇 li wei
  • 13 篇 jin haiyan
  • 11 篇 hui-ming wang
  • 11 篇 wenjiang ji
  • 10 篇 wang lei
  • 10 篇 lei zhu
  • 10 篇 wei wei
  • 9 篇 bin wang
  • 9 篇 xu zongben
  • 9 篇 xiaoxue liu
  • 9 篇 huang ke-wen
  • 9 篇 shen yulong
  • 9 篇 sun qindong

语言

  • 358 篇 英文
  • 21 篇 其他
  • 4 篇 中文
检索条件"机构=Network Computing and Security Key Lab of Shaanxi"
382 条 记 录,以下是11-20 订阅
排序:
A Novel On-Demand Service Architecture for Efficient Cloud-Edge Collaboration
A Novel On-Demand Service Architecture for Efficient Cloud-E...
收藏 引用
2023 International Conference on networking and network Applications, NaNA 2023
作者: Zhang, Yaling Chen, Jingjing Wang, Yichuan Xiao, Yeqiu Liu, Xiaoxue School of Computer Science and Engineering Xi'an University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology China
With the advent of 5G era, the model of cloud-edge collaboration is used to handle massive data computing tasks with significant superiority. However, this architecture still uses the traditional web service model, wh... 详细信息
来源: 评论
A Trusted Privacy-Preserving Model for Cross-Chain Transactions Based on zk_SNARKs
A Trusted Privacy-Preserving Model for Cross-Chain Transacti...
收藏 引用
2023 International Conference on networking and network Applications, NaNA 2023
作者: Wang, Yichuan Tie, Jianhuan Hei, Xinhong Zhao, Li Zhang, Xiaohui School of Computer Science and Engineering Xi'an University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technolog Xi'an China
Currently, the privacy protection technology of blockchain is not mature enough, such as user data leakage and lack of anonymity exist, and these problems are especially serious when conducting cross-chain transaction... 详细信息
来源: 评论
Petri Net-Based Attack Modeling for Industrial Control System networks  3rd
Petri Net-Based Attack Modeling for Industrial Control Syste...
收藏 引用
3rd China Intelligent Robotics Annual Conference, CCF CIRAC 2022
作者: Wang, Yichuan Lv, Zhaoqi Zhang, Yaling Xiao, Yeqiu Hei, Xinhong School of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China
Industrial control systems have been deeply involved in industrial facilities and infrastructure. With the integrated development of industry and information technology, industrial control systems are tied to the Inte... 详细信息
来源: 评论
Competitive Swarm Optimizer Based on Individual Learning Mechanism  5
Competitive Swarm Optimizer Based on Individual Learning Mec...
收藏 引用
5th International Conference on High Performance Big Data and Intelligent Systems, HDIS 2023
作者: Tang, JingQi Li, Wei Wang, Lei School of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China
In view of the disadvantages of the traditional competitive swarm optimizer (CSO), such as falling into local minimization or poor convergence accuracy, this paper proposed an enhanced CSO algorithm called competitive... 详细信息
来源: 评论
A Novel Teaching Strategy Based on EduCoder Platform for C Programming Language  5th
A Novel Teaching Strategy Based on EduCoder Platform for C P...
收藏 引用
5th International Conference on Computer Science and Educational Informatization, CSEI 2023
作者: Li, Wei Hei, Xinhong Wang, Lei Wang, Yichuan School of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China School of Mathematics and Computer Science Shaanxi University of Technology Hanzhong China
Experimental teaching is an important part of the C programming language course, which aims to cultivate students’ Computational thinking ability, problem solving ability and programming ability. However, the existin... 详细信息
来源: 评论
Prediction of miRNA family based on class-incremental learning
Prediction of miRNA family based on class-incremental learni...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Liu, Yajun Qiu, Lulu Li, Aimin Fei, Rong Li, Junhuai Wu, Fang-Xiang Xi'an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China Division of Biomedical Engineering Department of Mechanical Engineering Department of Computer Science Saskatoon Canada
With the development of deep sequencing, recent studies indicate that a miRNA precursor can generate multiple miRNA isoforms (isomiRs). The family prediction of canonical miRNAs and isomiRs could provide a basis for m... 详细信息
来源: 评论
Voiceprint recognition model based on Ecapa-Tdnn and ResNet  5
Voiceprint recognition model based on Ecapa-Tdnn and ResNet
收藏 引用
5th International Conference on Telecommunications, Optics, and Computer Science, TOCS 2024
作者: Jia, Chengjie Fei, Rong Li, Xiaomeng School of Computer Science and Engineering Xi'an University of Technology Shaanxi Xi'an710004 China Shaanxi Key Laboratory for Network Computing and Security Technology School of Computer Science and Engineering Xi'an University of Technology Shaanxi Xi'an710048 China
In recent years, with the continuous progress of deep learning neural networks and the construction of large data sets, new breakthroughs in voiceprint verification technology for voice calls have been rapidly achieve... 详细信息
来源: 评论
Wishart Deeplab network for Polarimetric SAR Image Classification  3rd
Wishart Deeplab Network for Polarimetric SAR Image Classific...
收藏 引用
3rd China Intelligent Robotics Annual Conference, CCF CIRAC 2022
作者: Shi, Junfei He, Tiansheng Jin, Haiyan Wang, Hua Xu, Weinan State Key Laboratory of Geo-Information Engineering Shaanxi Xi’an710048 China School of Computer Science and Engineering Xi’an University of Technology Shaanxi Xi’an710048 China Shaanxi Key Laboratory for Network Computing and Security Technology Shaanxi Xi’an710048 China
Polarimetric Synthetic Aperture Radar (PolSAR) images have attracted much attention with abundant polarimetric scattering information. In recent years, many deep learning models have been proposed and highly expanded ... 详细信息
来源: 评论
PosFuzz:augmenting greybox fuzzing with effective position distribution
收藏 引用
Cybersecurity 2023年 第4期6卷 123-143页
作者: Yanyan Zou Wei Zou JiaCheng Zhao Nanyu Zhong Yu Zhang Ji Shi Wei Huo Institute of Information Engineering Chinese Academy of SciencesBeijingChina School of Cyber Security University of Chinese Academy of SciencesBeijingChina State Key Lab of Processors Institute of Computing TechnologyChinese Academy of SciencesBeijingChina Key Laboratory of Network Assessment Technology Chinese Academy of SciencesBeijingChina Beijing Key Laboratory of Network Security and Protection Technology BeijingChina Zhongguancun Laboratory BeijingChina
Mutation-based greybox fuzzing has been one of the most prevalent techniques for security vulnerability discovery and a great deal of research work has been proposed to improve both its efficiency and ***-based greybo... 详细信息
来源: 评论
A Semi-supervised Protein Complex Identification Algorithm Based on Sparseness Constraint
A Semi-supervised Protein Complex Identification Algorithm B...
收藏 引用
2024 International Conference on Applied Mathematics, Modelling and Statistics Application, AMMSA 2024
作者: Liu, Guangming Dang, Fengqing Wang, Bin Peng, Yonghong Wang, Xiaofan Tan, Li School of Computer Science and Engineering Shaanxi Key Laboratory for Network Computing and Security Technology Xi'An University of Technology Shaanxi Xi'an China Faculty of Science and Engineering Computing and Information Science Cambridge United Kingdom School of Computer and Information Engineering Beijing Technology and Business University Beijing China
Recognising protein complexes in protein interaction networks is crucial, but poses a major challenge due to the frequency of noisy interactions. These networks typically involve numerous protein complexes, with each ... 详细信息
来源: 评论