咨询与建议

限定检索结果

文献类型

  • 226 篇 会议
  • 157 篇 期刊文献

馆藏范围

  • 383 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 246 篇 工学
    • 178 篇 计算机科学与技术...
    • 159 篇 软件工程
    • 87 篇 信息与通信工程
    • 27 篇 电气工程
    • 26 篇 电子科学与技术(可...
    • 26 篇 生物工程
    • 25 篇 控制科学与工程
    • 14 篇 机械工程
    • 11 篇 光学工程
    • 11 篇 交通运输工程
    • 11 篇 生物医学工程(可授...
    • 11 篇 网络空间安全
    • 10 篇 仪器科学与技术
    • 8 篇 安全科学与工程
    • 7 篇 土木工程
    • 5 篇 建筑学
    • 5 篇 化学工程与技术
  • 138 篇 理学
    • 99 篇 数学
    • 28 篇 统计学(可授理学、...
    • 24 篇 生物学
    • 18 篇 系统科学
    • 17 篇 物理学
    • 6 篇 大气科学
  • 56 篇 管理学
    • 30 篇 图书情报与档案管...
    • 28 篇 管理科学与工程(可...
    • 7 篇 工商管理
  • 13 篇 法学
    • 9 篇 社会学
    • 5 篇 法学
  • 9 篇 医学
    • 7 篇 临床医学
    • 5 篇 基础医学(可授医学...
  • 4 篇 教育学
  • 4 篇 军事学
  • 3 篇 农学
  • 2 篇 经济学

主题

  • 16 篇 feature extracti...
  • 12 篇 security
  • 11 篇 semantics
  • 10 篇 deep learning
  • 9 篇 optimization
  • 9 篇 network security
  • 8 篇 image enhancemen...
  • 8 篇 neural networks
  • 8 篇 computational mo...
  • 8 篇 predictive model...
  • 8 篇 protocols
  • 8 篇 accuracy
  • 7 篇 petri nets
  • 7 篇 data models
  • 6 篇 object detection
  • 6 篇 wireless communi...
  • 6 篇 analytical model...
  • 6 篇 clustering algor...
  • 6 篇 cloud computing
  • 5 篇 deep neural netw...

机构

  • 41 篇 shaanxi key labo...
  • 37 篇 school of comput...
  • 35 篇 school of comput...
  • 32 篇 shaanxi key labo...
  • 12 篇 xi'an university...
  • 8 篇 shaanxi key labo...
  • 7 篇 ministry of educ...
  • 7 篇 department of co...
  • 7 篇 school of mathem...
  • 7 篇 college of xi'an...
  • 6 篇 xi'an university...
  • 6 篇 shaanxi key labo...
  • 6 篇 school of mathem...
  • 5 篇 shaanxi key labo...
  • 5 篇 moe key lab for ...
  • 5 篇 key lab of infor...
  • 5 篇 school of comput...
  • 5 篇 shaanxi key labo...
  • 5 篇 school of comput...
  • 5 篇 shaanxi key labo...

作者

  • 33 篇 meng deyu
  • 27 篇 yichuan wang
  • 25 篇 xinhong hei
  • 23 篇 wang yichuan
  • 18 篇 wang hui-ming
  • 18 篇 hei xinhong
  • 16 篇 haiyan jin
  • 14 篇 li wei
  • 13 篇 jin haiyan
  • 11 篇 hui-ming wang
  • 11 篇 wenjiang ji
  • 10 篇 wang lei
  • 10 篇 lei zhu
  • 10 篇 sun qindong
  • 10 篇 wei wei
  • 9 篇 bin wang
  • 9 篇 xu zongben
  • 9 篇 huang ke-wen
  • 9 篇 shen yulong
  • 8 篇 zhang lei

语言

  • 362 篇 英文
  • 18 篇 其他
  • 4 篇 中文
检索条件"机构=Network Computing and Security Key Lab of Shaanxi"
383 条 记 录,以下是81-90 订阅
排序:
A distributed multi-antenna space hopping transceiver technique
A distributed multi-antenna space hopping transceiver techni...
收藏 引用
2013 IEEE International Conference on Signal Processing, Communications and computing, ICSPCC 2013
作者: Zuo, Shalin Jia, Shuqiao Yin, Qinye MOE Key Lab for Intelligent Networks and Network Security School of Electronic and Information Engineering Xi'an Jiaotong University Xi'an 710049 Shaanxi China
To achieve secure wireless communications, since traditional solutions like frequency hopping spread spectrum (FHSS) technology not only are technically difficult to implement but also make the frequency resources sho... 详细信息
来源: 评论
0/1 space hopping transceiver technology for transmission security based on reverse training
0/1 space hopping transceiver technology for transmission se...
收藏 引用
2013 IEEE International Conference on Signal Processing, Communications and computing, ICSPCC 2013
作者: Dong, Liuqing Zhang, Jianguo Wang, Bo Zheng, Tongxing Yin, Qinye MOE Key Lab for Intelligent Networks and Network Security Institute of Electronic and Information Engineering Xi'an Jiaotong University Xi'an 710049 Shaanxi China
In order to guarantee wireless communication security, this paper puts forward a 0/1 space hopping transceiver technology based on reverse training. Starting from the influence of multipath on wireless communications,... 详细信息
来源: 评论
Exploration and practice on the construction of computer first-class major  16
Exploration and practice on the construction of computer fir...
收藏 引用
16th IEEE International Conference on Computer Science and Education, ICCSE 2021
作者: Li, Wei Hei, Xinhong Wang, Lei Wang, Xiaofan Xi'An University of Technology School of Computer Science and Engineering Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China Shaanxi University of Technology School of Mathematics and Computer Science Hanzhong China
This paper analyzes the current situation of the construction of the first-class computer major, and puts forward the construction scheme of the first-class computer major in local colleges based on the concept of out... 详细信息
来源: 评论
Channel Drop Out: A Simple Way to Prevent CNN from Overfitting in Motor Imagery Based BCI  7th
Channel Drop Out: A Simple Way to Prevent CNN from Overfitti...
收藏 引用
7th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2021
作者: Luo, Jing Wang, Yaojie Xu, Rong Liu, Guangming Wang, Xiaofan Gong, Yijing Shaanxi Key Laboratory for Network Computing and Security Technology School of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Province Institute of Water Resources and Electric Power Investigation and Design Xi’an China
With the development of deep learning, many motor imagery brain-computer interfaces based on convolutional neural networks (CNNs) show outstanding performances. However, the trial number of EEG in the training set is ... 详细信息
来源: 评论
A Novel Teaching Strategy Based on EduCoder Platform for C Programming Language  5th
A Novel Teaching Strategy Based on EduCoder Platform for C P...
收藏 引用
5th International Conference on Computer Science and Educational Informatization, CSEI 2023
作者: Li, Wei Hei, Xinhong Wang, Lei Wang, Yichuan School of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China School of Mathematics and Computer Science Shaanxi University of Technology Hanzhong China
Experimental teaching is an important part of the C programming language course, which aims to cultivate students’ Computational thinking ability, problem solving ability and programming ability. However, the existin... 详细信息
来源: 评论
Prediction of miRNA family based on class-incremental learning
Prediction of miRNA family based on class-incremental learni...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Liu, Yajun Qiu, Lulu Li, Aimin Fei, Rong Li, Junhuai Wu, Fang-Xiang Xi'an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China Division of Biomedical Engineering Department of Mechanical Engineering Department of Computer Science Saskatoon Canada
With the development of deep sequencing, recent studies indicate that a miRNA precursor can generate multiple miRNA isoforms (isomiRs). The family prediction of canonical miRNAs and isomiRs could provide a basis for m... 详细信息
来源: 评论
A random walk approach to selectional preferences based on preference ranking and propagation
A random walk approach to selectional preferences based on p...
收藏 引用
51st Annual Meeting of the Association for Computational Linguistics, ACL 2013
作者: Tian, Zhenhua Xiang, Hengheng Liu, Ziqi Zheng, Qinghua Ministry of Education Key Lab for Intelligent Networks and Network Security Department of Computer Science and Technology Xi'an Jiaotong University Xi'an Shaanxi 710049 China
This paper presents an unsupervised random walk approach to alleviate data sparsity for selectional preferences. Based on the measure of preferences between predicates and arguments, the model aggregates all the trans... 详细信息
来源: 评论
A Self-adaptive Single-Objective Multitasking Optimization Algorithm  1
收藏 引用
17th International Conference on Bio-Inspired computing: Theories and Applications, BIC-TA 2022
作者: Li, Xiaoyu Wang, Lei Jiang, Qiaoyong Li, Wei Wang, Bin The Key Laboratory of Network Computing and Security Technology of Shaanxi Province Xi’an University of Technology Xi’an710048 China The Key Laboratory of Industrial Automation of Shaanxi Province Shaanxi University of Technology Hanzhong723001 China School of Electronic and Information Engineering Ankang University Ankang725000 China
Evolutionary multitasking optimization algorithms have been presented for dealing with multiple tasks simultaneously. Many studies have proved that EMTOs often perform better than conventional single-task evolutionary... 详细信息
来源: 评论
A permission generation and configuration method based on Rules and FP-Growth algorithm
A permission generation and configuration method based on Ru...
收藏 引用
2021 International Conference on networking and network Applications, NaNA 2021
作者: Zhu, Lei Zhang, Ziheng Hei, Xinhong Wang, Yichuan Yang, Ziliang Hu, Feixiong He, Ping Xi'an University of technology School of Computer Science and Engineering Shaanxi Xi'an710048 China Shaanxi Key Laboratory for Network Computing and Security Technology Shaanxi Xi'an710048 China Shenzhen Tencent Computer System Co. Ltd Shenzhen518054 China
With the development of computer technology, lots of enterprises had begun to build a data platform, and the data and its services already paly the import role in enterprises. However, the guarantee the data security ... 详细信息
来源: 评论
Self-Anomaly-Detection Model Training via Initialized Meta Model
Self-Anomaly-Detection Model Training via Initialized Meta M...
收藏 引用
2022 International Conference on networking and network Applications, NaNA 2022
作者: Ma, Xindi Su, Cunzhu Ma, Jianfeng Jiang, Qi Xi, Ning Gao, Sheng Xie, Kang School of Cyber Engineering Xidian University Shaanxi China School of Information Central University of Finance and Economics Beijing China Key Lab of Information Network Security Ministry of Public Security Shanghai China
Anomaly detection has become a key challenge affecting the training accuracy of machine learning. Because the training data is usually collected from Internet, many noised samples will be captured and these samples ca... 详细信息
来源: 评论