咨询与建议

限定检索结果

文献类型

  • 577 篇 会议
  • 402 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 980 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 626 篇 工学
    • 474 篇 计算机科学与技术...
    • 389 篇 软件工程
    • 158 篇 信息与通信工程
    • 122 篇 电气工程
    • 60 篇 网络空间安全
    • 58 篇 电子科学与技术(可...
    • 52 篇 控制科学与工程
    • 52 篇 生物工程
    • 28 篇 生物医学工程(可授...
    • 28 篇 安全科学与工程
    • 26 篇 机械工程
    • 23 篇 仪器科学与技术
    • 21 篇 光学工程
    • 17 篇 交通运输工程
    • 16 篇 动力工程及工程热...
    • 16 篇 建筑学
  • 270 篇 理学
    • 167 篇 数学
    • 55 篇 生物学
    • 50 篇 统计学(可授理学、...
    • 46 篇 物理学
    • 28 篇 系统科学
    • 15 篇 化学
  • 162 篇 管理学
    • 92 篇 管理科学与工程(可...
    • 76 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 39 篇 法学
    • 23 篇 法学
    • 17 篇 社会学
  • 21 篇 医学
    • 18 篇 临床医学
    • 16 篇 基础医学(可授医学...
  • 15 篇 经济学
    • 15 篇 应用经济学
  • 14 篇 军事学
  • 6 篇 农学
  • 3 篇 文学
  • 2 篇 教育学

主题

  • 38 篇 feature extracti...
  • 35 篇 semantics
  • 34 篇 cryptography
  • 28 篇 protocols
  • 27 篇 computational mo...
  • 26 篇 security
  • 26 篇 accuracy
  • 26 篇 cloud computing
  • 24 篇 privacy
  • 23 篇 authentication
  • 20 篇 deep learning
  • 20 篇 network security
  • 19 篇 encryption
  • 19 篇 computer network...
  • 18 篇 training
  • 17 篇 data privacy
  • 17 篇 data models
  • 16 篇 neural networks
  • 15 篇 servers
  • 15 篇 federated learni...

机构

  • 64 篇 shandong provinc...
  • 64 篇 key laboratory o...
  • 45 篇 shandong enginee...
  • 40 篇 school of comput...
  • 37 篇 shaanxi key labo...
  • 36 篇 school of comput...
  • 30 篇 shaanxi key labo...
  • 29 篇 school of cyber ...
  • 27 篇 institute of inf...
  • 22 篇 state key labora...
  • 18 篇 national enginee...
  • 16 篇 shandong fundame...
  • 15 篇 school of comput...
  • 15 篇 college of compu...
  • 15 篇 school of comput...
  • 13 篇 key laboratory o...
  • 13 篇 national compute...
  • 12 篇 shaanxi key labo...
  • 11 篇 shandong enginee...
  • 11 篇 xi'an university...

作者

  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 21 篇 wang yichuan
  • 19 篇 baojiang cui
  • 17 篇 hei xinhong
  • 13 篇 li wei
  • 13 篇 yang xiaoyuan
  • 12 篇 jianfeng ma
  • 12 篇 xu li
  • 11 篇 jing zhao
  • 11 篇 fu chong
  • 11 篇 wei wei
  • 10 篇 zhang yuqing
  • 10 篇 chen zhong
  • 10 篇 xiaoxue liu
  • 10 篇 li qi
  • 10 篇 lei zhu
  • 9 篇 wang lei
  • 9 篇 liu jun
  • 9 篇 shen yulong

语言

  • 902 篇 英文
  • 50 篇 其他
  • 30 篇 中文
检索条件"机构=Network Security Laboratory Computer Engineering"
980 条 记 录,以下是161-170 订阅
排序:
Semantic-Aware Prompt Learning for Multimodal Sarcasm Detection
Semantic-Aware Prompt Learning for Multimodal Sarcasm Detect...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Wang, Guangjin Wang, Bao Xu, Fuyong Zhu, Zhenfang Wang, Peipei Wang, Ru Liu, Peiyu School of Information Science and Engineering Shandong Normal University Jinan China School of Information Science and Electrical Engineering Shandong Jiao Tong University Jinan China Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
Multimodal sarcasm detection aims to identify whether utterances express sarcastic intentions contrary to their literal meaning based on multimodal information. However, existing methods fail to explore the model'... 详细信息
来源: 评论
PFD-Net: Pyramid Fourier Deformable network for medical image segmentation
收藏 引用
computers in Biology and Medicine 2024年 172卷 108302-108302页
作者: Yang, Chaorong Zhang, Zhaohui College of Computer and Cyber Security Hebei Normal University Shijiazhuang050024 China Hebei Provincial Engineering Research Center for Supply Chain Big Data Analytics & Data Security Shijiazhuang050024 China Hebei Provincial Key Laboratory of Network & Information Security Hebei Normal University Shijiazhuang050024 China
Medical image segmentation is crucial for accurately locating lesion regions and assisting doctors in diagnosis. However, most existing methods fail to effectively utilize both local details and global semantic inform... 详细信息
来源: 评论
Demand Response Scheme: Achieving Sustainability in Distributed Data Processing  9
Demand Response Scheme: Achieving Sustainability in Distribu...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Zhai, Xueying Peng, Yunfeng Guo, Xiuping Zhang, Liang Zhang, Wei University of Science and Technology Beijing School of Computer and Communication Engineering Beijing China Beijing University of Posts and Telecommunications School of Economics and Management Beijing China Guizhou Institute of Technology Guizhou Key Laboratory of Electric Power Big Data Guizhou China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China
The rapid development of Internet of Things (IoT) technology has driven the intelligent transformation of various industries, including manufacturing, agriculture, and healthcare, etc., significantly enhancing their m... 详细信息
来源: 评论
Radon CLF:A Novel Approach for Skew Detection Using Radon Transform
收藏 引用
computer Systems Science & engineering 2023年 第10期47卷 675-697页
作者: Yuhang Chen Mahdi Bahaghighat Aghil Esmaeili Kelishomi Jingyi Du Laboratory for Control Engineering Xi’an University of Science&TechnologyXi’anChina Computer Engineering Department Imam Khomeini International UniversityQazvinIran MOE Key Laboratory for Intelligent and Network Security Xi’an Jiaotong UniversityXi’anChina
In the digital world,a wide range of handwritten and printed documents should be converted to digital format using a variety of tools,including mobile phones and ***,this is not an optimal procedure,and the entire doc... 详细信息
来源: 评论
LAGNet: A Hybrid Deep Learning Model for Automatic Modulation Recognition
LAGNet: A Hybrid Deep Learning Model for Automatic Modulatio...
收藏 引用
IEEE Conference on Wireless Communications and networking
作者: Zhuo Li Guangyue Lu Yuxin Li Hao Zhou Huan Li Shaanxi Key Laboratory of Information Communication Network and Security Xi'an University of Posts and Telecommunications Xi'an China School of Computer Science and Cyber Engineering Guangzhou University Guangzhou China
Automatic Modulation Recognition (AMR) is becoming increasingly crucial in the industrial internet, and it ensures more reliable communication for devices within this vast and intricate network. Although recent applic... 详细信息
来源: 评论
FDSC-YOLOv8:Advancements in Automated Crack Identification for Enhanced Safety in Underground engineering
收藏 引用
computer Modeling in engineering & Sciences 2024年 第9期140卷 3035-3049页
作者: Rui Wang Zhihui Liu Hongdi Liu Baozhong Su Chuanyi Ma Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science Center(National Supercomputer Center in Jinan)Qilu University of Technology(Shandong Academy of Sciences)Jinan250353China School of Qilu Transportation Shandong UniversityJinan250100China Geotechnical and Structural Engineering Center Shandong UniversityJinan250061China Shandong Lairong High-Speed Railway Co. Ltd.Weihai264200China Shandong High-Speed Group Co. Ltd.Jinan250014China
In underground engineering,the detection of structural cracks on tunnel surfaces stands as a pivotal task in ensuring the health and reliability of tunnel ***,the dim and dusty environment inherent to under-ground eng... 详细信息
来源: 评论
Smart Contract-Based Auditing of Edge Data for Vehicular networks
Smart Contract-Based Auditing of Edge Data for Vehicular Net...
收藏 引用
IEEE International Conference on Trust, security and Privacy in Computing and Communications (TrustCom)
作者: Yu Zhao Yangguang Tian Chunbo Wang Xiaoqiang Di Hui Qi Jilin Key Laboratory of Network and Information Security Changchun University of Science and Technology Changchun China School of Computer Science and Electronic Engineering University of Surrey Guildford United Kingdom
With the development of vehicular networks and cloud-edge collaborative technologies, a large amount of vehicle data is collected at edge nodes (Edge Node, EN) for analysis and decision-making. However, edge data face... 详细信息
来源: 评论
Membership Inference Attacks via Dynamic Adversarial Perturbations Reduction
Membership Inference Attacks via Dynamic Adversarial Perturb...
收藏 引用
IEEE International Conference on Trust, security and Privacy in Computing and Communications (TrustCom)
作者: Zehua Ding Youliang Tian Guorong Wang Jinbo Xiong Jianfeng Ma State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang China Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fujian Normal University Fuzhou China School of Cyber Engineering Xidian University Xian China
Existing membership inference attacks (MIAs) based on adversarial attacks typically introduce excessively large adversarial perturbations to change the model predictions. However, such methods are not only likely to o... 详细信息
来源: 评论
A Trusted Privacy-Preserving Model for Cross-Chain Transactions Based on zk_SNARKs
A Trusted Privacy-Preserving Model for Cross-Chain Transacti...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Yichuan Wang Jianhuan Tie Xinhong Hei Li Zhao Xiaohui Zhang School of Computer Science and Engineering Xi'an University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technolog Xi'an China
Currently, the privacy protection technology of blockchain is not mature enough, such as user data leakage and lack of anonymity exist, and these problems are especially serious when conducting cross-chain transaction...
来源: 评论
Evolutionary Multitasking Based on Team Learning Strategy  6
Evolutionary Multitasking Based on Team Learning Strategy
收藏 引用
6th Asian Conference on Artificial Intelligence Technology, ACAIT 2022
作者: Li, Wei Xu, Qingzheng Gao, Xinyu Wang, Lei Xi'an University of Technology School of Computer Science and Engineering Xi'an China National University of Defense Technology College of Information and Communication Wuhan China Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China
Multi-factorial optimization (MFO) is a popular optimization mechanism recently, which aims to optimize multiple tasks in a single run. Generally, the multi-factorial optimization algorithm uses the random learning st... 详细信息
来源: 评论