咨询与建议

限定检索结果

文献类型

  • 66 篇 会议
  • 59 篇 期刊文献

馆藏范围

  • 125 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 86 篇 工学
    • 68 篇 计算机科学与技术...
    • 53 篇 软件工程
    • 26 篇 信息与通信工程
    • 16 篇 生物工程
    • 11 篇 生物医学工程(可授...
    • 10 篇 控制科学与工程
    • 9 篇 光学工程
    • 9 篇 电子科学与技术(可...
    • 8 篇 机械工程
    • 8 篇 电气工程
    • 7 篇 网络空间安全
    • 3 篇 仪器科学与技术
    • 3 篇 动力工程及工程热...
    • 3 篇 建筑学
  • 39 篇 理学
    • 20 篇 生物学
    • 16 篇 数学
    • 9 篇 物理学
    • 6 篇 统计学(可授理学、...
    • 4 篇 系统科学
    • 2 篇 化学
  • 21 篇 管理学
    • 12 篇 管理科学与工程(可...
    • 8 篇 图书情报与档案管...
    • 5 篇 工商管理
  • 7 篇 医学
    • 5 篇 基础医学(可授医学...
    • 5 篇 临床医学
    • 5 篇 公共卫生与预防医...
    • 3 篇 药学(可授医学、理...
  • 5 篇 法学
    • 4 篇 社会学
  • 4 篇 农学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 教育学
    • 2 篇 教育学
  • 2 篇 军事学

主题

  • 6 篇 image segmentati...
  • 5 篇 cloud computing
  • 3 篇 reinforcement le...
  • 3 篇 public key crypt...
  • 3 篇 deep learning
  • 3 篇 anomaly detectio...
  • 3 篇 convolution
  • 3 篇 authentication
  • 3 篇 genetic algorith...
  • 3 篇 feature extracti...
  • 3 篇 steganography
  • 3 篇 encryption
  • 3 篇 privacy
  • 2 篇 internet of thin...
  • 2 篇 aggregates
  • 2 篇 outsourcing
  • 2 篇 simulation
  • 2 篇 linearization
  • 2 篇 deep neural netw...
  • 2 篇 task analysis

机构

  • 48 篇 network and data...
  • 18 篇 network and data...
  • 9 篇 school of comput...
  • 9 篇 school of inform...
  • 8 篇 network and data...
  • 7 篇 university of el...
  • 4 篇 network and data...
  • 4 篇 shenyang aerospa...
  • 4 篇 hebei provincial...
  • 4 篇 yancheng teacher...
  • 4 篇 key lab of netwo...
  • 4 篇 nanjing tech uni...
  • 4 篇 university of el...
  • 4 篇 network and data...
  • 4 篇 yibin great tech...
  • 3 篇 college of compu...
  • 3 篇 school of inform...
  • 3 篇 school of inform...
  • 3 篇 school of physic...
  • 3 篇 institute of ele...

作者

  • 16 篇 qin zhen
  • 14 篇 qin zhiguang
  • 12 篇 zhen qin
  • 10 篇 ding yi
  • 9 篇 yi ding
  • 7 篇 zhu hui
  • 6 篇 cao mingsheng
  • 5 篇 yang zhao
  • 5 篇 chen dajiang
  • 5 篇 ejiyi chukwuebuk...
  • 5 篇 nie xuyun
  • 5 篇 erqiang zhou
  • 5 篇 li hui
  • 5 篇 liu mengjuan
  • 4 篇 mingsheng cao
  • 4 篇 zhiguang qin
  • 3 篇 yang hao
  • 3 篇 mo hai
  • 3 篇 deng erqiang
  • 3 篇 zhang hanwen

语言

  • 117 篇 英文
  • 5 篇 中文
  • 4 篇 其他
检索条件"机构=Network and Data Security Key Lab of Sichuan Province"
125 条 记 录,以下是1-10 订阅
排序:
CrossLinkNet: An Explainable and Trustworthy AI Framework for Whole-Slide Images Segmentation
收藏 引用
Computers, Materials & Continua 2024年 第6期79卷 4703-4724页
作者: Peng Xiao Qi Zhong Jingxue Chen Dongyuan Wu Zhen Qin Erqiang Zhou Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of ChinaChengdu610054China Faculty of Data Science City University of MacaoMacao999078China
In the intelligent medical diagnosis area,Artificial Intelligence(AI)’s trustworthiness,reliability,and interpretability are critical,especially in cancer *** neural networks,while excellent at processing natural ima... 详细信息
来源: 评论
Research on the mechanical fault diagnosis method based on sound signal and IEMD-DDCNN
收藏 引用
International Journal of Intelligent Computing and Cybernetics 2023年 第3期16卷 629-646页
作者: Haoning Pu Zhan Wen Xiulan Sun Lemei Han Yanhe Na Hantao Liu Wenzao Li Chengdu University of Information Technology ChengduChina Education Department of Sichuan Province Education Informatization and Big Data CenterChengduChina Network and Data Security Key Laboratory of Sichuan Province UESTCChengduChina
Purpose–The purpose of this paper is to provide a shorter time cost,high-accuracy fault diagnosis method for water *** pumps are widely used in industrial equipment and their fault diagnosis is gaining increasing ***... 详细信息
来源: 评论
SSpose: Self-Supervised Spatial-Aware Model for Human Pose Estimation
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第11期5卷 5403-5417页
作者: Yu, Linfang Qin, Zhen Xu, Liqun Qin, Zhiguang Choo, Kim-Kwang Raymond University of Electronic Science and Technology of China Network and Data Security Key Laboratory of Sichuan Province Chengdu610054 China Industrial Research Institute Chengdu610213 China University of Electronic Science and Technology of China Network and Data Security Key Laboratory of Sichuan Province School of Information and Software Engineering Chengdu610054 China Industrial Research Institute Chengdu610213 China University of Texas at San Antonio Department of Information Systems and Cyber Security San AntonioTX78249 United States
Human pose estimation (HPE) relies on the anatomical relationships among different body parts to locate keypoints. Despite the significant progress achieved by convolutional neural networks (CNN)-based models in HPE, ... 详细信息
来源: 评论
Heterogeneous Fault-Tolerant Aggregate Signcryption with Equality Test for Vehicular Sensor networks
收藏 引用
Computer Modeling in Engineering & Sciences 2023年 第10期137卷 555-575页
作者: Yang Zhao Jingmin An Hao Li Saru Kumari Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of ChinaChengdu610054China Department of Mathematics Chaudhary Charan Singh UniversityMeerut250004India
The vehicular sensor network (VSN) is an important part of intelligent transportation, which is used for real-timedetection and operation control of vehicles and real-time transmission of data and information. In the ... 详细信息
来源: 评论
A Linked List Encryption Scheme for Image Steganography without Embedding
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第10期141卷 331-352页
作者: Pengbiao Zhao Qi Zhong Jingxue Chen Xiaopei Wang Zhen Qin Erqiang Zhou Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of ChinaChengdu610054China Faculty of Data Science City University of MacaoMacao999078China Department of Computer Science and Engineering University of CaliforniaRiversideCA 92521USA
Information steganography has received more and more attention from scholars nowadays,especially in the area of image steganography,which uses image content to transmit information and makes the existence of secret in... 详细信息
来源: 评论
Promoting Open-Domain Dialogue Generation Through Learning Pattern Information Between Contexts and Responses  12th
Promoting Open-Domain Dialogue Generation Through Learning P...
收藏 引用
12th National CCF Conference on Natural Language Processing and Chinese Computing, NLPCC 2023
作者: Liu, Mengjuan Liu, Chenyang Yang, Yunfan Liu, Jiang Jing, Mohan Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Chengdu China
Recently, utilizing deep neural networks to build the open-domain dialogue models has become a hot topic. However, the responses generated by these models suffer from many problems such as responses not being contextu... 详细信息
来源: 评论
An enhanced genetic algorithm for computation task offloading in MEC scenario
收藏 引用
International Journal of Wireless and Mobile Computing 2023年 第2期25卷 118-127页
作者: Zhao, Jiacheng Li, Wenzao Liu, Hantao Yu, Peizhen Li, Hanyun Wen, Zhan School of Communication Engineering Chengdu University of Information Technology Sichuan Chengdu China Chengdu University of Information Technology Sichuan Chengdu China Network and Data Security Key Lab of Sichuan Pro. University of Electronic Science and Technology of China Sichuan Chengdu China Educational Informationisation and Big Data Centre Education Department of Sichuan Province Sichuan Chengdu China
The explosive growth of Internet of Things (IoT) and 5G communication technologies has driven the increasing computing demands for wireless devices. Mobile edge computing in the 5G scenario is a promising solution for... 详细信息
来源: 评论
Temporal Refinement Graph Convolutional network for Skeleton-Based Action Recognition
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第4期5卷 1586-1598页
作者: Zhuang, Tianming Qin, Zhen Ding, Yi Deng, Fuhu Chen, Leduo Qin, Zhiguang Raymond Choo, Kim-Kwang University of Electronic Science and Technology of China Network and Data Security Key Laboratory of Sichuan Province Chengdu Sichuan610054 China University of Electronic Science and Technology of China School of Information and Software Engineering Chengdu Sichuan610054 China School of Advanced Technology Suzhou Jiangsu215123 China University of Texas at San Antonio Department of Information Systems and Cyber Security San AntonioTX78249 United States
Human skeleton data, which has served in the aspect of human activity recognition, ought to be the most representative biometric characteristics due to its intuitivity and visuality. The state-of-the-art approaches ma... 详细信息
来源: 评论
An Efficient and Provably Secure SM2 key-Insulated Signature Scheme for Industrial Internet of Things
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第1期138卷 903-915页
作者: Senshan Ouyang Xiang Liu Lei Liu Shangchao Wang Baichuan Shao Yang Zhao School of Mechanical Engineering Northwestern Polytechnical UniversityXi’anChina Department of Process and Information Technology Chengdu Aircraft Industrial(Group)Co.Ltd.ChengduChina School of Information and Software Engineering The Network and Data Security Key Laboratory of Sichuan ProvinceUniversity of Electronic Science and Technology of ChinaChengduChina
With the continuous expansion of the Industrial Internet of Things(IIoT),more andmore organisations are placing large amounts of data in the cloud to reduce ***,the channel between cloud servers and smart equipment is... 详细信息
来源: 评论
MIA-UNet:Multi-Scale Iterative Aggregation U-network for Retinal Vessel Segmentation
收藏 引用
Computer Modeling in Engineering & Sciences 2021年 第11期129卷 805-828页
作者: Linfang Yu Zhen Qin Yi Ding Zhiguang Qin Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of ChinaChengdu610054China
As an important part of the new generation of information technology,the Internet of Things(IoT)has been widely concerned and regarded as an enabling technology of the next generation of health care *** fundus photogr... 详细信息
来源: 评论