咨询与建议

限定检索结果

文献类型

  • 3,359 篇 会议
  • 3,125 篇 期刊文献
  • 34 册 图书

馆藏范围

  • 6,518 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,319 篇 工学
    • 2,552 篇 计算机科学与技术...
    • 2,062 篇 软件工程
    • 854 篇 信息与通信工程
    • 584 篇 控制科学与工程
    • 520 篇 电气工程
    • 438 篇 电子科学与技术(可...
    • 406 篇 化学工程与技术
    • 386 篇 生物工程
    • 381 篇 机械工程
    • 286 篇 动力工程及工程热...
    • 285 篇 生物医学工程(可授...
    • 280 篇 光学工程
    • 258 篇 材料科学与工程(可...
    • 198 篇 仪器科学与技术
    • 150 篇 土木工程
    • 130 篇 力学(可授工学、理...
    • 127 篇 建筑学
    • 125 篇 矿业工程
    • 121 篇 安全科学与工程
  • 2,643 篇 理学
    • 1,278 篇 数学
    • 925 篇 物理学
    • 469 篇 生物学
    • 366 篇 统计学(可授理学、...
    • 353 篇 化学
    • 257 篇 系统科学
  • 1,063 篇 管理学
    • 652 篇 管理科学与工程(可...
    • 455 篇 图书情报与档案管...
    • 262 篇 工商管理
  • 262 篇 医学
    • 218 篇 临床医学
    • 191 篇 基础医学(可授医学...
  • 119 篇 法学
  • 104 篇 经济学
  • 90 篇 教育学
  • 85 篇 农学
  • 18 篇 军事学
  • 17 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 133 篇 feature extracti...
  • 128 篇 computer science
  • 101 篇 training
  • 98 篇 accuracy
  • 92 篇 computational mo...
  • 86 篇 deep learning
  • 78 篇 educational inst...
  • 75 篇 data mining
  • 68 篇 optimization
  • 64 篇 neural networks
  • 61 篇 image segmentati...
  • 60 篇 machine learning
  • 59 篇 algorithm design...
  • 56 篇 face recognition
  • 55 篇 monitoring
  • 54 篇 hadrons
  • 53 篇 clustering algor...
  • 53 篇 robustness
  • 52 篇 semantics
  • 51 篇 wireless sensor ...

机构

  • 334 篇 department of ph...
  • 305 篇 school of comput...
  • 275 篇 cavendish labora...
  • 271 篇 iccub universita...
  • 246 篇 horia hulubei na...
  • 242 篇 h.h. wills physi...
  • 239 篇 university of ch...
  • 234 篇 infn sezione di ...
  • 231 篇 van swinderen in...
  • 229 篇 school of physic...
  • 219 篇 yandex school of...
  • 214 篇 massachusetts in...
  • 208 篇 department of ph...
  • 197 篇 national researc...
  • 197 篇 infn sezione di ...
  • 196 篇 national researc...
  • 194 篇 warsaw
  • 194 篇 university of ci...
  • 193 篇 oliver lodge lab...
  • 190 篇 university of ma...

作者

  • 197 篇 barter w.
  • 194 篇 brundu d.
  • 194 篇 bellee v.
  • 190 篇 beiter a.
  • 176 篇 blake t.
  • 174 篇 bowcock t.j.v.
  • 170 篇 borsato m.
  • 170 篇 betancourt c.
  • 166 篇 amato s.
  • 162 篇 casse g.
  • 162 篇 boettcher t.
  • 159 篇 baker s.
  • 158 篇 baryshnikov f.
  • 152 篇 byczynski w.
  • 151 篇 bediaga i.
  • 148 篇 bizzeti a.
  • 145 篇 braun s.
  • 144 篇 borisyak m.
  • 143 篇 bencivenni g.
  • 139 篇 bjørn m.

语言

  • 6,060 篇 英文
  • 302 篇 其他
  • 154 篇 中文
  • 1 篇 日文
检索条件"机构=School of Computer Science and Technology Henan Polytechnic University"
6518 条 记 录,以下是1-10 订阅
排序:
Personalized trajectory data perturbation algorithm based on quadtree indexing
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2024年 第4期31卷 17-27页
作者: Liu Kun Jin Junhui Wang Hui Shen Zihao Liu Peiqian School of Software Henan Polytechnic UniversityJiaozuo 454000China School of Computer Science and Technology Henan Polytechnic UniversityJiaozuo 454000China
To solve the privacy leakage problem of truck trajectories in intelligent logistics,this paper proposes a quadtreebased personalized joint location perturbation(QPJLP)algorithm using location generalization and local ... 详细信息
来源: 评论
Gas Emission Prediction Based on Secondary Decomposition and MSCSO-WLSSVM
Journal of Network Intelligence
收藏 引用
Journal of Network Intelligence 2024年 第3期9卷 1405-1426页
作者: Zhao, Xue-Han An, Wei-Peng Qiao, Wei-Hao Lv, Chang-Zhou School of Computer Science and Technology Henan Polytechnic University Jiaozuo454000 China School of Software Henan Polytechnic University Jiaozuo454000 China
This paper proposes a combined prediction model based on secondary decomposition and MSCSO-WLSSVM to enhance methane gas emission prediction accuracy. Firstly, the complete ensemble empirical mode decomposition with a... 详细信息
来源: 评论
Blockchain-based IVPPA Scheme for Pseudonym Privacy Protection in Internet of Vehicles
Journal of Network Intelligence
收藏 引用
Journal of Network Intelligence 2024年 第2期9卷 1260-1277页
作者: Wang, Hui Zhang, Fangyu Shen, Zihao Liu, Peiqian Liu, Kun School of Software Henan Polytechnic University Jiaozuo454000 China School of Computer Science and Technology Henan Polytechnic University Jiaozuo454000 China
Existing Vehicular Ad-hoc Networks (VANETs), while enabling vehicles to communicate with each other, share data, and connect to external networks, also face a large number of data security challenges, such as data lea... 详细信息
来源: 评论
WSN Data Fusion Algorithm Based on Radial Cluster and Elephant Swarm Neural Networks
Journal of Network Intelligence
收藏 引用
Journal of Network Intelligence 2024年 第4期9卷 2137-2150页
作者: Liu, Jia-Wei An, Wei-Peng School of Computer Science and Technology Henan Polytechnic University Jiaozuo454000 China School of Software Henan Polytechnic University Jiaozuo454000 China
To minimize the propagation of redundant data in wireless sensor networks, conserve energy, and extend network lifespan, we propose an algorithm (R-IEHOBP) that combines radial clustering and an elephant swarm neural ... 详细信息
来源: 评论
Weighted Attribute Based Conditional Proxy Re-Encryption in the Cloud
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 1399-1414页
作者: Xixi Yan Jing Zhang Pengyu Cheng Henan Key Laboratory of Network Cryptography Technology Network Information Security and Cryptography LaboratorySchool of SoftwareHenan Polytechnic UniversityJiaozuo454003China School of Computer Science and Technology Henan Polytechnic UniversityJiaozuo454000China
Conditional proxy re-encryption(CPRE)is an effective cryptographic primitive language that enhances the access control mechanism and makes the delegation of decryption permissions more granular,but most of the attribu... 详细信息
来源: 评论
A Differential Privacy Budget Allocation Method Combining Privacy Security Level
收藏 引用
Journal of Communications and Information Networks 2023年 第1期8卷 90-98页
作者: Zihao Shen Shuhan He Hui Wang Peiqian Liu Kun Liu Fangfang Lian School of Computer Science and Technology Henan Polytechnic UniversityJiaozuo 454000China
Trajectory privacy protection schemes based on suppression strategies rarely take geospatial constraints into account,which is made more likely for an attacker to determine the user’s true sensitive location and *** ... 详细信息
来源: 评论
Enhanced secure medical data sharing with traceable and direct revocation
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2023年 第1期30卷 66-79页
作者: Peng Weiping Cui Shuang Song Cheng Han Ning School of Computer Science and Technology Henan Polytechnic UniversityJiaozuo 454003China
Sharing of the electronic medical records among different hospitals raises serious concern of the leakage of individual privacy for the adoption of the semi trustworthiness of the medical cloud *** tracking and revoca... 详细信息
来源: 评论
Semisymmetric Graphs of Order 2p^(3)with Valency p^(2)
收藏 引用
Algebra Colloquium 2024年 第2期31卷 199-208页
作者: Li Wang Songtao Guo Genghua Fan School of Mathematics and Information Science Henan Polytechnic University JiaozuoHenan 454000China School of Mathematics and Statistics Henan University of Science and Technology LuoyangHenan 471023China 不详
A simple undirected regular graph is said to be semisymmetric if it is edge-transitive but not *** a semisymmetric graphΓof order 2p^(3),p a prime,it is well known thatΓis bipartite with two biparts having equal ***... 详细信息
来源: 评论
Density Peaking Clustering Algorithm Based on Improved Tuna Swarm Optimization
Journal of Network Intelligence
收藏 引用
Journal of Network Intelligence 2024年 第1期9卷 126-141页
作者: Zhang, Hang Liu, Yong-Li Chao, Hao College of Computer Science and Technology Henan Polytechnic University Jiaozuo454000 China
The density peak clustering algorithm shows good clustering performance by rapidly determining each cluster division with a high-density region as the kernel. However, the cut-off distance (dc) as the only parameter o... 详细信息
来源: 评论
Location Privacy Desensitization Algorithm Based on Multi-attribute Decision Model
Journal of Network Intelligence
收藏 引用
Journal of Network Intelligence 2023年 第4期8卷 1164-1182页
作者: Shen, Zihao Yang, Xin Wang, Hui Liu, Peiqian Liu, Kun School of Computer Science and Technology Henan Polytechnic University Jiaozuo 454000 China School of Software Henan Polytechnic University Jiaozuo 454000 China
Traditional methods of building secure anonymity sets using location privacy desensitization techniques commonly suffer from low dummy location differentiation and vulnerable to background knowledge attacks. To addres... 详细信息
来源: 评论