咨询与建议

限定检索结果

文献类型

  • 264 篇 会议
  • 223 篇 期刊文献

馆藏范围

  • 487 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 330 篇 工学
    • 253 篇 计算机科学与技术...
    • 226 篇 软件工程
    • 79 篇 信息与通信工程
    • 38 篇 生物工程
    • 33 篇 电气工程
    • 30 篇 控制科学与工程
    • 29 篇 电子科学与技术(可...
    • 27 篇 网络空间安全
    • 15 篇 光学工程
    • 14 篇 机械工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 仪器科学与技术
    • 10 篇 化学工程与技术
    • 10 篇 交通运输工程
    • 9 篇 安全科学与工程
    • 8 篇 土木工程
  • 160 篇 理学
    • 99 篇 数学
    • 39 篇 生物学
    • 31 篇 统计学(可授理学、...
    • 26 篇 物理学
    • 15 篇 系统科学
    • 11 篇 化学
  • 80 篇 管理学
    • 40 篇 管理科学与工程(可...
    • 39 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 16 篇 法学
    • 10 篇 社会学
    • 7 篇 法学
  • 11 篇 医学
    • 9 篇 临床医学
    • 8 篇 基础医学(可授医学...
  • 9 篇 军事学
    • 8 篇 军队指挥学
  • 6 篇 经济学
  • 4 篇 农学
  • 3 篇 教育学
  • 2 篇 文学

主题

  • 22 篇 semantics
  • 16 篇 deep learning
  • 15 篇 feature extracti...
  • 12 篇 computational mo...
  • 12 篇 network security
  • 12 篇 training
  • 10 篇 authentication
  • 10 篇 predictive model...
  • 9 篇 neural networks
  • 9 篇 optimization
  • 9 篇 security
  • 9 篇 accuracy
  • 9 篇 cloud computing
  • 9 篇 data models
  • 9 篇 cryptography
  • 7 篇 image enhancemen...
  • 7 篇 generative adver...
  • 7 篇 image segmentati...
  • 7 篇 petri nets
  • 7 篇 blockchain

机构

  • 39 篇 school of comput...
  • 37 篇 shaanxi key labo...
  • 36 篇 school of comput...
  • 30 篇 shaanxi key labo...
  • 19 篇 school of comput...
  • 13 篇 key lab of infor...
  • 11 篇 xi'an university...
  • 11 篇 shaanxi key labo...
  • 10 篇 school of comput...
  • 9 篇 department of co...
  • 9 篇 school of comput...
  • 8 篇 shaanxi key labo...
  • 8 篇 tianjin key labo...
  • 7 篇 department of co...
  • 7 篇 shaanxi key labo...
  • 7 篇 haihe lab of ita...
  • 7 篇 school of comput...
  • 7 篇 shaanxi key labo...
  • 7 篇 key lab of netwo...
  • 7 篇 zhejiang lab

作者

  • 27 篇 yichuan wang
  • 27 篇 meng deyu
  • 26 篇 xinhong hei
  • 21 篇 wang yichuan
  • 18 篇 hei xinhong
  • 17 篇 shen yulong
  • 16 篇 liu jun
  • 16 篇 cao xiangyong
  • 15 篇 zheng qinghua
  • 12 篇 li wei
  • 12 篇 haiyan jin
  • 11 篇 jin haiyan
  • 11 篇 wenjiang ji
  • 10 篇 luo minnan
  • 10 篇 dong xuewen
  • 10 篇 lei zhu
  • 10 篇 wei wei
  • 9 篇 wang lei
  • 9 篇 xiaoxue liu
  • 9 篇 tan zuowen

语言

  • 445 篇 英文
  • 27 篇 其他
  • 16 篇 中文
检索条件"机构=Shaanxi Key Lab Network Computer and Security Technology"
487 条 记 录,以下是111-120 订阅
排序:
Covariance Matrix Adaptation Evolutionary Algorithm for Multi-task Optimization  15th
Covariance Matrix Adaptation Evolutionary Algorithm for Mult...
收藏 引用
15th International Conference on Bio-Inspired Computing: Theories and Applications, BIC-TA 2020
作者: Li, Wei Lei, Zhou Yuan, Junqing Luo, Haonan Jiang, Qiaoyong Li, Jinbo School of Computer Science and Engineering Xi’an University of Technology Xi’an710048 China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an710048 China
Multifactorial evolution is a relatively new evolutionary multitasking paradigm which aims to solve multiple optimization problems simultaneously. In order to make a further contribution to multifactorial optimization... 详细信息
来源: 评论
Enhanced Velocity-Driven Particle Swarm Optimization for Evolving Artificial Neural network  2021
Enhanced Velocity-Driven Particle Swarm Optimization for Evo...
收藏 引用
7th International Conference on Computing and Artificial Intelligence, ICCAI 2021
作者: Li, Wei Luo, Haonan Lei, Zhou Yuan, Junqing Dong, Wangshun Wang, Lei School of Computer Science and Engineering Xi'an University of Technology Xi'an710048 China Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an710048 China
Neural network has been considered as an effective tool for predicting chaotic time series and approximating functions. However, traditional methods for training neural networks have some shortcomings, such as slow co... 详细信息
来源: 评论
An Improved Cloud Particles Optimizer for Function Optimization  1
收藏 引用
2nd International Conference on Neural Computing for Advanced Applications, NCAA 2021
作者: Li, Wei Luo, Haonan Yuan, Junqing Lei, Zhou Wang, Lei School of Computer Science and Engineering Xi’an University of Technology Xi’an710048 China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an710048 China
Evolutionary algorithm is a popular and effective method in optimization field. As one of the optimization algorithms, cloud particles optimizer (CPEA) has shown to be effective in solving problems with different char... 详细信息
来源: 评论
HiCoCS: High Concurrency Cross-Sharding on Permissioned Blockchains
arXiv
收藏 引用
arXiv 2025年
作者: Yang, Lingxiao Dong, Xuewen Wan, Zhiguo Lu, Di Zhang, Yushu Shen, Yulong School of Computer Science and Technology Xidian University Engineering Research Center of Blockchain Technology Application and Evaluation Ministry of Education Shaanxi Key Laboratory of Blockchain and Secure Computing Xi’an710071 China Zhejiang Lab Zhejiang Hangzhou311121 China School of Computer Science and Technology Xidian University Shaanxi Key Laboratory of Network and System Security Xi’an710071 China College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Jiangsu Nanjing210016 China
As the foundation of the Web3 trust system, blockchain technology faces increasing demands for scalability. Sharding emerges as a promising solution, but it struggles to handle highly concurrent cross-shard transactio... 详细信息
来源: 评论
Rail Transit Event Extraction based on the Fusion of Semantic and Local Dependency Features
Rail Transit Event Extraction based on the Fusion of Semanti...
收藏 引用
IEEE International Conference on Big Knowledge (ICBK)
作者: Qiang Chen Haining Meng Yihao Bao Mingsong Yang Xinyu Tong Qin Zhao Muhammad Bilal Khan Xinhong Hei School of Computer Science and Engineering Xi’an University of Technology Xi’an China School of Computer Science and Engineering Shaanxi Key Laboratory of Network Computing and Security Technology Xi’an University of Technology Xi’an China School of Civil Engineering and Architecture Xi’an University of Technology Xi’an China
Event extraction in rail transit plays a vital role in all stages of design, construction, and final acceptance. Event extraction is a key part of building event logic graph (ELG). However, the difficulty in obtaining... 详细信息
来源: 评论
Riemannian Nearest-Regularized Subspace Classification for Polarimetric SAR images
arXiv
收藏 引用
arXiv 2022年
作者: Shi, Junfei Jin, Haiyan The Department of Computer Science and Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an University of Technology Xi'an China
As a representation learning method, nearest regularized subspace (NRS) algorithm is an effective tool to obtain both accuracy and speed for PolSAR image classification. However, existing NRS methods use the polarimet... 详细信息
来源: 评论
Prediction of exosomal piRNAs based on deep learning for sequence embedding with attention mechanism
Prediction of exosomal piRNAs based on deep learning for seq...
收藏 引用
2022 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2022
作者: Liu, Yajun Ding, Yulian Li, Aimin Fei, Rong Guo, Xie Wu, Fangxiang Xi'an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China University of Saskatchewan Division of Biomedical Engineering Saskatoon Canada Xi'an University of Technology Shaanxi Key Laboratory of Complex System Control and Intelligent Information Processing Xi'an China University of Saskatchewan Division of Biomedical Engineering Department of Computer Science Department of Mechanical Engineering Saskatoon Canada
PIWI-interacting RNAs (piRNAs) are a type of small non-coding RNAs which bind with the PIWI proteins to exert biological effects in various regulatory mechanisms. A growing amount of evidence reveals that exosomal piR... 详细信息
来源: 评论
A novel image security protection method based on DCT compression theory and hyper-chaotic mapping
A novel image security protection method based on DCT compre...
收藏 引用
2021 International Conference on Information technology and Mechanical Engineering, ITME 2021
作者: Xue, Xianglian Jin, Haiyan School of Computer Science and Engineering Xi’an University of Technology Shaanxi Xi’an710077 China Shaanxi University of Chinese Medicine Shaanxi Xianyang712046 China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an University of Technology Shaanxi Xi’an710077 China
This paper studies the current situation of image compression encryption and analyzes the influence of low frequency (DC coefficient) and high frequency (AC coefficient) on image structure in DCT transformation. Based... 详细信息
来源: 评论
Domain Connection based Unsupervised Domain Adaptation for Semantic Segmentation
Domain Connection based Unsupervised Domain Adaptation for S...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Chunze Yang Xiaodong Zhang Peiyuan Tang Haoran Yuan Haojie Xin Zijiang James Yang School of Computer Science and Technology Xi ’an Jiaotong University Xi’an China School of Computer Science and Technology Shaanxi Key Laboratory of Network and System Security Xidian University Xi’an China Technology R&D Department Synkrotron Inc. Hefei China School of Computer Science and Technology University of Science and Technology of China Hefei China
Collecting and annotating data for semantic segmentation can end up costing a lot of time and energy. Unsupervised Domain Adaptation (UDA) for semantic segmentation allows models trained on certain source domain data ... 详细信息
来源: 评论
Hey! You Photographed My Screen without Approved: A Practical Screen Content Protection Scheme Based on Visual Cryptography
Hey! You Photographed My Screen without Approved: A Practica...
收藏 引用
2022 International Conference on networking and network Applications, NaNA 2022
作者: Liu, Kui Wang, Bin Shi, Ziwei Chen, Jiadong Zhang, Zhiwei School of Computer Science and Technology Xidian University Shaanxi Xi’an710071 China Network and Information Security Laboratory Hangzhou Hikvision Digital Technology Co. LTD. Hangzhou China Zhejiang Key Laboratory of Multi-dimensional Perception Technology Application and Cybersecurity Hangzhou310053 China
Nowadays , with the continuous development of digital media, electronic screens have become the most direct tool for people to interact with information. Various styles of electronic screens provide vivid information ... 详细信息
来源: 评论