咨询与建议

限定检索结果

文献类型

  • 264 篇 会议
  • 223 篇 期刊文献

馆藏范围

  • 487 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 330 篇 工学
    • 253 篇 计算机科学与技术...
    • 226 篇 软件工程
    • 79 篇 信息与通信工程
    • 38 篇 生物工程
    • 33 篇 电气工程
    • 30 篇 控制科学与工程
    • 29 篇 电子科学与技术(可...
    • 27 篇 网络空间安全
    • 15 篇 光学工程
    • 14 篇 机械工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 仪器科学与技术
    • 10 篇 化学工程与技术
    • 10 篇 交通运输工程
    • 9 篇 安全科学与工程
    • 8 篇 土木工程
  • 160 篇 理学
    • 99 篇 数学
    • 39 篇 生物学
    • 31 篇 统计学(可授理学、...
    • 26 篇 物理学
    • 15 篇 系统科学
    • 11 篇 化学
  • 80 篇 管理学
    • 40 篇 管理科学与工程(可...
    • 39 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 16 篇 法学
    • 10 篇 社会学
    • 7 篇 法学
  • 11 篇 医学
    • 9 篇 临床医学
    • 8 篇 基础医学(可授医学...
  • 9 篇 军事学
    • 8 篇 军队指挥学
  • 6 篇 经济学
  • 4 篇 农学
  • 3 篇 教育学
  • 2 篇 文学

主题

  • 22 篇 semantics
  • 16 篇 deep learning
  • 15 篇 feature extracti...
  • 12 篇 computational mo...
  • 12 篇 network security
  • 12 篇 training
  • 10 篇 authentication
  • 10 篇 predictive model...
  • 9 篇 neural networks
  • 9 篇 optimization
  • 9 篇 security
  • 9 篇 accuracy
  • 9 篇 cloud computing
  • 9 篇 data models
  • 9 篇 cryptography
  • 7 篇 image enhancemen...
  • 7 篇 generative adver...
  • 7 篇 image segmentati...
  • 7 篇 petri nets
  • 7 篇 blockchain

机构

  • 39 篇 school of comput...
  • 37 篇 shaanxi key labo...
  • 36 篇 school of comput...
  • 30 篇 shaanxi key labo...
  • 19 篇 school of comput...
  • 13 篇 key lab of infor...
  • 11 篇 xi'an university...
  • 11 篇 shaanxi key labo...
  • 10 篇 school of comput...
  • 9 篇 department of co...
  • 9 篇 school of comput...
  • 8 篇 shaanxi key labo...
  • 8 篇 tianjin key labo...
  • 7 篇 department of co...
  • 7 篇 shaanxi key labo...
  • 7 篇 haihe lab of ita...
  • 7 篇 school of comput...
  • 7 篇 shaanxi key labo...
  • 7 篇 key lab of netwo...
  • 7 篇 zhejiang lab

作者

  • 27 篇 yichuan wang
  • 27 篇 meng deyu
  • 26 篇 xinhong hei
  • 21 篇 wang yichuan
  • 18 篇 hei xinhong
  • 17 篇 shen yulong
  • 16 篇 liu jun
  • 16 篇 cao xiangyong
  • 15 篇 zheng qinghua
  • 12 篇 li wei
  • 12 篇 haiyan jin
  • 11 篇 jin haiyan
  • 11 篇 wenjiang ji
  • 10 篇 luo minnan
  • 10 篇 dong xuewen
  • 10 篇 lei zhu
  • 10 篇 wei wei
  • 9 篇 wang lei
  • 9 篇 xiaoxue liu
  • 9 篇 tan zuowen

语言

  • 445 篇 英文
  • 27 篇 其他
  • 16 篇 中文
检索条件"机构=Shaanxi Key Lab Network Computer and Security Technology"
487 条 记 录,以下是141-150 订阅
排序:
CustomFair: A Customized Fairness Method for Federated Recommender Systems in Social Internet of Things
收藏 引用
IEEE Internet of Things Journal 2024年
作者: Chen, Guorong Li, Chao Du, Fei Yuan, Xiaohan Chi, Cheng Yin, Zihang Wang, Bin Li, Tao Bao, Xuhua Wang, Wei Beijing Jiaotong University Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing100044 China China Academy of Information and Communications Technology Beijing China Network and Data Security Hangzhou310053 China Nankai University College of Computer Science Tianjin300350 China LTD Sangfor Technologies Co Beijing China Xi'an Jiaotong University Ministry of Education Key Lab for Intelligent Networks and Network Security Xi'an China
In the Social Internet of Things (SIoT), edge computing integrates artificial intelligence to learn intricate relationships. The scale and complexity of SIoT cause a data explosion from diverse objects, hindering tail... 详细信息
来源: 评论
Feature Selection Method Based on FSA-Choquet Fuzzy Integral
Feature Selection Method Based on FSA-Choquet Fuzzy Integral
收藏 引用
Industrial IoT, Big Data and Supply Chain (IIoTBDSC), International Conference on
作者: Zhangyu Xu Huaijun Wang Ruijie Wang Junhuai Li Xunchao Shang School of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China
With the instant development and wide application of sensor technology, human behavior recognition based on wearable sensors has attracted wide attention and become a hot research topic. The typical Choquet fuzzy inte... 详细信息
来源: 评论
A security Enhancement Scheme For Raft Consensus Algorithm Against Term Forgery Attacks
A Security Enhancement Scheme For Raft Consensus Algorithm A...
收藏 引用
IEEE International Symposium on Parallel and Distributed Processing with Applications and IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC)
作者: Yichuan Wang Mengjie Tian Yaling Zhang Xiaoxue Liu Yeqiu Xiao Xinhong Hei School of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China
The consensus algorithm is the core component of blockchain technology and a key link to maintaining the security of the blockchain network. In the Raft consensus algorithm, since the term growth range is not specifie... 详细信息
来源: 评论
Cross-chain Jamming Attack with Light Client Verification Clash in IBC Protocol
Cross-chain Jamming Attack with Light Client Verification Cl...
收藏 引用
IEEE International Symposium on Parallel and Distributed Processing with Applications and IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC)
作者: Yaling Zhang Ziyan Wang Yichuan Wang Xiaoxue Liu Xinhong Hei School of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China
Inter-Blockchain Communication (IBC) in Cosmos is a Sidechains/Relays cross-chain protocol. During the implementation of the protocol, the blockchain uses relayers to establish connections, and uses light clients to t... 详细信息
来源: 评论
Prompt and Contrastive Learning for Few-shot Sentiment Classification  22
Prompt and Contrastive Learning for Few-shot Sentiment Class...
收藏 引用
Proceedings of the 2022 5th International Conference on Artificial Intelligence and Pattern Recognition
作者: Fei Wang Long Chen Xiaohua Huang Cai Xu Wei Zhao Ziyu Guan Guangyue Lu Shaanxi Key Laboratory of Information Communication Network and Security Xi'an University of Posts and Telecommunications China School of Information Science and Technology Northwest University China School of Computer Science and Technology Xidian University China
Sentiment classification is a hot topic in the field of natural language processing. Currently, state-of-the-art classification models follow two steps: pre-training a large language model on upstream tasks, and then ... 详细信息
来源: 评论
Pervasive Container Computing–––a Fine-Grained Loosely Coupled Cloud Cluster
Pervasive Container Computing–––a Fine-Grained Loosely Co...
收藏 引用
IEEE International Symposium on Parallel and Distributed Processing with Applications and IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC)
作者: Xinhong Hei Dan Wu YiFan Liu Wenjiang Ji Yichuan Wang Lei Zhu School of computer science and engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China
With the emergence of CaaS, a cloud service model that can quickly build a production environment, this model has been widely used in the industry. However, the degree of loose coupling of various containers in the cl... 详细信息
来源: 评论
News-driven financial warning based on label information attention  22
News-driven financial warning based on label information att...
收藏 引用
Proceedings of the 2022 5th International Conference on Artificial Intelligence and Pattern Recognition
作者: Ren Zhilin Chen Long Huang Xiaohua Wang Wenjing Xu Cai Zhao Wei Guan Ziyu Shaanxi Key Laboratory of Information Communication Network and Security Xi'an University of Posts and Telecommunications China School of Information Science and Technology Northwest University China School of Computer Science and Technology Xidian University China
Most existing news-driven stock market prediction methods ignore the potential relationship between financial news and stocks. The complex relationship can help us to improve the accuracy of algorithmic trading system... 详细信息
来源: 评论
DHD: Double Hard Decision Decoding Scheme for NAND Flash Memory
DHD: Double Hard Decision Decoding Scheme for NAND Flash Mem...
收藏 引用
Design, Automation and Test in Europe Conference and Exhibition
作者: Lanlan Cui Yichuan Wang Renzhi Xiao Miao Li Xiaoxue Liu Xinhong Hei School of Computer Science and Engineering XI'AN University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China School of Software Engineering Jiangxi University of Science and Technology Nanchang China School of Information Engineering Zhongnan University of Economics and Law Wuhan China
With the advancement of NAND flash technology, the increased storage density leads to intensified interference, which in turn raises the error rate during data retrieval. To ensure data reliability, low-density parity... 详细信息
来源: 评论
Poisoning Attacks and Defenses to Learned Bloom Filters for Malicious URL Detection
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Dong, Fangming Wang, Pinghui Li, Rundong Cui, Xueyao Zhao, Junzhou Tao, Jing Zhang, Chen Guan, Xiaohong Zhejiang CreateLink Technology Co. Ltd Guangdong Guangzhou China Xi'an Jiaotong University MOE Key Laboratory for Intelligent Networks and Network Security Shaanxi Xi'an710049 China Tsinghua University Center for Intelligent and Networked Systems Tsinghua National Lab for Information Science and Technology Beijing China
Approximate membership query (AMQ) structures represented by the Bloom Filter and its variants have been popularly researched in recent years. Researchers have recently combined machine learning with this type of stru... 详细信息
来源: 评论
A Quantum Temporal Difference Learning Method Based on Quantum World Model
A Quantum Temporal Difference Learning Method Based on Quant...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Peigen Zeng Ying He F. Richard Yu Jianbo Du College of Computer Science and Software Engineering Shenzhen University Shenzhen China Shaanxi Key Laboratory of Information Communication Network and Security Xi’an University of Posts and Telecommunications Xi’an China School of Information Technology Carleton University Ottawa Canada
Based on quantum parallelism theory and quantum phenomena such as superposition and entanglement, quantum reinforcement learning (QRL) has the potential to surpass classical reinforcement learning (RL). Although some ... 详细信息
来源: 评论