咨询与建议

限定检索结果

文献类型

  • 264 篇 会议
  • 223 篇 期刊文献

馆藏范围

  • 487 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 330 篇 工学
    • 253 篇 计算机科学与技术...
    • 226 篇 软件工程
    • 79 篇 信息与通信工程
    • 38 篇 生物工程
    • 33 篇 电气工程
    • 30 篇 控制科学与工程
    • 29 篇 电子科学与技术(可...
    • 27 篇 网络空间安全
    • 15 篇 光学工程
    • 14 篇 机械工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 仪器科学与技术
    • 10 篇 化学工程与技术
    • 10 篇 交通运输工程
    • 9 篇 安全科学与工程
    • 8 篇 土木工程
  • 160 篇 理学
    • 99 篇 数学
    • 39 篇 生物学
    • 31 篇 统计学(可授理学、...
    • 26 篇 物理学
    • 15 篇 系统科学
    • 11 篇 化学
  • 80 篇 管理学
    • 40 篇 管理科学与工程(可...
    • 39 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 16 篇 法学
    • 10 篇 社会学
    • 7 篇 法学
  • 11 篇 医学
    • 9 篇 临床医学
    • 8 篇 基础医学(可授医学...
  • 9 篇 军事学
    • 8 篇 军队指挥学
  • 6 篇 经济学
  • 4 篇 农学
  • 3 篇 教育学
  • 2 篇 文学

主题

  • 22 篇 semantics
  • 16 篇 deep learning
  • 15 篇 feature extracti...
  • 12 篇 computational mo...
  • 12 篇 network security
  • 12 篇 training
  • 10 篇 authentication
  • 10 篇 predictive model...
  • 9 篇 neural networks
  • 9 篇 optimization
  • 9 篇 security
  • 9 篇 accuracy
  • 9 篇 cloud computing
  • 9 篇 data models
  • 9 篇 cryptography
  • 7 篇 image enhancemen...
  • 7 篇 generative adver...
  • 7 篇 image segmentati...
  • 7 篇 petri nets
  • 7 篇 blockchain

机构

  • 39 篇 school of comput...
  • 37 篇 shaanxi key labo...
  • 36 篇 school of comput...
  • 30 篇 shaanxi key labo...
  • 19 篇 school of comput...
  • 13 篇 key lab of infor...
  • 11 篇 xi'an university...
  • 11 篇 shaanxi key labo...
  • 10 篇 school of comput...
  • 9 篇 department of co...
  • 9 篇 school of comput...
  • 8 篇 shaanxi key labo...
  • 8 篇 tianjin key labo...
  • 7 篇 department of co...
  • 7 篇 shaanxi key labo...
  • 7 篇 haihe lab of ita...
  • 7 篇 school of comput...
  • 7 篇 shaanxi key labo...
  • 7 篇 key lab of netwo...
  • 7 篇 zhejiang lab

作者

  • 27 篇 yichuan wang
  • 27 篇 meng deyu
  • 26 篇 xinhong hei
  • 21 篇 wang yichuan
  • 18 篇 hei xinhong
  • 17 篇 shen yulong
  • 16 篇 liu jun
  • 16 篇 cao xiangyong
  • 15 篇 zheng qinghua
  • 12 篇 li wei
  • 12 篇 haiyan jin
  • 11 篇 jin haiyan
  • 11 篇 wenjiang ji
  • 10 篇 luo minnan
  • 10 篇 dong xuewen
  • 10 篇 lei zhu
  • 10 篇 wei wei
  • 9 篇 wang lei
  • 9 篇 xiaoxue liu
  • 9 篇 tan zuowen

语言

  • 445 篇 英文
  • 27 篇 其他
  • 16 篇 中文
检索条件"机构=Shaanxi Key Lab Network Computer and Security Technology"
487 条 记 录,以下是211-220 订阅
排序:
PanFlowNet: A Flow-Based Deep network for Pan-sharpening
arXiv
收藏 引用
arXiv 2023年
作者: Yang, Gang Cao, Xiangyong Xiao, Wenzhe Zhou, Man Liu, Aiping Chen, Xun Meng, Deyu University of Science and Technology of China China Xi’an Jiaotong University China School of Computer Science and Technology Xi’an Jiaotong University China Ministry of Education Key Lab For Intelligent Networks and Network Security Xi’an Jiaotong University China Nanyang Technological University Singapore
Pan-sharpening aims to generate a high-resolution multispectral (HRMS) image by integrating the spectral information of a low-resolution multispectral (LRMS) image with the texture details of a high-resolution panchro... 详细信息
来源: 评论
Species-Based Differential Evolution with Migration for Multimodal Optimization  14th
Species-Based Differential Evolution with Migration for Mult...
收藏 引用
14th International Conference on Bio-inspired Computing: Theories and Applications, BIC-TA 2019
作者: Li, Wei Fan, Yaochi Jiang, Qiaoyong School of Computer Science and Engineering Xi’an University of Technology Xi’an710048 China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an710048 China
Due to the fact that many realistic problems are multimodal optimization problems (MMOPs), multimodal optimization has attracted a growing interest. In this paper, a Species-based differential evolution with migration... 详细信息
来源: 评论
Mind Reasoning Manners: Enhancing Type Perception for Generalized Zero-shot Logical Reasoning over Text
arXiv
收藏 引用
arXiv 2023年
作者: Xu, Fangzhi Liu, Jun Lin, Qika Zhao, Tianzhe Zhang, Jian Zhang, Lingling School of Computer Science and Technology Xi’an Jiaotong University Xi’an China Shaanxi Province Key Laboratory of Satellite and Terrestrial Network Tech. R&D National Engineering lab for Big Data Analytics Xi’an China
Logical reasoning task involves diverse types of complex reasoning over text, based on the form of multiple-choice question answering. Given the context, question and a set of options as the input, previous methods ac... 详细信息
来源: 评论
SAR Image Scene Classification Based on Metric Learning and CNNs
SAR Image Scene Classification Based on Metric Learning and ...
收藏 引用
Information Communication and Software Engineering (ICICSE), IEEE International Conference on
作者: Yaozhong Wang Zhiqiang Zhao Lei Wang School of Computer Science and Engineering and the Shaanxi Key Laboratory of Network Computing and Security Technology Xi‘an University of Technology Xi'an China School of Mathematics and Computer Science Shaanxi University of Technology Hanzhong China
With the development of synthetic aperture radar (SAR) imaging techniques, many high-quality images are acquired for exactly earth observation. As a result of heavy speckle, it is difficult to extract effective repres... 详细信息
来源: 评论
Adaptive Backdoor Attacks with Reasonable Constraints on Graph Neural networks
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Dong, Xuewen Li, Jiachen Li, Shujun You, Zhichao Qu, Qiang Kholodov, Yaroslav Shen, Yulong The School of Computer Science and Technology Xidian University The Engineering Research Center of Blockchain Technology Application and Evaluation Ministry of Education China The Shaanxi Key Laboratory of Blockchain and Secure Computing Xi’an710071 China The School of Computing Kent Interdisciplinary Research Centre in Cyber Security University of Kent CanterburyCT2 7NF United Kingdom Shenzhen Institute of Advanced Technology Chinese Academy of Sciences China The Intelligent Transportation Systems Lab Innopolis University Innopolis Russia The School of Computer Science and Technology Xidian University China
Recent studies show that graph neural networks (GNNs) are vulnerable to backdoor attacks. Existing backdoor attacks against GNNs use fixed-pattern triggers and lack reasonable trigger constraints, overlooking individu... 详细信息
来源: 评论
A Prior Embedding-Driven Architecture for Long Distance Blind Iris Recognition
arXiv
收藏 引用
arXiv 2024年
作者: Xiong, Qi Zhang, Xinman Shen, Jun International College Hunan University of Arts and Sciences Changde415000 China School of Automation Science and Engineering Faculty of Electronic and Information Engineering MOE Key Lab for Intelligent Networks and Network Security Xi'an Jiaotong University Shaanxi Xi'An710049 China School of Computing and Information Technology University of Wollongong WollongongNSW2522 Australia
Blind iris images, which result from unknown degradation during the process of iris recognition at long distances, often lead to decreased iris recognition rates. Currently, little existing literature offers a solutio... 详细信息
来源: 评论
Haplotype-resolved Chinese male genome assembly based on high-fidelity sequencing
收藏 引用
Fundamental Research 2022年 第6期2卷 946-953页
作者: Xiaofei Yang Xixi Zhao Shoufang Qu Peng Jia Bo Wang Shenghan Gao Tun Xu Wenxin Zhang Jie Huang Kai Ye Genome Institute the First Affiliated Hospital of Xi'an Jiaotong UniversityXi'an 710061ShaanxiChina School of Computer Science and Technology Faculty of Electronic and Information EngineeringXi'an Jiaotong UniversityXi'an 710049ShaanxiChina MOE Key Lab for Intelligent Networks&Networks Security Faculty of Electronic and Information EngineeringXi'an Jiaotong UniversityXi'an 710049ShaanxiChina National Institutes for food and drug Control(NIFDC) No.2Tiantan XiliDongcheng DistrictBeijing 102629China School of Automation Science and Engineering Faculty of Electronic and Information EngineeringXi'an Jiaotong UniversityXi'an 710049ShaanxiChina School of Life Science and Technology Xi'an Jiaotong UniversityXi'an 710049ShaanxiChina Faculty of Science Leiden UniversityLeidenThe Netherlands
The advantages of both the length and accuracy of high-fidelity(HiFi)reads enable chromosome-scale haplotype-resolved genome *** this study,we sequenced a cell line named HJ,established from a Chinese Han male individ... 详细信息
来源: 评论
A Web Attack Detection Method Based on DistilBERT and Feature Fusion for Power Micro-Application Server
A Web Attack Detection Method Based on DistilBERT and Featur...
收藏 引用
Advanced Electronics, Electrical and Green Energy (AEEGE), International Conference on
作者: Li Nige Chen Lu Zhao Lei Teng Zhenning Wang Zhiqiang Shao Yiyang Gui Xiaolin State Grid Smart Grid Research Institute Co. Ltd. State Grid Laboratory of Power cyber-Security Protection and Monitoring Technology Nanjing China Shaanxi Province Key Laboratory of Computer Network Faculty of Electronic and Information Engineering Xi’an Jiaotong University Xi’an China
The widespread use of power micro-applications has significantly expanded the attack surface of their server side, thus increasing the risk of vulnerability attacks such as SQL injection, XSS, and CRLF injection. To e...
来源: 评论
A Driving Risk Prediction Approach Based on Generative Adversarial networks and VANET for Autonomous Trams
A Driving Risk Prediction Approach Based on Generative Adver...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Wenjiang Ji Jiangcheng Yang Yichuan Wang Lei Zhu Yuan Qiu Xinhong Hei College of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China
Driving safety is an essential prerequisite to the rapid development of autonomous trams. However, the relationship of driving risk factors is nonlinear, which makes modeling difficult. To improve the accuracy of driv... 详细信息
来源: 评论
ConvCatb: An Attention-based CNN-CATBOOST Risk Prediction Model for Driving Safety
ConvCatb: An Attention-based CNN-CATBOOST Risk Prediction Mo...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Xinhong Hei Hao Zhang Wenjiang Ji Yichuan Wang Lei Zhu Yuan Qiu College of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China
Risk prediction is one of the most important tasks in assistant and automatic driving. In recent years, by the help of VANET and various sensors in the cars, the status of cars and roads can be collected in real time ... 详细信息
来源: 评论