咨询与建议

限定检索结果

文献类型

  • 264 篇 会议
  • 221 篇 期刊文献

馆藏范围

  • 485 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 328 篇 工学
    • 251 篇 计算机科学与技术...
    • 225 篇 软件工程
    • 79 篇 信息与通信工程
    • 38 篇 生物工程
    • 33 篇 电气工程
    • 30 篇 控制科学与工程
    • 29 篇 电子科学与技术(可...
    • 27 篇 网络空间安全
    • 15 篇 光学工程
    • 14 篇 机械工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 仪器科学与技术
    • 10 篇 化学工程与技术
    • 10 篇 交通运输工程
    • 9 篇 安全科学与工程
    • 7 篇 土木工程
  • 160 篇 理学
    • 99 篇 数学
    • 39 篇 生物学
    • 31 篇 统计学(可授理学、...
    • 26 篇 物理学
    • 15 篇 系统科学
    • 11 篇 化学
  • 80 篇 管理学
    • 40 篇 管理科学与工程(可...
    • 39 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 16 篇 法学
    • 10 篇 社会学
    • 7 篇 法学
  • 11 篇 医学
    • 9 篇 临床医学
    • 8 篇 基础医学(可授医学...
  • 9 篇 军事学
    • 8 篇 军队指挥学
  • 6 篇 经济学
  • 4 篇 农学
  • 3 篇 教育学
  • 2 篇 文学

主题

  • 22 篇 semantics
  • 16 篇 deep learning
  • 15 篇 feature extracti...
  • 12 篇 computational mo...
  • 12 篇 network security
  • 12 篇 training
  • 10 篇 authentication
  • 10 篇 predictive model...
  • 9 篇 neural networks
  • 9 篇 optimization
  • 9 篇 security
  • 9 篇 accuracy
  • 9 篇 cloud computing
  • 9 篇 data models
  • 9 篇 cryptography
  • 7 篇 image enhancemen...
  • 7 篇 image segmentati...
  • 7 篇 petri nets
  • 7 篇 blockchain
  • 7 篇 federated learni...

机构

  • 39 篇 school of comput...
  • 37 篇 shaanxi key labo...
  • 36 篇 school of comput...
  • 30 篇 shaanxi key labo...
  • 19 篇 school of comput...
  • 13 篇 key lab of infor...
  • 11 篇 xi'an university...
  • 11 篇 shaanxi key labo...
  • 10 篇 school of comput...
  • 9 篇 department of co...
  • 9 篇 school of comput...
  • 8 篇 shaanxi key labo...
  • 8 篇 tianjin key labo...
  • 7 篇 department of co...
  • 7 篇 shaanxi key labo...
  • 7 篇 haihe lab of ita...
  • 7 篇 school of comput...
  • 7 篇 shaanxi key labo...
  • 7 篇 key lab of netwo...
  • 7 篇 zhejiang lab

作者

  • 27 篇 yichuan wang
  • 27 篇 meng deyu
  • 26 篇 xinhong hei
  • 21 篇 wang yichuan
  • 18 篇 hei xinhong
  • 17 篇 shen yulong
  • 16 篇 liu jun
  • 16 篇 cao xiangyong
  • 15 篇 zheng qinghua
  • 12 篇 li wei
  • 12 篇 haiyan jin
  • 11 篇 jin haiyan
  • 11 篇 wenjiang ji
  • 10 篇 luo minnan
  • 10 篇 dong xuewen
  • 10 篇 lei zhu
  • 10 篇 wei wei
  • 9 篇 wang lei
  • 9 篇 xiaoxue liu
  • 9 篇 tan zuowen

语言

  • 443 篇 英文
  • 27 篇 其他
  • 16 篇 中文
检索条件"机构=Shaanxi Key Lab Network Computer and Security Technology"
485 条 记 录,以下是301-310 订阅
排序:
Investigating Bi-level optimization for learning and vision from a unified perspective: A survey and beyond
arXiv
收藏 引用
arXiv 2021年
作者: Liu, Risheng Gao, Jiaxin Zhang, Jin Meng, Deyu Lin, Zhouchen DUT-RU International School of Information Science & Engineering Dalian University of Technology Key Laboratory for Ubiquitous Network Service Software of Liaoning Province Dalian116024 China Department of Mathematics Southern University of Science and Technology National Center for Applied Mathematics Shenzhen China School of Mathematics and Statistics Ministry of Education Key Lab of Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an Shaanxi China School of Electronics Engineering and Computer Science Peking University Beijing100871 China Cooperative Medianet Innovation Center Shanghai Jiao Tong University Shanghai200240 China
Bi-Level Optimization (BLO) is originated from the area of economic game theory and then introduced into the optimization community. BLO is able to handle problems with a hierarchical structure, involving two levels o... 详细信息
来源: 评论
Interpretation-enabled software reuse detection based on a multi-level birthmark model
arXiv
收藏 引用
arXiv 2021年
作者: Xu, Xi Zheng, Qinghua Yan, Zheng Fan, Ming Jia, Ang Liu, Ting Key Laboratory of Intelligent Networks and Network Security Ministry of Education China School of Computer Science and Technology Xi'an Jiaotong University China School of Cyber Science and Engineering Xi'an Jiaotong University China State Key Lab on Integrated Services Networks School of Cyber Engineering Xidian University China Department of Communications and Networking Aalto University Finland
Software reuse, especially partial reuse, poses legal and security threats to software development. Since its source codes are usually unavailable, software reuse is hard to be detected with interpretation. On the oth... 详细信息
来源: 评论
Interpretation-Enabled Software Reuse Detection Based on a Multi-level Birthmark Model
Interpretation-Enabled Software Reuse Detection Based on a M...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Xi Xu Qinghua Zheng Zheng Yan Ming Fan Ang Jia Ting Liu Key Laboratory of Intelligent Networks and Network Security Ministry of Education China School of Computer Science and Technology Xi’an Jiaotong University China State Key Lab on Integrated Services Networks School of Cyber Engineering Xidian University China Department of Communications and Networking Aalto University Finland School of Cyber Science and Engineering Xi’an Jiaotong University China
Software reuse, especially partial reuse, poses legal and security threats to software development. Since its source codes are usually unavailable, software reuse is hard to be detected with interpretation. On the oth... 详细信息
来源: 评论
Trading Based Service-Oriented Spectrum-Aware RAN-Slicing Under Spectrum Sharing
Trading Based Service-Oriented Spectrum-Aware RAN-Slicing Un...
收藏 引用
IEEE Conference on Wireless Communications and networking
作者: Kajia Jiao Xuanheng Li Miao Pan Fan Jiang Ming Li School of Information and Communication Engineering Dalian University of Technology Dalian China Department of Electrical and Computer Engineering University of Houston Houston TX USA Shaanxi Key Laboratory of Information Communication Network and Security Xi’an University of Posts and Telecommunications Xian Shaanxi China
The fast development on emerging services makes our telecommunications networks witness two key problems. One is the flexibility to fulfill the diverse service requests and the other is the shortage on spectrum. Netwo...
来源: 评论
Velocity-driven particle swarm optimization  8
Velocity-driven particle swarm optimization
收藏 引用
8th International Conference on Computing and Pattern Recognition, ICCPR 2019
作者: Li, Wei Fan, Yaochi Jiang, Qiaoyong Xu, Qingzheng School of Computer Science and Engineering Xi'An University of Technology China Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an710048 China School of Computer Science and Engineering Xi'An University of Technology Xi'an710048 China College of Information and Communication National University of Defense Technology Xi'an710106 China
Particle swarm optimization (PSO) is an efficient nature-inspired optimization algorithm, which has been widely applied in many engineering fields. The performance of particle swarm optimization (PSO) has been signifi... 详细信息
来源: 评论
A novel Image security Protection Method Based on DCT Compression Theory and Hyper-chaotic Mapping
收藏 引用
Journal of Physics: Conference Series 2021年 第1期2066卷
作者: Xianglian Xue Haiyan Jin School of Computer Science and Engineering Xi'an University of Technology Xi'an 710077Shaanxi China Shaanxi University of Chinese Medicine Xianyang712046Shaanxi China Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an University of Technology Xi'an710077Shaanxi China
This paper studies the current situation of image compression encryption and analyzes the influence of low frequency (DC coefficient) and high frequency (AC coefficient) on image structure in DCT transformation. Based...
来源: 评论
Secure Data Propagation in Edge-Cloud Orchestrated Computing Paradigms: Statistcs and Taxonomy
Secure Data Propagation in Edge-Cloud Orchestrated Computing...
收藏 引用
International Conference on Advanced Cloud and Big Data (CBD)
作者: Feng Yu Xixian Li Huimin Zhang Li-e Wang College of computer science Guangxi Normal University Guilin China Key Laboratory of Computer Network and Information Integration Southeast University Nanjing China Guangxi Key Lab of Multi-source Information Mining &Security Guilin China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin China
Despite the importance of the secure data propagation in the edge-cloud orchestrated computing paradigms, to the best of our knowledge, there is lack of systematic and comprehensive review on this research topic. The ... 详细信息
来源: 评论
A Control Task Assignment Algorithm based on sub-graph isomorphism
A Control Task Assignment Algorithm based on sub-graph isomo...
收藏 引用
International Conference on Advanced Cloud and Big Data (CBD)
作者: Feng Yu Xixian Li Huimin Zhang Li-e Wang College of computer science Guangxi Normal University Guilin China Key Laboratory of Computer Network and Information Integration Southeast University Nanjing China Guangxi Key Lab of Multi-source Information Mining & Security Guilin China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin China
To enhance the controllability and trustworthiness of the Internet, a new network control architecture has been presented with control task extracted to the intra-domain control node and executed in distributed multi-... 详细信息
来源: 评论
Structured Information Extraction of Pathology Reports with Attention-based Graph Convolutional network
Structured Information Extraction of Pathology Reports with ...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Jialun Wu Kaiwen Tang Haichuan Zhang Chunbao Wang Chen Li School of Computer Science and Technology Xi’an Jiaotong University Xi’an Shaanxi China National Engineering Lab for Big Data Analytics Xi’an Jiaotong University Xi’an Shaanxi China Shaanxi Province Key Laboratory of Satellite and Terrestrial Network Tech.R&D Xi’an Jiaotong University Xi’an Shaanxi China School of Computer Science and Technology Qian Xuesen College Xi’an Jiaotong University Xi’an Shaanxi China the First Affiliated Hospital of Xi’an Jiaotong University Xi’an Shaanxi China
Electronic medical data contains biochemical, imaging, pathological information during diagnosis and treatment. The pathology report is a kind of highly liberalized unstructured textual data, which is the basis and go... 详细信息
来源: 评论
Algorithms for Globally-Optimal Secure Signaling over Gaussian MIMO Wiretap Channels Under Interference Constraints
arXiv
收藏 引用
arXiv 2020年
作者: Dong, Limeng Loyka, Sergey Li, Yong Ministry of Education Key Lab for Intelligent Networks and Network Security School of Information and Communications Engineering Xi’an Jiaotong University Xi’anShaanxi710049 China School of Electrical Engineering and Computer Science University of Ottawa Canada School of Electronics and Information Northwestern Polytechnical University Xian China
Multi-user Gaussian MIMO wiretap channel is considered under interference power constraints (IPC), in addition to the total transmit power constraint (TPC). Algorithms for global maximization of its secrecy rate are p... 详细信息
来源: 评论