咨询与建议

限定检索结果

文献类型

  • 264 篇 会议
  • 221 篇 期刊文献

馆藏范围

  • 485 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 328 篇 工学
    • 251 篇 计算机科学与技术...
    • 225 篇 软件工程
    • 79 篇 信息与通信工程
    • 38 篇 生物工程
    • 33 篇 电气工程
    • 30 篇 控制科学与工程
    • 29 篇 电子科学与技术(可...
    • 27 篇 网络空间安全
    • 15 篇 光学工程
    • 14 篇 机械工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 仪器科学与技术
    • 10 篇 化学工程与技术
    • 10 篇 交通运输工程
    • 9 篇 安全科学与工程
    • 7 篇 土木工程
  • 160 篇 理学
    • 99 篇 数学
    • 39 篇 生物学
    • 31 篇 统计学(可授理学、...
    • 26 篇 物理学
    • 15 篇 系统科学
    • 11 篇 化学
  • 80 篇 管理学
    • 40 篇 管理科学与工程(可...
    • 39 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 16 篇 法学
    • 10 篇 社会学
    • 7 篇 法学
  • 11 篇 医学
    • 9 篇 临床医学
    • 8 篇 基础医学(可授医学...
  • 9 篇 军事学
    • 8 篇 军队指挥学
  • 6 篇 经济学
  • 4 篇 农学
  • 3 篇 教育学
  • 2 篇 文学

主题

  • 22 篇 semantics
  • 16 篇 deep learning
  • 15 篇 feature extracti...
  • 12 篇 computational mo...
  • 12 篇 network security
  • 12 篇 training
  • 10 篇 authentication
  • 10 篇 predictive model...
  • 9 篇 neural networks
  • 9 篇 optimization
  • 9 篇 security
  • 9 篇 accuracy
  • 9 篇 cloud computing
  • 9 篇 data models
  • 9 篇 cryptography
  • 7 篇 image enhancemen...
  • 7 篇 image segmentati...
  • 7 篇 petri nets
  • 7 篇 blockchain
  • 7 篇 federated learni...

机构

  • 39 篇 school of comput...
  • 37 篇 shaanxi key labo...
  • 36 篇 school of comput...
  • 30 篇 shaanxi key labo...
  • 19 篇 school of comput...
  • 13 篇 key lab of infor...
  • 11 篇 xi'an university...
  • 11 篇 shaanxi key labo...
  • 10 篇 school of comput...
  • 9 篇 department of co...
  • 9 篇 school of comput...
  • 8 篇 shaanxi key labo...
  • 8 篇 tianjin key labo...
  • 7 篇 department of co...
  • 7 篇 shaanxi key labo...
  • 7 篇 haihe lab of ita...
  • 7 篇 school of comput...
  • 7 篇 shaanxi key labo...
  • 7 篇 key lab of netwo...
  • 7 篇 zhejiang lab

作者

  • 27 篇 yichuan wang
  • 27 篇 meng deyu
  • 26 篇 xinhong hei
  • 21 篇 wang yichuan
  • 18 篇 hei xinhong
  • 17 篇 shen yulong
  • 16 篇 liu jun
  • 16 篇 cao xiangyong
  • 15 篇 zheng qinghua
  • 12 篇 li wei
  • 12 篇 haiyan jin
  • 11 篇 jin haiyan
  • 11 篇 wenjiang ji
  • 10 篇 luo minnan
  • 10 篇 dong xuewen
  • 10 篇 lei zhu
  • 10 篇 wei wei
  • 9 篇 wang lei
  • 9 篇 xiaoxue liu
  • 9 篇 tan zuowen

语言

  • 443 篇 英文
  • 27 篇 其他
  • 16 篇 中文
检索条件"机构=Shaanxi Key Lab Network Computer and Security Technology"
485 条 记 录,以下是331-340 订阅
排序:
An Effective Framework for Document-level Chemical-induced Disease Relation Extraction via Fine-grained Interaction between Contexts
An Effective Framework for Document-level Chemical-induced D...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Jinyong Zhang Weizhong Zhao Jincai Yang Xingpeng Jiang Tingting He Hubei Provincial Key Laboratory of Artificial Intelligence and Smart Learning Central China Normal University Wuhan Hubei PR China School of Computer Central China Normal University Wuhan Hubei PR China National Language Resources Monitoring & Research Center for Network Media Central China Normal University Wuhan Hubei PR China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin China Guangxi Key Lab of Multi-source Information Mining & Security Guangxi Normal University Guilin China
In recent years, Chemical-induced Disease (CID) relations are the most searched topics by PubMed users worldwide, reflecting its extensive applications in biomedical research and public health field. However, for CID ... 详细信息
来源: 评论
Corrigendum to “COIN: A fast packet inspection method over compressed traffic” [J. Netw. Comput. Appl. 127 (2019) 122–134]
收藏 引用
Journal of network and computer Applications 2020年 153卷
作者: Xiuwen Sun Hao Li Dan Zhao Xingxing Lu Kaiyu Hou Chengchen Hu Ministry of Education Key Lab for Intelligent Network and Network Security Department of Computer Science and Technology Xi'an Jiaotong University China Xi'an University of Finance and Economics China Department of Electrical Engineering and Computer Science Northwestern University USA
来源: 评论
Deep reinforcement learning for fresh data collection in UAV-assisted IoT networks
arXiv
收藏 引用
arXiv 2020年
作者: Yi, Mengjie Wang, Xijun Liu, Juan Zhang, Yan Bai, Bo State Key Lab of Integrated Service Networks Information Science Institute Xidian University Xi’an Shaanxi710071 China Science and Technology on Communication Network Laboratory Shijiazhuang Hebei050081 China School of Electronics and Communication Engineering Sun Yat-sen University Guangzhou510006 China Key Laboratory of Wireless Sensor Network & Communication Shanghai Institute of Microsystem and Information Technology Chinese Academy of Sciences 865 Changning Road Shanghai200050 China School of Electrical Engineering and Computer Science Ningbo University Zhejiang315211 China 2012 Labs Huawei Technologies Co. Ltd. Hong Kong Hong Kong
Due to the flexibility and low operational cost, dispatching unmanned aerial vehicles (UAVs) to collect information from distributed sensors is expected to be a promising solution in Internet of Things (IoT), especial... 详细信息
来源: 评论
Code Authority Control Method Based on File security Level and ACL in WebIDE
Code Authority Control Method Based on File Security Level a...
收藏 引用
IEEE International Conference of Intelligent Robotic and Control Engineering (IRCE)
作者: Junhuai Li Wenchao Ji Jubo Tian Huaijun Wang Kan Wang School of Computer Science and Engineering Xi’an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China
The following topics are dealt with: mobile robots; learning (artificial intelligence); control system synthesis; permanent magnet motors; motion control; optimisation; power engineering computing; machine control; sy... 详细信息
来源: 评论
On privacy protection of latent dirichlet allocation model training
arXiv
收藏 引用
arXiv 2019年
作者: Zhao, Fangyuan Ren, Xuebin Yang, Shusen Yang, Xinyu School of Computer Science and Technology Xi'an Jiaotong University China National Engineering Laboratory for Big Data Analytics Xi'an Jiaotong University China Ministry of Education Key Lab For Intelligent Networks and Network Security Xi'an Jiaotong University China
Latent Dirichlet Allocation (LDA) is a popular topic modeling technique for discovery of hidden semantic architecture of text datasets, and plays a fundamental role in many machine learning applications. However, like... 详细信息
来源: 评论
Revisiting Cloud Migration: Strategies and Methods
收藏 引用
Journal of Physics: Conference Series 2020年 第1期1575卷
作者: Zhixiao Wang Wenyao Yan Wendong Wang School of Computer Science and Engineering Xi'an University of Technology Xi'an 710048 China Shaanxi Key Laboratory Xi'an of Network Computing and Security Technology China School of Data Science and Computer Xi'an innovation college of Yan'an University Xi'an 710100 China Yan'an University Xi'an 716000 China
Cloud computing attracts users with its advantage of unlimited resource supply where resources can be elastically expanded on demand and balanced-load at the same time. This means that the application in the cloud env...
来源: 评论
Exploiting Meta-Path with Attention Mechanism for Fine-Grained User Location Prediction in LBSNs
Exploiting Meta-Path with Attention Mechanism for Fine-Grain...
收藏 引用
2019 3rd International Conference on Data Mining, Communications and Information technology (DMCIT 2019)
作者: Zhixiao Wang Wenyao Yan Wendong Wang Ang Gao Lei Yu Shaobo Yang GaoYang Nie School of Computer Science and Engineering Xi'an University of Technology Telematics Group the University of Goettingen Shaanxi Key Laboratory of Network Computing and Security School of Electronic and Information Engineering Xi'an Jiaotong University College of Xi'an Innovation Yan'an University Yan'an University National Satellite Meteorological Center China Meteorological Administration
Based on the huge volumes of user check-in data in LBSNs,users’ intrinsic mobility patterns can be well explored,which is fundamental for predicting where a user will visit next given his/her historical check-in *** ...
来源: 评论
A Universal Designated Multi-Verifier Transitive Signature Scheme  13th
A Universal Designated Multi-Verifier Transitive Signature S...
收藏 引用
13th International Conference on Information securityand Cryptology, Inscrypt 2017
作者: Zhu, Fei Zhang, Yuexin Lin, Chao Wu, Wei Meng, Ru Fujian Provincial Key Laboratory of Network Security and Cryptology School of Mathematics and Informatics Fujian Normal University Fuzhou China School of Software and Electrical Engineering Swinburne University of Technology HawthornVIC3122 Australia School of Computer Science Shaanxi Normal University Xi’an China
A Universal Designated Verifier Transitive Signature (UDVTS) scheme is designed for the graph-based big data system. Specifically, it allows a transitive signature holder to convince the designated verifier with a tra... 详细信息
来源: 评论
LPD communication: A sequential change-point detection perspective
arXiv
收藏 引用
arXiv 2019年
作者: Huang, Ke-Wen Wang, Hui-Ming Towsley, Don Vincent Poor, H. School of Electronics and Information Engineering Ministry of Education Key Lab for Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an Shaanxi710049 China College of Information and Computer Sciences University of Massachusetts AmherstMA01002 United States Department of Electrical Engineering Princeton University PrincetonNJ08544 United States
In this paper, we establish a framework for low probability of detection (LPD) communication from a sequential change-point detection (SCPD) perspective, where a transmitter, Alice, wants to hide her signal transmissi... 详细信息
来源: 评论
Time-varying massive MIMO channel estimation: Capturing, reconstruction and restoration
arXiv
收藏 引用
arXiv 2019年
作者: Li, Muye Zhang, Shun Zhao, Nan Zhang, Weile Wang, Xianbin State Key Laboratory of Integrated Services Networks Xidian University Xian710071 China School of Information and Communication Engineering Dalian University of Technology Dalian116024 China MOE Key Lab for Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an710049 China Department of Electrical and Computer Engineering Western University LondonON Canada
On the time-varying channel estimation, the traditional downlink (DL) channel restoration schemes usually require the reconstruction for the covariance of downlink process noise vector, which is dependent on DL channe... 详细信息
来源: 评论