咨询与建议

限定检索结果

文献类型

  • 264 篇 会议
  • 223 篇 期刊文献

馆藏范围

  • 487 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 330 篇 工学
    • 253 篇 计算机科学与技术...
    • 226 篇 软件工程
    • 79 篇 信息与通信工程
    • 38 篇 生物工程
    • 33 篇 电气工程
    • 30 篇 控制科学与工程
    • 29 篇 电子科学与技术(可...
    • 27 篇 网络空间安全
    • 15 篇 光学工程
    • 14 篇 机械工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 仪器科学与技术
    • 10 篇 化学工程与技术
    • 10 篇 交通运输工程
    • 9 篇 安全科学与工程
    • 8 篇 土木工程
  • 160 篇 理学
    • 99 篇 数学
    • 39 篇 生物学
    • 31 篇 统计学(可授理学、...
    • 26 篇 物理学
    • 15 篇 系统科学
    • 11 篇 化学
  • 80 篇 管理学
    • 40 篇 管理科学与工程(可...
    • 39 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 16 篇 法学
    • 10 篇 社会学
    • 7 篇 法学
  • 11 篇 医学
    • 9 篇 临床医学
    • 8 篇 基础医学(可授医学...
  • 9 篇 军事学
    • 8 篇 军队指挥学
  • 6 篇 经济学
  • 4 篇 农学
  • 3 篇 教育学
  • 2 篇 文学

主题

  • 22 篇 semantics
  • 16 篇 deep learning
  • 15 篇 feature extracti...
  • 12 篇 computational mo...
  • 12 篇 network security
  • 12 篇 training
  • 10 篇 authentication
  • 10 篇 predictive model...
  • 9 篇 neural networks
  • 9 篇 optimization
  • 9 篇 security
  • 9 篇 accuracy
  • 9 篇 cloud computing
  • 9 篇 data models
  • 9 篇 cryptography
  • 7 篇 image enhancemen...
  • 7 篇 generative adver...
  • 7 篇 image segmentati...
  • 7 篇 petri nets
  • 7 篇 blockchain

机构

  • 39 篇 school of comput...
  • 37 篇 shaanxi key labo...
  • 36 篇 school of comput...
  • 30 篇 shaanxi key labo...
  • 19 篇 school of comput...
  • 13 篇 key lab of infor...
  • 11 篇 xi'an university...
  • 11 篇 shaanxi key labo...
  • 10 篇 school of comput...
  • 9 篇 department of co...
  • 9 篇 school of comput...
  • 8 篇 shaanxi key labo...
  • 8 篇 tianjin key labo...
  • 7 篇 department of co...
  • 7 篇 shaanxi key labo...
  • 7 篇 haihe lab of ita...
  • 7 篇 school of comput...
  • 7 篇 shaanxi key labo...
  • 7 篇 key lab of netwo...
  • 7 篇 zhejiang lab

作者

  • 27 篇 yichuan wang
  • 27 篇 meng deyu
  • 26 篇 xinhong hei
  • 21 篇 wang yichuan
  • 18 篇 hei xinhong
  • 17 篇 shen yulong
  • 16 篇 liu jun
  • 16 篇 cao xiangyong
  • 15 篇 zheng qinghua
  • 12 篇 li wei
  • 12 篇 haiyan jin
  • 11 篇 jin haiyan
  • 11 篇 wenjiang ji
  • 10 篇 luo minnan
  • 10 篇 dong xuewen
  • 10 篇 lei zhu
  • 10 篇 wei wei
  • 9 篇 wang lei
  • 9 篇 xiaoxue liu
  • 9 篇 tan zuowen

语言

  • 445 篇 英文
  • 27 篇 其他
  • 16 篇 中文
检索条件"机构=Shaanxi Key Lab Network Computer and Security Technology"
487 条 记 录,以下是71-80 订阅
排序:
Algorithm Contest of Calibration-free Motor Imagery BCI in the BCI Controlled Robot Contest in World Robot Contest 2021:A survey
收藏 引用
Brain Science Advances 2022年 第2期8卷 127-141页
作者: Jing Luo Qi Mao Yaojie Wang Zhenghao Shi Xinhong Hei Shaanxi Key Laboratory for Network Computing and Security Technology School of Computer Science and EngineeringXi’an University of TechnologyXi’an 710054ShaanxiChina
Objective:From September 10 to 13,2021,the finals of the BCI Controlled Robot Contest in World Robot Contest 2021 were held in Beijing,*** teams participated in the Algorithm Contest of Calibration-free Motor Imagery ... 详细信息
来源: 评论
key Management and Authentication Scheme Forward Trusted Pervasive Container Computing
Key Management and Authentication Scheme Forward Trusted Per...
收藏 引用
Big Data and Privacy Computing (BDPC), International Conference on
作者: XinHong Hei YuZhan Xue YiChuan Wang YiFan Liu Chen Peng Xiang Sun School of computer science and engineering Xi'an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology School of computer science and engineering Xi'an University of Technology Xi’an China
Cloud computing technology is an internet-based computing model that provides high reliability and security measures, including data backup, secure access control, etc. As Docker containers play a increasingly importa... 详细信息
来源: 评论
HEN:a novel hybrid explainable neural network based framework for robust network intrusion detection
收藏 引用
Science China(Information Sciences) 2024年 第7期67卷 72-90页
作者: Wei WEI Sijin CHEN Cen CHEN Heshi WANG Jing LIU Zhongyao CHENG Xiaofeng ZOU School of Computer Science and Engineering Xi'an University of TechnologyShaanxi Key Laboratory for Network Computing and Security Technology School of Computer Science and Technology Wuhan University of Science and Technology School of Future Technology South China University of Technology Shenzhen Research Institute of Hunan University School of Computer Science Hunan University of Technology and Business Institute for Infocomm Research (I2R) Agency for Science Technology and Reseach (A*STAR)
With the rapid development of network technology and the automation process for 5G, cyberattacks have become increasingly complex and threatening. In response to these threats, researchers have developed various netwo... 详细信息
来源: 评论
Variational Zero-shot Multispectral Pansharpening
arXiv
收藏 引用
arXiv 2024年
作者: Rui, Xiangyu Cao, Xiangyong Li, Yining Meng, Deyu School of Mathematics and Statistics Ministry of Education Key Lab of Intelligent Networks and Network Security Xi’an Jiaotong University Shaanxi Xi’an710049 China School of Computer Science and Technology Ministry of Education Key Lab For Intelligent Networks and Network Security Xi’an Jiaotong University Shaanxi Xi’an710049 China Macao Institute of Systems Engineering Macau University of Science and Technology Taipa China
Pansharpening aims to generate a high spatial resolution multispectral image (HRMS) by fusing a low spatial resolution multispectral image (LRMS) and a panchromatic image (PAN). The most challenging issue for this tas... 详细信息
来源: 评论
Prompt and Contrastive Learning for Few-shot Sentiment Classification  5
Prompt and Contrastive Learning for Few-shot Sentiment Class...
收藏 引用
5th International Conference on Artificial Intelligence and Pattern Recognition, AIPR 2022
作者: Wang, Fei Chen, Long Huang, Xiaohua Xu, Cai Zhao, Wei Guan, Ziyu Lu, Guangyue Shaanxi Key Laboratory of Information Communication Network and Security Xi'an University of Posts and Telecommunications China School of Information Science and Technology Northwest University China School of Computer Science and Technology Xidian University China
Sentiment classification is a hot topic in the field of natural language processing. Currently, state-of-the-art classification models follow two steps: pre-training a large language model on upstream tasks, and then ... 详细信息
来源: 评论
Elevating Predictions: Sculpting Flight Delay Predictions with Recursive Feature Elimination
Elevating Predictions: Sculpting Flight Delay Predictions wi...
收藏 引用
computers and Artificial Intelligence Technologies (CAIT), International Conference on
作者: Wei Wei Chenchen Yu Zhao Yang Fu Bo School of Computer Science and Engineering and the Shaanxi Key Laboratory for Network Computing and Security Xi'an University Of Technology Xi’an China School of Computer Science and Engineering Xi'an University Of Technology Xi’an China
With the rapid development of the aviation industry and the significant growth of aviation data, how to use big data technology to accurately predict flight delays has become a problem that needs to be solved in the c... 详细信息
来源: 评论
News-driven financial warning based on label information attention  5
News-driven financial warning based on label information att...
收藏 引用
5th International Conference on Artificial Intelligence and Pattern Recognition, AIPR 2022
作者: Zhilin, Ren Long, Chen Xiaohua, Huang Wenjing, Wang Cai, Xu Wei, Zhao Ziyu, Guan Shaanxi Key Laboratory of Information Communication Network and Security Xi'an University of Posts and Telecommunications China School of Information Science and Technology Northwest University China School of Computer Science and Technology Xidian University China
Most existing news-driven stock market prediction methods ignore the potential relationship between financial news and stocks. The complex relationship can help us to improve the accuracy of algorithmic trading system... 详细信息
来源: 评论
Innovations in Machine Learning for Flight Delay Prediction: A Targeted Overview
Innovations in Machine Learning for Flight Delay Prediction:...
收藏 引用
computers and Artificial Intelligence Technologies (CAIT), International Conference on
作者: Wei Wei Chenchen Yu Zhao Yang Fu Bo School of Computer Science and Engineering and the Shaanxi Key Laboratory for Network Computing and Security Xi'an University Of Technology Xi’an China School of Computer Science and Engineering Xi'an University Of Technology Xi’an China
Artificial intelligence technology is increasingly being applied to air traffic flow forecasting. Based on the core data of Web of Science, this study uses bibliometrics and content review methods to investigate the c... 详细信息
来源: 评论
Petri Net Model of MITM Attack Based on NDP Protocol
Petri Net Model of MITM Attack Based on NDP Protocol
收藏 引用
2022 International Conference on networking and network Applications, NaNA 2022
作者: Zhang, Liumei Han, Yu Wang, Yichuan Quan, Ruiqin School of Computer Science Xi’an Shiyou University Xi’an China School of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China Xinjiang Institute of Engineering China
Neighbor Discovery Protocol (NDP) is one of the core protocols of IPv6 networks. Since NDP messages are an unauthenticated stateless protocol, they are vulnerable to various types of attacks, and Man-In-The-Middle (MI... 详细信息
来源: 评论
Reversible Data Hiding Simultaneously Using Substitution of MSB and Compression of LSB of Encrypted Image  14
Reversible Data Hiding Simultaneously Using Substitution of ...
收藏 引用
14th International Conference on Digital Image Processing, ICDIP 2022
作者: Sui, Liansheng Liu, Jie Cheng, Ying Xiao, Zhaolin Tian, Ailing School of Computer Science and Engineering Xi’an University of Technology Xi’an710048 China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an710048 China Student’s Affairs Division Xi’an University of Technology Xi’an710048 China Shaanxi Province Key Lab of Thin Film Technology and Optical Test Xi’an Technological University Xi’an710048 China
With the development of privacy protection, reversible data hiding methods in encrypted image have drawn extensive research interest. Among them, a new method is proposed based on embedding prediction errors, i.e., EP... 详细信息
来源: 评论