咨询与建议

限定检索结果

文献类型

  • 862 篇 会议
  • 414 篇 期刊文献

馆藏范围

  • 1,276 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 696 篇 工学
    • 520 篇 计算机科学与技术...
    • 431 篇 软件工程
    • 200 篇 信息与通信工程
    • 131 篇 电气工程
    • 83 篇 控制科学与工程
    • 77 篇 电子科学与技术(可...
    • 58 篇 生物工程
    • 46 篇 机械工程
    • 45 篇 网络空间安全
    • 34 篇 光学工程
    • 33 篇 仪器科学与技术
    • 33 篇 生物医学工程(可授...
    • 33 篇 安全科学与工程
    • 30 篇 交通运输工程
    • 24 篇 动力工程及工程热...
    • 23 篇 化学工程与技术
    • 18 篇 建筑学
    • 18 篇 土木工程
  • 309 篇 理学
    • 202 篇 数学
    • 72 篇 统计学(可授理学、...
    • 56 篇 生物学
    • 53 篇 物理学
    • 28 篇 系统科学
    • 20 篇 化学
  • 162 篇 管理学
    • 98 篇 管理科学与工程(可...
    • 83 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 33 篇 法学
    • 20 篇 社会学
  • 31 篇 医学
    • 27 篇 临床医学
    • 24 篇 基础医学(可授医学...
  • 8 篇 经济学
  • 7 篇 教育学
  • 7 篇 军事学
  • 4 篇 农学
  • 2 篇 文学

主题

  • 101 篇 feature extracti...
  • 76 篇 accuracy
  • 64 篇 semantics
  • 58 篇 computational mo...
  • 49 篇 training
  • 47 篇 deep learning
  • 47 篇 data models
  • 44 篇 federated learni...
  • 38 篇 neural networks
  • 37 篇 simulation
  • 28 篇 transformers
  • 27 篇 predictive model...
  • 26 篇 adaptation model...
  • 25 篇 privacy
  • 24 篇 object detection
  • 24 篇 optimization
  • 23 篇 visualization
  • 22 篇 benchmark testin...
  • 21 篇 noise
  • 21 篇 protocols

机构

  • 223 篇 key laboratory o...
  • 200 篇 shandong provinc...
  • 50 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 42 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 37 篇 school of comput...
  • 37 篇 shaanxi key labo...
  • 32 篇 shaanxi key labo...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 28 篇 shaanxi key labo...
  • 27 篇 shaanxi key labo...
  • 22 篇 school of comput...
  • 22 篇 shandong provinc...
  • 20 篇 key laboratory o...
  • 18 篇 school of comput...
  • 18 篇 xi'an key labora...
  • 18 篇 shaanxi key labo...
  • 15 篇 shandong fundame...

作者

  • 29 篇 yichuan wang
  • 24 篇 xinhong hei
  • 24 篇 ye yinghui
  • 24 篇 guangyue lu
  • 23 篇 fan jiang
  • 22 篇 wang yichuan
  • 20 篇 xiaoming wu
  • 20 篇 meng deyu
  • 19 篇 lu guangyue
  • 19 篇 shen yulong
  • 17 篇 hei xinhong
  • 16 篇 ma jianfeng
  • 15 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 14 篇 li wei
  • 14 篇 jin haiyan
  • 13 篇 guohua lv
  • 12 篇 lu wenpeng
  • 12 篇 xiaohui han
  • 12 篇 lei zhu

语言

  • 1,188 篇 英文
  • 73 篇 其他
  • 18 篇 中文
检索条件"机构=Shaanxi Key Laboratory for Network Computing and Security"
1276 条 记 录,以下是1-10 订阅
排序:
Method and Practice of Trusted Embedded computing and Data Transmission Protection Architecture Based on Android
收藏 引用
Chinese Journal of Electronics 2024年 第3期33卷 623-634页
作者: Yichuan WANG Wen GAO Xinhong HEI Yanning DU School of Computer Science and Engineering Xi'an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology
In recent years,the rapid development of Internet technology has constantly enriched people's daily life and gradually changed from the traditional computer terminal to the mobile *** with it comes the security pr... 详细信息
来源: 评论
Diffusion Model with Multi-layer Wavelet Transform for Low-Light Image Enhancement
Diffusion Model with Multi-layer Wavelet Transform for Low-L...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Jin, Haiyan Wang, Jing Zuo, Fengyuan Su, Haonan Xiao, Zhaolin Wang, Bin Zhang, Yuanlin Xi'an University of Technology 710048 China Shaanxi Key Laboratory for Network Computing and Security Technology 710048 China
Low-light image enhancement methods based on diffusion models, though effective in improving image quality, often overrely on noise sensitivity and neglect the reconstruction deviations due to the naive up- and down-s... 详细信息
来源: 评论
Block-gram:Mining knowledgeable features for efficiently smart contract vulnerability detection
收藏 引用
Digital Communications and networks 2025年 第1期11卷 1-12页
作者: Xueshuo Xie Haolong Wang Zhaolong Jian Yaozheng Fang Zichun Wang Tao Li Tianjin Key Laboratory of Network and Data Security Technology TianjinChina College of Computer Science Nankai UniversityTianjinChina Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province China State Key Laboratory of Computer Architecture Institute of Computing TechnologyChinese Academy of SciencesChina
Smart contracts are widely used on the blockchain to implement complex transactions,such as decentralized applications on *** vulnerability detection of large-scale smart contracts is critical,as attacks on smart cont... 详细信息
来源: 评论
Textual Data De-Privatization Scheme Based on Generative Adversarial networks  24th
Textual Data De-Privatization Scheme Based on Generative Adv...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Du, Yanning Xu, Jinnan Zhang, Yaling Wang, Yichuan Wang, Zhoukai School of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China
In many fields, such as healthcare, finance, and scientific research, data sharing and collaboration are critical to achieving better outcomes. However, the sharing of personal data often involves privacy risks, so pr... 详细信息
来源: 评论
A Technique for Ensured Cross Chain IBC Transactions Using TPM  2
A Technique for Ensured Cross Chain IBC Transactions Using T...
收藏 引用
2nd International Conference on Big Data and Privacy computing, BDPC 2024
作者: Wang, YiChuan Yan, YiLiang Liu, XiaoXue Gao, Wen Wang, ZiYan School of Computer Science and Engineering Xi'an University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China
Cross chain contact across several blockchains becomes increasingly significant in importance with the increased use of blockchain technology. However, security cannot be assured when producing equivalent outputs thro... 详细信息
来源: 评论
Structure-based Street Tree Extraction from Mobile Laser Scanning Point Clouds  2022
Structure-based Street Tree Extraction from Mobile Laser Sca...
收藏 引用
5th International Conference on Image and Graphics Processing, ICIGP 2022
作者: Hao, Wen Zuo, Zhanbin Liang, Wei School of Computer Science and Engineering Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an University of Technology China Shaanxi Key Laboratory for Network Computing and Security Technology China
We present an automatic method based on structure analysis for extracting street trees from mobile laser scanning (MLS) data. Tree trunk and canopy can be characterized by the shape information and height above the gr... 详细信息
来源: 评论
Never Lost keys:A Novel key Generation Scheme Based on Motor Imagery EEG in End-Edge-Cloud System
收藏 引用
China Communications 2022年 第7期19卷 172-184页
作者: Yichuan Wang Dan Wu Xiaoxue Liu Xinhong Hei School of computer science and Engineering Xi’an University of TechnologyXi’an 710048China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an 710048China
Biometric key is generated from the user’s unique biometric features,and can effectively solve the security problems in ***,the current prevailing biometric key generation techniques such as fingerprint recognition a... 详细信息
来源: 评论
Locally differentially private high-dimensional data synthesis
收藏 引用
Science China(Information Sciences) 2023年 第1期66卷 25-42页
作者: Xue CHEN Cheng WANG Qing YANG Teng HU Changjun JIANG Key Laboratory of Embedded System and Service Computing (Tongji University) Ministry of Education National (Province-Ministry Joint) Collaborative Innovation Center for Financial Network Security Tongji University
In local differential privacy(LDP), a challenging problem is the ability to generate highdimensional data while efficiently capturing the correlation between attributes in a dataset. Existing solutions for low-dimensi... 详细信息
来源: 评论
DP-DID: A Dynamic and Proactive Decentralized Identity System
收藏 引用
IEEE Transactions on Information Forensics and security 2025年 20卷 4999-5014页
作者: Yin, Jie Xiao, Yang Chen, Qian Lim, Yong zhi Liu, Xuefeng Pei, Qingqi Zhou, Jianying Xidian University State Key Laboratory of Integrated Services Network Xi’an710071 China Singapore University of Technology and Design Department of Information Systems Technology and Design Tampines 487372 Singapore Xidian University State Key Laboratory of Integrated Services Network Shaanxi Key Laboratory of Blockchain and Secure Computing Xi’an710071 China
Decentralized identity (DID) is a transformative paradigm that leverages blockchain, decentralized identifiers and verifiable credentials (VCs) to enable self-sovereign and decentralized identity management with myria... 详细信息
来源: 评论
A Pseudonym Exchange-Based Traceable Location Privacy Protection Scheme for IoV
A Pseudonym Exchange-Based Traceable Location Privacy Protec...
收藏 引用
2023 International Conference on networking and network Applications, NaNA 2023
作者: Ma, Weigang Yu, Yaping Wang, Yichuan Liu, Xiaoxue Wang, Zhoukai School of Computer Science and Engineering Xi'an University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology China
Internet of Vehicles (IoV) is a network built by communicating entities such as vehicles and roadside infrastructure, etc. The entities can communicate with each other, sharing data and providing services. However, th... 详细信息
来源: 评论