咨询与建议

限定检索结果

文献类型

  • 862 篇 会议
  • 414 篇 期刊文献

馆藏范围

  • 1,276 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 696 篇 工学
    • 520 篇 计算机科学与技术...
    • 431 篇 软件工程
    • 200 篇 信息与通信工程
    • 131 篇 电气工程
    • 83 篇 控制科学与工程
    • 77 篇 电子科学与技术(可...
    • 58 篇 生物工程
    • 46 篇 机械工程
    • 45 篇 网络空间安全
    • 34 篇 光学工程
    • 33 篇 仪器科学与技术
    • 33 篇 生物医学工程(可授...
    • 33 篇 安全科学与工程
    • 30 篇 交通运输工程
    • 24 篇 动力工程及工程热...
    • 23 篇 化学工程与技术
    • 18 篇 建筑学
    • 18 篇 土木工程
  • 309 篇 理学
    • 202 篇 数学
    • 72 篇 统计学(可授理学、...
    • 56 篇 生物学
    • 53 篇 物理学
    • 28 篇 系统科学
    • 20 篇 化学
  • 162 篇 管理学
    • 98 篇 管理科学与工程(可...
    • 83 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 33 篇 法学
    • 20 篇 社会学
  • 31 篇 医学
    • 27 篇 临床医学
    • 24 篇 基础医学(可授医学...
  • 8 篇 经济学
  • 7 篇 教育学
  • 7 篇 军事学
  • 4 篇 农学
  • 2 篇 文学

主题

  • 101 篇 feature extracti...
  • 76 篇 accuracy
  • 64 篇 semantics
  • 58 篇 computational mo...
  • 49 篇 training
  • 47 篇 deep learning
  • 47 篇 data models
  • 44 篇 federated learni...
  • 38 篇 neural networks
  • 37 篇 simulation
  • 28 篇 transformers
  • 27 篇 predictive model...
  • 26 篇 adaptation model...
  • 25 篇 privacy
  • 24 篇 object detection
  • 24 篇 optimization
  • 23 篇 visualization
  • 22 篇 benchmark testin...
  • 21 篇 noise
  • 21 篇 protocols

机构

  • 223 篇 key laboratory o...
  • 200 篇 shandong provinc...
  • 50 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 42 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 37 篇 school of comput...
  • 37 篇 shaanxi key labo...
  • 32 篇 shaanxi key labo...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 28 篇 shaanxi key labo...
  • 27 篇 shaanxi key labo...
  • 22 篇 school of comput...
  • 22 篇 shandong provinc...
  • 20 篇 key laboratory o...
  • 18 篇 school of comput...
  • 18 篇 xi'an key labora...
  • 18 篇 shaanxi key labo...
  • 15 篇 shandong fundame...

作者

  • 29 篇 yichuan wang
  • 24 篇 xinhong hei
  • 24 篇 ye yinghui
  • 24 篇 guangyue lu
  • 23 篇 fan jiang
  • 22 篇 wang yichuan
  • 20 篇 xiaoming wu
  • 20 篇 meng deyu
  • 19 篇 lu guangyue
  • 19 篇 shen yulong
  • 17 篇 hei xinhong
  • 16 篇 ma jianfeng
  • 15 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 14 篇 li wei
  • 14 篇 jin haiyan
  • 13 篇 guohua lv
  • 12 篇 lu wenpeng
  • 12 篇 xiaohui han
  • 12 篇 lei zhu

语言

  • 1,188 篇 英文
  • 73 篇 其他
  • 18 篇 中文
检索条件"机构=Shaanxi Key Laboratory for Network Computing and Security"
1276 条 记 录,以下是31-40 订阅
排序:
Fusion of Time-Frequency Features in Contrastive Learning for Shipboard Wind Speed Correction
收藏 引用
Journal of Ocean University of China 2025年 第2期24卷 377-386页
作者: SONG Jian HUANG Meng LI Xiang ZHANG Zhenqiang WANG Chunxiao ZHAO Zhigang Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science Center(National Supercomputer Center in Jinan)Qilu University of Technology(Shandong Academy of Sciences)Jinan 250000China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer ScienceJinan 250000China
Accurate wind speed measurements on maritime vessels are crucial for weather forecasting,sea state prediction,and safe ***,vessel motion and challenging environmental conditions often affect measurement *** address th... 详细信息
来源: 评论
key Management and Authentication Scheme Forward Trusted Pervasive Container computing  2
Key Management and Authentication Scheme Forward Trusted Per...
收藏 引用
2nd International Conference on Big Data and Privacy computing, BDPC 2024
作者: Hei, XinHong Xue, YuZhan Wang, YiChuan Liu, YiFan Peng, Chen Sun, Xiang School of Computer Science and Engineering Xi'an University of Technology Xi'an China School of Computer Science and Engineering Xi'an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China
Cloud computing technology is an internet-based computing model that provides high reliability and security measures, including data backup, secure access control, etc. As Docker containers play a increasingly importa... 详细信息
来源: 评论
Glare-SNet: Unsupervised Glare Suppression Balance network  27th
Glare-SNet: Unsupervised Glare Suppression Balance Network
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Li, Pei Zuo, Chengyu Wei, Wangjuan Pan, Xiaoying Wang, Zhanhao School of Computer Science and Technology Xi’an University of Posts and Telecommunications Xi’an710121 China Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi’an China Shaanxi Key Laboratory of Intelligent Media Computing and interaction Xi’an China Xi’an Key Laboratory of Big Data and Intelligent Computing Xi’an China
In light of the problems associated with glare and halo effects in low-light images, as well as the inadequacy of existing processing algorithms in handling details, a glare suppression balance network based on unsupe... 详细信息
来源: 评论
A Method for Removing Reflections from Water Surface Images Based on Pre-trained Image Restoration
A Method for Removing Reflections from Water Surface Images ...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Minghua Zhao Rui Zhi Shuangli Du Jing Hu Cheng Shi Lin Wang Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an University of Technology Xi’an China
Reflections on the water surface hinder the extraction of valuable information from water surface images. To remove reflections from water surface images, we construct a synthetic dataset and propose a multi-task netw... 详细信息
来源: 评论
Diffusion Model with Multi-layer Wavelet Transform for Low-Light Image Enhancement
Diffusion Model with Multi-layer Wavelet Transform for Low-L...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Haiyan Jin Jing Wang Fengyuan Zuo Haonan Su Zhaolin Xiao Bin Wang Yuanlin Zhang Xi’an University of Technology China Shaanxi Key Laboratory for Network Computing and Security Technology China
Low-light image enhancement methods based on diffusion models, though effective in improving image quality, often overrely on noise sensitivity and neglect the reconstruction deviations due to the naive up- and down-s... 详细信息
来源: 评论
Edge computing Task Scheduling with Joint Blockchain and Task Caching in Industrial Internet
收藏 引用
Computers, Materials & Continua 2023年 第4期75卷 2101-2117页
作者: Yanping Chen Xuyang Bai Xiaomin Jin Zhongmin Wang Fengwei Wang Li Ling School of Computer Science and Technology Xi’an University of Posts and TelecommunicationsXi’an710121China Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi’an710121China Xi’an Key Laboratory of Big Data and Intelligent Computing Xi’anShaanxi710121China ZTE Corporation Shenzhen51805China
Deploying task caching at edge servers has become an effectiveway to handle compute-intensive and latency-sensitive tasks on the industrialinternet. However, how to select the task scheduling location to reduce taskde... 详细信息
来源: 评论
A Semi-supervised Protein Complex Identification Algorithm Based on Sparseness Constraint
A Semi-supervised Protein Complex Identification Algorithm B...
收藏 引用
2024 International Conference on Applied Mathematics, Modelling and Statistics Application, AMMSA 2024
作者: Liu, Guangming Dang, Fengqing Wang, Bin Peng, Yonghong Wang, Xiaofan Tan, Li School of Computer Science and Engineering Shaanxi Key Laboratory for Network Computing and Security Technology Xi'An University of Technology Shaanxi Xi'an China Faculty of Science and Engineering Computing and Information Science Cambridge United Kingdom School of Computer and Information Engineering Beijing Technology and Business University Beijing China
Recognising protein complexes in protein interaction networks is crucial, but poses a major challenge due to the frequency of noisy interactions. These networks typically involve numerous protein complexes, with each ... 详细信息
来源: 评论
An Adaptive Residual Coordinate Attention-Based network for Hat and Mask Wearing Detection in Kitchen Environments
An Adaptive Residual Coordinate Attention-Based Network for ...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Zhao, Ying Wu, Xiaoming Liu, Xiangzhi Chen, Hao Qi, Bei Dong, Huomin Key Laboratory of Computing Power Network and Information Security Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
In order to ensure food safety, it is required for personnel to wear hats and masks during food handling processes. To accurately detect the wearing status of kitchen staff, the ARP-YOLO model is proposed. Firstly, im... 详细信息
来源: 评论
A Lightweight Node Verification and Protection Strategy for Edge computing  5
A Lightweight Node Verification and Protection Strategy for ...
收藏 引用
5th International Seminar on Artificial Intelligence, networking and Information Technology, AINIT 2024
作者: Du, Jiayuan Zhang, Guowei Qufu Normal University School of Cyber Science and Engineering Qufu China Key Laboratory of Computing Power Network and Information Security Jinan China
To alleviate the burden on the core network, edge computing has rapidly advanced to support distributed computing. However, as sensitive information is delegated to the edge layer closer to endpoints, the privacy prot... 详细信息
来源: 评论
Offloading Mode Hidden for Delay Sensitive Tasks in Edge computing networks  5
Offloading Mode Hidden for Delay Sensitive Tasks in Edge Com...
收藏 引用
5th International Seminar on Artificial Intelligence, networking and Information Technology, AINIT 2024
作者: Zhang, Guowei Du, Jiayuan Qufu Normal University School of Cyber Science and Engineering Qufu China Key Laboratory of Computing Power Network and Information Security Jinan China
Edge computing has been developed to support local services with lower burden to the core network. However, privacy issues deteriorate when terminal users enjoy the high-quality services with the price of sending thei... 详细信息
来源: 评论