咨询与建议

限定检索结果

文献类型

  • 916 篇 会议
  • 426 篇 期刊文献

馆藏范围

  • 1,342 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 711 篇 工学
    • 534 篇 计算机科学与技术...
    • 436 篇 软件工程
    • 206 篇 信息与通信工程
    • 131 篇 电气工程
    • 83 篇 控制科学与工程
    • 79 篇 电子科学与技术(可...
    • 58 篇 生物工程
    • 46 篇 机械工程
    • 45 篇 网络空间安全
    • 34 篇 光学工程
    • 32 篇 仪器科学与技术
    • 32 篇 交通运输工程
    • 32 篇 安全科学与工程
    • 31 篇 生物医学工程(可授...
    • 25 篇 动力工程及工程热...
    • 25 篇 化学工程与技术
    • 16 篇 建筑学
    • 16 篇 土木工程
  • 317 篇 理学
    • 204 篇 数学
    • 73 篇 统计学(可授理学、...
    • 57 篇 物理学
    • 57 篇 生物学
    • 28 篇 系统科学
    • 22 篇 化学
  • 162 篇 管理学
    • 97 篇 管理科学与工程(可...
    • 83 篇 图书情报与档案管...
    • 32 篇 工商管理
  • 33 篇 法学
    • 20 篇 社会学
  • 31 篇 医学
    • 27 篇 临床医学
    • 24 篇 基础医学(可授医学...
  • 9 篇 教育学
  • 7 篇 经济学
  • 7 篇 军事学
  • 4 篇 农学
  • 2 篇 文学

主题

  • 112 篇 feature extracti...
  • 101 篇 accuracy
  • 70 篇 computational mo...
  • 68 篇 semantics
  • 67 篇 federated learni...
  • 55 篇 training
  • 53 篇 data models
  • 47 篇 deep learning
  • 40 篇 neural networks
  • 38 篇 simulation
  • 37 篇 transformers
  • 33 篇 adaptation model...
  • 31 篇 optimization
  • 31 篇 privacy
  • 29 篇 robustness
  • 28 篇 predictive model...
  • 27 篇 real-time system...
  • 26 篇 object detection
  • 25 篇 visualization
  • 25 篇 measurement

机构

  • 267 篇 key laboratory o...
  • 204 篇 shandong provinc...
  • 56 篇 shandong provinc...
  • 51 篇 shandong enginee...
  • 50 篇 shandong fundame...
  • 43 篇 shaanxi key labo...
  • 39 篇 school of comput...
  • 38 篇 school of comput...
  • 38 篇 shaanxi key labo...
  • 33 篇 shandong provinc...
  • 32 篇 shaanxi key labo...
  • 30 篇 shaanxi key labo...
  • 27 篇 qilu university ...
  • 27 篇 shaanxi key labo...
  • 20 篇 key laboratory o...
  • 20 篇 school of comput...
  • 20 篇 xi'an university...
  • 19 篇 school of comput...
  • 17 篇 shaanxi key labo...
  • 16 篇 xi'an key labora...

作者

  • 29 篇 yichuan wang
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 24 篇 guangyue lu
  • 23 篇 fan jiang
  • 23 篇 ye yinghui
  • 23 篇 wang yichuan
  • 21 篇 lu guangyue
  • 20 篇 meng deyu
  • 19 篇 shen yulong
  • 18 篇 xiangzhi liu
  • 18 篇 hei xinhong
  • 16 篇 ma jianfeng
  • 15 篇 haiyan jin
  • 14 篇 li wei
  • 14 篇 aimin li
  • 13 篇 lu wenpeng
  • 13 篇 guohua lv
  • 13 篇 lianhai wang
  • 13 篇 xiaohui han

语言

  • 1,136 篇 英文
  • 190 篇 其他
  • 22 篇 中文
检索条件"机构=Shaanxi Key Laboratory for Network Computing and Security"
1342 条 记 录,以下是61-70 订阅
排序:
QoS-Aware Offloading Based on Communication-Computation Resource Coordination for 6G Edge Intelligence
收藏 引用
China Communications 2023年 第3期20卷 236-251页
作者: Chaowei Wang Xiaofei Yu Lexi Xu Fan Jiang Weidong Wang Xinzhou Cheng School of Electronic Engineering Beijing University of Posts and TelecommunicationsBeijing 100876China Shaanxi Key Laboratory of Information Communication Network and Security Xi’an University of Posts and TelecommunicationsXi’an 710121China Research Institute China United Network Communications CorporationBeijing 100048China
Driven by the demands of diverse artificial intelligence(AI)-enabled application,Mobile Edge computing(MEC)is considered one of the key technologies for 6G edge *** this paper,we consider a serial task model and desig... 详细信息
来源: 评论
A Concatenated Mapping ZC Sequences Based Large-Capacity Grant-Free Random Access Preamble Design Method for Satellite Internet of Things  7
A Concatenated Mapping ZC Sequences Based Large-Capacity Gra...
收藏 引用
7th IEEE International Conference on Electronic Information and Communication Technology, ICEICT 2024
作者: Ma, Mingke Zhen, Li Li, Shuchang Pei, Chenchen Qin, Hao Xi'an University of Posts and Telecommunications Shaanxi Key Laboratory of Information Communication Network and Security Xi'an China Xidian University School of Telecommunication Engineering Xi'an China
Satellite communication has garnered widespread attention due to its wide coverage and flexible deployment, and is expected to be a promising solution for achieving reliable access of ubiquitous Internet of Things (Io... 详细信息
来源: 评论
Channel Capacity Analysis for Diffusive Molecular Communication with a Partly Covered Comprehensive Reactive Receiver
Channel Capacity Analysis for Diffusive Molecular Communicat...
收藏 引用
2022 International Conference on networking and network Applications, NaNA 2022
作者: Zhu, Junning Liao, Xuening Wu, Zhenqiang Key Laboratory of Modern Teaching Technology Ministry of Education Xi’an China School of Computer Science Shaanxi Normal University Xi’an China Shaanxi Key Laboratory for Network Computing and Security Shaanxi Xi’an710048 China
Molecular communication (MC) is a technology that utilizes microscopic particles such as molecules to communicate at the microscopic scale in living organisms. The nanomachine receiver as a critical part of MC has bee... 详细信息
来源: 评论
TCS security Analysis in Intel SGX Enclave MultiThreading
TCS Security Analysis in Intel SGX Enclave MultiThreading
收藏 引用
2022 International Conference on networking and network Applications, NaNA 2022
作者: Zhang, Tong Cui, Xiangjie Wang, Yichuan Du, Yanning Gao, Wen School of Computer Science and Engineering Xi'an University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology China
With the rapid development of Internet Technology in recent years, the demand for security support for complex applications is becoming stronger and stronger. Intel Software Guard Extensions (Intel SGX) is created as ... 详细信息
来源: 评论
TAKAP: A Lightweight Three-Party Authenticated key Agreement Protocol with User Anonymity
收藏 引用
Chinese Journal of Electronics 2021年 第4期30卷 686-696页
作者: QIAO Hui DONG Xuewen SHEN Yulong LIU Haozhe YANG Lingxiao School of Computer Science and Technology Xidian University Shaanxi Key Laboratory of Network and System Security Xidian University
The three-party authenticated key agreement protocol is a significant cryptographic mechanism for secure communication, which encourages two entities to authenticate each other and generate a shared session key with t... 详细信息
来源: 评论
Review of Static Image Compression Algorithms  7
Review of Static Image Compression Algorithms
收藏 引用
7th IEEE Advanced Information Technology, Electronic and Automation Control Conference, IAEAC 2024
作者: Liang, Yanxia Jia, Tong Li, Na Liu, Xin Jiang, Jing Lu, Guangyue Zhao, Meng Xi'an University of Posts and Telecommunications Shaanxi Key Laboratory of Information Communication Network and Security Xi'an China Xi'an Eurasia University College of Information Engineering Xi'an China
With the increasing development of digital image communication technology, the requirements for image quality, such as texture details, color levels, and dynamic range, are gradually increasing. This presents unpreced... 详细信息
来源: 评论
A Multi-Exposure Generation and Fusion Method for Low-Light Image Enhancement
A Multi-Exposure Generation and Fusion Method for Low-Light ...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Haiyan Jin Long Li Haonan Su YuanLin Zhang ZhaoLin Xiao Bin Wang Faculty of Computer Science and Engineering Xi’an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology
In the low light image enhancement, single exposure images contains a limited dynamic range, which hinders the restoration of contrast and texture. To address these problems, we propose a multi exposure generation and... 详细信息
来源: 评论
MMH-FE:AMulti-Precision and Multi-Sourced Heterogeneous Privacy-Preserving Neural network Training Based on Functional Encryption
收藏 引用
Computers, Materials & Continua 2025年 第3期82卷 5387-5405页
作者: Hao Li Kuan Shao Xin Wang Mufeng Wang Zhenyong Zhang The State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang550025China Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science CenterQilu University of Technology(Shandong Academy of Sciences)Jinan250014China China Industrial Control Systems Cyber Emergency Response Team Beijing100040China
Due to the development of cloud computing and machine learning,users can upload their data to the cloud for machine learning model ***,dishonest clouds may infer user data,resulting in user data *** schemes have achie... 详细信息
来源: 评论
A generalized reliability analysis of 3-ary n-cubes  16
A generalized reliability analysis of 3-ary n-cubes
收藏 引用
16th International Conference on Communication Software and networks, ICCSN 2024
作者: Bai, Zefang Wang, Guijuan Ma, Meijie School of Mathematics and Statistics Jinan250353 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250353 China
Evaluating the reliability of interconnection networks is crucial. The edge-connectivity is a parameter used to assess reliability. In this paper, we discuss a conditional edge-connectivity called the h-extra g-compon... 详细信息
来源: 评论
An attention-based cascade R-CNN model for sternum fracture detection in X-ray images
收藏 引用
CAAI Transactions on Intelligence Technology 2022年 第4期7卷 658-670页
作者: Yang Jia Haijuan Wang Weiguang Chen Yagang Wang Bin Yang School of Computer Xi'an University of Posts and TelecommunicationsXi'anShaanxiChina Shaanxi Key Laboratory of Network Data Intelligent Processing Xi'an University of Posts and TelecommunicationsXi'anShaanxiChina Xi'an Key Laboratory of Big Data and Intelligent Computing Xi'anShaanxiChina Department of Radiology Xi'an Honghui HospitalXi'anChina
Fracture is one of the most common and unexpected *** not treated in time,it may cause serious consequences such as joint stiffness,traumatic arthritis,and nerve *** computer vision technology to detect fractures can ... 详细信息
来源: 评论