咨询与建议

限定检索结果

文献类型

  • 877 篇 会议
  • 431 篇 期刊文献

馆藏范围

  • 1,308 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 725 篇 工学
    • 545 篇 计算机科学与技术...
    • 445 篇 软件工程
    • 211 篇 信息与通信工程
    • 136 篇 电气工程
    • 93 篇 控制科学与工程
    • 83 篇 电子科学与技术(可...
    • 58 篇 生物工程
    • 48 篇 网络空间安全
    • 47 篇 机械工程
    • 34 篇 光学工程
    • 34 篇 安全科学与工程
    • 33 篇 交通运输工程
    • 33 篇 生物医学工程(可授...
    • 32 篇 仪器科学与技术
    • 26 篇 动力工程及工程热...
    • 24 篇 化学工程与技术
    • 18 篇 建筑学
    • 18 篇 土木工程
  • 314 篇 理学
    • 204 篇 数学
    • 71 篇 统计学(可授理学、...
    • 56 篇 生物学
    • 55 篇 物理学
    • 28 篇 系统科学
    • 22 篇 化学
  • 167 篇 管理学
    • 99 篇 管理科学与工程(可...
    • 87 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 33 篇 法学
    • 20 篇 社会学
  • 32 篇 医学
    • 27 篇 临床医学
    • 24 篇 基础医学(可授医学...
  • 8 篇 教育学
  • 7 篇 经济学
  • 7 篇 军事学
  • 4 篇 农学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 101 篇 feature extracti...
  • 77 篇 accuracy
  • 64 篇 semantics
  • 58 篇 computational mo...
  • 48 篇 training
  • 47 篇 deep learning
  • 47 篇 data models
  • 45 篇 federated learni...
  • 38 篇 neural networks
  • 37 篇 simulation
  • 28 篇 transformers
  • 27 篇 predictive model...
  • 26 篇 privacy
  • 26 篇 adaptation model...
  • 24 篇 object detection
  • 24 篇 optimization
  • 22 篇 benchmark testin...
  • 22 篇 visualization
  • 21 篇 noise
  • 21 篇 security

机构

  • 230 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 52 篇 shandong fundame...
  • 45 篇 shandong enginee...
  • 43 篇 shaanxi key labo...
  • 39 篇 school of comput...
  • 39 篇 school of comput...
  • 37 篇 shaanxi key labo...
  • 33 篇 shaanxi key labo...
  • 29 篇 shaanxi key labo...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 27 篇 shandong provinc...
  • 27 篇 shaanxi key labo...
  • 21 篇 school of comput...
  • 20 篇 key laboratory o...
  • 19 篇 school of comput...
  • 19 篇 xi'an university...
  • 18 篇 xi'an key labora...
  • 18 篇 shaanxi key labo...

作者

  • 29 篇 yichuan wang
  • 24 篇 xinhong hei
  • 24 篇 guangyue lu
  • 23 篇 fan jiang
  • 23 篇 ye yinghui
  • 23 篇 wang yichuan
  • 21 篇 lu guangyue
  • 20 篇 xiaoming wu
  • 20 篇 meng deyu
  • 19 篇 shen yulong
  • 18 篇 hei xinhong
  • 16 篇 ma jianfeng
  • 15 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 14 篇 lu wenpeng
  • 14 篇 li wei
  • 13 篇 guohua lv
  • 13 篇 mingle zhou
  • 13 篇 jin haiyan
  • 13 篇 aimin li

语言

  • 1,174 篇 英文
  • 119 篇 其他
  • 18 篇 中文
检索条件"机构=Shaanxi Key Laboratory for Network Computing and Security"
1308 条 记 录,以下是71-80 订阅
排序:
An attention-based cascade R-CNN model for sternum fracture detection in X-ray images
收藏 引用
CAAI Transactions on Intelligence Technology 2022年 第4期7卷 658-670页
作者: Yang Jia Haijuan Wang Weiguang Chen Yagang Wang Bin Yang School of Computer Xi'an University of Posts and TelecommunicationsXi'anShaanxiChina Shaanxi Key Laboratory of Network Data Intelligent Processing Xi'an University of Posts and TelecommunicationsXi'anShaanxiChina Xi'an Key Laboratory of Big Data and Intelligent Computing Xi'anShaanxiChina Department of Radiology Xi'an Honghui HospitalXi'anChina
Fracture is one of the most common and unexpected *** not treated in time,it may cause serious consequences such as joint stiffness,traumatic arthritis,and nerve *** computer vision technology to detect fractures can ... 详细信息
来源: 评论
A generalized reliability analysis of 3-ary n-cubes  16
A generalized reliability analysis of 3-ary n-cubes
收藏 引用
16th International Conference on Communication Software and networks, ICCSN 2024
作者: Bai, Zefang Wang, Guijuan Ma, Meijie School of Mathematics and Statistics Jinan250353 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250353 China
Evaluating the reliability of interconnection networks is crucial. The edge-connectivity is a parameter used to assess reliability. In this paper, we discuss a conditional edge-connectivity called the h-extra g-compon... 详细信息
来源: 评论
Multimodal Multi-objective Particle Swarm Optimization Algorithm Based on Multi-directional Guidance  4
Multimodal Multi-objective Particle Swarm Optimization Algor...
收藏 引用
4th International Conference on High Performance Big Data and Intelligent Systems, HDIS 2022
作者: Li, Wei Gao, Yetong Wang, Lei School of Computer Science and Engineering Xi'an University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China
In multimodal multi-objective optimization, the key issue is to find as many Pareto optimal solutions as possible and select promising solutions in the environmental selection. This paper proposes a multimodal multi-o... 详细信息
来源: 评论
A Sharding Scheme Based on Graph Partitioning Algorithm for Public Blockchain
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第6期139卷 3311-3327页
作者: Shujiang Xu Ziye Wang Lianhai Wang Miodrag J.Mihaljevi′c Shuhui Zhang Wei Shao Qizheng Wang Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science CenterQilu University of Technology(Shandong Academy of Sciences)Jinan250014China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer ScienceJinan250014China Mathematical Institute The Serbian Academy of Sciences and ArtsBelgrade11000Serbia
Blockchain technology,with its attributes of decentralization,immutability,and traceability,has emerged as a powerful catalyst for enhancing traditional industries in terms of optimizing business ***,transaction perfo... 详细信息
来源: 评论
Block-Streaming Service Loading Optimization of Android Dalvik Executable File for Cloud-End Collaboration
Block-Streaming Service Loading Optimization of Android Dalv...
收藏 引用
2022 International Conference on networking and network Applications, NaNA 2022
作者: Wang, Yichuan Feng, Yanhua Du, Yanning Hei, Xinhong Tian, Yuying Cui, Xiangjie School of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China
In recent years, dynamic loading technologies of Android applications have emerged in an endless stream. At present, the existing Android application loading method is to load the entire Android Dalvik Executable (DEX... 详细信息
来源: 评论
Maximizing Area Coverage in Privacy-Preserving Worker Recruitment: A Prior Knowledge-Enhanced Geo-Indistinguishable Approach
收藏 引用
IEEE Transactions on Information Forensics and security 2025年 20卷 5138-5151页
作者: Zhang, Pengfei Cheng, Xiang Zhang, Zhikun Zhu, Youwen Zhang, Ji Yunnan University of Finance and Economics Yunnan Key Laboratory of Service Computing Yunnan Kunming650221 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan250316 China Ministry of Education Key Laboratory of Equipment Data Security and Guarantee Technology Guilin541004 China Beijing University of Posts and Telecommunications Beijing100876 China Zhejiang University School of Computer Science and Technology Hangzhou310027 China Nanjing University of Aeronautics and Astronautics School of Computer Science and Technology Nanjing210016 China University of Southern Queensland School of Mathematics Physics and Computing ToowoombaQLD4350 Australia
Worker recruitment for area coverage maximization, typically requires participants to upload location information, which can deter potential participation without proper protection. While existing studies resort to ge... 详细信息
来源: 评论
AMHF-TP:Multifunctional therapeutic peptides prediction based on multi-granularity hierarchical features
收藏 引用
Quantitative Biology 2025年 第1期13卷 127-141页
作者: Shouheng Tuo YanLing Zhu Jiangkun Lin Jiewei Jiang School of Computer Science and Technology Xi’an University of Posts and TelecommunicationsXi’anChina Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi’anChina Xi’an Key Laboratory of Big Data and Intelligent Computing Xi’anChina School of Electronic Engineering Xi’an University of Posts and TelecommunicationsXi’anChina
Multifunctional therapeutic peptides(MFTP)hold immense potential in diverse therapeutic contexts,yet their prediction and identification remain challenging due to the limitations of traditional methodologies,such as e... 详细信息
来源: 评论
Neural network-Based State Estimation for Nonlinear Systems With Denial-of-Service Attack Under Try-Once-Discard Protocol
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第10期11卷 2182-2184页
作者: Xueli Wang Shangwei Zhao Ming Yang Xin Wang Xiaoming Wu the Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science CenterQilu University of Technology(Shandong Academy of Sciences)Jinan 250014 Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer ScienceJinan 250014China Department of Automation Shanghai Jiao Tong UniversityShanghai 200240China
Dear Editor,This letter deals with state estimation issues of discrete-time nonlinear systems subject to denial-of-service(DoS)attacks under the try-once-discard(TOD)*** specifically,to reduce the communication burden... 详细信息
来源: 评论
Collaborative Caching in Vehicular Edge network Assisted by Cell-Free Massive MIMO
收藏 引用
Chinese Journal of Electronics 2023年 第6期32卷 1218-1229页
作者: WANG Chaowei WANG Ziye XU Lexi YU Xiaofei ZHANG Zhi WANG Weidong School of Electronic Engineering Beijing University of Posts and Telecommunications Shaanxi Key Laboratory of Information Communication Network and Security Xi'an University of Posts and Telecommunications Research Institute China United Network Communications Corporation School of Information and Communication Engineering Beijing University of Posts and Telecommunications
The 6G mobile communications demand lower content delivery latency and higher quality of service for vehicular edge network. With the popularity of content-centric networks, mobile users are paying more and more atten... 详细信息
来源: 评论
Formal Modeling and Defense Methods for 5G network Endpoint Access Denial of Service Attacks
Formal Modeling and Defense Methods for 5G Network Endpoint ...
收藏 引用
2023 International Conference on networking and network Applications, NaNA 2023
作者: Zhang, Tong Wei, Wei Wang, Yichuan Deng, Xi Zhu, Lei Ji, Wenjiang School of Computer Science and Engineering Xi'an University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technolog Xi'an China School of Computer Science Xi'an Shiyou University Xi'an China
5G terminal access denial-of-service attack is one of the more common types of 5G signaling network attacks. It manifests itself as a large number of abnormal access requests occupying core network resources. Normal r... 详细信息
来源: 评论