咨询与建议

限定检索结果

文献类型

  • 640 篇 会议
  • 297 篇 期刊文献

馆藏范围

  • 937 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 493 篇 工学
    • 370 篇 计算机科学与技术...
    • 323 篇 软件工程
    • 137 篇 信息与通信工程
    • 101 篇 电气工程
    • 50 篇 控制科学与工程
    • 45 篇 电子科学与技术(可...
    • 44 篇 生物工程
    • 36 篇 机械工程
    • 36 篇 网络空间安全
    • 26 篇 生物医学工程(可授...
    • 25 篇 安全科学与工程
    • 24 篇 光学工程
    • 23 篇 交通运输工程
    • 21 篇 仪器科学与技术
    • 19 篇 化学工程与技术
    • 10 篇 土木工程
  • 228 篇 理学
    • 144 篇 数学
    • 49 篇 统计学(可授理学、...
    • 43 篇 生物学
    • 42 篇 物理学
    • 21 篇 系统科学
    • 16 篇 化学
  • 122 篇 管理学
    • 71 篇 管理科学与工程(可...
    • 67 篇 图书情报与档案管...
    • 21 篇 工商管理
  • 29 篇 医学
    • 23 篇 临床医学
    • 20 篇 基础医学(可授医学...
    • 11 篇 公共卫生与预防医...
  • 27 篇 法学
    • 16 篇 社会学
    • 13 篇 法学
  • 7 篇 经济学
  • 6 篇 教育学
  • 6 篇 军事学
  • 3 篇 农学

主题

  • 88 篇 feature extracti...
  • 72 篇 accuracy
  • 61 篇 semantics
  • 53 篇 computational mo...
  • 46 篇 data models
  • 43 篇 training
  • 38 篇 federated learni...
  • 37 篇 deep learning
  • 33 篇 neural networks
  • 26 篇 transformers
  • 25 篇 predictive model...
  • 23 篇 adaptation model...
  • 20 篇 object detection
  • 20 篇 data mining
  • 20 篇 benchmark testin...
  • 19 篇 speech processin...
  • 19 篇 visualization
  • 19 篇 privacy
  • 18 篇 convolution
  • 18 篇 optimization

机构

  • 218 篇 key laboratory o...
  • 197 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 41 篇 shaanxi key labo...
  • 37 篇 shandong fundame...
  • 37 篇 school of comput...
  • 34 篇 school of comput...
  • 32 篇 shaanxi key labo...
  • 28 篇 qilu university ...
  • 28 篇 shandong provinc...
  • 19 篇 school of comput...
  • 19 篇 shandong provinc...
  • 18 篇 school of comput...
  • 17 篇 shaanxi key labo...
  • 16 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 tianjin key labo...
  • 14 篇 xi'an key labora...
  • 14 篇 qilu university ...

作者

  • 28 篇 yichuan wang
  • 24 篇 xinhong hei
  • 23 篇 wang yichuan
  • 20 篇 xiaoming wu
  • 16 篇 haiyan jin
  • 16 篇 hei xinhong
  • 15 篇 xiangzhi liu
  • 15 篇 shen yulong
  • 14 篇 meng deyu
  • 14 篇 li wei
  • 13 篇 guohua lv
  • 13 篇 jin haiyan
  • 13 篇 wenpeng lu
  • 12 篇 lu wenpeng
  • 12 篇 lei zhu
  • 12 篇 aimin li
  • 11 篇 wang lei
  • 11 篇 jing zhao
  • 11 篇 chen yanping
  • 11 篇 xiaohui han

语言

  • 874 篇 英文
  • 53 篇 其他
  • 12 篇 中文
检索条件"机构=Shaanxi Key Laboratory for Network Computing and Security Technology"
937 条 记 录,以下是1-10 订阅
排序:
HTC-HAD: A Hybrid Transformer-CNN Approach for Hyperspectral Anomaly Detection
收藏 引用
IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing 2025年 18卷 10144-10156页
作者: Zhao, Minghua Zheng, Wen Hu, Jing Xi'an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology School of Computer Science and Engineering Xi'an710048 China
Hyperspectral anomaly detection (HAD) identifies anomalies by analyzing differences between anomalies and background pixels without prior information, presenting a significant challenge. Most existing studies leverage... 详细信息
来源: 评论
Diffusion Model with Multi-layer Wavelet Transform for Low-Light Image Enhancement
Diffusion Model with Multi-layer Wavelet Transform for Low-L...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Jin, Haiyan Wang, Jing Zuo, Fengyuan Su, Haonan Xiao, Zhaolin Wang, Bin Zhang, Yuanlin Xi'an University of Technology 710048 China Shaanxi Key Laboratory for Network Computing and Security Technology 710048 China
Low-light image enhancement methods based on diffusion models, though effective in improving image quality, often overrely on noise sensitivity and neglect the reconstruction deviations due to the naive up- and down-s... 详细信息
来源: 评论
Block-gram:Mining knowledgeable features for efficiently smart contract vulnerability detection
收藏 引用
Digital Communications and networks 2025年 第1期11卷 1-12页
作者: Xueshuo Xie Haolong Wang Zhaolong Jian Yaozheng Fang Zichun Wang Tao Li Tianjin Key Laboratory of Network and Data Security Technology TianjinChina College of Computer Science Nankai UniversityTianjinChina Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province China State Key Laboratory of Computer Architecture Institute of Computing TechnologyChinese Academy of SciencesChina
Smart contracts are widely used on the blockchain to implement complex transactions,such as decentralized applications on *** vulnerability detection of large-scale smart contracts is critical,as attacks on smart cont... 详细信息
来源: 评论
Textual Data De-Privatization Scheme Based on Generative Adversarial networks  24th
Textual Data De-Privatization Scheme Based on Generative Adv...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Du, Yanning Xu, Jinnan Zhang, Yaling Wang, Yichuan Wang, Zhoukai School of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China
In many fields, such as healthcare, finance, and scientific research, data sharing and collaboration are critical to achieving better outcomes. However, the sharing of personal data often involves privacy risks, so pr... 详细信息
来源: 评论
Enabling Intelligent Connectivity: A Survey of Secure ISAC in 6G networks
收藏 引用
IEEE Communications Surveys and Tutorials 2025年 第2期27卷 748-781页
作者: Zhu, Xiaoqiang Liu, Jiqiang Lu, Lingyun Zhang, Tao Qiu, Tie Wang, Chunpeng Liu, Yuan Beijing Jiaotong University School of Software Engineering Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing100044 China Tianjin University College of Intelligence and Computing Tianjin300350 China Qilu University of Technology School of Cyber Security and the Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan250353 China
The rapid growth of intelligent sensing capabilities and super computation power in 6G mobile communication systems has facilitated their application in diverse domains such as smart health, smart factories, and the i... 详细信息
来源: 评论
Hedonic Coalition Formation Game and Contract-Based Federated Learning in AAV-Assisted Internet of Things
收藏 引用
IEEE Internet of Things Journal 2025年 第9期12卷 11258-11272页
作者: Liu, Jia Li, Xiaoxu Xu, Yang Lyu, Chen Wang, Yichuan Liu, Xiaoying Xidian University School of Computer Science and Technology Xi’an710071 China Shanghai University of Finance and Economics School of Computing and Artificial Intelligence MoE Key Laboratory of Interdisciplinary Research of Computation and Economics Shanghai200433 China Xi’an University of Technology Shaanxi Key Laboratory of Network Computing and Security Technology Xi’an710071 China Zhejiang University of Technology School of Computer Science and Technology Hangzhou310023 China
Coupled with the rise of Deep Learning, the wealth of data and enhanced computation capabilities of Internet of Things (IoT) components enable effective artificial intelligence (AI)-based models to be built. Beyond gr... 详细信息
来源: 评论
1+1>2: A Dual-Function Defense Framework for Adversarial Example Mitigation
收藏 引用
IEEE Transactions on Information Forensics and security 2025年 20卷 4121-4136页
作者: Yang, Rui Sun, Qindong Cao, Han Shen, Chao Cai, Jiaming Rong, Dongzhu Xi’an Jiaotong University School of Cyber Science and Engineering Xi’an710049 China Xi’an University of Technology Shaanxi Key Laboratory of Network Computing and Security Xi’an710049 China Xi’an Jiaotong University School of Software Engineering Xi’an710049 China
Current state-of-the-art plug-and-play countermeasures for mitigating adversarial examples (i.e., purification and detection) exhibit several fatal limitations, impeding their deployment in safety-critical real-world ... 详细信息
来源: 评论
RF-Sauron:Enabling Contact-Free Interaction on Eyeglass Using Conformal RFID Tag
收藏 引用
IEEE Internet of Things Journal 2025年 第10期12卷 14320-14332页
作者: Yang, Baizhou Chen, Ling Peng, Xiaopeng Chen, Jiashen Tang, Yani Wang, Wei Fang, Dingyi Feng, Chao Northwest University Shaanxi Key Laboratory of Passive Internet of Things and Neural Computing School of Information Science and Technology Xi'an710127 China Northwest University Xi'an Key Laboratory of Advanced Computing and Software Security School of Information Science and Technology Xi'an710127 China Rochester Institute of Technology RochesterNY14623 United States Northwest University Xi'an Key Laboratory of Advanced Computing and System Security School of Information Science and Technology Xi'an710127 China Northwest University Shaanxi International Joint Research Centre for the Battery-Free Internet of Things School of Information Science and Technology Xi'an710127 China
Smart eyeglasses are emerging as a new medium for human-computer interaction. Existing solutions typically rely on cameras or touchpads, raising privacy invasion concerns or requiring users to physically interact with... 详细信息
来源: 评论
Underwater target recognition based on adaptive multi-feature fusion network
收藏 引用
Multimedia Tools and Applications 2025年 第10期84卷 7297-7317页
作者: Pan, Xiaoying Sun, Jia Feng, TianHao Lei, MingZhu Wang, Hao Zhang, WuXia Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi’an710121 China Xi’an Key Laboratory of Big Data and Intelligent Computing Xi’an710121 China School of Computer Science and Technology Xi’an University of Post & Telecommunications Xi’an710121 China
Due to the complexity of the underwater environment, underwater acoustic target recognition is more challenging than ordinary target recognition, and has become a hot topic in the field of underwater acoustics researc... 详细信息
来源: 评论
A Method for Removing Reflections from Water Surface Images Based on Pre-trained Image Restoration
A Method for Removing Reflections from Water Surface Images ...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Minghua Zhao Rui Zhi Shuangli Du Jing Hu Cheng Shi Lin Wang Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an University of Technology Xi’an China
Reflections on the water surface hinder the extraction of valuable information from water surface images. To remove reflections from water surface images, we construct a synthetic dataset and propose a multi-task netw... 详细信息
来源: 评论