咨询与建议

限定检索结果

文献类型

  • 640 篇 会议
  • 298 篇 期刊文献

馆藏范围

  • 938 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 494 篇 工学
    • 368 篇 计算机科学与技术...
    • 320 篇 软件工程
    • 133 篇 信息与通信工程
    • 99 篇 电气工程
    • 48 篇 控制科学与工程
    • 45 篇 生物工程
    • 43 篇 电子科学与技术(可...
    • 36 篇 机械工程
    • 33 篇 网络空间安全
    • 27 篇 生物医学工程(可授...
    • 26 篇 光学工程
    • 25 篇 安全科学与工程
    • 24 篇 交通运输工程
    • 21 篇 仪器科学与技术
    • 19 篇 化学工程与技术
    • 13 篇 土木工程
    • 11 篇 建筑学
  • 229 篇 理学
    • 144 篇 数学
    • 49 篇 统计学(可授理学、...
    • 43 篇 生物学
    • 42 篇 物理学
    • 22 篇 系统科学
    • 16 篇 化学
  • 122 篇 管理学
    • 73 篇 管理科学与工程(可...
    • 65 篇 图书情报与档案管...
    • 22 篇 工商管理
  • 29 篇 医学
    • 23 篇 临床医学
    • 20 篇 基础医学(可授医学...
  • 27 篇 法学
    • 16 篇 社会学
    • 13 篇 法学
  • 7 篇 经济学
  • 6 篇 教育学
  • 6 篇 军事学
  • 3 篇 农学

主题

  • 88 篇 feature extracti...
  • 72 篇 accuracy
  • 61 篇 semantics
  • 53 篇 computational mo...
  • 46 篇 data models
  • 43 篇 training
  • 38 篇 federated learni...
  • 37 篇 deep learning
  • 33 篇 neural networks
  • 26 篇 transformers
  • 25 篇 predictive model...
  • 23 篇 adaptation model...
  • 20 篇 object detection
  • 20 篇 data mining
  • 20 篇 benchmark testin...
  • 19 篇 speech processin...
  • 19 篇 visualization
  • 19 篇 privacy
  • 18 篇 convolution
  • 18 篇 optimization

机构

  • 219 篇 key laboratory o...
  • 198 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 41 篇 shaanxi key labo...
  • 37 篇 shandong fundame...
  • 37 篇 school of comput...
  • 34 篇 school of comput...
  • 32 篇 shaanxi key labo...
  • 28 篇 qilu university ...
  • 28 篇 shandong provinc...
  • 19 篇 school of comput...
  • 19 篇 school of comput...
  • 19 篇 shandong provinc...
  • 18 篇 shaanxi key labo...
  • 16 篇 key laboratory o...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 15 篇 xi'an key labora...
  • 14 篇 tianjin key labo...
  • 14 篇 qilu university ...

作者

  • 28 篇 yichuan wang
  • 23 篇 xinhong hei
  • 23 篇 wang yichuan
  • 20 篇 xiaoming wu
  • 17 篇 hei xinhong
  • 16 篇 haiyan jin
  • 15 篇 xiangzhi liu
  • 15 篇 shen yulong
  • 14 篇 meng deyu
  • 14 篇 li wei
  • 13 篇 guohua lv
  • 13 篇 jin haiyan
  • 13 篇 wenpeng lu
  • 12 篇 lei zhu
  • 12 篇 aimin li
  • 11 篇 wang lei
  • 11 篇 lu wenpeng
  • 11 篇 jing zhao
  • 11 篇 chen yanping
  • 11 篇 xiaohui han

语言

  • 872 篇 英文
  • 55 篇 其他
  • 13 篇 中文
检索条件"机构=Shaanxi Key Laboratory for Network Computing and Security Technology"
938 条 记 录,以下是141-150 订阅
排序:
Auction Theory and Game Theory Based Pricing of Edge computing Resources: A Survey
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Yu, Jiguo Liu, Shun Zou, Yifei Wang, Guijuan Hu, Chunqiang University of Electronic Science and Technology of China School of Information and Software Engineering Chengdu610054 China Qilu University of Technology Big Data Institute Jinan250353 China Qufu Normal University School of Computer Science Shandong Rizhao China Shandong University School of Computer Science and Technology Shandong Qingdao266237 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan250353 China Chongqing University School of Big Data and Software Engineering Chongqing400044 China
The proliferation of Internet of Things (IoT) devices and edge computing applications has heightened the demand for efficient resource allocation and pricing mechanisms. Effective pricing strategies play a crucial rol... 详细信息
来源: 评论
PosFuzz:augmenting greybox fuzzing with effective position distribution
收藏 引用
Cybersecurity 2023年 第4期6卷 123-143页
作者: Yanyan Zou Wei Zou JiaCheng Zhao Nanyu Zhong Yu Zhang Ji Shi Wei Huo Institute of Information Engineering Chinese Academy of SciencesBeijingChina School of Cyber Security University of Chinese Academy of SciencesBeijingChina State Key Lab of Processors Institute of Computing TechnologyChinese Academy of SciencesBeijingChina Key Laboratory of Network Assessment Technology Chinese Academy of SciencesBeijingChina Beijing Key Laboratory of Network Security and Protection Technology BeijingChina Zhongguancun Laboratory BeijingChina
Mutation-based greybox fuzzing has been one of the most prevalent techniques for security vulnerability discovery and a great deal of research work has been proposed to improve both its efficiency and ***-based greybo... 详细信息
来源: 评论
Wishart Deeplab network for Polarimetric SAR Image Classification  3rd
Wishart Deeplab Network for Polarimetric SAR Image Classific...
收藏 引用
3rd China Intelligent Robotics Annual Conference, CCF CIRAC 2022
作者: Shi, Junfei He, Tiansheng Jin, Haiyan Wang, Hua Xu, Weinan State Key Laboratory of Geo-Information Engineering Shaanxi Xi’an710048 China School of Computer Science and Engineering Xi’an University of Technology Shaanxi Xi’an710048 China Shaanxi Key Laboratory for Network Computing and Security Technology Shaanxi Xi’an710048 China
Polarimetric Synthetic Aperture Radar (PolSAR) images have attracted much attention with abundant polarimetric scattering information. In recent years, many deep learning models have been proposed and highly expanded ... 详细信息
来源: 评论
Research on Text Classification Based on BERT-BiGRU Model  3
Research on Text Classification Based on BERT-BiGRU Model
收藏 引用
2020 3rd International Conference on Modeling, Simulation and Optimization Technologies and Applications, MSOTA 2020
作者: Yu, Qing Wang, Ziyin Jiang, Kaiwen Tianjin Key Laboratory of Intelligence Computing and Network Security Tianjin University of Technology Tianjin China
Text classification is a typical application of natural language processing. At present, the most commonly used text classification method is deep learning. Meanwhile there are many difficulties in natural language pr... 详细信息
来源: 评论
Cross Elitist Learning Multifactorial Evolutionary Algorithm  1
收藏 引用
3rd International Conference on Neural computing for Advanced Applications, NCAA 2022
作者: Li, Wei Luo, Haonan Wang, Lei School of Computer Science and Engineering Xi’an University of Technology Xi’an710048 China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an710048 China
Multifactorial Evolutionary Algorithm (MFEA) is a popular optimization algorithm in recent years. It has implicit parallelism and can solve different problems at the same time in the same search space. However, premat... 详细信息
来源: 评论
Sentiment Analysis of Web Text Based on Deep Learning with a Attention Mechanism  12
Sentiment Analysis of Web Text Based on Deep Learning with a...
收藏 引用
12th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics, CISP-BMEI 2019
作者: Yu, Qing Zhao, Hui Jiang, Kaiwen Tianjin Key Laboratory of Intelligence Computing and Network Security Tianjin University of Technology Tianjin China
The sentiment analysis of online commentary is a hot research topic in the field of network information mining. Traditional text sentiment analysis methods are mainly based on emotional dictionaries or machine learnin... 详细信息
来源: 评论
Signature Scheme Based on The SM2 Algorithm in Fabric
Signature Scheme Based on The SM2 Algorithm in Fabric
收藏 引用
2021 International Conference on networking and network Applications, NaNA 2021
作者: Zhang, Yaling Wang, Hongyun Wang, Yichuan Ji, Wenjiang Zhu, Lei Xi'an University of technology School of computer science and engineering Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an University of technology Xi'an China
Based on the analysis and research of the widely used Hyperledger Fabric alliance chain structure, this paper proposes a digital signature scheme based on the national cryptographic algorithm SM2 which can be applied ... 详细信息
来源: 评论
Covariance Matrix Adaptation Evolutionary Algorithm for Multi-task Optimization  15th
Covariance Matrix Adaptation Evolutionary Algorithm for Mult...
收藏 引用
15th International Conference on Bio-Inspired computing: Theories and Applications, BIC-TA 2020
作者: Li, Wei Lei, Zhou Yuan, Junqing Luo, Haonan Jiang, Qiaoyong Li, Jinbo School of Computer Science and Engineering Xi’an University of Technology Xi’an710048 China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an710048 China
Multifactorial evolution is a relatively new evolutionary multitasking paradigm which aims to solve multiple optimization problems simultaneously. In order to make a further contribution to multifactorial optimization... 详细信息
来源: 评论
An Improved Cloud Particles Optimizer for Function Optimization  1
收藏 引用
2nd International Conference on Neural computing for Advanced Applications, NCAA 2021
作者: Li, Wei Luo, Haonan Yuan, Junqing Lei, Zhou Wang, Lei School of Computer Science and Engineering Xi’an University of Technology Xi’an710048 China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an710048 China
Evolutionary algorithm is a popular and effective method in optimization field. As one of the optimization algorithms, cloud particles optimizer (CPEA) has shown to be effective in solving problems with different char... 详细信息
来源: 评论
Species-Based Differential Evolution with Migration for Multimodal Optimization  14th
Species-Based Differential Evolution with Migration for Mult...
收藏 引用
14th International Conference on Bio-inspired computing: Theories and Applications, BIC-TA 2019
作者: Li, Wei Fan, Yaochi Jiang, Qiaoyong School of Computer Science and Engineering Xi’an University of Technology Xi’an710048 China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an710048 China
Due to the fact that many realistic problems are multimodal optimization problems (MMOPs), multimodal optimization has attracted a growing interest. In this paper, a Species-based differential evolution with migration... 详细信息
来源: 评论