咨询与建议

限定检索结果

文献类型

  • 649 篇 会议
  • 298 篇 期刊文献

馆藏范围

  • 947 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 506 篇 工学
    • 380 篇 计算机科学与技术...
    • 328 篇 软件工程
    • 136 篇 信息与通信工程
    • 101 篇 电气工程
    • 57 篇 控制科学与工程
    • 51 篇 电子科学与技术(可...
    • 44 篇 生物工程
    • 34 篇 机械工程
    • 33 篇 网络空间安全
    • 27 篇 光学工程
    • 26 篇 生物医学工程(可授...
    • 25 篇 安全科学与工程
    • 23 篇 仪器科学与技术
    • 22 篇 交通运输工程
    • 18 篇 化学工程与技术
    • 12 篇 土木工程
    • 11 篇 建筑学
  • 231 篇 理学
    • 146 篇 数学
    • 49 篇 统计学(可授理学、...
    • 44 篇 物理学
    • 42 篇 生物学
    • 22 篇 系统科学
    • 16 篇 化学
  • 123 篇 管理学
    • 73 篇 管理科学与工程(可...
    • 66 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 28 篇 法学
    • 16 篇 社会学
    • 14 篇 法学
  • 26 篇 医学
    • 22 篇 临床医学
    • 19 篇 基础医学(可授医学...
  • 7 篇 经济学
  • 6 篇 军事学
  • 5 篇 教育学
  • 3 篇 农学
  • 1 篇 文学

主题

  • 89 篇 feature extracti...
  • 72 篇 accuracy
  • 62 篇 semantics
  • 53 篇 computational mo...
  • 45 篇 data models
  • 43 篇 training
  • 41 篇 federated learni...
  • 37 篇 deep learning
  • 32 篇 neural networks
  • 26 篇 transformers
  • 24 篇 predictive model...
  • 23 篇 adaptation model...
  • 21 篇 benchmark testin...
  • 20 篇 object detection
  • 20 篇 data mining
  • 20 篇 visualization
  • 19 篇 speech processin...
  • 19 篇 privacy
  • 18 篇 convolution
  • 18 篇 optimization

机构

  • 223 篇 key laboratory o...
  • 198 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 42 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 37 篇 school of comput...
  • 36 篇 shandong fundame...
  • 32 篇 shaanxi key labo...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 22 篇 school of comput...
  • 22 篇 shandong provinc...
  • 18 篇 school of comput...
  • 18 篇 shaanxi key labo...
  • 17 篇 xi'an key labora...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 tianjin key labo...
  • 13 篇 key laboratory o...

作者

  • 29 篇 yichuan wang
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 20 篇 xiaoming wu
  • 17 篇 shen yulong
  • 17 篇 hei xinhong
  • 15 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 14 篇 meng deyu
  • 14 篇 li wei
  • 14 篇 jin haiyan
  • 13 篇 guohua lv
  • 12 篇 xiaohui han
  • 12 篇 lei zhu
  • 12 篇 wenpeng lu
  • 12 篇 aimin li
  • 11 篇 wang lei
  • 11 篇 lu wenpeng
  • 11 篇 jing zhao
  • 11 篇 chen yanping

语言

  • 882 篇 英文
  • 55 篇 其他
  • 13 篇 中文
检索条件"机构=Shaanxi Key Laboratory for Network Computing and Security Technology"
947 条 记 录,以下是151-160 订阅
排序:
Unleashing the Potential of Decentralized Federated Learning in Healthcare: A Comprehensive Survey on Insights and Challenges  9
Unleashing the Potential of Decentralized Federated Learning...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Cheng, Haibo Liu, Wenjian Qu, Youyang Fu, Kexue Wang, Qinyuan City University of Macau Faculty of Data Science China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China
Federated learning (FL) is a distributed learning method that reduces data transmission and privacy risks. However, the existence of a central server may become a target of attackers, resulting in an increased risk of... 详细信息
来源: 评论
A Simple Semi-Supervised Joint Learning Framework for Few-shot Text Classification  5
A Simple Semi-Supervised Joint Learning Framework for Few-sh...
收藏 引用
5th International Conference on Artificial Intelligence and Pattern Recognition, AIPR 2022
作者: Lu, Shaoshuai Chen, Long Wang, Wenjing Xu, Cai Zhao, Wei Guan, Ziyu Lu, Guangyue Shaanxi Key Laboratory of Information Communication Network and Security Xi'an University of Posts and Telecommunications China School of Computer Science and Technology Xidian University China
The lack of labeled data is the bottleneck restricting deep text classification algorithm. State-of-the-art for most existing deep text classification methods follow the two-step transfer learning paradigm: pre-traini... 详细信息
来源: 评论
Elevating Predictions: Sculpting Flight Delay Predictions with Recursive Feature Elimination
Elevating Predictions: Sculpting Flight Delay Predictions wi...
收藏 引用
Computers and Artificial Intelligence Technologies (CAIT), International Conference on
作者: Wei Wei Chenchen Yu Zhao Yang Fu Bo School of Computer Science and Engineering and the Shaanxi Key Laboratory for Network Computing and Security Xi'an University Of Technology Xi’an China School of Computer Science and Engineering Xi'an University Of Technology Xi’an China
With the rapid development of the aviation industry and the significant growth of aviation data, how to use big data technology to accurately predict flight delays has become a problem that needs to be solved in the c... 详细信息
来源: 评论
A firmware upgrade solution based on hardware unique ID and SM4 cryptographic algorithm
A firmware upgrade solution based on hardware unique ID and ...
收藏 引用
2023 International Conference on Computer Graphics, Artificial Intelligence, and Data Processing, ICCAID 2023
作者: Gao, Shaofeng Wang, Kun Chen, Xinze Fu, Yong Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan250000 China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan250000 China
This article presents and implements a firmware upgrade solution for embedded systems, which aims to address the vulnerability of using the same file that can be easily copied or stolen. When upgrading firmware, a txt... 详细信息
来源: 评论
Innovations in Machine Learning for Flight Delay Prediction: A Targeted Overview
Innovations in Machine Learning for Flight Delay Prediction:...
收藏 引用
Computers and Artificial Intelligence Technologies (CAIT), International Conference on
作者: Wei Wei Chenchen Yu Zhao Yang Fu Bo School of Computer Science and Engineering and the Shaanxi Key Laboratory for Network Computing and Security Xi'an University Of Technology Xi’an China School of Computer Science and Engineering Xi'an University Of Technology Xi’an China
Artificial intelligence technology is increasingly being applied to air traffic flow forecasting. Based on the core data of Web of Science, this study uses bibliometrics and content review methods to investigate the c... 详细信息
来源: 评论
A fine-grained petri model for SQL time-blind injection
A fine-grained petri model for SQL time-blind injection
收藏 引用
2021 International Conference on networking and network Applications, NaNA 2021
作者: Zhang, Guiling Zhang, Yaling Wang, Yichuan Zhu, Lei Ji, Wenjiang Xi'an University of technology School of computer science and engineering Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China
With the background of severe SQL injection attacks, the existing SQL injection modeling methods cannot reflect the process of SQL injection attacks in a fine-grained manner. Based on the discussion of attack technolo... 详细信息
来源: 评论
A Trusted Privacy-Preserving Model for Cross-Chain Transactions Based on zk_SNARKs
A Trusted Privacy-Preserving Model for Cross-Chain Transacti...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Yichuan Wang Jianhuan Tie Xinhong Hei Li Zhao Xiaohui Zhang School of Computer Science and Engineering Xi'an University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technolog Xi'an China
Currently, the privacy protection technology of blockchain is not mature enough, such as user data leakage and lack of anonymity exist, and these problems are especially serious when conducting cross-chain transaction...
来源: 评论
ConvCatb: An Attention-based CNN-CATBOOST Risk Prediction Model for Driving Safety
ConvCatb: An Attention-based CNN-CATBOOST Risk Prediction Mo...
收藏 引用
2021 International Conference on networking and network Applications, NaNA 2021
作者: Hei, Xinhong Zhang, Hao Ji, Wenjiang Wang, Yichuan Zhu, Lei Qiu, Yuan College of Computer Science and Engineering Xi'an University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China
Risk prediction is one of the most important tasks in assistant and automatic driving. In recent years, by the help of VANET and various sensors in the cars, the status of cars and roads can be collected in real time ... 详细信息
来源: 评论
Deep Reinforcement-Learning-Based Adaptive Traffic Signal Control with Real-Time Queue Lengths
Deep Reinforcement-Learning-Based Adaptive Traffic Signal Co...
收藏 引用
2022 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2022
作者: Sun, Qi-Wei Han, Shi-Yuan Zhou, Jin Chen, Yue-Hui Yao, Kang University of Jinan Shandong Provincial Key Laboratory of Network Based Intelligent Computing Jinan250022 China Shandong Provincial Network Security and Infomationization Technology Center Jinan250002 China
The reinforcement learning (RL) with deep neural network, as a data-driven approach, is promising for adaptive traffic signal control (ATSC) in traffic scenarios. The majority of the existing studies focus on designin... 详细信息
来源: 评论
Wrong-of-Thought: An Integrated Reasoning Framework with Multi-Perspective Verification and Wrong Information
Wrong-of-Thought: An Integrated Reasoning Framework with Mul...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Zhang, Yongheng Chen, Qiguang Zhou, Jingxuan Wang, Peng Si, Jiasheng Wang, Jin Lu, Wenpeng Qin, Libo School of Computer Science and Engineering Central South University China Research Center for SCIR Harbin Institute of Technology Harbin China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology Shandong Academy of Sciences China Yunnan University Kunming China
Chain-of-Thought (CoT) has become a vital technique for enhancing the performance of Large Language Models (LLMs), attracting increasing attention from researchers. One stream of approaches focuses on the iterative en...
来源: 评论