咨询与建议

限定检索结果

文献类型

  • 640 篇 会议
  • 298 篇 期刊文献

馆藏范围

  • 938 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 494 篇 工学
    • 368 篇 计算机科学与技术...
    • 320 篇 软件工程
    • 133 篇 信息与通信工程
    • 99 篇 电气工程
    • 48 篇 控制科学与工程
    • 45 篇 生物工程
    • 43 篇 电子科学与技术(可...
    • 36 篇 机械工程
    • 33 篇 网络空间安全
    • 27 篇 生物医学工程(可授...
    • 26 篇 光学工程
    • 25 篇 安全科学与工程
    • 24 篇 交通运输工程
    • 21 篇 仪器科学与技术
    • 19 篇 化学工程与技术
    • 13 篇 土木工程
    • 11 篇 建筑学
  • 229 篇 理学
    • 144 篇 数学
    • 49 篇 统计学(可授理学、...
    • 43 篇 生物学
    • 42 篇 物理学
    • 22 篇 系统科学
    • 16 篇 化学
  • 122 篇 管理学
    • 73 篇 管理科学与工程(可...
    • 65 篇 图书情报与档案管...
    • 22 篇 工商管理
  • 29 篇 医学
    • 23 篇 临床医学
    • 20 篇 基础医学(可授医学...
  • 27 篇 法学
    • 16 篇 社会学
    • 13 篇 法学
  • 7 篇 经济学
  • 6 篇 教育学
  • 6 篇 军事学
  • 3 篇 农学

主题

  • 88 篇 feature extracti...
  • 72 篇 accuracy
  • 61 篇 semantics
  • 53 篇 computational mo...
  • 46 篇 data models
  • 43 篇 training
  • 38 篇 federated learni...
  • 37 篇 deep learning
  • 33 篇 neural networks
  • 26 篇 transformers
  • 25 篇 predictive model...
  • 23 篇 adaptation model...
  • 20 篇 object detection
  • 20 篇 data mining
  • 20 篇 benchmark testin...
  • 19 篇 speech processin...
  • 19 篇 visualization
  • 19 篇 privacy
  • 18 篇 convolution
  • 18 篇 optimization

机构

  • 219 篇 key laboratory o...
  • 198 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 41 篇 shaanxi key labo...
  • 37 篇 shandong fundame...
  • 37 篇 school of comput...
  • 34 篇 school of comput...
  • 32 篇 shaanxi key labo...
  • 28 篇 qilu university ...
  • 28 篇 shandong provinc...
  • 19 篇 school of comput...
  • 19 篇 school of comput...
  • 19 篇 shandong provinc...
  • 18 篇 shaanxi key labo...
  • 16 篇 key laboratory o...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 15 篇 xi'an key labora...
  • 14 篇 tianjin key labo...
  • 14 篇 qilu university ...

作者

  • 28 篇 yichuan wang
  • 23 篇 xinhong hei
  • 23 篇 wang yichuan
  • 20 篇 xiaoming wu
  • 17 篇 hei xinhong
  • 16 篇 haiyan jin
  • 15 篇 xiangzhi liu
  • 15 篇 shen yulong
  • 14 篇 meng deyu
  • 14 篇 li wei
  • 13 篇 guohua lv
  • 13 篇 jin haiyan
  • 13 篇 wenpeng lu
  • 12 篇 lei zhu
  • 12 篇 aimin li
  • 11 篇 wang lei
  • 11 篇 lu wenpeng
  • 11 篇 jing zhao
  • 11 篇 chen yanping
  • 11 篇 xiaohui han

语言

  • 872 篇 英文
  • 55 篇 其他
  • 13 篇 中文
检索条件"机构=Shaanxi Key Laboratory for Network Computing and Security Technology"
938 条 记 录,以下是161-170 订阅
排序:
AdaptFRCNet: Semi-supervised adaptation of pre-trained model with frequency and region consistency for medical image segmentation
收藏 引用
Medical Image Analysis 2025年 103卷 103626页
作者: Along He Yanlin Wu Zhihong Wang Tao Li Huazhu Fu College of Computer Science Tianjin Key Laboratory of Network and Data Security Technology Nankai University Tianjin 300350 China Haihe Lab of ITAI Tianjin 300459 China Institute of High Performance Computing (IHPC) Agency for Science Technology and Research (A*STAR) 138632 Singapore
Recently, large pre-trained models (LPM) have achieved great success, which provides rich feature representation for downstream tasks. Pre-training and then fine-tuning is an effective way to utilize LPM. However, the... 详细信息
来源: 评论
A Self-adaptive Single-Objective Multitasking Optimization Algorithm  1
收藏 引用
17th International Conference on Bio-Inspired computing: Theories and Applications, BIC-TA 2022
作者: Li, Xiaoyu Wang, Lei Jiang, Qiaoyong Li, Wei Wang, Bin The Key Laboratory of Network Computing and Security Technology of Shaanxi Province Xi’an University of Technology Xi’an710048 China The Key Laboratory of Industrial Automation of Shaanxi Province Shaanxi University of Technology Hanzhong723001 China School of Electronic and Information Engineering Ankang University Ankang725000 China
Evolutionary multitasking optimization algorithms have been presented for dealing with multiple tasks simultaneously. Many studies have proved that EMTOs often perform better than conventional single-task evolutionary... 详细信息
来源: 评论
A Novel Teaching Strategy Based on EduCoder Platform for C Programming Language  5th
A Novel Teaching Strategy Based on EduCoder Platform for C P...
收藏 引用
5th International Conference on Computer Science and Educational Informatization, CSEI 2023
作者: Li, Wei Hei, Xinhong Wang, Lei Wang, Yichuan School of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China School of Mathematics and Computer Science Shaanxi University of Technology Hanzhong China
Experimental teaching is an important part of the C programming language course, which aims to cultivate students’ Computational thinking ability, problem solving ability and programming ability. However, the existin... 详细信息
来源: 评论
Anomaly detection of user behavior based on DTMC with states of variable-length sequences
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2011年 第6期18卷 106-115页
作者: XIAO Xi XIA Shu-tao TIAN Xin-guang ZHAI Qi-bin Graduate School at Shenzhen Tsinghua University Shenzhen 518055 China State Key Laboratory of Information Security Graduate University of Chinese Academy of Sciences Beijing 100049 China Key Laboratory of Network Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China
In anomaly detection, a challenge is how to model a user's dynamic behavior. Many previous works represent the user behavior based on fixed-length models. To overcome their shortcoming, we propose a novel method base... 详细信息
来源: 评论
A novel image security protection method based on DCT compression theory and hyper-chaotic mapping
A novel image security protection method based on DCT compre...
收藏 引用
2021 International Conference on Information technology and Mechanical Engineering, ITME 2021
作者: Xue, Xianglian Jin, Haiyan School of Computer Science and Engineering Xi’an University of Technology Shaanxi Xi’an710077 China Shaanxi University of Chinese Medicine Shaanxi Xianyang712046 China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an University of Technology Shaanxi Xi’an710077 China
This paper studies the current situation of image compression encryption and analyzes the influence of low frequency (DC coefficient) and high frequency (AC coefficient) on image structure in DCT transformation. Based... 详细信息
来源: 评论
SolBERT: Advancing solidity smart contract similarity analysis via self-supervised pre-training and contrastive fine-tuning
收藏 引用
Information and Software technology 2025年 184卷
作者: Zhenzhou Tian Yudong Teng Xianqun Ke Yanping Chen Lingwei Chen School of Computer Science and Technology Xi’an University of Posts and Telecommunications Xi’an 710121 Shaanxi China Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi’an University of Posts and Telecommunications Xi’an 710121 Shaanxi China Xi’an Key Laboratory of Big Data and Intelligent Computing Xi’an University of Posts and Telecommunications Xi’an 710121 Shaanxi China Department of Computer Science and Engineering Wright State University Dayton 45435 OH USA
Context: Reliable and effective similarity analysis for the smart contracts facilitates the maintenance and quality assurance of the smart contract ecosystem. However, existing signature-based methods and code represe...
来源: 评论
Prediction of miRNA family based on class-incremental learning
Prediction of miRNA family based on class-incremental learni...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Liu, Yajun Qiu, Lulu Li, Aimin Fei, Rong Li, Junhuai Wu, Fang-Xiang Xi'an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China Division of Biomedical Engineering Department of Mechanical Engineering Department of Computer Science Saskatoon Canada
With the development of deep sequencing, recent studies indicate that a miRNA precursor can generate multiple miRNA isoforms (isomiRs). The family prediction of canonical miRNAs and isomiRs could provide a basis for m... 详细信息
来源: 评论
Edge computing Task Scheduling with Joint Blockchain and Task Caching in Industrial Internet
收藏 引用
Computers, Materials & Continua 2023年 第4期75卷 2101-2117页
作者: Yanping Chen Xuyang Bai Xiaomin Jin Zhongmin Wang Fengwei Wang Li Ling School of Computer Science and Technology Xi’an University of Posts and TelecommunicationsXi’an710121China Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi’an710121China Xi’an Key Laboratory of Big Data and Intelligent Computing Xi’anShaanxi710121China ZTE Corporation Shenzhen51805China
Deploying task caching at edge servers has become an effectiveway to handle compute-intensive and latency-sensitive tasks on the industrialinternet. However, how to select the task scheduling location to reduce taskde... 详细信息
来源: 评论
Channel Drop Out: A Simple Way to Prevent CNN from Overfitting in Motor Imagery Based BCI  7th
Channel Drop Out: A Simple Way to Prevent CNN from Overfitti...
收藏 引用
7th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2021
作者: Luo, Jing Wang, Yaojie Xu, Rong Liu, Guangming Wang, Xiaofan Gong, Yijing Shaanxi Key Laboratory for Network Computing and Security Technology School of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Province Institute of Water Resources and Electric Power Investigation and Design Xi’an China
With the development of deep learning, many motor imagery brain-computer interfaces based on convolutional neural networks (CNNs) show outstanding performances. However, the trial number of EEG in the training set is ... 详细信息
来源: 评论
Passive Beamforming Design for Intelligent Reflecting Surface Assisted MIMO Systems
收藏 引用
China Communications 2021年 第3期18卷 18-28页
作者: Chenghao Feng Wenqian Shen Xinyu Gao Jianping An School of Information and Electronics Beijing Institute of TechnologyBeijing 100081China Shaanxi Key Laboratory of Information Communication Network and Security Xian University of Posts and TelecommunicationsXianShaanxi 710121China Huawei Technologies Co.Ltd. Beijing 100085China
Intelligent reflecting surfaces(IRSs)constitute passive devices,which are capable of adjusting the phase shifts of their reflected signals,and hence they are suitable for passive *** this paper,we conceive their desig... 详细信息
来源: 评论