咨询与建议

限定检索结果

文献类型

  • 647 篇 会议
  • 287 篇 期刊文献

馆藏范围

  • 934 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 499 篇 工学
    • 375 篇 计算机科学与技术...
    • 328 篇 软件工程
    • 136 篇 信息与通信工程
    • 99 篇 电气工程
    • 57 篇 控制科学与工程
    • 50 篇 电子科学与技术(可...
    • 44 篇 生物工程
    • 34 篇 机械工程
    • 33 篇 网络空间安全
    • 27 篇 光学工程
    • 26 篇 生物医学工程(可授...
    • 25 篇 安全科学与工程
    • 23 篇 仪器科学与技术
    • 22 篇 交通运输工程
    • 18 篇 化学工程与技术
    • 12 篇 土木工程
    • 11 篇 建筑学
  • 231 篇 理学
    • 146 篇 数学
    • 49 篇 统计学(可授理学、...
    • 44 篇 物理学
    • 42 篇 生物学
    • 22 篇 系统科学
    • 16 篇 化学
  • 123 篇 管理学
    • 73 篇 管理科学与工程(可...
    • 66 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 28 篇 法学
    • 16 篇 社会学
    • 14 篇 法学
  • 26 篇 医学
    • 22 篇 临床医学
    • 19 篇 基础医学(可授医学...
  • 7 篇 经济学
  • 6 篇 军事学
  • 5 篇 教育学
  • 3 篇 农学
  • 1 篇 文学

主题

  • 89 篇 feature extracti...
  • 72 篇 accuracy
  • 61 篇 semantics
  • 52 篇 computational mo...
  • 45 篇 data models
  • 42 篇 training
  • 39 篇 federated learni...
  • 37 篇 deep learning
  • 32 篇 neural networks
  • 26 篇 transformers
  • 24 篇 predictive model...
  • 23 篇 adaptation model...
  • 20 篇 object detection
  • 20 篇 data mining
  • 20 篇 benchmark testin...
  • 19 篇 speech processin...
  • 19 篇 visualization
  • 19 篇 privacy
  • 18 篇 convolution
  • 18 篇 optimization

机构

  • 220 篇 key laboratory o...
  • 197 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 42 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 37 篇 school of comput...
  • 36 篇 shandong fundame...
  • 32 篇 shaanxi key labo...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 21 篇 school of comput...
  • 20 篇 shandong provinc...
  • 18 篇 school of comput...
  • 18 篇 shaanxi key labo...
  • 16 篇 xi'an key labora...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 tianjin key labo...
  • 13 篇 key laboratory o...
  • 13 篇 key laboratory o...

作者

  • 29 篇 yichuan wang
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 20 篇 xiaoming wu
  • 17 篇 shen yulong
  • 17 篇 hei xinhong
  • 15 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 14 篇 meng deyu
  • 14 篇 li wei
  • 14 篇 jin haiyan
  • 13 篇 guohua lv
  • 12 篇 aimin li
  • 11 篇 wang lei
  • 11 篇 lu wenpeng
  • 11 篇 jing zhao
  • 11 篇 chen yanping
  • 11 篇 fu chong
  • 11 篇 mingle zhou
  • 11 篇 wei zhang

语言

  • 869 篇 英文
  • 55 篇 其他
  • 13 篇 中文
检索条件"机构=Shaanxi Key Laboratory for Network Computing and Security Technology"
934 条 记 录,以下是11-20 订阅
排序:
DDoS Attack Detection Based on Information Entropy Feature Extraction in Software Defined networks
DDoS Attack Detection Based on Information Entropy Feature E...
收藏 引用
2023 International Conference on networking and network Applications, NaNA 2023
作者: Ji, Wenjiang Yang, Yixin Zhang, Yaling Wang, Yichuan Tian, Mengjie Qiu, Yuan Xi'an University of Technology School of Computer Science and Engineering Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology China
Distributed Denial of Service(DDoS) attacks target the forwarding-control separation feature of Software-Defined networking(SDN) to launch attacks, causing network disruptions. Therefore security against DDoS attack d... 详细信息
来源: 评论
A Novel On-Demand Service Architecture for Efficient Cloud-Edge Collaboration
A Novel On-Demand Service Architecture for Efficient Cloud-E...
收藏 引用
2023 International Conference on networking and network Applications, NaNA 2023
作者: Zhang, Yaling Chen, Jingjing Wang, Yichuan Xiao, Yeqiu Liu, Xiaoxue School of Computer Science and Engineering Xi'an University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology China
With the advent of 5G era, the model of cloud-edge collaboration is used to handle massive data computing tasks with significant superiority. However, this architecture still uses the traditional web service model, wh... 详细信息
来源: 评论
A Novel Teaching Strategy Based on EduCoder Platform for C Programming Language  5th
A Novel Teaching Strategy Based on EduCoder Platform for C P...
收藏 引用
5th International Conference on Computer Science and Educational Informatization, CSEI 2023
作者: Li, Wei Hei, Xinhong Wang, Lei Wang, Yichuan School of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China School of Mathematics and Computer Science Shaanxi University of Technology Hanzhong China
Experimental teaching is an important part of the C programming language course, which aims to cultivate students’ Computational thinking ability, problem solving ability and programming ability. However, the existin... 详细信息
来源: 评论
Petri Net-Based Attack Modeling for Industrial Control System networks  3rd
Petri Net-Based Attack Modeling for Industrial Control Syste...
收藏 引用
3rd China Intelligent Robotics Annual Conference, CCF CIRAC 2022
作者: Wang, Yichuan Lv, Zhaoqi Zhang, Yaling Xiao, Yeqiu Hei, Xinhong School of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China
Industrial control systems have been deeply involved in industrial facilities and infrastructure. With the integrated development of industry and information technology, industrial control systems are tied to the Inte... 详细信息
来源: 评论
Competitive Swarm Optimizer Based on Individual Learning Mechanism  5
Competitive Swarm Optimizer Based on Individual Learning Mec...
收藏 引用
5th International Conference on High Performance Big Data and Intelligent Systems, HDIS 2023
作者: Tang, JingQi Li, Wei Wang, Lei School of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China
In view of the disadvantages of the traditional competitive swarm optimizer (CSO), such as falling into local minimization or poor convergence accuracy, this paper proposed an enhanced CSO algorithm called competitive... 详细信息
来源: 评论
Prediction of miRNA family based on class-incremental learning
Prediction of miRNA family based on class-incremental learni...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Liu, Yajun Qiu, Lulu Li, Aimin Fei, Rong Li, Junhuai Wu, Fang-Xiang Xi'an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China Division of Biomedical Engineering Department of Mechanical Engineering Department of Computer Science Saskatoon Canada
With the development of deep sequencing, recent studies indicate that a miRNA precursor can generate multiple miRNA isoforms (isomiRs). The family prediction of canonical miRNAs and isomiRs could provide a basis for m... 详细信息
来源: 评论
key Management and Authentication Scheme Forward Trusted Pervasive Container computing  2
Key Management and Authentication Scheme Forward Trusted Per...
收藏 引用
2nd International Conference on Big Data and Privacy computing, BDPC 2024
作者: Hei, XinHong Xue, YuZhan Wang, YiChuan Liu, YiFan Peng, Chen Sun, Xiang School of Computer Science and Engineering Xi'an University of Technology Xi'an China School of Computer Science and Engineering Xi'an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China
Cloud computing technology is an internet-based computing model that provides high reliability and security measures, including data backup, secure access control, etc. As Docker containers play a increasingly importa... 详细信息
来源: 评论
A Trusted Privacy-Preserving Model for Cross-Chain Transactions Based on zk_SNARKs
A Trusted Privacy-Preserving Model for Cross-Chain Transacti...
收藏 引用
2023 International Conference on networking and network Applications, NaNA 2023
作者: Wang, Yichuan Tie, Jianhuan Hei, Xinhong Zhao, Li Zhang, Xiaohui School of Computer Science and Engineering Xi'an University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technolog Xi'an China
Currently, the privacy protection technology of blockchain is not mature enough, such as user data leakage and lack of anonymity exist, and these problems are especially serious when conducting cross-chain transaction... 详细信息
来源: 评论
PosFuzz:augmenting greybox fuzzing with effective position distribution
收藏 引用
Cybersecurity 2023年 第4期6卷 123-143页
作者: Yanyan Zou Wei Zou JiaCheng Zhao Nanyu Zhong Yu Zhang Ji Shi Wei Huo Institute of Information Engineering Chinese Academy of SciencesBeijingChina School of Cyber Security University of Chinese Academy of SciencesBeijingChina State Key Lab of Processors Institute of Computing TechnologyChinese Academy of SciencesBeijingChina Key Laboratory of Network Assessment Technology Chinese Academy of SciencesBeijingChina Beijing Key Laboratory of Network Security and Protection Technology BeijingChina Zhongguancun Laboratory BeijingChina
Mutation-based greybox fuzzing has been one of the most prevalent techniques for security vulnerability discovery and a great deal of research work has been proposed to improve both its efficiency and ***-based greybo... 详细信息
来源: 评论
Wishart Deeplab network for Polarimetric SAR Image Classification  3rd
Wishart Deeplab Network for Polarimetric SAR Image Classific...
收藏 引用
3rd China Intelligent Robotics Annual Conference, CCF CIRAC 2022
作者: Shi, Junfei He, Tiansheng Jin, Haiyan Wang, Hua Xu, Weinan State Key Laboratory of Geo-Information Engineering Shaanxi Xi’an710048 China School of Computer Science and Engineering Xi’an University of Technology Shaanxi Xi’an710048 China Shaanxi Key Laboratory for Network Computing and Security Technology Shaanxi Xi’an710048 China
Polarimetric Synthetic Aperture Radar (PolSAR) images have attracted much attention with abundant polarimetric scattering information. In recent years, many deep learning models have been proposed and highly expanded ... 详细信息
来源: 评论