咨询与建议

限定检索结果

文献类型

  • 659 篇 会议
  • 310 篇 期刊文献

馆藏范围

  • 969 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 525 篇 工学
    • 395 篇 计算机科学与技术...
    • 337 篇 软件工程
    • 141 篇 信息与通信工程
    • 107 篇 电气工程
    • 59 篇 控制科学与工程
    • 53 篇 电子科学与技术(可...
    • 44 篇 生物工程
    • 35 篇 机械工程
    • 34 篇 网络空间安全
    • 28 篇 光学工程
    • 26 篇 生物医学工程(可授...
    • 25 篇 交通运输工程
    • 25 篇 安全科学与工程
    • 22 篇 仪器科学与技术
    • 19 篇 化学工程与技术
    • 11 篇 动力工程及工程热...
    • 11 篇 土木工程
  • 238 篇 理学
    • 149 篇 数学
    • 50 篇 统计学(可授理学、...
    • 47 篇 物理学
    • 42 篇 生物学
    • 22 篇 系统科学
    • 17 篇 化学
  • 125 篇 管理学
    • 74 篇 管理科学与工程(可...
    • 67 篇 图书情报与档案管...
    • 21 篇 工商管理
  • 28 篇 法学
    • 16 篇 社会学
    • 14 篇 法学
  • 26 篇 医学
    • 22 篇 临床医学
    • 19 篇 基础医学(可授医学...
  • 7 篇 教育学
  • 6 篇 经济学
  • 6 篇 军事学
  • 3 篇 农学
  • 1 篇 文学

主题

  • 90 篇 feature extracti...
  • 72 篇 accuracy
  • 62 篇 semantics
  • 53 篇 computational mo...
  • 45 篇 data models
  • 42 篇 training
  • 41 篇 federated learni...
  • 37 篇 deep learning
  • 32 篇 neural networks
  • 26 篇 transformers
  • 24 篇 predictive model...
  • 23 篇 adaptation model...
  • 21 篇 benchmark testin...
  • 20 篇 object detection
  • 20 篇 data mining
  • 19 篇 speech processin...
  • 19 篇 visualization
  • 19 篇 privacy
  • 18 篇 convolution
  • 18 篇 optimization

机构

  • 227 篇 key laboratory o...
  • 199 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 43 篇 shaanxi key labo...
  • 39 篇 school of comput...
  • 38 篇 shandong fundame...
  • 38 篇 school of comput...
  • 32 篇 shaanxi key labo...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 24 篇 shandong provinc...
  • 21 篇 school of comput...
  • 19 篇 school of comput...
  • 18 篇 shaanxi key labo...
  • 17 篇 xi'an key labora...
  • 16 篇 qilu university ...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 tianjin key labo...

作者

  • 29 篇 yichuan wang
  • 24 篇 xinhong hei
  • 23 篇 wang yichuan
  • 20 篇 xiaoming wu
  • 18 篇 hei xinhong
  • 17 篇 shen yulong
  • 15 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 14 篇 meng deyu
  • 14 篇 li wei
  • 13 篇 guohua lv
  • 13 篇 mingle zhou
  • 13 篇 jin haiyan
  • 13 篇 aimin li
  • 12 篇 lu wenpeng
  • 12 篇 xiaohui han
  • 12 篇 delong han
  • 12 篇 lei zhu
  • 12 篇 wenpeng lu
  • 11 篇 wang lei

语言

  • 876 篇 英文
  • 83 篇 其他
  • 13 篇 中文
检索条件"机构=Shaanxi Key Laboratory for Network Computing and Security Technology"
969 条 记 录,以下是271-280 订阅
排序:
DHD: Double Hard Decision Decoding Scheme for NAND Flash Memory
DHD: Double Hard Decision Decoding Scheme for NAND Flash Mem...
收藏 引用
Design, Automation and Test in Europe Conference and Exhibition
作者: Lanlan Cui Yichuan Wang Renzhi Xiao Miao Li Xiaoxue Liu Xinhong Hei School of Computer Science and Engineering XI'AN University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China School of Software Engineering Jiangxi University of Science and Technology Nanchang China School of Information Engineering Zhongnan University of Economics and Law Wuhan China
With the advancement of NAND flash technology, the increased storage density leads to intensified interference, which in turn raises the error rate during data retrieval. To ensure data reliability, low-density parity... 详细信息
来源: 评论
DHD: Double Hard Decision Decoding Scheme for NAND Flash Memory
DHD: Double Hard Decision Decoding Scheme for NAND Flash Mem...
收藏 引用
2025 Design, Automation and Test in Europe Conference, DATE 2025
作者: Cui, Lanlan Wang, Yichuan Xiao, Renzhi Li, Miao Liu, Xiaoxue Hei, Xinhong School of Computer Science and Engineering XI'AN University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China School of Software Engineering Jiangxi University of Science and Technology Nanchang China School of Information Engineering Zhongnan University of Economics and Law Wuhan China
With the advancement of NAND flash technology, the increased storage density leads to intensified interference, which in turn raises the error rate during data retrieval. To ensure data reliability, low-density parity... 详细信息
来源: 评论
Research and Application of Smart Water Meter Monitoring System Based on NB-IoT  7
Research and Application of Smart Water Meter Monitoring Sys...
收藏 引用
7th IEEE Information technology and Mechatronics Engineering Conference, ITOEC 2023
作者: Zhao, Yuanyuan Zhang, Tixiang Hao, Huijuan Zhang, Xiaojie Shandong Computer Science Center Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science No. 19 Keyuan Road Shandong Jinan250014 China Shandong Yonate Environmental Technology Co. Ltd. Shandong Jinan250014 China
With the increasing shortage of water resources and the improvement of environmental awareness, intelligent water meter monitoring systems have become a hot research topic in the field of water conservation. This pape... 详细信息
来源: 评论
LDVNet: Lightweight and Detail-Aware Vision network for Image Recognition Tasks in Resource-Constrained Environments  29
LDVNet: Lightweight and Detail-Aware Vision Network for Imag...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Liu, Yuchen Liang, Hu Qiu, Ran Zhao, Shengrong Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Qilu University of Technology Shandong Academy of Sciences Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
In many underwater application scenarios, recognition tasks need to be executed promptly on computationally limited platforms. However, models designed for this field often exhibit spatial locality, and existing works... 详细信息
来源: 评论
Augmentation-aware self-supervision for data-efficient GAN training  23
Augmentation-aware self-supervision for data-efficient GAN t...
收藏 引用
Proceedings of the 37th International Conference on Neural Information Processing Systems
作者: Liang Hou Qi Cao Yige Yuan Songtao Zhao Chongyang Ma Siyuan Pan Pengfei Wan Zhongyuan Wang Huawei Shen Xueqi Cheng CAS Key Laboratory of AI Safety and Security Institute of Computing Technology Chinese Academy of Sciences and University of Chinese Academy of Sciences and Kuaishou Technology CAS Key Laboratory of AI Safety and Security Institute of Computing Technology Chinese Academy of Sciences CAS Key Laboratory of AI Safety and Security Institute of Computing Technology Chinese Academy of Sciences and University of Chinese Academy of Sciences Kuaishou Technology CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences and University of Chinese Academy of Sciences
Training generative adversarial networks (GANs) with limited data is challenging because the discriminator is prone to overfitting. Previously proposed differentiable augmentation demonstrates improved data efficiency...
来源: 评论
A Triangular Stable Node network based on Self-supervised Learning for personalized prediction
A Triangular Stable Node Network based on Self-supervised Le...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Liu, Qing Gao, Qian Fan, Jun Zhang, Zhiqiang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan250014 China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology Shandong Academy of Sciences Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan250014 China China Telecom Digital Intelligence Techonology Co Ltd. No.1999 Shunhua road Shandong Jinan250101 China
In recent years, research has illuminated the potency of implicit data processing in enhancing user preferences. Nevertheless, barriers remain in breaking through the constraints of implicit information. This study ai... 详细信息
来源: 评论
A Parallelizable Counterfactual Generation Method Based on Gradient Optimization  29
A Parallelizable Counterfactual Generation Method Based on G...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Ding, Haorun Jiang, Xuesong Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Quan Cheng Laboratory Jinan China State Key Laboratory of High-end Server and Storage Technology Jinan China
Post-hoc explanations are important for people to understand the predictions of explanation models. One class of methods in post-hoc explanation is the generation of counterfactuals, where a hypothetical example is ob... 详细信息
来源: 评论
GAF-GAN: Gated Attention Feature Fusion Image Inpainting network Based on Generative Adversarial network  29
GAF-GAN: Gated Attention Feature Fusion Image Inpainting Net...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Qiu, Ran Liang, Hu Liu, Yuchen Zhao, Shengrong Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Qilu University of Technology Shandong Academy of Sciences Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
Image inpainting, which aims to reconstruct reasonably clear and realistic images from known pixel information, is one of the core problems in computer vision. However, due to the complexity and variability of the und... 详细信息
来源: 评论
SRv6-INT Enabled network Monitoring and Measurement: Toward High-Yield network Observability for Digital Twin  3rd
SRv6-INT Enabled Network Monitoring and Measurement: Toward...
收藏 引用
3rd International Conference on Machine Learning, Cloud computing and Intelligent Mining, MLCCIM 2024
作者: Zhang, Xu Feng, Chuan Han, Pengchao Liu, Wei Gong, Xiaoxue Zhang, Qiupei Guo, Lei School of Communications and Information Engineering Chongqing University of Posts and Telecommunications Chongqing400065 China Institute of Intelligent Communication and Network Security Chongqing University of Posts and Telecommunications Chongqing400065 China Key Laboratory of Big Data Intelligent Computing Chongqing University of Posts and Telecommunications Chongqing400065 China School of Information Engineering Guangdong University of Technology Guangzhou510006 China
network monitoring and measurement is an important part of realizing the network digital twin. However, it introduces the problem of high cost when obtaining the status data of physical networks. Therefore, to efficie... 详细信息
来源: 评论
network security Situation Assessment Method Based on Absorbing Markov Chain
Network Security Situation Assessment Method Based on Absorb...
收藏 引用
2022 International Conference on networking and network Applications, NaNA 2022
作者: Gao, Hongbin Wang, Shangxing Zhang, Hongbin Liu, Bin Zhao, Dongmei Liu, Zhen Hebei University of Science and Technology School of Information Science and Engineering Shijiazhuang China Hebei University of Science and Technology School of Information Science and Engineering Hebei Key Laboratory of Network and Information Security Shijiazhuang China Hebei University of Science and Technology School of Economics and Management Research Center of Big Data and Social Computing Shijiazhuang China Hebei Normal University Hebei Key Laboratory of Network and Information Security Shijiazhuang China
This paper has a new network security evaluation method as an absorbing Markov chain-based assessment method. This method is different from other network security situation assessment methods based on graph theory. It... 详细信息
来源: 评论