咨询与建议

限定检索结果

文献类型

  • 647 篇 会议
  • 287 篇 期刊文献

馆藏范围

  • 934 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 499 篇 工学
    • 375 篇 计算机科学与技术...
    • 328 篇 软件工程
    • 136 篇 信息与通信工程
    • 99 篇 电气工程
    • 57 篇 控制科学与工程
    • 50 篇 电子科学与技术(可...
    • 44 篇 生物工程
    • 34 篇 机械工程
    • 33 篇 网络空间安全
    • 27 篇 光学工程
    • 26 篇 生物医学工程(可授...
    • 25 篇 安全科学与工程
    • 23 篇 仪器科学与技术
    • 22 篇 交通运输工程
    • 18 篇 化学工程与技术
    • 12 篇 土木工程
    • 11 篇 建筑学
  • 231 篇 理学
    • 146 篇 数学
    • 49 篇 统计学(可授理学、...
    • 44 篇 物理学
    • 42 篇 生物学
    • 22 篇 系统科学
    • 16 篇 化学
  • 123 篇 管理学
    • 73 篇 管理科学与工程(可...
    • 66 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 28 篇 法学
    • 16 篇 社会学
    • 14 篇 法学
  • 26 篇 医学
    • 22 篇 临床医学
    • 19 篇 基础医学(可授医学...
  • 7 篇 经济学
  • 6 篇 军事学
  • 5 篇 教育学
  • 3 篇 农学
  • 1 篇 文学

主题

  • 89 篇 feature extracti...
  • 72 篇 accuracy
  • 61 篇 semantics
  • 52 篇 computational mo...
  • 45 篇 data models
  • 42 篇 training
  • 39 篇 federated learni...
  • 37 篇 deep learning
  • 32 篇 neural networks
  • 26 篇 transformers
  • 24 篇 predictive model...
  • 23 篇 adaptation model...
  • 20 篇 object detection
  • 20 篇 data mining
  • 20 篇 benchmark testin...
  • 19 篇 speech processin...
  • 19 篇 visualization
  • 19 篇 privacy
  • 18 篇 convolution
  • 18 篇 optimization

机构

  • 220 篇 key laboratory o...
  • 197 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 42 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 37 篇 school of comput...
  • 36 篇 shandong fundame...
  • 32 篇 shaanxi key labo...
  • 29 篇 shandong provinc...
  • 28 篇 qilu university ...
  • 21 篇 school of comput...
  • 20 篇 shandong provinc...
  • 18 篇 school of comput...
  • 18 篇 shaanxi key labo...
  • 16 篇 xi'an key labora...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 tianjin key labo...
  • 13 篇 key laboratory o...
  • 13 篇 key laboratory o...

作者

  • 29 篇 yichuan wang
  • 24 篇 xinhong hei
  • 22 篇 wang yichuan
  • 20 篇 xiaoming wu
  • 17 篇 shen yulong
  • 17 篇 hei xinhong
  • 15 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 14 篇 meng deyu
  • 14 篇 li wei
  • 14 篇 jin haiyan
  • 13 篇 guohua lv
  • 12 篇 aimin li
  • 11 篇 wang lei
  • 11 篇 lu wenpeng
  • 11 篇 jing zhao
  • 11 篇 chen yanping
  • 11 篇 fu chong
  • 11 篇 mingle zhou
  • 11 篇 wei zhang

语言

  • 869 篇 英文
  • 55 篇 其他
  • 13 篇 中文
检索条件"机构=Shaanxi Key Laboratory for Network Computing and Security Technology"
934 条 记 录,以下是31-40 订阅
Voiceprint recognition model based on Ecapa-Tdnn and ResNet  5
Voiceprint recognition model based on Ecapa-Tdnn and ResNet
收藏 引用
5th International Conference on Telecommunications, Optics, and Computer Science, TOCS 2024
作者: Jia, Chengjie Fei, Rong Li, Xiaomeng School of Computer Science and Engineering Xi'an University of Technology Shaanxi Xi'an710004 China Shaanxi Key Laboratory for Network Computing and Security Technology School of Computer Science and Engineering Xi'an University of Technology Shaanxi Xi'an710048 China
In recent years, with the continuous progress of deep learning neural networks and the construction of large data sets, new breakthroughs in voiceprint verification technology for voice calls have been rapidly achieve... 详细信息
来源: 评论
A Low-Rank Matching Attention Based Cross-Modal Feature Fusion Method for Conversational Emotion Recognition
收藏 引用
IEEE Transactions on Affective computing 2024年 第02期16卷 1177-1189页
作者: Shou, Yuntao Liu, Huan Cao, Xiangyong Meng, Deyu Dong, Bo Xi'An Jiaotong School of Computer Science and Technology Ministry of Education Key Laboratory for Intelligent Networks and Network Security Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Shaanxi Xi'an710049 China Xi'An Jiaotong School of Computer Science and Technology Shaanxi Xi'an710049 China BigKEJoint Innovation Center SHMEEA Shanghai China Xi'An Jiaotong University School of Mathematics and Statistics Xi'an China
Conversational emotion recognition (CER) is an important research topic in human-computer interactions. Although recent advancements in transformer-based cross-modal fusion methods have shown promise in CER tasks, the... 详细信息
来源: 评论
A Channel-Wise Guidance Sparse Transformer for Effective Dark Image Enhancement
A Channel-Wise Guidance Sparse Transformer for Effective Dar...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Haiyan Jin Yifan Shuai Fengyuan Zuo Haonan Su Zhaolin Xiao Bin Wang Yuanlin Zhang Xi’an University of Technology China Shaanxi Key Laboratory for Network Computing and Security Technology China
Dark Image Enhancement (DIE) aims to improve contrast and restore details for captured images under low illumination. Currently, traditional Transformer methods have achieved significant performance in the DIE problem... 详细信息
来源: 评论
The Study of Multi-type computing Power Trading Mechanism in computing Power network Based on Blockchain and Combinatorial Double Auction  24
The Study of Multi-type Computing Power Trading Mechanism in...
收藏 引用
4th International Conference on Artificial Intelligence, Big Data and Algorithms, CAIBDA 2024
作者: Zhao, Yue Wang, Jizhi Kong, Lingrui Sui, Tongtong Shandong Computer Science Center National Supercomputer Center in Jinan Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Provincial Key Laboratory of Industrial Network and Information System Security Qilu University of Technology Shandong Academy of Sciences Jinan Shandong China Quancheng Laboratory Jinan Key Laboratory of Digital Security Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan Shandong China
The advancement of 5G and mobile internet technologies has propelled the development of emerging businesses and applications, demanding higher requirements for network bandwidth and computational resources. To address... 详细信息
来源: 评论
Edge computing Task Scheduling with Joint Blockchain and Task Caching in Industrial Internet
收藏 引用
Computers, Materials & Continua 2023年 第4期75卷 2101-2117页
作者: Yanping Chen Xuyang Bai Xiaomin Jin Zhongmin Wang Fengwei Wang Li Ling School of Computer Science and Technology Xi’an University of Posts and TelecommunicationsXi’an710121China Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi’an710121China Xi’an Key Laboratory of Big Data and Intelligent Computing Xi’anShaanxi710121China ZTE Corporation Shenzhen51805China
Deploying task caching at edge servers has become an effectiveway to handle compute-intensive and latency-sensitive tasks on the industrialinternet. However, how to select the task scheduling location to reduce taskde... 详细信息
来源: 评论
Glare-SNet: Unsupervised Glare Suppression Balance network  27th
Glare-SNet: Unsupervised Glare Suppression Balance Network
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Li, Pei Zuo, Chengyu Wei, Wangjuan Pan, Xiaoying Wang, Zhanhao School of Computer Science and Technology Xi’an University of Posts and Telecommunications Xi’an710121 China Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi’an China Shaanxi Key Laboratory of Intelligent Media Computing and interaction Xi’an China Xi’an Key Laboratory of Big Data and Intelligent Computing Xi’an China
In light of the problems associated with glare and halo effects in low-light images, as well as the inadequacy of existing processing algorithms in handling details, a glare suppression balance network based on unsupe... 详细信息
来源: 评论
MMH-FE:AMulti-Precision and Multi-Sourced Heterogeneous Privacy-Preserving Neural network Training Based on Functional Encryption
收藏 引用
Computers, Materials & Continua 2025年 第3期82卷 5387-5405页
作者: Hao Li Kuan Shao Xin Wang Mufeng Wang Zhenyong Zhang The State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang550025China Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science CenterQilu University of Technology(Shandong Academy of Sciences)Jinan250014China China Industrial Control Systems Cyber Emergency Response Team Beijing100040China
Due to the development of cloud computing and machine learning,users can upload their data to the cloud for machine learning model ***,dishonest clouds may infer user data,resulting in user data *** schemes have achie... 详细信息
来源: 评论
TCS security Analysis in Intel SGX Enclave MultiThreading
TCS Security Analysis in Intel SGX Enclave MultiThreading
收藏 引用
2022 International Conference on networking and network Applications, NaNA 2022
作者: Zhang, Tong Cui, Xiangjie Wang, Yichuan Du, Yanning Gao, Wen School of Computer Science and Engineering Xi'an University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology China
With the rapid development of Internet technology in recent years, the demand for security support for complex applications is becoming stronger and stronger. Intel Software Guard Extensions (Intel SGX) is created as ... 详细信息
来源: 评论
Adaptive Compression-Encryption Scheme for Medical Image Based on Improved Compressive Sensing and Deoxyribonucleic Acid Coding-Compression
Adaptive Compression-Encryption Scheme for Medical Image Bas...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Xue, Xianglian Jin, Haiyan Zhou, Changjun Xi'an University of Technology School of Computer Science and Engineering Xi'an China Shaanxi University of Chinese Medicine Section of Computer Teaching and Research Xianyang China Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China Zhejiang Normal University School of Computer Science and Technology Jinhua China
Medical images often occupy large storage space and contain patient privacy or sensitive information, which makes them difficult and unsafe to be transmitted through the network. This paper proposed an adaptive compre... 详细信息
来源: 评论
A Multi-Exposure Generation and Fusion Method for Low-Light Image Enhancement
A Multi-Exposure Generation and Fusion Method for Low-Light ...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Haiyan Jin Long Li Haonan Su YuanLin Zhang ZhaoLin Xiao Bin Wang Faculty of Computer Science and Engineering Xi’an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology
In the low light image enhancement, single exposure images contains a limited dynamic range, which hinders the restoration of contrast and texture. To address these problems, we propose a multi exposure generation and... 详细信息
来源: 评论